The emergence of shared understanding during unexpected events: An example from 9/11 Marlys Christianson, University of Toronto Mary Waller, York University Sjir Uitdewilligen, Maastricht University VERY ROUGH DRAFT, PLEASE DO NOT CIRCULATE OR CITE * Acknowledgement. We are grateful to Kathie Sutcliffe and Katy DeCelles for their comments and suggestions on previous drafts. We owe a debt of thanks to Michael Bronner and Miles Kara, who have both helped us immeasurably. We also thank Kristen Wilhelm, Archivist, Center for Legislative Archives, National Archives and Records Administration for her assistance in accessing documents. 1 ABSTRACT As work becomes more and more interdependent, there is a renewed focus on examining how teams manage unexpected events. During an unexpected event, one of the difficulties that teams face is developing a shared understanding of the situation – specifically, they must collectively make sense of what is happening and continue to update their understanding of the event as it evolves over time. Current research on shared understanding tends to focus on static aspects of understanding – for instance, the content and structure of understanding in teams – but we know much less about the dynamic process of how shared understanding in teams emerges over time. By definition, unexpected events cannot be anticipated, which makes them difficult to study. In this project, we used a unique dataset to gain greater insight into how shared understanding evolved during an unexpected event: audiotapes of real-time conversations between the civilian and military personnel involved in controlling and protecting United States airspace on Sept 11, 2001. In order to answer our research question – “How does understanding of an unexpected event develop and change over time within a team?”– we used an inductive grounded theory approach to analyze conversations between the Northeastern Air Defense Sector team (a group of military officers, air-traffic controllers, and air-surveillance and communications technicians) and other civilian and military personnel, including air-traffic controllers and pilots. We found that shared understanding evolved over time and went through two transitions: first, when the NEADS team realized that the events were not part of a training exercise but instead were happening in the real world and, second, when the NEADS team realized that the events were not a conventional hijacking but instead were a coordinated attack on the US. We also found that the emergence of shared understanding was facilitated by two mechanisms: NEADS staff actively managed the flow of information, “pulling” information from various sources as they sought to supplement or augment what they already knew and “pushing” information to other sources as they attempted to transmit information to those they thought could benefit from it. As well, NEADS staff reconciled conflicting accounts, privileging information that was seen as reliable because it came from either an established source or an informal source that had demonstrated over time that they had timely and accurate information. 2 INTRODUCTION As work becomes more and more interdependent, there is a renewed focus on examining how teams work together to manage unexpected events (e.g., Griffin, Neal, and Parker, 2007; Weick and Sutcliffe, 2007; Gittell, Seidner, and Wimbush, 2008). During an unexpected event, teams must collectively make sense of what is happening and develop a shared understanding of the situation. By shared understanding, we mean the knowledge held in common amongst team members. Developing a shared understanding is important for teams, especially during unexpected events, because it helps them to coordinate their actions and adapt to the evolving situation (Weick, 1995; Cannon-Bowers and Salas, 2001; Burke et al., 2006). However, current research on shared understanding tends to focus on the static aspects of understanding, specifically the content and structure of knowledge in teams. Scholars have studied how team members recognize what knowledge is held by other team members (Wegner, 1995; Austin, 2003; Bunderson, 2003; Lewis, Lange, and Gillis, 2005; Reagans, Argote, and Brooks, 2005; Lewis and Herndon, 2011). They have also studied the amount of overlap or similarity of knowledge between team members (Klimoski and Mohammed, 1994; Mathieu et al., 2000; Cannon-Bowers and Salas, 2001; Waller, Gupta, and Giambatista, 2004), often focusing on specific aspects such as task-specific knowledge, task-related knowledge, knowledge of team-mates and attitudes or beliefs. More recently, scholars have also begun to explore the extent to which team members have an accurate understanding of the knowledge held by other team members (Huber and Lewis, 2010). 3 Although this established body of research on shared understanding has illuminated many aspects of the structure and content of knowledge, we still know very little about the emergence of shared understanding within teams, especially in the context of unexpected events. Scholars have identified organizing practices that enable teams to coordinate their work in dynamic settings (Faraj and Xiao, 2006) and ways in which teams can develop the capacity to improvise in the face of unexpected events (Bechky and Okhuysen, 2011) but there are few studies that examine how shared understanding emerges and develops over time as teams manage unexpected events in the real world (c.f. Snook, 2000). In part, this is because unexpected events cannot be anticipated, which makes them difficult to study. As a result, many classic studies on managing unexpected events rely on retrospective data to explore how teams develop shared understanding (e.g., Shrivastava et al., 1988; Weick, 1990; Weick, 1993; Vaughan, 1996). For instance, Weick’s (1993) examination of the collapse of sensemaking during the Mann Gulch fire in 1949 is based on historical data drawn from Norman McLean’s “Young Men in Fire,” interviews from the surviving four members of the fire crew, a research report from the National Fire Services, and a site visit, which was conducted decades after the events of the day. In this paper, we used a unique dataset which allowed us to gain greater insight into how shared understanding evolved during an unexpected event: audiotapes of real-time conversations between the civilian and military personnel involved in controlling and defending United States airspace on Sept 11, 2001 (9/11). In particular, we analyzed the conversations between the military air defense team at the Northeastern Air Defense Sector (NEADS) – a group of officers, air-traffic controllers, and air-surveillance and communications technicians who were responsible for protecting American airspace (Bronner, 2006; National Commission on Terrorist 4 Attacks Upon the United States, 2004) – and other civilian and military personnel, including airtraffic controllers and pilots. We are interested in the sensemaking of the NEADS team – that is, the process through which individuals socially constructed an understanding as they interpreted and responded to unfolding events, constructing plausible accounts that allowed them to comprehend the world and to enact the sense that they made back into the world (Weick, 1995; Weick, Sutcliffe, and Obstfeld, 2005). In order to answer our research question – “How does understanding of an unexpected event develop and change over time within a team?” – we used an inductive qualitative approach to study how the NEADS team made sense of the events of 9/11. We begin by presenting a short case study of the events of 9/11 to provide background for the reader and to establish a context for the subsequent analysis. Once the context for our case is established, we unpack how shared understanding emerged over time. We found that shared understanding evolved over time and went through two transitions: first, when the NEADS team realized that the events were not part of a training exercise but instead were happening in the real world and, second, when the NEADS team realized that the events were not a conventional hijacking but instead were a coordinated attack on the US. We also found that the emergence of shared understanding was facilitated by two mechanisms: NEADS staff actively managed the flow of information, “pulling” information from various sources as they sought to supplement or augment what they already knew and “pushing” information to other sources as they attempted to transmit information to those they thought could benefit from it. As well, NEADS staff reconciled conflicting accounts, privileging information that was seen as reliable because it 5 either came from an established source (i.e. higher up in the military chain of command) or an informal source that had demonstrated over time that they had timely and accurate information. 9/11: ROLE OF NEADS TEAM AND TIMELINE OF KEY EVENTS While a significant amount of information about the events of 9/11 is already present in the public consciousness, the popular narrative of the events is incomplete (National Commission on Terrorist Attacks Upon the United States, 2004). Now that more than a decade has passed and many declassified documents have been released, it is clear that many of the details related to how events unfolded that morning were not shared with the general public. Even worse, some of the key facts were misrepresented during public discussions, including false testimony to Congress by high-ranking military officers (National Commission on Terrorist Attacks Upon the United States, 2004, p. 34). In order to provide a context for the work of the NEADS team, we present a short case study that provides more detail about the NEADS team and the organizational structure in which NEADS is embedded. We also summarize key events on the morning of 9/11, highlighting those events that may be more unfamiliar to the reader including the other reports of hijacked aircraft and conflicting reports such as the “rebirth” of American Airlines 11 (AA11). Team structure: The NEADS team is composed of many different types of military personnel who specialize in different functions: on the Operations floor, there are staff who work in Radar Control (surveillance and tracking), Identification, Weapons, and various military command positions (with exception of the Mission Crew Commander, most of the senior officers are 6 located in the Battle Cab, just off the Operations floor). In this paper, we focus primarily on the work of the Identification (ID) and Weapons staff, as they were the NEADS personnel most intimately involved in managing the events of the day. Major Kevin Nasypany was the Mission Crew Commander (MCC), which meant that he was in charge of the Operations floor. Because of an ongoing training exercise, there were several other high ranking officers at NEADS in the Battle Cab area on 9/11: Col. Robert Marr and Lt Col. Dawne Deskins. There were three ID Techs present on the NEADS operation floor on 9/11: Senior Airman Stacia Rountree, Tech Sgt. Shelley Watson, and their supervisor, Master Sgt. Maureen (“Mo”) Dooley. The Weapons staff included Tech Sgt. Jeremy Powell, Tech. Sgt. Ronald Belluscio, Sgt. Joe McCain, Staff Sgt. William Huckabone, Master Sgt. Steve Citino, and Major James Fox (supervisor of the Weapons staff). Like many teams that are designed to manage unexpected events, NEADS staff coordinates their work not only within the team but also with other agencies, specifically the FAA and civilian air traffic controllers as well as military personnel. NEADS obtains information from and gives information to other agencies – for instance, they receive radar inputs from both the Federal