In the late 18th century, Jeremy Bentham, a
philosopher and social theorist, coined the term, 'panopticon'. The
'panopticon' concept is actually an architectural marvel concept built
purposely to monitor inmates (intensively) in a penal setting. It incorporates
into it special viewing glasses (that seemingly 'magnifies' activities) on each
of the entrances and/or doors of the building (on each level) and a circular
rotunda or command centre for each floor where the authorities or officers were
stationed inside. The idea is to allow penal or prison officers to have viewed or
line of sight in (a 360o format) on what is transpired
within the confines of each cell. Bentham was troubled by the fact that many
prisoners were unfairly handled, and prison officers got into trouble from
mishaps either trying to resolve unforeseen circumstances or unnecessarily
obliging too much lethal force that resulted in the deaths of prisoners and/or
prison officers in the ensuing engagement. With 'panopticon', the officer or
officers can use that knowledge to evaluate and anticipate the needed
objectives require to safely end its violent cause and nature (Bentham,
1787/1995; Foucault, 1975).
Of course, in the late 18th century,
such technology, especially the optics, would hardly ever be possible.
Nevertheless, Bentham’s fantasy and prescribed needs wanted an institution that
can possibly fathom real criminal treatment and justice in accordance with the
rule of law, and with that, effective watchmen, prison or penal officers
(Foucault, 1975).
Benthamian's Future
Sights
The Panopticon – Pics Dchan Archive |
Bentham’s vision was not realized until the latter
half of the 20th century where penal institutions around the
the world began to station (on each floor) the control centre and command post in
the middle of each floors. The purpose is to have a circular 360o line
of sight of all the surrounding cells. Additionally, the panopticon also
engages around-the-clock surveillance. This utilitarian philosophical concept
embodies humanism in terms of Benthamian thought, hence a righteous manner of
punishments and sanctions (Foucault, 1975; Galič, Timan, and Koops, March 2017).
Some academicians, professionals, and authorities are
nonchalant and feel that the 'panopticon' concept breaches privacy and rights. They
are being critical because there are remnants in law enforcement society where
technology is not being utilized as a way to enhance work efficiency, and/or
aiding technology to bring resolution to conflicts in a peaceful manner, but
rather, perverting equipment or technology to their own ends of how they
are to be used (Sheridan, 2016; Galič, Timan, and Koops, 2017). On the other hand,
technologies may malfunction, and hence, accidents occurred. Nevertheless,
Bentham's vision of the panopticon has expanded multiple folds on multiple
fronts.
Today, the two most noticeable technologies that are
perhaps easily noticeable are the closed-circuit television cameras (CCTVs) and
the access controls. In the 21st century, however, critics of
surveillance have now focused their attention on the flow and control
of information (Caluya, 2010).
CCTV Surveillance Warnings that the Area is Being Watched!!!! – Pics Dchan Archive |
Today, in Malaysia, surveillance has progressed,
especially after the debacle of MH 370, the Sulu incursion, the various threats
from the Islamic State or DAESH, other national security issues, espionage,
trading of national secrets, etc. There’s so much information required to be
processed and evaluated, and earlier, this essay mentioned the issue of junk
and spam information in a sea of everything. Precision requires finesse and
fine-tuning and the only way to proceed is utilizing technology that’s able to
sieve and taper them into a holistic factual picture. This essay will focus on
surveillance and the various technologies available in the market or in the
making of it. The primary of surveillance discuss in this paper is one fold,
that is, to focus on the border enforcement and how technologies and concept
can provide a foothold inefficiently countering threats, resolving violence,
and offer better deterrence and surveillance.
The Forward Operating Base
(FOB) & The Wall
The previous Prime Minister (of Malaysia) Najib’s
the administration was bent on building a wall between the Thai and Malaysian
borders and using Forward Operating Base (FOB) to effectively securing the
Sabah Eastern board. The idea behind the FOBs is using abandoned ex-PETRONAS
oil rig platforms that can be anchored or secured off the coastal areas
(malaymail.com, 2015, October 12th). These platforms are then used
to berth MMEA or Naval watercraft and perhaps flying vehicles (like
helicopters) to head off further into the Sulu Sea or just off the permitted
territorial seas of the Philippines. The President of the Philippines Rodrigo
Duterte permitted neighbouring Malaysia and Indonesia to conduct ‘hot pursuit’
activities by their respective security forces; and hence, these crafts can
generally, head off into Philippine’s waters to chase after pirates,
perpetrators, and kidnappers (Anis and Kaos, Jr, thestaronline.com, 2016,
November 11th).
