In the security domain, one of the largest and most prominent text mining applications is the highly classified ECHELON surveillance system. What is ECHELON assumed to be capable of doing?

What will be an ideal response?

Identifying the content of telephone calls, faxes, e-mails, and other types of data and intercepting information sent via satellites, public switched telephone networks, and microwave links

Business

You might also like to view...

When borrowing money from a family member or a friend, the loan agreement should be in writing and signed by all parties to avoid any possible misinterpretations

Indicate whether the statement is true or false.

Business

An important attribute of a good SLA is:

A) cost. B) completeness. C) metrics. D) All of the above

Business