To: george76; Physicist; hollywood; Myrddin; blam; Jeff Head; vrwc0915; Mulder; Noumenon; ...
Lending IDs between themselves is a common trick of terrorists and criminals for crossing borders and other purposes. Atta may have lent his ID to another cell member, knowing how sloppy our border controls are.
Able Danger relies on "brilliant data mining" to arrange a picture out of thousands of minute but interrelated factoids. Credit card use, ATM hits, internet use etc are all crunched by computers. But they CANNOT tell WHO exactly USED someone's credit card etc at a particular time.
Some of the discrepancies in the time lines ("Atta was elsewhere when Able Danger said he was in such and such a place") may be the result of Atta and his cell lending IDs, credit cards etc to one another as a matter of convenience.
Able Danger data mining can only tell when an ID or credit card was used, NOT who used it. This does NOT take away from the value of Able Danger information, but it is important to understand this twist.
5 posted on
08/12/2005 10:04:31 PM PDT by
Travis McGee
(--- www.EnemiesForeignAndDomestic.com ---)
To: Congressman Billybob
6 posted on
08/12/2005 10:06:19 PM PDT by
Travis McGee
(--- www.EnemiesForeignAndDomestic.com ---)
To: Travis McGee
You're exactly right. One legit ID is passed around (copied) for use by the hundreds. Not exaggerating either.
7 posted on
08/12/2005 10:10:06 PM PDT by
onyx
(North is a direction. South is a way of life.)
To: Travis McGee
Able Danger data mining can only tell when an ID or credit card was used, NOT who used it. This does NOT take away from the value of Able Danger information, but it is important to understand this twist. By the same token, the 9/11 commission insists that Atta could not possibly have been meeting with al-Ani in Prague because, at about the same time, his cell phone was used to make a call in Florida.
8 posted on
08/12/2005 10:16:04 PM PDT by
okie01
(The Mainstream Media: IGNORANCE ON PARADE)
To: Travis McGee
Some baddies in the know purposely make a cell phone known to law enforcement and have someone else to physically carry said phone to provide an electronic alibi. While electronic methods are useful good old fashion eyes on surveillance will never be outdated
11 posted on
08/12/2005 10:39:40 PM PDT by
vrwc0915
To: Travis McGee
To: Travis McGee
Good observation with respect to knowing when and where an item was used, but being unable to assure the user was the actual owner of the ID.
I'm reminded of the technique of cutting off a tracking collar from an animal and hanging it on the back end of an 18 wheel truck. It would be dead simple to pass "terrorist" ids to ignorant individuals with permission to use them as a diversionary tactic.
16 posted on
08/12/2005 11:37:22 PM PDT by
Myrddin
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson