Author Topic: ***2008 ICCSA Documents explain the treasonous 2012 Def Auth Nazi Crap  (Read 17670 times)

0 Members and 1 Guest are viewing this topic.

Offline squarepusher

  • Member
  • *****
  • Posts: 2,013
[NOTE: Original Title: Protecting critical infrastructure in urban areas from YOU, the terrorist
Previously, we covered such subjects as 'social networks' - where the intelligence agencies, the Navy postgraduate school, Harvard, MIT and others were using it as a way to 'profile' you and all your social contacts/daily behavior.

Now, today we are going to go one step further into the bleak heart of the New World Order - you've just gotta ask yourself one question:

* Are these guys crazy/paranoid enough that they want to 'profile' my daily walking routine/behavior?

And the answer is: You betcha. And it's scary as hell - and while they don't talk about Twitter, or Google Wave, or RFID public transport cards, DO CONSIDER that they have all CONSIDERED this beforehand and have integrated into their system.

So the guy who had reservations about Twitter -

Twitter - double edged sword?;boardseen#new

Was absolutely right. These guys are 'analyzing' traffic - they are investigating all the different 'routes' that binds groups of people together. Say, you have this shopping centre with a multitude of stores. The New World Order goons want to know - which kinds of people walk into this or that store, which kinds of people don't go to the store at all - which kinds of people stop to look at an advertisement in the shop window?

Computational Science and Its applications - ICCSA 2008 - Part I

Now be forewarned - this book is 1283 (!!!) pages long. It covers everything from iris recognition systems to geospatial data mining to 'profiling' the way you walk. Remember Alex talking about how the face-scanning cameras will use the biometric footprint of your body (that is what they have of you when you walk through the body scanner at the airport) to recognize you by the way you walk? Something similar to that is being discussed right here.

But before we discuss that - let's first talk about these guys using geospatial data to 'secure infrastructure' from the pesky public. Remember Dr Ruth A. David saying in that Homeland Security podcast that 'protecting key infrastructure' was one of Homeland Security's most important tasks - both domestic and abroad? That nexuses in with this.

Geospatial Modelling of Urban Security: A Novel Approach with Virtual 3D City Models

Markus Wolff and Hartmut Asche

University of Potsdam, Department of Geography, Karl-Liebknecht-Strasse 24/25,
14476 Potsdam, Germany

Complex urban structures are exposed to a variety of security risks.Especially concerning man-made hazards, cities can be considered as particularly vulnerable. Due to their high concentration of population, technical and social infrastructure, as well as their importance in politics, culture, economy and finance, metropolitan areas, in particular, can be considered as vulnerable environments. Since not every part of an urban area is exposed to the same level of potential security threats, it can be assumed that this level differs regionally within a metropolis. Based on methods of geoinformation science, this paper presents an innovative approach to identify particularly vulnerable urban regions. Using the 3D city model of the German capital Berlin as an example, the potential of such models for mapping, analysis and assessment of different threat levels in urban environments is demonstrated. This geovisual and analytical potential of 3D city models can be instrumental for decision makers working in security agencies for both threat assessment and intuitive cartographic communication of spatial phenomena related to urban security issues.

GIS, 3D city models, geovisualisation, civil security.

1 Introduction
This paper presents an approach which couples GIS-based analysis with the visualisation potential of virtual three-dimensional city models. Taking the virtual 3D city model of the German capital Berlin as an example [4], we discuss selected geoanalysis methods targeted at data integration and vulnerability mapping of metropolitan regions. This geoanalytical method is then applied to investigate selected issues in the field of civil security. This approach requires the integration of application-specific thematic information into the databases of existing city models. This is accomplished by using a Geoinformation System (GIS) to manage large, heterogenous spatial data. Virtual representations of complex three-dimensional urban environments are constantly gaining popularity among both the scientific community and the wider public. To cater for these requirements we develop a workflow for extending, analysing, visualising and combining existing 3D city models with related thematic data of special interest within the domain of civil security.

Translation: they're tracking you - and they are determining and gauging whether you are a 'threat' to businesses or key infrastructure. As per Dr Ruth David's own admission, protecting key infrastructure is one of Homeland Security's most important assignments.

This workflow as well as the extension of the database with frequency and sociodemographic data is presented in section 2. Based on these database enhancements an innovative method to map and analyse regions with different degrees of exposure is presented in section 3. It is shown, that investigating urban environments for increased security risks reveals an uneven distribution of threat levels over metropolitan space. Thus different urban regions can be characterised by different levels of exposure, resistance and resilience compared to possible security threats. The end result is different levels and spatial distributions of vulnerability. In this context a GIS-based tool is presented which allows for an automated processing the input data and thus facilitates an easy repeatability of the analyses. Section 4 finally contains a short summary and introduces some perspectives.

2 Augmenting Existing Geodatabases for Geovisual Analysis
Three-dimensional city models are more and more available, with various cities possessing their own digital 3D representations. Compared to the traditional medium for communication of geographical data – the two-dimensional map – virtual three-dimensional city models facilitate in-depth analysis and presentation of spatial data. Furthermore, from a cartographic point of view, three-dimensional geovisualisation can reveal “patterns that are not necessarily visible when traditional map display methods” [9] are used. Applying methods and functions of visual analytics facilitates to “detect the expected and discover the unexpected” [11] as by means of visual data mining [5]. Thus, complex spatial situations like planning scenarios, noise and pollutant dispersal patterns are increasingly analysed and visualised by the use of 3D city models [3].

Typical datasets included in such databases contain, e.g., cadastral and topographic information as well as information relating to buildings, such as use or function, dimensions, height, etc. What is, however, widely lacking with these databases is application-specific thematic content linked to the different topographic and 3D data layers. To augment existing city model databases with thematic information required to conduct special-purpose geoanalysis in the field of civil security a workflow is developed to perform such operations in a systematic way (cf. figure 1). Within this workflow we use different methods of GIS-based analysis to extend the database. As an example, passenger-frequency information (cf. section 2.1) is added by linking this data to road segments. The GI-system database then provides the basis for further analysis and allows to generate different types of visualisations. Conceptually speaking, GIS serves as the centre for non-graphic data analysis. The 3D geovisualisation system serves as the visualisation front end, facilitating graphical analyses by interpreting spatial relationships in a three-dimensional environment. Applicationwise we use a commercial GIS package, namely Esri ArcGIS, and the LandXplorer 3D visualisation software system [6].

To investigate the geoanalytical potential of this combined GIS/VIS system, it has been applied to model urban risks in the centre of the German capital Berlin. The study area covers a 13 km by 6 km strip of the city centre inside the inner metropolitan train ring between Westkreuz and Ostkreuz S-Bahn stations. This transect contains the “Western Centre” (Kurfuerstendamm boulevard) of the city as well as its “Eastern Centre” (Alexanderplatz Square).

As a database we have used the official Berlin city model which includes the following data sets:

• Built-up area of 57,096 buildings, with height data and building function
• Street network, compiled primary for car navigation issues (from Teleatlas)
• Public transport network: Metropolitan train (S-Bahn), underground, tram and bus routes
• Geotopographic data, namely topographic map K5 (scale 1:5,000), digital terrain model (resolution 25m), high resolution aerial photography (HRSC, resolution 20cm)

2.1 Modelling Outdoor Bustle: Enhancing the Building Dataset with Frequency Information

An important factor in analysis of security related issues is detailed information on the activity flows within a city. With this information, areas, streets and single buildings in a city model can be identified which are daily frequented by many or few people. This kind of information is to date not included in the Berlin city model database. That is why data from the FAW Frequency Atlas of the German Association for Outdoor Advertising (FAW) are integrated into the 3D city model database. This atlas, originally developed for the advertising industry, has been compiled also for the city of Berlin and is based on Teleatlas road segments. The atlas data allow for an in-depth evaluation of pedestrian, car, and public transport frequencies. Frequencies are calculated as average values per hour on a working day basis for the years 1999 to 2005 [7]. Technically speaking, for each road segment one FAW point exists with the corresponding frequency values. Based on its geocoded coordinates this dataset is imported into the existing Berlin city model. This point-based FAW information is then referred to the corresponding road segments via its unique segment-ID. By this each segment of the street network dataset is supplemented by new attributes: The number of pedestrians, cars and public transport carrier that frequent any given street segment per hour of an average working day (cf. figure 2).

Note what they are doing here - they admit they are treating the entire CITY as a 'network' with 'activity flows' - which means they're treating you as a data packet inside a network. Yes, that's kind of a lame analogy, but it holds true when you see the picture below and you see the streams with the alternate colours - they show you the frequency of people walking on a daily basis in this or that street. Juxtapose all that with the cameras that also determine how many people are frequenting this or that road or area (and I have an official RFID book by the way that confirms that - I'll pull it up later to confirm this to you lot) - and this is surveillance on a far greater scale than anything ever imagined in George Orwell's 1984. This is why they need all those sensors inside the cities - predictive modeling of the pedestrians' behavior so that they can 'protect' key infrastructure - which is the police/law enforcement's chief focus today. THEY ARE NO LONGER ABOUT PROTECTING CITIZENS - I HAVE HAD THIS VALIDATED BY SEVERAL COPS WHO TOLD THIS SHIT RIGHT IN FRONT OF MY FACE.

