www.1001TopWords.com |
Secret Clandestine Facial Recognition Countermeasures and The Future of the CIA
Presently Universities and Private Enterprise are working to build more robust "Facial Recognition Technologies" due to the Homeland Security Funding for such research this field continues to grow. Anti-Terrorist efforts are a worldwide goal, so we are sharing this technologies with allies for use in their countries. These new technologies will also end up in the hands of our enemies or perhaps future enemies. Such hostile nations towards the US with such recognition software may prevent our clandestine spy efforts abroad. Getting our assets and spies in country can be difficult and history has shown that it takes much secrecy and effort to get in, get information and get out without detection. Hostile nations will consider our spy efforts in those countries as International Terrorists, much the same way as we see their spies who come to our country if and when they are caught. Such Facial Recognition and software equipment will therefore be readily deployed to detect our infiltration efforts and exploitation of their systems. Since we have now invented this technology we need to find a way to beat it when, it is used against us by our enemy. The United States allows citizens form other countries to attend our Universities, which do intensive research in these areas "human recognition" and that information is being duplicated in their countries of origin. We will explain the most common types of human recognition in this report. Currently Facial Recognition Technologies are not used very often since they are far from perfect and are probably not the best identification device, however the technology is rapidly becoming very viable. Soon such recognition software will be more than adequate for identifying those people we wish to catch and keep out of our sensitive areas. The CIA has a terrible leak problem with information, the FBI not much better. The FBI has lost some 2000 computer laptops, is now sharing information and data bases with other law enforcement and we all remember the Spy Sex Scandals recently. The CIA also cannot keep a secret, nor can those in Washington who are in the know, as we recently found out with the wife of a Senator being written about in a major newspaper. Then of course there are sleeper sells, deep cover operatives and hackers all waiting in the shadows and gathering information. Once a database of operatives has been exploited or a cover of a clandestine agent is discovered their face will be put into data bases of foreign countries to catch them using such facial recognition and other human recognition software and equipment. Today the problem is not wide spread but the technological advances of mankind are not exclusive to the US alone. So what exactly is Facial Recognition Software and how does it work? http://people.howstuffworks.com/facial-recognition.htm So far the companies promoting their technologies in the Facial Recognition Software and Equipment sector have found killer applications. After 9-11 there has been much money flow for projects, which can help identify International Terrorists. The technology was further spurred on by such big screen movies as "Minority Report" as security professionals decided, wow, now if we had that technology we could prevent an International Terrorist act. Of course free rights advocates cringed and thought of it as a wake up call to what big brother might be thinking about next. Link Discussing Thoughts on "Minority Report" ? Movie: http://artificialintelligence.ai-depot.com/Future/568.html The TSA has approved Facial Recognition Systems and technologies for several Airport Terminals on a trail basis. Overview of Progress of the TSA Security Screening: http://www.tsa.gov/public/display?theme=44...9000519800cf9c8 Large Stadiums have also used Facial Recognition Systems to scan individual faces as they walk into the events such as Baseball, Football, Air shows, Shuttle Launch Spectator Areas and even at NASCAR races. As this technology continues to achieve a higher percentage of positive recognition it will be more widely used. We know this will be the natural progression of facial recognition systems because we have watched the growth and refining of other types of recognition software, which are now widely used and considered common practice. Technologies like those used in document scanning, OCR, and those used in Speech Recognition. These are now commonplace business tools used worldwide. Security Professionals are now taking these to the next step and finding ways to use these technologies in Homeland Security, Intelligence and law enforcement. Facial Recognition will also follow this type of growth curb in the next 4-5 years. Geo Spatial technologies have also gotten better with aerial satellite recognition, able to quickly point out a new building, missile silo, change in landscape from an Earth Event or a truck convoy anomaly in an area where it rarely occurs. These technologies are also used in national security within our borders and law enforcement to a large degree, when prior they were used for only war planning, intelligence gathering and watching mother earth. It stands to reason then that as similar technologies in recognition get better and better that human recognition technologies such as "human gait recognition" and "human eye recognition" will also become more reliable. Facial Recognition is within this class of rapidly coming of age human recognition technologies. Our