I´m going to quote some paragraphs from a new article :
"9/11 and Cyberterrorism:
Did the real "cyber 9/11" happen on 9/11?"
---------------------------
"Ptech on 9/11: The Basement of the FAA
For two years prior to 9/11, Ptech was working to identify potential problems or weaknesses in the FAA's response plans to events like a terrorist hijacking of a plane over U.S. airspace. According to their own business plan for their contract with the FAA, Ptech was given access to every process and system in the FAA dealing with their crisis response protocols. This included examining key systems and infrastructure to analyze the FAA's "network management, network security, configuration management, fault management, performance management, application administration, network management and user desk help operations." <26> In short, Ptech had free reign to examine every FAA system and process for dealing with the exact type of event that was to occur on 9/11. Even more incredible, researcher Indira Singh points out that Ptech was specifically analyzing the potential interoperability problems between the FAA, NORAD and the Pentagon in the event of an emergency over U.S. airspace.<27>
Ptech also presumably had operational information about the systems that the FAA, NORAD and others employed during crisis response exercises like Vigilant Guardian<28>, the NORAD exercise that was taking place on 9/11 and included simulations of hijacked jets being flown into New York<29> and hijacked jets being flown into government buildings.<30> This is significant because there is every indication that just such drills were confusing NORAD's response to the real hijackings that were taking place that day. As researcher Michael Ruppert points out, a rogue agent with access to a Ptech backdoor into the FAA's systems could have been deliberately inserting fake blips onto the FAA's radars on 9/11<31>. That scenario would explain the source of the phantom Flight 11 that the FAA reported to NORAD at 9:24 a.m. (well after Flight 11 had already hit the World Trade Center)<32>, a report whose source the 9/11 Commission claims they were unable to find.<33>
In short, Ptech's software was running on the critical systems responding to the attacks of 9/11 on 9/11 itself. The software was designed for the express purpose of giving its users a complete overview of all the data flowing through an organization in real time. The father of enterprise architecture himself, John Zachman, explained that with Ptech-type software installed on a sensitive server "You would know where the access points are, you’d know how to get in, you would know where the weaknesses are, you’d know how to destroy it."<34>"
http://www.911blogger.com/node/20677( Threads about Ptech and Indira Singh :
http://www.democraticunderground.com/discuss/duboard.php?az=show_mesg&forum=389&topic_id=2700537&mesg_id=2700537http://www.democraticunderground.com/discuss/duboard.php?az=show_mesg&forum=125&topic_id=63744&mesg_id=63744 )