Mitt Romney campaign's Full Spectrum Surveillance on their own Delegates!!!

Author Topic: Mitt Romney campaign's Full Spectrum Surveillance on their own Delegates!!!  (Read 11854 times)

0 Members and 1 Guest are viewing this topic.

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,093
    • Git Ureself Edumacated
Romney has just created the greated public relations nightmare in the history of the US electoral process!!!



The Ron Paul campaign is about to go into hyper drive!

Due to the fact that the American people have been waking up to the Ron Paul revolution, various delegates the previously supported Mitt Romney are deciding to change their support from Romney to Ron Paul, or anyone else but Romney.

This is a legal, normal, and human activity within the US political process that dates back over 200 years. This country was always intended to have an informed public with free speech to engage in open discourse regarding which public servants should be supported who will defend the constitution and the rights of man.

Well Romney people have begum to get completely paranoid about this activity so they have initiated a full spectrum surveillance program. And get this, the program is not to spy on Ron Paul delegates. IT IS TO SPY ON MITT ROMNEY DELEGATES!!!!

Not since declassified documents showed that Secretary of State Henry Kissinger spied on his best friends 100x more than he spied on his supposed enemies has such a paranoid act in America took place.

So all Mitt Romney delegates be warned that the New World Order candidate you are now supporting has just unleashed New World Order full spectrum surveillance and behavioral modification operations against your freewill and your very soul.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,093
    • Git Ureself Edumacated
Politico: How Romney is spending money to investigate their own delegates
http://www.dailypaul.com/225929/how-romney-may-try-to-pull-paul-into-the-fold
Submitted by kevinkervick on Wed, 04/11/2012 - 07:49

One of the most fascinating subtexts of the GOP primary has been the de facto non-aggression pact between Paul and Romney. While Paul has taken a few swipes at the former Massachusetts governor, they were mild compared with his all-out assault on the other Republicans in the race.

Romney officials hope this era of good feeling continues into the fall and that the libertarian-leaning congressman doesn’t run as a third-party candidate or exhort his loyal followers to abandon the GOP.

This can partly be done by Romney continuing to show the septuagenarian the respect he’s offered during the campaign. But Paul has at least two other interests: the ambitions of his son, Sen. Rand Paul (R-Ky.), and the fate of his agenda. The first can be taken care of with a convention role. The latter is more delicate.

“It’s not a quid pro quo thing, but [Paul] should know that the issues he raised in the primary, especially on monetary reform, will get attention,” said Bell. “Romney should make clear he’s open to looking at different options at the Fed.”

The other issue with Paul: how to tame his youthful supporters, few of which have any allegiance to the GOP.

Romney officials will have to spend some time and money in the next months minding state Republican conventions to ensure that the actual delegates elected to be on the floor in Tampa are truly loyal to him.

“You don’t want to have closet Ron Paul delegates there,” Donatelli said. “We had to spend at least a half-million dollars after John McCain was the presumptive candidate on state convention stuff just to make sure real McCain people were elected as delegates.”


bwaaaaaaaahahahaaaaaaaaaaaaaaaaaaaa, how much money is Ron Paul spending to make sure Ron Paul delegates are "loyal" to him.?

$0

This is 100% verified that the Mitt Romney campaign may spend more money infiltrating the private lives of their own delegates than the constitution allows. How the hell can anyone want to be a Mitt Romney delegate when their lives are about to be put into a terrorist watch list?

How the hell can anyone support a candidate who engages in these massively anti-constitutional power grabs even before he is a possible nominee?
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline chris jones

  • Member
  • *****
  • Posts: 21,197
 I can't for the life of me get a grip on ROMNEY fans, how can people, anyone that is, not see this fake for what he is.
 I'm of a average intelligence, not brilliant by any means. Point, that said I can not understand how any J.Q. citizen of this nation cheers for this freak.
Error, I'm Sorry, as I write this post my memory clicked in, many Americans still cheer for  Bush, Clinton, Oby, etc.
 I pondered on this for a while, considering that as a child I drank kool aid, used flouridated water and tooth paste etc., I attempted to resort to these brain numbing chemicals as a excuse for some citizens behavior, it didn't work, there is no excuse.
 End, I'm pleased Rom is being exposed and R.P. is rocking.
 
 

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,093
    • Git Ureself Edumacated
Welcome to Mitt Romney's Brave New World Order...

The Promise of Persistent Surveillance:

The Promise of Persistent Surveillance:  What are the Implications for the Common Operating Picture?
http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA436140

SCHOOL OF ADVANCED MILITARY STUDIES

Persistent Surveillance integrates the human component and various technologies and
processes across formerly stove piped domains.  It is not a permanent stare from space or from
airborne imagery platforms.  In essence, the targeted entity will be unable to move, hide, disperse,
deceive, or otherwise break contact with the focused intelligence system.

Once achieved, “persistent” ISR coverage will, in theory, deny the adversary sanctuary, enabling coherent
decision-making and action, to include rapid combat operations, with reduced risk to friendly
forces.


“The technotronic era involves the gradual appearance of a more controlled society. Such a society would be dominated by an elite, unrestrained by traditional values. [...] The capacity to assert social and political control over the individual will vastly increase.