Intelligence Communities including the clandestine departments of the CIA will need to figure out how to protect their agents and fool these systems long enough to get in safely, collect human intelligence and get out undetected. In prior periods CIA clandestine operations use an array of various methods to conceal identity of agents, operatives and assets. They often used movie industry tricks like make-up, eyeglasses, fake mustaches, and wigs. They put rocks in their shoes to cause a walk which stood out and which caused observers after the fact to remember the limp rather than the face or tell tale features, which might easily get them caught. (Rule Number One: "Don't Get Caught"). Unfortunately these techniques in the Spy Book Manuals may not work, as human recognition software gets better. The human facial recognition software measures distances between features and comes up with percentages of identical matches to these numbers. So even if half your face is covered the other half of your face might give you away. Artificial mustaches, fake wigs or mustaches will not work, because they do not change the distances between points on the face, nor are they thick enough to change to stop the scanning if any sort of frequency bounce is being used in conjunction with the system. Any attempt to thicken these fake cover objects will show anomalies in one's heat signature, thus as systems get smarter and start incorporating combined human recognition technologies such as "human gait", "heat scanning" and "human eye-recognition" with advanced Facial Recognition Technologies it will be extremely difficult to fool them. The fact that systems are unlikely to be fooled is a deterrent which most likely will cause those who are known to be problematic or have been discovered as International Terrorists to look elsewhere for targets and the participants of large events will be that much safer. To fool such systems one will need extremely sophisticated technologies or even complete plastic surgery makeovers or face lifts. This will cause the facial recognition software to further innovate and some young scientists, researcher or entrepreneur will figure out a way to teach these facial recognition systems to look for anomalies in scar tissue. Scar tissue is easy to spot, expect in the cases of the world's best plastic surgeons. So unless one is using the world's best dermatologist along with a top notched plastic surgeons they will not be able to fool the future facial recognition systems. This will limit the number of recruits to the nameless clandestine CIA spy rosters, because those entering will not only have to ditch their identity like the do in the CIA or French Foreign Legion, but also have to kiss their face good bye, because any photo ever taken in their life with their name next too it can get them caught and killed and all they will have to show for it is another star on the wall. Perhaps ugly people might want free facial makeovers and this might entice them to join the CIA's clandestine Spy division? Is there any easy solution to this dilemma for our CIA or Intelligence Community? Is there a cheaper way around this? Well the answer is yes and no. Long term, the answer is no, because these technologies will be coming of age and become better and more sophisticated. Short term the answer is yes, there are ways to fool the system now with the present technology, if you understand how the facial recognition software works. As each system is fooled those behind their technologies will work through ways to close holes in the systems. We can see this type of evolution in IT Networks as hackers exploit holes in the computer systems. IT Professionals attempt to create patchware to close those security-breached areas in their systems to prevent further attacks and then the hackers find new holes and exploit those. This analogy works well because it is quite similar, only difference is one is the real world and one is the virtual world. Both worlds matter and they are inherently interconnected. In the future it will be quite obvious just how closely connected they really are. The movie the "Matrix" might be worth viewing as it seems to help us visualize the world of one's and zero's and the real world we see everyday. As infiltrators try to sneak into facilities, transportation hubs and airports, security professionals will use all technologies available to stop them. Human Recognition and specifically human facial recognition will follow similar paths of evolution, so eventually the systems will not be able to be fooled. Those who count out facial recognition now in it's infancy will eat crow later, just like the nay sayers of previous recognition technologies are looking rather silly today. One way to close holes that presently exist as these technologies move towards reaching their full potential yet leave us somewhat underwhelmed is to have combined technologies to screen using many different types of human recognition systems, each looking to find anomalies. You maybe able to fool some of the technologies, but you would have to get pretty creative to fool them all. This is part of the strategy at the TSA for airport passenger screening. If any anomalies come up such as metal detector goes off, your ID is suspect, you look or act guilty, you have previously traveled to many states which are known to be problematic, etc then you are taken to another level of scrutiny. The system is not full proof, but it seems to work pretty well, although currently does often impede on