So How Far Have We Come? Here are some of the 2001 Anti Terrorist Projects

An article in Information Week in January 14, 2002 discussed an interesting subject of tracking terrorists. It talked about tracing of spending by Terrorists. Things like airlines, car rentals, hotels, credit cards, telephones, banks, etc. and the vast software available. It talked in detail, I mean real detail about the ACL Services LTD. Software consultants and forensic accountants. I thought to my self after reviewing all the data and information on the Internet about NetMap, which also runs SQL and the i2 INC. software.

Analyst's Notebook has many customers including FBI, Treasury Department's Financial Crime Enforcement Network called FinCen. The system and all components are totally flawed, due to the possible links that may be totally invalid and waste a lot of time. The idea is good, but the problem is that these agencies don't get it and certainly neither do the program writers. And algorithms only pick up pieces of BS. Look at the intense money spent on search engines and they still bring back tons of garbage. The only way experts can do this is to think like terrorists. To hunt any animal you have to think like that animal.

I cannot tell you how friggin easy it would be knowing this data published in a magazine to easily beat the system, now that it has been all laid out. Here is how they would do it. Go into cash, use a cellular phone and then give it to someone on the street or leave it on and mail it somewhere or better yet charge the battery full and duct tape it under a truck or train traveling across the country. Leave a credit card at a hotel or at a retail store where shady people hang out. The damn thing will be used for days in one city until it is over and spent, it could even travel states. You can buy a recharging telephone that you use for five days and throw away. And just think what on Earth does a terrorist need with a telephone anyway. You can use a CB, walkie talky, handy talkie or any other communication and talk in meaningless conversation containing information. Talk about the weather means to meet at location A, talk about the girl with the big breasts means meet at location B.

Talk about one light means by land, talk about the lights and the sun in the same conversation means by sea. Also if you know someone is possibly listening then what is to say they give out misdirection and watch to see what happens then they know you are listening. How can a person writing algorithms thin like that, those brains are not working the same way or wired the same. Get someone who thinks like terrorism to catch them. You know maybe we should not have killed McVay. Anyway this and many other articles I have read are definitely pieces to the puzzle, but publicizing them is bad. If you have something that is working do not go into detail about it, publish it and then expect it to keep working, once it is published it will not work. So what we need to do is publish the misinformation, we want them to think we are using so they do something else, that we want them to do. Then you can continue to catch them.

"Lance Winslow" - If you have innovative thoughts and unique perspectives, come think with Lance; www.worldthinktank.net/wttbbs

trusted cleaning company Bannockburn ..
In The News:

Russian hackers use fake CAPTCHA tests to spread dangerous malware targeting governments and journalists. Learn how to protect yourself from these deceptive attacks.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Miami-Dade debuts America's first autonomous police SUV with AI cameras, drone deployment and real-time crime detection in groundbreaking law enforcement pilot.
Bank impostor scams cost Americans $2.9 billion as criminals use AI voices and caller ID spoofing to steal life savings. Learn nine essential fraud protection tips.
Foreign-owned apps secretly harvest personal data from seniors, making them prime targets for scams. Learn how to protect your privacy and stop data brokers today.
Sens. Josh Hawley and Richard Blumenthal introduce bipartisan GUARD Act to protect minors from AI chatbots through mandatory age verification and disclosure requirements.
Ghost-tapping scammers exploit wireless technology to drain accounts through small transactions, but RFID-blocking wallets and transaction alerts can protect you.
French pilot project demonstrates wireless charging roads that can deliver over 300 kilowatts of power to EVs while driving, potentially eliminating range anxiety.
YouTube's Ghost Network spreads information-stealing malware through thousands of fake videos offering cracked software, using compromised accounts and fake engagement.
Protect your privacy by disabling your smart TV microphone. Most TVs have hidden mics that listen even when voice commands are off. Learn quick steps to stop unwanted audio capture.
SessionReaper vulnerability hits Magento and Adobe Commerce stores, compromising 250+ sites in one day. Hackers steal data and hijack shopping sessions.
Master essential parental controls and digital safety tools to protect your kids online. Learn screen time limits, location settings and privacy controls every parent needs.
Cybersecurity expert shares six essential steps to protect against dark web threats, including data removal services, password managers and antivirus software.
NVIDIA GPU space mission could revolutionize cloud services by enabling orbital data centers that make apps, games and AI tools faster and more efficient.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Microsoft warns Windows 10 users face serious security risks as 90% of ransomware attacks target unsupported systems. Learn why upgrading to Windows 11 is crucial.
Nike unveils Project Amplify, revolutionary motorized shoes developed with Dephy that add powered assistance to every step for runners and walkers.
Cybersecurity experts warn about one of the largest credential compilations ever found, urging users to check "Have I Been Pwned" and change passwords immediately.
Quick iPhone and Android battery optimization techniques help your device stay powered all day by turning off hidden features that secretly drain power in the background.
Kodiak Driver autonomous truck achieves perfect 98 safety score, matching top human fleets in groundbreaking AI evaluation by Nauto's VERA system.
New 401k catch-up contribution rules in 2026 will change taxes for high earners over 50. Learn how scammers exploit these changes and protect your retirement savings.
Kurt Knutsson's guide covers social media privacy protection through location settings, account privacy controls and two-factor authentication to prevent scams and data breaches.
Revolutionary retinal implant restores central vision in 80% of patients with advanced macular degeneration, offering hope where treatments once only slowed blindness.
Learn how to use passkeys on Windows and Mac computers without cameras or fingerprint readers. Discover secure authentication methods that replace passwords.
Tesla's FSD v14.1.2 update reintroduces Mad Max mode, enabling higher speeds and more frequent lane changes than the standard Hurry profile setting.

