понедельник, 28 декабря 2009 г.

The Desert Encroaches: You're lying! I'm going to ask you one more ...

The government currently uses background checks, financial disclosures, polygraph examinations, classified document handling procedures, computer security, and the threat of imprisonment and death to bolster internal security. ... In Phase Two, the Program will use these protocols to develop further tools (including combinations of sensors and software) to detect and amplify our own useful signals in order to more accurately predict trust and trustworthiness in others. ...

Комментариев нет:

Отправить комментарий