View Single Post
Old 05-15-2006, 07:34 PM   #6 (permalink)
host
Banned
 
I am mulling over changing my TFP I.D. to my real name here, and posting my address, too....just for my own protection. I suspect that the more visible you are, the more the PTB will hesitate to detain you...when their agenda inevitably reaches that stage.........

Okay...here is the model and the explanation....check my links at the bottom.
They started with Kevin Bacon, and I stopped when the links reached Dustin Hoffman.....Just check the interaction list of each actor....and imagine those are the phone numbers that their phone bills reveal that they've called....
Quote:
http://www.slate.com/id/2141801/
explainer
How the NSA Does "Social Network Analysis"
It's like the Kevin Bacon game.
By Alexander Dryer
Posted Monday, May 15, 2006, at 6:33 PM ET

Last Thursday, USA Today reported that the NSA has been collecting the phone records of millions of Americans. The agency is apparently using "data mining" techniques to scour these records for connections between terrorists. According to an intelligence official interviewed by USA Today, the NSA is analyzing this data using "social network analysis." What's social network analysis?

A technique to map and study the relationships between people or groups. The basic concept of the social network is familiar to anyone who has used Friendster or played Six Degrees of Kevin Bacon. Social network analysis formalizes this parlor game, using details about the network to interpret the role of each person or group.

In a basic analysis, people are seen as "nodes" and the relationships between them are "links." By studying the links—in the case of the NSA program, telephone calls—it's possible to determine the importance (or "centrality") of each node.

There are several ways to determine which members of a network are important. The most straightforward technique is to figure out a member's "degree," or the number of direct connections he has to other members of the network. With groups that are decentralized and complex, like terrorist cells, other measures of centrality are important as well. Network analysts also study the "betweenness" and the "closeness" of members. A member with relatively few direct connections could still be important because he serves as a connector between two large groups. A member might also be important because his links, direct and indirect, put him closest to all other members of the group (i.e., he has to go through fewer intermediaries to reach other members than anyone else).

Network analyst Valdis Krebs set out to prove after 9/11 that networks could help uncover terrorist cells. Working from publicly available information, Krebs showed that all 19 hijackers were within two connections of the al-Qaida members the CIA knew about in early 2000. Krebs' network map also showed that Mohamed Atta was a central figure. It's not clear whether such analysis could have been performed in advance, when researchers wouldn't have been certain which links were significant connections to another terrorist and which were casual connections to an acquaintance. (There is also controversy surrounding reports that a U.S. military unit called Able Danger used network analysis to identify Mohamed Atta before 9/11.)

There are two schools of thought on whether large data sets—like the NSA's database of phone records—help or hinder network analysis. One group argues that adding lots of innocuous data (the phone calls of ordinary Americans) will cloud the picture, and that it's better to construct a network by looking only at calls made to and from known terrorists. Another group maintains that large data sets are useful in establishing a "baseline" of normal behavior.

Social network analysis has been used in many areas besides terrorist surveillance. Google's PageRank system is based on network theory and the concept of "centrality." Doctors use network analysis to track the spread of HIV. And some academics have applied network theory to Enron's e-mail records in an attempt to understand relationships within the company.
Quote:
http://www.cs.virginia.edu/oracle/how.html
How the Oracle of Bacon Works
Every couple of weeks the Oracle downloads several database files from one of the Internet Movie Database's FTP sites containing around 800,000 actors and actresses, around 375,000 movies, and around 70,000 aliases. The Oracle builds a big map of actors and movies and stores it in a 60 MB database.

There is a database server running at all times that stores the 60 MB database file in memory. The server handles three different types of requests:

* Find the link from Actor A to Actor B.
* How good a "center" is a given actor?
* Who are all the people with an Actor A number of N?

There are several CGI programs -- one for each of the above types of queries -- that run on the UVA Computer Science department web server, which all connect to the database server using TCP..
<b>Click on the (1) under each actor's name, and the (numbers) link to the right of the name of anyone on each actor's (1) list:</b>
http://www.cs.virginia.edu/cgi-bin/o...ho=Kevin+Bacon

http://www.cs.virginia.edu/cgi-bin/o...nda%2c+Bridget

http://www.cs.virginia.edu/cgi-bin/o...iello%2c+Danny

http://www.cs.virginia.edu/cgi-bin/o...lover%2c+Danny

http://www.cs.virginia.edu/cgi-bin/o...Allen%2c+Woody

http://www.cs.virginia.edu/cgi-bin/o...dman%2c+Nicole

http://www.cs.virginia.edu/cgi-bin/o...=Cruise%2c+Tom

http://www.cs.virginia.edu/cgi-bin/o...fman%2c+Dustin

Last edited by host; 05-15-2006 at 07:37 PM..
host is offline  
 

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360