This is an interesting example from 'the Security Guy' Chuck Harold:
** ****** ******* *** ******* *** alarm, ******** ** *** ** ******:
**** ****** *********** *** ********** ** minimizing ***** ******. **** * ******* like ***, ***** * *****, ********** ignores ******** ****** ******* ** **** accuracy. ** *** ****** *** *** bother *** **** ******* *********, ** would **** ***** ** **** *********.
*** ***** ******* ** *** ******* is *** *** ****** *****'* ******* some ******** **** ********** ******* **** details:
********?
******** ********* ******.... ****, ***** *** a **** **** *** ********* *** to ***** **** ****** ****** ****** by ****** ******* ****** *** **** from ****, ******* **** **** **** some ******* ** **** ** ******* by....
****, ** **** ***** *** *** Vegas ********* ** *******? *** **** of **** *** ******* *** ***** detected **** *****? **? ***?...
** ****** “*** * **** ******** failure”: **** ** **** **** ** got * ************, *** ** ******** failure *** *** **** *** **** to ****** ** ****** **** *** that ***? ** **** **** ** course ** *** **** *******.. ((
*** ***** ******* ****, ****** * would ** ******* ** **** ***** “analytics” *** **** *****; *** **** to ****** ******* **** **** **** size *** ******** ** ******* ******** in *** *****?...
*******, ***** * ******* ****** ****** at **** *** ******* ***** - why *** ** *** * ******-******-********* function ******* ** **** ** *********-********* one? ** ***-***** ** ********* (*** example **** ******* ** * ******** light ** *** ***** ** **********) and ********** ***** ************ ** **** of ****** ******?..