So automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic and identify and report to human investigators traffic considered interesting by using certain " trigger " words or phrases, visiting certain types of web sites, or communicating via email or chat with suspicious individuals or groups.
So automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic, and filter out and report to human investigators those bits of information which are " interesting "— such as the use of certain words or phrases, visiting certain types of web sites, or communicating via email or chat with a certain individual or group.
0.010 seconds.