Return-Path: <sentto-279987-4528-1014700560-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Mon, 25 Feb 2002 21:26:08 -0800 (PST) Received: (qmail 8639 invoked by uid 510); 26 Feb 2002 05:23:29 -0000 Received: from n11.groups.yahoo.com (216.115.96.61) by all.net with SMTP; 26 Feb 2002 05:23:29 -0000 X-eGroups-Return: sentto-279987-4528-1014700560-fc=all.net@returns.groups.yahoo.com Received: from [216.115.97.188] by n11.groups.yahoo.com with NNFMP; 26 Feb 2002 05:16:26 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: unknown); 26 Feb 2002 05:15:59 -0000 Received: (qmail 44553 invoked from network); 26 Feb 2002 05:15:59 -0000 Received: from unknown (216.115.97.167) by m2.grp.snv.yahoo.com with QMQP; 26 Feb 2002 05:15:59 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.snv.yahoo.com with SMTP; 26 Feb 2002 05:15:59 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g1Q5G5g00408 for iwar@onelist.com; Mon, 25 Feb 2002 21:16:05 -0800 Message-Id: <200202260516.g1Q5G5g00408@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Mon, 25 Feb 2002 21:16:05 -0800 (PST) Subject: [iwar] [fc:Terror.Hunt:.Warehousing.and.Mining.Data] Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 8bit <a href="http://www.ipcs.org/issues/newarticles/693-ter-deva.html">http://www.ipcs.org/issues/newarticles/693-ter-deva.html> Terror Hunt: Warehousing and Mining Data by Maj Gen Yashwant Deva The official announcement of every terrorist attack invariably concludes with a stock phrase, “Ghatna sthal ke nikat suraksha ke prabandh our kare kar diye gaye hain (security arrangements around the place of incident have been further strengthened).” However each incident is succeeded by another attack, to be followed by a similar announcement. Terror strikes at the place and time of its choosing. Yet there is a pattern and that pattern essentially lies in the behaviour of the terrorist and modus operandi of the parent organization. Future attacks cannot be predicted, but past ones can be catalogued, stored and retrieved in near real-time. “Data archiving” and “data mining” are scientific tools and methologies, the former for gathering, sifting, hoarding and storehousing data, and the latter for displaying duly processed critical information to the decision-maker, whenever the need arises. Its hallmarks are virtuality and event-retrieval potential, and its purpose is to match, locate and track saboteurs, hijackers and terrorists. ............(continued) Read the full article at: <a href="http://www.ipcs.org/issues/newarticles/693-ter-deva.html">http://www.ipcs.org/issues/newarticles/693-ter-deva.html> ------------------------ Yahoo! Groups Sponsor ---------------------~--> Tiny Wireless Camera under $80! Order Now! FREE VCR Commander! Click Here - Only 1 Day Left! http://us.click.yahoo.com/nuyOHD/7.PDAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-12-31 02:15:03 PST