Government Workers and Lawyers Revolving Door Rule Needed

We need more oversight and transparency in government. We need... Read More

Upcoming Palestinian Elections Might Put Extremists In Power

The Palestinian Fatah Movement is doing whatever it can to... Read More

Workmens Compensation Lawyers, Lets Raise Minimum Wage; No Lets Not, Say We Did, We Have

The debate to raise minimum wage in California is totally... Read More

Banana Republic - United Kingdom

The recent scathing remarks by High Court Judge Richard Mawrey... Read More

Cracking Down on Cigar Counterfeiters

In the most rewarding new industries, there is often a... Read More

Should the FTC be Allowed to Regulate Franchising?

Recently the FTC, Federal Trade Commission put forth a report... Read More

Reelect President Bush for the 2nd term: Evidence & Proofs

Why President Bush should have his second term? The arguments... Read More

The Second Coming in Albania

Blessed with Chinese GDP growth rates (7-8% annually in each... Read More

Farming Human Clones

If someone wanted to farm future clones they would need... Read More

Operation Iraqi Freedom, Soldiers and Their Psyche

Have you noticed that the when the service men who... Read More

Ronald Reagan is Right

Why is it that every single thing government does; it... Read More

National Security; College Campuses

I have witnessed a new era of security in the... Read More

Franchising Democracy and Creating Cohesive World Government

There are so many problems with our perceived perfect checks... Read More

End Of History? Not Quite

A visitor to Moscow would be immediately struck by the... Read More

What are the benefits of Nuclear War again; I must have missed that point?

Indian and Pakistan and nuclear war. What does the world... Read More

Hypocrisy of Over Regulation

All to often law makers and regulators create rules and... Read More

Proven Risk Youth Vs At-Risk & High-Risk Youth

In the fields of juvenile justice policy and programming, there... Read More

3D Modeling for Healthy Forests

Forest Vegetation Simulations for Fire Prevention, Healthy Forest and Saving... Read More

The Cost of the COLD WAR

Many people who are expert in the issue of the... Read More

Is George Bush Two-Faced?

Yes, Bush is two-faced. The two sides of the faces... Read More

Protection of the Intellectual Property in Russia

A Governmental commission, headed personally by the Prime Minister has... Read More

Government Regulation Helps People

Well the title is absolute Bull Crap, but this article... Read More

Al-Qaida has Nukes

Many believe Al-Qaida already has nukes in the United States... Read More

Army Recruiting Dilemma Discussed

Currently the US Army is having trouble recruiting. These problems... Read More

Shooting Around Corners with New Concept

Currently the United States has weapons, which can shoot around... Read More

luxury cleaning services Lake Forest ..