Systems and methods for locating terrorists
First Claim
1. A method of locating and/or identifying terrorists that use at least one client device to access a server device via a network, the method comprising:
- storing a software module on the server device;
monitoring and/or permitting connections between the server device and the at least one client device;
transmitting the software module to the at least one client device in dependence on a determination of whether the connection between the server device and the at least one client device matches at least one of predefined criteria,wherein, when the software module is received by the client device, the software module is configured to cause the client device broadcast or otherwise transmit a signal comprising location and/or identification information.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and/or methods for locating and/or identifying individuals that use network-enabled client devices to access particular network resources are provided. In certain example embodiments, a system and/or method is provided wherein a software module (e.g. one or more worm(s)) is configured to be stored on a server device and transmitted to at least one client device connecting to the server device is provided. The software module may include logic to cause the client device to broadcast a signal comprising location and/or identification information associated with the client device. The software module may exploit one or more vulnerabilities of the client device to become stored thereon and/or to transmit the location and/or identification information, which may include, for example, a processor serial number of the client device, an embedded ID of the client device, components of the client device, GPS coordinates of the client device, a true IP address, and/or true routing information. This system may be helpful in locating terrorists who use Internet websites to transmit or broadcast terrorism related propaganda or the like.
-
Citations
21 Claims
-
1. A method of locating and/or identifying terrorists that use at least one client device to access a server device via a network, the method comprising:
-
storing a software module on the server device; monitoring and/or permitting connections between the server device and the at least one client device; transmitting the software module to the at least one client device in dependence on a determination of whether the connection between the server device and the at least one client device matches at least one of predefined criteria, wherein, when the software module is received by the client device, the software module is configured to cause the client device broadcast or otherwise transmit a signal comprising location and/or identification information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
- 14. A software module configured to be stored on a server device and transmitted to at least one client device connecting to the server device, the software module comprising logic to cause the client device to broadcast a signal comprising location and/or identification information associated with the client device.
Specification