Aviation Administration (FAA) and the Air Force. As the events of 9/11 unfolded, NEADS staff were in direct contact with civilian and military air traffic controllers in New York, Boston, Washington, D.C., Cleveland, and Indianapolis. As well, they coordinated the military response in conjunction with the Otis Air Force Base in Cape Cod, MA, the Langley Air Force Base in Hampton, VA, and the Navy Fleet Air Control and Surveillance Facility in Virginia Beach, VA (National Commission on Terrorist Attacks Upon the United States, 2004). Figure 1 displays the 7 geographical proximity of NEADS to the agencies with which it interacted and emphasizes that NEADS coordinated their work with a distributed set of actors. -- Insert Figure 1 approximately here – The physical artifacts – the workspace and equipment – at NEADS also shaped the emergence of shared understanding. The operations floor at NEADS was configured as an open workspace with workstations of communication and radar equipment organized in long rows. All workstations faced large screens at the front of the room, where status updates and television coverage could be displayed. The advantage of the open workspace was that staff could see and hear each other, which facilitated the development of shared understanding. Staff communicated on various internal radio channels, which were continuously recorded on reel-to-reel tapes and were automatically time-stamped. The radio channels recorded both internal conversations between NEADS staff and also conversations between NEADS staff and outside personnel, such as civilian or military air traffic controllers. Most personnel were only recorded on one radio channel but some key staff at the MCC desk could be heard on multiple channels as they were able to plug in and listen to any of the channels. The building where the NEADS team was housed was part of the now-defunct Griffiss US Air Force base. Post Cold-War, budget cutbacks meant that NEADS radar equipment was antiquated. Although NEADS was scheduled to acquire updated radar, on 9/11 they were working on radar machinery so outdated that the equipment was no longer being produced and NEADS technicians had to make and repair their own equipment. The antiquated radar became 8 an issue on 9/11. Unlike more sophisticated radar used by civilian air traffic controllers, the NEADS radar was only able to calculate the position of planes based on the transponder signal, which “squawked” (transmitted) a specific code that uniquely identified each plane. However, when the terrorists hijacked the planes and altered the transponder signals, they made it effectively impossible for NEADS staff to locate and track the flights. Major Nasypany described the difficulty tracking the planes on 9/11, You would see thousands of green blips on your scope and now you would have to pick and choose. Which is the bad guy out there? Which is the hijacked aircraft? And without that information [the beacon code or plane’s exact coordinates] from the F.A.A., it’s a needle in a haystack” (Bronner, 2006, p. 8) Organizational structure: NEADS is one component of the North American Aerospace Defense Command (NORAD), the military partnership that was created in the midst of the Cold War to protect Canadian and US airspace from attack from the Soviet Union. NEADS is headquartered in Rome, NY, a remote area of upstate New York, and is the Sector Operations Command Center (SOCC) responsible for protecting the airspace over the northeastern continental United States, an area which comprises a “half-million-square-mile chunk of American airspace stretching from the East Coast to Tennessee, up through the Dakotas to the Canadian border, including Boston, New York, Washington, D.C., and Chicago” (Bronner, 2006). NEADS is overseen by the Continental United States Region Air Operations Center (CONR), which is co-located with First Air Force – a squadron of ten National Guard fighter wings – in Tyndall Air Force Base, Florida (NORAD, 2012a). 9 NEADS’ mission is to defend its sector against attacks, although the historical focus had been on external attacks (i.e. a cruise missile attack from Soviet Union). After the Cold War ended, their mission enlarged to include “the detection and monitoring of aircraft suspected of illegal drug trafficking” and assisting with local search & rescue missions (NORAD, 2012b). In the event of an attack, NEADS’ role was to coordinate the US military response, while providing direction and support to civilian aviation agencies. Pre-9/11, NEADS (or any other branch of NORAD) was not responsible for monitoring flights internal to the US – that task was the purview of the FAA, which was mandated by law to regulate the “safety and security of civil aviation”(Farmer et al., 2011, p. 6). For an internal incident, such as an airplane hijacking, there were protocols that outlined how the FAA was supposed to request military aid from NORAD. The need for the FAA and NORAD to manage a domestic hijacking did not occur very often – the last incident had taken place eight years prior (Farmer et al., 2011, p. 6). The protocols that existed on 9/11 for how to manage hijacking were based on the notion of a conventional hijacking, in which hijackers would make a series of demands they expected to be met in order to assure the safe return of the plane and its passengers. The protocols also assumed that the pilot would signal to air traffic controllers that the plan had been hijacked either by contacting the controllers by radio or by “squawking” (transmitting) a transponder code of “7500,” the universal code for a hijacking in progress. The protocols also assumed that staff would have time to follow a lengthy sequence of steps that involved notifying five levels of FAA staff, the National Military Command Center (located at the Pentagon), and the Secretary of Defense to request approval for a fighter escort. And only after approval was given by the Secretary of Defense would information about the hijacking be passed along to NORAD so that the affected 10 sector could coordinate the military response and arrange for a fighter escort. But the hijackings on 9/11 represented the beginning of a “new type of war” (National Commission on Terrorist Attacks Upon the United States, 2004, p. 46). The previous assumptions were wrong – on 9/11, the hijackers altered the transponder signals, making the planes difficult to locate; there was little time to respond; and the hijackers intended not to make a series of demands but, instead, to turn commercial jetliners into guided missiles (National Commission on Terrorist Attacks Upon the United States, 2004, p. 18). The hijacking protocols were not followed – in part because they no longer made sense – but also because of a significant breakdown in communication between the FAA and NORAD that we will discuss later in the paper. Timeline of key events: Early on the morning of September 11, 2001, NEADS staff were preparing for yet another day of an ongoing simulation exercise, Vigilant Guardian. Major Kevin Nasypany – who was in charge of the Operations floor at NEADS – had just come on shift but was temporarily away from the Operations floor. Unbeknownst to anyone at NEADS, an attack on the US was already underway: teams of terrorists had boarded four flights with the sole intent of turning the planes into weapons and crashing them into iconic American symbols, including the World Trade Center and the Pentagon. A phone call at 8:37am from one of the Boston air traffic controllers was the first notice that NEADS had about the unprecedented and rapidly unfolding sequence of events that occurred that morning. The chronology of the key events of 9/11 has been definitely summarized by the 9/11 Commission in their original report (National Commission on Terrorist Attacks Upon the United States, 2004) and in the recently released audio monograph (Farmer et al., 2011). Rather than 11 recount all the detail in that report, we focus the discussion in this paper on the key events of that morning that relate to the development of shared understanding at NEADS. We present these key events in a graphical timeline1 in Figure 2. -- Insert Figure 2 approximately here -- NEADS staff eventually learned that four planes had been hijacked: American Airlines 11 (AA11), United 175 (U175), American Airlines 77 (AA77), and United 93 (U93). This top section of this figure depicts when each of the planes were hijacked, when NEADS was notified of those hijackings, and when the planes crashed. As you can see from the figure, NEADS had little to no time to respond to the hijacking of the planes: for the first hijacked plane (AA11), NEADS had nine minutes notice between when they were informed of the hijacking and when the plane crashed into the North Tower of the World Trade Center. For the second plane (U175), NEADS had no notice and learned simultaneously that the plane had been hijacked and that it had crashed into the South Tower of the WTC. For the third plane (AA77), NEADS had – at most – four minutes notice. The time interval around this notice is difficult to calculate because NEADS was informed at 9:34am that AA77 was missing but were not told the plane’s location or that it had been hijacked. AA77 crashed into the Pentagon at 9:37am. We drew on many archival sources to compile these timelines – some materials used Eastern Daylight Time (EDT) and other materials, particularly military sources, used “Zulu time” (Greenwich Mean Time). For consistency and ease of reading, we have converted all times to EDT, the time zone NEADS was located in and where most of the events of that morning took place 1 12 For the fourth plane (U93), NEADS did not learn of the hijacking until well after the plane had crashed. The timeline of U93 as it is presented in this figure is important because it contradicts erroneous testimony given in front of Congress. The story that emerged immediately after 9/11 was that the US military was aware that U93 had been hijacked, had scrambled fighters to track it, and was willing to “take lives in the air to save lives on the ground” (Filson, 2003, p. 71). This account received significant press attention and – despite having been disproven – is still part of the popular mythology of 9/11. In fact, neither NEADS nor any other senior military leaders were aware of U93. If not for the passengers on that flight, U93 would most likely have struck another iconic target in the National Capitol Area, the direction it was headed at the time of the crash (National Commission on Terrorist Attacks Upon the United States, 2004, p. 13-14, 31). There were several other key events that happened on 9/11 that contributed to the chaos and confusion at NEADS. One of those events was a false report that AA11 was still airborne. Even though AA11 had been officially confirmed as the plane that crashed into the North tower of the World Trade Center at 8:46am, it was – almost 40 minutes later – thought to be “reborn” and flying toward Washington. Even now, it is unclear how the rumor originated. The false report was discussed on a FAA conference call and was passed along to NEADS. In fact, it was AA77 that was en route to Washington. The “rebirth” of AA11 resulted in a frantic chase of a phantom plane, in which NEADS radar technicians and military fighter pilots alike were searching for a plane that no longer existed. The “rebirth” of AA11 was omitted from the official narrative given by key military officials in their public statements and testimony to Congress (National Commission on Terrorist Attacks Upon the United States, 2004, p. 34). 