From: jya@pipeline.com (John Young)
To: cypherpunks@toad.com
Message Hash: a59044388fcba4871700fae5d778fda75b5b4a273833acf4adcaf5893ac0254d
Message ID: <199608241449.OAA21593@pipe6.t1.usa.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-08-24 21:35:15 UTC
Raw Date: Sun, 25 Aug 1996 05:35:15 +0800
From: jya@pipeline.com (John Young)
Date: Sun, 25 Aug 1996 05:35:15 +0800
To: cypherpunks@toad.com
Subject: HYS_ter
Message-ID: <199608241449.OAA21593@pipe6.t1.usa.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
8-24-96. NYP:
"Investigators Look at History of Terrorism to Compile a
List of Suspects in Crash."
Over the years, terrorists have demonstrated frightening
expertise in making bombs and concealing them. "The fact
of the matter is that we found out terrorists could
create bombs that were very, very difficult to detect,"
says the FBI.
"A fairly small amount, well placed, can do the job,"
said Dr. Jimmie Oxley, of the NRC's airline security
committee. "A colleague once said he could do it with a
gram, in the right place."
Bomb-making technology continually advances, as Israeli
authorities discovered in 1986 when they intercepted a
suitcase being smuggled in from the Gaza Strip. The
terrorists appeared to have spun the suitcase on a
centrifuge that allowed the plastic explosive to flow
into its corners and virtually disappear.
Ariel Merari, who has studied hundreds of terrorist
incidents, says bombers are limited only by their own
imaginations when it comes to building bombs and finding
ways to get them aboard airliners. "However," he said,
"the use of sophisticated bombs are more likely to be
the work of state-sponsored terrorism than anything
else."
-----
http://jya.com/hyster.txt (11 kb) Via: www.anonymizer.com
HYS_ter
Return to August 1996
Return to “jya@pipeline.com (John Young)”
1996-08-24 (Sun, 25 Aug 1996 05:35:15 +0800) - HYS_ter - jya@pipeline.com (John Young)