Terrorist organization have demonstrated in the  past that they do not
use the same methodology twice.  A suicide bomber followed by a car bomb
followed by an aircraft followed by...?

There is a critical information infrastructure (CII).  We know that and
the President has acknowledged it.

We should "keep an eye out" on the CII and do what we can to prevent
that from being next.

Let's all do what we can.
-- 
James W. Meritt, CISSP, CISA
Booz, Allen & Hamilton
phone: (410) 684-6566

Reply via email to