They developed an algorithm for pinpointing potential terrorist activity. Their program was encrypted to keep everyone’s personal data and private conversations anonymous. No one could unlock that information unless the system detected truly suspicious activity and then a warrant was issued. Otherwise, all unnecessary data was purged from the system after a short period of time. That eliminated clutter for security analysts by focusing solely upon pertinent threats and within a few months of Thin Thread’s implementation it helped the NSA track down key components of the Al Qaeda
They developed an algorithm for pinpointing potential terrorist activity. Their program was encrypted to keep everyone’s personal data and private conversations anonymous. No one could unlock that information unless the system detected truly suspicious activity and then a warrant was issued. Otherwise, all unnecessary data was purged from the system after a short period of time. That eliminated clutter for security analysts by focusing solely upon pertinent threats and within a few months of Thin Thread’s implementation it helped the NSA track down key components of the Al Qaeda