It will soon be possible to assert almost continuous surveillance over every citizen

and to maintain up-to-date, complete files, containing even most personal information about the health or personal behavior of the citizen in addition to more customary data. These files will be subject to instantaneous retrieval by the authorities.”

https://www.mega.nu/ampp/privacy.html
-Zbigniew Brzezinski


All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,093
    • Git Ureself Edumacated
URBAN SUNRISE
Synthetic Urban Networks and Relationships
Intelligence and Simulation Environment

Available online at:  http://handle.dtic.mil/100.2/ada421528
[NOTE: Original Title: Protecting critical infrastructure in urban areas from YOU, the terrorist
Previously, we covered such subjects as 'social networks' - where the intelligence agencies, the Navy postgraduate school, Harvard, MIT and others were using it as a way to 'profile' you and all your social contacts/daily behavior.

Now, today we are going to go one step further into the bleak heart of the New World Order - you've just gotta ask yourself one question:

* Are these guys crazy/paranoid enough that they want to 'profile' my daily walking routine/behavior?

And the answer is: You betcha. And it's scary as hell - and while they don't talk about Twitter, or Google Wave, or RFID public transport cards, DO CONSIDER that they have all CONSIDERED this beforehand and have integrated into their system.

So the guy who had reservations about Twitter -

Twitter - double edged sword?
http://forum.prisonplanet.com/index.php?topic=157730.msg937046;boardseen#new

Was absolutely right. These guys are 'analyzing' traffic - they are investigating all the different 'routes' that binds groups of people together. Say, you have this shopping centre with a multitude of stores. The New World Order goons want to know - which kinds of people walk into this or that store, which kinds of people don't go to the store at all - which kinds of people stop to look at an advertisement in the shop window?

Computational Science and Its applications - ICCSA 2008 - Part I

Now be forewarned - this book is 1283 (!!!) pages long. It covers everything from iris recognition systems to geospatial data mining to 'profiling' the way you walk. Remember Alex talking about how the face-scanning cameras will use the biometric footprint of your body (that is what they have of you when you walk through the body scanner at the airport) to recognize you by the way you walk? Something similar to that is being discussed right here.

But before we discuss that - let's first talk about these guys using geospatial data to 'secure infrastructure' from the pesky public. Remember Dr Ruth A. David saying in that Homeland Security podcast that 'protecting key infrastructure' was one of Homeland Security's most important tasks - both domestic and abroad? That nexuses in with this.


Geospatial Modelling of Urban Security: A Novel Approach with Virtual 3D City Models


Markus Wolff and Hartmut Asche

University of Potsdam, Department of Geography, Karl-Liebknecht-Strasse 24/25,
14476 Potsdam, Germany
{Markus.Wolff,gislab}@uni-potsdam.de

Abstract.
Complex urban structures are exposed to a variety of security risks.Especially concerning man-made hazards, cities can be considered as particularly vulnerable. Due to their high concentration of population, technical and social infrastructure, as well as their importance in politics, culture, economy and finance, metropolitan areas, in particular, can be considered as vulnerable environments. Since not every part of an urban area is exposed to the same level of potential security threats, it can be assumed that this level differs regionally within a metropolis. Based on methods of geoinformation science, this paper presents an innovative approach to identify particularly vulnerable urban regions. Using the 3D city model of the German capital Berlin as an example, the potential of such models for mapping, analysis and assessment of different threat levels in urban environments is demonstrated. This geovisual and analytical potential of 3D city models can be instrumental for decision makers working in security agencies for both threat assessment and intuitive cartographic communication of spatial phenomena related to urban security issues.

Keywords:
GIS, 3D city models, geovisualisation, civil security.

1 Introduction
This paper presents an approach which couples GIS-based analysis with the visualisation potential of virtual three-dimensional city models. Taking the virtual 3D city model of the German capital Berlin as an example [4], we discuss selected geoanalysis methods targeted at data integration and vulnerability mapping of metropolitan regions. This geoanalytical method is then applied to investigate selected issues in the field of civil security. This approach requires the integration of application-specific thematic information into the databases of existing city models. This is accomplished by using a Geoinformation System (GIS) to manage large, heterogenous spatial data. Virtual representations of complex three-dimensional urban environments are constantly gaining popularity among both the scientific community and the wider public. To cater for these requirements we develop a workflow for extending, analysing, visualising and combining existing 3D city models with related thematic data of special interest within the domain of civil security.


Translation: they're tracking you - and they are determining and gauging whether you are a 'threat' to businesses or key infrastructure. As per Dr Ruth David's own admission, protecting key infrastructure is one of Homeland Security's most important assignments.


This workflow as well as the extension of the database with frequency and sociodemographic data is presented in section 2. Based on these database enhancements an innovative method to map and analyse regions with different degrees of exposure is presented in section 3. It is shown, that investigating urban environments for increased security risks reveals an uneven distribution of threat levels over metropolitan space. Thus different urban regions can be characterised by different levels of exposure, resistance and resilience compared to possible security threats. The end result is different levels and spatial distributions of vulnerability. In this context a GIS-based tool is presented which allows for an automated processing the input data and thus facilitates an easy repeatability of the analyses. Section 4 finally contains a short summary and introduces some perspectives.

2 Augmenting Existing Geodatabases for Geovisual Analysis
Three-dimensional city models are more and more available, with various cities possessing their own digital 3D representations. Compared to the traditional medium for communication of geographical data – the two-dimensional map – virtual three-dimensional city models facilitate in-depth analysis and presentation of spatial data. Furthermore, from a cartographic point of view, three-dimensional geovisualisation can reveal “patterns that are not necessarily visible when traditional map display methods” [9] are used. Applying methods and functions of visual analytics facilitates to “detect the expected and discover the unexpected” [11] as by means of visual data mining [5]. Thus, complex spatial situations like planning scenarios, noise and pollutant dispersal patterns are increasingly analysed and visualised by the use of 3D city models [3].

