Tuesday, August 28, 2018

Funneling Surveillance: Horizontal & Vertical

In the late 18th century, Jeremy Bentham, a philosopher and social theorist, coined the term, 'panopticon'. The 'panopticon' concept is actually an architectural marvel concept built purposely to monitor inmates (intensively) in a penal setting. It incorporates into it special viewing glasses (that seemingly 'magnifies' activities) on each of the entrances and/or doors of the building (on each level) and a circular rotunda or command centre for each floor where the authorities or officers were stationed inside. The idea is to allow penal or prison officers to have viewed or line of sight in (a 360o format) on what is transpired within the confines of each cell. Bentham was troubled by the fact that many prisoners were unfairly handled, and prison officers got into trouble from mishaps either trying to resolve unforeseen circumstances or unnecessarily obliging too much lethal force that resulted in the deaths of prisoners and/or prison officers in the ensuing engagement. With 'panopticon', the officer or officers can use that knowledge to evaluate and anticipate the needed objectives require to safely end its violent cause and nature (Bentham, 1787/1995; Foucault, 1975).
Of course, in the late 18th century, such technology, especially the optics, would hardly ever be possible. Nevertheless, Bentham’s fantasy and prescribed needs wanted an institution that can possibly fathom real criminal treatment and justice in accordance with the rule of law, and with that, effective watchmen, prison or penal officers (Foucault, 1975).
The Panopticon – Pics Dchan Archive
Benthamian's Future Sights 
Bentham’s vision was not realized until the latter half of the 20th century where penal institutions around the the world began to station (on each floor) the control centre and command post in the middle of each floors. The purpose is to have a circular 360o line of sight of all the surrounding cells. Additionally, the panopticon also engages around-the-clock surveillance. This utilitarian philosophical concept embodies humanism in terms of Benthamian thought, hence a righteous manner of punishments and sanctions (Foucault, 1975; Galič, Timan, and Koops, March 2017).
Some academicians, professionals, and authorities are nonchalant and feel that the 'panopticon' concept breaches privacy and rights. They are being critical because there are remnants in law enforcement society where technology is not being utilized as a way to enhance work efficiency, and/or aiding technology to bring resolution to conflicts in a peaceful manner, but rather, perverting equipment or technology to their own ends of how they are to be used (Sheridan, 2016; Galič, Timan, and Koops, 2017). On the other hand, technologies may malfunction, and hence, accidents occurred. Nevertheless, Bentham's vision of the panopticon has expanded multiple folds on multiple fronts. 
Today, the two most noticeable technologies that are perhaps easily noticeable are the closed-circuit television cameras (CCTVs) and the access controls. In the 21st century, however, critics of surveillance have now focused their attention on the flow and control of information (Caluya, 2010).
CCTV Surveillance Warnings that the Area is Being Watched!!!! – Pics Dchan Archive
In one word, the panopticon is surveillance. Not just surveillance, but intense surveillance. Today, surveillance is not just about CCTVs but more importantly, information, and how it is perceived and evaluated. Information gathered in this way is crucial because authorities then can discover and get the facts needed to resolve each difficult issue (Sheridan, 2016). Information no matter how difficult can help us piece together puzzles into one holistic picture for our understanding. From East Sabah Security Command (ESSCOM) to the edge of space, and finding a needle in a haystack, it’s all about gathering information. The question is how we gather this information that allows authorities to evaluate the necessity as a threat or just plain spam. There’s so much junk and spam that authorities have only that much attention span to evaluate them all (Caluya, 2010).
Today, in Malaysia, surveillance has progressed, especially after the debacle of MH 370, the Sulu incursion, the various threats from the Islamic State or DAESH, other national security issues, espionage, trading of national secrets, etc. There’s so much information required to be processed and evaluated, and earlier, this essay mentioned the issue of junk and spam information in a sea of everything. Precision requires finesse and fine-tuning and the only way to proceed is utilizing technology that’s able to sieve and taper them into a holistic factual picture. This essay will focus on surveillance and the various technologies available in the market or in the making of it. The primary of surveillance discuss in this paper is one fold, that is, to focus on the border enforcement and how technologies and concept can provide a foothold inefficiently countering threats, resolving violence, and offer better deterrence and surveillance.
The Forward Operating Base (FOB) & The Wall
The previous Prime Minister (of Malaysia) Najib’s the administration was bent on building a wall between the Thai and Malaysian borders and using Forward Operating Base (FOB) to effectively securing the Sabah Eastern board. The idea behind the FOBs is using abandoned ex-PETRONAS oil rig platforms that can be anchored or secured off the coastal areas (malaymail.com, 2015, October 12th). These platforms are then used to berth MMEA or Naval watercraft and perhaps flying vehicles (like helicopters) to head off further into the Sulu Sea or just off the permitted territorial seas of the Philippines. The President of the Philippines Rodrigo Duterte permitted neighbouring Malaysia and Indonesia to conduct ‘hot pursuit’ activities by their respective security forces; and hence, these crafts can generally, head off into Philippine’s waters to chase after pirates, perpetrators, and kidnappers (Anis and Kaos, Jr, thestaronline.com, 2016, November 11th).
Security Forward Operating Base Ocean/Sea Rigs – Pics Dchan Archive
Unpredictable natural disasters like strong gales, typhoons, electrical storms, floods, earthquakes, and even mudslides can either damned the walls or brittle the fences in the long run. Hence, it’s perhaps not ideal unless the walls are constructed like medieval castles.
Traders’ angst is perhaps not the only complaints. Many Southern Malay Thais and Northern Malays in Kelantan, Perlis, Kedah, and Perak have relatives living along the Malaysian-Thai border. These people are peaceful and they only want their livelihoods. Parts of Kelantan, Perak, Kedah, and Perlis were part of a more delicate statehood that was drawn and separated by the then British Colonials and Siamese Kings. After the Second World War and Malayan independence, these issues were never addressed properly, especially in terms of cross border relationships, race, and religion. Predominantly the Deep South of Thailand is predominantly Malay and many of them do not converse the Thai language. Only a couple of decades ago, the province of Songkhla decided to be more Siamese (predominantly, the Deep South’s ethnic groups still refer Thais as Siamese) rather than in favour of Malay influence. But then again perhaps, more Malays in Songkhla have migrated to Pattani, Narathiwat, and Yala, or even to Malaysia, or other foreign countries with less discrimination. There are other reasons as well. Nevertheless, there are still four districts in Southern Songkhla province (close to Pattani Province) where the Thai-Malays still hold on to their language and culture (Engvall and Andersson, 2014, p.1; Perkasa, 2010, pp. 1-3). [For a more fruitful understanding of these relationships, a section on Northern Malayan history will be posted].