personal rights issues. It often judges incorrectly due to programmed red flag anomaly scenarios, case in point would be Teddy Kennedy ending up on a "no fly" watch list. Anyone who has been pulled aside for a further scrutiny or strip search who is merely just a traveling individual can vouch for this. The systems at airports seem to be working well so far and as these new human recognition technologies are added only well financed and equipped people will slip through provided they have some sort of inside connection. Once computer systems are made more robust, human error will be the biggest problem. It is for this reason that if we truly wish to protect ourselves we must more carefully scrutinize those on the inside at all levels. For instance security guards, police officers, facility maintenance employees, etc. A human recognition system cannot protect you if the infiltrator is merely directed around it. You may recall the shooting where a politician allowed his guest to circumvent the metal detector at a government building? Now then generally the answer is 'no' there is not a cheap way around all these technologies, but there are inexpensive ways around a few of them. However until these combined technologies, sensors, screening and recognition devices reach their full potential and used together to prevent exploitation of the weaknesses in any one of them, they can be fooled. Many of those inside security audits have shown that one could sneak on a device of some type onto an aircraft or one could get through a border check point. Soon as the systems close the holes, become more robust and are used in combination, it will be hard pressed to beat them. Currently our clandestine spies can infiltrate the facial recognition systems by using under skin simple devices or strategies, so short term (next 4-5 years) the answer maybe "Yes". For instance plastic Halloween Dracula Teeth, type teeth covers will cause protruding of the facial region surrounding the mouth, simple, inexpensive and it will cause the numeric distance between facial features off. Chewing Tobacco is another simple easily deployed strategy to fool facial recognition systems since it will cause lower jaw distance to be slightly off the measurements. If you have ever noticed someone was chewing tobacco, you might have thought something was not right, but did not know what it is until they spit. Someone going into a baseball game while chewing tobacco would not be an unnatural event. It would not be out of place at any sporting event, truck weight station, border crossing, rodeo, outdoor celebration, etc. Chewing Tobacco however would be questionable at an airport and create an anomaly. With practice, those who often chew tobacco in small amounts can talk and chew without detection although even chewing tobacco does have an odor. So a combined recognition systems for detection could be "human plume technologies" to prevent this from not being detected, thus could red flag that anomaly and help you catch the infiltrator. Since the facial recognition software measures all portions of the face for eyebrows and eye regions, small "Botox" injections can radically change the distances between features in that region of the face. Nose plugs used by used by some emergency first responders in a slightly smaller form will cause the nose to look different to a computer and throw off the readings of facial recognition software for that central region of the face. These of course are cheap and inexpensive ways to slip in and out of choke points, which have facial recognition software and systems deployed. Eventually the innovators of such technology will close the gaps on such clandestine disguise tactics and methods and prevent the easy fooling of these systems. In the United States we have the homeland security dollars already deployed and entrepreneurs across the land have taken up the challenge to build a foolproof system, they have come a long way, but still have a ways to go. Since International Terrorism is a worldwide problem these technologies will be exported to other nations, which also have similar nuisances or threats with International Terrorism. Rogue nations may also deploy these technologies along with regimes, which wish to control the freedom of their subjects and promote their own Dictatorship Style Leadership. We will be faced with infiltrating these countries and their borders to gain access to information, human intelligence, future hostile intentions and enforcement of international crime, drug shipments, human sex trafficking and military WMD build up. Our CIA Clandestine units need to have simple ways to fool the newest infant human recognition technologies and commit to a 4-5 year plan to upgrade tactics, ideas and technologies through intensive research to stay ahead of the rapidly increasing use of surveillance robotics, imaging, recognition software and early detection security technologies. Exploitation methods and strategies should be incorporated into our own security technologies on key infrastructure facilities to prevent these our systems for being infiltrated. "Lance Winslow" - If you have innovative thoughts and unique perspectives, come think with Lance; www.WorldThinkTank.net/wttbbs
|
RELATED ARTICLES
