Processing fragments of data collected on a monitored person to find out whether this is would-be terrorist (WT) very challenging. Moreover, the process has proven be deceptive, with repeated dramatic failures. To address issue I suggest mirror simple model mimic at stake. The considers collection ground items which are labeled either Terrorist Connected (TC) or Free (TF). extract signal from i...