• Quick note - the problem with Youtube videos not embedding on the forum appears to have been fixed, thanks to ZiprHead. If you do still see problems let me know.

Truthers...what is your best piece of evidence ?

Oh, good Lord...

ElMondoHummus
"all versions of CodeRed attacked IIS" - true
"There wasn't anything about that August version of the worm that was specific to "remote control of systems employing IIS"." - demonstrably false

ISA Server can be used to prevent the spread of the Code Red worm and its current (as of August 24, 2001) variants (such as Code Red and Code Red II). This has not been tested against the new Code Red.d variant. Microsoft website late August, 2001

No. This is demonstrably true, and you have failed to comprehend how this worm functioned. You also fail to comprehend what I've been saying. All varients of Code Red, as well as many other worms - Sasser, Gaobot, sadmind, Blue Code, Nimda, etc. - attacked IIS and ALL of those opened up a product running IIS to remote control via some route of inserting and executing code. That's one of the two reasons I said there was nothing about the August version of the worm that was specific to remote control of systems employing IIS. You're describing a general behavior of not just that worm, but a whole entire class of IIS attacks. Ergo, that behavior is not specific to that variant of that worm.

The second reason I said that was because the code for CodeRed.d has been studied and is very, very well understood, and the ONLY modifications to it were 1. The IP address randomizer, and 2. A change in some of nonsense characters in the code in order to evade detection. You can verify this yourself. Go look up the various descriptions online; you can start at the CERT advisory page for the infection.

And why are you grasping at straws with your pulled quotes? The paragraph you took from Microsoft is discussing how to user their security gateway product - ISA (Internet Security and Acceleration) Server - to guard against propogation of this worm, and the rest of that article is nothing more than how to identify the specifics of such traffic.

"Just tried it in the lab to make sure, and upon popping the box with
Code Red, no logs were created- no event logs, no IIS logs August 18th, 2001 "
- Steve Friedl's Unixwiz.net Tech Tips Analysis of the new "Code Red II" Variant

The fact that there is no host logging from a CodeRed.d infection doesn't mean that traffic can be manipulated without notice. That's absurd. Like I said in my previous posts, the amount of traffic alone necessary to change the content would be noticible, let alone the fact that you'd see differences in the content itself. Furthermore, host logging cannot change the fact that devices external to a compromised router - such as the ISA Server product you yourself mentioned above, as well as common intrusion detection systems - would also notice problems.

The only thing the quote you're using is saying is that there is no local host logging that results from a CodeRed infection. That's it. That's not the same as saying an infection goes unnoticed, let alone saying that traffic manipulation would never be spotted.

"The government seems to have done a good job of getting the word out and getting the patch in place,” he said.
The new worm, called variously Code Red II, CodeRed.C and Version 3, is not merely a new version of the worm.
It creates a Trojan copy of explorer.exe. When this is executed by Windows it brings up the real Explorer but disables file protection and opens a back door for the intruder.
Although it is simple to prevent the new worm from infecting a server, once it is infected the Trojan code is more difficult to get rid of than Code Red. The only effective way to disinfect a machine is to reformat the hard drive and reinstall a patched version of the operating system, Hale said. "
Son of Code Red is wilier
By William Jackson, GCN Staff
August 13, 2001

Again, the simple presence of an exploited vulnerability does not change the fact that traffic manipulation would be noticed. There's a difference between simply breaking in and actually doing something once you're in, let alone doing something to traffic flow without being noticed. Simply having control of a router does not change any of that.

Possible Kill Date Scenario:

"But this worm is a truly autonomous replicator
without ANY MEANS for external control. I believe, therefore, that
it is going to be with us for a LONG time. And, so long as SOME
(even one) IIS server has an incorrect date, the worm will be "kept
alive" through this overlapping of replication efforts. I don't know
how we're ever going to get rid of it entirely.... a fully autonomous and ram resident worm like Code Red ...DOES have access to *ALL* of the native Application-level API in the machine."
Bruce Gibson
http://www.grc.com/codered/codered.htm

(*Facepalm*)
Ok, first of all, his name is Steve Gibson, not Bruce. Second of all, when you read his and every other security professional's concerns about CodeRed, it was the fact that its prevalence sucked up bandwidth and therefore created de facto denial of service issues. That is what worries him, and that is exemplified in the sentences you quote. Read his material instead of trying to mine it for what you think are scary sounding quotes about what Code Red can do. He's strictly speaking about it's abililty to suborn a system and create denial of service attacks. And that's all he's getting at.

I still think there was MUCH more to the last version of codered.d than we are prepared to address in this forum.

You think wrong. The code has been analyzed extensively, and Code Red does nothing more than insert arbitrary code into a system, modify the Windows registry, and tries to replicate itself. The real scourge of infection are the fact that they can operate as a door through which malicious coders upload malicious code, and even if an infection goes that far, as I've said over and over, there's no way it would go unnoticed.

