It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: Bleeeeep
a reply to: boncho
I don't think it would be used for that because there are already better systems.
Just look at this one for example:
And where you wanted spatial info you could and would want to just use your own cell towers and the like with a good algorithm.
In my opinion, the only useful data would be the social behavior of people (percentages of those who work together and how they work together, etc.) while performing recreational activities, but even that will be severely limited to their perception of the game and its objectives.
originally posted by: j.r.c.b.
Weird timing for this game to come out, I think. I'm not too sure what it's about, but I don't like the idea of it. Plus I think it's dangerous. JMO of course.......could just be a silly game?? But I think not........
.Sometimes a game is just a game. They could already collect that same data from any mapping apps, such as Apple or Google maps, Waze, tripadvisor, etc.
Project/Program Manager National Geospatial-Intelligence Agency Human Intelligent program manager
Oversee 1000's employees in training on HUMINT policies and procedures to improve collection gathering operation.
Train NGA personnel and upkeep on all HUMINT tools on JWICS as CIA Wire, CIRs, Wise-ism InfoSphere Management System, and COLISEM Community On-line Intelligence system for end users and managers, RIGHTSM Requirement and Management Global HUMINT Tasking Management System, and on SIPERNET HOTR HUMINT Online Tasking Requirements.
Experienced trainer and briefer with working knowledge of various computer programs and applications M3, NSA Portal, Pathfinder, SAVANT, Widow, GIMS, RMS, DEFSMAC, Harmony and Gemini II.
Chaired NGA's position at NHCD National HUMINT Collection Directive meeting at CIA-NHRTC in planning for target exploitation.
Responsible for the coordination and staffing of National HUMINT Requirements Tasking Center (NHRTC)
Developed and managed regulatory-compliance data collection for 100 NGA HOTR users.
Wrote, edited and released HCR, AHR, TSCR, Intelligence Information Report (IIR) & TD Evaluations for analysts from multiple NGA Production & Analysis Branches, which resulted in additional Human Intelligence (HUMINT) reporting for those analysts.
Wrote, edited, validated and released new NGA Source Directed Requirements (SDR) for NGA analysts which will provide new HUMINT reporting.
Assign to a Multi Intelligent team of OSINT, SIGINTS, and MASINT, learning in-depth detail of the operation and functions those INTS.
Advised and Assist Middle East Source Analyst in Middle East Operations of collection practices.
Help NGA Middle East analyst identify and publish Hamas and Hezbollah terrorist group leader's homes and offices for IC community.
Assessed developments, trends and threat implications of terrorists groups in Israel.
Participated in multiple CIA Middle East Conference of Intelligent value.
Used HP Exstream to reduce complexity, streamline NGA intelligence processes, and increase effectiveness of their display communications.
Tiger team for computer tools for use by NGA's analysis and Identify intelligence gaps, Specify collection requirements and evaluate resulting intelligence, and Determine analytical approach,
Provided strategic direction and implemented strategic-planning process enabling "voice-of-customer" data to be translated into product/service requirements, thereby reducing planning time by 50 percent and significantly improving customer satisfaction.
Consulting Team in support of NSA Cyber operations.
Tiger Team presented a general overview and understanding of JTF-CS roles, responsibilities and tools CBRNE-CM (Chemical, Biological, Radiological, Nuclear, and High Yield Explosive - Consequence Management) Operations.
Liaison for peers with other intelligence agencies and embassies to discuss mutual analytical problems and production requirements.
Directly responsible for conducting intelligence analysis concerning terrorist finances, drug-trafficking operations, capabilities, vulnerabilities, courses of action and the threat they present to U.S. interests.
Provided ongoing operational process analysis, mitigated "scope creep," communicated project status, and identified and resolved operational issues and constraints.
Planning strategic collection, analysis, operations and production requirements; working closely with senior staff to identify and develop strategies for improvement in assigned intelligence and counterintelligence functional areas.
Spearheaded process-improvement projects to ensure accurate, timely data delivery, reduced production expense, and effective relationships with infield Report Officer, SSA and image analysis, resulting in:
- 95 percent improvement in product- 60 percent message reduction accuracy/reliability through improved efficiencies.
- 100 percent on-time delivery of products - 10 percent reduction in analysis to internal customers and other DoD agencies costs for production
DIA HOTR HUMINT, NGA HUMINT, Word Perfect, Internet Explorer, VxWorks, Xwindows, Vintela, Veritas, NIS/NFS, DNS, Apache, WikiMedia, HTML, Win95/98, Active Directory, IBM servers, Cisco routers, hubs, switches, voicemail, security training, Firewalls, badging, McLean, VA 22102, Suite 210, Chantilly, VA 20151, 703 […], HUMINT, JWICS, COLISEM, RIGHTSM, SIPERNET HOTR HUMINT, SAVANT, DEFSMAC, NHCD, NHRTC, NGA HOTR, OSINT, SIGINTS, MASINT, CBRNE, CIRs, NSA Portal, Widow, GIMS, RMS, AHR, TSCR, edited, Biological, Radiological, Nuclear, drug-trafficking operations, capabilities, vulnerabilities, analysis, PATHFINDER
Additional Computer Skills:
JWICS, NGANET, SCION, SIPRNET, SECNET, HOCNET, FBINET, NIPRNET, UNet, HOTR, RIGHTMS, JIRA, GIMS, Web Fish Tools (WFT), Palanterra, FAA Domestic Events Network (DEN), Treasury Enforcement Communications System (TECS), Consular Consolidated Database (CCD), FBI IIR Dissemination System (FIDS), FBI Investigative Data Warehouse, Automated Case Support System (ACS), Sentinel, Automated Message Handling System AMHS/M3, PATHFINDER, COLISEUM, WISE ISM, Intelink, Intellipedia, Boolean Logic, SOMM, Analyst Notebook, the Virtual Private Network (VPN), NCTC TIDE, LNI, CIAWIRE, Record Message Traffic (RMT), ECN GCOMS, QLIX, CRATE, Palantir, Cornerstone, The All Source Analysis System (ASAS), Microsoft Office (MS) applications (PowerPoint, Word, Excel, etc.), SEAS, Portico, Groove, IMAP Data, LexusNexus, Command & Control Personal Computer (C2PC), Infoworkspace (IWS), FalconView, I-Space, A-Space, PIERS, TAC, MIRC Chat, Jabber, PeopleSoft, and NGA Raster Roam.