I)MISSION
EXECUTIVE SUMMARY
Structure and purpose of the program
Our society is organized exclusively as a non-profit trade association for scientific research development, and educational purposes, and is intended to improve the overall conditions of public and private institutional security in the free world through the advancement of education, science and technology; and the setting of global standards through emerging new engineering discoveries and technologies.
Our non-profit corporation is organized specifically for the purpose of soliciting and receiving funds to be used in support of its various educational programs, services and activities; and for the express purpose of expending such funds in the development, administration and presentation of non-competitive cooperative international research programs and development initiatives which address the key concerns and contemporary challenges facing public agencies and commercial corporations involved in the fields of energy, security, information and communications, and related industries.
OBJECTIVE
Our primary objective is to unite Scientists, Engineers, Educators, Media Representative, Police Agencies and Institutional Security Experts together to create and implement a new secure internet communications protocol that will eventually work through one or more newly proposed space satellite based internet links scheduled to be in place by the year 2020.
This united effort will be dedicated to the cooperative development of a set of international standards for satellite based transparent interactive communications which are accountable and secure.
For local management beneficiaries our society intends on hiring local talent to manage the offices of our world headquarters located near the border in the North-western section of North America. Several regional enterprises will also benefit from the successful negotiations of internationally funded trade and manufacturing contracts based on the results of our efforts to promote a new communications protocol that we have named:
"The ASERT Communications Protocol" .
The ASERT institutional communications security protocol
The common uniting purpose of our organization is the "protocol itself" which we are attempting to establish as a NEW international security standard for public service communications and to assist the implementation of "homeland security".
This new protocol will resolve several institutional security concerns which are now under analysis by governments in North America and all over the world. The Protocol we are proposing will promote the creation of a vast intelligent supercomputer IP network to visualize, capture, archive and analyze certain "trigger events" by way of multiple linked general artificial intelligence.
Two master computer processor "twins" named "Bob and Alice" will understand, and monitor the activities in several selected sectors (conceivably the system could be eventually covering the complete surface of the earth). This set of twin supercomputers will control, hold and process vast amounts of information in its own matrix interlaced three dimensional memory. This system will perform all communication IP routing in a natural, wholistic and transparent fashion in harmony with global consciousness. We wish to promote the concept of “semi-Transparent Communications”.
In a most liberal way, anyone on earth near any television or telephone would be able to view or hear the live events being processed by “source-processed” artificial intelligence. This will be accomplished by way of a new generation internet protocol we have called “ASERT”. The operation system is based on a LINUX platform. Because the system itself operates on a source-based artificial intelligence, The on-site sensory input will seek out and detect the presence of "trigger events" and relay information by priority through a “role-based” distribution procedure.
These trigger events would have increasing levels of urgencies and will follow the standard homeland security color scheme.
The most important and least likely trigger events would involve issues such as "Nuclear Radiation" detection emergencies, or "Biowarfare Weapon" detection emergencies. The least important and most likely events would involve issues regarding pending physical violence.
Degrees of emergency are processed according to judicially established standards of judgement.
The routing of “local time live events” are routed using the aforementioned “role based” distribution priority. On-site sensors with built-in general artificial intelligence are the ideal tools for controlling packet IP routing. Part of the sensors integrate their own artificial intelligence which are influenced and controlled by active pixel processing using an advanced Walsh function processing system.
Active pixel facial recognition helps to process “Less critical” trigger events and would be processed to include such events as armed violence against persons or institutional law enforcement.
The on-site routed trigger events are "archived securely" and processed further by the twin supercomputers which also performs "automated priority triage" on all degree of events and directs all the correct resources necessary to treat or resolve the trigger events.
Three secondary processes are then performed called:
- "biometric recognition”
- "Innocence filtering" (the definition of semi-transparency)
- "ASERTED media distribution"
The logic processing functions are performed by the networked integrated general artificial intelligence. These secondary features are also part of the protocol and will be explained in detail in separate comprehensive project proposals.
The ASERT protocol will function by using an internationally coordinated and highly complex communications hardware network using interactively linked remote sensors which communicate in real time with several satellites orbiting above the earth. The communication link itself is a revolutionary system.
Some of these remote sensors will be "bug sized" devices which have audio, video, and specialized nanotechnology based chemical "data sensors" on them
Other such remote sensors are devices which look exactly like "Police badges" but are equipped with Audio, video and other special sensing systems.
More detail on the "ASERTED devices" (remote sensors) is provided further on in our comprehensive project proposals.
We anticipate that our system protocol will be adopted by it's beneficiaries (described herein) and standardized by the year 2010. We estimate that the actual hardware needed to support the protocol will be developed between the years 2006 and 2008, and by the year 2010, -the whole system network should be completely operational.
Other entities are proceeding with their own version of this network now, however they are private corporate entities:
Our hope is to operate an open system architecture working in Java Script on the internet.
The four main purposes to our Association:
A) Solicit funds, and facilitate hardware and software development contract associations between international society members in good standing
B) Direct investment towards Research and develop for new practical "transparent security technologies" using advanced scientific concepts discovered through mutual cooperation, government sponsored technology transfers, and privately negotiated intellectual property transfers.
C) Educate prospective new talent, students and associates in the advanced technologies under development by our society members.
D) Present important and entertaining bimonthly seminars and presentations to the public in general. Specific and comprehensive interactive educational will be supplied on a fee based high speed internet connection through a Microsoft Meeting enabled website . These presentations are offered more specifically to the registered members of our society.
A) History of the project
The INTERNET and it's newly discovered problem areas.
The Internet is now an important and necessary aspect of modern society and several new problems have been discovered in this new communications medium. Recently, it was discovered that the internet was being used for several nefarious activities:
-The Internet has been used by Terrorists to send messages to each other in preparation for terrorist acts.
-The Internet is also being used by Pedophiles to seduce young children who are then kidnapped and abused.
-The Internet is being used to send bogus and defamatory information which results in influencing the values of stock prices, and damaging the reputations of corporations and individual citizens.
-The Internet is being used to promote "virtual kiddy porn" (very real looking animated toddlers being sexual exploited by adults).
-The Internet is being used by Organized crime to coordinate criminal activities all over the world.
All of these newly emerging problems are the result of our society's "promiscuous exploitation" of the INTERNET. Several solutions have been proposed to help solve some of these problems, however most solutions are centered on selective censorship and filtering techniques, most of which are actively being challenged on the grounds of "freedom of speech".
Spy Cameras Everywhere
Nowadays there is an increasing public concern for the presence of "big Brother" spies using hidden video cameras. Many individuals and organizations are concerned with the perceived continuing loss of privacy due to the presence of visible video cameras everywhere.
A black and white television camera small enough to fit in a medium sized pill bottle is now being sold for under $20.00. Thousands of them are selling every week all over North America. The public's fear of a complete loss of privacy is not without foundation. The question is whom is watching all those cameras?.
The answer is that almost 95% of the images seen by these cameras are never seen by human eyes. They are simply recorded on video tape, stored on digital media, or in some cases, occasionally watched intensively by security guards who believe they are watching a possible criminal activity. The increasing abuse of video camera usage is one of the most important new problem.
There are now reports of tiny hidden cameras mounted inside the toilet bowls of female washrooms. These hidden cameras were subsequently found to be connected to clandestine websites that electronic peeping toms casually visit.
Falsified Video and Special effects
Although it is a known fact that more and more police and security agencies are embracing the video camera as an ally in the fight against crime, it is becoming increasingly clear that the technology itself deserves closer scrutiny.
The potential for misuse of video technology far outweighs any benefits it now offers and we must be prepared to deal with the unethical use of video evidence. More specifically, - the future problem activity called "Fabricated Video Evidence". (FVE)
Our research indicates that the potential for composing false video evidence exists NOW. The technique is called "morphing" and it is now available to any computer user that has a sophisticated video capture system. After researching this area of technology for four years, we have been able to confirm the following information: It is now completely possible for a video expert to take amateur video recordings of a scenario in which the subjects are either verbally discussing a subject matter, or performing simple tasks, and to merge the events electronically to portray the participants in a completely different activity or discussion
.(As recorded using the NTSC standard video signal)
The difficulty of this task is limited only by the financial resources available to perform the task, and the technical limitations of the fabrication itself. Admittedly this type of fabrication would not be a very prolific activity due to the nature of the costs, or the amount of people involved. "The preponderance of a successful deception" -is the only possible reason for which the fabrication
would become feasible. The actual period in which the modification of events takes place may involve less than five seconds. The cost for producing a "video only" segment of this type is approximated between $75,000 to $100,000. Presently the approximate cost of recreating five to six seconds of audio to perfection is between $25,000 and $100,000. The process is so good that well known celebrities are now concerned with the possibility that their trademark voices can and will be duplicated by industry specialists seeking to do away with paying the traditional fees for celebrity "voice overs". Due to the increasing accuracy of audio sampling, and the addition of long term computerized speech analysis, the creation of synthetic speech -at will, and with the exact same components of someone's "speech mannerism", is now possible.