You've so far failed to acknowledge that your scenario falls flat at that point. Even if we grant you all the mumbo-jumbo about CodeRed that you ascribe to it - and just to be clear, we don't; you're off your rocker as to its capabilities - it still does nothing more than allow you to trojan a machine or router. You still have to upload code to modify traffic, and you still cannot modify it without being obvious.

There was no one in the Philippines who was charged with this event.

:mgduh Yes, I know. That was my whole point in what I said.

To my knowledge, it and Nimda are the only worm written where the author has not been determined. (although the current round of Conficker is under investigation without any knowledge of its author...yet). Sasser, MyDoom,BlasterB,Melissa,Kournikova,Panda the list of successful prosecutions appears at least on a cursory look - to be all but complete.
I also find it curious that Scotland Yard was unwilling to prosecute the Leaves author or divulge their identity.

And again, this means what? Is there supposed to be some grand conspiracy to protect the author of the Code Red virus? I think you're trying to argue that it has to be deliberate coverup, when in fact it's nothing more than what I said earlier: It's damn near impossible to discover the origin of a virus on the net. Your attempts at counterexamples neglect the fact that in many of those cases, it wasn't internet logging or anything computing at all that led to the discovery of the creator but rather either stupidity or some external factor. The coder for Sasser was turned in by another teenager; he wasn't found by backtracking the source of infection. Blaster.b's "author" was a stupid "n00b" script kiddie who arranged for that virus to download code from a site he owned, thus making it ridiculously easy for people to track him. The Kournikova coder turned himself in. And to the best of my knowledge, Mydoom's author has never even been identified.

There is hardly a conspiracy to cover up exploit authors. Ones who are caught are exceptions, they're not the rule. Look through the news for stories about malicious coders that have been caught, then compare that to the number of infections that exist. You'll see that we're not even talking any more than single-digit percentages of coders who get caught. Your contention that there is something more to the nondiscovery of the CodeRed author than is immediately apparent is bunk. It's nothing more than the fact that origins are incredibly difficult to track.

As to what or whom or how?? I really have no thought. We are so far past the point at which forensics could be conducted. This is all conjecture. That the last incarnation or variant seemed to be a logless invisible entity; that Nimda appeared one week later and wrecked havoc through those machines infected with CodeRed - leaving any traces of purpose of proof lost forever.

Your first contention seems to be that there were no forensics conducted on Code Red's variants. This is demonstrably untrue. We know very well how the worm operated, and we know very well its effects. Furthermore, if your original contention about manipulating news traffic is still what you're trying to argue, then you would have had zero need to conduct forensic examinations on the computer systems themselves; all you would have had to do was have the authors/reporters of the stories verify that their articles or videos were intact and properly reflected what they wrote or recorded. Your identification of the lack of host based logging of such infections falls flat in the face of 1. Content never being identified as having been manipulated (point to any CNN, MSNBC, or any other source's story that's supposedly been tampered with), and 2. The fact that host based logging is not the only monitoring that would catch any such attempts at manipulation.

My point in suggesting this as a possible article of evidence was that it has the hallmarks of a true maleficent exploit. It seemed like the first versions were a public feint for the real mischief. Perhaps as the kind author above suggests, this is all and good for a spy novel.

It may seem like possible evidence for the uninformed, but anyone who's worked in IT during those years can tell you that what you allege is not what happened. As I said, even if we grant you all the powers you seem to think Code Red has, you still cannot modify the traffic without anyone noticing. Why is it that you fail to understand that point?
 
And why do you gloss over the addition of cmd.exe and explorer.exe being shadow copied to a virtual root in the new code?? These were not features in the original. The third and forth iterations are DIFFERENT. The forth version also appears to go STEALTH, hiding itself from logs.
 
Is Spinelli a no-planer?

Will someone please ask Spinelli if he acknowledges that 19 Islamist Arabs hijacked and crashed 4 jets on 9/11?

I think he swallowed an IT dictionary and is spitting it up bit here to our annoyance.
 
No, my assumption lies in the notion that a remote controller could have real time access to those very production machines in studio - or conversely have access to say Verizon's voice communications - my thesis is not asserting that any object was necessarily altered - but rather that the listener(s) with capability to alter content or filter and or block reports was possible.
Spinelli, you ignored my first simple question as to what you think this technology may have been used for. I'm neither the smartest nor the dumbest person around, but I have no idea what you're trying to say above. You keep talking about your "thesis" but I don't see where you've stated a thesis. Please do so now. Specifically how do you think this alleged technology may have been used?

Contingent to this thesis was that wonderful rub of a story about Nabil Khan Kani - the Ismamic Steganography jingle. The story attributed here to Debka (yikes!), but also in the Washinton Post and on the AP wire, and referenced in a series of Ari Fleischer replies went something like this: that a certain Nabil Khan Kani, a Syrian cryptography specialist who it is claimed, was employed by Usama and that it was the direct work of this cryptographer that had led to assertions in the media directly after 911 that the computer security at the highest levels on 911 had been breeched.
What assertions in the media? Be specific.