Unpredictable natural disasters like strong gales,
typhoons, electrical storms, floods, earthquakes, and even mudslides can either
damned the walls or brittle the fences in the long run. Hence, it’s perhaps not
ideal unless the walls are constructed like medieval castles.
Security Forward Operating Base Ocean/Sea Rigs – Pics Dchan Archive |
Traders’ angst is perhaps not the only complaints.
Many Southern Malay Thais and Northern Malays in Kelantan, Perlis, Kedah, and
Perak have relatives living along the Malaysian-Thai border. These people are
peaceful and they only want their livelihoods. Parts of Kelantan, Perak, Kedah,
and Perlis were part of a more delicate statehood that was drawn and separated
by the then British Colonials and Siamese Kings. After the Second World War and
Malayan independence, these issues were never addressed properly, especially in
terms of cross border relationships, race, and religion. Predominantly the Deep
South of Thailand is predominantly Malay and many of them do not converse the
Thai language. Only a couple of decades ago, the province of Songkhla decided
to be more Siamese (predominantly, the Deep South’s ethnic groups still refer
Thais as Siamese) rather than in favour of Malay influence. But then again
perhaps, more Malays in Songkhla have migrated to Pattani, Narathiwat, and
Yala, or even to Malaysia, or other foreign countries with less discrimination.
There are other reasons as well. Nevertheless, there are still four districts
in Southern Songkhla province (close to Pattani Province) where the Thai-Malays
still hold on to their language and culture (Engvall and Andersson, 2014, p.1;
Perkasa, 2010, pp. 1-3). [For a more fruitful understanding of these
relationships, a section on Northern Malayan history will be posted].
The FOB concept and building a wall are decisively temporarily
tactful, and offer temporary solutions to deter perpetrators. Certainly costly
to build and maintenance costs can be largely illogical. Additionally, they
lack the pertinence for an incisive and intensive solution for surveillance. In
the long run, perpetrators and criminals can wittingly still beat the system
after learning its weaknesses and frailties.
A Coach Filled with Passengers from Hatyai, Thailand Going to Malaysia – Pics Dchan Archive |
A Coach Dropping Malaysian
Tourists (on Weekends) at Danok, Songkhla, Thailand Immigration Queue
Pics Dchan Archive |
Right now, even before the walls and fences are built,
despite the various ICQ checkpoints, basically, they serve only as ‘civilizing
friendship’ borders as ASEAN neighbours, but in reality, there are illegal
lanes (‘lorong haram’ or ‘lorong tikus’ (rat lanes)) operated by Thai runners
ferrying their countrymen avoiding these checkpoints. On the weekends, these
illegal lanes serve weekend marketers who just want to hop across without
any immigration formalities.
The Egyptians and Israelis have walls on their
borders, and yet thousands of Arabs manage to beat the wall by building tunnels
and crossing beneath (al-Mughrabi, Reuters, 2009, April 28th). It
had come to such embarrassment that even Katyusha rockets and launchers can basically
be transported via these tunnels. What’s interesting here is that initially,
the Egyptians and Israelis did not have any idea where these tunnels are
located! (Issacharoff, timesofisrale.com, 2015, July 20th). In the
the end, the Israelis have to develop another technology to look for underground
tunnels and eventually taking them out with precision bombs that do not destroy
the environments and/or create sinkholes in the Southern Israeli
neighbourhoods or the Israeli kibbutz. The wall and fence create such mistrust
between the Arabs and Israelis that they become cruel implements and an
objective to actually stop desperate Palestinians from getting from Gaza and
reaching the West Bank, either for employment and/or seeking their loved ones
and relatives.
If Malaysia do build the wall and fence at the
Thai-Malaysian border, it only will burden both the border Malaysians and
Thais. It will also destroy the so-called, Malaysian – Thailand Special Border
Economic Zone (which is part of a broader initiative under the Indonesia –
Malaysia – Thailand Growth Triangle Zone that runs from the borders of Satun –
Perlis, Songkhla – Perlis and Kedah, Yala – Perak, and Narathiwat – Kelantan
and connecting Indonesia from Banda Aceh to Palembang, Sumatra). In these
states and provinces of Malaysia and Thailand, there are about 8.8 million
people (Lord and Tantrongjita, 2016). Despite Malaysia account for 65% of the
population in these border regions, restricting border movements can delay
trading practices and also encourage traders to opt for other solutions that
are slightly less of a hassle and could be wantonly illegal. Traders will no
longer want to ply their trade across borders because they require time and
energy to cross properly allocated checkpoints. Many have to make their way
earlier to avoid the mad rush and traffic that will eventually swell and choke
at the border checkpoints. Hence, if the implementations sought to seek better
technology to sieve out threats, criminal activities, and deter those from
using overland routes, then it has to be done in a very logically sound way
that does not in any way restrict safe and sound passages for hauliers, border
business traders, cross border students, and those that have close relations
with their families on both sides of the divide.
