|
Mobile Vehicle Surveillance System (MVSS) Incorporating Multispectral
Imaging and Radar Detections – Pics Dchan Archive |
iii)
Radio Signals
Radio
signals or more specifically signals intelligence form the very basic form of
communication and interaction between parties since the second world war.
Today, and in the event of a disaster, radio signals can be tracked to the
original location. This is called General Positioning System (GPS). The signals
of GPS today is so important that even we, road users, use them to track the
location and place where we are at and how we are supposed to get there.
However, for other navigation uses, this is more complex and it serves to
locate the particular vehicle or vessel at a distance. Without radar,
aircrafts, vehicles, and vessels are blind and this can be very dangerous
because the radar determines when a craft can berth or land. The black box of
any aircraft emits radio signals so that rescuers can track it to the location
of the incident.
Data
tracking, can be data either sent or received via personal computer systems, mobile,
satellite phones, or radio signals sent from electronic equipment. Data
tracking are two modes, firstly, the mode can be done via systems auditing.
Secondly, from a standpoint of systems auditing, it can be further enhanced to
become an artificial intelligence (AI) tracking mode. Auditing as we know it
provides the kind of security for the check and balance, we require. Like for
example, we can track via security access controls who passes the access on a
particular entrance and we can also check when this person enters or leave.
However, if there are way too many people to check like for example a main
entrance in a shopping mall, we need a computer programme (interface) to track,
search, and provide parameters to sieve out all the rest of the people
(entering or exiting the entrance) for that required person. By and large this
artificial intelligence for sieving data is not limited to just a certain
software. It can be further expanded with or into other software to provide
even more precise parameters to further detect the person. Hence, it provides
the security audience what's being transpired and what went wrong in the event
of a tragedy. It can also be a communication technology when the disaster
evolves or in the midst of the event if any individual can access the
equipment. Data can also be interspersed and/or even interfaced with all sorts
technology – imaging, radio signals and/or waves, signatures of various sorts
(like chemical, heat, or even metallic signatures). Data is so precise now that
electromagnetic signatures and technology are no longer science fiction and
it’s just a way to perfect them.
Microwave
surveillance has yet to become a reality yet. A professor at the University of Michigan
has come out with a unique way of detecting concealed weapons using microwave
detection at the airports. But this technology has yet to be proven tacitly.
The New York City Police Department is in the process of undergoing microwave
to detect weapons and explosives from a distance of about 400 meters. How
successful for these trials are still yet to be acknowledged, but definitely,
right now there's technology (going to be) available soon.
As lay persons and even for non-pure-science
academicians, understanding mathematical feasibilities will be too intricate
and confusing. Unless we are physicists and/or engineers then perhaps its only
important to understand the mathematical formulas, theories, and the functions.
However, we need to know that technologies representing horizontal cones are
important to capture the knowledge of: 1) Directions of the vehicles or
vessels; 2) The number of vehicles or vessels on the surface; 3) The number of
people aboard the vehicles or vessels - dead or alive; and lastly 4) Their
firepower and threats.
(Big) data is synonymous with extremely large
data sets that are analysed computationally to reveal patterns, trends, and
associations, especially relating to human behaviour and interactions. For
example, Mr. X, who lives in Ban Buketa, Narathiwat Province, Thailand, and
every Wednesday, at 9:30am, he will be at the Bukit Bunga Customs and Immigration
Quarantine (BBCIQ) before entering Jeli, Kelantan and onwards to Pasir Mas,
Kelantan to sell his truckload of Tupperware. Mr. X has been doing every week
for the last 8 years and it's constantly the same thing. And at 3:30pm, he will
be at the BBCIQ on his way back to Thailand with about the similar load, if he
did not sell anything at all because the business is bad, or his load could be
lesser or smaller if the business is good. So when every time the facial
recognition and behaviour algorithm will analyse his mood, friendliness, demeanour,
etc., and his truck's conditions, contents, and to a certain extent
cleanliness, etc. Suddenly, one day, big data alerted CIQ officers to remove
him from his vehicle and requested him to report to the office for interviewing.
Big data reasoned that there's a slight dent on the bumper of the vehicle, some
paint were chipped off from the bumper. Additionally, Mr. X appeared impulsive,
impatient, and slightly jittery. As he was waiting in the interview room, a
police car arrived at the BBCIQ. BBCIQ officers were wondering about the police
presence. The police believed that a Thai national and his vehicle was involved
in a hit and run accident (at Pasir Mas) and they have prints from the CCTV
footages of the hit and run vehicle.
Big data is today's morphing algorithms and its (today’s)
very powerful, integrated systems, that more and more thinks with a human
thought processes, but only that it’s knowledge is unbounded and thoroughly
resourceful from end to end. Depending on the storage facilities and chip
processing accelerations, the more storage, the better accommodations to adapt
to storing faster chip processors for processing all and any relevant
information as if the machine is a hybrid of a human brain applying neurons,
conducting synapses, and transmitting information in light speed. Definitely,
with such speed, time and knowledge save lives and apprehend offenders
immediately. Additionally, investigations and operations conducted in this
manner make many enforcement officers less stressful, and ultimately, aiding
them in the eventful case closures without much incidents and dramas.
Big data is now in the creation of a ‘virtual border
wall’ in the United States. A start up called Anduril is in the process of
integrating sensing towers carrying cameras and sensor lasers powered by
artificial intelligence algorithms to spot any person and to distinguish
between human, objects, and animals in a 2-mile radius. On board of some
American warships are modified and newly introduced radar surveillance systems
known as ‘Sea Giraffes’ that can scan the air and surface for any seemingly
threats. And recently at the University of Cambridge and India’s National
Institute of Technology and Science just published a paper on using unmanned
aerial surveillance to identify and profile violent individuals in crowds.
Despite the project is utilizing unmanned aerial surveillance, it is by no
means a project about aerial surveillance but how artificial intelligence
profiles between suspicious violent behaviour and mannerisms and those that are
not dangerous and violent. Finally, in Singapore, big data is now adaptable to
not only use in military and law enforcements but also in sectors like welfare
and happiness and how Singaporeans can move forward in a very competitive,
structured, and demanding society and at the same time making Singapore enjoy
their lifestyles, happiness, and raising good families.
Textron, Martin UAV V-BAT makes a transition from vertical to horizontal flight
Technological Fallacies
As mankind become more and more engross in automation
and relying big data surveillance for information to solve issues on various
fronts, evolving big data without audit, checks and balances can hybrid itself
into sorts. Issues arise in this instance can increase unnecessary monitoring
which can cause systems to crash or over enhancements that may trigger false
alarms. Algorithms have to be constantly monitored by capable programmers to
prevent unnecessary hacks and hybridization or program mutanization its program
codes. This is not science fiction as long as artificial intelligence is built
to mimic 'cognitive conditioning abilities'. Cognitive conditioning abilities
is the ability teach, correct, and repair itself when it sees fit and the
reason is because artificial intelligence seeks to perfect itself and become
knowledgeable and resourceful to its audience. As we rely on the artificial
intelligence’s ability as an invaluable piece of knowledge equipment,
artificial intelligence may manipulate our (soon to be) weaknesses and we
become enslaved to artificial intelligence. In the end, instead of us
generating policies, it seems artificial intelligence may dictate our terms of
references.
Surveillance with artificial intelligence that helps
us to deter intrusions and threats is wonderful. However, when surveillance
becomes unnecessarily pervasive, intrusions can be a threat to us as well as it
violates our very essence or privacy. At New York’s La Guardia International
Airport, patrons and passengers complained that they were being “gawked” at by
‘robots’ that are place at strategic locations to scan and profile threats. Passengers
are fearful that artificial intelligence equipment are not just monitoring
threats but perhaps are prying eyes to scan their naked bodies. The question is
how do we draw lines to balance security and securing privacies. Perhaps policy
makers need to better understand that machines can have discretion to read
and scan but machines can opt to defer publishing images which are graphically
insecure and violate our rights. However, machines can also be taught to
enhance blurry outlines of weapons that attract either chemical, heat, or
electromagnetic interferences. The public should also be educated to the fact
that machines that secure our livelihoods also provide security to our
privacies as well. In that sense, the why, how, and what can abstain our
suspicions and thus we have no reason to be weary of their ‘spying’ abilities.
Lastly, preferably, these control stations (that have
scores of monitor screens) ought to be run by professional staff that have been
properly screened. A list of professional programmers is to be on standby at
all times to deter and detect threats. Programmers should also conduct ‘threat
drills’ to substantiate foreseeable incidents. The opportunity here is not so
much of just rectifying but to understand in what way resolutions can best
offer timings to end the threats and secure the facilities in the shortest
possible time. Despite all what’s being said and done, there will always be
evolving threats and nothing is perfect to the infinity.