They backed away from this little nugget almost immediately. It raised too many questions. The initial spin gave the Admin a reason to suggest why Bush had been kept out of Washington that day. By the end of September, Whitehouse Spokesman Ari Fleischer denied the source of the threat, and failed to acknowledge that the degree with which the protective cordon around the US government had been thwarted by whatever conspirators had actually been in on the 911 electronic warfare aspect. To maintain the lie would show that pants were down, and Usama was massively capable. A world power capable of infiltrating the electronics of the SS, The Air Force, FAA, NSA. Except all of these systems are 'air gripped' and inaccessible unless you had a mole.
Or, terrorists with flight training hijacked planes and flew them into buildings. No truther has ever shown that this was not possible, and all the evidence says this is exactly what happened. You seem to be "pulling an Avery": dreaming up an impossible conspiracy theory and then convincing yourself that it might be really be true.


Whoever was the bad guy on 911, they didn't do it over the internet.
Thanks for stating the obvious.

The entire "Angel is next" subplot that the government threw at the media. Suddenly not only was 911 achieved by men in caves, but men in caves with the passwords to isolated computer systems within government.
To what "men in caves" are you referring?

"Finally, there is this postscript to the puzzle of how someone presumed to be a terrorist was able to call in a threat against Air Force One using a secret code name for the president's plane. Well, as it turns out, that simply never happened. Sources say White House staffers apparently misunderstood comments made by their security detail."
-- CBS News reporter Jim Stewart on the Sept. 25 CBS Evening News.

Vice President Cheney : "The president was on Air Force One. We received a threat to Air Force One -- came through the Secret Service ..."

Tim Russert : "A credible threat to Air Force One. You're convinced of that."

Vice President Cheney : "I'm convinced of that. Now, you know, it may have been phoned in by a crank, but in the midst of what was going on, there was no way to know that. I think it was a credible threat, enough for the Secret Service to bring it to me."
-- NBC's Meet the Press, Sept. 16.

"Q : "[It was] yesterday reported that some of the people in the Pentagon were a little bit skeptical about your comments yesterday that the White House and Air Force One were attacked -- were targets of attack, given that the plane had come from the south. What do you --"

Fleischer : "Who are these people ?"

Q : "Well, I don't know. They weren't my sources, so -- "(Cross talk.)

Fleischer : "No. There's -- I wouldn't have said it if it wasn't true."

Q : "Can you confirm the substance of that threat that was telephoned in ... that Air Force One is next and using code words?"

Fleischer : "Yes, I can. That's correct."
-- White House "press gaggle" with Ari Fleischer, Sept.13.

"We have specific and credible information that the White House and Air Force One were also intended targets of these attacks."
-- White House spokesman Ari Fleischer, Sept. 12 briefing.

"They also made it clear they wanted to get us up quickly, and they wanted to get us to a high altitude, because there had been a specific threat made to Air Force One. ... A declaration that Air Force One was a target, and said in a way that they called it credible. ... So they wanted to get us up quickly. They also wanted to get us up with fighter air cover."
-- White House senior counselor Karl Rove, quoted by Nicholas Lemann in the Sept. 28 New Yorker.

The above series of news articles about Air Force One determined for me forever that the truth of 911 was never going to be a clear run. Trying to find something to prove such doubts seems ridiculous, given the complexity. However, I believe that if one could find the author of code red.d, one would be a step closer to uncovering what actually happened that day and why, before the blood was even dry, the government was lying about events that took place.
Can it be that you really don't know that there were hundreds of instances of confusion and miscommunication on and immediately after 9/11? Why is this a surprise to you? Does the explanation below strike you as plausible? If not, why?

"In the end, the threat to Air Force One turned out to be exaggerated. An anonymous caller had indeed threatened the plane, U.S. officials later said, but the caller had never referred to the aircraft as "Angel." Somehow a White House operator or someone in the chain of command had inserted the codeword in passing along the threat, and by the time it reached senior officials, including Cheney, it was garbled. Everyone thought the caller had used the internal call sign of "Angel." But on September 11, no one was taking any chances."

Walsh, Kenneth T., Air Force One: A History of the Presidents and Their Planes. Hyperion, 2004, p. 210
Spinelli, I hope you will avail yourself of the many resources on this forum that can help you with your critical thinking skills.
 
Last edited:
Thanks for the reply BigAl. Of course extremists are responsible. Yes to the Arab pilots, yes to the buildings falling as one would expect, yes to Bldg 7 falling due to weakness. Do I think Bush and Cheny were in on it? No. Do I worry about the reach of Christian fundamentalists and followers of Rushdooney and the integration of intelligence with these American groups? Perhaps. Do I think that the likes of an Erik Prince would be capable ready and willing to execute civilians for a cause he believed in? Perhaps. Do I think that those zealot Christian involved in such a conspiracy are capable of maintaining secrets? Absolutely. Do I believe that elements within the US military may have blackmailed the administration? Yes. Are the blackmailers the perpetrators? No. What did the blackmailers want? A vigorous challenge to Islam and a renewed nation of Israel. Why? The biblical aspect of the Jesus with a sword crowd probable suits American foreign policy in ways I cannot fathom. What has this got to do with codered? Not certain, but if I am right, the authors of codered.d were seeking to control the flow of information during the event. I do not believe that the authors were Islamist. I do believe that those maintaining secrets about 911 believe that both a holy crusade and the end times are upon them. No, I did not support Palin in the last election.
 
