infiltrate providers
classify customers
classify gateways (residence, non residence, etc)
classify users
classify applications
establish links
classify patterns
identify threats.
The program, while formidable, is straightforward. It's conceivable that every time a connection is made, big brother twinkles and categorizes the threat of the actions.
...
