Search Details

Word: methodic (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

...more the method of what he did--he left it there and he put it down and ran away," said a Harvard police officer on the scene who declined to give his name...

Author: By Todd F. Braunstein, | Title: Police Investigate Bomb Scares | 7/30/1996 | See Source »

...there is another way that a terrorist might have been able to breach security and get a bomb on board. Security experts call it the "Ramzi Yousef method," even though other terrorists have used it in the past. Yousef was arrested by U.S. agents in Pakistan in February 1995 for allegedly plotting an attack on U.S. airliners in the Pacific, as well as an assassination attempt on Pope John Paul II. Federal prosecutors allege that on Dec. 11, 1994, Yousef tested his larger plan for attacking the U.S. carriers by boarding a Philippine Airlines flight on the first leg from...

Author: /time Magazine | Title: TERROR ON FLIGHT 800: TERROR ON FLIGHT 800 | 7/29/1996 | See Source »

...campaign laws of American politics are rigged these days, the most logical method of running a first-class campaign is to find a candidate who can pay for the entire thing himself without feeling a pinch. From the looks of the Democratic senatorial candidates this time around, the head of the Democratic Senatorial Campaign Committee must have had roughly the same itinerary on candidate-recruiting trips as the special gifts coordinator for the Princeton alumni fund...

Author: /time Magazine | Title: DUTCH TREAT, NATURALLY | 7/29/1996 | See Source »

...covert spies, police investigators, foreign intelligence agents, sophisticated computers and satellites. The computer programs correlate thousands of overseas passport numbers, travel itineraries of foreign nationals, secret cables from spies on the ground, reports from friendly foreign intelligence services and phone intercepts worldwide. CIA sources tell Waller that this method has worked before: in 1991, as the center was tracking Saddam Hussein's military buildup before the Persian Gulf War, the CIA computers were able to identify a group of potential Iraqi terrorists before they even attempted an attack on American targets. By tracking one of the terrorists, an Iraqi military...

Author: /time Magazine | Title: Sifting The Evidence | 7/26/1996 | See Source »

...research in this country. I arrived at the NIH as a 28-year-old doctor seeking two things: the credentials to become a medical school professor and an alternative to service in Vietnam. Then, one day some months later, I was abruptly transformed into a committed scientist when a method I was developing to detect expression of a gene suddenly worked. At that moment, I knew the intoxicating power of measurement and the sweet anticipation of my own results...

Author: NO WRITER ATTRIBUTED | Title: Commencement 1996 | 6/22/1996 | See Source »

Previous | 79 | 80 | 81 | 82 | 83 | 84 | 85 | 86 | 87 | 88 | 89 | 90 | 91 | 92 | 93 | 94 | 95 | 96 | 97 | 98 | 99 | Next