And why do you gloss over the addition of cmd.exe and explorer.exe being shadow copied to a virtual root in the new code?? These were not features in the original. The third and forth iterations are DIFFERENT. The forth version also appears to go STEALTH, hiding itself from logs.

The replacement of the command line and explorer exectuables were done in order to bypass priviledge restrictions and allow scripts to execute on a computer that had proper authorization levels established. The original infections allowed the injection of arbitrary code that executed with administrator priviledges, but was inherently limited by the fact that it was a one-shot deal and could only execute what the infection loaded into the buffer it was overflowing. The replacement of the CLI and explorer interface allows a malicious coder a different way to execute scripts that may not run when buffer overflow patches are applied. That's why those exe's were replaced!

And no, I didn't "gloss over it". The first Code Reds simply injected arbitrary code. CodeRedII carried that code and shot it through the compromised cmd.exe. You treat a simple tool and technique as a major difference between worms. In reality, it was simply a different approach to do the same thing, and that's to inject arbitrary code. As I said before, the significant difference between the variants had to do with how CodeRed.d propogated. Read the writeups on the damn worm!

And none of this changes any element of the central refutation of your thesis, which doesn't require computing security knowlege to understand: Even if we grant that CodeRed has this magic ability to allow an external user to do anything he/she wants - and this is a terrible exaggeration of the sort of security vulnerability such a worm imposes - you still cannot do to 'net traffic the things you claim could have been done through CodeRed without being highly obvious! You can cry to the hills all you want about its "stealth" capabilities, but that doesn't mean that traffic can be affected without anyone noticing. Such "stealth" only applies to the ability to detect the presence of the worm's payload; it does not, and indeed cannot hide effects on network traffic whatsoever.

Instead of trying to throw a word salad of IT terms at people, why don't you stop and analyze how exactly the taking over of a router or "production machines in a studio" is supposed to allow you to modify traffic? And how the hell is that supposed to remain invisible? Shielding an executable from easy notice is nowhere near being the same thing as hiding traffic content modifications.
 
... What has this got to do with codered? Not certain, but if I am right, the authors of codered.d were seeking to control the flow of information during the event.

(*Sigh*)... if this is true, why then do the demographics of infections show that Korea, of all places, has the highest number of CodeRedII and .d infections? Furthermore, how is a system-level compromise supposed to allow someone to "control the flow of information" like that? You're making unwarranted leaps based on what you think CodeRed can do. Suborning the command line in order to run whatever commands you want is not the same as manipulating content on a computer or crossing a router in realtime.
 
I hate to do this, nothing rankles me more than having my quiet delusions torn asunder...nevertheless... If I were to pick one primary event that indicated conspiracy I would definitely do a serious lookup on the code red scare that occurred during the winter/spring/summer of 2001. In particular, the fourth incarnation of that worm titled coderedII v2 or codered.d which appeared (i think) around august the 4th/and then again on the 22nd. This particular code had a wonderful trap door built into all effected computers and a kill date of Oct1, 2001.

So, if I were going to run a mission of this type, I'd want access to man-in-the-middle control over media broadcasts so that real time information could be analyzed and filtered or changed if needed.

While much of the news surrounding Code Red centered on home users, very little has been reported about the effects on the routers and media bridging devices of the major telecommunication giants.

It is my contention that code red.d was capable of and may have allowed for real time access to event reporting whereby an individual or individuals could have previewed and disseminated news as it was being sent from the source to the studio.

Affected media products employing Cisco solutions
http://www.cisco.com/warp/public/707/cisco-sa-20010720-code-red-worm.shtml

Code Red Stats
http://andrew.triumf.ca/codered/

CodeRed.d source
http://unixwiz.net/techtips/CodeRedII.html

Any thoughts on this as a concrete approach to investigation?

I think if there is any truth to the story that the BBC "lost" all their news footage from that day, then this is an interesting line of enquiry.
 