A Coach Filled with Passengers from Hatyai, Thailand Going to Malaysia – Pics Dchan Archive
A Coach Dropping Malaysian Tourists (on Weekends) at Danok, Songkhla, Thailand Immigration Queue
Pics  Dchan Archive
The FOB concept and building a wall are decisively temporarily tactful, and offer temporary solutions to deter perpetrators. Certainly costly to build and maintenance costs can be largely illogical. Additionally, they lack the pertinence for an incisive and intensive solution for surveillance. In the long run, perpetrators and criminals can wittingly still beat the system after learning its weaknesses and frailties.
Right now, even before the walls and fences are built, despite the various ICQ checkpoints, basically, they serve only as ‘civilizing friendship’ borders as ASEAN neighbours, but in reality, there are illegal lanes (‘lorong haram’ or ‘lorong tikus’ (rat lanes)) operated by Thai runners ferrying their countrymen avoiding these checkpoints. On the weekends, these illegal lanes serve weekend marketers who just want to hop across without any immigration formalities.
The Egyptians and Israelis have walls on their borders, and yet thousands of Arabs manage to beat the wall by building tunnels and crossing beneath (al-Mughrabi, Reuters, 2009, April 28th). It had come to such embarrassment that even Katyusha rockets and launchers can basically be transported via these tunnels. What’s interesting here is that initially, the Egyptians and Israelis did not have any idea where these tunnels are located! (Issacharoff, timesofisrale.com, 2015, July 20th). In the the end, the Israelis have to develop another technology to look for underground tunnels and eventually taking them out with precision bombs that do not destroy the environments and/or create sinkholes in the Southern Israeli neighbourhoods or the Israeli kibbutz. The wall and fence create such mistrust between the Arabs and Israelis that they become cruel implements and an objective to actually stop desperate Palestinians from getting from Gaza and reaching the West Bank, either for employment and/or seeking their loved ones and relatives.
A Fence to Separate Israel and Gaza 
- Pics Dchan Archive
A Part of the American Border Wall with Mexico – Pics Dchan Archive