Typical datasets included in such databases contain, e.g., cadastral and topographic information as well as information relating to buildings, such as use or function, dimensions, height, etc. What is, however, widely lacking with these databases is application-specific thematic content linked to the different topographic and 3D data layers. To augment existing city model databases with thematic information required to conduct special-purpose geoanalysis in the field of civil security a workflow is developed to perform such operations in a systematic way (cf. figure 1). Within this workflow we use different methods of GIS-based analysis to extend the database. As an example, passenger-frequency information (cf. section 2.1) is added by linking this data to road segments. The GI-system database then provides the basis for further analysis and allows to generate different types of visualisations. Conceptually speaking, GIS serves as the centre for non-graphic data analysis. The 3D geovisualisation system serves as the visualisation front end, facilitating graphical analyses by interpreting spatial relationships in a three-dimensional environment. Applicationwise we use a commercial GIS package, namely Esri ArcGIS, and the LandXplorer 3D visualisation software system [6].

To investigate the geoanalytical potential of this combined GIS/VIS system, it has been applied to model urban risks in the centre of the German capital Berlin. The study area covers a 13 km by 6 km strip of the city centre inside the inner metropolitan train ring between Westkreuz and Ostkreuz S-Bahn stations. This transect contains the “Western Centre” (Kurfuerstendamm boulevard) of the city as well as its “Eastern Centre” (Alexanderplatz Square).


As a database we have used the official Berlin city model which includes the following data sets:

• Built-up area of 57,096 buildings, with height data and building function
• Street network, compiled primary for car navigation issues (from Teleatlas)
• Public transport network: Metropolitan train (S-Bahn), underground, tram and bus routes
• Geotopographic data, namely topographic map K5 (scale 1:5,000), digital terrain model (resolution 25m), high resolution aerial photography (HRSC, resolution 20cm)

2.1 Modelling Outdoor Bustle: Enhancing the Building Dataset with Frequency Information

An important factor in analysis of security related issues is detailed information on the activity flows within a city. With this information, areas, streets and single buildings in a city model can be identified which are daily frequented by many or few people. This kind of information is to date not included in the Berlin city model database. That is why data from the FAW Frequency Atlas of the German Association for Outdoor Advertising (FAW) are integrated into the 3D city model database. This atlas, originally developed for the advertising industry, has been compiled also for the city of Berlin and is based on Teleatlas road segments. The atlas data allow for an in-depth evaluation of pedestrian, car, and public transport frequencies. Frequencies are calculated as average values per hour on a working day basis for the years 1999 to 2005 [7]. Technically speaking, for each road segment one FAW point exists with the corresponding frequency values. Based on its geocoded coordinates this dataset is imported into the existing Berlin city model. This point-based FAW information is then referred to the corresponding road segments via its unique segment-ID. By this each segment of the street network dataset is supplemented by new attributes: The number of pedestrians, cars and public transport carrier that frequent any given street segment per hour of an average working day (cf. figure 2).


Note what they are doing here - they admit they are treating the entire CITY as a 'network' with 'activity flows' - which means they're treating you as a data packet inside a network. Yes, that's kind of a lame analogy, but it holds true when you see the picture below and you see the streams with the alternate colours - they show you the frequency of people walking on a daily basis in this or that street. Juxtapose all that with the cameras that also determine how many people are frequenting this or that road or area (and I have an official RFID book by the way that confirms that - I'll pull it up later to confirm this to you lot) - and this is surveillance on a far greater scale than anything ever imagined in George Orwell's 1984. This is why they need all those sensors inside the cities - predictive modeling of the pedestrians' behavior so that they can 'protect' key infrastructure - which is the police/law enforcement's chief focus today. THEY ARE NO LONGER ABOUT PROTECTING CITIZENS - I HAVE HAD THIS VALIDATED BY SEVERAL COPS WHO TOLD THIS SHIT RIGHT IN FRONT OF MY FACE.


In addition to frequency data referred to street segments similar information for buildings along streets can be relevant for civil security issues which are often relating to single potentially vulnerable buildings (My note: See? Protecting critical infrastructure - this is what the militarized/joint combat police are for in conjunction with Homeland Security. Remember Dr Ruth David in that Homeland Security broadcast saying Homeland Security's prime directive was protecting key infrastructure and the 'away game' (as in: operating overseas) was most important? That's what this is). For that purpose frequency values have been assigned to adjacent buildings by analysing distances from buildings to street segments (cf. figure 3). First, centroids of each building are calculated. Second, new points are created along the road segments for every 30 meters. Third, the four nearest segment points, based on each centroid, are identified. Finally, an average value is calculated from their frequency values which is assigned to the whole building. As a result, such “smart” buildings can be queried for their frequency data.




See? They're not just tracking the traffic flows of the cars and other automobiles using GIS - no, they're also recording and profiling the traffic flows of PEDESTRIANS - meaning, when you walk on the goddamn street for no particular reason other than to go shopping, get drunk or visit your significant other.

2.2 Modelling Building-Related Population Parameters: Augmenting the Building Dataset with Socio-demographic Data

To identify and analyse potentially vulnerable city regions additional socio-demographic data on a building block basis is required. Such data are, e.g., population density, family income or purchasing power. Knowledge of these patterns enables one to draw conclusions from exposure, resistance and resilience concerning a possible hazardous event. To map vulnerability patterns within an urban region, additional population data of the German Society for consumer research (GfK) are also integrated into the existing city model database. Here such data are only available for the central Berlin postal code zones 10115 and 10117, respectively. This is an area of 6 km² stretching from Brandenburg Gate in the west to Hackescher Market in the east, Bundesrat building in the south and Schwarzkopfstrasse underground station in the north.