Video Evidence as used by Police
Whenever any new technologies are introduced in our legal system, we should anticipate that all of the possible problems associated with the technology can be overcome through careful planning, and foresight. In the case of video evidence, special procedures have been developed to secure footage once recorded in the field.
These procedures include non-rewinding video cartridge and digital dvd memory storage that require specialized computer video capture cards along with existing VCR based systems. The combined system to digitally rewind the evidence footage. Also written handling procedures have been developed for accounting storing and locking existing digital video and other tape footage. Of course it is assumed that the officers responsible for implementing these new procedures shall act responsibly. Sealed and locked physical evidence has disappeared or been lost in numerous cases in the past. The same could be suffered of video evidence in the future.
If a patrolman is given the authority to control the recorded events him or herself, can we assume that the patrolman will enter each incident in evidence voluntarily, or will there be cause to lock out the individual patrolman?
If a patrolman fails for any reason to turn the recording system on in one or more incidents, are we to assume that the patrolman is deliberately doing so because of a possible conflict in procedure regarding one or more of his traffic stops? These and other questions regarding the use of video evidence have yet to be resolved.
We have a solution called an ASERT SHIELD, wristwatch tricorder, and earpeice bluetooth receiver.
The devices are all linked to the Q-network Satellite constallation :
And it is made to function back-compatible with all existing security technology by use of The Q-network Satellite Constallation. For more info please see:
http://www.psychopropulseur.com/time_space.html
IV) Law Enforcement Communications interoperability
There are more than 17,000 law enforcement agencies in the United States alone. Approximately 95% of these agencies employ fewer than 100 sworn officers. Additionally, over 35,000 fire and emergency medical agencies exist across the United States.
Due to the fragmented nature of this community, most public safety communications systems are isolated systems that do not facilitate interoperability. To further complicate the situation, public safety radio frequencies are distributed across four isolated frequency bands from low band VHF (25 MHz to 50 MHz) to 800 MHz (806 MHz to 869 MHz), with no universally available or affordable radio being able to operate across the entire range.
Canada's law enforcement community functions under near identical frequency distributions and equipment standards. The United States Law Enforcement and Corrections Technology Advisory Council (LECTAC), which provides advice and guidance to NIJ (National Institute of Justice) and its National Law Enforcement and Corrections Technology Centers (NLECTC),
has been analyzing public safety communications in the past few years and they have consistently identified "information sharing" and "communications interoperability" as a top priority for future development in public safety communications equipment.
Our society intends to work closely with LECTAC and it's Canadian counterpart; the Canadian Public Safety Information Network,(CPSIN) to introduce a new public safety communications protocol which will be accepted and used throughout North America. Our protocol will achieve the desired interoperability on an international level and it will be as economical to use as existing two way radio systems.
The birth of "Police Videos"
In 1988 the United States "Georgia State Patrol" began a test program that would soon turn into a nationwide practice. The idea was quite simple, -mount a commercial camcorder inside a patrol vehicle and point it towards the front of the patrol vehicle. whenever the patrolman stopped a vehicle, he would turn the recorder on, don a wireless microphone, and proceed with his questioning of the vehicle's occupants.
in some cases the occupants of the vehicles were very drunk and the footage showed them stumbling out of their vehicle. The footage captured by hundreds of hours of police chases, and arrests proved to be dramatically effective in explaining the exact circumstances surrounding any incidences where these camecorders were used. In fact, this type of system has increasingly becoming effective in prosecuting drunk drivers and other suspects who would normally have used numerous defense tactics had they not heard of the existence of a video tape that showed quite plainly what happened in the circumstances under question.
The criminal incident reporting process appears to function more efficiently because suspects are no longer capable of introducing doubt regarding the arresting officer's actions or mannerisms. When criminals notice that there is a potential for everyone to see their actions on television, some of them immediately realize that they cannot cause further conflict against the authorities without incriminating themselves on a recorded media. They loose their sense of acrimony, and the constant degradating psychological attack imposed by offenders upon our police officers is lessened to a degree. This is due to the fact that a legal confrontation is no longer a subjective experience between the officer and the individuals under scrutiny. With the video camera in use, the confrontation now occurs between the suspect and the whole legal system. Other problems such as: the misidentification of suspects, possible nefarious activities on the part of a patrolman, the resolution of conflicting statements, falsification of reports, etc, are all quite resolvable with the selected use of accountable electronic "event recording" A new product was developed by SEMCO corporation in the United States It's called COPCAM™ and it operates using NTSC video standards which is destined to become obsolete within several years.
The PINS/ISSP society wishes to introduce a standardized protocol that defines a new method by which "video event recording" and "archiving" can be accomplished using an Internet based system. The development and integration of a new protocol for use in future public safety communication and information processing is the main reason that we have decide to create the program.
Protected Media and Intellectual property
The media industry is undergoing a fundamental transformation as a result of digital media delivery mechanisms and the impact of the Internet. Consumers want easy access to content. Content owners want effective protection from piracy. Industry experts claim that new business models are needed, and new devices, such as wireless music players, need to be supported. The industry efforts to date have concentrated on developing systems to secure content from its initial distribution through the delivery and consumption chain. These efforts are generally unable to provide protection when content is delivered "in the clear" to consumer receiver systems. One such example is the protection of terrestrial digital broadcast that is delivered "in the clear." Many companies have been actively participating in the "Broadcast Protection Discussion Group" (BPDG). Significant progress has been made towards a technical solution that would involve a "broadcast flag" to signal that redistribution of digital broadcast content over the Internet is not authorized. Media giants acknowledge that -in order to ensure that detection of and proper response to such a broadcast flag occurs in digital broadcast receiver products, some narrowly focused government regulation will be necessary. Such government intervention and regulation is being resisted by several organizations such as the "Electronic Frontier Foundation" and the ACLU. Perhaps there is another solution to these problems, -a solution based on accountability and transparency rather than censorship and filtering technology. Our non-profit society wishes to introduce an alternative method of resolving many of these problem issues. Our method simply identifies the proprietary content of digital broadcast through automated detection of the broadcast flag itself by way of artificial intelligence. Whenever and wherever proprietary media content is detected by any of the ASERT protocol supported devices, information regarding the location and time of the illegally distributed media is immediately sent to enforcement representatives who may then elect to investigate why and how the illegal distribution is occurring. If repeated incidences continue to occur within a specific physical area under watch, Law enforcement authorities would have a strong motivation for conducting a criminal investigation. This would resolve the issue regarding the logistics of disabling consumer equipment attempting to display the protected media content.
Former Vice President Gore’s 1997 report, Access America: Reengineering Through Information Technology, outlined his vision of delivering government services electronically . The report contained 18 major proposals to make government work better and cost less by reengineering information technology. These proposals addressed a range of areas, including tax filing, export assistance, e-commerce and electronic benefits transfers, as well as public safety and criminal justice.
In particular, Chapter A07 of that report, (which addresses the information technology needs of the nation’s criminal justice community), identifies the creation of a “Global Justice Information Network” as a critical information-sharing need of the entire justice community. The Global Justice Information
Network initiative resulting from the "Access America" report envisions safer communities through cooperative and collaborative efforts to ensure that vital information is readily available to all members of the justice community as they perform their critical duties. As the report states, “A Global Criminal Justice Information Network … would allow the criminal justice community to immediately share comprehensive case management, incident, and investigative data across local, regional, state, national, and international boundaries. Quick and easy access to law enforcement incident and arrest records would assist all components of the criminal justice community in apprehending, charging, prosecuting, and convicting criminals.” This process is EXACTLY what the ASERT protocol hopes to acheive. We are presenting our solution to Mr. Gore's challenge.
V) Semi-Transparency, Members, And beneficiaries
Communications, Accountability, Transparency and the Internet.
The Law Enforcement community is presently planning to integrate their own communication links to the internet because the internet is the only existing system which is capable of providing the most immediate cost effective and reliable method of transferring, archiving and processing any audio, video and data formats presently being used by our law enforcement institutions. The internet is also be capable of linking several agencies together and coordinate inter-agency communications and resources. The eventual integration of all television, computer and communications mediums into a single network is inevitable because of the obvious benefits of having virtually any type of important timely information at the fingertips of the end users.
What is also inevitable are the potential problems caused by disinformation, computer network hacking, and all of the other problems already mentioned above.
In 1988 our president and founder began to contemplate a solution to many of these futuristic challenges and potential problems. A solution was devised and named the "Approved Special Evidence Technique"(ASERT) . On November 25 1991 a letter was sent to doctor R. Rau of the United States Department of Justice, Office of Justice Programs (OJP). The letter provided an explanation the ASERT concept. In this letter, several institutional communication issues were discussed and presented. All of the previously mentioned problems were analyzed and resolved favorably through the use of an enhanced and secured internet communications link. A special standardized ASERT protocol was born. The issues of reliability and accountability could be finally resolved through the use of a
"Transparent Security"* network using the ASERT protocol. The PINS/ISSP entity is a program that seeks to promote the adoption of the ASERT PROTOCOL by public institutions all over North America. Our program wishes to set an international standard for a new internet based "secure and accountable institutional communications system" for use by public safety and security agencies in United States and Canada and eventually all over the world. These public agencies and institutions will be participating in our program by delegating one or more of their officials to become members of our society.
* a description of security issues based on a book by David Brin called "
the transparent society"
Description of the targeted beneficiaries
In general, society itself will benefit from the resolution of future communication problems and issues. Our specific targeted Institutional beneficiaries include: components of the law enforcement, judicial branches, and industrial security branches of civilian security in any free nation. The only military members we are targeting are members of the Society of Old Crows. Other civilian branches of governments will also benefit from the network and it's capabilities.
One of the most important beneficiaries of our program will be the Major Media, network news, and the new Internet multimedia news outlets which will take the opportunity to downward and use our "AGI"(artificial General Intelligence) filtered information from in the new semi-transparent security network. (nicknamed it the Q network or the Q consortium)
The "processed footage" that news networks will be capable of downloading from the Q network will resemble the material now being used by "America's Most Wanted" television program or the program "COPS". The "AGI" program will be used to blur the faces of the innocent people who are caught on the footage of the materials used by the news media representatives. this filtering process is known as the "innocence filtering process" and will be an integrated part of the network operating protocol being proposed.
(THIS "innocence filtering process" is the definition of "semi-transparency" and the "privacy issues" are decided by Human interface in a sort-of "grand jury" style structure)
Benefits of membership
To participate in our program and benefit from the new ASERT communications protocol, beneficiaries will be required to delegate senior representatives to become members of PINS/ISSP. Although the Protocol software itself may, or may not be distributed as FREEWARE, however no royalty fees will be paid by any of the beneficiaries, the senior members of our society will make up the executive structure of the society and will decide together on all issues and goals under consideration. In effect, the combined membership will own the exclusive rights to use the ASERT protocol.
There are several levels (or classes) of membership to our society and each has it's advantages and costs as well as membership fees. These membership issues include the following specific categories of responsibility which are presented in their order of privileges:
A) --Senior members (Network Privileges)
Senior members (Gold Membership) will provide binding arbitration and final judgment on issues that the voting membership at large is unable to resolve through proper and appropriate board or committee function, or balloting, due to a split vote. Senior members will also have direct access to first level network operations and will benefit from the advanced programming processes of two computer communications networks named Bob and Alice. Senior membership fees and Associate membership fees will help pay for scholarship funds to educate bright young talent wishing to become participants in the development of the Q network (Bob and Alice) hardware design teams
B) (Management Privileges)
Directors will vote on all society policy as described in our charter, however the directors will vote on executive policy issues which exclude all other members except senior level members who are summoned to decide on a split vote.
C)Associate members
(Protocol development privileges)Associate members (SILVER membership) have no "executive policy issue voting privileges", however they will be responsible for creating, implementing, and voting on the actual technical specifications which makes up the ASERT protocol. Associates will also be the only members capable of receiving investment funding from the Society Trust Fund.
D) Student members (Education privileges)
Student members (Bronze membership) will accumulate enough experience to vote as "associate members" issues after they have completed the "Strategic Communications Seminar Basic Course" curriculum as described in the PINS/ISSP training academy syllabus.
E)(Participation privileges)
SUBSCRIBERS will vote on a variety society policies depending upon which committee they elect to participate in .
Members who are considered to be in good standing will have certain membership rights and privileges up to and including the right to vote and participate in technical issues and corporate direction, through one or more of the following means:
a) Advisory boards and committees which may be established from time to time by the Board of Directors, or through direction of the Board of Directors.
b) The Executive Advisory Committee (Senior Member Level) under its own advisement or that of the Board of Directors.
c) Membership meetings which may be held from time to time in Osoyoos Canada or the San Francisco Bay Area.
d) or by electronic mail, or by a secure electronic voting means.
Members will have different voting privileges and may be categorized under more than one class at the same time. (for example: Senior and Associate member ) Some members will vote only on "corporate financial issues", whereas some members will vote only on "corporate policy issues" depending upon the committee structures which are subsequently developed by the directing members of our society. Associate members will create the actual technical standards of the ASERT protocol and they will vote on such issues as appropriate to the technical capacities of the protocol itself. Voting shall be shall be accomplished by one of the means stated in our corporate charter.