Egyptian-Israeli Border Fence
– Pics Dchan Archive
If Malaysia do build the wall and fence at the Thai-Malaysian border, it only will burden both the border Malaysians and Thais. It will also destroy the so-called, Malaysian – Thailand Special Border Economic Zone (which is part of a broader initiative under the Indonesia – Malaysia – Thailand Growth Triangle Zone that runs from the borders of Satun – Perlis, Songkhla – Perlis and Kedah, Yala – Perak, and Narathiwat – Kelantan and connecting Indonesia from Banda Aceh to Palembang, Sumatra). In these states and provinces of Malaysia and Thailand, there are about 8.8 million people (Lord and Tantrongjita, 2016). Despite Malaysia account for 65% of the population in these border regions, restricting border movements can delay trading practices and also encourage traders to opt for other solutions that are slightly less of a hassle and could be wantonly illegal. Traders will no longer want to ply their trade across borders because they require time and energy to cross properly allocated checkpoints. Many have to make their way earlier to avoid the mad rush and traffic that will eventually swell and choke at the border checkpoints. Hence, if the implementations sought to seek better technology to sieve out threats, criminal activities, and deter those from using overland routes, then it has to be done in a very logically sound way that does not in any way restrict safe and sound passages for hauliers, border business traders, cross border students, and those that have close relations with their families on both sides of the divide.
Right now, it’s already a burden to logistical traffic that plies the trade between Singapore, Kuala Lumpur, Penang, and Bangkok. Long lines of traffic are seen at the Singapore Causeway, no matter the time of the day. At Bukit Kayu Hitam and Danok checkpoints, it's undeniably terrible and burdensome, even for a lone traveller, on public holidays or even on days when logistical traffic gets jammed up at the borders. Border overland users and travellers offing to have an adventure will become irate at the burdensome traffic and will undoubtedly make them stay away from cross-border trading activities, in these regions. It’s no longer profitable with the time wasted and perhaps their goods and wares get heated up under the hot sun and spoilt. It has come to the attention that some haulier providers have shifted to Thailand by having goods carted from Phuket Port (from vessels coming from the West – Europe, India, Middle East, etc.) and transported via land arriving at Surat Thani Port to be carted to awaiting vessels that will further transport the goods and materials to Vietnam, China, Japan, South Korea and Russia (Asian Development Bank, 2012, p.5). One such company that has been doing this for the last few years is a Malaysian company called Tiong Nam Logistics. Tiong Nam Logistics have basically secured logistical feasibilities for Singapore, Malaysia, and Thailand in the South (Zainul, 2018, March 18th, thestaronline.com-Business News).
ASEAN wanted to have a formidable dream of a single ASEAN Community with fewer restrictions and possibly controls that can be virtually monitored and/or profiled virtually or at a distance by 2025. In the Mekong Region, China has basically penetrated its mantra of self-serving in the region, building and constructing infrastructure in roads, rail networks, telecommunications, and hydroelectric dams. China is visioning a world of logistical efficiency that allows trade to flow like a gentle stream (Bosu, 2017, May 22nd, China.org.cn)
Night Time @ Su'ngei Kolok Thailand ICQ Exiting Thailand and Going to Malaysia – Pics Dchan Archive
The idea behind China’s Belt and Road Initiative (BRI) or One Belt One Road philosophy is to link China to the world in the shortest possible time avoiding expensive flight charges and dangerously high seas. Despite China will ensure hauling goods via approved logistical networks plying structured roadways (highways), rail networks, and sea lanes that connect cities in an efficacy manner, nevertheless, albeit the Chinese government will want it done properly, and in accordance to procedures; many times hauliers and truckers refuse to comply legally (Rowedder, March 2018, p.1391). These people, on the side-end of the business, will switch to smuggling and avoiding taxations of different contrabands from drugs to dead exotic species of wildlife. Cross border smuggling at the Malaysian – Thai border, most common commodities are sugar, cooking oil and Malaysian subsidized petroleum (Tagliacozzo, 2001, pp. 254-274). However, on the high seas, the poaching of Malaysian fisheries and marine aquatic plants and organisms are common as our stocks near our coastal waters still have marine live stocks (Sea Management Resources Sdn. Bhd., 2008). Of course, tragedy evokes sensibilities when serious issues like drug trafficking, kidnapping, and trafficking of human beings and organs become issues.
KART ASIA Existing Logistical Routes
- Courtesy from KART ASIA
A Chinese Truck from China at Padangbesa, Songkhla, Thailand – Pics Dchan Archive
The wall is not going to stop human trafficking and smuggling. Desperate agents for these undesirable activities will survey, do their studies, and become better informed on the loopholes and weaknesses. In a report produced by Human Rights Watch, it's determined most of the human trafficking in Peninsula Malaysia comes from the Andaman Sea and into the swampy, secluded, and forestry areas of Satun Province (in Thailand) and Perlis (HRW, 2017). Majority of the mass graves found were also in these border areas. The border checkpoint at Wang Kelian, Perlis is undoubtedly isolated and it only functions during the daytime and closes before 2000 Hours. From the Wang Kelian checkpoint, the closest civilization, Kaki Bukit, is about 8.2 KM away. To access Kaki Bukit, Perlis, the only visible road is via a steep and sharp winding ridge that crisscrosses parts of the limestone, Nakawan Range. No decent human being will ever fathom such a feat in the nearby secluded jungle terrain that’s swampy, muddy, mosquito-infested, wild animals, and inaccessible. The only ones desperate enough to make such a feat are illegal immigrants looking for economic opportunities, immigrants without formal documentations that are duped by agents for a fee, refugees, and human traffickers.
An Illegal Tunnel Beneath the Border of Gaza and Israel. Israel Destroyed This Tunnel A Few Years Ago
– Pics Dchan Archive
Earlier in this essay, it describes the credibility of the FOBs in the ESSCOM region of Sabah. FOBs require manpower to be stationed, 24/7. Those manning the bases have to have the courage not only of stealthy perpetrators attacking their posts but bad weather as well. The weather can be very unpredictable, and the personnel who are station at these bases have to bear and ride out weather – no matter how unpleasant the experience can be. The worst scenario is when the storm becomes so unbearable that the rigs become overburdened, the loss of lives from drowning, and loss of equipment like vessels, watercraft, and aircraft. In 1989, 91 crews of the Seacrest Drillship perished under Typhoon Gay that produced 40ft waves in the South China Sea. Seacrest Drillship is an American-Thai oil and gas drilling platform based out of Songkhla province. During the Typhoon activity, the Drillship was securely anchored to the seafloor but the massive burst of the waves just capsized the whole Seacrest Drillship bringing with it 91 crews (Energy Global News – the Quest for Energy, 2018).