In addition to frequency data referred to street segments similar information for buildings along streets can be relevant for civil security issues which are often relating to single potentially vulnerable buildings (My note: See? Protecting critical infrastructure - this is what the militarized/joint combat police are for in conjunction with Homeland Security. Remember Dr Ruth David in that Homeland Security broadcast saying Homeland Security's prime directive was protecting key infrastructure and the 'away game' (as in: operating overseas) was most important? That's what this is). For that purpose frequency values have been assigned to adjacent buildings by analysing distances from buildings to street segments (cf. figure 3). First, centroids of each building are calculated. Second, new points are created along the road segments for every 30 meters. Third, the four nearest segment points, based on each centroid, are identified. Finally, an average value is calculated from their frequency values which is assigned to the whole building. As a result, such “smart” buildings can be queried for their frequency data.

See? They're not just tracking the traffic flows of the cars and other automobiles using GIS - no, they're also recording and profiling the traffic flows of PEDESTRIANS - meaning, when you walk on the goddamn street for no particular reason other than to go shopping, get drunk or visit your significant other.

2.2 Modelling Building-Related Population Parameters: Augmenting the Building Dataset with Socio-demographic Data

To identify and analyse potentially vulnerable city regions additional socio-demographic data on a building block basis is required. Such data are, e.g., population density, family income or purchasing power. Knowledge of these patterns enables one to draw conclusions from exposure, resistance and resilience concerning a possible hazardous event. To map vulnerability patterns within an urban region, additional population data of the German Society for consumer research (GfK) are also integrated into the existing city model database. Here such data are only available for the central Berlin postal code zones 10115 and 10117, respectively. This is an area of 6 km² stretching from Brandenburg Gate in the west to Hackescher Market in the east, Bundesrat building in the south and Schwarzkopfstrasse underground station in the north.

This area is both suitable and interesting for security related analysis since numerous embassies, consulates and government buildings, as well as highly frequented touristic sites, such as Friedrichstrasse street, Unter den Linden boulevard, Gendarmenmarkt square, are located here. In addition, this area will house from 2011 the new headquarters of the German intelligence service (Bundesnachrichtendienst, BND) which will be located on the former World Youth Stadium (Stadion der Weltjugend) site.

As with processing of FAW frequency data, GfK data are imported using GIS functions. The available source dataset of 2006 includes numerous socio-demographic features such as population data, household size, household net income, building structure, building use, purchasing power. For data privacy reasons data are, however, not available for single buildings but for all buildings along a given street segment (My note: Oh, gee, thank goodness - they just 'profile' whether or not I fit inside some kind of poor or lower social class that is likely to pose a 'problem' for them - and hey, they can always extrapolate from that my household size and net income even though they basically deny here they have that capability.). Spatial reference of these point based data is by coordinates. Reference of those points to the appropriate buildings is verified by the matching of street names of GfK data points and belonging buildings, respectively. Therefore an algorithm is applied which searches for each building (its centroid) the nearest GfK point with the same street name. Attributes of this point are transferred to the building. Figure 4 is a 3D visualisation showing purchasing power related to each building block.

BTW - just as a side note - I thought that liberals were so fond of saying there are no longer any social classes or differences in social class? Well, this does seem to fly in the face of that - since they're giving certain residential zones 'certain colors' on the basis of their income status/purchasing power, and household size - and they 'infer' from that how likely you are a threat to 'key infrastructure'.

3 Geospatial Modelling of Urban Risks

The augmented 3D city model database is a prerequisite for further and in-depth geoanalysis of urban risks. The broad range of thematic data integrated into the database allows, e.g., for further spatial analysis in the context of an urban impact assessment. Such analysis will, however, not produce any precise indication which building (the element-at-risk, EAR), e.g., is exposed to an increased threat of what nature. For such evaluation of factual threat levels, a substantial amount of additional data would be required, many of which are not available publicly. In this context Koonce et al. [8] state that this knowledge is "best left to the security and intelligence agencies". In this study it is therefore assumed that only buildings with specific occupancies, such as government offices, or embassies, are particularly vulnerable to security threats.

OK, and what conclusion are we to draw from that? That the 'intelligence agencies' are monitoring and building maps of my entire residential area looking for threats to THEIR 'key infrastructures'? I thought the terrorists were over there, so we didn't have to fight them over here - why am I the threat? Oh why even entertain cognitive dissonance, we know how this game is being played.

Dealing with the nature and location of potentially hazardous events in urban environments [2, 10], an evaluation of the surroundings of a particular building exposed to a given risk is of special importance. Thus, for protection as well as for counteractive measures it is decisive to differentiate whether the structure is surrounded by open space or by dense urban housing. To perform such distance based analysis on the city model built-up area layers, a first step requires the creation of circular impact zones, with the element at risk in its centre. In our case the radii are defined at 150m, 300m, 500m, 1,000m and 2000m intervals. In a second step the intersections of impact zones and buildings allow for statistical analysis based on the built-up-area database. This analysis shows that buildings within zones one to three (up to 500 m from the EAR) are passed by an average of 200 pedestrians. This value is decreasing with increasing distance. Because of the EAR location in a business district of central Berlin, the greater the distance from the EAR the more buildings have residential instead of business and administrative occupancies. As a consequence the number of potentially affected pedestrians is decreasing while the number of residents is increasing (cf. figure 5).

3.1 Modelling the Distribution of Exposure Levels in Urban Environments

In the following an approach is presented to identify urban regions characterised by different degrees of exposure of a potential impact. The underlying assumption of this investigation is that not every area of an urban environment is equally exposed to the same level of potential threat. Rather a regional variation of threat levels can be found, as buildings potentially exposed to an increased security risk are not evenly distributed in city space. In this study the term "highly increased" threat is assumed for buildings housing embassies, consulates and government offices. An "increased" threat is assumed for the following buildings: Shopping centres, petrol stations (danger of explosion), police posts, power or transformer stations (critical infrastructure) etc. The following analysis is based on the buildings dataset of these categories (=exposed buildings). It can, however, be expanded to any user-defined set of buildings within a city model.

To map regionally different exposure levels the city model is first overlaid with a user-defined grid. Second, the distance of each grid cell to the closest exposed building is calculated. The resulting grid pattern is composed of cells each of which contains one distance value of the respectively closest exposed building. The grid can be further differentiated by building occupancy. The embassy grid, e.g., contains distance cell values of the closest buildings used as embassies or consulate offices. This set of exposure grids generated by proximity analysis forms the basis to identify different levels of threat exposure. For that purpose, each function-specific grid is reclassified in relation to proximity: Thus, grid cells closer to an exposed building are assigned a higher exposure level than cells with greater distance (cf. tab.1).

GIS-based grid analysis, as used here, allows for convenient overlays and combinations of areal data by using map algebra functions. Hence all function-specific exposure grids generated are combined into one single “exposure grid” by summation of their respective pixel values. It has been mentioned that different building uses can be assigned different levels of threat exposure. Thus summation is performed by weighting the respective grids according to their threat exposure: The embassy offices grid (embassies, consulates) and the government offices grid are weighted with a factor of 4, the shopping centre grid with a factor of 2 and the service and utilities grid (police posts, petrol stations, power stations) with a factor of 1 (figure 6).

The workflow described here has been automated by developing a GIS tool using ESRIs ArcObjects based software development framework. Our tool facilitates an automated and fast processing of the single grids (figure 7).

To employ this tool a buildings dataset containing information on building use and functions, respectively, is mandatory. The current version requires the user has to create an ASCII remap table according to table 1.

The combined weighted exposure grid can be visualised in different user-centered ways for further geoanalytical processing. Presented here is a 3D visualisation of a virtual threat surface based on the Berlin city digital terrain model (cf. figure 8). For easy comprehension exposure grid values are exaggerated by a height factor of 10 and added to the original height values of the digital terrain model. The resulting 3D map is a graphic, easy-to-read visualisation of the spatial distribution of threats in urban environments.

Intersection of the summation exposure grid with the buildings layer results in additional threat information in the built-up area dataset. As this dataset has also been augmented by socio-demographic data, a variety of geographical correlations of building occupancy, socio-demographic situation, infrastructure etc. with regional threat exposure can be mapped, visualised and analysed. For instance, all buildings located within grid cells with values of combined exposure levels greater than a given value can be selected. Also statistical analyses can be performed to distinguish between spatially varied socio-demographic feature states. As a result, it is feasible to map those regions characterised by a number of inhabitants above average, significant purchasing power and high financial status (derived from net income per household)

So, what conclusion am I supposed to draw from this? That the Census Bureau is out of a job? (or not, depending on who you think is going to be running this system) Can we let machines run this thing - possibly employing a neural network or a 'world brain' for a particular city segment? Do machines start analyzing sociodemographic data and basing their agenda on it?

4 Summary
This paper presents an approach to combine GIS-based spatial analysis with innovative 3D visualisations using virtual three-dimensional city models for applications in civil security. Based on augmenting the existing spatial database of the virtual 3D city model of the German capital Berlin by a variety of parameters including building occupancy, frequency values and socio-demographic parameters, areas and objects exposed to specific levels of threat can be identified By combining function-specific grids with threat exposure levels the spatial distribution of threat levels can be mapped. The resulting geographic distribution can subsequently be combined with additional socio-demographic or infrastructure data for further geovisual analysis. (My note: So, what they have here is a realtime virtual environment MODELLED on the actual environment that basically includes you, your entire residential block, the income and purchasing power of your residential block, and all of this with the specific intent and purpose to profile whether or not you will EVENTUALLY pose a threat to 'key infrastructure' and the government. What this is, is SimCity for psychopaths - SimCity for control freaks - they are running here a color-coded version of SimCity that is modelled on the real-world. This is the kind of depersonalization that enabled the Nazi death camps - reducing men with real lives, with real emotions, with real feelings to mere statistics and engraved dots inside some Hollerith supercomputer which is continuously fed punch cards) Perspectively some of the presented methods and functions will be modified: The ArcObjects tool presented in section 3.2 will be extended to a larger ArcMap plug-in which also allows for an automated processing of the GIS features for the 3DLandXplorer System. Furthermore the presented approach of modelling and analysing
urban security by using GIS and 3D city models will be broadened by introducing some standards of thematic 3D cartography. Thus, an efficient communication of spatial phenomena shall be ensured.

Funding of this study by the German Federal Ministry of Education and Research (BMBF) within the framework of the InnoProfile research group ‘3D Geoinformation’ ( is gratefully acknowledged. The authors also like to thank the German Association for Outdoor Advertising (FAW) for providing frequency atlas data and Berlin Partner GmbH for use of the official Berlin 3D city model.


1. Borst, D., Jung, D., Murshed, S.M., Werner, U.: Development of a methodology to assess man-made risks in Germany. Natural Hazards and Earth Sciences 6, 779–802 (2006)
2. Coaffee, J.: Terrorism, Risk and the City: The Making of a Contemporary Urban Landscape, Gateshead, Ashgate Publishing, Ltd. (2003)
3. Czerwinski, A., Kolbe, T.H., Plümer, L., Stöcker-Meier, E.: Spatial data infrastructure techniques for flexible noise mapping strategies. In: Tochtermann, K., Scharl, A. (eds.)
20th International Conference on Environmental Informatics - Managing Environmental Knowledge, Graz, pp. 99–106 (2006)
4. Döllner, J., Kolbe, T.H., Liecke, F., Sgouros, T., Teichmann, K.: The Virtual 3D City Model of Berlin - Managing, Integrating and Communicating Complex Urban Information.
In: 25th Urban Data Management Symposium, Aalborg, Denmark, 9.73–79.86 (2006)
5. Döllner, J., Baumann, K., Buchholz, H.: Virtual 3D City Models as Foundation of Complex Urban Information Spaces. In: Schrenk, M. (ed.) CORP, Vienna (2006)
6. Döllner, J., Baumann, K., Kersting, O.: LandExplorer – Ein System für interaktive 3DKarten.
Kartographische Schriften 7, 67–76 (2003)
7. Fachverband für Außenwerbewirtschaft, FAW-Frequency-Atlas, Data description (2006)
8. Koonce, A.M., Apostolakis, G.E., Cook, B.K.: Bulk Power Grid Risk Analysis: Ranking Infrastructure Elements According to their Risk Significance, In: Working Paper Series, Massachusetts Institute of Technology, 39 pgs (2006)
9. Kraak, M.J.: Geovisualization illustrated. ISPRS Journal of Photogrammetry and Remote Sensing 57, 390–399 (2003)
10. Mitchell, J.K.: Urban Vulnerability to Terrorsim as a Hazard. In: Cutter, S.L., Richardson, D.B., Wilbanks, T.J. (eds.) The Geographical Dimensions of Terrorism, pp. 17–25.
Routledge, London (2003)
11. Thomas, J.J., Cook, K.A.: Illuminating the Path: The Research and Development Agenda for Visual Analytics. IEEE Computer Society, Los Alametos (2005)

BTW - know what they did here? They've just applied the DHS original color-coded threat assessment system onto the entire world map - they've 'color coded' entire residential zones according to the threat they pose to DHS' to-be-protected key infrastructure, and on top of that they can also pull in all of the sociodemographic data that is also going into this system - they can see if you're living inside a residential area with relatively low household income, they can probably infer from that the racial or ethnic makeup, and so on. This is the kind of stuff that enabled the Nazi concentration camps - because what they do is, they de-personify you and entire classes of people - and turn it into a number, a statistic, a binary floating inside some computer system. How 'convenient' that the concentration camps were all enabled by IBM Hollerith supercomputers with punch card index systems used to compile much of the sociodemographic and racial makeup that the Nazis desired. It could 'never happen again', eh? Combine this system with the Global Information Grid, with Interpol's DNA databank and it absolutely DWARFS anything the Nazis ever came up with - it's full spectrum dominance of everything inside the public and private sector.

Infowars Wiki - Help make this become the official wiki of - contribute!

Offline Monkeypox

  • Member
  • *****
  • Posts: 16,844
  • He Loved Big Brother
    • Monkeypox
Re: Protecting critical infrastructure in urban areas from YOU, the terrorist
« Reply #1 on: February 21, 2010, 08:18:27 pm »
The Prison Planet infrastructure is nearing completion.
War Is Peace - Freedom Is Slavery - Ignorance Is Strength

"Educate and inform the whole mass of the people... They are the only sure reliance for the preservation of our liberty."

—Thomas Jefferson

Offline squarepusher

  • Member
  • *****
  • Posts: 2,013
Re: Protecting critical infrastructure in urban areas from YOU, the terrorist
« Reply #2 on: February 21, 2010, 08:24:53 pm »
Here are all the links...

Hasso Platner Institut - Geospatial Modelling of Urban Security: A novel approach with Virtual 3D City Models

The Virtual 3D City Model of Berlin

(A related article - note how close this looks to SimCity - in fact, it looks like a super-advanced 3D version of SimCity. This is total control when hooked up to the city network sensors - total realtime control over the entire city. They know the walk routines of the citizens - they know where the 'slaves' live - they know if they are poor or rich - they know their proximity in relation to the 'key infrastructure' - they know where to hit 'em)

From the symposium ICCSA 2008:

They want you to pay for this bullshit. But, unluckily for them, I don't agree. I don't pay for my own enslavement, thank you very much. Especially when it's close to home (as in Potsdam, Germany). I don't pay for your bullshit academic papers except when absolutely necessary - and if you have an issue with this, take it up with Rapidshare and have them take the link down. Besides, the reason why you would want to really 'pull' this link in the first place is not really copyright infringement - it's that you don't want the dumbass slaves to know they're really slaves, which papers like this confirm)

Infowars Wiki - Help make this become the official wiki of - contribute!

Offline trailhound

  • Member
  • *****
  • Posts: 4,722
Re: Protecting critical infrastructure in urban areas from YOU, the terrorist
« Reply #3 on: February 21, 2010, 08:43:12 pm »
Feel safe yet america?

"Do not let your hatred of a people incite you to aggression." Qur'an 5:2
At the heart of that Western freedom and democracy is the belief that the individual man, the child of God, is the touchstone of value..." -RFK

Offline squarepusher

  • Member
  • *****
  • Posts: 2,013
Re: Protecting critical infrastructure in urban areas from YOU, the terrorist
« Reply #4 on: February 24, 2010, 07:09:07 am »
This fits in with this 'urban security' essay - notice that in this essay they were looking at people's daily walking behavior. Notice also that the cameras and cell phones are being employed to monitor exactly that behavior.

Cell phones show human movement predictable 93% of the time

We'd like to think of ourselves as dynamic, unpredictable individuals, but according to new research, that's not the case at all. In a study published in last week's Science, researchers looked at customer location data culled from cellular service providers. By looking at how customers moved around, the authors of the study found that it may be possible to predict human movement patterns and location up to 93 percent of the time. These findings may be useful in multiple fields, including city planning, mobile communication resource management, and anticipating the spread of viruses. (My note: Anticipating the spread of virsues - mymy - city planning - as in where to put the dome cameras and sensors next to cover every possible avenue)

It's not currently possible to know exactly where everyone is all the time, but cell phones can provide a pretty good approximation. Cell phone companies store records of customers' locations based on when the customers' phones connect to towers during calls. Researchers realized that taking this data and paring it down to users who place calls more frequently might allow them to see if they could develop any measure of how predictable human movements and locations are (My note: And this, my friends, is why they're hooking up these phones to Social Network sites and using Dynamic Social Network Analysis - it's so that they can put a face, a personality, and your likes and dislikes to this faceless 'node' that is walking around in their system). The users they worked with placed calls an average of once every two hours, connecting to towers that cover an area of about two square miles.

