Remotely-Triggered IED Threat Mitigation through Cellular Device Usage Pattern Algorithmic Behavior Detection, Analysis, and Countermeasure Application.
Purpose: To discuss the potential for possible detection and prevention of cellular-based IED triggering by observation and analysis of usage patterns and other factors.
In the life span of every cellular phone or SIM card (device) used in an IED event, what events occur that are possible warning flags that can be detected and marked as potential future threat indicators?
Seeking investors to develop and market this technology
No comments:
Post a Comment