A Fence to Separate Israel and Gaza - Pics Dchan Archive |
A Part of the American Border Wall with Mexico – Pics Dchan Archive |
Egyptian-Israeli
Border Fence
– Pics Dchan Archive |
Right now, it’s already a burden to logistical traffic
that plies the trade between Singapore, Kuala Lumpur, Penang, and Bangkok. Long
lines of traffic are seen at the Singapore Causeway, no matter the time of the
day. At Bukit Kayu Hitam and Danok checkpoints, it's undeniably terrible and
burdensome, even for a lone traveller, on public holidays or even on days when
logistical traffic gets jammed up at the borders. Border overland users and
travellers offing to have an adventure will become irate at the burdensome
traffic and will undoubtedly make them stay away from cross-border trading
activities, in these regions. It’s no longer profitable with the time wasted
and perhaps their goods and wares get heated up under the hot sun and spoilt.
It has come to the attention that some haulier providers have shifted to
Thailand by having goods carted from Phuket Port (from vessels coming from the
West – Europe, India, Middle East, etc.) and transported via land arriving at
Surat Thani Port to be carted to awaiting vessels that will further transport
the goods and materials to Vietnam, China, Japan, South Korea and Russia (Asian
Development Bank, 2012, p.5). One such company that has been doing this for the
last few years is a Malaysian company called Tiong Nam Logistics. Tiong Nam
Logistics have basically secured logistical feasibilities for Singapore,
Malaysia, and Thailand in the South (Zainul, 2018, March 18th, thestaronline.com-Business
News).
ASEAN wanted to have a formidable dream of a single
ASEAN Community with fewer restrictions and possibly controls that can be
virtually monitored and/or profiled virtually or at a distance by 2025. In the
Mekong Region, China has basically penetrated its mantra of self-serving in the
region, building and constructing infrastructure in roads, rail networks,
telecommunications, and hydroelectric dams. China is visioning a world of
logistical efficiency that allows trade to flow like a gentle stream (Bosu,
2017, May 22nd, China.org.cn)
Night Time @ Su'ngei Kolok Thailand ICQ Exiting Thailand and Going to Malaysia – Pics Dchan Archive |
KART
ASIA Existing Logistical Routes
- Courtesy from KART ASIA |
A Chinese Truck from China at Padangbesa, Songkhla, Thailand – Pics Dchan Archive |
An
Illegal Tunnel Beneath the Border of Gaza and Israel. Israel Destroyed This
Tunnel A Few Years Ago
– Pics Dchan Archive |
Apart from the weather issue, activities on the rigs
require basic needs like food and water to be constantly replenished. The
service of machines, communication equipment, weapons, and ammunition must be
regularly maintained to ensure working order as the salt-air environment easily
corrodes and/or damages equipment. Fuel has to be constantly replenished, as
well, for outward surveillance and patrolling activities. Moreover, fuel cannot
be stored in large quantities as it poses safety concerns and the space allowed
to store the amount of fuel. As such, vessels, watercrafts, and aircraft have
to return to the mainland for maintenance and refuelling, thus making the
routine rather insurmountable and not economical.
Surveillance in this sense will rather become more and
more burdensome, less precise, and the focus gradually diminished because of
the laborious effort. Support is at best tiresome and strategically
inconclusive, to come in at the right moments. Jeremy Bentham did not
envision his 'panopticon' to be a tireless, incapable concept, he wanted
precision and intelligence. That said, the new world surveillance capabilities
have to be more precise and accurate in areas of documentation, detection, and
even defeating capabilities.
Geometric 3-Way Conal
Surveillance
Borrowing
and utilizing the concept, ideals and the methodologies of Pierre L’Enfant, he
came out with urban design, topographic landscape, and architecture in a
the geometric concept for Washington D. C. (Mann, 2006). Like Bentham, L’Enfant’s
design is precisely a surveillance model in the concept of crime prevention
through environmental design (CPTED). The onus here is to secure the certain
areas deemed restricted like the White House, the State Capitol, Congress, U.S.
Government Departments, etc. Despite L’Enfant’s concept and design visionalized
crime prevention for the ages, it somehow lacked the impetus to proactively
surveil, scan, or monitor for threats. Nevertheless, the reason it’s CPTED and
the main purpose is to deter threats ‘passively’. Just think of this idea like
a road hump, and when cars approach the hump, they are required to reduce
speed, slow down and move gently over the road hump to prevent damages to the
cars’ suspension.