The authors analyzed various aspects of the information related to the calls, as well as information that could be aggregated over multiple calls: number of distinct locations, historical probability that the location had been visited in the past, time spent at each tower, the order in which customers usually visited towers, and so on. With these numbers, the authors could create measures of the entropy of the customers' trajectories (My note: Entropy - this word and concept came up in a previous research paper that I linked to - conveniently, it was also about using cell phones to track people). To control for uncertainty, they also looked at instances where a customer was not in communication with the grid and effectively invisible to them, and removed those that had frequent extended periods of invisibility.

Most customers seemed to stick to the same small area, a radius of six miles or less, but there were a few callers that regularly traveled areas of a radius of hundreds of miles. It would seem that the cell phone users who traveled the least would be the most predictable in their movements, but the authors found this to be untrue. All users were roughly equally predictable, regardless of the size of their typical traveled region. Everyone seemed to have a set area that they rarely left, and that area was always traveled in a very regular way—even the jet-setters appear to rarely deviate from their travel patterns.

Customers that stuck to the same six-mile radius had predictability rates of 97 to 93 percent, and this fell off as the typical area of travel grew. But the predictability eventually stabilized, and remained at 93 percent even as the radius of travel rose to thousands of miles. Regardless of how widely they traveled, the researchers could adequately predict their locations, down to the specific tower, 93 percent of the time.

Breaking down the schedules of users by the hour allowed the authors to see how the variability changed during the course of a day. As might be expected, users' locations had the lowest measures of regularity during transition periods, such as the hours before and after work and during lunch times. Customers also had a 70 percent likelihood of being at their number one most-visited location at any random point in time. That's quite a high number, considering that randomizing positions over the average number of locations visited per person gives a 1.6 percent likelihood of finding them at each one.

The authors note that this research has a variety of practical implications. Knowing how easy it is to predict human movement, mobile communications businesses could anticipate data load (we're looking at you, AT&T) and city planners could use the data to inform their models of traffic flow. The big limitation of the study was the restriction of the analysis to fairly frequent cell phone users, but it might be possible to combine this with other data sets to form harder and faster human location predictions.

This is a PR handout - they report on this with a straight face, and they don't even point out the obvious ways in which this stuff can (and IS) used for total Big Brother surveillance and control. Has the whole world gone mad or what? Has their brain been fried completely? How can they NOT see this as being total Big Brother - totally unnecessary - totally sick and degrading? All these tech sites and their sucking up to the establishment - f**k all these guys and f**k their predecessors before them. None of the IBM guys at the Nazi concentration camps seemed to object either - that's what utter scum this industry is - hiding behind the veil of 'liberal' Jon Stewart viewers 'concerned about the environment/concerned about the whales being slaughtered by Japan', but they're fine with this type of goddamn total Big Brother, police state surveillance - oh yes, it's a 'great system', isn't it guys?

Check out this post - this is from our cute and liberal friends over at the 'Social Computing and Behavioral Modeling' symposium - btw, their next symposium is being held this March - I hope Sociostudent is going there so we can gain a perspective on this stuff.

Inferring Social Network Structure using Mobile Phone Data (MUST SEE)
Infowars Wiki - Help make this become the official wiki of - contribute!

Offline Sheepleprod

  • Member
  • *****
  • Posts: 748
Re: Protecting critical infrastructure in urban areas from YOU, the terrorist
« Reply #5 on: February 24, 2010, 10:01:00 am »
So, what conclusion am I supposed to draw from this? That the Census Bureau is out of a job? (or not, depending on who you think is going to be running this system) Can we let machines run this thing - possibly employing a neural network or a 'world brain' for a particular city segment? Do machines start analyzing sociodemographic data and basing their agenda on it?

The census helps them with its GPS logging and individualized data mining techniques.  This is added to the wargame computer and presented in real-time through various scenarios implementing a top-down threat analysis grid.  Wargaming is ineffective if the data used within is fractured, flawed, or incomplete.  So what better way to provide TPTB all operational intelligence in one effective program.

This is ultimately the most helpful in a scenario where the citizenry will be corralled in a super city type community and the urban and rural threats are extinguished piece meal.  The holdouts will be hunted down and killed.  The rest of the compliant will be housed in these control grid super cities.  When the already assembled technology is "aware" and fully integrated it will be endgame.  Shouldnt be too hard to control such a small population in control grid super cities should it?  Especially if everyone is chipped, RFID'ed, Biometrically scanned and monitored by "skynet"

The truth really is stranger than fiction.

