cc: @DeptofDefense @DHSgov @NSAGov @DARPA @CDCgov @NIH @TheJusticeDept @RepAdamSchiff
Since no one at the @FBI or elsewhere has suggested keeping this quiet, it's worth sharing now.
Does it work?
How well?
Is it practical to employ?
Does it have significant drawbacks?
"Part 1 of 9 - Introduction, Tracking Pasdaran, Russian and other Resources, and Basic Methodology"
Not all of the publicly known avenues of Iranian money laundering will be fully covered in the following."
Yes, the opium trade and any other drugs are a given, but that is already baked into what we are addressing here."
"Let us begin, however, with one significant if specialized sensor which can be used with any existing, unmodified smartphone."
credo.science/credodetector/…
"“In very simplified terms:"
"Consider the work which has already been done with light-ray tracing – classically handled by tracing the paths of millions of light rays - and convolutional neural networks, particular using sparsity."
"The paper featured is "Real-time Global Illumination by Precomputed Local Reconstruction
from Sparse Radiance Probes.""
"Particle scattering, absorption and refraction can be used over time to detect heavily shielded objects and areas potentially designed to block other forms of passive sensing or even active scans."
"“To quote from that 10/29/19 message, where I am in turn quoting from my 10/23/19 transmission:"
"“““Generative adversarial networks are a method of machine learning commonly applied to problems such as enhancing images and detecting deep fakes. Two neural networks challenge each other in a game, each trying to “outwit” the other."
"“““We can also undoubtedly stitch together accurate images of some faces based on different glimpses from different angles, given sufficient data."
<Redacted>
"““Obviously, we could start with a database featuring a combination of video clips and photos of the same subjects."
"“We can, however, further enhance our output by collecting video transmission from multiple sources and knitting them together, whenever we know there is a person of interest to be tracked."
<Redacted>
"“This AI Learned to Isolate Speech Signals"
"Simulating shading and object properties related to illumination normally consume a great deal of processing power."
"Real-Time Polygonal-Light Shading with Linearly Transformed Cosines"
eheitzresearch.wordpress.com/415-2/
cc: @USTreasury
"Another option is a “Sentinel” program to provide location and streaming video in the event of danger."
"I covered this in another article about one aspect of an invention which has since lapsed into public domain."
futureimperative.blogspot.com/2016/06/automa…
"“This oversight method of managing multiple robots can be applied to other services as well."
"Part 5 of 9 - Further Light-Based Applications for Pathogens, Contaminants and Nanophages"
nature.com/articles/srep2…
phys.org/news/2019-03-p…
"Whispering gallery-mode biosensors are worth shouting about"
phys.org/news/2016-09-g…
""Breakthrough in photonic biosensors could lead to super-accurate diagnostic and detectors""
phys.org/news/2018-03-b…
""Arnold and collaborators then devised a way to make these WGM biosensors sensitive enough to identify even the smallest individual bio-particles from the RNA virus MS2 to single molecules down to 6 zepto-grams (10?21 grams), below the mass of all known cancer markers.""
"There are various ways to induce a static charge on particles to help guide them to our microscale sensor arrays."
cs.toronto.edu/~hinton/absps/…
"Part 8 of 9 - Cyberwarfare Data and Unusual Data Sources
"There will be a number of novel sources of relevant data, too many, in fact, to assess properly here."
"“The use of malware on emails and websites is no secret, and allows botnets and hackers access to a host of computers.""
"“You can traces sources, vectors, strategies, tactics, ongoing operations, participants and intentions.”"
"Here is a follow up to the follow up to that message I sent to the FBI on 1/2/19:
"“To whom it may concern:"
<Second and probably far more powerful method of tracking most global malware, redacted>
"Once again, thank you for all that you do."
I apologize for having to redact the most-powerful elements, and for any imperfections.
I do all of this in a very thin sliver of spare time, with no resources.
The unredacted version is less than 12,000 words.
I hope the above overview proves useful.
For those engaged in protecting us all, thank you for all that you do.