13 One of the main sensemaking challenges that NEADS staff faced that morning was determining what the emerging threat consisted off. In addition to information coming in about the hijacked planes, they received many communications about planes that were thought to be hijacked but, in the end, turned out not to be. In addition to the four planes that were hijacked, there were three other suspected hijackings that received significant time and attention from NEADS: Delta 1989, a Canadian plane, and an unknown plane spotted over Washington. Due to miscommunication with the air traffic control tower in Cleveland, Delta 1989 was on the wrong radio frequency and temporarily out of radio contact. Since Delta 1989 was one of three transcontinental flights that originated out of Boston that morning – the other two flights were AA11 and U175 – air traffic controllers quickly designated it as a suspected hijacking. After being tracked for some time by NEADS, the plane – which had never been hijacked – landed safely in Cleveland. NEADS also heard that an unknown aircraft from Canada was headed toward Washington. In fact, this plane never existed – it was speculation by Canadian intelligence officers that such a threat might exist. However, at NEADS this information was treated as news of another possible hijacking until, much later, it was determined that there was no such plane. The third threat – an unknown plane over Washington – was actually one of the Langley fighter jets that had been tasked over the Capitol region. The jet accidentally had its transponder code on the wrong frequency, which meant that the Washington air traffic controllers – who were now on extreme alert – detected this abnormal signal and passed along 14 the information to NEADS. NEADS scrambled the Langley fighters to find this plane, only to realize that, “We intercepted one of our own guys” (NEADS, Channel 13). NEADS had limited ability to respond to the reports of hijacking – Major Nasypany only had four fighter jets ready at his disposal to protect the entire northeastern sector of the United States: two F-15 fighter jets stationed at Otis Air Force Base and two F-16 fighter jets stationed at Langley Air Force Base. However, NEADS staff mobilized the resources that they had as quickly and thoughtfully as they could, launching the F-15’s from Otis Air Force Base to protect New York City and, eventually, launching the F-16’s from Langley Air Force Base to protect Washington, DC. It is important to note that one of the one of the largest breakdowns on 9/11 occurred between the FAA and NEADS. The FAA received information about hijackings or planes that had gone missing and did not transmit this information in a timely matter to NEADS (National Commission on Terrorist Attacks Upon the United States, 2004, p. 17-31). In fact, the only request for military assistance from NEADS on 9/11 came from Colin Scoggins, an air traffic controller in Boston, who deviated from protocol and called NEADS to inform them of events. As a result of this communication breakdown, NEADS staff had to coordinate the US military response using the information they obtained themselves from civilian air traffic controllers. 15 METHODS We use an inductive constant comparison approach to elaborate and extend theory related to the emergence of shared understanding. Qualitative methods are especially well suited for investigating complex processes that evolve and change over time. Qualitative research helps to answer process questions, such as “What is occurring?” and “How is it occurring?” (Lee, Mitchell, and Sablynski, 1999). Within qualitative methods, the single case study methodology is particularly appropriate for studying extreme or rare events (Yin, 2003). A case study approach results in a rich and detailed description of organizations, which can facilitate the development of theoretical insight (Weick, 2007). Data collection Since 9/11 a great deal of data about the events of that day have been made publicly available, either as a result of the 9/11 Commission’s work or as a result of Freedom of Information Act requests. Our analysis derived from multiple sources but our primary data source was the NEADS recordings. We provide more detail about each of our various data sources below. NEADS tapes: In order to gain insight in how shared understanding emerges, we obtained, transcribed, and analyzed the NEADS recordings of the real-time conversations that air traffic controllers and military personnel were having as they attempted to make sense of and manage the events of 9/11. The NEADS facility has multi-channel reel-to-reel tape recorders in the operations center that continuously record (with time stamps) the five NEADS radio channels, 16 which are used for internal communication between NEADS team members and for external communication between NEADS and civilian or military air traffic controllers (e.g., Boston Center, New York Center, and Washington Center) and other personnel, including military pilots. 9/11 Commission Report: The 9/11 Commission (2004) was created to “prepare a full and complete account of the circumstances surrounding the September 11, 2001 terrorist attacks, including preparedness for and the immediate response to the attacks.” Within this report, we focused on the work of Team 8, the 9/11 commission team that was in charge of investigating the immediate response to the 9/11 attacks, with a particular focus on air traffic controllers, NORAD, and NEADS. NARA Archives: The source documents for the 9/11 Commission Report are housed at the National Archives in Washington, DC. Some of the documents are electronically available. The rest of the documents can be viewed in the archives. Again, we focused on the documents from Team 8, including the transcripts of the Team 8 interviews with all the key NORAD, NEAD, and FAA personnel involved in 9/11. As well, there are numerous other archival documents including floor plans of NEADS and the location of NEADS staff in the control room on 9/11, the master log from NEADS that is used to record all key events, and other important documents. In total, we obtained more than 1000 pages of documents from NARA. 17 Continued work by members of Team 8: Col. Miles Kara, a military intelligence officer (now retired) served as a member of the 9/11 Commission’s Team 8. Even after the 9/11 Commission completed their work, he continues to research and publish analyses related to the events of 9/11. He maintains a website that has detailed background information on key personnel and aspects of that day (http://www.oredigger61.org/). Team 8 constructed an audio monograph of the events of 9/11 that was not included in the final Commission report nor ever released to the public. John F. Farmer, a member of Team 8 and former Senior Counsel, National Commission on Terrorist Attacks Upon the United States, became the Dean of Rutgers Law School. Like Miles Kara, he continued to work on issues related to 9/11 and wrote a book, “The Ground Truth: The Untold Story of America Under Attack on 9/11,” about the 9/11 Commission report and government concealing key facts from the public. On the tenth anniversary of 9/11, John Farmer, Miles Kara, and a group of Rutgers law students finally published the annotated Team 8 audio monograph, which is a definitive account of the events of that morning (Farmer et al., 2011). Data analysis Members of teams do not have the ability – unless they have worked together for a long time and are able to anticipate each other’s thoughts and actions – to accurately know what other team members are thinking or feeling (Rico et al., 2008). Rather, team members rely on external signals – e.g., what other team members say and do, what markers of expertise team members display (Bunderson, 2003), and what roles they occupy (Meyerson, Weick, and Kramer, 1996) – as the basis for their own thoughts and action. In essence, team members must draw upon their observations of interactions within a particular situation to shape their own future cognitions and actions. While we acknowledge the importance of what occurs at the intra-individual level (i.e. 18 individual cognition), the focus of our study is the development of shared understanding – the knowledge held in common by team members can be traced over time by mapping the statements team members make, the information they mark as important to share with each other, the accounts they develop to explain events, the sense they give to each other, and the coordinated actions they take as they perform their complex interdependent work. To study how shared understanding developed and changed over time, we created a set of synchronized transcripts of the conversations at NEADS. First, complete transcripts were made of each of the five NEADS radio channels, using the automatic timestamp to create a second by second record of events. Second, we created a master spreadsheet that synchronizes all five transcripts, so that, at any moment in time, it is possible to see all conversations that were occurring at that moment. In order to see the data at once, the data were printed on large posters (3 ft wide x 5 ft long). A total of thirty three posters were required to contain the data. This large scale data display technique also enabled the physical mapping of the flow of information across radio channels over time. We also created detailed summaries of all key events on 9/11 that involved NEADS. We paid particular attention to creating a timeline from primary source data as many published accounts are based on inaccurate information. Once a preliminary timeline was created, we corroborated the timeline with other primary source data, such as the NEADS master control log, which is used by NEADS to record important events. The supplementary data, particularly the interviews and documents collected by members of Team 8, allowed us to create thick descriptions of the events. 19 As we analyzed the data, we followed a grounded theory approach (Glaser & Strauss, 1967), iterating back and forth between data and emerging theory. We coded the NEADS transcripts for moments that seemed striking, either because they seemed interesting or because they seemed recurrent or basic. We then coded data into units of meaning, analyzed these codes for themes and emerging theoretical insight, and then returned to the data for further analysis and coding based on the new insights that we developed, while also looking for outliers and rival explanations (Glaser & Strauss, 1967; Miles & Huberman, 1984). FINDINGS We began our study with the research question, “How does understanding of an unexpected event develop and change over time within a team?” Our findings provide insight into this question. For NEADS staff, the events of 9/11 were unprecedented in scope and magnitude and it was difficult for them to determine what exactly was happening as events unfolded over time. Despite these challenges, the team was still able to create new shared understanding, which went through three distinct phases: first, team members thought that this event represented a training exercise; next, although simultaneous hijackings were non-routine, they thought it was a conventional hijacking (with the assumption that the hijackers would make their demands known and would be escorted by military aircraft to their chosen location); and last, as the hijacked aircraft were used as weapons, they realized that this represented a coordinated attack on the US. 20 Our findings suggest two mechanisms that contributed to the emergence of shared understanding. We illustrate how NEADS staff actively managed the flow of information, both “pulling” information from various sources as they attempted to discern what was happening and “pushing” information to members