Thanks for the reply Gravy - all I've ever wanted from the events surrounding 911 was something concrete to examine. The changes that were made to the code red virus and the systems that it effected - could have allowed a MiM type of strategy to be employed during and after the events of 911. When I say that forensic analysis has not been done, I mean specifically on the codered.d version - the one that went stealth. There was tons of analysis to the original versions, and the guard, as I suggest was let down. It is my contention that a person or persons was able to sit in a controlled environment on the day of 911 and see exactly which information was flowing to the broadcasters. This is not in anyway to suggest something as contrived as images of fake planes crashing being inserted, on the contrary, I believe it was probably more subtle, calls being dropped, obfuscation of signals. But I know nothing of this, BigAL is right about swallowing the book, but I mean no annoyance. I've been carrying these thoughts around for five years, unable to speak them or share my beliefs, however misguided they may be. I've never seriously ascribed to any of the CT theories seriously, although they have been fodder for conversation. But to find a concrete example, a pointer to events before they occurred - that led me to the whole code red scare and how LITTLE the final iterations of that code were discussed understood or examined. That the major media (Cox Communications, Verizon) were employing exactly those machines most afected by code red seemed indicative. It was more than a BotNet - it was more than an attempt to knock the whitehouse.gov site offline (as most people still falsely believe when one says "remember code red?"). It was too pretty, too agile and too well executed to be simply a worm that self replicated - it opened doors into communications systems and left them open for remote control. What does this mean? You would have to examine human controllers from the day of and determine what sorts of anomalies they saw, heard or recorded. Nimda (which occurred to the minute of 911 seven days later) - wiped so much of what could be there for evidence to support their claims, so even if one were able to ascertain from memory the errors they witnessed - the physical evidence would be nearly impossible to find. So I say, find the author and then see what gives.
 
if this is true, why then do the demographics of infections show that Korea, of all places, has the highest number of CodeRedII and .d infections?

Two things come to mind - the code was ticking into servers running MS Personal Web Server (the baby of Internet Information Server), and the code was expected to target computers with chinese keyboards. Perhaps there were more proportionally of these in Korea?

how is a system-level compromise supposed to allow someone to "control the flow of information" like that?

Being able to access explorer by contacting the host website is a far cry from being able to run cli. My understanding of the actual events surrounding the codered.d would be akin to sitting at your PC desktop remotely.

"Korean virus watchers say the worm has shown up in an even more deadly form, but experts in the United States think it's merely a repeat of what came before."
http://news.cnet.com/2009-1001-270945.html
 
Last edited:
... Do I believe that elements within the US military may have blackmailed the administration? Yes. Are the blackmailers the perpetrators? No.

... I do believe that those maintaining secrets about 911 believe that both a holy crusade and the end times are upon them. No, I did not support Palin in the last election.
These are better delusions than Dr Thermite Jones can make up.

I like the highly committed to your delusion "may have" stuff. When will the secrets of 911 be exposed; oops, on 911! 19 terrorists crashed 4 planes. Secret was exposed for those who pay attention.
 
I think if there is any truth to the story that the BBC "lost" all their news footage from that day, then this is an interesting line of enquiry.
You're apparently unaware of the foofaraw made by truthers over the video of the BBC broadcast from New York 20 minutes before the collapse of WTC 7.

BBC's 9/11 video coverage can be found here. If the BBC has lost it, they should ask for it back.
 
Last edited:
I think if there is any truth to the story that the BBC "lost" all their news footage from that day, then this is an interesting line of enquiry.

Why? the same material (minus the verbal gaff) was seen by many thousands of New Yorkers and broadcast on local TV stations and it is still in the archves.
 
Thanks for the reply Gravy - all I've ever wanted from the events surrounding 911 was something concrete to examine.
Um.

The 9/11 Commission Report and hearings, Congressional Joint Inquiry Report, 9/11 Journalism

The 9/11 Terrorists, Confessions, al Qaeda & Jihadist History & Ideology

NIST & FEMA reports and critiques, 9/11 Engineering Studies, Alternate Hypotheses, WTC 7 Reports, Computer Simulations, more

Fire Safety Engineering and the Performance of Structural Steel in Fires, Building Code Changes

911myths.com
http://wtc7lies.googlepages.com/
Popular Mechanics "Debunking the Myths" magazine cover story March, 2005
New Popular Mechanics 9/11 Article: 9/11 Myths FAQs
Debunking 9/11 Conspiracy Theories and Controlled Demolition
Screw Loose Change Blog (Excellent: covers all 9/11 conspiracy theories)

Ref's 9/11 Guide, with Andrew Burfield/s critique of David Ray Griffin's 115 points
Debunk 9/11 Myths

9/11 Mysteries Guide
Internet Detectives: Loose Change
Jay's Blog
Good Science and 9/11 Demolition Theories
Nutty 9/11 Physics

The 9/11 Conspiracies: Fact or Fiction[SIZE=-1] (History Channel, 2007)

9/11: The Conspiracy Files (BBC, 2007)

Penn & Teller on 9/11 Conspiracies.

[/SIZE]33 short videos on Youtube that debunk various 9/11 conspiracy myths.

Clear, concise refutation of David Chandler's WTC 7 "freefall" claims, by "alienentity."

