|
|
|
|
[VN
Boards Archive] |
Welcome to the Vault Network
forum archive.
This is not a complete archive, time didn't allot us the
opportunity to properly backup the majority of the boards
deemed "expendable". Most boards on this list have at least
20-40 pages archived (non-logged in pages, 15 topics per
page).
Popular boards may have as many as 250 pages archived at 50
topics per page, while others deemed of historical
signifigance may be archived in their entirety.
We may not agree with how the board shutdown was managed, but
we've done what we could to preserve some of its history in
lieu of that.
Please enjoy the archive.
~
Managers, Moderators, VIP's, and regular posters.
|
Author |
Topic: FBI seeking contractors to build social network monitoring [spy] applications
|
Aerlinthian
Posts:
66,222
Registered:
May 7, '01
Extended Info (if available)
Real Post Cnt: 65,491
User ID: 94,919
|
Subject:
FBI seeking contractors to build social network monitoring [spy] applications
|
Antony Savvas @ PCWorld posted: By Antony Savvas, Computerworld-UK The U.S. Federal Bureau of Investigation (FBI) is planning to develop an application that can track the public's postings to Facebook, Twitter, and other social networks, in order to aid how it predicts and reacts to criminal behavior, including public disorder and terrorism. An FBI request for information document has been published, asking potential contractors to contact the bureau by February 10. The FBI wants respondents to the document to outline how they would build such a system and how much it would potentially cost. The bureau said the system it wants must be able to automatically search "publicly available" material from Facebook, Twitter, and other social media sites for keywords of interest. FBI agents would be alerted if the searches come up with evidence of "breaking events, incidents, and emerging threats." Agents would have the ability to display any information on a map, and they could then add other layers of information, including past incidents and locations of important buildings like embassies and military installations. The document notes that agents need to "locate bad actors and analyze their movements, vulnerabilities, limitations, and possible adverse actions."
LINK
-----signature-----
(none)
|
Link to this post
|
|
|
© 2012. All
Rights Reserved. |
|
|
|
|