Screening Trucks and Containers Coming Into Our Country We presently have adequate sniffer devices in this country to help us screen the trucks and containers coming into this country at our checkpoints and ports. Now we should be conducting massive recording of odors of trucking shipments and containers for database evaluations to insure that we do not unnecessarily impede the flow of trade or delay parts needed to run our economic powerhouse. We must provide for security and proper flow without creating additional choke points or create stoppage, which will result in billions in lost productivity. By having huge databases of sampling we will be able to determine and to find anomalies in rogue transportation events and prevent an attack on our homeland. Biz Op Marketing and the Federal Trade Commission Many had made mention of the problems of business opportunities in letters to the Federal Trade Commission in the public hearings in 1995, 1997 and 1999. They cited issues with advertising and earnings claims from Biz Op sales people. The FTC launched a sting operations called; "Operation Bizzillions," which stopped a few hundred such operators out of the 80,000 such business opportunities. I am Not an African American I am not an African-American. Don't call me an African ?American. I'm an American plain and simple. I was born here as were my parents and grandparents and you would have to search many a generation back before you found anyone in my family who originated from the continent of Africa. It's time black people in this country stop trying to identify with a land whose culture is not their own. It's time we stand up and say "This land is our land" and let everyone know we have a right to this country as much as anyone. Why Do US Media Ignore Secret UK Government Memo On A Mega Iraq War Conspiracy? The blogosphere has been jumping around the story like crazy but it seems the mainstream media are doing their best to ignore it. Yet it's been branded the most extensive case of governing-level conspiracy plotting in ages. CNN spent very limited time on it and that's also a pretty accurate indicator of the attention most other media outlets have devoted to it so far. Even though some 88 members of Congress openly inquired about it and a few other US opionion leaders spoke out against it. But that was it more or less. What was? A recently leaked internal UK government memo dated July 2002, that was so secret extra copies could not be made, not even for internal use. Government Backed Fraud in Academia Contrary to the Hobbesian prediction of anarchy (freedom) and brutish or unproductive results in the event that elites (often termed 'beneficent paternalism') aren't fostered: we find lots of evidence that team play and open organizational structure actually creates more civilized and productive governance. Lincoln Electric in Cleveland is a well-documented example of how sharing the wealth and responsibility builds communication and profit. A Brazilian city named Porto Allegro that opened itself to citizen involvement and socialist ideals is flourishing as corruption wanes. It was predicted they would fail financially but more than a decade of good results has been the outcome. Singapore reduces government as a percentage of GDP and is fully modernized. Instead of 'expertise' being the solution, it might well be these technocrats in bureaucracies are the problem. Pilot-Less and High Speed Train Transportation Systems; Better Strategy Needed We recently saw another ferry accident, this one in NY when the pilot of the vessel fell asleep, which may have been a medical situation or condition, but never the less, accidents like these would be prevented by pilot-less transit systems. This would be no problem with modern technology. We know in the future this will be an accepted method and fully safe. Intellectual Property: The ECJ Extends the Use of Trade Marks to Goods and Services The European Court of Justice ("ECJ") ruled in Praktiker Bau- und Heimwerkermärkte (C 418/02) that a trade mark that is now in use by a company on its goods can be extended to cover the services provided by this company. The Transformation Of Political Science And The Rise In Crime Rates The current field of political sciences is dominated by a multitude of ideas that have never in its history featured so prominently in this discipline. The general belief that it has lost its focus once and for all is from time to time counteracted by different opinions. One of those is that the world has come full circle, that mankind has experimented out all possibilities in terms of ideological thinking and that the liberal democracy as we know it has come out of the process as the prize winner both politically and economically. Some define this as the end of history. It also goes by the name of ultra modernism. Globalisation fits in perfectly and all reflects the increasing complexity that we are finding our world to involve us in and which, in order to come to terms with the bigger magnitude of the whole, we are describing in essentially vague terms. Is George Bush Two-Faced? Yes, Bush is two-faced. The two sides of the faces are total opposites. His personal left side shows he is happy and relaxed. National Archives Needs to Embed RFID Tags in Ink Perhaps we should have printers with ink which has metallic properties which would simulate RFID Tags in pages scattered throughout the reports and papers of secret documents, then if one decides to do something unethical to steal the paper work then the report itself will trigger an alarm, even if one puts it in their socks or underwear, under a hat. As one leaves the building through a detector like at the bookstores, gotcha!! Quality of Life and Freedom, Unilateral Discussion City Governments is their quest for; "quality of