Conclusion
Geometric conal surveillance is an important activity
for border surveillance and especially one that includes a body of water,
remote jungles and undulating landscapes. Geometric conal surveillance is two
folds, vertical and horizontal. Horizontal surveillance are capable
observations from the skies up to the stratosphere. Vertical opts for radio and
radar surveillance that not only detect bodies but also the ability to sense
threats. Surveillance can be pervasive and intrusive and the manner to minimize
these issues are guiding and monitoring policies that can diminish unwanted behaviour
and preserving professionalism amongst security professionals.
References
al-Mughrabi,
N. (2009, April 28). Egypt puts the bite on Gaza tunnel smugglers | Reuters. Reuters,
p. 01. Retrieved from
https://www.reuters.com/article/us-palestinians-egypt-tunnels/egypt-puts-the-bite-on-gaza-tunnel-smugglers-idUSTRE53R2JM20090428
Anis, M. N.,
& Kaos Jr, J. (2016, November 11). Duterte gives Malaysia licence to enter
waters to pursue pirates - Nation | The Star Online. The Star ONLINE -
NATION, p. 01. Retrieved from
https://www.thestar.com.my/news/nation/2016/11/11/no-more-border-escapes-duterte-gives-malaysia-licence-to-enter-waters-to-pursue-pirates/
Bentham, J.
(1995). The Panopticon Writings. In M. (Trans. . Božović (Ed.), The
Panopticon Writings (Verso Ed., p. 115). London: Verso.
https://doi.org/10.1007/s00287-006-0116-6
Bernama.
(2015, October 12). Two new sea basings strengthen security control in eastern
Sabah | Malaysia | Malay Mail Online. Malay Mail.Com, p. 01. Retrieved
from
http://www.themalaymailonline.com/malaysia/article/two-new-sea-basings-strengthen-security-control-in-eastern-sabah#PXBPvrjLUwHLgQKt.97
Bosu, R. S.
(2017, May 22). BRI will bring China and ASEAN closer. China.Org.Cn, p.
01. Retrieved from
http://www.china.org.cn/opinion/2017-05/22/content_40865507.htm
Caluya, G.
(2010). The post-panoptic society? Reassessing Foucault in surveillance
studies. Social Identities, 16(5), 621–633.
https://doi.org/10.1080/13504630.2010.509565
Development
Bank, A. (2012). Indonesia-Malaysia-Thailand Growth Triangle (IMT-GT):
Implementation Blueprint 2012-2016. Kuala Lumpur. Retrieved from
https://www.adb.org/sites/default/files/page/34235/imt-gt-implementation-blueprint-2012-2016-july-2012.pdf
D’Oliveira,
F. A., Melo, F. C. L. de, Devezas, T. C., d’Oliveira, F. A., Melo, F. C. L. de,
& Devezas, T. C. (2016). High-Altitude Platforms - Present Situation and
Technology Trends. Journal of Aerospace Technology and Management, 8(3),
249–262. https://doi.org/10.5028/jatm.v8i3.699
Energy
Global News. (2018). November 1989 - Seacrest Drillship Sunk by Typhoon Gay.
Retrieved September 6, 2018, from
http://www.energyglobalnews.com/november-1989-typhoon-gay-sinks-seacrest-drillship/
Foucault, M.
(1977). Discipline and Punish. (A. (Translator) Sheridan, Ed.), Discipline
and Punish The Birth of the Prison. New York: Random House.
https://doi.org/10.1111/j.1949-8594.1920.tb07852.x
Galič, M.,
Timan, T., & Koops, B.-J. (2017). Bentham, Deleuze and Beyond: An Overview
of Surveillance Theories from the Panopticon to Participation. Philosophy
and Technology, 30, 9–37. https://doi.org/10.1007/s13347-016-0219-1
Human Rights
Watch. (2017). Thailand: Trafficking Convictions Important Step Forward |
Human Rights Watch. New York. Retrieved from
https://www.hrw.org/news/2017/07/24/thailand-trafficking-convictions-important-step-forward
Issacharoff,
A. (2015, July 20). How’s Hamas getting supplies for rockets and tunnels?
Through Israel | The Times of Israel. The Times of Israel, p. 01.
