Geofencing - How the New World Order will electronically enslave us all

Author Topic: Geofencing - How the New World Order will electronically enslave us all  (Read 10593 times)

0 Members and 1 Guest are viewing this topic.

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Geofence
http://en.wikipedia.org/wiki/Geofence

A Geo-fence is a virtual perimeter for a real-world geographic area.

A geo-fence could be dynamically generated - as in a radius around a store or point location. Or a geo-fence can be a predefined set of boundaries, like school attendance zones or neighborhood boundaries. Custom-digitized geofences are also in use.

When the location-aware device of a location-based service (LBS) user enters or exits a geo-fence, the device receives a generated notification. This notification might contain information about the location of the device. The geofence notice might be sent to a mobile telephone or an email account.

Geofencing, used with child location services, can notify parents when a child [or prisoner, or thought criminal] leaves a designated area.[1]

Geofencing is a critical element to telematics hardware and software. It allows users of the system to draw zones around places of work, customers sites and secure areas. These geo-fences when crossed by an equipped vehicle or person can trigger a warning to the user or operator via SMS or Email. In extreme circumstances, the zones can be linked to immobilisation equipment within a vehicle and stop the engine dead.

Other applications include sending an alert if a vehicle is stolen[2] and notifying rangers when wildlife [or prisoners, dissidents] stray into farmland.[3]

Geofencing in a security strategy model provides security to wireless local area networks. This is done by using predefined borders, e.g., an office space with borders established by positioning technology attached to a specially programmed server. The office space becomes an authorized location for designated users and wireless mobile devices.[4]

See also
Global Positioning System
Assisted GPS (A-GPS)
Automotive navigation system
Geocaching
Geotagging
GPS drawing
GPS tracking
Point of interest


References
^ Anthony .C. Ijeh, Allan .J. Brimicombe, David .S. Preston, Chris .O. Imafidon (2009) Geofencing in a Security Strategy Model: Global Safety and Sustainability. Jahankhani, H. Hessami, A.G. Hsu, F. (Eds.) p.104-111 © Springer-Verlag Berlin Heidelberg 2009. ISBN 978-3-642-04061-0
^ De Lara, Eyal; Anthony LaMarca, Mahadev Satyanarayanan (2008). Location Systems: An Introduction to the Technology Behind Location Awareness. Morgan & Claypool Publishers. p. 88. ISBN 9781598295818.
^ "Motorcycle Tracker Updates Every 15 Seconds". Motorcycle USA. 23 January 2009. http://www.motorcycle-usa.com/2/2304/Motorcycle-Article/Motorcycle-Tracker-Updates-Every-15-Seconds.aspx. Retrieved 2009-01-26.
^ "Kenya's elephants send text messages to rangers". The Guardian (London). 11 October 2008. http://www.guardian.co.uk/uslatest/story/0,,-7854133,00.html. Retrieved 2009-01-26.[dead link]
^ Hamid Jahankhani, A G Hessami, Feng Hsu: Global security, safety, and sustainability : 5th international conference, ICGS3 2009, London, UK, September 1-2, 2009 : proceedings. ISBN 978-3-642-04061-0
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Where Is Awarded The “Mother Of All Geofencing Patents”
http://techcrunch.com/2010/12/21/where-geofencing-patent/
Erick Schonfeld  Dec 21, 2010


Just as geo mobile services are taking off, the U.S. Patent Office has awarded an extremely broad patent on “Location-based services” to Where. Patent No. 7,848,765 covers 31 claims ranging from sending an alert to offering a coupon when somebody crosses a geofence with a mobile device. Where CEO Walter Doyle calls it the “mother of all geofencing patents.”

A geofence is a predefined boundary on a map. For instance, it could be a two-block radius around a business. When somebody crosses into that area, they could be offered a geo-targeted ad or coupon. The patent also defines a geofence as possibly being “associated with a moving location that is associated with a portable electronic device.” In this case, the geofence is placed around individual users and moves with them. The patent seems to describe practically every mobile app with any kind of geo-trigger, from simple “location-based alerts” to “verifying transactions and tailoring information to the behavior of a user.” The full abstract reads:

Provided herein are methods and systems relating to location-based services such as social networking, providing demographic information, tracking mobile devices, providing business information, providing an adaptable user interface, remotely effecting a change on a portable electronic device, providing a geofence, outputting location-based information on a mobile device, varying transmissions to and from a mobile device, providing location-based alerts, verifying transactions and...

tailoring information to the behavior of a user.

Where applied for the patent five years ago in 2005, well before the current crop of hot geo startups even existed. It was finally awarded two weeks ago on December 7. At the very least, the patent should give Where some defensive armor against patent trolls and others trying to enforce their own intellectual property in this market.

