• (function() { (function(){function c(a){this.t={};this.tick=function(a,c,b){var d=void 0!=b?b:(new Date).getTime();this.t[a]=[d,c];if(void 0==b)try{window.console.timeStamp("CSI/"+a)}catch(l){}};this.tick("start",null,a)}var a;if(window.performance)var e=(a=window.performance.timing)&&a.responseStart;var h=0=b&&(window.jstiming.srt=e-b)}if(a){var d=window.jstiming.load;0=b&&(d.tick("_wtsrt",void 0,b),d.tick("wtsrt_","_wtsrt", e),d.tick("tbsd_","wtsrt_"))}try{a=null,window.chrome&&window.chrome.csi&&(a=Math.floor(window.chrome.csi().pageT),d&&0=c&&window.jstiming.load.tick("aft")};var f=!1;function g(){f||(f=!0,window.jstiming.load.tick("firstScrollTime"))}window.addEventListener?window.addEventListener("scroll",g,!1):window.attachEvent("onscroll",g); })(); .comment-link {margin-left:.6em;}

    Repiglican Roast

    A spirited discussion of public policy and current issues

    Name:
    Location: The mouth of being

    I'm furious about my squandered nation.

    Friday, May 30, 2008

    NORAD had drills of jets as weapons

    In the two years before the Sept. 11 attacks, the North American Aerospace Defense Command conducted exercises simulating what the White House says was unimaginable at the time: hijacked airliners used as weapons to crash into targets and cause mass casualties.

    One of the imagined targets was the World Trade Center. In another exercise, jets performed a mock shootdown over the Atlantic Ocean of a jet supposedly laden with chemical poisons headed toward a target in the United States. In a third scenario, the target was the Pentagon — but that drill was not run after Defense officials said it was unrealistic, NORAD and Defense officials say.

    NORAD, in a written statement, confirmed that such hijacking exercises occurred. It said the scenarios outlined were regional drills, not regularly scheduled continent-wide exercises.

    "Numerous types of civilian and military aircraft were used as mock hijacked aircraft," the statement said. "These exercises tested track detection and identification; scramble and interception; hijack procedures; internal and external agency coordination and operational security and communications security procedures."

    [...]

    Labels:

    0 Comments:

    Post a Comment

    Links to this post:

    Create a Link

    << Home