Array of tech products helps fight terrorism

Tucked into a quiet corner of the FOSE government IT trade show conference this week was a selection of products that many government customers use, but would prefer no one knows they buy.

The show's area for the intelligence community featured an array of products aimed at culling through data, protecting data and helping thwart terrorism. FOSE is sponsored by PostNewsweek Tech Media, the parent company of Washington Technology.

For example, Anonymizer Inc. of San Diego sells a family of products that provide user anonymous Internet protocol addresses, rotating IP addresses and other features.

The tools are designed for intelligence agents who need to investigate potential terrorist activity on the Web. It protects agents from having their IP addresses determined by terrorists would could then use that information to monitor agents' online activities.

Another tool from Basis Technology Corp., the Rosette Linguistics Platform, unlocks the meaning of unstructured text.

Rosette uses advanced natural language processing techniques to help your applications unlock the meanings. Rosette includes modules for language identification, converting text to Unicode so that it can be processed, identifying basic linguistic features, and locating key concepts like the names of people and places.

It supports English and a variety of Asian, European and Middle Eastern languages.

Another analytical tool comes from Content Analyst Company LLC. Its technology is a text analytics tool that automates the analysis of unstructured data.

Based on extensions and improvements in the company's Latent Semantic Indexing technology, Content Analyst technology exponentially reduces the time needed to discern relevant information from large volumes of documents and data

It furnishes analysts with the ability to quickly identify and act on meaningful information buried deep within large repositories of documents and data. Using Content Analyst technology, intelligence and investigative agencies can discern meaning, pinpoint threats and suspicious activity, and disambiguate aliases, regardless of language.

It can monitor print and electronic communications to create accurate conclusions based on large volumes of information.

About the Author

Doug Beizer is a staff writer for Washington Technology.

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close
SEARCH
 Top 100 Slideshow
contracts DB

Trending

  • Dive into our Contract Award database

    In an exclusive for WT Insider members, we are collecting all of the contract awards we cover into a database that you can sort by contractor, agency, value and other parameters. You can also download it into a spreadsheet. Read More

  • Is SBA MIA on contractor fraud? Nick Wakeman

    Editor Nick Wakeman explores the puzzle of why SBA has been so silent on the latest contractor fraud scandal when it has been so quick to act in other cases. Read More

Webcasts