Below to See Previously Downloaded Article
This is one
of many documents on the 9/11 summary to have disappeared. The link disappeared
from the USA Today website sometime in January or February of 2005.
Because this information appears to have disappeared, we provide the text
of the article below. To see our previously downloaded copy of the article
Hijackers' e-mails sifted for clues Computer messages
were sent uncoded
By Kevin Johnson
WASHINGTON -- Federal authorities believe that some of the 19 hijackers
involved in the Sept. 11 terrorist attacks were using computers in all-night
Kinko's stores and cybercafes in South Florida to coordinate their activities
in the weeks before the assaults.
Investigators have amassed what they described as a ''substantial'' amount
of e-mail traffic among the hijackers. Some of the messages were exchanged
in a mix of English and Arabic.
None of the communications, authorities said Sunday, involved the use
of encryption or other code to disguise the contents of the messages.
At least two laptop computers seized in the United States were being
examined closely by investigators. They hope to determine whether the
machines contained information that could help identify associates of
the hijackers in this country or provide leads about future terrorist
attacks, a senior law enforcement official said.
The disclosure appeared to be further evidence that the hijackers felt
free to conduct their business in the open without much fear they would
Late last month, law enforcement officials said they believed that the
hijackers or their associates did extensive scouting missions on various
airline routes before settling on flights originating in Boston, Newark,
N.J., and Washington.
Investigators said they believe that the hijackers selected the four
flights they commandeered Sept. 11 because passenger loads generally were
light and the fuel tanks on the jets, all on transcontinental routes,
Official interest in the hijackers' methods of communication comes as
the largest criminal investigation in U.S. history continues to widen.
The attacks left nearly 6,000 people dead or missing.
FAIR USE NOTICE: This site contains
copyrighted material the use of which has not always been
specifically authorized by the copyright owner. We are making
such material available in our efforts to advance understanding
of criminal justice, political, human rights, economic, democracy,
scientific, and social justice issues, etc. We believe this
constitutes a 'fair use' of any such copyrighted material
as provided for in section 107 of the US Copyright Law. In
accordance with Title 17 U.S.C. Section 107, the material
on this site is distributed without profit to those who have
expressed a prior interest in receiving the included information
for research and educational purposes. For more information
go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site
for purposes of your own that go beyond 'fair use', you must
obtain permission from the copyright owner.