A host of target data processors can
access the information system over the network, generate a
variety of information products (e.g. traffic patterns, bordercrossing
statistics, suspicious behaviour alerts, marine
exclusion zone violations around critical infrastructure, etc.),
and make these available to users as well.