Free Republic
Browse · Search
News/Activism
Topics · Post Article

I've thought for a long time that Able Danger's technique sounded like the software that was used to find Saddam.

All the links to Able Danger that I've seen is linked from my Able Danger blogroll at QT Monster's left column.

1 posted on 11/02/2005 8:38:49 PM PST by vadkins
[ Post Reply | Private Reply | View Replies ]


To: vadkins
This is all so interesting. Thanks for posting.

God Bless those very talented minds for doing their jobs so well! I just wish they would have been listened to and feel badly for them for how they are being treated now. Hello...they are the GOOD guys! sheeesh

2 posted on 11/02/2005 8:51:33 PM PST by NordP (Must See TV - Mark Levin's Supreme Court Nomination Hearings ----- I WISH!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: vadkins
Few people know that it was Saddam slipping up and renting that last porno flick from Blockbuster with a credit card that did him in...

BTW, wait till the Joe Wilson and Valerie Plame sex tape hits the video stores and knocks Pam and Tommy Lee out of first place.

3 posted on 11/02/2005 8:59:10 PM PST by Doctor Raoul (Franken screwed so many at the Boys and Girls Club that NAMBLA wants to give him an award!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: vadkins
Credit where credit is due:

1st of the 22nd and the 4th ID.

4 posted on 11/02/2005 9:00:25 PM PST by smoothsailing
[ Post Reply | Private Reply | To 1 | View Replies ]

To: vadkins

It has tremendous potential...but you have to marry technology with human analysis...step by step. And while it is a tremendous tool...it does consume man-hours. You could turn around and do the same trick with the mafia in the US, drug trade and the capital generated in the US, corrupt congressmen, etc.


5 posted on 11/02/2005 9:09:00 PM PST by pepsionice
[ Post Reply | Private Reply | To 1 | View Replies ]

To: vadkins

I wonder if Able Danger could help OJ find "the real killers"?

Nah. I don't think so.


6 posted on 11/02/2005 9:18:34 PM PST by garyhope
[ Post Reply | Private Reply | To 1 | View Replies ]

To: vadkins

" “We interrogated them to get new information and to verify older intelligence. Then we passed them off to other agencies and units. We did all of this, including handoffs, as rapidly as possible so no intelligence would get stale.”

Captain Morrow stressed that the database and link diagram had to be simple enough to tie together information flowing in from various sources, e.g., human intelligence (the most important), spot intelligence reports from other units in the field and items such as photos found on captured enemy personnel, photos that might, for instance, depict the bodyguard who carried them posing with a known associate of Saddam Hussein, or Saddam Hussein himself. It was the use of these multiple sources that defined data mining in this case."

Absolutely great post. In this case, it looks like data mining was just one tool in the tool case. The description of the process is super cool. It's like a hybrid blend between police work, which tends to be information rich and relatively little slow paced, and military action, which tends to be fast, above all else, gathering whatever information you can, making the best guess, and acting. I find the whole thing kind of mind blowing.


7 posted on 11/07/2005 10:44:05 AM PST by strategofr (The secret of happiness is freedom. And the secret of freedom is courage.---Thucydities)
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson