Use precise geolocation data and actively scan device characteristics for identification. This is done to store and access ...
"The number one thing people say if they lost someone in the attack -- they all say the same thing: 'I didn't get a chance to ...