Offline Sheepleprod

  • Member
  • *****
  • Posts: 748
Re: Protecting critical infrastructure in urban areas from YOU, the terrorist
« Reply #6 on: February 24, 2010, 02:47:28 pm »

Lets ADD some fun accessories to this particular tool in the NWO's box.....

This Celldar project, uses a radar to pick up interference generated by everything that the signal passes through. It then builds an image of that interference, which generates a 3D view of everything that passes through the signals.

Colour that and what do you have?

You have a three dimensional view of everyone, everywhere and what anyone is doing can be watched without them even being aware.

Design and development of miniature radars and fuze sensors through to major radar programme builds.

Our large multidisciplinary team has specialist experience across a broad range of radar technologies and applications. We have unique world class capabilities from low cost volume production techniques for automotive radar, to sophisticated signal processing methods for defence applications.

Radar Modelling    Minimise the cost and technical risk associated with the development of complex radar systems by simulating the radar and its operating environment.

    * Modelling, assessment and validation of phased array radar designs
    * Terminal engagement and radar fuze simulation
    * Real time radar and environment simulation
    * Radar performance and evaluation simulation

    * PHASAR - Phased Array Simulation for Adaptive Radar

Microwave Imaging    Design and development of safe, reliable, and low-cost non-intrusive microwave imaging sensors for defence, security, and medical applications.

    * Microwave Imaging Sensors

Millimetre Wave    Designs for the automotive market (we have developed technology for Automatic Cruise Control systems) and short-range wide beamwidth sensors which provide 360° detection around a vehicle. With over 18 years experience we offer:

    * Semiconductor independent system design
    * Rapid access to hardware (e.g. for feasibility studies)
    * Civil technology for defence applications
    * Designs for reduced costs for commercial products.

The Miniature Radar Altimeter is our own product development for the aviation market where it seen particular success on Unmanned Aerial Vehicles (UAVs).
Radar Systems    Our contribution to large radar programmes includes the development of one-off prototype radars, such as the RCS measurement radars used on test ranges, through to specialist input in key technology areas.

    * Design - Independent advice on all aspects of radar system design, especially electronic protection measures (EPM).
    * Modelling - Access to state of the art modelling capabilities to prove designs before build.
    * Subsystems - Subsystem products or designs for low cost in manufacture, such as RF subsystems, FPGA based processing, waveform and signal exciter subsystems and real time software.
    * Test & Measurement - Special-to-type test and measurement equipment for system proving (e.g. false target generators, jammers, high data rate data loggers).
    * Enhancing Radar Performance

Passive Sensing and Imaging    Application of passive sensing techniques using both radiometry and passive radars - an example of which is a system developed to detect illegal immigrants stowed away in commercial vehicles. This is just one example of the power of this technology where many other application areas exist.

    * Real time passive imaging systems operating from low microwave frequencies through to THz.
    * Civil telecoms waveforms, as well as other radar waveforms of opportunity.
    * Radiometry and passive radar modelling tools to de-risk development programmes by predicting final system design performance.

CELLDAR™    The CELLDARTM passive radar system is now under joint development by ourselves and BAE Systems and is the world's first passive radar to use cell phone basestation signals.
Miniature Sensors and Fuzing    Development of low cost fuzing solutions using COTS RF technology. Our 28 years experience has also been used in civil programmes, where our millimetre and microwave seekers have been used for automotive long range radars.

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Major Major Major Bump

This is a must read analysis from SP!

Even if you read it before, please read it again considering the fact that the Def Auth Bill includes nearly identical wording in the full title:

Full Title of Nat Def Auth Act reveals it ain't got nothing to do with Al-Qaeda
Are you fricking shitting me?

This act is to murder millions of American citizens by protecting IBM/NAZI power grids while the continue to charge 2x to 10x as much for half to one tenth current electrical distribution, to allow for false flags on te power grids, to implement RMA/Next Generation ELF behavioral modification operations on the 'homeland' via piggyback signals, to initiate full spectrum surveillance/biometric systems upon the American people and assist in full implementation of an autonomous assassination grid, to degrade all of our electronic appliances via toggling of power levels as required by new NLE insanity, and to transform our monetary sstem if the globalists feel like it to a carbon credit/energy based system....


An act to authorize appropriations for fiscal year 2011 for military activities of the Department of Defense, for military construction, and for defense activities of the Department of Energy, to prescribe military personnel strengths for such fiscal year, and for other purposes.

All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately