Tuesday, March 29, 2011

20 spy cameras

If you are interested in spy business ;), here are a few cameras to get you started.

The Necktie Spy Camera:

The Necktie Spy CameraThis Necktie Spy Camera features a tiny pinhole spy camera hidden in the pattern, which can record videos at a 352 x 288 resolution at 12 frames per second. It can be directly plugged into a USB port for transferring files to your PC, it records in AVI format, has 2GB of built in memory, and comes with a remote control. The Necktie Spy Camera is available for $66 from Brando.

Shoe Camera:

Shoe CameraA normal shoe with a hidden 2.4ghz wireless camera inside it.

Button Spy Camera:

Button Spy CameraThe Button camera has a 3.7mm pinhole lens, the portable recorder has a 2.4 inch TFT lCD screen, and 2GB of internal memory.

Zippo Style Digital Camera:

Zippo Style Digital CameraIt uses micro SD card from 128 MB to 8 GB and can playback video on cell phone or PC.

Electrical Outlet Camera:

Electrical Outlet CameraThe Electrical Outlet Hidden Camera is a non-functional electrical outlet with a hidden compartment. Inside it has a wireless 2.4Ghz color spy camera that can transmit audio and video to the included wireless receiver.

Shaving Cream Can Camera:

Shaving Cream Can CameraIt has a hidden spy camera in a can of shaving cream. The unit comes with a 2.4Ghz wireless receiver that can plug into any RCA video input, i.e., TV or VCR or personal Digital Video Recorder. And it can transmit the live video signals up to 50 feet away.

A Fruit Juice Box Camera:

A Fruit Juice Box CameraThis one looks really cool.

Hidden Color Spy Sunglasses Camera:

Hidden Color Spy Sunglasses CameraIt has a 92° field-of-view, the hidden hardwired color CCD camera lets you record exactly what you are looking at.

Locket Camera:

Locket CameraIt's a Kodak 1881 digital camera, designed by Lindsey Pickett to look like an old locket. If you open it up you'll see two LCD screens that display your photos.

Spy Camcorder Pen:

Spy Camcorder PenIt's a fourth version pen camera, with a built in 4 GB memory, high resolution camcorder plus 2048 X 1536 still picture capability, PC & mac compatible and it costs $199.00.

Spy Camera Video Watch:

Spy Camera Video WatchA timepiece that will allow you to record interviews, meetings; the video camcorder lets you record AVI format files that can later be transferred to the computer for viewing and archiving purposes.

Belt Buckle Camera:

Belt Buckle CameraIt's a 'Buckle DVR' with built in micro camera and sound.

Keychain Digital Camera:

Keychain Digital CameraThis keychain digital camera fits on your keys so you'll always have it with you. It can take photos and video without anyone knowing what you're doing.

ID Card with Integrated Camera:

ID Card with Integrated CameraThe AME-105 ID Card spy camera comes with a small 1.3MP video camera capable of recording video on AVI H.263 at 352×288/15fps and 4GB of internal memory. Recorded video can be transferred to your PC or laptop via USB.

Brooch Camera:

Brooch CameraJust put on the brooch, plug it into either pocket DVR 500 or DVR 806 and you are ready to record video.

Baseball Cap Spy Camera-Color:

Baseball Cap Spy Camera-ColorIt is a real baseball hat that has a special lining to hold the dvr and the pinhole ccd video camera.

Lipstick Camera:

Lipstick CameraIt's a 8GB USB2.0 color video and voice camcorder that does recording with a pixel drive cam camera pinhole camera and DVR that has up to 20 hours of video recording.

Tie Clip Camera:

Tie Clip CameraInside of the tie clip is a tiny 3.7 mm pinhole hidden camera, capable of recording video in MPEG4, and contains an audio pickup as well. 'Your video and sound can be played back on the receiver unit with the 2.4-inch TFT LCD display, which records all of the received video on its 2GB of storage space.'

Chewing Gum Camera:

Chewing Gum CameraThe chewing gum sized tiny spy camera is designed to fit perfectly inside a gum wrapper. It has a 3.6mm wide angle, 1GB Micro SD card in 3gp format that can record 15 frames per second with 33 hours of recording storage.

Hidden Camera In A Computer Speaker:

Hidden Camera In A Computer SpeakerThere is a hidden camera in this fully functional 2-piece speaker system and it works with PC's, MP3player, CD and DVD players.

EVOLUTIONARY SNAKE WITH FOOT DISCOVERED

A snake with a single clawed foot has been discovered in China, according to reports.
Dean Qiongxiu, 66, said she discovered the reptile clinging to the wall of her bedroom with its talons in the middle of the night.


