The program used data mining techniques to associate open source information with classified information in an attempt to make connections among individual members of terrorist groups as part of its original “intelligence preparation of the battlespace”.

Source: LINK

Comments are closed.