This area is both suitable and interesting for security related analysis since numerous embassies, consulates and government buildings, as well as highly frequented touristic sites, such as Friedrichstrasse street, Unter den Linden boulevard, Gendarmenmarkt square, are located here. In addition, this area will house from 2011 the new headquarters of the German intelligence service (Bundesnachrichtendienst, BND) which will be located on the former World Youth Stadium (Stadion der Weltjugend) site.

As with processing of FAW frequency data, GfK data are imported using GIS functions. The available source dataset of 2006 includes numerous socio-demographic features such as population data, household size, household net income, building structure, building use, purchasing power. For data privacy reasons data are, however, not available for single buildings but for all buildings along a given street segment (My note: Oh, gee, thank goodness - they just 'profile' whether or not I fit inside some kind of poor or lower social class that is likely to pose a 'problem' for them - and hey, they can always extrapolate from that my household size and net income even though they basically deny here they have that capability.). Spatial reference of these point based data is by coordinates. Reference of those points to the appropriate buildings is verified by the matching of street names of GfK data points and belonging buildings, respectively. Therefore an algorithm is applied which searches for each building (its centroid) the nearest GfK point with the same street name. Attributes of this point are transferred to the building. Figure 4 is a 3D visualisation showing purchasing power related to each building block.


BTW - just as a side note - I thought that liberals were so fond of saying there are no longer any social classes or differences in social class? Well, this does seem to fly in the face of that - since they're giving certain residential zones 'certain colors' on the basis of their income status/purchasing power, and household size - and they 'infer' from that how likely you are a threat to 'key infrastructure'.




3 Geospatial Modelling of Urban Risks

The augmented 3D city model database is a prerequisite for further and in-depth geoanalysis of urban risks. The broad range of thematic data integrated into the database allows, e.g., for further spatial analysis in the context of an urban impact assessment. Such analysis will, however, not produce any precise indication which building (the element-at-risk, EAR), e.g., is exposed to an increased threat of what nature. For such evaluation of factual threat levels, a substantial amount of additional data would be required, many of which are not available publicly. In this context Koonce et al. [8] state that this knowledge is "best left to the security and intelligence agencies". In this study it is therefore assumed that only buildings with specific occupancies, such as government offices, or embassies, are particularly vulnerable to security threats.


OK, and what conclusion are we to draw from that? That the 'intelligence agencies' are monitoring and building maps of my entire residential area looking for threats to THEIR 'key infrastructures'? I thought the terrorists were over there, so we didn't have to fight them over here - why am I the threat? Oh why even entertain cognitive dissonance, we know how this game is being played.


Dealing with the nature and location of potentially hazardous events in urban environments [2, 10], an evaluation of the surroundings of a particular building exposed to a given risk is of special importance. Thus, for protection as well as for counteractive measures it is decisive to differentiate whether the structure is surrounded by open space or by dense urban housing. To perform such distance based analysis on the city model built-up area layers, a first step requires the creation of circular impact zones, with the element at risk in its centre. In our case the radii are defined at 150m, 300m, 500m, 1,000m and 2000m intervals. In a second step the intersections of impact zones and buildings allow for statistical analysis based on the built-up-area database. This analysis shows that buildings within zones one to three (up to 500 m from the EAR) are passed by an average of 200 pedestrians. This value is decreasing with increasing distance. Because of the EAR location in a business district of central Berlin, the greater the distance from the EAR the more buildings have residential instead of business and administrative occupancies. As a consequence the number of potentially affected pedestrians is decreasing while the number of residents is increasing (cf. figure 5).



3.1 Modelling the Distribution of Exposure Levels in Urban Environments

In the following an approach is presented to identify urban regions characterised by different degrees of exposure of a potential impact. The underlying assumption of this investigation is that not every area of an urban environment is equally exposed to the same level of potential threat. Rather a regional variation of threat levels can be found, as buildings potentially exposed to an increased security risk are not evenly distributed in city space. In this study the term "highly increased" threat is assumed for buildings housing embassies, consulates and government offices. An "increased" threat is assumed for the following buildings: Shopping centres, petrol stations (danger of explosion), police posts, power or transformer stations (critical infrastructure) etc. The following analysis is based on the buildings dataset of these categories (=exposed buildings). It can, however, be expanded to any user-defined set of buildings within a city model.

To map regionally different exposure levels the city model is first overlaid with a user-defined grid. Second, the distance of each grid cell to the closest exposed building is calculated. The resulting grid pattern is composed of cells each of which contains one distance value of the respectively closest exposed building. The grid can be further differentiated by building occupancy. The embassy grid, e.g., contains distance cell values of the closest buildings used as embassies or consulate offices. This set of exposure grids generated by proximity analysis forms the basis to identify different levels of threat exposure. For that purpose, each function-specific grid is reclassified in relation to proximity: Thus, grid cells closer to an exposed building are assigned a higher exposure level than cells with greater distance (cf. tab.1).



GIS-based grid analysis, as used here, allows for convenient overlays and combinations of areal data by using map algebra functions. Hence all function-specific exposure grids generated are combined into one single “exposure grid” by summation of their respective pixel values. It has been mentioned that different building uses can be assigned different levels of threat exposure. Thus summation is performed by weighting the respective grids according to their threat exposure: The embassy offices grid (embassies, consulates) and the government offices grid are weighted with a factor of 4, the shopping centre grid with a factor of 2 and the service and utilities grid (police posts, petrol stations, power stations) with a factor of 1 (figure 6).