"I woke up and heard a strange scratching sound. I turned on the light and saw this monster working its way along the wall using his claw," said Mrs Duan of Suining, southwest China.
Mrs Duan said she was so scared she grabbed a shoe and beat the snake to death before preserving its body in a bottle of alcohol.


The snake – 16 inches long and the thickness of a little finger – is now being studied at the Life Sciences Department at China's West Normal University in Nanchang.

Snake expert Long Shuai said: "It is truly shocking but we won't know the cause until we've conducted an autopsy."

A more common mutation among snakes is the growth of a second head, which occurs in a similar way to the formation of Siamese twins in humans.

\
Such animals are often caught and preserved as lucky tokens but have very little chance of surviving in the wild anyway, especially as the heads have a tendency to attack each other.

IMPOSSIBLE OBJECTS IN REAL LIFE

Optical Illusions, Puzzles or Magic Tricks? Can’t tell for sure, but you better check it yourself! Image below represents just one of the puzzles you can find inside this magic post! Don’t ask me! You’ll puzzle yourself for sure… After you’ve jumped inside this article and solved more of these real life impossible creations, check ” Impossible Objects in Real Life  and “Cube Toy”.
Both the nail and the wood are whole, yet neither of the two has been cut. Can you guess how it was consturcted?
Impossible Objects in Real Life no.3
All of the holes inside this transaprent cube (except the center one) are curved. They are drilled holes, that I know for sure! How is this possible?
Impossible Objects in Real Life no.3
I have no idea how these two constructions could be done. Other than gluing the ring/arrow together, could there be some other solution?
Impossible Objects in Real Life no.3
Impossible Objects in Real Life no.3
The ball-bearing is quite a bit larger in diameter than any of the six openings in the cage. There are no breaks in the cage where is could have been separated. First thing that bumoped my mind is soaking the cube in water, making it larger, then inserting the little steel ball, and after the cube shrinks back – voila! What do you think?
Impossible Objects in Real Life no.3
Impossible Objects in Real Life no.3
There is no way this baseball could have been forced into the jar! How did they manage to do this?!
Impossible Objects in Real Life no.3
Some other “Strange” creations:
Impossible Objects in Real Life no.3
Impossible Objects in Real Life no.3

The World’s Most Corrupt Nations 2009.

