I am mulling over changing my TFP I.D. to my real name here, and posting my address, too....just for my own protection. I suspect that the more visible you are, the more the PTB will hesitate to detain you...when their agenda inevitably reaches that stage.........
Okay...here is the model and the explanation....check my links at the bottom.
They started with Kevin Bacon, and I stopped when the links reached Dustin Hoffman.....Just check the interaction list of each actor....and imagine those are the phone numbers that their phone bills reveal that they've called....
Quote:
http://www.slate.com/id/2141801/
explainer
How the NSA Does "Social Network Analysis"
It's like the Kevin Bacon game.
By Alexander Dryer
Posted Monday, May 15, 2006, at 6:33 PM ET
Last Thursday, USA Today reported that the NSA has been collecting the phone records of millions of Americans. The agency is apparently using "data mining" techniques to scour these records for connections between terrorists. According to an intelligence official interviewed by USA Today, the NSA is analyzing this data using "social network analysis." What's social network analysis?
A technique to map and study the relationships between people or groups. The basic concept of the social network is familiar to anyone who has used Friendster or played Six Degrees of Kevin Bacon. Social network analysis formalizes this parlor game, using details about the network to interpret the role of each person or group.
In a basic analysis, people are seen as "nodes" and the relationships between them are "links." By studying the links—in the case of the NSA program, telephone calls—it's possible to determine the importance (or "centrality") of each node.
There are several ways to determine which members of a network are important. The most straightforward technique is to figure out a member's "degree," or the number of direct connections he has to other members of the network. With groups that are decentralized and complex, like terrorist cells, other measures of centrality are important as well. Network analysts also study the "betweenness" and the "closeness" of members. A member with relatively few direct connections could still be important because he serves as a connector between two large groups. A member might also be important because his links, direct and indirect, put him closest to all other members of the group (i.e., he has to go through fewer intermediaries to reach other members than anyone else).
Network analyst Valdis Krebs set out to prove after 9/11 that networks could help uncover terrorist cells. Working from publicly available information, Krebs showed that all 19 hijackers were within two connections of the al-Qaida members the CIA knew about in early 2000. Krebs' network map also showed that Mohamed Atta was a central figure. It's not clear whether such analysis could have been performed in advance, when researchers wouldn't have been certain which links were significant connections to another terrorist and which were casual connections to an acquaintance. (There is also controversy surrounding reports that a U.S. military unit called Able Danger used network analysis to identify Mohamed Atta before 9/11.)
There are two schools of thought on whether large data sets—like the NSA's database of phone records—help or hinder network analysis. One group argues that adding lots of innocuous data (the phone calls of ordinary Americans) will cloud the picture, and that it's better to construct a network by looking only at calls made to and from known terrorists. Another group maintains that large data sets are useful in establishing a "baseline" of normal behavior.
Social network analysis has been used in many areas besides terrorist surveillance. Google's PageRank system is based on network theory and the concept of "centrality." Doctors use network analysis to track the spread of HIV. And some academics have applied network theory to Enron's e-mail records in an attempt to understand relationships within the company.
|
Quote:
http://www.cs.virginia.edu/oracle/how.html
How the Oracle of Bacon Works
Every couple of weeks the Oracle downloads several database files from one of the Internet Movie Database's FTP sites containing around 800,000 actors and actresses, around 375,000 movies, and around 70,000 aliases. The Oracle builds a big map of actors and movies and stores it in a 60 MB database.
There is a database server running at all times that stores the 60 MB database file in memory. The server handles three different types of requests:
* Find the link from Actor A to Actor B.
* How good a "center" is a given actor?
* Who are all the people with an Actor A number of N?
There are several CGI programs -- one for each of the above types of queries -- that run on the UVA Computer Science department web server, which all connect to the database server using TCP..
|
<b>Click on the (1) under each actor's name, and the (numbers) link to the right of the name of anyone on each actor's (1) list:</b>
http://www.cs.virginia.edu/cgi-bin/o...ho=Kevin+Bacon
http://www.cs.virginia.edu/cgi-bin/o...nda%2c+Bridget
http://www.cs.virginia.edu/cgi-bin/o...iello%2c+Danny
http://www.cs.virginia.edu/cgi-bin/o...lover%2c+Danny
http://www.cs.virginia.edu/cgi-bin/o...Allen%2c+Woody
http://www.cs.virginia.edu/cgi-bin/o...dman%2c+Nicole
http://www.cs.virginia.edu/cgi-bin/o...=Cruise%2c+Tom
http://www.cs.virginia.edu/cgi-bin/o...fman%2c+Dustin