Overland
borders require active surveillance to monitor for oncoming threats and safety
issues. To not refute L’Enfant’s concept, it’s more ideal we think of emission.
With this emission, the projection will be cone-shaped. Imagine interstellar
emission in the universe for some 150 pulsars (Rankin, 1993). This cone-shaped emission
presented the observations of interstellar activities of the pulsars.
As
surveillance emits from the heavens, vertically, and emits on the surface,
horizontally, in open land and/or seascapes, this emission is thus cone-shaped.
Cone-shaping’s emission is a physical relay by security surveillance equipment that’s
coming from an aircraft, vehicle, and/or vessel that projects a scanning
cone-shape design to capture images and/or detect physical objects or a certain
programmed organic shape that resembles human figures via heat, microwave, or
radio signatures to a certain area. To commit successful detection
surveillance, a 3-way conal surveillance will have to be in place. As a result,
the order to integrate all available security surveillance technologies, into
two conceptual formats: A) The vertical funnelling surveillance; and B) The horizontal
funnelling surveillance. Vertical funnelling will be the constant onset of real-time surveillance. Once the threat is detected, immediately horizontal
surveillance will follow suit to detect other threats. In order to understand
this vertical and horizontal surveillance, it’s imperative to examine each
concept separately.
A)
Vertical Cone - Camera
Surveillance from the Heavens
Design Dchan Archive |
Vertical (Cone) funnelling forms a formidable format
for top-to-bottom surveillance. Its feasibility is measured from above or below
the clouds straddling either beyond or above the stratosphere. Only a flying
craft can detect effectively with this feasibility. The best option for this
sort of aircraft is a drone (unmanned aerial vehicle (UAV)) (Shakhatreh et.
al., 2018) that’s capable to stay up in the clouds for at least more than 12
hours. Blimps (airships) (Miller et. al., 2014) are also feasible flying craft
that require less fossil energy or no fossil energy at all. Another newly
marvel intervention from the stratosphere is the stratospheric satellite or
stratolite (d’Oliveira et. al., 2016); balloons built for the stratosphere –
this method is rather cheap and easily maintainable (Izet-Unsalan et. al.,
2011); and stratospheric airship (Thales, 2018). The weather may cause turbulence
and instability below the troposphere and stratosphere, hence, these aircraft don’t
have problems with weather issues. However, the lens of monitoring cameras and
sensors must be capable of penetrating through the thick clouds. But then again,
in this modern age height is no longer the disadvantage. High powered optimum
capacity concave and convex lenses with built-in sensors (that’s infrared
capable or sending out electromagnetic waves called LiDAR (Light Detection and
Ranging)) (Shakhatreh et. al., 2018), a memory storage that can accommodate
ions data of information, and the flying craft’s immediate recognition
algorithms that prompt horizontal to respond or activate horizontal radars
automatically without human intervention but nonetheless prompt security
officials for immediate recce and intervention. Despite the wonders vertical or
cone funnelling, vertical funnelling in this aspect is advanced knowledge and
'trusted' information.
In order to understand correctly, the mathematical perception
of the formula of a cone is calculated in volume (V) and as such:
V = ⅓πr2h (Khan
Academy, n.d.). V only represents one volume of the cone. Hence, this formula
only represents 1 conal surveillance cone. There are two more horizontal cones
or radar detection (from the East and West). Therefore, in order to comply with
image or radar recording, signalling, or capturing standards, the equation has
thus to be: V = (⅓πr2h)
x 3. Therefore, V = πr2h, and suddenly the cone formula becomes a
cylindrical formula. The reason it becomes a cylindrical formula is that a
cone’s volume is a third of the volume of the cylinder. In order to understand
the attributes of the volume whether it's vertical or horizontal, it’s important
to understand each aspect of the cone.
Nevertheless, the attributes of conal surveillance volumetric
perceptions are just mathematical observations. The other attribute that’s also
a mathematical imperative is understanding how camera lens operate and this is
appended as follows:
Formulations – Dchan Archive |
A)
Horizontal Cones - Network Radars,
Multi-spectral Imaging, Radio Waves, (Big) Data Tracking, and Microwave
Surveillance on the Surface
Horizontal funnelling entails monitoring by objects
that are enhanced in via surveillance and control from the horizontal level.
Horizontal surveillance is basically the usual patrolling reconnaissance,
whether it’s with vehicle crafts or with manpower. Definitely, a laborious task
and most times in war and in conflict areas its very dangerous. It’s dangerous
because the line of sight and knowledge of the terrain and activities (whether it’s
a territory belonging to an organic occupier) is foreign to most individuals.
However, despite these disadvantages, interdiction is still required for the
closure and arrest of perpetrators. Hence, without the horizontal surveillance
feasibility is still incomplete and the matter unresolved.
i)
Radar Surveillance
Radar surveillance is
mostly synonymous with underwater sonar detection by submarines or surface
vessels to detect enemy submarines or military vessels (Terma, 2018). Since the
onset of piratical and human trafficking activities in many parts of the world,
radar surveillance has become more important to detect unnamed vessels plying
the high seas. Radar surveillance is not seen as a security equipment; it's
also a very important safety equipment to locate vessels or people lost at sea
in the event of natural disasters. Today's radar has the ability to detect vessels
as far away as 25 km away.
ii)
Multi-Spectral Imaging
Likewise,
multi-spectral imaging hinge on the prospect to produce images that's either
with heat signatures and/or signatures that's different from the surrounding
environments (Terma, 2018). It can also give a prospective number of
individuals whether inside the vehicle or vessel and perhaps their roles
whether friend, foe, or hostages. Of course, cameras from the skies can also
produce these images and if horizontal images can also equally confirm what's
imaged in the skies, this will be an added advantage.
Mobile Vehicle Surveillance System (MVSS) Incorporating Multispectral Imaging and Radar Detections – Pics Dchan Archive |
An Unmarked Policing Van in New York City with Surveilling Equipment Attached to It's Top – Pics Dchan Archive |
Microwave sensors – Pics Dchan Archive |
The Extended with the
other accessories
– Pics
Dchan Archive |
Hybrid sensors incorporating both radio-microwave optics |
Data
tracking, can be data either sent or received via personal computer systems, mobile,
satellite phones, or radio signals sent from electronic equipment. Data
tracking are two modes, firstly, the mode can be done via systems auditing.
Secondly, from a standpoint of systems auditing, it can be further enhanced to
become an artificial intelligence (AI) tracking mode. Auditing as we know it
provides the kind of security for the check and balance, we require. Like for
example, we can track via security access controls who passes the access on a
particular entrance and we can also check when this person enters or leave.
However, if there are way too many people to check like for example a main
entrance in a shopping mall, we need a computer programme (interface) to track,
search, and provide parameters to sieve out all the rest of the people
(entering or exiting the entrance) for that required person. By and large this
artificial intelligence for sieving data is not limited to just a certain
software. It can be further expanded with or into other software to provide
even more precise parameters to further detect the person. Hence, it provides
the security audience what's being transpired and what went wrong in the event
of a tragedy. It can also be a communication technology when the disaster
evolves or in the midst of the event if any individual can access the
equipment. Data can also be interspersed and/or even interfaced with all sorts
technology – imaging, radio signals and/or waves, signatures of various sorts
(like chemical, heat, or even metallic signatures). Data is so precise now that
electromagnetic signatures and technology are no longer science fiction and
it’s just a way to perfect them.
Microwave
surveillance has yet to become a reality yet. A professor at the University of Michigan
has come out with a unique way of detecting concealed weapons using microwave
detection at the airports. But this technology has yet to be proven tacitly.
The New York City Police Department is in the process of undergoing microwave
to detect weapons and explosives from a distance of about 400 meters. How
successful for these trials are still yet to be acknowledged, but definitely,
right now there's technology (going to be) available soon.
As lay persons and even for non-pure-science
academicians, understanding mathematical feasibilities will be too intricate
and confusing. Unless we are physicists and/or engineers then perhaps its only
important to understand the mathematical formulas, theories, and the functions.
However, we need to know that technologies representing horizontal cones are
important to capture the knowledge of: 1) Directions of the vehicles or
vessels; 2) The number of vehicles or vessels on the surface; 3) The number of
people aboard the vehicles or vessels - dead or alive; and lastly 4) Their
firepower and threats.
(Big) data is synonymous with extremely large
data sets that are analysed computationally to reveal patterns, trends, and
associations, especially relating to human behaviour and interactions. For
example, Mr. X, who lives in Ban Buketa, Narathiwat Province, Thailand, and
every Wednesday, at 9:30am, he will be at the Bukit Bunga Customs and Immigration
Quarantine (BBCIQ) before entering Jeli, Kelantan and onwards to Pasir Mas,
Kelantan to sell his truckload of Tupperware. Mr. X has been doing every week
for the last 8 years and it's constantly the same thing. And at 3:30pm, he will
be at the BBCIQ on his way back to Thailand with about the similar load, if he
did not sell anything at all because the business is bad, or his load could be
lesser or smaller if the business is good. So when every time the facial
recognition and behaviour algorithm will analyse his mood, friendliness, demeanour,
etc., and his truck's conditions, contents, and to a certain extent
cleanliness, etc. Suddenly, one day, big data alerted CIQ officers to remove
him from his vehicle and requested him to report to the office for interviewing.
Big data reasoned that there's a slight dent on the bumper of the vehicle, some
paint were chipped off from the bumper. Additionally, Mr. X appeared impulsive,
impatient, and slightly jittery. As he was waiting in the interview room, a
police car arrived at the BBCIQ. BBCIQ officers were wondering about the police
presence. The police believed that a Thai national and his vehicle was involved
in a hit and run accident (at Pasir Mas) and they have prints from the CCTV
footages of the hit and run vehicle.
Big data is today's morphing algorithms and its (today’s)
very powerful, integrated systems, that more and more thinks with a human
thought processes, but only that it’s knowledge is unbounded and thoroughly
resourceful from end to end. Depending on the storage facilities and chip
processing accelerations, the more storage, the better accommodations to adapt
to storing faster chip processors for processing all and any relevant
information as if the machine is a hybrid of a human brain applying neurons,
conducting synapses, and transmitting information in light speed. Definitely,
with such speed, time and knowledge save lives and apprehend offenders
immediately. Additionally, investigations and operations conducted in this
manner make many enforcement officers less stressful, and ultimately, aiding
them in the eventful case closures without much incidents and dramas.
Big data is now in the creation of a ‘virtual border
wall’ in the United States. A start up called Anduril is in the process of
integrating sensing towers carrying cameras and sensor lasers powered by
artificial intelligence algorithms to spot any person and to distinguish
between human, objects, and animals in a 2-mile radius. On board of some
American warships are modified and newly introduced radar surveillance systems
known as ‘Sea Giraffes’ that can scan the air and surface for any seemingly
threats. And recently at the University of Cambridge and India’s National
Institute of Technology and Science just published a paper on using unmanned
aerial surveillance to identify and profile violent individuals in crowds.
Despite the project is utilizing unmanned aerial surveillance, it is by no
means a project about aerial surveillance but how artificial intelligence
profiles between suspicious violent behaviour and mannerisms and those that are
not dangerous and violent. Finally, in Singapore, big data is now adaptable to
not only use in military and law enforcements but also in sectors like welfare
and happiness and how Singaporeans can move forward in a very competitive,
structured, and demanding society and at the same time making Singapore enjoy
their lifestyles, happiness, and raising good families.
Textron, Martin UAV V-BAT makes a transition from vertical to horizontal flight
Technological Fallacies
As mankind become more and more engross in automation
and relying big data surveillance for information to solve issues on various
fronts, evolving big data without audit, checks and balances can hybrid itself
into sorts. Issues arise in this instance can increase unnecessary monitoring
which can cause systems to crash or over enhancements that may trigger false
alarms. Algorithms have to be constantly monitored by capable programmers to
prevent unnecessary hacks and hybridization or program mutanization its program
codes. This is not science fiction as long as artificial intelligence is built
to mimic 'cognitive conditioning abilities'. Cognitive conditioning abilities
is the ability teach, correct, and repair itself when it sees fit and the
reason is because artificial intelligence seeks to perfect itself and become
knowledgeable and resourceful to its audience. As we rely on the artificial
intelligence’s ability as an invaluable piece of knowledge equipment,
artificial intelligence may manipulate our (soon to be) weaknesses and we
become enslaved to artificial intelligence. In the end, instead of us
generating policies, it seems artificial intelligence may dictate our terms of
references.
Surveillance with artificial intelligence that helps
us to deter intrusions and threats is wonderful. However, when surveillance
becomes unnecessarily pervasive, intrusions can be a threat to us as well as it
violates our very essence or privacy. At New York’s La Guardia International
Airport, patrons and passengers complained that they were being “gawked” at by
‘robots’ that are place at strategic locations to scan and profile threats. Passengers
are fearful that artificial intelligence equipment are not just monitoring
threats but perhaps are prying eyes to scan their naked bodies. The question is
how do we draw lines to balance security and securing privacies. Perhaps policy
makers need to better understand that machines can have discretion to read
and scan but machines can opt to defer publishing images which are graphically
insecure and violate our rights. However, machines can also be taught to
enhance blurry outlines of weapons that attract either chemical, heat, or
electromagnetic interferences. The public should also be educated to the fact
that machines that secure our livelihoods also provide security to our
privacies as well. In that sense, the why, how, and what can abstain our
suspicions and thus we have no reason to be weary of their ‘spying’ abilities.
Lastly, preferably, these control stations (that have
scores of monitor screens) ought to be run by professional staff that have been
properly screened. A list of professional programmers is to be on standby at
all times to deter and detect threats. Programmers should also conduct ‘threat
drills’ to substantiate foreseeable incidents. The opportunity here is not so
much of just rectifying but to understand in what way resolutions can best
offer timings to end the threats and secure the facilities in the shortest
possible time. Despite all what’s being said and done, there will always be
evolving threats and nothing is perfect to the infinity.
Conclusion
Geometric conal surveillance is an important activity
for border surveillance and especially one that includes a body of water,
remote jungles and undulating landscapes. Geometric conal surveillance is two
folds, vertical and horizontal. Horizontal surveillance are capable
observations from the skies up to the stratosphere. Vertical opts for radio and
radar surveillance that not only detect bodies but also the ability to sense
threats. Surveillance can be pervasive and intrusive and the manner to minimize
these issues are guiding and monitoring policies that can diminish unwanted behaviour
and preserving professionalism amongst security professionals.
References
al-Mughrabi,
N. (2009, April 28). Egypt puts the bite on Gaza tunnel smugglers | Reuters. Reuters,
p. 01. Retrieved from
https://www.reuters.com/article/us-palestinians-egypt-tunnels/egypt-puts-the-bite-on-gaza-tunnel-smugglers-idUSTRE53R2JM20090428
Anis, M. N.,
& Kaos Jr, J. (2016, November 11). Duterte gives Malaysia licence to enter
waters to pursue pirates - Nation | The Star Online. The Star ONLINE -
NATION, p. 01. Retrieved from
https://www.thestar.com.my/news/nation/2016/11/11/no-more-border-escapes-duterte-gives-malaysia-licence-to-enter-waters-to-pursue-pirates/
Bentham, J.
(1995). The Panopticon Writings. In M. (Trans. . Božović (Ed.), The
Panopticon Writings (Verso Ed., p. 115). London: Verso.
https://doi.org/10.1007/s00287-006-0116-6
Bernama.
(2015, October 12). Two new sea basings strengthen security control in eastern
Sabah | Malaysia | Malay Mail Online. Malay Mail.Com, p. 01. Retrieved
from
http://www.themalaymailonline.com/malaysia/article/two-new-sea-basings-strengthen-security-control-in-eastern-sabah#PXBPvrjLUwHLgQKt.97
Bosu, R. S.
(2017, May 22). BRI will bring China and ASEAN closer. China.Org.Cn, p.
01. Retrieved from
http://www.china.org.cn/opinion/2017-05/22/content_40865507.htm
Caluya, G.
(2010). The post-panoptic society? Reassessing Foucault in surveillance
studies. Social Identities, 16(5), 621–633.
https://doi.org/10.1080/13504630.2010.509565
Development
Bank, A. (2012). Indonesia-Malaysia-Thailand Growth Triangle (IMT-GT):
Implementation Blueprint 2012-2016. Kuala Lumpur. Retrieved from
https://www.adb.org/sites/default/files/page/34235/imt-gt-implementation-blueprint-2012-2016-july-2012.pdf
D’Oliveira,
F. A., Melo, F. C. L. de, Devezas, T. C., d’Oliveira, F. A., Melo, F. C. L. de,
& Devezas, T. C. (2016). High-Altitude Platforms - Present Situation and
Technology Trends. Journal of Aerospace Technology and Management, 8(3),
249–262. https://doi.org/10.5028/jatm.v8i3.699
Energy
Global News. (2018). November 1989 - Seacrest Drillship Sunk by Typhoon Gay.
Retrieved September 6, 2018, from
http://www.energyglobalnews.com/november-1989-typhoon-gay-sinks-seacrest-drillship/
Foucault, M.
(1977). Discipline and Punish. (A. (Translator) Sheridan, Ed.), Discipline
and Punish The Birth of the Prison. New York: Random House.
https://doi.org/10.1111/j.1949-8594.1920.tb07852.x
Galič, M.,
Timan, T., & Koops, B.-J. (2017). Bentham, Deleuze and Beyond: An Overview
of Surveillance Theories from the Panopticon to Participation. Philosophy
and Technology, 30, 9–37. https://doi.org/10.1007/s13347-016-0219-1
Human Rights
Watch. (2017). Thailand: Trafficking Convictions Important Step Forward |
Human Rights Watch. New York. Retrieved from
https://www.hrw.org/news/2017/07/24/thailand-trafficking-convictions-important-step-forward
Issacharoff,
A. (2015, July 20). How’s Hamas getting supplies for rockets and tunnels?
Through Israel | The Times of Israel. The Times of Israel, p. 01.
Retrieved from
https://www.timesofisrael.com/hows-hamas-getting-supplies-for-rockets-and-tunnels-through-israel/
Izet-Unsalan,
K., & Unsalan, D. (2011). A low cost alternative for satellites- tethered
ultra-high altitude balloons. In Proceedings of 5th International Conference
on Recent Advances in Space Technologies - RAST2011 (pp. 13–16). IEEE.
https://doi.org/10.1109/RAST.2011.5966806
KijangMas
Perkasa, 1963-. (2010). Patani : behind the accidental border : the search
for elusive peace. Kuala Lumpur: Orion Solutions. Retrieved from
http://www.worldcat.org/title/patani-behind-the-accidental-border-the-search-for-elusive-peace/oclc/849905091
Lord, M. J.,
& Tangtrongjita, P. (2016). Scoping Study for The Special Border
Economic Zone (SBEZ) In The Indonesia-Malaysia-Thailand Growth Triangle
(IMT-GT). Munich. Retrieved from
https://mpra.ub.uni-muenchen.de/76456/1/MPRA_paper_76456.pdf
Mann, N. R.
(2006). The Sacred Geometry of Washington, D.C.: The Integrity And Power of
the Original Design. Somerset: Green Magic.
Miller, S.
H., Fesen, R., Hillenbrand, L., Rhodes, J., Baird, G., Blake, G., … Zambrano,
T. (2014). Airships: A New Horizon for Science. Instrumentation and Methods
for Astrophysics (Astro-Ph.IM); Cosmology and Nongalactic Astrophysics
(Astro-Ph.CO); Earth and Planetary Astrophysics (Astro-Ph.EP); Astrophysics of
Galaxies (Astro-Ph.GA); Solar and Stellar Astrophysics (Astro-Ph.SR), 60.
Retrieved from http://arxiv.org/abs/1402.6706
Rankin, J.
M. (1993). Toward An Empirical Theory of Pulsar Emission. VI. The Geometry of
the Conal Emission Region. The Astrophysical Journal, 405(01),
285–297. Retrieved from
http://adsbit.harvard.edu/cgi-bin/nph-iarticle_query?1993ApJ...405..285R&defaultprint=YES&filetype=.pdf
Rowedder, S.
(2018). The Challenge of Studying ‘Invisible’ Subjects – Tai Lue Cross-Border
Traders In The Yunnan-Laos-Thailand Borderland. In 13th International
Conference on Thai Studies: Globalized Thailand? Connectivity, Conflict, and
Conundrums of Thai Studies - 15-18 July 2017 - Vol. 4 R. Sri (pp.
1387–1404). Chiang Mai. Retrieved from http://www.icts13.chiangmai.cmu.ac.th/
Sea
Management Resources Sdn. Bhd. (2008). Case Study on Illegal Unreported and
Unregulated IUU Fishing off the East Coast of Peninsular Malaysia. Kuala
Lumpur. Retrieved from
https://www.apec.org/Publications/2008/10/Case-Study-on-Illegal-Unreported-and-Unregulated-IUU-Fishing-off-the-East-Coast-of-Peninsular-Malays
Shakhatreh,
H., Sawalmeh, A., Al-Fuqaha, A., Dou, Z., Almaita, E., Khalil, I., … Guizani,
M. (2018). Unmanned Aerial Vehicles: A Survey on Civil Applications and Key
Research Challenges. Robotics (Cs.RO). Retrieved from
http://arxiv.org/abs/1805.00881
Sheridan, C.
(2016). Foucault, Power and the Modern Panopticon. Trinity College.
Retrieved from http://digitalrepository.trincoll.edu/theses/548
Tagliacozzo,
E. (2001). Border Permeability and the State in Southeast Asia: Contraband and
Regional Security. Contemporary Southeast Asia. ISEAS - Yusof Ishak
Institute. https://doi.org/10.2307/25798545
Terma.
(2018). Naval air & surface surveillance radar. Retrieved September 10,
2018, from
https://www.terma.com/surveillance-mission-systems/radar-systems/naval-radar-surveillance/
Thales. (2018).
Stratobus: Why this stratospheric airship is already being called a “Swiss
knife” in the sky | Thales Group. Retrieved September 7, 2018, from
https://www.thalesgroup.com/en/worldwide/space/magazine/stratobus-why-stratospheric-airship-already-being-called-swiss-knife-sky
Zainul, I.
F. (2017, March 18). Tiong Nam’s regional trucking push - Business News | The
Star Online. The Star ONLINE, p. 01. Retrieved from
https://www.thestar.com.my/business/business-news/2017/03/18/tiong-nams-regional-trucking-push/
Volume
formulas review | Khan Academy. (n.d.). Retrieved September 10, 2018, from
https://www.khanacademy.org/math/basic-geo/basic-geo-volume-sa/volume-cones/a/volume-formulas-review