U.S. Intercepting Messages Hinting At A New Attack, NYTimes
Excerpts: American intelligence agencies have intercepted a
vague yet troubling series of communications among Al Qaeda operatives over
the last few months (...)
But just as last summer's threats left counterterrorism analysts guessing
about Al Qaeda's intentions, (...), the new interceptions are so general that
they have left President Bush and his counterterrorism team in the dark about
the time, place or method of what some officials refer to as a second-wave
attack. As a result, the government is essentially limited to taking broad
Clues Surfaced Before Sept. 11, AP/NYTimes
Excerpt: Larry Johnson,
deputy director of the State Department's office of counterterrorism in
1989-93, criticized Rice for discounting the possibility that a Sept. 11-type
attack could have been foreseen.
``She's foolish in saying that. Intelligence analysts are paid to imagine
the unimaginable. That information was in their files, and if they weren't
imagining it, that is a failure of intelligence and a failure of
imagination,'' he said.
Another clue to Sept. 11 came in 2000, and it was partially a result of the
1995 Philippine investigation.
Senate's Shelby Blasts FBI on Flight School Memo, Reuters/NYTimes
Excerpts: In a 1996
confession a Pakistani, (...), said he planned to use his training from U.S.
flight schools to fly a plane into CIA headquarters outside Washington or
another federal building, the Times reported.
And a report for the CIA released on Friday said in 1999 that bin Laden
could crash a plane into the Pentagon, the CIA or the White House. The White
House and other senior government officials have all said that before Sept. 11
it was never imagined that an attack might involve hijacked airliners.
Excerpt: To defeat cyberterrorists, computer
systems must be designed to work around sabotage. David A. Fisher's new
programming language will help do just that. (...)
"Easel allows us to simulate unbounded systems even when given incomplete
information about their state," Fisher says. "So I can write programs that
help control the power grid or help prevent distributed denial of service
attacks" such as those that knocked out the CNN and Yahoo! Web sites a few