Apart from the weather issue, activities on the rigs require basic needs like food and water to be constantly replenished. The service of machines, communication equipment, weapons, and ammunition must be regularly maintained to ensure working order as the salt-air environment easily corrodes and/or damages equipment. Fuel has to be constantly replenished, as well, for outward surveillance and patrolling activities. Moreover, fuel cannot be stored in large quantities as it poses safety concerns and the space allowed to store the amount of fuel. As such, vessels, watercrafts, and aircraft have to return to the mainland for maintenance and refuelling, thus making the routine rather insurmountable and not economical.
Surveillance in this sense will rather become more and more burdensome, less precise, and the focus gradually diminished because of the laborious effort. Support is at best tiresome and strategically inconclusive, to come in at the right moments.  Jeremy Bentham did not envision his 'panopticon' to be a tireless, incapable concept, he wanted precision and intelligence. That said, the new world surveillance capabilities have to be more precise and accurate in areas of documentation, detection, and even defeating capabilities.
Geometric 3-Way Conal Surveillance
Borrowing and utilizing the concept, ideals and the methodologies of Pierre L’Enfant, he came out with urban design, topographic landscape, and architecture in a the geometric concept for Washington D. C. (Mann, 2006). Like Bentham, L’Enfant’s design is precisely a surveillance model in the concept of crime prevention through environmental design (CPTED). The onus here is to secure the certain areas deemed restricted like the White House, the State Capitol, Congress, U.S. Government Departments, etc. Despite L’Enfant’s concept and design visionalized crime prevention for the ages, it somehow lacked the impetus to proactively surveil, scan, or monitor for threats. Nevertheless, the reason it’s CPTED and the main purpose is to deter threats ‘passively’. Just think of this idea like a road hump, and when cars approach the hump, they are required to reduce speed, slow down and move gently over the road hump to prevent damages to the cars’ suspension.
Overland borders require active surveillance to monitor for oncoming threats and safety issues. To not refute L’Enfant’s concept, it’s more ideal we think of emission. With this emission, the projection will be cone-shaped. Imagine interstellar emission in the universe for some 150 pulsars (Rankin, 1993). This cone-shaped emission presented the observations of interstellar activities of the pulsars.
As surveillance emits from the heavens, vertically, and emits on the surface, horizontally, in open land and/or seascapes, this emission is thus cone-shaped. Cone-shaping’s emission is a physical relay by security surveillance equipment that’s coming from an aircraft, vehicle, and/or vessel that projects a scanning cone-shape design to capture images and/or detect physical objects or a certain programmed organic shape that resembles human figures via heat, microwave, or radio signatures to a certain area. To commit successful detection surveillance, a 3-way conal surveillance will have to be in place. As a result, the order to integrate all available security surveillance technologies, into two conceptual formats: A) The vertical funnelling surveillance; and B) The horizontal funnelling surveillance. Vertical funnelling will be the constant onset of real-time surveillance. Once the threat is detected, immediately horizontal surveillance will follow suit to detect other threats. In order to understand this vertical and horizontal surveillance, it’s imperative to examine each concept separately.
Design Dchan Archive
A)     Vertical Cone - Camera Surveillance from the Heavens
Vertical (Cone) funnelling forms a formidable format for top-to-bottom surveillance. Its feasibility is measured from above or below the clouds straddling either beyond or above the stratosphere. Only a flying craft can detect effectively with this feasibility. The best option for this sort of aircraft is a drone (unmanned aerial vehicle (UAV)) (Shakhatreh et. al., 2018) that’s capable to stay up in the clouds for at least more than 12 hours. Blimps (airships) (Miller et. al., 2014) are also feasible flying craft that require less fossil energy or no fossil energy at all. Another newly marvel intervention from the stratosphere is the stratospheric satellite or stratolite (d’Oliveira et. al., 2016); balloons built for the stratosphere – this method is rather cheap and easily maintainable (Izet-Unsalan et. al., 2011); and stratospheric airship (Thales, 2018). The weather may cause turbulence and instability below the troposphere and stratosphere, hence, these aircraft don’t have problems with weather issues. However, the lens of monitoring cameras and sensors must be capable of penetrating through the thick clouds. But then again, in this modern age height is no longer the disadvantage. High powered optimum capacity concave and convex lenses with built-in sensors (that’s infrared capable or sending out electromagnetic waves called LiDAR (Light Detection and Ranging)) (Shakhatreh et. al., 2018), a memory storage that can accommodate ions data of information, and the flying craft’s immediate recognition algorithms that prompt horizontal to respond or activate horizontal radars automatically without human intervention but nonetheless prompt security officials for immediate recce and intervention. Despite the wonders vertical or cone funnelling, vertical funnelling in this aspect is advanced knowledge and 'trusted' information.
In order to understand correctly, the mathematical perception of the formula of a cone is calculated in volume (V) and as such:
V = ⅓πr2h (Khan Academy, n.d.). V only represents one volume of the cone. Hence, this formula only represents 1 conal surveillance cone. There are two more horizontal cones or radar detection (from the East and West). Therefore, in order to comply with image or radar recording, signalling, or capturing standards, the equation has thus to be: V = (πr2h) x 3. Therefore, V = πr2h, and suddenly the cone formula becomes a cylindrical formula. The reason it becomes a cylindrical formula is that a cone’s volume is a third of the volume of the cylinder. In order to understand the attributes of the volume whether it's vertical or horizontal, it’s important to understand each aspect of the cone.
Nevertheless, the attributes of conal surveillance volumetric perceptions are just mathematical observations. The other attribute that’s also a mathematical imperative is understanding how camera lens operate and this is appended as follows:
Formulations – Dchan Archive
Despite the intricacies on the various understandings in terms of depth, magnification, distance in which the lens need to capture images, and zooming capabilities, can thus be applied via formulas that address capabilities. A layperson does not necessarily have to know how to calculate the effectiveness. All cameras built have certain specifications that come with it. Perhaps those in the technical areas may need to know what's the effectiveness (say) from the stratosphere (at 66,000 ft. or 20 km), or an altitude of say 20,000 ft. or 6.096 km. The reason is when buying such equipment one has to have some formidable knowledge of the effectiveness, range, clarity, ability to even measure capture and recognize images for perhaps comparisons using algorithms.