Corruption in nearly half the world’s nations is not getting much better and, indeed, in many countries is intensifying–affecting virtually every aspect of life among peoples on every continent.
While a year ago, some 72 out of 158 nations surveyed by the international watchdog group Transparency International were classified as “corrupt,” now 74 of 163 countries fall into the same category. A few, most notably India, managed to bootstrap themselves (just barely) out of the truly corrupt group, while others, particularly Iran, dug themselves more firmly into that camp.
Haiti
corrupt Haiti1 The World’s Most Corrupt Nations 2009.
The police continue to be a central factor in corruption in Haiti, though there is corruption in virtually every governmental body. Since the police are also the officials closest to every individual on a daily basis, it is their corruption that changes the nature of daily life in Haiti, permeating all society and the way business is done.
Myanmar
Corruption is perceived as widespread in this vicious dictatorship run with an iron hand by a strong-willed clique of military leaders, who persist in repression of civil society at every level. Illicit facilitation payments and informal fees are required to access even the most basic government services.
Iraq
Huge quantities of funds– especially American military and reconstruction aid funds–swirling through this nation, where many civil structures have largely broken down, is a recipe for corruption at all levels. Beyond kidnappings and ransom payments, TI officials say their survey was conducted in the first half of 2006 when funds being handled by the Coalition Provisional Authority were largely exhausted and no longer being disbursed. So the Iraqi government, where corruption is said to be rampant, was in charge of its own funds. International businessmen from a range of countries converging on Baghdad found finance, export credits, contracts and a host of more mundane functions of government all subject to illicit payments.
Guinea
Guinea has been in a political crisis state for at least three years. Though the current, corrupt president has been in power for 20 years, strong pressure has been building from the public for a change of regime. A public strike that lasted one month finally ended a month ago. There was outright civil strife, obliging the president to appoint a new prime minister. The most controversial, and corrupt, deals surround the mining sector, particularly aluminum. Among foreign businessmen, the general view, according to the TI survey, was that to do business in Guinea you needed “to pay off the guy at the top.”
Sudan
The key event was the switch from a Canadian company that dominated oil drilling in Sudan, the No. 3 oil producer in Africa, to a Chinese company that took over the contract after the Canadians found corruption and an outrageous human rights record was too rife to be able to continue functioning. China is now responsible for 90% of all oil production in Sudan, which also controls oil flow down a large pipeline through southern Sudan to the sea. Chinese officials have declined any comment on the human rights situation, and TI officials say they are “not too worried about having to pay off the Khartoum government.”
Democratic Republic Congo/Kinshasa
Copper in Katanga, and in the rest of the country, gold, uranium and especially coltan, a rare mineral that’s in every cell phone chip, still drive the corruption that remains rampant in this African nation. A presidential election did little to stop the corruption or the resulting violence that erupted again last month in downtown Kinshasha, the nation’s capital. The president is the principal recipient of routine payments by the mining companies who apparently are prepared to play the very lucrative payoff game that remains as endemic now as it was back during the regime of one of Africa’s historically most corrupt leaders, Mobutu Sese-Seko.
Chad
Chad has dropped from No. 1 to No. 7 this year as international aid agencies, particularly the World Bank, have sought to come to grips with one of the world’s most piggish uses of philanthropic funds. Proceeds of a Chad- Cameroon oil pipeline, funded in part by the World Bank and operated by an Exxon Mobil-led consortium, were supposed to have been used to help feed the desperately poor people of both nations. Instead, at least $30 million was diverted to buy arms to keep the government of President Idriss Deby in power. The World Bank, whose president, Paul Wolfowitz, was deeply embarrassed by the fiasco, halted funding more than a year ago, but reached an accord with Chad last July. According to TI officials, the jury’s still out on how effectively it will be implemented.
Bangladesh
There continues to be a general lack of engagement between the government and civil society as repression, corruption throughout government ranks and especially in the judiciary and political circles persists, often spilling over into the private sector. In March, the new military-backed government jailed at least 40 prominent business and
government leaders from two of the leading political parties in what was described as an ongoing probe of corruption, but TI officials are little impressed. Still, after five straight years at the top of the list, Bangladesh has signed the United Nations convention against corruption and has now dropped to No. 8.
Uzbekistan
The most corrupt of the five former Soviet Republics on our list, Uzbekistan is sinking ever deeper into corruption and unrest–in constant turmoil and strife under what the U.S. State Department describes as the authoritarian rule of President Islam Karimov, a communist apparatchik holdover of the old regime, which, while violently suppressing opposition, encourages corruption that permeates society, including the executive branch. Bribery will win you everything from admission to leading educational institutions to a favorable outcome of traffic cases and civil lawsuits.
Equatorial Guinea
One of the world’s smallest oil powers, it is also among the most corrupt. Still, possibly under pressure from the major oil companies that operate there, particularly Exxon Mobil, things have improved a trifle, though the corrupt President Teodoro Obiang Nguema remains in power. Now, though, it’s becoming possible to operate a business on a reasonable basis, provided one accepts that 30% of all funds, including oil profits go straight into the pocket of Nguema. Still, the system of corruption now is more rational and orderly than the previous system that amounted to near-total anarchy.

EMBRIO – One-Wheeled Motorcycle

The EMBRIO Advanced Concept is a one-wheeled recreational and commuting vehicle for the year 2025, designed by the Canadian company Bombardier Recreational Products. Although the riding position is similar to that of a motorcycle, the vehicle uses sensors and gyroscopes to balance up to two passengers on a large single wheel whilst driving. Specifications and pictures of this weird motorcycle are showed below:
one wheeled motorcycle pictures
TECHNICAL SPECIFICATIONS
MODEL NAME: EMBRIO Advanced Concept
DEVELOPED BY:Bombardier Recreational Products
STATUS: Concept
YEAR: 2003
DRIVE SYSTEM: Fuel cell electric
FUEL: Hydrogen
LENGTH: 1,240 mm (48.8 in)
WIDTH: 700 mm (27.5 in)
HEIGHT: 1,200 mm (47.5 in)
WEIGHT: 164 kg (360 lbs)
SEATING CAPACITY: 2
one wheeled motorcycle pictures
one wheeled motorcycle pictures
Although the vehicle will also remain stable when motionless, with two small front wheels deployed at speeds below 20 kilometres per hour (12.5 mph). To move forward, the rider activates a trigger on the left handlebar. At a speed of 20 kilometres per hour (12.5 mph) the front wheels or “landing gear” retracts so the rider is balancing on the large single wheel. To turn the rider leans to the left or right. The brake is activated by a trigger on the right handlebar. Fuel cells running on hydrogen provide electricity for the electric motor which drives the single wheel.

