General Discussion
In reply to the discussion: Let's say a Judge overseeing a high profile case in which a protest group ... [View all]reusrename
(1,716 posts)It is used to create the targets for a counterinsurgency operation. Sometimes (or according to research, in most cases) the most influential person in a social network or insurgency is not the most high profile or most vocal individual in the group. With very large groups (OWS for example) this new technology identifies those individuals who's participation in the group is the most critical.
That, in a nutshell, is what the metadata is being collected and used for. Because the algorithms being used are easily handled by computers, and because no errors are introduced by trying to decode or translate any communication content, the system can create a very precise mapping of our social networks. Only actual metadata associated with each communication is logged into the software, and from that the algorithms sort out the social connections.
For some basic info about how the science is implemented, google the keywords: thesis+insurgent+social+network