The Kentroversy Papers $10,000 9/11 Challenge!
NOTICE: Anyone who is able to collect on the KENTROVERSY PAPERS $10,000 9/11 CHALLENGE will not receive a $10,000 bill, as pictured above. It is shown merely to indicate the amount of the challenge award.
THE KENTROVERSY PAPERS $10,000 9/11 CHALLENGE!
Here is ONE THING that bothers me about 9/11 ...
On December 11, 2005 I wrote an article entitled National Security Code Access and 9/11 This short document printed the ONE QUESTION that I have been asking people about 9/11, which is as follows:
There is one aspect of 9/11 that alone proves that it was an INSIDE JOB.
Those carrying out these attacks would have had to contend with NATIONAL SECURITY CODES that are changed daily, and some are changed hourly. Arabs in a cave in Afghanistan would have had to deal with these codes to access the NATIONAL SECURITY, NSA, and NORTHCOM computer networks. The ONLY WAY that they could have had access to this HIGHLY SENSITIVE DATA is by a mole inside providing this information.
Such a person would have to have been on the level of the JOINT CHIEFS and the NSA to have access to the CORRECT DATA.
Additionally, they would have had to have had full access to the Air-Traffic Control network and the grid that overlays the entire USA. These perpetraitors would also had to have had access to the communications from the towers in numerous cities and the computer networks of the airlines.
These Neo-Nazi-Cons were bold enough to suggest that a small handful of insurgent terrorists were controlling these attacks from a cave half a world away, using a laptop computer.
Are you $&*$!@# kidding me?!
By the way, for a close-up view of how NATIONAL SECURITY CODES are used and implemented, please see the 1985 film THE FALCON AND THE SNOWMAN, starring Timothy Hutton and Sean Penn.
NOTE: If any reader can explain how outsiders could have defeated such inside networks and codes WITHOUT internal complicity, I am all ears ...
SO, HERE'S THE CHALLENGE ...
All a person has to do is provide evidence or documentation that PROVES that the so-called 'Arab Terrorists' were able to bypass NATIONAL SECURITY CLEARANCES AND PASSWORDS without the knowledge or assistance of anyone inside the federal government of the United States of AmeriKa.
Remember the following when attempting to answer the challenge:
- National Security Clearances and access to passwords which change daily is one thing the 'terrorists' would have to contend with. HOW could they gain access to these systems WITHOUT inside help?
- The federal government of the United States uses a level of computer network encryption that is NOT available to the public. HOW could these 'terrorists' gain access to these NATIONAL SECURITY NETWORKS without the requisite encryption UNLOCK key?
- Pulling off 9/11 would have required access to MULTIPLE COMPUTER NETWORKS; among them are the computer systems of the following: NSA, CIA, FBI, NORTHCOM, and the computer networks of American and United Airlines, as well as access to the National Federal Aviation Administration's Air-Traffic Control network. Finally, they would have also needed to gain access to voice recognition and editing software, which would have been required to mimic the voices of the various passengers in the faked cell phone calls which were allegedly placed from the planes. Lastly, the 'terrorists' would have had to gain access also to the cell phone companies that were infiltrated to place the faked calls, making them appear to have originated from the doomed planes.
Could these 'terrorists' who were supposedly sitting in a cave in Afghanistan, with nothing more than a notebook computer, hacked into ALL of these systems WITHOUT inside help?
SO, HERE IS HOW TO WIN $10,000 FROM THE KENTROVERSY PAPERS:
All anyone needs to do is supply me with evidence and irrefutable proof that every system named above could be hacked WITHOUT inside help. The funds in the amount of $10,000 are on deposit and just waiting for YOUR PROOF.
Your entries may be sent to me via my e-mail address, which can be found on the front page of this site, in the section entitled CONTACTING KENTROVERSY.
If there are any entries that appear to have the ANSWER without inside help, it will be examined to determine if the money can be rightfully claimed based on your submitted proof.
That's ALL there is to it!
© 2006 Kentroversy Papers
All rights reserved. Used with permission.
The following sources were used in the creation of this Kentroversy Paper . . .
National Security Code Access and 9/11 (December 11, 2005)
Scholars For 9/11 Truth