Retrieved from
https://www.timesofisrael.com/hows-hamas-getting-supplies-for-rockets-and-tunnels-through-israel/
Izet-Unsalan,
K., & Unsalan, D. (2011). A low cost alternative for satellites- tethered
ultra-high altitude balloons. In Proceedings of 5th International Conference
on Recent Advances in Space Technologies - RAST2011 (pp. 13–16). IEEE.
https://doi.org/10.1109/RAST.2011.5966806
KijangMas
Perkasa, 1963-. (2010). Patani : behind the accidental border : the search
for elusive peace. Kuala Lumpur: Orion Solutions. Retrieved from
http://www.worldcat.org/title/patani-behind-the-accidental-border-the-search-for-elusive-peace/oclc/849905091
Lord, M. J.,
& Tangtrongjita, P. (2016). Scoping Study for The Special Border
Economic Zone (SBEZ) In The Indonesia-Malaysia-Thailand Growth Triangle
(IMT-GT). Munich. Retrieved from
https://mpra.ub.uni-muenchen.de/76456/1/MPRA_paper_76456.pdf
Mann, N. R.
(2006). The Sacred Geometry of Washington, D.C.: The Integrity And Power of
the Original Design. Somerset: Green Magic.
Miller, S.
H., Fesen, R., Hillenbrand, L., Rhodes, J., Baird, G., Blake, G., … Zambrano,
T. (2014). Airships: A New Horizon for Science. Instrumentation and Methods
for Astrophysics (Astro-Ph.IM); Cosmology and Nongalactic Astrophysics
(Astro-Ph.CO); Earth and Planetary Astrophysics (Astro-Ph.EP); Astrophysics of
Galaxies (Astro-Ph.GA); Solar and Stellar Astrophysics (Astro-Ph.SR), 60.
Retrieved from http://arxiv.org/abs/1402.6706
Rankin, J.
M. (1993). Toward An Empirical Theory of Pulsar Emission. VI. The Geometry of
the Conal Emission Region. The Astrophysical Journal, 405(01),
285–297. Retrieved from
http://adsbit.harvard.edu/cgi-bin/nph-iarticle_query?1993ApJ...405..285R&defaultprint=YES&filetype=.pdf
Rowedder, S.
(2018). The Challenge of Studying ‘Invisible’ Subjects – Tai Lue Cross-Border
Traders In The Yunnan-Laos-Thailand Borderland. In 13th International
Conference on Thai Studies: Globalized Thailand? Connectivity, Conflict, and
Conundrums of Thai Studies - 15-18 July 2017 - Vol. 4 R. Sri (pp.
1387–1404). Chiang Mai. Retrieved from http://www.icts13.chiangmai.cmu.ac.th/
Sea
Management Resources Sdn. Bhd. (2008). Case Study on Illegal Unreported and
Unregulated IUU Fishing off the East Coast of Peninsular Malaysia. Kuala
Lumpur. Retrieved from
https://www.apec.org/Publications/2008/10/Case-Study-on-Illegal-Unreported-and-Unregulated-IUU-Fishing-off-the-East-Coast-of-Peninsular-Malays
Shakhatreh,
H., Sawalmeh, A., Al-Fuqaha, A., Dou, Z., Almaita, E., Khalil, I., … Guizani,
M. (2018). Unmanned Aerial Vehicles: A Survey on Civil Applications and Key
Research Challenges. Robotics (Cs.RO). Retrieved from
http://arxiv.org/abs/1805.00881
Sheridan, C.
(2016). Foucault, Power and the Modern Panopticon. Trinity College.
Retrieved from http://digitalrepository.trincoll.edu/theses/548
Tagliacozzo,
E. (2001). Border Permeability and the State in Southeast Asia: Contraband and
Regional Security. Contemporary Southeast Asia. ISEAS - Yusof Ishak
Institute. https://doi.org/10.2307/25798545
Terma.
(2018). Naval air & surface surveillance radar. Retrieved September 10,
2018, from
https://www.terma.com/surveillance-mission-systems/radar-systems/naval-radar-surveillance/
Thales. (2018).
Stratobus: Why this stratospheric airship is already being called a “Swiss
knife” in the sky | Thales Group. Retrieved September 7, 2018, from
https://www.thalesgroup.com/en/worldwide/space/magazine/stratobus-why-stratospheric-airship-already-being-called-swiss-knife-sky
Zainul, I.
F. (2017, March 18). Tiong Nam’s regional trucking push - Business News | The
Star Online. The Star ONLINE, p. 01. Retrieved from
https://www.thestar.com.my/business/business-news/2017/03/18/tiong-nams-regional-trucking-push/
Volume
formulas review | Khan Academy. (n.d.). Retrieved September 10, 2018, from
https://www.khanacademy.org/math/basic-geo/basic-geo-volume-sa/volume-cones/a/volume-formulas-review