Results 1 to 3 of 3
  1. #1
    Join Date
    Sep 2014
    Location
    At your Six
    Posts
    16,429
    Thanks (Given)
    24430
    Thanks (Received)
    11203
    Likes (Given)
    6054
    Likes (Received)
    4653
    Piss Off (Given)
    0
    Piss Off (Received)
    0
    Mentioned
    26 Post(s)
    Rep Power
    13945536

  2. Thanks Tyr-Ziu Saxnot thanked this post
  3. #2
    Join Date
    May 2012
    Location
    USA, Southern
    Posts
    27,683
    Thanks (Given)
    32441
    Thanks (Received)
    17532
    Likes (Given)
    3631
    Likes (Received)
    3156
    Piss Off (Given)
    21
    Piss Off (Received)
    2
    Mentioned
    58 Post(s)
    Rep Power
    21475258

    Default


    You must spread some Reputation around before giving it to LongTermGuy again.
    --Tyr
    18 U.S. Code § 2381-Treason Whoever, owing allegiance to the United States, levies war against them or adheres to their enemies, giving them aid and comfort within the United States or elsewhere, is guilty of treason and shall suffer death, or shall be imprisoned not less than five years and fined under this title but not less than $10,000; and shall be incapable of holding any office under the United States.

  4. Thanks LongTermGuy thanked this post
  5. #3
    Join Date
    Sep 2014
    Location
    At your Six
    Posts
    16,429
    Thanks (Given)
    24430
    Thanks (Received)
    11203
    Likes (Given)
    6054
    Likes (Received)
    4653
    Piss Off (Given)
    0
    Piss Off (Received)
    0
    Mentioned
    26 Post(s)
    Rep Power
    13945536

    Default

    `Skynet uses phone location and call metadata from bulk phone call records to detect suspicious patterns in the physical movements of suspects and their communication habits, according to a 2012 government presentation The Intercept obtained from Edward Snowden.
    The presentation indicates that Skynet looks for terrorist connections based on questions such as “who has traveled from Peshawar to Faisalabad or Lahore (and back) in the past month? Who does the traveler call when he arrives?” It also looks for suspicious behaviors such as someone who engages in “excessive SIM or handset swapping” or receives “incoming calls only.”

    ....The goal is to identify people who move around in a pattern similar to Al Qaeda couriers who are used to pass communication and intelligence between the group’s senior leaders. The program tracked Zaidan because his movements and interactions with Al Qaeda and Taliban leaders matched a suspicious pattern—which is, it turns out, very similar to the pattern of journalists meeting with sources.....

    More in Link.....




  6. Thanks Tyr-Ziu Saxnot thanked this post

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Debate Policy - Political Forums