Pentagon Flight 77 Case Study



Tragedy and Heroism: September 11, 2001 at the Pentagon

Firefight: Inside the Battle to Save the Pentagon on 9/11 (2008)

Touching History: The Untold Story of the Drama That Unfolded in the Skies Over America on 9/11

Among the Heroes (Flight 93)


The changes that were made to the code red virus and the systems that it effected - could have allowed a MiM type of strategy to be employed during and after the events of 911. When I say that forensic analysis has not been done, I mean specifically on the codered.d version - the one that went stealth. There was tons of analysis to the original versions, and the guard, as I suggest was let down. It is my contention that a person or persons was able to sit in a controlled environment on the day of 911 and see exactly which information was flowing to the broadcasters. This is not in anyway to suggest something as contrived as images of fake planes crashing being inserted, on the contrary, I believe it was probably more subtle, calls being dropped, obfuscation of signals.
So, what do you believe the broadcasters got wrong that has not been corrected since? Anything?

But I know nothing of this, BigAL is right about swallowing the book, but I mean no annoyance.
It is annoying to have someone posting at length in a thread about "best evidence" who admits that he knows nothing about the subject and has no evidence. You are clearly not grounded in the methods of critical thinking. Before getting to the links I posted above, I recommend that you start here: The Basics: Critical Thinking, Informal Logic, Fallacies, The Scientific Method

I've been carrying these thoughts around for five years, unable to speak them or share my beliefs, however misguided they may be.
What prevented you from articulating them?

I've never seriously ascribed to any of the CT theories seriously, although they have been fodder for conversation. But to find a concrete example, a pointer to events before they occurred - that led me to the whole code red scare and how LITTLE the final iterations of that code were discussed understood or examined. That the major media (Cox Communications, Verizon) were employing exactly those machines most afected by code red seemed indicative. It was more than a BotNet - it was more than an attempt to knock the whitehouse.gov site offline (as most people still falsely believe when one says "remember code red?"). It was too pretty, too agile and too well executed to be simply a worm that self replicated - it opened doors into communications systems and left them open for remote control.
You're surprised that a worm targeted computers at major media companies? Also, allow me to introduce you to the very important principle that correlation does not imply causation; i.e. because something you think is suspicious happened on or near 9/11, doesn't mean it has anything to do with causing, aiding, or profiting from the attacks.

What does this mean? You would have to examine human controllers from the day of and determine what sorts of anomalies they saw, heard or recorded.
Since what you suspect (I still don't know what that is) was supposedly so subtle, what could such an examination possibly tell you?

Nimda (which occurred to the minute of 911 seven days later)
Huh? To what minute?

- wiped so much of what could be there for evidence to support their claims, so even if one were able to ascertain from memory the errors they witnessed - the physical evidence would be nearly impossible to find. So I say, find the author and then see what gives.
Finding the author of a harmful computer worm is a laudable goal. Creating a 9/11 fantasy out of sheer nothing is not.

Also, when responding to a post, please click on the "quote" button at the bottom of that post. You can separate the text you want to respond to by using quote and endquote tags before and after each section, as I did above.
 
Last edited:
Gravy

Er.

You have that reading list ready for recalcitrant students I suspect? So do you wish to take me on, or the thesis? Which ad hominem adjunct to your counter shall I select?

The reading list: dogmatic assertions and over the top reiterations of the same meaningless tripe shoveled since the first moments of the attack. Not one of those examples could I put my finger to and recommend. But I commend you on your slap, if not your faithful belief in historicity.

The broadcasters got nothing wrong. Events played as they played and were reported as such given the best means capable under the incredible duress of that day. I feel myself channeling Donald Rumsfeld for some odd reason "what we know, and what we don't know...". What I would like to examine, I cannot. What I would like to prove I cannot. The burden of proof has met the totality of the logical fallacy. Unless I was granted access to original documents, original operators and original logs.

I'll reserve comment on my capableness in times of crisis due to a hindrance or lack of critical thinking. This is the place for ludicrous ideas, is it not, and yet you protest? Me thinks too much. If perhaps you would prefer my thesis in Cartesian Methodology and the coinage of Trinitarianism and the Christian Apologetics of Immanuel Kant, I can provide that, however, perhaps it might suffice it to say that such an impudent attack upon a stranger is without merit. I may not be noted as a strong critical thinker, but I am known to be slightly more than the hack you suggest. Your own posts may I point out, are filled with many such trifling non-sequitur and dogmatic assertions. What I perceive is cognitive disconance in your efforts - and what I read through your replies is an utter hopelessness to strangers and those whose ideas reflect poorly on your own. You crowd out newcomers and revel in the celebration of life with those of your group who most reflect your peerage. It is hypocrysy old man. You claim to have spent a life time doing what I have been dribbling on about - yet you offer no guidance - no links to information that might expand the understanding - rather - you chastise humility and condemn open inquiry. Shame on you.

To annoy is what the truthers do. I make no claim as a truther. And I apologized for seeming so. Which you rebuke.

I believe that there are dangerous elements within our society who are deeply ingrained militarily and politically, and they seek not so much the foundation of a new ideal - but the usurpation of truth altogether. They are rich, they are profoundly powerful and they will stop at nothing to turn you and I into slaves of theocracy.

What prevented me from articulating my codered ideas? The sheer ridiculous sounding nature of the words as they fell from my lips. The sheer volume of speaking what I believe to be truth required in a room full of agitated opposition.

Correlation does not imply causation is a really great contemporary argument of the creationist camp. Are you a CLOSETED CREATIONIST? Yes, at best mine is a spurious contention. As I said, this is all conjecture. However, what I seek is some path forward on this - an avenue to explore. The idea is a bold one and not without merit, despite your protestations, it seems persistently plausible that before 911 someone with fore knowledge used their abilities to attain an insight into event control.

To remove the fantasy I would first seek to take up the lead where the team that abandoned the search ended theirs. I would request the paperwork and notes of Bob Gerber and his team. I would ascertain to understand why it was that the prosecution of the leaves author was stopped and why his name was not released. I would grind through recreations of the code red.d worm on infected systems that modeled the apparent computer infrastructure of the suspected communications clients. I would seek other examples of such use of worms that are contingent and supportive. Do you concur? Would this not make for a decent study?
 
Gravy

Er.

You have that reading list ready for recalcitrant students I suspect? So do you wish to take me on, or the thesis? Which ad hominem adjunct to your counter shall I select?

The reading list: dogmatic assertions and over the top reiterations of the same meaningless tripe shoveled since the first moments of the attack. Not one of those examples could I put my finger to and recommend. But I commend you on your slap, if not your faithful belief in historicity.

The broadcasters got nothing wrong. Events played as they played and were reported as such given the best means capable under the incredible duress of that day. I feel myself channeling Donald Rumsfeld for some odd reason "what we know, and what we don't know...". What I would like to examine, I cannot. What I would like to prove I cannot. The burden of proof has met the totality of the logical fallacy. Unless I was granted access to original documents, original operators and original logs.

I'll reserve comment on my capableness in times of crisis due to a hindrance or lack of critical thinking. This is the place for ludicrous ideas, is it not, and yet you protest? Me thinks too much. If perhaps you would prefer my thesis in Cartesian Methodology and the coinage of Trinitarianism and the Christian Apologetics of Immanuel Kant, I can provide that, however, perhaps it might suffice it to say that such an impudent attack upon a stranger is without merit. I may not be noted as a strong critical thinker, but I am known to be slightly more than the hack you suggest. Your own posts may I point out, are filled with many such trifling non-sequitur and dogmatic assertions. What I perceive is cognitive disconance in your efforts - and what I read through your replies is an utter hopelessness to strangers and those whose ideas reflect poorly on your own. You crowd out newcomers and revel in the celebration of life with those of your group who most reflect your peerage. It is hypocrysy old man. You claim to have spent a life time doing what I have been dribbling on about - yet you offer no guidance - no links to information that might expand the understanding - rather - you chastise humility and condemn open inquiry. Shame on you.

To annoy is what the truthers do. I make no claim as a truther. And I apologized for seeming so. Which you rebuke.

I believe that there are dangerous elements within our society who are deeply ingrained militarily and politically, and they seek not so much the foundation of a new ideal - but the usurpation of truth altogether. They are rich, they are profoundly powerful and they will stop at nothing to turn you and I into slaves of theocracy.

What prevented me from articulating my codered ideas? The sheer ridiculous sounding nature of the words as they fell from my lips. The sheer volume of speaking what I believe to be truth required in a room full of agitated opposition.

Correlation does not imply causation is a really great contemporary argument of the creationist camp. Are you a CLOSETED CREATIONIST? Yes, at best mine is a spurious contention. As I said, this is all conjecture. However, what I seek is some path forward on this - an avenue to explore. The idea is a bold one and not without merit, despite your protestations, it seems persistently plausible that before 911 someone with fore knowledge used their abilities to attain an insight into event control.

To remove the fantasy I would first seek to take up the lead where the team that abandoned the search ended theirs. I would request the paperwork and notes of Bob Gerber and his team. I would ascertain to understand why it was that the prosecution of the leaves author was stopped and why his name was not released. I would grind through recreations of the code red.d worm on infected systems that modeled the apparent computer infrastructure of the suspected communications clients. I would seek other examples of such use of worms that are contingent and supportive. Do you concur? Would this not make for a decent study?


And, lo, there was a great wind.

You know, you could have just said, I am a "truther" and consequently I wouldn't dream of educating myself about the events of 9/11/01.
 
Why? the same material (minus the verbal gaff) was seen by many thousands of New Yorkers and broadcast on local TV stations and it is still in the archves.


im sure thousands saw the first crash
but the rest was witnessed by millions (live not on TV)
 
The reading list: dogmatic assertions and over the top reiterations of the same meaningless tripe shoveled since the first moments of the attack. Not one of those examples could I put my finger to and recommend. But I commend you on your slap, if not your faithful belief in historicity.

What an eloquent way of cavalierly hand waving away things that are inconvenient to your world view. I commend you.
 
To be ruled by ideas for which you have no evidence is generally a sign that something is seriously wrong with your mind. –Sam Harris

You have that reading list ready for recalcitrant students I suspect?
You suspect wrong. The links are for everyone who is interested in 9/11, but I put the list together for you. You'll find those links and more scattered throughout the home page of my website, which is linked in my signature.

So do you wish to take me on, or the thesis? Which ad hominem adjunct to your counter shall I select?
Your "thesis" is that on 9/11 a computer virus may have caused some unknown persons to take some unknown actions, resulting in some unknown effects. Below, you say, "Yes, at best mine is a spurious contention." Spurious means false. This being a thread about "best evidence," let us know when you've firmed that up a bit. In the meantime, The Basics: Critical Thinking, Informal Logic, Fallacies, The Scientific Method

The reading list: dogmatic assertions and over the top reiterations of the same meaningless tripe shoveled since the first moments of the attack. Not one of those examples could I put my finger to and recommend. But I commend you on your slap, if not your faithful belief in historicity.
There's no slap. You said you were looking for information about the events of 9/11. I am aware of nothing you've produced that shows any of the information I provided to be wrong. If you've got such information, then please present it now. That will be your new "best evidence."

The broadcasters got nothing wrong. Events played as they played and were reported as such given the best means capable under the incredible duress of that day. I feel myself channeling Donald Rumsfeld for some odd reason "what we know, and what we don't know...". What I would like to examine, I cannot. What I would like to prove I cannot. The burden of proof has met the totality of the logical fallacy. Unless I was granted access to original documents, original operators and original logs.
Since you can't even articulate what you think might plausibly have been done with the aid of this virus, you have nothing to investigate.

I'll reserve comment on my capableness in times of crisis due to a hindrance or lack of critical thinking. This is the place for ludicrous ideas, is it not, and yet you protest? Me thinks too much.
I protested? Where? It is you who is protesting. When your ludicrous ideas are met with sensible responses, you will do well to pay attention rather than to whine.

If perhaps you would prefer my thesis in Cartesian Methodology and the coinage of Trinitarianism and the Christian Apologetics of Immanuel Kant, I can provide that, however, perhaps it might suffice it to say that such an impudent attack upon a stranger is without merit. I may not be noted as a strong critical thinker, but I am known to be slightly more than the hack you suggest. Your own posts may I point out, are filled with many such trifling non-sequitur and dogmatic assertions.
I can only judge by your posts here, which are extremely irrational.

What I perceive is cognitive disconance in your efforts
Do you mean "cognitive dissonance?" Like this?

"Yes, at best mine is a spurious contention."
"The idea is a bold one and not without merit, despite your protestations, it seems persistently plausible..."

And this?

"What prevented me from articulating my codered ideas? The sheer ridiculous sounding nature of the words as they fell from my lips."

- and what I read through your replies is an utter hopelessness to strangers and those whose ideas reflect poorly on your own. You crowd out newcomers and revel in the celebration of life with those of your group who most reflect your peerage. It is hypocrysy old man.
Dude, I just asked you to clarify your "thesis." You couldn't, and you admit that your "best evidence" is no evidence at all. If you resent that being pointed out to you, I suggest it's time to grow a thicker skin.

You claim to have spent a life time doing what I have been dribbling on about...
Um, wtf are you talking about?

- yet you offer no guidance - no links to information that might expand the understanding - rather - you chastise humility and condemn open inquiry. Shame on you.
Yep, I offered no "links to information that might expand the understanding." And you are attempting to not appear like a total kook, is that right?

To annoy is what the truthers do. I make no claim as a truther. And I apologized for seeming so. Which you rebuke.

I believe that there are dangerous elements within our society who are deeply ingrained militarily and politically, and they seek not so much the foundation of a new ideal - but the usurpation of truth altogether. They are rich, they are profoundly powerful and they will stop at nothing to turn you and I into slaves of theocracy.

What prevented me from articulating my codered ideas? The sheer ridiculous sounding nature of the words as they fell from my lips. The sheer volume of speaking what I believe to be truth required in a room full of agitated opposition.

Correlation does not imply causation is a really great contemporary argument of the creationist camp. Are you a CLOSETED CREATIONIST? Yes, at best mine is a spurious contention. As I said, this is all conjecture. However, what I seek is some path forward on this - an avenue to explore.
Then I suggest you avoid spurious contentions.

The idea is a bold one and not without merit, despite your protestations, it seems persistently plausible that before 911 someone with fore knowledge used their abilities to attain an insight into event control.
You've been repeatedly asked to explain why that's plausible, and you've been wholly unable to do so. Why does this not trouble you?

To remove the fantasy I would first seek to take up the lead where the team that abandoned the search ended theirs.
That's continuing your fantasy about 9/11, not removing it.

I would request the paperwork and notes of Bob Gerber and his team. I would ascertain to understand why it was that the prosecution of the leaves author was stopped and why his name was not released. I would grind through recreations of the code red.d worm on infected systems that modeled the apparent computer infrastructure of the suspected communications clients. I would seek other examples of such use of worms that are contingent and supportive. Do you concur? Would this not make for a decent study?
Perhaps, for the psychologist who was observing you.
 
Last edited:

Back
Top Bottom