The workflow described here has been automated by developing a GIS tool using ESRIs ArcObjects based software development framework. Our tool facilitates an automated and fast processing of the single grids (figure 7).







To employ this tool a buildings dataset containing information on building use and functions, respectively, is mandatory. The current version requires the user has to create an ASCII remap table according to table 1.

The combined weighted exposure grid can be visualised in different user-centered ways for further geoanalytical processing. Presented here is a 3D visualisation of a virtual threat surface based on the Berlin city digital terrain model (cf. figure 8). For easy comprehension exposure grid values are exaggerated by a height factor of 10 and added to the original height values of the digital terrain model. The resulting 3D map is a graphic, easy-to-read visualisation of the spatial distribution of threats in urban environments.

Intersection of the summation exposure grid with the buildings layer results in additional threat information in the built-up area dataset. As this dataset has also been augmented by socio-demographic data, a variety of geographical correlations of building occupancy, socio-demographic situation, infrastructure etc. with regional threat exposure can be mapped, visualised and analysed. For instance, all buildings located within grid cells with values of combined exposure levels greater than a given value can be selected. Also statistical analyses can be performed to distinguish between spatially varied socio-demographic feature states. As a result, it is feasible to map those regions characterised by a number of inhabitants above average, significant purchasing power and high financial status (derived from net income per household)
.


So, what conclusion am I supposed to draw from this? That the Census Bureau is out of a job? (or not, depending on who you think is going to be running this system) Can we let machines run this thing - possibly employing a neural network or a 'world brain' for a particular city segment? Do machines start analyzing sociodemographic data and basing their agenda on it?


4 Summary
This paper presents an approach to combine GIS-based spatial analysis with innovative 3D visualisations using virtual three-dimensional city models for applications in civil security. Based on augmenting the existing spatial database of the virtual 3D city model of the German capital Berlin by a variety of parameters including building occupancy, frequency values and socio-demographic parameters, areas and objects exposed to specific levels of threat can be identified By combining function-specific grids with threat exposure levels the spatial distribution of threat levels can be mapped. The resulting geographic distribution can subsequently be combined with additional socio-demographic or infrastructure data for further geovisual analysis. (My note: So, what they have here is a realtime virtual environment MODELLED on the actual environment that basically includes you, your entire residential block, the income and purchasing power of your residential block, and all of this with the specific intent and purpose to profile whether or not you will EVENTUALLY pose a threat to 'key infrastructure' and the government. What this is, is SimCity for psychopaths - SimCity for control freaks - they are running here a color-coded version of SimCity that is modelled on the real-world. This is the kind of depersonalization that enabled the Nazi death camps - reducing men with real lives, with real emotions, with real feelings to mere statistics and engraved dots inside some Hollerith supercomputer which is continuously fed punch cards) Perspectively some of the presented methods and functions will be modified: The ArcObjects tool presented in section 3.2 will be extended to a larger ArcMap plug-in which also allows for an automated processing of the GIS features for the 3DLandXplorer System. Furthermore the presented approach of modelling and analysing
urban security by using GIS and 3D city models will be broadened by introducing some standards of thematic 3D cartography. Thus, an efficient communication of spatial phenomena shall be ensured.

Acknowledgements
Funding of this study by the German Federal Ministry of Education and Research (BMBF) within the framework of the InnoProfile research group ‘3D Geoinformation’ (www.3dgi.de) is gratefully acknowledged. The authors also like to thank the German Association for Outdoor Advertising (FAW) for providing frequency atlas data and Berlin Partner GmbH for use of the official Berlin 3D city model.

References

1. Borst, D., Jung, D., Murshed, S.M., Werner, U.: Development of a methodology to assess man-made risks in Germany. Natural Hazards and Earth Sciences 6, 779–802 (2006)
2. Coaffee, J.: Terrorism, Risk and the City: The Making of a Contemporary Urban Landscape, Gateshead, Ashgate Publishing, Ltd. (2003)
3. Czerwinski, A., Kolbe, T.H., Plümer, L., Stöcker-Meier, E.: Spatial data infrastructure techniques for flexible noise mapping strategies. In: Tochtermann, K., Scharl, A. (eds.)
20th International Conference on Environmental Informatics - Managing Environmental Knowledge, Graz, pp. 99–106 (2006)
4. Döllner, J., Kolbe, T.H., Liecke, F., Sgouros, T., Teichmann, K.: The Virtual 3D City Model of Berlin - Managing, Integrating and Communicating Complex Urban Information.
In: 25th Urban Data Management Symposium, Aalborg, Denmark, 9.73–79.86 (2006)
5. Döllner, J., Baumann, K., Buchholz, H.: Virtual 3D City Models as Foundation of Complex Urban Information Spaces. In: Schrenk, M. (ed.) CORP, Vienna (2006)
6. Döllner, J., Baumann, K., Kersting, O.: LandExplorer – Ein System für interaktive 3DKarten.
Kartographische Schriften 7, 67–76 (2003)
7. Fachverband für Außenwerbewirtschaft, FAW-Frequency-Atlas, Data description (2006)
8. Koonce, A.M., Apostolakis, G.E., Cook, B.K.: Bulk Power Grid Risk Analysis: Ranking Infrastructure Elements According to their Risk Significance, In: Working Paper Series, Massachusetts Institute of Technology, 39 pgs (2006)
9. Kraak, M.J.: Geovisualization illustrated. ISPRS Journal of Photogrammetry and Remote Sensing 57, 390–399 (2003)
10. Mitchell, J.K.: Urban Vulnerability to Terrorsim as a Hazard. In: Cutter, S.L., Richardson, D.B., Wilbanks, T.J. (eds.) The Geographical Dimensions of Terrorism, pp. 17–25.
Routledge, London (2003)
11. Thomas, J.J., Cook, K.A.: Illuminating the Path: The Research and Development Agenda for Visual Analytics. IEEE Computer Society, Los Alametos (2005)



BTW - know what they did here?

They've just applied the DHS original color-coded threat assessment system onto the entire world map - they've 'color coded' entire residential zones according to the threat they pose to DHS' to-be-protected key infrastructure, and on top of that they can also pull in all of the sociodemographic data that is also going into this system - they can see if you're living inside a residential area with relatively low household income, they can probably infer from that the racial or ethnic makeup, and so on.

This is the kind of stuff that enabled the Nazi concentration camps - because what they do is, they de-personify you and entire classes of people - and turn it into a number, a statistic, a binary floating inside some computer system. How 'convenient' that the concentration camps were all enabled by IBM Hollerith supercomputers with punch card index systems used to compile much of the sociodemographic and racial makeup that the Nazis desired.

It could 'never happen again', eh? Combine this system with the Global Information Grid, with Interpol's DNA databank and it absolutely DWARFS anything the Nazis ever came up with - it's full spectrum dominance of everything inside the public and private sector.


All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,093
    • Git Ureself Edumacated
Let's do some dot connecting:

Here's a screencap of a portion of the 1st page of the PDF.  Notice the name of the defense contractor.

http://handle.dtic.mil/100.2/ada421528
Look how they constantly PRETEND to not be engaging in 100% illegal operations, pretend to give a f*ck about any aspect of real privacy.  Remember though, that we've already exposed that the word "privacy" from their point of view simply means more surveillance, with diminished, and then eventually no oversight nor accountability.
Department Of Homeland Security Tells Congress Why It's Monitoring Facebook, Twitter, Blogs
http://www.fastcompany.com/1816814/department-of-homeland-security-explains-social-media-monitoring-project-to-congress
BY Neal UngerleiderThu Feb 16, 2012

According to testimony, the Homeland Security Department has outsourced their own social media monitoring program to an outside contractor, defense giant General Dynamics. General Dynamics was the sole party to the original DHS contract, which was not offered to any outside parties--and Chavez was caught misleading the Committee about General Dyamics' sole status.

General Dynamics employees responsible for the DHS social media monitoring contract are required to attend a training course in DHS privacy practices several times a year. If General Dynamics employees misuse the personal information of journalists, public figures or the general public (to include Twitter or Facebook users) in any way, their punishment is restricted to additional training classes or dismissal from the project.

General Dynamics and the Department of Homeland Security are primarily engaging in keyword monitoring of social media. Callahan admitted in sworn testimony that the bulk of the keywords used by DHS were chosen as the result of being included in commercially available, off-the-shelf bulk packages. These bulk keyword packages were later customized according to DHS specifications. (continued)

http://www.rawstory.com/rs/2012/02/23/secret-documents-reveal-dhs-lied-about-tracking-social-media/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+TheRawStory+%28The+Raw+Story%29&flv=1
Secret documents reveal DHS lied about tracking Americans on social media
By Stephen C. Webster
Thursday, February 23, 2012 17:14 EST

One of the nation’s leading electronic privacy groups claimed this week that the Department of Homeland Security (DHS) misled members of Congress during a recent hearing on whether the Department is paying a defense contractor $11.4 million to keep tabs on protected free speech and dissent against government policies on the Internet.

The Electronic Privacy Information Center (EPIC), which triggered the hearing by publishing a trove of secret government documents in January, told Raw Story on Thursday that a second round of documents they’ve obtained directly contradicts testimony given on Feb. 16, showing that the DHS instructed their analysts to do exactly what the Department denied.

“There were several exchanges that they had with members of Congress in which they sort of distanced themselves from the idea — that they weren’t engaging in this monitoring of public reaction to government proposals,” McCall told Raw Story. “But that’s… Well, it’s not true, according to the documents we obtained.”

In a letter (PDF) sent Wednesday to the ranking members of the House Subcommittee on Counterterrorism and Intelligence, Ginger McCall, who directs EPIC’s Open Government Project, explains that details within the document directly contradict testimony given during the hearing (PDF).

Altogether, the documents released by EPIC in January and in February reveal that the Department is paying defense contractor General Dynamics to monitor the Internet for “reports that reflect adversely on DHS and response activities,” including “reports that pertain to DHS and sub agencies — especially those that have a negative spin on DHS/Component preparation, planning, and response activities,” among other things.

“The DHS testimony, as well as the documents obtained by EPIC, indicate that the agency is monitoring constantly, under very broad search terms, and is not limiting that monitoring to events or activities related to natural disasters, acts of terrorism, or manmade disasters,” McCall explained to lawmakers. “The monitoring is designed to be over-broad, and sweeps in large amounts of First Amendment activity. The DHS has no legal authority to engage in this monitoring.”

In an email exchange, DHS spokesman Matthew Chandler insisted that they only monitor social media “for situational awareness purposes only, within the clearly defined parameters articulated in our Privacy Impact Assessment (PDF), to ensure that critical information reaches appropriate decision-makers.” He added that the DHS will “review the language contained in all materials to clearly and accurately convey the parameters and the intention of the program.”

Documents published by EPIC show that analysts were instructed to watch for “both positive and negative reports” about the Federal Emergency Management Agency (FEMA), U.S. Citizenship and Immigration Services (CIS), U.S. Customs and Border Protection (CBP), Immigration and Customs Enforcement (ICE), and the strangely wide-ranging “organizations outside of DHS.” Other “items of interest” include discussions about immigration policies, drug policies, cyber security matters, and U.S. foreign policy.

About 300 pages of documents (PDF) obtained through a Freedom of Information Act lawsuit and published by EPIC in January revealed that analysts were specifically told to scour the Internet and social networks like Facebook and Twitter in search of “any media reports that reflect adversely on the U.S. Government,” and to zero in on discussions criticizing government policies and proposals.

Revelations in that initial round of documents triggered a Feb. 16 Congressional hearing and sent DHS officials backpedaling, insisting that type of monitoring was only discussed, not implemented. On the same day of the hearing, EPIC published its second round of documents, revealing a DHS manual on social media monitoring dated “2011,” which carries detailed instructions on what agency analysts are supposed to look for.

“This has a profound effect on free speech online if you feel like a government law enforcement agency — particularly the Department of Homeland Security, which is supposed to look for terrorists — is monitoring your criticism, your dissent, of the government,” McCall told Raw Story.

Reached for comment, aides to subcommittee Chairman Patrick Meehan (R-PA) and ranking member Jackie Speier (D-CA) said they had not read EPIC’s letter, offering no further statements.

Similarly, General Dynamics did not respond to a request for comment, and it is still not clear if the company actually produced reports for the DHS detailing public dissent against government policies, or if the Department’s instructions to social media analysts were even ever implemented.

EPIC said that its lawsuit against DHS was continuing, and that they would press members of Congress for further hearings on the matter. Meanwhile, they have proposed that Congress suspend the DHS program and investigate whether these same practices are being carried out by other agencies.

It is already a matter of public record that the U.S. Air Force has purchased software used for “persona management” across multiple social media platforms, which gives information operatives the ability to control a virtual army of fake people online. Military officials told Raw Story that the software was being used for “classified social media activities” overseas.

This fits in with this 'urban security' essay - notice that in this essay they were looking at people's daily walking behavior. Notice also that the cameras and cell phones are being employed to monitor exactly that behavior.

http://arstechnica.com/science/news/2010/02/cell-phones-show-human-movement-predictable-93-of-the-time.ars

Quote
Cell phones show human movement predictable 93% of the time

We'd like to think of ourselves as dynamic, unpredictable individuals, but according to new research, that's not the case at all. In a study published in last week's Science, researchers looked at customer location data culled from cellular service providers. By looking at how customers moved around, the authors of the study found that it may be possible to predict human movement patterns and location up to 93 percent of the time. These findings may be useful in multiple fields, including city planning, mobile communication resource management, and anticipating the spread of viruses. (My note: Anticipating the spread of virsues - mymy - city planning - as in where to put the dome cameras and sensors next to cover every possible avenue)

It's not currently possible to know exactly where everyone is all the time, but cell phones can provide a pretty good approximation. Cell phone companies store records of customers' locations based on when the customers' phones connect to towers during calls. Researchers realized that taking this data and paring it down to users who place calls more frequently might allow them to see if they could develop any measure of how predictable human movements and locations are (My note: And this, my friends, is why they're hooking up these phones to Social Network sites and using Dynamic Social Network Analysis - it's so that they can put a face, a personality, and your likes and dislikes to this faceless 'node' that is walking around in their system). The users they worked with placed calls an average of once every two hours, connecting to towers that cover an area of about two square miles.

The authors analyzed various aspects of the information related to the calls, as well as information that could be aggregated over multiple calls: number of distinct locations, historical probability that the location had been visited in the past, time spent at each tower, the order in which customers usually visited towers, and so on. With these numbers, the authors could create measures of the entropy of the customers' trajectories (My note: Entropy - this word and concept came up in a previous research paper that I linked to - conveniently, it was also about using cell phones to track people). To control for uncertainty, they also looked at instances where a customer was not in communication with the grid and effectively invisible to them, and removed those that had frequent extended periods of invisibility.

Most customers seemed to stick to the same small area, a radius of six miles or less, but there were a few callers that regularly traveled areas of a radius of hundreds of miles. It would seem that the cell phone users who traveled the least would be the most predictable in their movements, but the authors found this to be untrue. All users were roughly equally predictable, regardless of the size of their typical traveled region. Everyone seemed to have a set area that they rarely left, and that area was always traveled in a very regular way—even the jet-setters appear to rarely deviate from their travel patterns.

Customers that stuck to the same six-mile radius had predictability rates of 97 to 93 percent, and this fell off as the typical area of travel grew. But the predictability eventually stabilized, and remained at 93 percent even as the radius of travel rose to thousands of miles. Regardless of how widely they traveled, the researchers could adequately predict their locations, down to the specific tower, 93 percent of the time.

Breaking down the schedules of users by the hour allowed the authors to see how the variability changed during the course of a day. As might be expected, users' locations had the lowest measures of regularity during transition periods, such as the hours before and after work and during lunch times. Customers also had a 70 percent likelihood of being at their number one most-visited location at any random point in time. That's quite a high number, considering that randomizing positions over the average number of locations visited per person gives a 1.6 percent likelihood of finding them at each one.

The authors note that this research has a variety of practical implications. Knowing how easy it is to predict human movement, mobile communications businesses could anticipate data load (we're looking at you, AT&T) and city planners could use the data to inform their models of traffic flow. The big limitation of the study was the restriction of the analysis to fairly frequent cell phone users, but it might be possible to combine this with other data sets to form harder and faster human location predictions.


This is a PR handout - they report on this with a straight face, and they don't even point out the obvious ways in which this stuff can (and IS) used for total Big Brother surveillance and control. Has the whole world gone mad or what? Has their brain been fried completely? How can they NOT see this as being total Big Brother - totally unnecessary - totally sick and degrading? All these tech sites and their sucking up to the establishment - f**k all these guys and f**k their predecessors before them. None of the IBM guys at the Nazi concentration camps seemed to object either - that's what utter scum this industry is - hiding behind the veil of 'liberal' Jon Stewart viewers 'concerned about the environment/concerned about the whales being slaughtered by Japan', but they're fine with this type of goddamn total Big Brother, police state surveillance - oh yes, it's a 'great system', isn't it guys?

Check out this post - this is from our cute and liberal friends over at the 'Social Computing and Behavioral Modeling' symposium - btw, their next symposium is being held this March - I hope Sociostudent is going there so we can gain a perspective on this stuff.

Inferring Social Network Structure using Mobile Phone Data (MUST SEE)
http://forum.prisonplanet.com/index.php?topic=156337.msg929440
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,093
    • Git Ureself Edumacated
Mitt Romney getting advice from Sir Henry Kissinger?

As national security adviser, Kissinger had created an information-gathering, policy-deciding empire far vaster than anything assembled by his predecessors.  He was given so much authority by Nixon that he became the second most powerful man in the White House -- if not the most powerful. (His "boss" did not survive Watergate; Henry did.)

He was the man who said "power is the ultimate aphrodisiac", and who was quoted in New York Times magazine as joking,

"The illegal we do immediately. the unconstitutional takes a little longer".

This is the man who eavesdropped on his own staff and bugged suspect newsmen, but who, when challenged about it, blackmailed both Congress and the media by threatening to resign if they did not ignore his role in the telephone taps.


http://www.whale.to/b/allen_b2.html
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Scarbo

  • Member
  • *****
  • Posts: 854
I can't for the life of me get a grip on ROMNEY fans, how can people, anyone that is, not see this fake for what he is.
 I'm of a average intelligence, not brilliant by any means. Point, that said I can not understand how any J.Q. citizen of this nation cheers for this freak.
Error, I'm Sorry, as I write this post my memory clicked in, many Americans still cheer for  Bush, Clinton, Oby, etc.
 I pondered on this for a while, considering that as a child I drank kool aid, used flouridated water and tooth paste etc., I attempted to resort to these brain numbing chemicals as a excuse for some citizens behavior, it didn't work, there is no excuse.
 End, I'm pleased Rom is being exposed and R.P. is rocking.
 
 

Romney has looks, poise, and a smooth sounding voice, and this has the effect of hypnosis. You have to make people understand this and help them get past the image. It's a Milli Vanilli world where image trumps reality a great deal of the time. But if the majority of Congress looked like who they really are they would never be elected in the first place, much less reelected over and over. Why? Because we'd see the demonic vampires with giant fangs covered in blood that their sheep's clothing stealthily hides. This is what judging people on their appearance gets you. Evil demonic criminal vampires. The best liars look like nice people.


Do some research on the halo effect and you'll see just how delusional humans can be. Everyone believes it's "experience" telling them what their mind decides in two seconds or less, but it's not, and it shuts off the thinking mind the same way fear does.



Offline Jackson Holly

  • Member
  • *****
  • Posts: 12,334
  • It's the TV, stupid!
    • JACKSON HOLLY'S OLD HOME PLACE
Romney has looks, poise, and a smooth sounding voice, and this has the effect of hypnosis. You have to make people understand this and help them get past the image. It's a Milli Vanilli world where image trumps reality a great deal of the time. But if the majority of Congress looked like who they really are they would never be elected in the first place, much less reelected over and over. Why? Because we'd see the demonic vampires with giant fangs covered in blood that their sheep's clothing stealthily hides. This is what judging people on their appearance gets you. Evil demonic criminal vampires. The best liars look like nice people.


Do some research on the halo effect and you'll see just how delusional humans can be. Everyone believes it's "experience" telling them what their mind decides in two seconds or less, but it's not, and it shuts off the thinking mind the same way fear does.





^^^^

Nice #666 post ....!   +1


St. Augustine: “The truth is like a lion; you don't have to defend it.
Let it loose; it will defend itself."

Offline chris jones

  • Member
  • *****
  • Posts: 21,197
Mitt Romney getting advice from Sir Henry Kissinger?

As national security adviser, Kissinger had created an information-gathering, policy-deciding empire far vaster than anything assembled by his predecessors.  He was the man who said "power is the ultimate aphrodisiac", and who was quoted in New York Times magazine as joking,
Hi Dig, I have moved around a tad, am now in Brazil. The consulate files, they know more about me than I do. We are all wired into their hard drive. DARPA,DHS,FBI,CIA,DOD, are but a few of their tentacles, the obvious hits are in evidence. SSN, drivers liscence, medical records, cell and land line, education, liscencing of any nature, criminal records, schooling, military records, dentall, credit card useage, taxes, afiliations, mortages-addresses, family, neighbors, internett, etc.
We are Flaged and color coded.