of their network that they thought needed the information. In addition to the challenge of managing the flow of information, NEADS staff also had to determine what information to pay attention to. In the face of contradictory accounts, NEADS staff had to reconcile conflicting information, decide what information was reliable, and privilege some accounts over others. Transitions in understanding The process of creating and updating shared understanding was not straightforward. Different team members were receiving different pieces of information, contributing to a varied portrait of the event. The ID Techs were on the phone with civilian air traffic controllers, trying to find out more information about the hijacked planes and passing along information that they thought would be helpful. Because the hijackers altered the transponder signals, the Radar Control staff were having trouble locating the hijacked planes and were attempting to track down the planes using the last known geographical coordinates (longitude and latitude). The Weapons Techs were coordinating the military response with staff at Otis Air Force Base, Langley Air Force Base, and Navy Air Flight Control and, later on, often speaking directly to the fighter pilots as well as the military air traffic controllers. Major Nasypany, the MCC, was directing all this activity on the operations floor, while in constant consultation with the commanders in the Battle Cab. Major Nasypany also had the additional challenge of maintaining chain of command, a task made more difficult that morning because there were so many senior CONR officers present at 21 NEADS in preparation for Vigilant Guardian, the scheduled training exercise. Some of the senior officers who were present at NEADS outranked him but were not part of the operational chain of command. At one point, Nasypany realizes that one such officer was on the operations floor and causing confusion amongst staff in terms of who they should listen to – you can hear him say on the tapes, “I gotta get Ian off the floor, he has been circumventing my system here. He is not an MCC, he needs to stay up there [Battle Cab.]”(10:44am, NEADS, Channel 2). As the understanding of events evolved over time – from training exercise to conventional hijacking to coordinated attack on the US – the NEADS team had to navigate through these transitions in understanding. Different types of transitions in understanding were easier to accomplish than others. The transition from thinking the events were part of an exercise to realizing that they were occurring in the real-world was a fairly straightforward transition, in contrast to the transition from thinking that this was a conventional hijacking to realizing that planes were being used weapons as part of a coordinated attack on the US. We discuss each transition in understanding in turn. Although conspiracy theorists contend that the Vigilant Guardian training exercise added to the confusion of the morning, there is ample evidence that the exercise did not interfere and, if anything, actually strengthened the response (Kara, 2011; Scott, 2002). For instance, because of the exercise NEADS was fully staffed and there was no need to call in extra personnel. It did not take staff long to determine the events were not part of the exercise, although there were some residual comments throughout the morning related to the exercise (Kara, 2011). All references to the exercise are summarized in Appendix 1 (timeline adapted from Kara, 2011). 22 The transition of understanding from exercise to real-world event can be noticed in the first conversation (1) between Joe Cooper, who called from Boston Center to share the information that a plane – AA11 – had been hijacked and Sgt. Jeremy Powell, who answered the phone. 8:37am (NEADS, Channel 14) Phone rings Sgt Powell: Huntress2 Weapons. Sgt Powell ZBW: Hi. Boston ARTCC. We have a problem here. We have a hijacked aircraft headed toward New York and we need you guys to… we need someone to scramble some F-16s or something to help us out Sgt Powell: Is this real world or exercise? ZBW: No, this is not an exercise. Not a test. Sgt Powell: OK. Sgt. Powell immediately transferred Joe Cooper to the most senior MCC on the operations floor – Dawne Deskins – who gathered information about the hijacking. Major Nasypany was immediately paged back to the operations floor over the PA system, “Major Nasypany, you are needed in Ops, pronto. Major Nasypany, you are needed in Ops, pronto” (8:37:58am, NEADS, Channel 2). Additional staff were also paged to the operations floor. The ID Techs called Boston back to get more information about the plane, including identifying data – such as its tail number – and the number of “souls on board” (passengers). By 8:41am, Major Nasypany contacted Otis Air Force Base and had them put two fighters on battle stations and by 8:46am they were given the order to “scramble” (i.e. launch) over Manhattan to locate and escort the hijacked plane, per hijacking protocol. Nine minutes had elapsed from the first phone call to the real-world military response. 2 NEADS call sign is HUNTRESS and this is the greeting that NEADS staff use when answering the phone. 23 In total, throughout the NEADS tapes, there were fourteen references to the Vigilant Guardian exercise (Kara, 2011). The first two references – the phone call from Boston and a subsequent comment by Major James Fox (“I’ve never seen so much real-world stuff happen during an exercise”) – were the only moments that suggested that NEADS staff were wondering if the information represented an exercise. The remaining references are almost entirely related to the logistics of cancelling the previously scheduled simulation. For instance, at 9:15am an off duty staff member called in (5) to ask if the exercise was on hold and was told, “Not at this time, no, but I think they are going to [put the exercise on hold]” (NEADS, Channel 7) or at 9:30am the simulation inputs began automatically and Nasypany ordered them turned off (6), “You know what? Get rid of this damned sim. Turn your switch sim… Hey, turn the switch sim off. Get rid of that crap” (9:30am, NEADS, Channel 2). There was one final comment at 10:08am (10), when Master Sgt McCain was told about a bomb on U93, which could be interpreted either as gallows humor or a lingering question about the simulation exercise was still running. McCain said, “If this is an exercise input, it’s a good one” (10:08am – off mic conversation; NEADS, Channel 2). However, given the time of the comment – after planes had crashed into the World Trade Center and the Pentagon – this comment seems likely to be an attempt at humor. The comments around whether the situation was a conventional hijacking or an attack were too numerous to enumerate in their entirety. We selected key moments and summarized them in a similar fashion in Appendix 2. As described above, just after NEADS learned of the first hijacking, NEADS ID Techs called Boston back to get information about the plane and the Weapons Techs coordinated the military fighter jet escort. Everything was proceeding according to protocol except that no one knew the location of the plane. 24 The second transition in understanding from a conventional hijacking situation to the US being under coordinated attack required more sensemaking than the first transition. This transition was not a clear cut issue (i.e. exercise vs. real-world) but rather an event in the real world that was unexpected and – in many ways – unimaginable. Although some in the intelligence community had speculated about the possibility of using planes as weapons, the emphasis on training at NEADS remained on external threats (i.e. a Russian missile strike) and when internal events were considered, they took the form of conventional hijacking (Kara, 2010). The simulation exercises that NEADS practiced with were based on the same set of assumptions that the hijacking protocol were: that planes would be visible, that there would be time to respond, and that the hijacker would use the planes as leverage to have their demands met. In fact, on 9/11 NEADS staff needed to create a novel understanding that this unfolding event represented a hybrid between these two types of threats – an external threat that was being enacted internally as foreign terrorists took over US domestic flights and turned the planes into weapons. The first clue NEADS staff had that this hijacking was not conventional was that both internal NEADS staff and civilian air traffic controllers were having trouble locating the planes. This problem was initially explained away as the pilot not activating the hijacking transponder code due to “threats in the cockpit.” NEADS ID Tech Shelley Watson was talking to Colin Scoggins, a Boston air traffic controller, and was asking for the location of the plane: 8:40am (NEADS, Channel 4) BC: We, we don’t know! (laughs) Watson: You don’t know where he is at all? BC: He’s been hijacked. The pilot’s having a hard time in talking to the… I mean… We don’t know. We don’t know where he’s goin’. He’s heading towards Kennedy [the airport], he’s uh, like I said, he’s like 35 miles north of Kennedy now at 367 knots 25 One of the problems with locating the plane was that the more sophisticated civilian radar was able to determine where the planes were geographically (i.e. longitude and latitude) but not where they were “spatially” (i.e. altitude). NEADS radar, although antiquated, could determine altitude but required either the transponder code or the exact geographical location to do so. In addition to altering the transponder signals, the terrorists also literally flew the planes below the radar, making the planes functionally invisible to both NEADS and civilian radar. As events unfolded, however, it soon became apparent that the assumption that hijacked planes would remain visible was not the only assumption that was wrong that morning. Sensemaking around the transition to “planes as weapons” was made more complicated by conflicting information. To illustrate, we highlight two issues involving AA11, the first hijacked plane: first, the confusion regarding whether AA11 was the plane that crashed into the World Trade Center and, second, the confusion regarding the “rebirth” of AA11, where it was falsely reported that AA11 had not crashed and instead was still airborne and en route to Washington, D.C. NEADS staff learned that a plane crashed into the World Trade Center during a conversation that NEADS ID Tech Stacia Rountree was having with Sgt David at First Air Force in Tyndall, FL – he sees the footage of the collision on CNN and interrupts their conversation: 8:51am (NEADS, Channel 7) David: What, he…wait a minute, a plane just hit… A plane hit the World Trade Center there. I just saw that on the news. I hope, I hope that’s not the same plane. Rountree: A plane just hit the World Trade Center? David: Yeah. Rountree: It’s on the news? David: And it may be a 737. Rountree: A 737? 