Author Topic: IBM SURVEILLANCE SYSTEMS ARE ARCHITECTED TO COVER UP CONSPIRATORS IN FALSE FLAGS  (Read 3190 times)

0 Members and 1 Guest are viewing this topic.

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
IBM SURVEILLANCE SYSTEMS ARE ARCHITECTED TO COVER UP CONSPIRATORS IN FALSE FLAG OPERATIONS
THEY ARE BUILT TO ALLOW FOR THE SHADOW GOVERNMENT TO INFILTRATE NATIONAL INFRASTRUCTURE, CONDUCT TERRORIST ATTACKS AGAINST OUR COUNTRY AND OTHERS, AND THEN THERE WILL BE ZERO DATA ON THE ACTUAL TERRORISTS!



Video Privacy by IBM
http://www.research.ibm.com/peoplevision/videoprivacy.html


Much of the current pervasive computing research concentrates on devices and the communication between them. However, an important aspect of pervasive devices is their interface with the physical world—particularly, how they acquire information about their users. One rich medium (and the dominant one through which people receive information) is vision. As such, we expect future pervasive computing environments to depend on vision for passive perception of people.  [They realize the planned surveillance state is to be used to manipulate perceptions of the slaves to demonize them at will. But true terrorists like Larry Potts and Ali Mohammed do not have to worry because IBM has a method to make sure your false flag terror attacks will go off without those pesky evidence trails-how long have they had this technology? Were similar systems in use at WTC, OK City, Columbine? Were the videos from those events that we never got to see used to create this new system. In other words, did the PTB see a need and IBM filled it to further plans for future FF's?]

We are focusing on the privacy issues involved in such visual information gathering, both in pervasive computing environments and in video surveillance systems. The PeopleVision system takes an object-oriented approach to video. It understands the video stream, decomposing it into people, objects, and areas of interest. It then abstracts or selectively re-renders this information based on the intended user. Client processes receive abstract information about people in the environment according to issued requests. Access control lists that can grant privileged processes access to richer (and more intrusive) information verify these requests. For example, the list might grant a face recognition security system access to facial images but tell the air conditioning process only how many people are in each room.  

Access control lists also govern the information delivered to security guards, supervisors, and ordinary users. Re-rendering delivers reconstructed video, which preserves some objects unchanged and blanks out other areas of the image or replaces the area with a computer-graphics rendering that preserves relevant information. However, it does not convey more privacy-sensitive details. During ordinary use, a guard may only view silhouettes of people in the surveillance area, hiding irrelevant but privacy-sensitive information such as race, gender, and appearance.

We have developed a “PrivacyCamera” – a single device combining camera and processor that implements, at 30 frames per second, the video-understanding algorithms. With this device we can ensure that the privacy-intruding video is never available or leaves the device only in encryptedform. All of the processed data leaving the device can also be encrypted ensuring maximum privacy protection for the people in the pervasive computing environment.

Some demos are shown below. All demo videos are in MPEG1 format.  

1. Original video (video 1.5MB)
2. Foreground masked (video 1.5MB)
3. Background masked (video 1.5MB)
4. Both masked (video 1.5MB)


We have designed a privacy-protecting console for surveillance video monitoring and also implemented the ideas in a PrivacyCam which is a "smart camera" (combined imaging and processing device) that outputs video with privacy-intrusive data removed:  

The PrivacyCam can be substituted for a standard video/surveillance camera and ensures that privacy-intrusive data never leaves the camera, while providing a video stream that is still appropriate for the video system's task.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline ridebmx

  • Member
  • ***
  • Posts: 238
wtf!

next is cyborg shit from ghost in the shell, no humans without chips left

sick fools tell what they are going for right on their websites now

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
If you have the right microchip in your brain, only level 5 clearance NWO slaves will be able to see your face while you commit crimes against humanity.

Get the chip, get the chip.

No wonder why all surveillance systems need to be tied into a Ptech control grid.

Independent cameras will be outlawed!
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Satyagraha

  • Global Moderator
  • Member
  • *****
  • Posts: 8,941

...blanks out other areas of the image or replaces the area with a computer-graphics rendering that preserves relevant information.


Yippee! Massive technology upgrade since the London bombings, where they had to claim "oops.. the damn cameras malfunctioned!", and use some bs photoshopped still pics to 'prove' the missing 3 patsies were with the single patsy they did catch on video. Now they have much better technology to "replace the area" - no more conspiracy-theorist-fodder with bad image editing!

And the Pentagon films! Wow - now they won't have to use that 'national security' bs to hide the tapes; they can use the same technology to display LIVE ON TAPE the exact event as they want it to appear!!

And, they assure us, the cameras would never fail to catch a preteen lifting a bag of m&m's from a 711 store, or miss the facial expression of someone with serious indigestion about to enter the men's room at the mall (signal the air fresheners in the men's room immediately!). We can rest assured that we'll be safer.

IBM: facilitating tyranny for generations...


China warns against IBM slogan 'Smarter Planet'
Official raises national security concerns over analytics projects
By Owen Fletcher
Published: 10:22 GMT, 20 April 10
http://news.techworld.com/green-it/3220985/china-warns-against-ibm-slogan-smarter-planet/?olo=rss

A Chinese official appeared to take aim at IBM as he warned recently against "Smarter Planet" projects, or the use of technology like networks of sensors in cities to gather and analyse data.

IBM has used the "Smarter Planet" slogan for wide-ranging projects including a green city lab in northeastern China. The concept, along with others like "reindustrialization" and "low-carbon economy" also put forth by developed countries, could constrain China, Li Yizhong, China's Minister of Industry and Information Technology, said in a speech summarised on the ministry website.

"Regarding these new ideas and strategies from abroad, we must be enlightened and vigorously develop strategic emerging industries, but also must raise our vigilance and cannot fall under the control of anyone," Li said in comments that were dated early last week, but appeared to have gone unreported outside China.

An IBM spokeswoman declined to comment, citing a lack of context for the statements.

IBM last year said it would work with the city of Shenyang, in Liaoning province, on computer applications for tasks like plotting efficient traffic plans and devising caps on industrial carbon output.

IBM also planned to choose locations for sensors that would track water quality in city mains. It said it was talking with other local Chinese governments about launching similar joint labs.

But national security concerns often make it hard to get material as simple as a map from Chinese authorities, raising a potential obstacle for any effort to gather and analyse data from across a Chinese region or industry.

"The US tries to use its information network technology, for things as small as controlling one computer or one generator, and as large as controlling a whole industry, to control every country's economy," Li said.
 =========================

BTW - Notice the headline of that article..."China warns against IBM Slogan" -- like it was some offense to their marketing concerns -- the ACCURATE headline would have been more like "China tells IBM to GTFO with their tyrannical control technology" ... (and, of course, we know China has their own system, thank you very much.)
And  the King shall answer and say unto them, Verily I say unto you, 
Inasmuch as ye have done it unto one of the least of these my brethren,  ye have done it unto me.

Matthew 25:40

Anti_Illuminati

  • Guest
Derrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr.  Btw he is lying, humans aren't needed.
http://www.forbes.com/2009/06/18/ai-terrorism-interfor-opinions-contributors-artificial-intelligence-09-juval-aviv.html

Artificial Intelligence
Can AI Fight Terrorism?
Juval Aviv, 06.22.09, 06:00 PM EDT
Yes, but we need humans too.

Artificial intelligence (AI) applications in the field of counter-terrorism are among the fastest growing components of security programming for both government and corporate entities.

One of the most important applications for artificial intelligence in the field of counterterrorism is the processing of collected data. You cannot wage a traditional war against terrorists, but a key to fighting terrorism is good intelligence. The only way to protect our citizens and apprehend terrorists before they execute their plans is to know what they are planning in advance. One of the chief obstacles in this battle is not only the acquisition of the necessary intelligence from the various types of surveillance that our government agencies employ but the ability to process all of this data and recognize patterns and relationships.

Computer programs that have the ability to not only collect and sort millions of bits of random data, but to recognize how they relate to each other, are invaluable in the fight against terrorism because no human being has the ability to process the enormous amount of information that our intelligence agencies receive. Without the ability to process the information, the information is useless.

Artificial intelligence is increasingly used in combination with physical surveillance. Instead of just having a person observing a bank of security monitors, an AI-enhanced CCTV system has the ability to identify potential problems itself and alert security personnel. These systems have been used in cities like Chicago and London for years. The ability to recognize aberrant or suspicious behavior or even facial recognition capabilities that some of these systems possess is extremely useful in fighting terrorism and capturing known terrorists and criminals.

Even though AI-enhanced security systems like surveillance cameras have been used with some success, these systems often fail to exceed their human counterparts, as they can recognize red flags but lack "total picture" judgment. For example, a person standing a couple of feet from his or her suitcase for more than a few minutes at an airport could set off an alert with an AI-monitored camera system, whereas a human being looking at the same scenario would know that there is not yet a cause for concern. This can result in a "boy who cried wolf" scenario where too many false alarms cause alarms to be ignored.

So, while artificial intelligence in all of its many forms is a very useful tool in the fight against terrorism, there is still no substitute yet for human beings. Computer programs are only as good as the information that they have received and, thus far, are only capable of recognizing patterns of events similar to those that have already taken place. They are not able to take the information that they have and extrapolate from that to predict events of a type that are not already programmed into their pattern-recognition algorithm, nor can they take information that they are programmed to recognize as a threat and then make a judgment, as humans can do.
We have seen the results of becoming too reliant on technology in the aftermath of Sept. 11, when we realized too late that we had too few agents in the field who could infiltrate terrorist rings, and too few agents who were fluent in the necessary foreign languages. For years, the U.S. government had relied on technology at the expense of "boots on the ground" intelligence, going so far as to view experience living abroad as a negative for new recruits. Computerized surveillance systems were less costly in terms of both blood and treasure, and safer in terms of political fallout from captured agents. That technology was not enough, however, and we are still trying to catch up eight years later.

The field of artificial intelligence is advancing rapidly and will continue to have many applications in the fight against terror. At the present time, however, the advancements in these types of programs are not so great that we can depend on them to replace human beings who possess the ability to use logic, imagination and judgment.

Juval Aviv is president & CEO of Interfor, an international corporate investigations and security consulting firm. He began his career as an officer in the Israel Defense Force. He is a special consultant to the U.S. Congress on issues of terrorism and security.