Return-Path: <sentto-279987-2701-1002251538-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Thu, 04 Oct 2001 20:16:33 -0700 (PDT) Received: (qmail 24311 invoked by uid 510); 5 Oct 2001 03:12:22 -0000 Received: from n3.groups.yahoo.com (216.115.96.53) by 204.181.12.215 with SMTP; 5 Oct 2001 03:12:22 -0000 X-eGroups-Return: sentto-279987-2701-1002251538-fc=all.net@returns.onelist.com Received: from [10.1.4.54] by n3.groups.yahoo.com with NNFMP; 05 Oct 2001 03:12:18 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_4_1); 5 Oct 2001 03:12:18 -0000 Received: (qmail 85733 invoked from network); 5 Oct 2001 03:12:18 -0000 Received: from unknown (10.1.10.142) by l8.egroups.com with QMQP; 5 Oct 2001 03:12:18 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta3 with SMTP; 5 Oct 2001 03:12:13 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id UAA02582 for iwar@onelist.com; Thu, 4 Oct 2001 20:11:52 -0700 Message-Id: <200110050311.UAA02582@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Thu, 4 Oct 2001 20:11:52 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:Intelligence.analysis.software.could.predict.attacks] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Intelligence analysis software could predict attacks NewScientist.com Intelligence analysis software could predict attacks 18:19 02 October 01 Duncan Graham-Rowe Intelligence analysis software being developed in the US could be used to predict future terrorist attacks, claims the research company making it. When complete, they say it will be capable of sifting through and analysing existing databases of information, both public and private, and spotting suspicious patterns of activity. ..... The software is called Knowledge Aided Retrieval in Activity Context (KARNAC) and uses "profiles" of different categories of terrorist attacks to seek out key components of possible events. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more! http://us.click.yahoo.com/UnN2wB/m5_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:54 PST