Skip to Content
9-16-2008 @ 2:14PM
While it is obviously true that systematic monitoring of every type of communication is completely infeasible, I would think the relevance of this presentation is due to a different scenario.Imagine that potential terrorists are ALREADY being actively monitored, due to suspicious activities outside of the game. Their co-ordination may escalate towards the culmination of a possible threat. The authorities may believe that terrorist action is imminent, but they are not sure by whom, where, how and when. The suspicious individuals they are monitoring may be involved in the organisation of this terrorist act, but might not be the final perpetrators.So now - imagine - as this drama unfolds and the members under suspicion all log into a MMORPG.Don't you think the authorities should be prepared for this type of event? They need to know how to monitor activities in the game when necessary and how to interpret them and they need to be able to do this at short notice.
First time? A confirmation email will be sent to you after submitting.
Members enter your username and password.
Enter your AOL or AIM screenname and password.
Please keep your comments relevant to this blog entry. Email addresses are never displayed, but they are required to confirm your comments.
When you enter your name and email address, you'll be sent a link to confirm your comment, and a password. To leave another comment, just use that password.
To create a live link, simply type the URL (including http://) or email address and we will make it a live link for you. You can put up to 3 URLs in your comments. Line breaks and paragraphs are automatically converted — no need to use <p> or <br /> tags.