Able Danger

The program used data mining techniques to associate open source information with classified information in an attempt to make connections among individual members of terrorist groups as part of its original “intelligence preparation of the battlespace”.


Leave a Reply

Your email address will not be published. Required fields are marked *