Click Below to See Previously Downloaded Article
This is one
of many documents on the 9/11 summary to have disappeared. The link disappeared
from the USA Today website sometime in January or February of 2005.
Because this information appears to have disappeared, we provide the text
of the article below. To see our previously downloaded copy of the article
Hijackers' e-mails sifted for clues Computer messages
were sent uncoded
By Kevin Johnson
WASHINGTON -- Federal authorities believe that some of the 19 hijackers involved in the Sept. 11 terrorist attacks were using computers in all-night Kinko's stores and cybercafes in South Florida to coordinate their activities in the weeks before the assaults.
Investigators have amassed what they described as a ''substantial'' amount of e-mail traffic among the hijackers. Some of the messages were exchanged in a mix of English and Arabic.
None of the communications, authorities said Sunday, involved the use of encryption or other code to disguise the contents of the messages.
At least two laptop computers seized in the United States were being examined closely by investigators. They hope to determine whether the machines contained information that could help identify associates of the hijackers in this country or provide leads about future terrorist attacks, a senior law enforcement official said.
The disclosure appeared to be further evidence that the hijackers felt free to conduct their business in the open without much fear they would be discovered.
Late last month, law enforcement officials said they believed that the hijackers or their associates did extensive scouting missions on various airline routes before settling on flights originating in Boston, Newark, N.J., and Washington.
Investigators said they believe that the hijackers selected the four flights they commandeered Sept. 11 because passenger loads generally were light and the fuel tanks on the jets, all on transcontinental routes, were full.
Official interest in the hijackers' methods of communication comes as the largest criminal investigation in U.S. history continues to widen. The attacks left nearly 6,000 people dead or missing.
FAIR USE NOTICE: This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of criminal justice, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner.
See our exceptional archive of revealing news articles.
Please support this important work: Donate here.
www.momentoflove.org - Every person in the world has a heart
www.personalgrowthcourses.net - Dynamic online courses powerfully expand your horizons
www.WantToKnow.info - Reliable, verifiable information on major cover-ups
www.weboflove.org - Strengthening the Web of Love that interconnects us all
Subscribe/Unsubscribe/Change email address: The WantToKnow.info email list (two messages a week)