May 6, 2011 – Digging through the data left behind from the world’s most wanted man presents unique challenges and incredible opportunities, according to security and data analysts, writers and vendors.
Security official information sharing capabilities and a geospatial location solution from one vendor have already been commended for pinpointing the raid on a compound in Pakistan that resulted in the death of Osama bin Laden. But, unlike the hand-written notebooks found at the compound that reportedly point to direct terrorist plans, it will take a mix of high-tech applications and security know-how to pull immediately usable security data from the handful of computers, 10 hard drives and various flash drives and DVDs the Department of Defense stated were taken from the site.
Register or login for access to this item and much more
All Information Management content is archived after seven days.
Community members receive:
- All recent and archived articles
- Conference offers and updates
- A full menu of enewsletter options
- Web seminars, white papers, ebooks
Already have an account? Log In
Don't have an account? Register for Free Unlimited Access