Saturday, March 25, 2017

Eyes And Ears Surveilance

This blog entry from 2015 looks at the "Ears" of surveillance.  "Listening" to radio wave cell phone transmissions and identifying them to an IMSI and associating that to a real time geolocation position.  Simply a "Fiend my Friends" type application but the friend is unaware.

"Eyes of Surveillance" is something that I have examined in many previous blog entries.  High resolution cameras are amazing.  Especially those stadium scenes where a zoomed in focus on the face of a person on the other side of the stadium is good enough to input to a facial recognition program and get a high probability id result.  Put that same camera on a drone platform and it can cover a wide area.

Eyes and Ears are both independent means of object identification.  Put them together and the result is more than the sum of the parts.  That sum becomes a highly refined real time search entry into a vast intelligence system data base.

http://foreignpolicy.com/2017/03/20/the-multibillion-dollar-u-s-spy-agency-you-havent-heard-of-trump/
The author is James Bamford.  I add that to emphasize credibility.

The spy agency?  National Geospatial-Intelligence Agency.  Note that the website of this agency is a .mil site.  A small bit of intel data.  I would be a good spy.  Just open source, hide in plain site stuff!
https://www.nga.mil/Pages/Default.aspx 
Hardly a super secret site!  This spy stuff is easy and not as thrilling as in the movies.

Huge intelligence data repositories are not silos.   They are all integrated.  One might be considered more Eyes oriented another more Ears oriented.  Put what is seen together with what is heard by intercept all in real time into a "Capture it All, Total Information Data Base" and the intelligence capability is formidable!

Knowing exact geo position of an object, moving or stationary in real time produces the potential search term input to any cell phone, wifi,  tracking signal or other geo locatable device at that location.  What is seen links to what can be "heard".  It works the other way as well.  If one input is dropped the other can continue to track.  Capability applicable to either friend or foe.  Real time data can link to a time line of past detection that has a proof documentation factor approaching blockchain.

It is all so obvious!  Link it up to open source data base like LPR or cell phone IMSI history and it more than triangulates a target object from another view point of where it was seen or heard before.

All it takes is billions of dollars to know everything.  What is done with what is known is the big question.  That, of course, is the big secret.  The biggest secret of all is to keep object capabilities secret.  Hard to do when the capabilities of the Eye and Ear object system are all intended to support action intent.

The action verb always links to (implements the relationship between) a Subject Thing and an Object Thing.  Not so hard to be a spy when the whole thing is simply about discovering the simple relationship between object and action learned in acquiring the foundation of language.  Nouns and verbs with some modifiers and other refinement attached.

https://www.nga.mil/Pages/Default.aspx
Leads to a vast amount of open source links that put a lot of writing on the wall.  Nobody ever heard of it but looking at it it appears to be an elephant in the room with a memory that never forgets!

The application programs are the verbs that betray a background object thing operating system on which they operate to relate Subject to Object.  Know the operating system and it deduces the nature of the application programs and the object recipient and purpose of the application program.



No comments: