Monday, August 15, 2005

ABLE DANGER a "rogue" operation?

Was ABLE DANGER a rogue operation?

Some indepth rumblings from cyber sleuths Mac's Mind and AJ Strata on the ABLE DANGER operation: possible causes as to why the operation skidded off the map, and paperwork was stashed in places the sun don't dare to shine.

I've been following these two stellar (and obviously well-connected) bloggers on this for the past few days. Their inquiring minds definitely are delving into the bowels of stealth and Army intel, and they have reemerged with the words "whistle blower" on their lips.

Could it be the operation stumbled onto the data using a beta data mining tool? And fear of repercussions for exposing what they discovered overshadowed doing the right thing?

Not duplicating a thing here... get it from the boys' lips direct for the full impact.

And, I hasten to add, while this is all fascinating enough for the latest spy thriller in Hollywood, it still can not be said enough that this is the kind of stuff the Commission should have been able to learn in it's investigation.

And if there was indeed a program that worked, snagging Atta & company prior to 9:11, I say we should duplicate that puppy... and FAST.


2 comments:

TheBitterAmerican said...

Rogue operation? Hmm,..sounds like the mud-making machines are churning again.

MataHarley said...

Ya didn't read the blogs, TrekMed. It's a theory worthy of a Hollywood epic, yet not one to be thrown out lightly in this early hour.

FACT: The Commission casually tossed out ABLE DANGER info, burying it from view of the printed report and eyes of the world. Yet they had enough evidence and enough power to dig further. The eyes of the nation and world were upon them. They could have called God on the carpet and the world wouldn't have challenged their authority.

THEORY IN A NUTSHELL.. but read the blogs for specifics...

Perhaps the data mining software was beta, and the cell information they stumbled upon was a byproduct of an un-sanctioned test of unapproved software.

Take it a step further. Consider if that un-sanctioned beta software had funds that should not have been exposed? A good thing that happened from it's testing, but how could they use the results without incriminating the parties involved?

Therefore all traces of findings from a funded, but un-sanctioned experimental software that possibily infringed on current privacy laws would need to be purged or "redacted".

All this happened, of course, prior to 9:11 and the commission. At that time, the CYA action would concentrate on mislead funds and potential privacy right violations, and not an attack on American soil.

Think on this. WHY would the Commission deliberately try to bury info like this? A rogue operation helps explain the missing docs, and why the commission was so willing to ignore the obvious after the fact.

Nothing proved... but the pot hasn't boiled yet. Thre is more to come.

You must check these blogs out. These guys are impressive, well connected and have a great deal of deductive reasoning that isn't politically driven.