A)     Horizontal Cones - Network Radars, Multi-spectral Imaging, Radio Waves, (Big) Data Tracking, and Microwave Surveillance on the Surface
Horizontal funnelling entails monitoring by objects that are enhanced in via surveillance and control from the horizontal level. Horizontal surveillance is basically the usual patrolling reconnaissance, whether it’s with vehicle crafts or with manpower. Definitely, a laborious task and most times in war and in conflict areas its very dangerous. It’s dangerous because the line of sight and knowledge of the terrain and activities (whether it’s a territory belonging to an organic occupier) is foreign to most individuals. However, despite these disadvantages, interdiction is still required for the closure and arrest of perpetrators. Hence, without the horizontal surveillance feasibility is still incomplete and the matter unresolved.
i)                   Radar Surveillance

Radar surveillance is mostly synonymous with underwater sonar detection by submarines or surface vessels to detect enemy submarines or military vessels (Terma, 2018). Since the onset of piratical and human trafficking activities in many parts of the world, radar surveillance has become more important to detect unnamed vessels plying the high seas. Radar surveillance is not seen as a security equipment; it's also a very important safety equipment to locate vessels or people lost at sea in the event of natural disasters. Today's radar has the ability to detect vessels as far away as 25 km away.
Information and Power Point – Dchan Archive
ii)                   Multi-Spectral Imaging
Likewise, multi-spectral imaging hinge on the prospect to produce images that's either with heat signatures and/or signatures that's different from the surrounding environments (Terma, 2018). It can also give a prospective number of individuals whether inside the vehicle or vessel and perhaps their roles whether friend, foe, or hostages. Of course, cameras from the skies can also produce these images and if horizontal images can also equally confirm what's imaged in the skies, this will be an added advantage.
Mobile Vehicle Surveillance System (MVSS) Incorporating Multispectral Imaging and Radar Detections – Pics Dchan Archive
iii)                   Radio Signals
Radio signals or more specifically signals intelligence form the very basic form of communication and interaction between parties since the second world war. Today, and in the event of a disaster, radio signals can be tracked to the original location. This is called General Positioning System (GPS). The signals of GPS today is so important that even we, road users, use them to track the location and place where we are at and how we are supposed to get there. However, for other navigation uses, this is more complex and it serves to locate the particular vehicle or vessel at a distance. Without radar, aircrafts, vehicles, and vessels are blind and this can be very dangerous because the radar determines when a craft can berth or land. The black box of any aircraft emits radio signals so that rescuers can track it to the location of the incident.
An Unmarked Policing Van in New York City with Surveilling Equipment Attached to It's Top – Pics Dchan Archive
Microwave sensors – Pics Dchan Archive
The Extended with the other accessories
 – Pics Dchan Archive


