Once the door is open--Social Network Analysis?

By: crunchgodabruinknees



Im sure he explained how it is all done.  Then he gives a few names, dates, locations a and the like. Then the FBI can get warrants for lots of things

-financial and bank records providing travel information, locations, deliveries etc

-phone records

-email warrants

-bank records

-wiretaps

Then when you have that stuff its all connect the dots stuff to find connections

Investigators can enter that stuff in databases and use software to show network connections. Its used to connect terrorist and crime networks in a graphical format. 

Then you get warrants for the other network nodes.

Along in there you can also follow people to meetings, interview people, and flip over more rocks.

Post Please Log in OR Register for an account before posting.