11 High-Tech and Creative Pens.........

1. Pendragon: The most crazy pen
Pendragon is the most crazy pen design I’ve ever seen. It should be still a concept and I really doubt how much effort to make it come ture… and I am not sure do we really need that kind of multifunctonal pen….
The pen has four parts. It’s got the Nib, the Central Unit, the End Part, and the Expandable Units.
The Nib is the writing part. it can be changed to a ballpoint, pen, fountian-pen, mechanical pencil, or digital pen. The Central Unit has, get this, the LED light – important!, a music player, charger input, memory card, and battery. The End Part has a bluetooth connection to whatever headphones you choose to use in collaboration with the mp3s youve put in the Central Unit. Expandable Units! Camera, microphone, laser pointer, chop, corrector, usb connetion, WLAN reciever to connect to computer, internet.
Pendragon: The most crazy pen
2. Ruler Pen 
“Beg Borrow or Steal”, that’s what I used to get to hear from my class teacher when I used to forget to bring my pencil box to class. Like most diligent girls in school I used to carry a sharpner, eraser, pens, pencils, and ruler. God forbid if you forgot a ruler and had to draw some lines! Like we tend to carry extra pencils or pens, but never rulers! Well this Ruler Pen is a helpful answer. Too bad no one thought of this during my school days. Also there is no cure for being forgetful!
Ruler Pen
3. Swiss Pens 
It is cool and beatuiful. Pens with the Swiss Army knife. They comes in pink, green, yellow, violet, gray, orange, red, blue (shown), or black (not shown) colors. The Swiss Pen original Victorinox tools: knife, scissors, file, screwdriver, and power light. It also contains a Fisher-pressurized ink cartridge enabling ability to write upside-down. It made of surgical stainless steel with plastic.
Swiss Pens
4. Maze Pen
This Maze Pen is for those boring office meeting. Bring the pen to your next meeting or conference call and pretend to be intently listening while playing the balls from the top of the pen through the maze to the bottom and back again. It will be just looks like you’re fidgeting with your pen.
Maze Pen
5. Puzzle Pen
The Puzzle Pen is both a pen and a puzzle. This pen offers a fun challenge to solve and is a refreshing break for the mind. The sections rotate like a Rubik’s Cube and the tiles slide. Mix up the colors and then group them back together again. The Puzzle Pen will have you working for hours, but not on actual work.
Puzzle Pen
6. The KZ Xtreme Defense Pen – Pen, Stylus and Killer 
Some pen can wirte and use as a PDA stylus, but the KZ Xtreme Defense Pen can write, serve stylus duty, and kill a man. Kill a man? Yes! The KZ Xtreme Defense Pen is designed to serve as a defense tool in times of need, features with a CNC Machined, Type II Class 3 Hard Anodized, 6061 Aircraft Grade Aluminum body and a threaded cap and slip free, knurled center that gives the pen a very tough and reliable construction, ergonomic design provides superior grip and comfortable texturing.
The KZ Xtreme Defense Pen - Pen, Stylus and Killer
7.color picker pen by jinsu park 
korean designer jinsu park designed a concept pen that adopts the eyedropper tool of photoshop
for real life. the color picker pen enables colors in the environment to be scanned and instantly used for drawing. the sensor detects the color and matches it to the color display. then the RGB cartridge located within the pen mixes the inks together to create the color that has been scanned.
color picker pen by jinsu park
8. PenAgain – Ergonomic Pen
Pen might have multipul functions, but the first important function is writing…The PenAgain’s primary focus is comfort. The human hand dictates the design. The natural weight of your hand provides sufficient pressure to apply ink to the paper. This eliminates the need to grip the pen allowing the thumb and forefinger to serve merely as guides. The PenAgain may help alleviate the symptons of Writer’s cramp, Carpal Tunnel Syndrome, Calluses, RSI and Arthritis.
PenAgain - Ergonomic Pen
9. Yoropen 
This futuristic looking pen called – Yoropen. It is designed with an offset tip that prevents fingers from slipping down when writing which improves posture and reduces strain to the fingers.
Yoropen
10. Free Ride Pen 
Look simialr to Yoropen, but this one got more fancy looking.
The Free Ride is designed to be different, ergonomic, and fun. This push top ballpoint features a soft rubber like material in the vital sections where finger meets pen. The arched hull is held in place by hand drilled screws. As Lepine puts it, “I create tomorrow’s writing instruments for today’s men and women”.
Free Ride Pen
11. USB Pen, MP3 Player, FM Radio, Voice Recorder
Doesn’t like the pendragon, you actually can buy this one.
USB MP3 Pen + FM Radio + Voice Recorder is a multi-functional gadget!! You can enjoy your music or FM radio during your day. It is also a convenient and stylish mass storage device which is shockproof and moisture proof that you can bring along wherever you go and your data and information will be there whenever you need. It comes along with voice recording function so that you can record the important voice data or information at once.
USB Pen, MP3 Player, FM Radio, Voice Recorder

Friday, March 25, 2011

10 EVENTS SURROUNDING SEPTEMBER 11

People all over the world are familiar with what happened on September 11, 2001. On that morning, 19 al-Qaeda terrorists hijacked four US commercial passenger jet airliners and intentionally crashed two of them into the Twin Towers of the World Trade Center. The Twin Towers collapsed within two hours of being struck by the planes. Civilians from over 70 countries were killed in the attacks, with a total of 2,995 casualties. In the months before and after September 11, many important international events occurred. On October 7, 2001, the US military’s Operation Enduring Freedom was launched, starting the War in Afghanistan. This list will be documenting ten news stories and international events surrounding September 11, 2001.
10
Enron Scandal Revealed
Capt020Fbd3Ab49B41Dcaa2780E990
Most Americans are familiar with the failure of the Enron Corporation. Enron was an American energy company based out of Houston, Texas. In 2000, Enron was one of the largest businesses in the world. They had working operations in many areas, mainly electricity, natural gas, communications and pulp and paper. Amazingly, Enron claimed revenues of nearly $101 billion in 2000. The problems for Enron started from the beginning, when a group of executives in the company began misleading the board of directors and audit committee. They did this by hiding billions of dollars in debt, acquired from failed deals and projects. In the months following 9/11, the illegal activity caught up with Enron and the company failed. Enron stock holders lost nearly $11 billion, and the resulting scandal marked the largest bankruptcy reorganization in American history at that time.
The Enron scandal ended the business career of accounting firm Arthur Andersen. Arthur Andersen Corporation was found guilty of unlawful practice in the auditing of Enron. In October of 2001, one month after the attacks in New York and Washington, details of the Enron scandal were leaked to the world press. The story sparked a panic among Enron stock holders, and by December 2, 2001, Enron Corp. filed for one of the largest corporate bankruptcies in US history, with assets of $63.4 billion. Because of the failure, new regulations and legislation were enacted to expand the reliability of financial reporting for public companies. Many conspiracy theories have been formed around the Enron Scandal, and the date on which it was revealed to the public. Most of these claims document the ties between former Texas Governor George W. Bush and Enron founder Kenneth Lay.
9
Executive Order 13233
Bush Sr Jr
In 1972, thousands of official and unofficial FBI records were destroyed, upon the death of J. Edgar Hoover. In fact, in the past it was common practice for high ranking officials to destroy their most important business documents. For this reason, in 1974 the US Congress passed the Presidential Recordings and Materials Preservation Act, placing the presidential records of Richard Nixon in federal custody to prevent their destruction. The Act was meant to reduce secrecy at the highest levels of government, and to give historians the materials they need to perform their duties. The Presidential Records Act of 1978 expanded such protection of historical records. This was accomplished by mandating that all records of former presidents automatically become the property of the federal government upon leaving the Oval Office.
The presidential papers of Ronald Reagan and Vice President George Bush were due to be made public when George W. Bush took office in January, 2001. However, George W. Bush first delayed the release for 90 days, and then repeated the action, pushing the date back into September, 2001. On November 1, 2001, Bush issued Executive Order 13233, limiting public access to the records of former U.S. presidents. The Bush executive order also includes the documents of former vice presidents. Many people were critical of this action, claiming that it violated both the “spirit and letter of existing US laws.” The order severely curtailed public access to presidential records and added to delays in obtaining materials from presidential libraries. On January 21, 2009, Executive Order 13233 was revoked, by executive order of President Barack Obama on his first day in office. Obama essentially restored the original Executive Order 12667.
During his presidency, George W. Bush was accused of acting in violation of the Presidential Records Act of 1978. In 2007, the Bush White House e-mail controversy was revealed. The event started when George W. Bush initiated the, unprecedented, midterm dismissal of seven United States Attorneys on December 7, 2006. The U.S. attorneys were replaced with interim appointees, under provisions in the 2005 USA PATRIOT Act reauthorization. Following the action, a congressional request was called looking for documents indicating why the attorneys were fired. This caused the Bush administration to reveal the fact that not all internal White House emails were available, because they were sent via a non-government domain, that was hosted on an e-mail server not controlled by the federal government. In 2009, it was announced that as many as 22 million emails may have been deleted by the Bush administration.
8
2001 Atlantic Hurricane Season
Hurricane 01
Hurricane Erin was the first, and longest lived, hurricane in the 2001 Atlantic hurricane season. The storm developed from a tropical wave on September 1, 2001, and by September 9 it strengthened into a full blown hurricane. Hurricane Erin passed within 100 miles of Bermuda, and created nasty weather and rip currents along the East Coast of the United States. On September 11, Erin decelerated as it turned to the east, but the hurricane would gain power over Canada and not dissipate until September 15. It is an interesting story because many flights and air traffic control workers were directly affected by Hurricane Erin. The storm produced 6 foot swells off the coast of North Carolina.
The second hurricane of the 2001 season struck on September 12, 2001. The storm is named Hurricane Felix and it originated 1,500 miles (2414 km) south of the Azores. Felix did not impact land, but caused weather problems for boats and aircraft. Hurricane Gabrielle was the third hurricane recorded during the 2001 Atlantic hurricane season. The storm developed on September 11, 2001, in the southeastern Gulf of Mexico. By September 13, Gabrielle intensified and accelerated northeastward toward Venice, Florida. On September 14, the storm made landfall near Venice, Florida, and was soon categorized as a hurricane. Hurricane Gabrielle caused heavy rainfall and bad weather conditions in Florida, Alabama, Bermuda and Canada. Three people were reported to have died in the storm, and it caused $230 million in damages. It is truly unfortunate that the September 11th terrorist attacks fell in line with a string of high powered hurricanes.
7
Abnormal Stock Trading
Stock Market 011
In the week prior to 9/11, an “extraordinary” amount of put options were placed on United Airlines and American Airlines stocks. If you are unfamiliar with the stock market, a put option is financial contract between two parties that will offer the buyer insurance against a company’s excessive loss. Someone who purchases a put option is expecting a stock to drop or they are protecting their assets. Between September 6 and 7, 4,744 put options were purchased on United Airlines stock, compared to 396 call options. On September 10, 4,516 put options were purchased on American Airlines, as compared to 748 call options. The trading activity was 600% above the normal level. United and American Airlines were the only two companies who had planes hijacked on 9/11. There were also an abnormal number of put options purchased in companies who had a stake in the World Trade Centers.
The majority of the suspicious trading was linked to Deutsche Bank Alex Brown. On September 12, 2001, the head of the bank, Mayo A. Shattuck III, resigned from office. The previous director of the bank was A. B. Krongard, who is the former head of the CIA. Citigroup Inc and Morgan Stanley also received an abnormal number of put options, and both companies held offices in the World Trade Centers, and saw a decrease in stock price after the attacks. On September 10, 2001, Raytheon, a defense contractor, had an anomalously high number of call options traded. The Securities and Exchange Commission launched an insider trading investigation, in which Osama Bin Laden was a suspect, but no action was taken. The trading was traced to areas all over the world, with most activity occurring in the UK, Italy, Germany, Japan, Switzerland, France and the US.
In the days prior to 9/11, the Chicago Exchange saw the highest number of United and American Airlines options traded in history. The names of the investors remain a mystery, because they never claimed their money. After it was discovered that a single U.S.-based institutional investor, with no conceivable ties to al Qaeda, purchased a large amount of these options, the 9/11 Commission dismissed the importance of the events. Unfortunately, the abnormal trading did not tip off law enforcement, as intelligence agencies constantly monitor the stock exchange and the sudden rise in activity could have allowed analysts to “connect the dots” and see that a major event was about to take place involving American Airlines, United Airlines and The World Trade Centers. However, nobody could have imagined the scale of the tragedy.
6
Death of Ahmad Shah Massoud
Screen Shot 2010-08-26 At 6.39.01 Am
In 1979, the Soviet Union began their ten year long conflict with Afghanistan. Ahmad Shah Massoud was a military leader that played a leading role in driving the Soviet army out of Afghanistan in the late 1980s. His military prowess made him a hero in Afghanistan, earning him the nickname Lion of Panjshir. During the war, Massoud was known for his strategic and mass ambushes against Soviet and Afghan convoys. In 1983, the Soviets offered Massoud a truce, which he accepted. He then turned his attention to expanding the Afghan resistance movement, and liberating the northern provinces of Afghanistan. Massoud’s military forces were considered the most effective of all the various Afghan resistance movements.
In the middle of the 1990s, the Taliban took control of approximately 90 percent of Afghanistan. In response, Massoud formed an alliance to fight the Taliban, and provided shelter for people fleeing Afghan cities. However, on September 9, 2001, two days prior to 9/11, Ahmad Shah Massoud was killed by a suicide bomber at Khwaja Bahauddin, in Takhar Province, northeastern Afghanistan. The assassins may have intended to attack several Northern Alliance council members simultaneously because others were killed. Prior to his death, Massoud had warned the European Parliament that a terrorist attack was evident. The timing of the assassination is considered significant by people who believe Osama bin Laden ordered the murder, and wanted Massoud dead before staging the 9/11 attacks. Ahmad Shah Massoud died a national hero, and hundreds of thousands of people attended his funeral. The date of his death, September 9, is observed as a national holiday in Afghanistan, known as Massoud Day.


