-Caveat Lector-

Btw, check out this *excellent* diagram of the events
immediately surrounding the explosion:
http://www.telegraph.co.uk/graphics/00/10/13/wclinbig.gif

Best,

Mike


From:

http://www.freerepublic.com/forum/a39e687355a97.htm

Anatomy of the Attack: An Unsecured Port
Updated 2340 GMT, 001012

Taken by surprise as it docked in Aden Port, the explosion
alongside USS Cole tore a 40 by 20 foot hole along the waterline
killing at least six American sailors and leaving 12 missing.
Authorities said a small boat assisting in mooring the ship in
Yemen on the Arabian Peninsula staged the attack.

But more than a mere surprise, the attack seems to have taken
advantage of inherent weaknesses in security at the port. U.S.
vessels have visited for several years, but have only gotten fuel
about a dozen times in the last year. This would allow terrorists
plenty of opportunity to observe refueling and take advantage of
weak security.

The USS Cole had implemented terrorist countermeasures, according
to Navy protocol. Every U.S. ship follows a predetermined force
protection plan for every port visit. Secretary of Defense Cohen
confirmed today that USS Cole followed the force protection plan
according to perceived threat conditions at Aden Port. The armed
fleet anti-terrorism force was aboard to provide security.

The docking at Aden qualified for threat condition �Bravo,� a
designation where a threat of terrorist conditions is
predictable. The Naval Criminal Investigative Service at Norfolk,
Virginia, is responsible for monitoring threat conditions abroad
and debriefing U.S. personnel on deployment.

But security most likely broke down because of conditions at
Aden. The port is one of the world�s largest natural harbors, and
operates 365 days per year. It has several small islands for
berthing, and small commercial and fishing craft litter the area.

But site security is extremely poor, and corruption is extremely
high. These factors help terrorists infiltrate the port
undetected. Reports from Aden over the past year indicate random
movements by smaller boats against larger vessels, either pirates
boarding ships, or in some cases what appear to be tactical
maneuvers by small crafts.

Another security problem was that no one had verified for
identification the mooring boats belonging to a local contractor.
This requires coordinating with the local government, as do most
security procedures. Without the Yemeni government�s consent,
U.S. forces cannot enforce a cordon around a vessel to deter
sabotage. If the explosives were aboard an approaching speedboat,
the odds of an effective response time from the Cole would have
been slim to none.

The vehicle carrying the explosives approached the USS Cole as a
mooring boat, and was deemed friendly. Upon pulling the mooring
ropes, coming alongside the vessel at the waterline, the small
craft exploded. The explosion hit the main and auxiliary engine
rooms, at a time when the maximum number of crewmen were at their
stations.

U.S. military ships have refueled at Aden three times since May,
and have used this port since 1999. Even if USS Cole were armed
to the teeth, under threat condition Charlie, with an omniscient
force protection plan, the layout and personnel at Aden would
still provide camouflage to an aggressor.


=================================================================
             Kadosh, Kadosh, Kadosh, YHVH, TZEVAOT

  FROM THE DESK OF:                    <[EMAIL PROTECTED]>
                      *Mike Spitzer*     <[EMAIL PROTECTED]>
                         ~~~~~~~~          <[EMAIL PROTECTED]>

   The Best Way To Destroy Enemies Is To Change Them To Friends
       Shalom, A Salaam Aleikum, and to all, A Good Day.
=================================================================

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance�not soap-boxing�please!  These are
sordid matters and 'conspiracy theory'�with its many half-truths, mis-
directions and outright frauds�is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to