26 David What type of aircraft is the aircraft? [referring to the hijacked plane] Rountree: What type aircraft is the aircraft? It’s a 767. NEADS was unable to get official confirmation for some time that the hijacked plane they had been searching for was the same plane that hit the WTC. American Airlines would not confirm that they had lost contact with their plane. Boston air traffic control was momentarily willing to confirm that the plane was AA11, but then retracted that confirmation. The contradictory information cascaded across the NEADS radio channels as colleagues heard each other talking on the phone or as people began to shout out key information (“talking to the room”). Rumors began to circulate that the WTC was hit by a Cessna not a commercial jet. The Weapons Techs were talking about the cause of the crash and one Tech said, “I never heard them say American Airlines Flight Eleven hit the World Trade Center. I heard it was a civilian aircraft...” (8:56 am (NEADS, Channel 2). In the midst of the confusion, a report came in at 9:03am that a second plane hit the World Trade Center. By this time it was clear that the situation no longer represented a conventional hijacking but people still didn’t have a sense of what was happening: 9:03am (NEADS, Channel 7) Dooley: Huntress I.D., may I help you? BC (Scoggins): Yes, it’s Colin Scoggins again, Boston Center. We just had a report of a second aircraft hitting the Trade Center. Dooley: A second aircraft hitting the Trade Center! BC (Scoggins): That is correct, and uh, I, I don’t know what you all need to do, but if I were you, I’d start puttin’ people on standby as far as those uh, the fighters at Otis, that’s my recommendation. We said the second aircraft hit, we’re gonna ground all our aircraft. The information about the second hijacking was quickly passed across radio channels to the MCC and the Weapons Techs and up the chain of command to the Battle Cab. As an aside about 27 the emergent understanding from the perspective of the air traffic controllers, the decision to ground all aircraft out of Boston was an action by Boston air traffic controllers to contain the situation in the only way that they could and to minimize the uncertainty of unfolding events. By not allowing any more aircraft to take off, they were limiting the number of potential weapons in the air. Eventually the FAA would give the order to “clear the skies” and land all the aircraft – more than 4500 planes – that were in US airspace (Levin, Adams, and Morrison, 2002). In response to the second hijacking, the Weapons Techs called to get extra air support and the decision was made to move the Otis fighters, which had been scrambled earlier in response to the first hijacking, into FAA controlled airspace over Manhattan. This decision was the beginning of the deviation from the routine hijacking protocol, in which fighter jets escort the hijacked plane. At this point they were making plans for the fighters to potentially take more aggressive action: 9:07am (NEADS, Channel 2) Nasypany: Okay, Foxy, this is what, this is what I foresee that we probably need to do. We need to talk to F.A.A. We need to tell 'em that this stuff's gonna keep on going, we need to take those fighters, put ‘em over Manhattan. Okay? Fox: Sir. Nasypany: That’s the best thing. That’s the best play right now. So coordinate with the F.A.A. Tell ‘em, if there’s more out there—which we don’t know—let’s get ‘em over Manhattan. At least we got some kinda play. This transition in understanding was further complicated at 9:21am when Colin Scoggins at Boston called back with the report that AA11 was not the plane that crashed into the World Trade Center. Scoggins had been listening in on a FAA conference call out of Washington, heard the information that AA11 hadn’t crashed, and wanted to pass along the information. Unfortunately, this information was incorrect: 9:21am (NEADS, Channel 7) Rountree: Huntress I.D., how can I help you? 28 BC (Scoggins): Scoggins, Military Boston Center. Just had a report that American eleven is still in the air and it’s on its way towards, heading towards Washington. Rountree: American eleven is still in the air? BC (Scoggins): Yeah--Rountree: And it’s on its way to Washington? BC (Scoggins): ---there was definitely another aircraft that hit the tower. That’s the latest report we have. Rountree: Okay. BC (Scoggins): I’m gonna try to confirm an I.D. for you but I would assume he’s somewhere over uh, either New Jersey or somewhere further south. Rountree: Okay so, American eleven isn’t the hijack at all then, right? BC (Scoggins): No he is a hijack. Rountree: He, American eleven is a hijack? BC (Scoggins): Yes. Could be a, could be a--Rountree: And he’s heading to Washington? BC (Scoggins): ---third aircraft. Rountree: It could be a third aircraft going on to Washington, do you have mode three on him sir? The rumor that AA11 was still flying set NEADS staff on a search for a plane that no longer existed. Although this information was in direct conflict with what they had previously been told, NEADS staff acted in a conservative fashion and tried to track down the “reborn” AA11. If AA11 was the plane that crashed into the World Trade Center, it was no longer an active threat; if the earlier account was incorrect, however, they had a new threat which posed a clear and present danger to the capitol region. With the incorrect information about AA11, no information about AA77 being hijacked, and little advance notice, NEADS staff were not able to track down the phantom plane heading to Washington. In truth, there was a plane en route to Washington – not AA11 but rather AA77 – which crashed into the Pentagon at 9:37am. One of the striking things about the NEADS transcripts is that there was not a lot of speculation about the cause of events, instead you hear people taking actions to learn more about the event 29 and to contain the event. It is only in the few moments when the ID Techs are not on the phone that they talk about the unfolding events and even then their conversations are brief: 9:04am (NEADS, Channel 4) Watson: Oh! Oh my God! I’d say, they say it’s pretty serious [2nd plane hitting the World Trade Center]. Stacia, who were you talkin’ to? Rountree: I was talkin’ to New York. Audio of dialing as Rountree begins trying to reach Boston Center again on the phone Now that three planes had been reported hijacked, NEADS staff began to speculate that that this was a deliberate and coordinated attack: 9:23am (NEADS, Channel 2) Nasypany: These guys are smart. Male speaker: Yeah. They know exactly what they wanted us to do. The sensemaking continued. By the end of the morning, another plane (U93) had crashed, more than a dozen aircraft had been reported hijacked (Bronner, 2006), and NEADS staff struggled to make sense of the unfolding events and to protect US airspace, as best they could. Managing the flow of information: Pushing and pulling information As events unfolded, information was coming in from various sources; NEADS had to coordinate understanding and action within their own team as well amongst the various agencies with which they interacted. NEADS staff were extremely agentic as they made sense of the evolving situation. Not only were they bracketing and labeling the information they were receiving, they were actively pulling information, by which we mean seeking out missing information to supplement or augment what they knew, and pushing information, by which we mean transmitting information to those they thought could benefit from it. 30 Pushing and pulling information was not a simple endeavor. These processes often did not work as anticipated: it was difficult to reach people, sometimes when they called for more information, none was available, and sometimes people who were expected to be able to provide information instead needed to be updated. The more frustrating and occasionally heart-stopping segments of the transcripts were the moments when NEADS staff were trying to reach people at other facilities and had the wrong number or kept getting a busy signal. Almost every time the NEADS ID techs tried to call a new phone number, they experienced problems and delays. For instance, immediately after NEADS staff heard about the hijacking, they tried to call Boston air traffic control center to ask if they had more information. 8:47am (NEADS, Channel 7) 8:47:03 – 8:47:18 Audio of dialing, then busy signal 8:47:19-8:47:33 Audio of dialing and then busy signal 8:47:34 Rountree: Shit 8:47:35 – 8:47:48: audio of dialing and busy signal. 8:47:42 Rountree: Uh, their line’s busy right now. I’m still tryin’. 8:47:49 - 8:48:02 Audio of dialing and busy signal. 8:48:03 - 8:48:15 Audio of dialing and busy signal. A few minutes later: 8:50am (NEADS, Channel 4) Audio of dialing. Automated voice: Your call cannot be completed as dialed--Dooley (off mic): Can you ask her to explain that uh--Watson: No. We can’t call long distance from the this--- [pause] Watson (off mic to colleagues): Hey, wanna dial this number? (laughs) The following quote encapsulates many of the difficulties that NEADS staff were having as they attempted to contact other centers for more information: 8:54am (NEADS, Channel 7) Rountree: Do you have a direct number for New York Military that I can call, please sir? BC (Scoggins): I… Hold on one sec. [pause] I… Hold on one second sec. 31 Rountree (off mic to colleague): Okay. I’m callin’ Boston for New York Military’s military line number. They’re gonna call us… They’re calling for a tail number but they got… I have to call American Airlines. [pause] BC (Scoggins): I have a direct [number] on me number. I don’t have their DSN number. Rountree: Okay, what’s the direct number, sir? BC (Scoggins): Six three one3… Rountree: Six three one… BC (Scoggins): Four six eight… Rountree: Four six eight… BC (Scoggins): One four two seven. Rountree: One four two seven. Copy that, thank you sir, I appreciate it. BC (Scoggins): Okay and uh, and what number do you want me to call when I….in order to give you the info on that tail number Rountree: Um, DSN five eight seven. BC (Scoggins): Okay 'kay uh, hold on, if you want to stay on the line, he’s on the line with American right now if you want to hold on--Rountree: Okay, I’ll hold on. BC (Scoggins): Great. [puts call on hold] Rountree (off-mic to colleague): Mo. Come here. There’s the number. He’s giving me the tail number from American, they’re on the line right now, but there’s the number for New York, if you want to call them, use the black phone. That’s the only phone that works. [italics added for emphasis] As you can see in the above quote, NEADS staff began to ask the air traffic controllers that they could reach how to get in contact with other air traffic control centers. The finding and sharing of contact information took up valuable time that both NEADS and the air traffic controllers could have spent managing the situation. As well, you can see a reference at the end of the quote to the fact that only one of the phones at NEADS worked for calling out to the air traffic control centers. Like the antiquated radar equipment, the phones were another technology-based ratelimiting step in NEADS’ work that morning. 