Processing and Exploitation


Processing and Exploitation :

"Converting raw information/data into formats that can be efficiently and effectively used by executives, managers, analysts and investigators. Examples of Processing and Exploitation include: (1) Imagery interpretation (2) Data conversion and correlation (3) Document and eavesdropping translations (4) Key Word searches on seized data (5) Facial Recognition searches involving image capture systems, records, databases, etc (6) Data Mining in seized or open source databases (7) Decryption of seized or intercepted data" (FEMA, IIFOG Version 3 Draft, 2008, 39)

No records Found
afaatim.com copyright © April 2016 Dr.K.R.Kamaal. All rights reserved