Where builds mobile apps across every major mobile device platform—including Android, iPhone, and Blackberry—and boasts about 4 million active users a month. The apps show local listings for restaurants, bars, merchants, and events, and recently started to suggest places for you based on your location and past behavior. Doyle thinks the recommendations can act as a “Netflix for places.” The apps work on the principle of showing interesting places nearby, essentially by placing a geofence around the user.

Where is also using some of what the patent describes in its Where Ads, which allow advertisers to show their mobile ads only to people near their store, or perhaps near a competitor’s store (after the user opts in to see these types of ads). Another ad campaign that takes advantage of geofencing is one which tracks the flu index and maps areas where there is a high incidence. Where’s “Deal Alerts” also work on the same principle. Soon, Where will offer the ability to “follow” places and receive messages when you are nearby.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Satyagraha

  • Global Moderator
  • Member
  • *****
  • Posts: 8,939
Geofencing is an element of 'Sense and Respond'; it's a manifestation of cybernetic control over free humanity.
The 'examples' are always innocuous though...

======================

An Exploration of Vehicle-Based Monitoring of Novice Teen Drivers - Final Report
http://www.docstoc.com/docs/76977528/An-Exploration-of-Vehicle-Based-Monitoring-of-Novice-Teen-Drivers---Final-Report

======================

But the real application is for FULL SPECTRUM DOMINANCE over humanity:

======================

Demonstration of ORNL-Developed Cognitive Radio/
RFID Technology to Enable Just-In-Time In-Transit Asset Visibility

http://www.ornl.gov/sci/ees/mssed/news-archieve2009.shtml

MSSED personnel recently demonstrated the results of its development effort to combine cognitive radio and radio frequency identification (RFID) technologies to enable the interoperability of existing legacy active RFID tag infrastructure and ISO 18000-7 2008 RFID tags. The demonstration took place on May 26, 2009 in Washington, DC for the U.S. Army PM J-AIT. The MSSED team was able to accomplish in 9 months what would typically takes multiple years and millions of dollars to complete.

The U.S. Army must be capable of operating in locations where an existing active RFID infrastructure does not exist, nor where is it deemed likely that permission would be granted to establish one. Commensurate with this need, the U.S. Army PM-JAIT needs the ability to provide just-in-time, condition-based, in-transit visibility of critical assets throughout the entire supply chain, including the “last tactical mile” where the location and condition of critical assets are often unavailable when they have gone beyond existing infrastructure. Therefore, PM J-AIT explored developing a tracking and tracing system similar to the U.S. Army’s Movement Tracking System (MTS), but smaller and more agile. The key goal was to provide continuous global connectivity that works independently of the availability of the local communications infrastructure. For such a system to be viable it must not only provide enhanced capabilities and features such as geo-location, sensor data and interoperability with ISO 18000-7, but backward compatibility with existing ANSI/INCITS 256 tags and infrastructure.

To that end, cognitive radio/RFID (CR2) devices were developed at ORNL that act as mobile active RFID readers for both types of RFID tags. Along with dual-mode RFID tagging functionality, the CR2 devices incorporate sensors for condition monitoring (temperature and light), reach-back communications via the Iridium satellite network, commercial global positioning system (GPS) capability, and system-initiated alerts (temperature threshold, container breach, and geofencing). The CR2 devices are also housed in a relatively small form factor. The system in which the CR2 devices operate is called the Secure Adaptive Intelligent Tracking (SAINT) System and is filling a key gap in the military’s logistics requirements.

For additional information on ORNL’s cognitive radio technology, please contact Paul D. Ewing, ewingpd@ornl.gov

======================

A Rule-based System for Sense-and-Respond Telematics Services
http://www.usenix.org/events/mobisys05/eesr05/tech/full_papers/munson/munson_html/index.html
Jonathan Munson†, SangWoo Lee‡, DaeRyung Lee‡,
David Wood†, Gerry Thompson†, Alan Cole†

†IBM T. J. Watson Research Center, Hawthorne, New York
‡IBM Ubiquitous Computing Laboratory, Seoul
jpmunson@us.ibm.com, lsw@kr.ibm.com, drlee@kr.ibm.com,
dawood@us.ibm.com, gerryt@us.ibm.com, colea@us.ibm.com

Abstract

We introduce a telematics-oriented event detection service, and programming framework supporting it, that enables application developers to more easily develop applications based on the sense-and-respond model. The system provides a rule-based programming model in which the application is partitioned in two parts: (1) a set of rules that operate on low-level position-update events and which, when triggered, produce high-level, application-defined events; and (2) logic that acts on the high-level events, which is deployed outside the event detection service, and typically within the environment of the enterprise deploying the rule. Programmers represent events of interest in the form of rules, which operate on both input received from the data acquisition systems as well as data resources provided and managed by the application programmers. Programmers declare the inputs the rules require, and the system is responsible for acquiring the inputs. A high-level programming framework assists programmers in defining the set of rules, and the actions that respond to events from the rules, and in deploying the rules to the system.

PDF is here: http://www.usenix.org/events/mobisys05/eesr05/tech/full_papers/munson/munson.pdf

And  the King shall answer and say unto them, Verily I say unto you, 
Inasmuch as ye have done it unto one of the least of these my brethren,  ye have done it unto me.

Matthew 25:40

Offline Satyagraha

  • Global Moderator
  • Member
  • *****
  • Posts: 8,939
Passing from one geofenced area to another will be seamless, unless you're in violation of the 'rules' (see above article, "A Rule-based System for Sense-and-Respond Telematics Services").

AT&T to Preview New Location Information Services Solution
at Annual Developer SummitAT&T Collaborating with LOC-AID and TechnoCom
on New Cloud-Based Mobility Offering to Enable Business Operation Improvements and Efficiencies

http://www.digchip.com/companies_news/2011/2011_01_05_5.php

... AT&T is collaborating with LOC-AID to enable enterprise customers to access location information of their customers in order to deliver location-aware services and content. With LOC-AID's Location-as-a Service(TM) (LaaS) offering, enterprises can now gain access to their customer's location information on-demand, based upon their business requirements or business events. The mobile location platform from LOC-AID, Location Xchange Gateway(TM), offers developers a single, highly secure, web-services API to get location data of mobile devices and a simple on-boarding process to create applications that use device location information. It also provides a range of location enablement services, including x/y coordinate delivery, geofencing, geocoding, map appends and location. Enterprise developers are able to locate mobile devices through the Location Xchange Gateway(TM) and utilize network-based location data to enable solutions like fraud prevention, mobile marketing, authentication, mobile analytics and asset tracking in a number of vertical industries.

Additionally, AT&T is teaming with TechnoCom to provide turn-key location and messaging solutions to enterprise customers through the TechnoCom Location Platform. The platform's intelligence and mediation capabilities, flexible workflow engine and configurable business rules are designed to add value to enable a diverse set of uses including roadside assistance, transaction fraud prevention, mobile advertising, customer relationship management, personal and family security, and mobile workforce management....
And  the King shall answer and say unto them, Verily I say unto you, 
Inasmuch as ye have done it unto one of the least of these my brethren,  ye have done it unto me.

Matthew 25:40

Offline Satyagraha

  • Global Moderator
  • Member
  • *****
  • Posts: 8,939
Remember the scene in Minority Report when Tom Cruise enters the shopping area...
all of the ads were targeting HIM. He had crossed the geofence...

Minority Report: Predictive technology is here
by Josiah Mackenzie on July 27, 2010
http://www.hotelmarketingstrategies.com/predictive-technology-is-here/



There’s a scene in Minority Report – the 2002 Spielberg-directed movie – where Tom Cruise sees ads popping up that anticipate his needs.
Jason Aaronson explains in a 2002 ClickZ article:

For those who haven’t seen the movie, the relevant part for this article is the depiction of electronic billboards and displays. Using a retinal scanner, the billboards (such as those on the walls of a subway) call out the name of the passerby. One ad, for American Express, shows the passerby’s name on an American Express card, with the “Member Since” field dynamically updated to reflect that person’s membership. A Guinness ad speaks to Tom Cruise’s character as he walks by, saying, “Hey, John, you look like you could use a Guinness!” The most interesting example, however, is when Cruise’s character walks into a Gap store. The ad welcomes him back and asks if he enjoyed the shirts he had bought previously.

To produce the movie, Spielberg assembled a “think tank” of MIT futurists to imagine what the world would look like in 2054.
Anyone participating in online advertising over the past few years know this isn’t complete fiction – or that farfetched. Our ability to track and tailor advertising has increased dramatically.

For once, the future may be closer than we think.
(continued)
And  the King shall answer and say unto them, Verily I say unto you, 
Inasmuch as ye have done it unto one of the least of these my brethren,  ye have done it unto me.

Matthew 25:40

Offline Kilika

  • Member
  • *****
  • Posts: 8,762
  • Thank you Jesus!
Quote
Faster border-crossing lane coming to Nogales
21 commentsApr. 8, 2011 06:24 AM
Associated Press
.

NOGALES - With the right paperwork, those entering the U.S. by car at the Dennis DeConcini Port-of-Entry at Nogales should get across the border much faster.

Under the new Ready Lane program, the Border Patrol says those with travel documents containing special radio frequency identification will have exclusive access to a special vehicle lane.

The Nogales port director tells the Nogales International that beginning Monday, all drivers and passengers over 16 can present their identification to a card reader as they approach the Border Patrol booth.

By the time the car reaches the booth, the officer will already know the identities and citizenship of its occupants, which translates into less time spent at the booth.

The Ready Lane program has already been implemented at border crossings in Texas.


Read more: http://www.azcentral.com/news/articles/2011/04/08/20110408arizona-nogales-faster-crossing-lane.html#ixzz1Kd2X18HO

http://www.cbp.gov/xp/cgov/newsroom/congressional_test/whti_ready_testify.xml

Quote
...Our decision to adopt vicinity RFID technology for the land border was based on the need to process legitimate travelers as speedily as possible without impacting security. After extensive review of available and possible technologies, DHS selected vicinity RFID as the best technology for our land border management system – and the standard to which all future land border travel documents will comply. Vicinity RFID technology affords the most benefits for the facilitated movement of travelers. Facilitation requires the ability to read a travel document in advance, verify identity, pre-position information, and, most importantly, perform automated watch list queries without impeding the flow of traffic. Our research and testing indicates that RFID technology is able to accomplish each of these requirements.

DHS and CBP have instituted best practices for the collection, protection, and use of personal information for WHTI. No personal identifying information is stored on the RFID tag and all data is stored at remote locations on secure storage devices that can only be accessed via DHS’s secure, encrypted networks. Issuance of an attenuating sleeve by DOS for the passport card and the states for the EDL will protect the tags from unauthorized reads when not in use at the border. Implementation of a card specific tag identifier number will ensure that a card cannot be cloned or duplicated.

On average, the use of RFID technology saves six to eight seconds of processing time per passenger. Although we expect to quickly process the documents of most travelers, we will not focus on speed as the singular measure of success. Speeding up the document querying and authentication process gives more time for our CBP officers to ask questions and conduct inspections of those who require additional scrutiny. Time now spent examining a document will instead be used to probe those seeking to enter the United States who may present a higher risk.

While the new document requirements and the implementation of WHTI are anticipated to have minimal negative impact on current wait times, other factors such as port design, infrastructure, traffic volume, and vehicle mix greatly affect border wait times. DHS and CBP are taking advantage of WHTI implementation to improve port infrastructure, but some challenges such as physical limitations will not be resolved in advance of WHTI implementation. Wait times are monitored on an hourly basis and proactive measures are taken to reduce wait times to the greatest extent possible using a variety of mitigation strategies and staff and lane utilization.

Both DHS and DOS have worked closely with the Canadian and Mexican governments on numerous fronts, including the Smart Border Declaration and the Shared Border Accord. The objectives of these initiatives are to establish a common security approach to protecting North America from external threats, and to streamline the secure and efficient movement of travel and trade. We remain committed to such consultations that have fostered WHTI accomplishments. In particular, DHS has been involved in clear, action-driven plans with our Canadian counterparts regarding secure alternative documents that are available to Canadian citizens for WHTI purposes, including the issuance and production of EDLs for Canadian citizens as an alternative to the Canadian passport.

We recognize that concerns remain about the impact of WHTI on border communities. We acknowledge that WHTI represents a social and cultural change, but assure the American people and Congress that WHTI will provide substantive enhancements to border security. The investments made at the ports of entry and to CBP systems are providing significant benefits to communities on both sides of the border and facilitate the legitimate flow of people and trade. WHTI is a key step in creating an effective and more efficient twenty-first century border. Our experience, to date, with both WHTI air implementation and the January 31, 2008, transition has been positive with no discernable negative impacts to the borders. We are confident that the deliberate, practical approach we have taken for the next phase of WHTI implementation will afford us the same results. WHTI conforms to our future vision of the land border in a way that meets our national security needs, our economic imperatives, and the public’s trust.
(cont.)
"For the love of money is the root of all evil: which while some coveted after, they have erred from the faith, and pierced themselves through with many sorrows."
1 Timothy 6:10 (KJB)

Offline One Revelator

  • Member
  • *****
  • Posts: 4,414
Next up, shock collars for humans.

Unbelievably, somebody has already thought of this. There is a niche that thinks that this would be a great idea. On sale now out of San Francisco.

Quote
E-Collar
 
Radio controlled locking shock collar
 
Material: Aluminium ( AlCuMg1 / AlMgSi1 )
 
Inside diameter of collar in photo = 130 mm, about 5.1 inches. Other sizes available, see below. 
 
Height = 7 layers x 8mm = 56 mm, or about 2.2 inches
 
http://www.cuff24.com/english/main-2.htm

Priced in Euros.
The number one cause of all human poverty, misery, and death is not global warming. It’s GLOBAL LYING.

Offline ghost hacked

  • Member
  • ****
  • Posts: 495
  • Watching you watching me!
    • o.h.m.
Next up, shock collars for humans.

Unbelievably, somebody has already thought of this. There is a niche that thinks that this would be a great idea. On sale now out of San Francisco.

Priced in Euros.

Similar to what has been proposed for unruley airline passengers, but in the form of a bracelet.
'We play the game with the bravery of being out of range.' - Roger Waters