A Shadow Intelligence

rw-book-cover

Metadata

Highlights

  • It had started out simply enough, with a search for algorithms that could warn us of attacks, identifying digital landscapes that had previously led up to terrorist incidents: communications activity, social media, financial transactions, geographical movement. (Location 4000)