T7 B7 John Raidt Work Files- Questions Fdr- Top Questions That Remain 5-16-03

  • Uploaded by: 9/11 Document Archive
  • 0
  • 0
  • April 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View T7 B7 John Raidt Work Files- Questions Fdr- Top Questions That Remain 5-16-03 as PDF for free.

More details

  • Words: 582
  • Pages: 2
Top questions that remain about what happened on September 11th

Page 1 of 1

Top questions that remain about what happened on September 11— 1. What actually happened from the point of origin (airport) to the time of commandeering the aircraft, and was the terrorist's pattern of activity preventable under the existing security requirements either at the point of check-in, at the passenger screening checkpoint or onboard the aircraft? 2. What did the intelligence community know and how was the information shared? 3. Were "box cutters" the only weapons used by the terrorist to highjack the aircraft and did employees working at the airports assist in getting the weapons onboard the aircraft? Before September 11 , there was no requirement to screen employees with authorized access to the aircraft, so there is no telling what type of weapon coum have been smuggled onboard the aircraft or by whom. 4. How did the terrorist gain knowledge about the weaknesses in the aviation security system— by testing, observation, or inside information about the security system operations by individuals working within the system? There is a large population of former employees who worked at the airport with an abundant wealth of knowledge about security at airports. This would include former screeners with knowledge of screening checkpoint operations, air carrier employees with knowledge of CAPPS, EDS and PPBM operations, and service company employees with knowledge of aircraft security and terminal security. All these employee would typically have authorized access to secure areas of the airport. 5. Was there a' pattern of activity1 that the al Qaeda operatives used to test the system and identify vulnerabilities? Was there a system in place, either in the intelligence community or the aviation security regime, that could have identified an extraordinary or unusual pattern of activity?

.../view.php?thismailbox=INBOX&index=292&id=2&actionID=113&mime=5a08delfOiB683c3c45/16/03

Top questions that remain about what happened on September 11th 1. What actually happened from the point of origin (airport) to the time of commandeering the aircraft, and was the terrorist's pattern of activity preventable under the existing security requirements either at the point of check-in, at the passenger screening checkpoint or onboard the aircraft? 2. What did the intelligence community know and how was the information shared? 3. Were "box cutters" the only weapons used by the terrorist to high jack the aircraft and did employees working at the airports assist in getting the weapons onboard the aircraft? Before September 11th, there was no requirement to screen employees with authorized access to the aircraft, so there is no telling what type of weapon could have been smuggled onboard the aircraft or by whom. 4. How did the terrorist gain knowledge about the weaknesses in the aviation security system—by testing, observation, or inside information about the security system operations by individuals working within the system? There is a large population of former employees who worked at the airport with an abundant wealth of knowledge about security at airports. This would include former screeners with knowledge of screening checkpoint operations, air carrier employees with knowledge of CAPPS, EDS and PPBM operations, and service company employees with knowledge of aircraft security and terminal security. All these employee would typically have authorized access to secure areas of the airport. 5. Was there a 'pattern of activity' that the al Qaeda operatives used to test the system and identify vulnerabilities? Was there a system in place, either in the intelligence community or the aviation security regime, that could have identified an extraordinary or unusual pattern of activity?

Related Documents


More Documents from "9/11 Document Archive"