life" often lose sight of the revenue stream which derives the money to run their city. Of course this trend has been going on a very long time. People should remember that government exists because the people allow it to exist and it should also remember that you can always start throwing tea in the water when your government fails you. The Power of Media: Russian Perspective Journalism, as it is often said, is the 'fourth branch of power', along with legislative, executive and judiciary, not any less mighty than those three, even if not legally endorsed in the Russian constitution. It is the power of symbolism, and it cannot be escaped, but can only "used" to bring truth, or "abused" to bring propaganda. The French sociologist Pierre Bourdier claims, that it is the opportunity to create reality with the help of words: we are approaching the time, when the social universe is described and prescribed by mass media. One cannot but agree with this view. A Journey Through History History repeats itself, goes the cliche. It does so, perhaps, for the human beings to have more than one chance of learning a lesson if they have missed out on the first opportunity. If Pakistani history is anything to go by, it is a clear indication that they, as a nation, happen to be pretty dumb fellows, unable to learn anything at all despite the fact that history has been very kind to them by way of repeating the same chain of events time and time again. They sure have disappointed history on this count. Military Intelligence, FBI, CIA Intelligence Problems Well many have complained that the FBI and CIA dropped the ball in the 9-11 attacks. But I submit to you that the days of Paul and the "One if by land, two if by sea" and the Trojan Horse Story are not the only possible attacks methods of operindi available these days. Today it could be: "one if by land, two if by sea, three if by underground, four if by under sea, five if by air, six if by space, seven if by computer, eight if by germ, nine if by Trojan horse, ten if by wave length, eleven if by weather, etc, etc. So the game is much more complicated than sitting behind your cotton tails not saying a thing. Or telling the people every ship must sail and somewhere on that ocean, I know she's got to be? Think about the situation where the bad guys are as smart as you and have unlimited time to plan and unlimited ways to do it. How can you protect yourself against that? Only by though and infiltration of networks. All this would amount to the strength and unity of the people. Of all these; ones through elevens; are possible scenarios. Tax Attorney in Oregon or Washington; Does Your Small Business Have One? Tax Evasion has been used to criminalize many, Nixon did use the IRS to attack political opponents and to discredit them. Well here is one politician who is attacking the LOCAL small businesses who supposedly are evading taxes? Are they? Or is the miss management of the city coming to light and the politicians are looking for a scapegoat? Globalism and a Conspiracy The globalist's are the new breed, the new generation if that is what I can call it. The new internationalist might be better. They all think they will find salvation in humanism, or in man himself. I say good luck chumps. Globalism has planted these seed a generation ago, or so, maybe longer, but they started sprouting a generation ago. It calls for the control by governments by a government, to control our wealth, resources; as the United Nations would like to have done, had Kerry made it as President; internationalize the US to their liking. The wealth and resources are somewhat control anyhow, the internationalist have been busy. Upcoming Palestinian Elections Might Put Extremists In Power The Palestinian Fatah Movement is doing whatever it can to brush up its image in the run up to this Summer's parliamentary elections, including the appointment of young blood into the ranks. The outcome of the elections is going to be of crucial importance for the chances of peace with Israel as well as the country's division of power. What would be the implications for a Palestine under more Islamicised rule, should Hamas achieve a much feared majority? And will the electoral map show that Islamists are on the rise mainly as a result of corruption and poverty? New York Lawyers; Vindictive Government Prosecutors We all know Elliot Spitzer is going to run for governor. We can see he is very vindictive in his endeavors. However have you asked yourself; Since when is it okay for someone who is an Attorneys General to act out the way he does? We are seeing more and more abuse of power. I personally know someone who emulates Elliot Spitzer who is a young up and coming rising star in a Federal Agency, who would in fact go out of their way to falsify documents, make threats, hide their identity, and attack reputable folks on behalf of competitors and for reasons of self gratification and future job titles and kudos? Ifs and VATs of Taxation in Macedonia - Should VAT be Applied in Macedonia? To be justified, taxes should satisfy a few conditions: The Liberal Solution: Assault a Conservative? Ok, here is what happened: On March 31, 2005, Pat Buchanan, conservative commentator and former presidential candidate, was giving a speech at Western Michigan University when some 24-year-old ding-dong, who apparently did not like what he was hearing, decided the appropriately mature and tolerant behavior would be to attack Mr. Buchanan with a bottle of salad dressing. |
© Athifea Distribution LLC - 2013 |