3 Remaining digits of phone calls redacted for security purposes. Rountree is repeating back the area code and then three and four digits of the phone number (xxx-xxx-xxxx). The DSN number – a direct line – is also partially redacted 32 Another difficulty that NEADS encountered, once they were able to reach the air traffic control centers, is that people who were expected to be able to provide information about the situation instead often needed to be updated. Immediately after NEADS heard about the first plane crashing into the North Tower of the World Trade Center, they called New York air traffic control for more information – the quote begins with NEADS staff talking amongst themselves about the need to let New York know and to request an update about AA11 to help determine if it was the plane that crashed into the World Trade Center: 8:51am (NEADS, Channel 4) Dooley: Yeah, update New York! Watson: New York, this is Huntress I.D Dooley: See if they lost altitude on that plane [AA11] altogether. Audio of dialing NYC: New York Watson: Yes ma’am did you just hear the information regarding the World Trade Center? NYC: No. Watson: Being hit by aircraft? NYC: I’m sorry? Watson: Being hit by an aircraft. NYC: You're kidding. Watson: It's on the world news, um... Dooley (off mic to colleague): Ask 'em if he-- they still have altitude --Watson: Do you still have altitude on that aircraft that you have--NYC: No like I, like I said I, I don’t work radar around here. Watson: Yeah, you lost— NYC: Who— Watson: --you said you lost contact though? NYC: Call this number again. Call this number right here again. Watson: Yeah. No It won’t go through. NYC: Uh… Dooley: Tell her that we can’t get * Watson: * one ma’am, 468? NYC: 5959. Watson: We cannot get through to that number. Is there any other number, is that New York Military? NYC: Uh, no it’s not. Uh, that’s the only number I have for Operations here. Watson: Okay, we just want to give you a heads up that uh, there is an aircraft that did hit the World Trade Center just a few minutes ago but that, apparently it’s incidentally is that-- not-- not that guy [meaning not AA11] 33 As well, in addition to learning that New York had no new information to offer, you see again in the above quote, how much difficulty they were having reaching the right people to ask for information. About twenty minutes later, after the second plane was reported hijacked, NEADS called New York back again for an update on that plane: 9:14am (NEADS, Channel 4) Watson: New York, Huntress. I was checking on United one seven five, apparently confirmation that that could’ve been the, the second aircraft that hit the World Trade Center? NYC: Oh I, I have no idea. I would have no idea of that. Watson: Okay. Boston was telling me it was in your airspace, that’s why I’m calling. NYC: Well it’s in, it’s… It’s in New York TRACON’s airspace but I have no idea what the uh, what the plane is. Uh, I have, I know, someone told me one was an American Airlines uh, out of Boston LA--Watson: Yeah, it's American one one. NYC: But the other one, I have no idea. I have no idea. Watson You don’t, you don’t… Okay thank you. Likewise, when they contacted Washington for more information, they realized that Washington actually needed to be apprised of the situation. Note that the following phone call took place at 9:23 am – at this point, the first two planes have crashed into the World Trade Center and AA11 has just been reported as “reborn” and headed toward Washington: 9:23am (NEADS, Channel 7) Rountree: Washington, Huntress uh, reference American 11, possible hijack um, New York has called us. Do you have a mode three on him by any chance? Washington Center (WC): Uh, hold on a second. That’s the first I’ve heard of that. AA 11, let’s see what we got. Nothin’ scored on American 11, let’s see if may it’s um, zero one one. No, don’t have anything on ‘em. Rountree: Okay ‘cause apparently two aircraft crashed into the World Trade Center. We thought one of them was American 11. New York called us back saying it was on its way to Washington still being hijacked. WC: Uh, well I’ve only here about ten minutes--Rountree: Okay. WC: ---I’m not real sure about what’s goin’ on with that uh, but we don’t have anything on it--- 34 A few minutes later Boston called NEADS to tell them about an aircraft had been sighted six miles from the White House. NEADS then called Washington air traffic control for more information about the flight: 9:38am (NEADS, Channel 7) WC: Washington. Rountree: Washington, Huntress uh, Boston just called us. They said that they had information about some aircraft that was six miles southwest of the White House that but appears to be deviating. Because of-WC: Boston does? Rountree: --Boston called and said that I'd have had to get the information from you on it. They don’t have the call type of the aircraft, they don’t have any codes for the aircraft, they just know that there’s one that's was six miles southwest of the White House. WC: Okay well Boston’s airspace doesn’t even come close to that. I don’t know how they got that information but uh, we don’t, hey… WC (speaking off mic): * aircraft six miles from the White House deviating. WC (muffled): Boston Center’s * (off-mic conversation) WC: Okay we… We don’t know anything about that. Rountree: Okay you don’t know anything about that, oh… WC: No we don’t do not and it’s probably just a rumor but uh, if you might want to call uh, uh, National or Andrews, somewhere, somebody, somebody like that, but we don’t know anything about that. Rountree: Okay, copy, thanks. The information that a plane was six miles from the White House wasn’t a rumor but in fact critical information about AA77 in the moments just before it hit the Pentagon. NEADS techs continued to push and pull information, trying to make sense of the unfolding events. One of archival documents from the 9/11 Commission illustrates the sheer volume of work that the ID Techs were doing to gather and share information following the “rebirth” of AA11 (Figure 3). -- Insert Figure 3 around here -- 35 As you can see in Figure 3, NEADS ID Techs made over 27 phone calls to five different air traffic control centers and to the Canadian branch of NORAD within the time span of an hour. It is important to mention that Rountree, Watson, and Dooley were making decisions about who to call without direction from Major Nasypany. Due to the communication breakdown between NEADS and the FAA, NEADS was operating in an information-poor environment – one of the greatest contributions the ID Techs made to the emergence of shared knowledge was enlarging the scope of available information from which to make sense. Reconciling conflicting accounts In addition pushing and pulling information, one of the mechanisms that facilitated the emergence of shared understanding was reconciling conflicting accounts. Team members received information from different sources and sometimes the information from one source conflicted with information from a different source. NEADS staff had to decide what information to privilege and what accounts or sources to pay attention to. Information was seen as reliable in one of two ways: reliability based on established sources (i.e. originated from higher up in the military chain of command) and informal sources (where reliability depended on previous experience). NEADS is a military organization and, as such, chain of command was important in determining what information was seen as valid and trustworthy. Initially NEADS staff relied on established sources for information but, as events unfolded, they were not getting the information they needed. As mentioned earlier in the paper, the FAA was not passing along information to 36 NEADS. For the first hijacking, NEADS received official confirmation through established channels: 9:01am (NEADS, Channel 7) Dooley: Huntress I.D., Sergeant Dooley, how may I help you? David: Yeah, it’s First Air Force, Sergeant David. We just confirmed from down here that was one and the same—the hijack and the uh, the plane hitting the building. Dooley: First Air Force confirmation uh, one and the same, American Airlines and uh, into the World Trade Center. Copy? Is that what you said, sir? David: That’s copy, yes. Dooley: Ah--David: Came from uh--Dooley: Came from who? David: ---from First Air Force, let me get the person’s name. Dooley: Okay. David: Let me get that official, hold on. David: Okay, Dawne Deskins Dooley: Okay, thank you. Recall that NEADS reports to First Air Force (CONR) in Tyndall, FL. This phone call is the official confirmation from NEADS’ commanding unit that AA11 was the plane that crashed into the World Trade Center. The caller, Sgt David, is very clear about indicating where the confirmation originated, including giving the name of the person providing the confirmation. This is a level of detail not present in any other confirmations that NEADS received because this was the one and only official confirmation. Coincidentally, it is worth mentioning that Dawne Deskins, who is usually at CONR, was at NEADS in the Battle Cab that morning due to the training exercise – regardless of this change in location, the confirmation still comes through the regular communication channels. During the subsequent hijackings and crashes, for reasons that are still unclear, the flow of information down the official hierarchy to the NEADS ID Techs halted. Instead, NEADS ID Techs received information directly from air traffic control centers. However, the MCC and Weapons Techs continued to receive information from higher 37 authorities, in part because the CONR Battle Commander, Col. Marr, was at NEADS that morning sitting a few feet away from the MCC. As a result of not receiving information from established sources, NEADS ID Techs began to rely on informal sources, which they judged as reliable based on their experience of whether or not the sources had repeatedly demonstrated that they had useful information to pass along. As the morning progressed, it became apparent the New York and Washington rarely had information to contribute and often were missing essential information. In contrast, Boston – particularly Colin Scoggins – emerged as an unlikely source of information. In fact, Scoggins was NEADS’ primary source of information about unfolding events. From the time of the first hijacking, against normal reporting protocol, he started phoning NEADS directly (rather than going through the formal channels). NEADs learned an enormous amount of information that morning from Scoggins: he informed them that a second plane crashed into the World Trade Center (see p. 30 of this document), that the second plane was likely U175, that there was a hijacked plane headed toward the White House, and that another plane had crashed into the Pentagon. These were all vital pieces of information that shaped NEADS’ understanding of and response to the situation. NEADS had such little information to work with that even a few details made a difference. In addition to timely and (mostly) accurate information, Scoggins also provided some details such as the general location of planes or the direction of flight. Those details aided NEADS in their search. Below is an excerpt of Scoggins’ call to NEADS to let them know of a plane approaching the White House: 38 9:35am (NEADS, Channel 7) Rountree: Huntress I.D. * how (UNINTEL) can I help you? BC: We have a report of an aircraft six miles southeast of the White House. Rountree: Six miles southeast of the White House? BC: Yup. East-- Southeast… He’s he moving away? Rountree: Southeast * from the White House. BC: Air-- Aircraft is moving away. Rountree: Moving away from the White House. BC: Yeah. Rountree: Okay but what, is [unintelligible]? BC: We, we believe just, we just have to verify the aircraft. We’re not sure who it is. Uh, if you want to hold on a second--Rountree: Okay, copy. BC: ---we got people down here there looking. Rountree: Okay 'kay copy. BC: What was that position? Six… yeah, six southwest. Six southwest not southeast of the White uh, White House, deviating away. Rountree: Deviating away, you don’t know what type aircraft, you don’t know who he is. BC: Nothing, nothing, that’s why--Rountree: ---DSI--BC: ---nothing We're over here in Boston so I have no clue. That--hopefully somebody in Washington but I thought someone who was watching would have a better information for you. Rountree: Okay. BC: Is this a good number to keep calling? Rountree: Yeah, this is a great number to keep calling. As events unfolded, NEADS staff demonstrated their increasing trust in Scoggins. Shortly after the second plane was hijacked, Watson called Boston Center back to see if they learned anything more about the number of “souls on board” U175. She spoke with Scoggins, who began to ask questions about what the planned military response was to the unfolding situation. In a remarkable deviation from normal reporting protocol, the NEADS Techs connected Scoggins directly to Major Nasypany. 9:17am (NEADS, Channel 2) Dooley: Major. Major, we need you guys to… We need you to talk to him a minute, Major Nasypany, just give me the go ahead— Nasypany: Go ahead. BC (Scoggins): Yes, Colin Scoggins, Boston Center Military. 39 Nasypany: Hey, how are you doin’, it’s Major Nasypany. BC (Scoggins): How’re you doin’? Um, we have uh, uh, could we shut every… Nobody is departing Boston and all in the whole airspace Boston Center. We’ve shut all aircraft down and we’re rerouting New York metro airport. Our only concern is that there are aircraft in the sky and in case any more of 'em divert or start uh, starting turning or whatever they’re gonna do, I, we were just wondering you do have people on alert that we--Nasypany: I got fight… I got fighters in Whiskey 105 right now [Whisky 105 is the military’s name for an airspace located off the coast where the Otis fighters are in a holding pattern]. I have a tanker there as well. I got other aircraft on alert down at Langley. BC (Scoggins): Okay. Nasypany: And I’m getting ready to, and I have trackers uh, over JFK, over Boston, and in that area right now, just lookin’ for anything suspicious. BC (Scoggins): Anything suspicious, okay. And uh, we’ll let you know about the internationals. We’re not sure what we’re doing with them yet at this time. But-Nasypany: Okay, so well JF… JFK and Boston are shut down, correct? BC (Scoggins): We have shut down Boston. I’m not sure if New York Center has now but we are-- are rerouting all our-- any aircraft at this time from that's (UNINTEL) for New York, we are rerouting and putting 'em somewhere else. Nasypany: Okay. And if you get anything--- if you----if any-- any of your controllers see anything that looks sorta kind of squirrelly, just give us a yell. We’ll get those fighters in that location. --BC (Scoggins): Okay. Alrighty. -Nasypany: Okay? BC (Scoggins): Thank you very much. After they accumulated experience with various information sources, team members began to tell each other which sources of information were reliable and which were not. These evaluations are sprinkled throughout the transcripts. In the following quote, Dooley is talking to the other NEADS ID Techs and expressing frustration: 9:30am (NEADS, Channel 4) Dooley: See this guy, they… Boston is the only one giving us any kind of decent freakin’ input. A few minutes later, Rountree also talks to the ID Techs about who is sharing reliable information: 40 9:44am (NEADS, Channel 7) Rountree: (sighs heavily) Okay, Mo [Maureen Dooley, supervisor NEADS ID Techs]. The aircraft that he said is at the White House is now near the Pentagon. I don’t know where the hell they’re gettin’ their intel info. I said Washington doesn’t have a ...has no clue. When I called Washington about it, they didn’t know what the hell was goin’ on. Likewise at 9:55am (NEADS Channel 7): Rountree: (sighs) Okay, Cleveland’s line is still busy. Boston’s the only one that passes us this information. Washington doesn’t know shit. This pattern of reliability persisted throughout the morning: New York and Washington continued to lag behind the developing understanding of events and Boston continued to have new and useful information. DISCUSSION AND CONCLUSIONS The goal of our study was to gain greater insight into how understanding of an unexpected event develops and changes over time within a team. Our analysis revealed that shared understanding went through two transitions: first, as the team realized that the events were not part of the previously scheduled training exercise but instead were occurring in the real world, and second when they realized that the events were not a conventional hijacking but instead were a coordinated attack on the US, with hijackers using planes as weapons. We identified two mechanisms that facilitated those transitions in understanding: actively managing the flow of information and reconciling conflicting accounts. As NEADS staff actively managed the flow of information, they pulled information from various sources as they attempted to ascertain what was happening and pushed information to others in their network that they thought might benefit from that information. As NEADS staff reconciled conflicting accounts, they had to determine 41 what information to privilege and pay attention to – information was seen as reliable if it came from established sources (i.e. from higher up in the military chain of command) or from informal sources that had demonstrated over time that they had timely and accurate information. Our study builds upon and extends the current models of shared understanding. Our findings suggest that teams in dynamic settings need the capabilities that have been identified in studies conducted in more static contexts: that is, NEADS staff needed to know where to find information (Wegner, 1995; Austin, 2003; Bunderson, 2003; Lewis, Lange, and Gillis, 2005; Reagans, Argote, and Brooks, 2005; Lewis and Herndon, 2011), to assess expertise (Bunderson, 2003), and to share non-commonly held information (Okhuysen and Eisenhardt, 2002; Stasser and Titus, 2003). However, they also needed to be able to cope with large volumes of information without suffering from information overload, to discern what information required further attention, to actively seek out information to supplement what they know and to pass along information to those who needed it, to determine what information or accounts were reliable, and to do all this under enormous time pressure in a context where the consequences of failure were high. Our findings imply that it is important to pay attention to the type of transition in understanding, as some transitions in understanding are more difficult to accomplish that others. In our future analysis, we hope to expand our findings by exploring in more detail the influence of different team members on the development of shared understanding and the response to the evolving event – in particular, focusing on whether the centrality of the actor matters. For instance, it may 42 be that for coordinated action, the alignment of and accuracy of shared understanding is most important for central actors but less important for peripheral actors. Our findings serve as a reminder that the development of shared understanding, while important, is only one aspect of successfully managing an unexpected event. Rather than an accumulation of small problems and interruptions (Rudolph and Repenning, 2002), this disaster involved an accumulation of large problems. The sheer quantity of events – four hijacked planes, multiple other suspected hijackings – all contributed to an overwhelming situation. NEADS staff quickly and accurately made sense of unfolding events and deployed the available resources as best they could, often deviating from protocol to adapt their response to the novel and rapidly changing situation. Yet, although the NEADS staff did a heroic job, the demands of the situation – in many ways – eclipsed their resources. Other parts of the system in which they were embedded failed them – the FAA did not pass along critical information and, by the time NEADS was informed of the hijackings, they had little to no time to effectively intervene in any of the hijackings. At the end of the day, the only actions that definitively saved lives were undertaken by the passengers on U93, who rushed the cockpit, causing the plane to crash before it reached the terrorist’s intended target in Washington DC. Our study contributes to the sensemaking literature by highlighting that the very “flow of experience” that provides the raw materials for sensemaking is not a given but is, instead, malleable. We found that the amount of incoming information, which contains the cues that were noticed, bracketed, given meaning, and that formed the basis for action (Weick, Sutcliffe, and 43 Obstfeld, 2005), could be modified by the team members who were engaged in sensemaking. NEADS staff significantly enlarged the flow of information that was available to them through actively pushing and pulling information. Increasing the flow of information can, paradoxically, either reduce or heighten uncertainty. More information helps reduce uncertainty if the accumulated data provides more “data points” and helps to illuminate an underlying pattern or problem. However, more information can also heighten uncertainty, particularly if there are conflicting accounts. The need to reconcile conflicting accounts is one of the primary sensemaking challenges that we see in our data. Unlike previous studies that have explored conflicting accounts in settings where events unfold over longer periods of time (Maitlis, 2005; Kaplan, 2008), our setting highlights the challenges that teams face when conflicting accounts must be reconciled within an extremely compressed time frame to enable further action. An important aspect of reconciling conflicting accounts is determining what information to pay attention to. Our study joins a growing body of work that emphasizes the need for a closer examination of the link between attention and sensemaking (Ocasio, 1997; Ocasio and Joseph, 2005; Rerup, 2009; Nigam and Ocasio, 2010). Lastly, our study also contributes to the literature on team boundary spanning. NEADS is not just engaged in team boundary spanning, defined as “the team’s actions to establish linkages and mange interactions with parties in the external environment” (Marrone, 2010, p. 914), NEADS is a boundary spanning team. In order to defend US airspace, NEADS is explicitly designed to coordinate understanding and activities within their own team (i.e. intra-team coordination) as 44 well as coordinate understanding and activities with the various other teams and agencies with which they interact (i.e. inter-team coordination), including the FAA, individual civilian air traffic control centers, military bases and pilots, military air traffic controllers. Many of the teams that routinely manage unexpected events can be thought of as boundary spanning teams – for example, teams at CDC that manage emerging infectious threats, such as the West Nile Virus outbreak, must coordinate their efforts with front-line health care personnel as well as various local, state, and federal agencies; FEMA teams must coordinate many agencies during a disaster; and FBI teams must coordinate multiple law enforcement agencies during large scale investigations. However, there has been little discussion of boundary spanning teams in the team boundary spanning literature. Our data suggests that this extreme form of boundary spanning may provide insight into how boundary spanning functions in dynamic and uncertain contexts. The role of context in team boundary spanning has not been fully explored – almost all studied on boundary spanning activities have been conducted in conventional organizational contexts, focusing primarily on new product development, R&D, or consulting teams (see Marrone, 2010 for a recent review of boundary spanning studies). As a result, our current understanding of what team boundary spanning involves may include important boundary conditions that have not been fully explored. Context may shape the relative importance and enactment of boundary spanning activities. For example, in conventional settings, the team boundary spanning activity of general information search – the actions that access outside parties, usually industry experts, for general or technical information or expertise – is theorized to involve low levels of interdependence or coupling (Marone, 2010, p. 917). However, we see in our data that information exchange is a critically important function of the team which is highly interdependent and tightly coupled. 45 REFERENCES Austin, J. R. 2003 "Transactive memory in organizational groups: The effect of content, consensus, specialization, and accuracy on group performance." Journal of Applied Psychology, 88: 866878. Bechky, B. A., and G. A. Okhuysen 2011 "Expecting the unexpected? How SWAT officers and film crews handle surprises." Academy of Management Journal, 54: 239-261. Bronner, M. 2006 "9/11 live: The NORAD tapes." Vanity Fair. http://www.vanityfair.com/politics/features/2006/08/norad200608 Bunderson, J. S. 2003 "Recognizing and utilizing expertise in work groups: A status characteristics perspective." Administrative Science Quarterly, 48: 557-591. Burke, C. S., K. C. Stagl, E. Salas, L. Pierce, and D. Kendall 2006 "Understanding team adaptation: A conceptual analysis and model." Journal of Applied Psychology, 91: 1189-1207. Cannon-Bowers, J. A., and E. Salas 2001 "Reflections on shared cognition." Journal of Organizational Behavior, 22: 195-202. Faraj, S., and Y. Xiao 2006 "Coordination in fast-response organizations." Management Science, 52: 1155-1169. Farmer, J. J., J. A. Azzarello, M. L. S. Kara, K. Shaeffer, G. S. Brown, D. J. Hyde, L. M. Sullivan, and C. M. Pereira 2011 "A New Type of War: The Story of the FAA and NORAD Response to the September 11, 2001 Attacks." Rutgers Law Review. http://www.rutgerslawreview.com/2011/a-new-type-of-war/ Filson, L. 2003 Air War Over America: Sept 11 Alters Face of Air Defense Mission. Tyndall Air Force Base, FL: First Air Force, Public Affairs Office. Gittell, J. H., R. O. B. Seidner, and J. Wimbush 2008 "A relational model of high performance work systems." Academy of Management Proceedings: 1-6. Griffin, M. A., A. Neal, and S. K. Parker 2007 "A new model of work role performance: Positive behavior in uncertain and interdependent contexts." Academy of Management Journal, 50: 327-347. 46 Huber, G. P., and K. Lewis 2010 "Cross-understanding: Implications for group cognition and performance." Academy of Management Review, 35: 6-26. Kaplan, S. 2008 "Framing contests: Strategy making under uncertainty." Organization Science, 19: 729752. Kara, M. 2010 "Exercise War Games." http://www.oredigger61.org/?cat=7 Klimoski, R., and S. Mohammed 1994 "Team mental model: Construct or metaphor?" Journal of Management, 20: 403-437. Lee, T. W., T. R. Mitchell, and C. J. Sablynski 1999 "Qualitative research in organizational and vocational psychology, 1979-1999." Journal of Vocational Behavior, 55: 161-187. Levin, A., M. Adams, and B. Morrison 2002 "Clearing the skies." USA Today. Lewis, K., and B. Herndon 2011 "Transactive memory systems: Current issues and future research directions." Organization Science 22: 1254-1265. Lewis, K., D. Lange, and L. Gillis 2005 "Transactive memory systems, learning, and learning transfer." Organization Science, 16: 581-598. Maitlis, S. 2005 "The social processes of organizational sensemaking." Academy of Management Journal, 48: 21-49. Marrone, J. A. 2010 "Team boundary spanning: A multilevel review of past research and proposals for the future." Journal of Management, 36: 911-940. Mathieu, J. E., T. S. Heffner, G. F. Goodwin, E. Salas, and J. A. Cannon-Bowers 2000 "The influence of shared mental models on team process and performance." Journal of Applied Psychology, 85: 273-283. Meyerson, D., K. E. Weick, and R. M. Kramer 1996 "Swift trust and temporary groups." In R. M. Kramer, and T. R. Tyler (eds.), Trust in Organizations: Frontiers of Theory and Research. Thousand Oaks, CA: Sage Publications. 47 National Commission on Terrorist Attacks Upon the United States 2004. The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States, Official Government Edition. New York, NY: W.W. Norton & Company. Nigam, A., and W. Ocasio 2010 "Event attention, environmental sensemaking, and change in institutional logics: An inductive analysis of the effects of public attention to Clinton's health care reform initiative." Organization Science, 21: 823-841. NORAD 2012a "About CONR." http://www.norad.mil/about/CONR.html 2012b "About NORAD." http://www.norad.mil/about/index.html Ocasio, W. 1997 "Towards an attention-based view of the firm." Strategic Management Journal, 18: 187206. Ocasio, W., and J. Joseph 2005 "An attention-based theory of strategy formulation: Linking micro- and macroperspectives in strategy processes." Strategy Process, 22: 39-61. Okhuysen, G. A., and K. M. Eisenhardt 2002 "Integrating knowledge in groups: How formal interventions enable flexibility." Organization Science, 13: 370-386. Reagans, R., L. Argote, and D. Brooks 2005 "Individual experience and experience working together: Predicting learning rates from knowing who knows what and knowing how to work together." Management Science, 51: 869881. Rerup, C. 2009 "Attentional triangulation: Learning from unexpected rare crises." Organization Science, 20: 876-893. Rico, R., M. Sanchez-Manzanares, F. Gil, and C. Gibson 2008 "Team implicit coordination processes: A team knowledge-based approach." Academy of Management Review, 33: 163-184. Rudolph, J. W., and N. P. Repenning 2002 "Disaster dynamics: Understanding the role of quantity in organizational collapse." Administrative Science Quarterly, 47: 1-30. Shrivastava, P., I. I. Mitroff, D. Miller, and A. Miglani 1988 "Understanding industrial crises." Journal of Management Studies, 25: 285-303. 48 Snook, S. A. 2000 Friendly Fire. Princeton, NJ: Princeton University Press. Stasser, G., and W. Titus 2003 "Hidden profiles: A brief history." Psychological Inquiry, 14: 304-313. Vaughan, D. 1996 The Challenger Launch Decision: Risky Technology, Culture, and Deviance at NASA. Chicago: The University of Chicago Press. Waller, M. J., N. Gupta, and R. C. Giambatista 2004 "Effects of adaptive behaviors and shared mental models on control crew performance." Management Science, 50: 1534-1544. Wegner, D. M. 1995 "A computer network model of human transactive memory." Social Cognition, 13: 319339. Weick, K. E. 1990 "The vulnerable system: An analysis of the Tenerife air disaster." Journal of Management, 16: 571-593. Weick, K. E. 1993 "The collapse of sensemaking in organizations: The Mann Gulch disaster." Administrative Science Quarterly, 38: 628-652. Weick, K. E. 1995 Sensemaking in Organizations. Thousand Oaks, CA: Sage Publications. Weick, K. E. 2007 "The generative properties of richness." Academy of Management Journal, 50: 14-19. Weick, K. E., and K. M. Sutcliffe 2007 Managing the Unexpected: Resilient Performance in an Age of Uncertainty, Second ed. San Francisco, CA: Jossey-Bass. Weick, K. E., K. M. Sutcliffe, and D. Obstfeld 2005 "Organizing and the process of sensemaking." Organization Science, 16: 409-421. Yin, R. K. 2003 Case Study Research: Design and Methods, Third ed. Thousand Oaks, CA: Sage Publications. 49 FIGURE 1 NEADS and the agencies with which it interacted FAA Air Traffic Services Command Center (ATSCC) Herndon, VA NEADS Rome, NY Boston Indianapolis Cleveland NYC Washington Otis Air Force Base Langley Air Force Base Fleet Air Control and Surveillance Facility CONR (Continental NORAD region) Co-located with First Air Force, Tyndall Air Force Base, FL 50 FIGURE 2 Timeline of key events on 9/11 H Hijacked planes Time NEADS notified American 11 H (AA11) 8:37am 8:46am 8:22am 1st WTC tower United 175 H Time plane crashed False report: AA11 “reborn” 9:21am 9:03am (U175) 8:42am American 77 Time plane was hijacked 2nd WTC tower H 9:34am (AA77) 8:51am United 93 H (U93) 9:23am 9:37am Pentagon 10:03am 10:14am Shanksville, PA Planes thought to be hijacked United 1989 9:41am Canadian plane 10:03am Unknown plane (turns out to be Langley fighter) 51 10:07am FIGURE 3 Pushing and pulling information: NEADS ID Tech phone calls between 9:20-10:20am Document from 9/11 Commission investigation To interpret the above document: ZBW = Boston Air Route Traffic Control Center ZNY = New York Air Route Traffic Control Center ZDC = Washington Air Route Traffic Control Center ZID = Indianapolis Air Route Traffic Control Center ZOB = Cleveland Air Route Traffic Control Center DRM/CH column – the right hand number (CH) corresponds to the NEADS Channels (i.e. 4 = Channel 4) 52 APPENDIX 1 First transition in understanding (from simulation exercise to real world event) Timeline created from Kara, 2011 data Coordinated attack Conventional hijacking Exercise 10:20 ❽ 10:10 ❼ 10:00 ❻ 9:50 9:40 ❺ 9:30 9:20 ❹ 9:10 9:00 ❷ ❸ 8:50 8:40 ❶ ❾❿ 11 12 13 13 Number 1 2 3 Time 8:37am 8:43am 8:44am 4 8:57am 5 9:15am 6 9:30am 7 9:40am 8 9 9:46am 10:06am 10 10:08am 11 10:11am 12 10:14am 13 10:20am Content Phone call from Boston to inform NEADS of hijacking Major Fox, says he’s “never seen so much real world activity during an exercise” NEADS Air Surveillance Technician rearranges staff to meet demands of hijacking and comments, “the exercise is gonna’ have to go on a little bit of hold here, that’s all” Nasypany joking with Col. Marr (Battle Cab), “think we put the exercise on hold, what do you think? Off duty staff member calls in to ask if exercise on hold. Told “no, not at this time, no, but I think they are going to” Nasypany instructs staff to turn off sim switches, which have started simulation inputs automatically, “Get rid of that crap” quote Head of the surveillance section talking about what he can see on scopes, “Get the goddam friendlies out of my face” [not sure this is simulation related] Sgt Powell calls unit for help, they joke “Are you sure this isn’t an exercise” Master Sgt McCain takes call, asked about whether exercise proceeding and replies, “the exercise was cancelled, torn all that apart, sir” McCain jokes to Dooley about report of bomb in U93, “if this is an exercise input, it’s a good one!” Cpt Nagel, Weapons Controller, receives call from Cheyenne Mountain control requesting all exercise inputs be terminated. Answers phone initially saying, “Sim” Sgt Richmond, Air Surveillance Technician, receives follow up call from Cheyenne and told to terminate exercise inputs, “exercise side only” He responds, “looks like all our exercise tracks are down, are gone” Cheyenne Mountain again verifying exercise tracks cancelled. NEADS staff respond, “Northeast, nothing going out, exercise” 53 APPENDIX 2: Second transition in understanding from conventional hijack to attack on US Coordinated attack Conventional hijacking Exercise 10:20 10:10 10:00 ❿ 11 12 ❼❽❾ 9:50 9:40 ❻ 9:30 ❺ 9:20 ❹ 9:10 ❸ 9:00 8:50 8:40 ❶❷ 13 14 13 Number 1 2 3 Time 8:37am 8:40am 8:46am 4 8:51am 5 6 7 8 9 10 8:56am 9:03am 9:21am 9:21am 9:21am 9:36am 11 12 13 14 9:37am 9:40am 10:07am 10:07am Content Phone call from Boston to inform NEADS of hijacking of AA11 NEADS talk with Boston Center, “I guess there’s been some threats to the cockpit” Nasypany, “And probably right now with what’s going on the cockpit it’s probably really crazy. So, it probably needs to... that will simmer down and we’ll probably get some better information” NEADS learns of WTC crash from person watching CNN, “I hope that’s not our plane” “I heard it was a civilian aircraft...” Rumor of civilian aircraft not 737 hitting WTC Learn about 2nd hijacking and WTC crash Scoggins tells NEADS ID Techs about 3rd hijacking False report that AA11 reborn Nasypany, ”Chase this guy down” Nasypany, “I got an aircraft six miles east of the White House! Get your fighters there as soon as possible!” Hear Pentagon hit; Nasypany, “Can’t protect my National Capitol Region” “Delta 89, that’s the hijack. They think it’s a possible hijack” “Baltimore is saying something about an aircraft over the White House” “We’ve got United 93 out here... that has a bomb on board” 54
© Copyright 2026 Paperzz