5
US Government Exercises
F16Main
On September 11, 2001, the United States government held a series of military exercises and drills. Operation Northern Vigilance was a NORAD operation, which involved deploying fighter aircraft to the northwestern part of North America, specifically Alaska and Northern Canada. The exercise was one part simulation, one part real world. It was in response to a similar test acted out by Russia on September 11, where long-range bombers were dispatched to Russia’s high north. The exercises were immediately called off after the news of the terrorist attacks and all simulated information was purged from NORADs computer screens. However, the event was a distraction for the US government on 9/11.
Operation Northern Vigilance was not the only US exercise planned for September 11. A series of war games were also acted out, specifically Global Guardian. Global Guardian is an annual, command-level exercise held in the United States. It is an important task, and the purpose of the drill is to test and validate US nuclear command, control and execution procedures. Vigilant Guardian is an exercise that was run in conjunction with Global Guardian. It involved a simulated bomber attack from the former Soviet Union. The drill was conducted in real time, and appeared legitimate in offices and on computers, but without any planes in the air. One of the drills included was a traditional simulated hijacking.
The National Reconnaissance Office drill that was being conducted on September 11, 2001, is the strangest. In the exercise, a simulated small aircraft crashed into one of the towers at the NRO headquarters. No plane was involved in the drill, but to simulate damage from the crash, some stairwells and exits were closed off. A bioterrorism exercise was planned for September 12, 2001. It was named Operation Tripod and included a real life test of the US plan to distribute antibiotics to an entire city population during a bioterrorism attack.
4
Nimda Virus
Light-Virus-1
In the months before and after September 11, 2001, the United States was bombarded with a series of cyber attacks. A group of criminals exposed vulnerabilities in the Microsoft operating system, and created a buffer overflow virus, which executed arbitrary code and infected hundreds of thousands of computers. By July 19, 2001, the amount of infected hosts reached over 350,000 zombies. A series of separate viruses named Code Red I and Code Red II crippled valuable servers and made calculated attacks on US government computers.
On September 18, 2001, a new virus attacked United States operating systems. The worm was given the name Nimda, and it was an advanced version of Code Red II. Some might say that the Code Red viruses were created in preparation for the much larger Nimda attack, which was executed the week following the attacks on the World Trade Center and Pentagon. Due to the release date of the virus, members of the American government speculated on a link between the cyber attacks and Al Qaeda, but this theory ended up proving unfounded. The American media did not report much on the virus because of the terrorist attacks.
Multiple propagation vectors allowed Nimda to become the Internet’s most widespread and dangerous virus. It took only 22 minutes for the worm to rip through the American financial sector, causing over $3 billion in damage. The Nimda virus was so effective because it used five different infection vectors. People could, and still can, get the virus via e-mail, open network shares, infected websites, exploitation or via back doors left behind by the Code Red II virus. The group of people behind the Nimda virus and the theft of billions of dollars are unknown. The event greatly damaged the world’s financial sector and economy.
3
Wave of Accidents
Flight 587 Noaa Photo Of Crash Site
In the months following September 11, 2001, there was a wave of international accidents and events. On September 21, 2001, the AZF chemical factory located near Toulouse, France exploded. The event occurred when three hundred tons of ammonium nitrates ignited. The blast left a crater at the depth of 20 to 30 m (65 to 100 ft), with a diameter of 200 m (650 ft). It was a major incident in France, and 29 people were killed. The event is recognized as an environmental catastrophe, and the total damages already paid by insurance groups are exceeding 1.5 billion euros. The blast is believed to have occurred due to the improper handling of ammonium nitrate, including the mixing of chemical impurities. However, on October 2, 2001, France’s then Environment Minister, Yves Cochet, announced that the explosion “may have been a terrorist attack” and identified Hassan Jandoubi as a person of interest.
On October 4, 2001, Siberia Airlines Flight 1812 crashed over the Black Sea. The plane was en route from Tel Aviv, Israel to Novosibirsk, Russia, and all 78 people aboard were killed. The crash was initially thought to be a terrorist attack, since an Armenian plane near the scene reported seeing the Russian plane explode before it crashed into the sea. However, American intelligence reported that the crash was due to an errant S-200 surface to air missile fired as part of a Ukrainian Air Defense Forces exercise. Many people have labeled this hypothesis unlikely, considering the missiles range and safety features, claiming that the US was in fear of mass hysteria with yet another terrorist attack in the weeks following September 11. Ultimately, the government of Ukraine officially recognized their military’s fault in the accident and started negotiating compensation payments for victims’ relatives.
On November 12, 2001, the United States experienced its second deadliest aviation accident in history. It occurred when American Airlines Flight 587 crashed into a Belle Harbor neighborhood of Queens, New York. The accident took place two months after the September 11 terrorist attacks, and it caused panic in New York. Thousands of people witnessed the Airbus A300 crash to the ground, killing all 260 people on board. Many people reported a fire and explosion before the plane crashed, but the National Transportation Safety Board attributed the disaster to the first officer’s overuse of rudder controls. Al-Qaeda has listed the crash among its successes, but physical evidence was never presented indicating terrorist activity. Surprisingly, the story was widely underreported in the United States, considering the magnitude of the crash. In the months after the tragedy, rumors were circulated that suggested that the plane was exploded by a shoe bomber, similar to the failed attempt of Richard Reid, but these claims are unsubstantiated.
2
2001 Anthrax Attacks
Xin 5820306090834265124455
Most people are familiar with the wave of anthrax attacks waged against the United States in the weeks following September, 11. Beginning on September, 18, a group of letters containing anthrax spores were mailed to US media outlets, and the offices of two US senators. In all, five people were killed in the terrorist activity, and seventeen others were seriously affected. The letters addressed to the US senators, Democrats Tom Daschle of South Dakota and Patrick Leahy of Vermont, were laced with a highly refined dry anthrax powder. Shortly after the first wave of attacks, two letters were sent to the New York Post and NBC News. The letters contained threats mentioning 9/11, and implied a new wave of terrorist activity. For this reason, it was highly reported in America that Al-Qaeda was behind the 2001 anthrax attacks.
On September 11, George W. Bush and the White House staff began taking a regimen of Cipro, which is a powerful antibiotic. This activity has led to a list of conspiracy theories accusing the US government of having pre-knowledge of the anthrax attacks. The investigation into the crimes was one of the longest and most complex in the history of law enforcement. Ultimately, investigators began to focus their attention on an American scientist named Bruce Edwards Ivins. Ivins worked at the US government’s biodefense labs at Fort Detrick in Frederick, Maryland. After extensive research, on August 6, 2008, federal prosecutors declared Bruce Edwards Ivins to be the sole culprit of the 2001 anthrax attacks. He committed suicide on July 29, 2008, after learning that he was going to be formally charged with the crimes. One would think that a media circus would have ensued, but little was mentioned about Bruce Edwards Ivins in the US press. His motives for blaming the attacks on Al-Qaeda are unknown.
1
USA PATRIOT Act
Bush
On October 26, 2001, US President George W. Bush enacted the USA PATRIOT Act. The bill was in direct response to the terrorist attacks that occurred on September 11. The goal of the Act was to reduce restrictions on law enforcement and government officials when investigating criminal activity. It gave international law organizations the right to probe and search citizen’s e-mail, medical, financial and personal records. Some of the main sections of the law enacted restrictions on foreign intelligence gathering, expanded the Secretary of the Treasury’s authority to regulate financial transactions, and broadened immigration laws in regards to detaining and deporting immigrants suspected of terrorism-related acts. The bill was passed by a wide margin in the US Congress. It was supported by some people and seen as an attack on civil liberties by others.
Entire websites have been dedicated to examining the Patriot Acts apparent lack of safeguards surrounding the rights of American citizens and foreign advocates. The bill made significant amendments to over 15 important constitutional statutes. The sections of the Patriot Act discussing Internet supervision and monitoring are confusing and extensive, ultimately reaching far beyond simple e-mail correspondence. One of the most surprising aspects of the USA PATRIOT Act is the lack of public and media debate regarding its introduction. Before September 11, provisions of the Act related to electronic surveillance were proposed and highly debated. However, many people feel that the Patriot Act has helped make America a safer place and stopped terrorist activity. In the first part of 2010, Barack Obama signed a one-year extension on several provisions in the Patriot Act.