Search Details

Word: contains (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...Sept. 11. A terrorist group prepared to murder more than 6,000 civilians would feel no compunction about killing 60,000--or 600,000--if it could deploy the necessary weapons of mass destruction. And so the fear of such an attack--and the government's hasty efforts to contain the threat--became the nation's No. 1 item of business...

Author: /time Magazine | Title: A Clear And Present Danger | 10/8/2001 | See Source »

Germs is peppered with internal contradictions. Does a 5-lb. bag of anthrax contain enough spores to kill thousands or, as the book also claims, every man, woman and child on the planet? (The first estimate is much closer to the mark...

Author: /time Magazine | Title: America's First Bioterrorism Attack | 10/8/2001 | See Source »

...will be 20 years ago next week that Egyptian militants assassinated President Anwar Sadat. The leader of the group responsible is an ally of Osama bin Laden. Mubarak has no desire to play so open a role in the upcoming war as to anger extremists, but he can probably contain any problem. Egyptian security forces have kept a reasonably good choke hold on domestic terrorists. And U.S. aid, flowing since the days of the Camp David accords, ensures continued ties with Washington. Cairo will probably support anything that leads to a quick peace and revival of the devastated tourist industry...

Author: /time Magazine | Title: Ripples Across The Region | 10/1/2001 | See Source »

Can’t Stop Him, Can Only Hope to Contain...

Author: By Elijah M. Alper, CRIMSON STAFF WRITER | Title: Crimson Masters Lafayette Playbook | 10/1/2001 | See Source »

...proposed measures include strengthening the government’s power to wiretap telephones and to conduct search and seizure operations, as well as a proposal that would require everyone in the United States to carry identity cards. These so-called “smart cards” could contain travel logs or even fingerprinting information. Supposedly the government would use these identity cards to track suspected terrorists within the United States...

Author: By Stephen W. Stromberg, | Title: Security Versus Privacy in an I.D. Card | 9/25/2001 | See Source »

Previous | 297 | 298 | 299 | 300 | 301 | 302 | 303 | 304 | 305 | 306 | 307 | 308 | 309 | 310 | 311 | 312 | 313 | 314 | 315 | 316 | 317 | Next