Terrorist organization have demonstrated in the past that they do not use the same methodology twice. A suicide bomber followed by a car bomb followed by an aircraft followed by...? There is a critical information infrastructure (CII). We know that and the President has acknowledged it. We should "keep an eye out" on the CII and do what we can to prevent that from being next. Let's all do what we can. -- James W. Meritt, CISSP, CISA Booz, Allen & Hamilton phone: (410) 684-6566