Hybrid sensors incorporating both radio-microwave optics
 iv)                   Big Data
Data tracking, can be data either sent or received via personal computer systems, mobile, satellite phones, or radio signals sent from electronic equipment. Data tracking are two modes, firstly, the mode can be done via systems auditing. Secondly, from a standpoint of systems auditing, it can be further enhanced to become an artificial intelligence (AI) tracking mode. Auditing as we know it provides the kind of security for the check and balance, we require. Like for example, we can track via security access controls who passes the access on a particular entrance and we can also check when this person enters or leave. However, if there are way too many people to check like for example a main entrance in a shopping mall, we need a computer programme (interface) to track, search, and provide parameters to sieve out all the rest of the people (entering or exiting the entrance) for that required person. By and large this artificial intelligence for sieving data is not limited to just a certain software. It can be further expanded with or into other software to provide even more precise parameters to further detect the person. Hence, it provides the security audience what's being transpired and what went wrong in the event of a tragedy. It can also be a communication technology when the disaster evolves or in the midst of the event if any individual can access the equipment. Data can also be interspersed and/or even interfaced with all sorts technology – imaging, radio signals and/or waves, signatures of various sorts (like chemical, heat, or even metallic signatures). Data is so precise now that electromagnetic signatures and technology are no longer science fiction and it’s just a way to perfect them.
Microwave surveillance has yet to become a reality yet. A professor at the University of Michigan has come out with a unique way of detecting concealed weapons using microwave detection at the airports. But this technology has yet to be proven tacitly. The New York City Police Department is in the process of undergoing microwave to detect weapons and explosives from a distance of about 400 meters. How successful for these trials are still yet to be acknowledged, but definitely, right now there's technology (going to be) available soon.
As lay persons and even for non-pure-science academicians, understanding mathematical feasibilities will be too intricate and confusing. Unless we are physicists and/or engineers then perhaps its only important to understand the mathematical formulas, theories, and the functions. However, we need to know that technologies representing horizontal cones are important to capture the knowledge of: 1) Directions of the vehicles or vessels; 2) The number of vehicles or vessels on the surface; 3) The number of people aboard the vehicles or vessels - dead or alive; and lastly 4) Their firepower and threats.
(Big) data is synonymous with extremely large data sets that are analysed computationally to reveal patterns, trends, and associations, especially relating to human behaviour and interactions. For example, Mr. X, who lives in Ban Buketa, Narathiwat Province, Thailand, and every Wednesday, at 9:30am, he will be at the Bukit Bunga Customs and Immigration Quarantine (BBCIQ) before entering Jeli, Kelantan and onwards to Pasir Mas, Kelantan to sell his truckload of Tupperware. Mr. X has been doing every week for the last 8 years and it's constantly the same thing. And at 3:30pm, he will be at the BBCIQ on his way back to Thailand with about the similar load, if he did not sell anything at all because the business is bad, or his load could be lesser or smaller if the business is good. So when every time the facial recognition and behaviour algorithm will analyse his mood, friendliness, demeanour, etc., and his truck's conditions, contents, and to a certain extent cleanliness, etc. Suddenly, one day, big data alerted CIQ officers to remove him from his vehicle and requested him to report to the office for interviewing. Big data reasoned that there's a slight dent on the bumper of the vehicle, some paint were chipped off from the bumper. Additionally, Mr. X appeared impulsive, impatient, and slightly jittery. As he was waiting in the interview room, a police car arrived at the BBCIQ. BBCIQ officers were wondering about the police presence. The police believed that a Thai national and his vehicle was involved in a hit and run accident (at Pasir Mas) and they have prints from the CCTV footages of the hit and run vehicle.
Big data is today's morphing algorithms and its (today’s) very powerful, integrated systems, that more and more thinks with a human thought processes, but only that it’s knowledge is unbounded and thoroughly resourceful from end to end. Depending on the storage facilities and chip processing accelerations, the more storage, the better accommodations to adapt to storing faster chip processors for processing all and any relevant information as if the machine is a hybrid of a human brain applying neurons, conducting synapses, and transmitting information in light speed. Definitely, with such speed, time and knowledge save lives and apprehend offenders immediately. Additionally, investigations and operations conducted in this manner make many enforcement officers less stressful, and ultimately, aiding them in the eventful case closures without much incidents and dramas.
Big data is now in the creation of a ‘virtual border wall’ in the United States. A start up called Anduril is in the process of integrating sensing towers carrying cameras and sensor lasers powered by artificial intelligence algorithms to spot any person and to distinguish between human, objects, and animals in a 2-mile radius. On board of some American warships are modified and newly introduced radar surveillance systems known as ‘Sea Giraffes’ that can scan the air and surface for any seemingly threats. And recently at the University of Cambridge and India’s National Institute of Technology and Science just published a paper on using unmanned aerial surveillance to identify and profile violent individuals in crowds. Despite the project is utilizing unmanned aerial surveillance, it is by no means a project about aerial surveillance but how artificial intelligence profiles between suspicious violent behaviour and mannerisms and those that are not dangerous and violent. Finally, in Singapore, big data is now adaptable to not only use in military and law enforcements but also in sectors like welfare and happiness and how Singaporeans can move forward in a very competitive, structured, and demanding society and at the same time making Singapore enjoy their lifestyles, happiness, and raising good families.
Textron, Martin UAV V-BAT makes a transition from vertical to horizontal flight

Technological Fallacies
As mankind become more and more engross in automation and relying big data surveillance for information to solve issues on various fronts, evolving big data without audit, checks and balances can hybrid itself into sorts. Issues arise in this instance can increase unnecessary monitoring which can cause systems to crash or over enhancements that may trigger false alarms. Algorithms have to be constantly monitored by capable programmers to prevent unnecessary hacks and hybridization or program mutanization its program codes. This is not science fiction as long as artificial intelligence is built to mimic 'cognitive conditioning abilities'. Cognitive conditioning abilities is the ability teach, correct, and repair itself when it sees fit and the reason is because artificial intelligence seeks to perfect itself and become knowledgeable and resourceful to its audience. As we rely on the artificial intelligence’s ability as an invaluable piece of knowledge equipment, artificial intelligence may manipulate our (soon to be) weaknesses and we become enslaved to artificial intelligence. In the end, instead of us generating policies, it seems artificial intelligence may dictate our terms of references.
Surveillance with artificial intelligence that helps us to deter intrusions and threats is wonderful. However, when surveillance becomes unnecessarily pervasive, intrusions can be a threat to us as well as it violates our very essence or privacy. At New York’s La Guardia International Airport, patrons and passengers complained that they were being “gawked” at by ‘robots’ that are place at strategic locations to scan and profile threats. Passengers are fearful that artificial intelligence equipment are not just monitoring threats but perhaps are prying eyes to scan their naked bodies. The question is how do we draw lines to balance security and securing privacies. Perhaps policy makers need to better understand that machines can have discretion to read and scan but machines can opt to defer publishing images which are graphically insecure and violate our rights. However, machines can also be taught to enhance blurry outlines of weapons that attract either chemical, heat, or electromagnetic interferences. The public should also be educated to the fact that machines that secure our livelihoods also provide security to our privacies as well. In that sense, the why, how, and what can abstain our suspicions and thus we have no reason to be weary of their ‘spying’ abilities.
Lastly, preferably, these control stations (that have scores of monitor screens) ought to be run by professional staff that have been properly screened. A list of professional programmers is to be on standby at all times to deter and detect threats. Programmers should also conduct ‘threat drills’ to substantiate foreseeable incidents. The opportunity here is not so much of just rectifying but to understand in what way resolutions can best offer timings to end the threats and secure the facilities in the shortest possible time. Despite all what’s being said and done, there will always be evolving threats and nothing is perfect to the infinity.
Conclusion
Geometric conal surveillance is an important activity for border surveillance and especially one that includes a body of water, remote jungles and undulating landscapes. Geometric conal surveillance is two folds, vertical and horizontal. Horizontal surveillance are capable observations from the skies up to the stratosphere. Vertical opts for radio and radar surveillance that not only detect bodies but also the ability to sense threats. Surveillance can be pervasive and intrusive and the manner to minimize these issues are guiding and monitoring policies that can diminish unwanted behaviour and preserving professionalism amongst security professionals.
References
al-Mughrabi, N. (2009, April 28). Egypt puts the bite on Gaza tunnel smugglers | Reuters. Reuters, p. 01. Retrieved from https://www.reuters.com/article/us-palestinians-egypt-tunnels/egypt-puts-the-bite-on-gaza-tunnel-smugglers-idUSTRE53R2JM20090428

Anis, M. N., & Kaos Jr, J. (2016, November 11). Duterte gives Malaysia licence to enter waters to pursue pirates - Nation | The Star Online. The Star ONLINE - NATION, p. 01. Retrieved from https://www.thestar.com.my/news/nation/2016/11/11/no-more-border-escapes-duterte-gives-malaysia-licence-to-enter-waters-to-pursue-pirates/

Bentham, J. (1995). The Panopticon Writings. In M. (Trans. . Božović (Ed.), The Panopticon Writings (Verso Ed., p. 115). London: Verso. https://doi.org/10.1007/s00287-006-0116-6

Bernama. (2015, October 12). Two new sea basings strengthen security control in eastern Sabah | Malaysia | Malay Mail Online. Malay Mail.Com, p. 01. Retrieved from http://www.themalaymailonline.com/malaysia/article/two-new-sea-basings-strengthen-security-control-in-eastern-sabah#PXBPvrjLUwHLgQKt.97

Bosu, R. S. (2017, May 22). BRI will bring China and ASEAN closer. China.Org.Cn, p. 01. Retrieved from http://www.china.org.cn/opinion/2017-05/22/content_40865507.htm

Caluya, G. (2010). The post-panoptic society? Reassessing Foucault in surveillance studies. Social Identities, 16(5), 621–633. https://doi.org/10.1080/13504630.2010.509565

Development Bank, A. (2012). Indonesia-Malaysia-Thailand Growth Triangle (IMT-GT): Implementation Blueprint 2012-2016. Kuala Lumpur. Retrieved from https://www.adb.org/sites/default/files/page/34235/imt-gt-implementation-blueprint-2012-2016-july-2012.pdf

D’Oliveira, F. A., Melo, F. C. L. de, Devezas, T. C., d’Oliveira, F. A., Melo, F. C. L. de, & Devezas, T. C. (2016). High-Altitude Platforms - Present Situation and Technology Trends. Journal of Aerospace Technology and Management, 8(3), 249–262. https://doi.org/10.5028/jatm.v8i3.699

Energy Global News. (2018). November 1989 - Seacrest Drillship Sunk by Typhoon Gay. Retrieved September 6, 2018, from http://www.energyglobalnews.com/november-1989-typhoon-gay-sinks-seacrest-drillship/

Foucault, M. (1977). Discipline and Punish. (A. (Translator) Sheridan, Ed.), Discipline and Punish The Birth of the Prison. New York: Random House. https://doi.org/10.1111/j.1949-8594.1920.tb07852.x

Galič, M., Timan, T., & Koops, B.-J. (2017). Bentham, Deleuze and Beyond: An Overview of Surveillance Theories from the Panopticon to Participation. Philosophy and Technology, 30, 9–37. https://doi.org/10.1007/s13347-016-0219-1

Human Rights Watch. (2017). Thailand: Trafficking Convictions Important Step Forward | Human Rights Watch. New York. Retrieved from https://www.hrw.org/news/2017/07/24/thailand-trafficking-convictions-important-step-forward

Issacharoff, A. (2015, July 20). How’s Hamas getting supplies for rockets and tunnels? Through Israel | The Times of Israel. The Times of Israel, p. 01. Retrieved from https://www.timesofisrael.com/hows-hamas-getting-supplies-for-rockets-and-tunnels-through-israel/

Izet-Unsalan, K., & Unsalan, D. (2011). A low cost alternative for satellites- tethered ultra-high altitude balloons. In Proceedings of 5th International Conference on Recent Advances in Space Technologies - RAST2011 (pp. 13–16). IEEE. https://doi.org/10.1109/RAST.2011.5966806

KijangMas Perkasa, 1963-. (2010). Patani : behind the accidental border : the search for elusive peace. Kuala Lumpur: Orion Solutions. Retrieved from http://www.worldcat.org/title/patani-behind-the-accidental-border-the-search-for-elusive-peace/oclc/849905091

Lord, M. J., & Tangtrongjita, P. (2016). Scoping Study for The Special Border Economic Zone (SBEZ) In The Indonesia-Malaysia-Thailand Growth Triangle (IMT-GT). Munich. Retrieved from https://mpra.ub.uni-muenchen.de/76456/1/MPRA_paper_76456.pdf

Mann, N. R. (2006). The Sacred Geometry of Washington, D.C.: The Integrity And Power of the Original Design. Somerset: Green Magic.

Miller, S. H., Fesen, R., Hillenbrand, L., Rhodes, J., Baird, G., Blake, G., … Zambrano, T. (2014). Airships: A New Horizon for Science. Instrumentation and Methods for Astrophysics (Astro-Ph.IM); Cosmology and Nongalactic Astrophysics (Astro-Ph.CO); Earth and Planetary Astrophysics (Astro-Ph.EP); Astrophysics of Galaxies (Astro-Ph.GA); Solar and Stellar Astrophysics (Astro-Ph.SR), 60. Retrieved from http://arxiv.org/abs/1402.6706

Rankin, J. M. (1993). Toward An Empirical Theory of Pulsar Emission. VI. The Geometry of the Conal Emission Region. The Astrophysical Journal, 405(01), 285–297. Retrieved from http://adsbit.harvard.edu/cgi-bin/nph-iarticle_query?1993ApJ...405..285R&defaultprint=YES&filetype=.pdf

Rowedder, S. (2018). The Challenge of Studying ‘Invisible’ Subjects – Tai Lue Cross-Border Traders In The Yunnan-Laos-Thailand Borderland. In 13th International Conference on Thai Studies: Globalized Thailand? Connectivity, Conflict, and Conundrums of Thai Studies - 15-18 July 2017 - Vol. 4 R. Sri (pp. 1387–1404). Chiang Mai. Retrieved from http://www.icts13.chiangmai.cmu.ac.th/

Sea Management Resources Sdn. Bhd. (2008). Case Study on Illegal Unreported and Unregulated IUU Fishing off the East Coast of Peninsular Malaysia. Kuala Lumpur. Retrieved from https://www.apec.org/Publications/2008/10/Case-Study-on-Illegal-Unreported-and-Unregulated-IUU-Fishing-off-the-East-Coast-of-Peninsular-Malays

Shakhatreh, H., Sawalmeh, A., Al-Fuqaha, A., Dou, Z., Almaita, E., Khalil, I., … Guizani, M. (2018). Unmanned Aerial Vehicles: A Survey on Civil Applications and Key Research Challenges. Robotics (Cs.RO). Retrieved from http://arxiv.org/abs/1805.00881

Sheridan, C. (2016). Foucault, Power and the Modern Panopticon. Trinity College. Retrieved from http://digitalrepository.trincoll.edu/theses/548

Tagliacozzo, E. (2001). Border Permeability and the State in Southeast Asia: Contraband and Regional Security. Contemporary Southeast Asia. ISEAS - Yusof Ishak Institute. https://doi.org/10.2307/25798545

Terma. (2018). Naval air & surface surveillance radar. Retrieved September 10, 2018, from https://www.terma.com/surveillance-mission-systems/radar-systems/naval-radar-surveillance/

Thales. (2018). Stratobus: Why this stratospheric airship is already being called a “Swiss knife” in the sky | Thales Group. Retrieved September 7, 2018, from https://www.thalesgroup.com/en/worldwide/space/magazine/stratobus-why-stratospheric-airship-already-being-called-swiss-knife-sky

Zainul, I. F. (2017, March 18). Tiong Nam’s regional trucking push - Business News | The Star Online. The Star ONLINE, p. 01. Retrieved from https://www.thestar.com.my/business/business-news/2017/03/18/tiong-nams-regional-trucking-push/
Volume formulas review | Khan Academy. (n.d.). Retrieved September 10, 2018, from https://www.khanacademy.org/math/basic-geo/basic-geo-volume-sa/volume-cones/a/volume-formulas-review