This technology pertains to the computer system that uses multiple layers of detections to determine when targeting activities occur, why the targeting activities are occurring, what the conflict is, who is conducting the targeting, who the target is, the purpose of the targeting, and how long the targeting activities have been occurring. This system could be used to detect when targeting activities occur towards Secret Service protectees, and also to determine if the targeting activities are intentional – such as for investigative purposes, for the intentional attraction of threats, and such the misuse of services, or if the targeting is originating from another source exterior to law enforcement and military law enforcement. This system would have the capability of detecting targeting activities from a large number of inputs of information, such as the media, the proximity of the protectee, electronic communications, legal activities, national security, and other types of information that would pertain to ensuring that the linguistics of threats do not occur. The system would be able to detect if the source of the targeting was intended as a threat, if there was another explanation, and in both types of cases how to stop the targeting activities and how to ensure that the specific type of targeting activities does not occur again, through the establishment of a pattern check that minimizes the types of threat patterns while taking the minimal amount of action, such as the use of security through access control lists on telecommunications.
- Patrick R. McElhiney
- Software Industry (SWI)