Monday, December 03, 2007

NORAD tracking Santa Claus VIDEO





NORAD tracking Santa Claus Wallpaper
NORAD uses four high-tech systems to track Santa - radar, satellites, Santa Cams and jet fighter aircraft.

It all starts with the NORAD radar system called the North Warning System. This powerful radar system has 47 installations strung across Canada's North and Alaska. NORAD makes a point of checking the radar closely for indications of Santa Claus leaving the North Pole on Christmas Eve.

The moment our radar tells us that Santa has lifted off, we begin to use the same satellites that we use in providing warning of possible missile launches aimed at North America. These satellites are located in a geo-synchronous orbit (that's a cool phrase meaning that the satellite is always fixed over the same spot on the Earth) at 22,300 miles above the Earth. The satellites have infrared sensors, meaning they can see heat. When a rocket or missile is launched, a tremendous amount of heat is produced - enough for the satellites to see them.

Rudolph's nose gives off an infrared signature similar to a missile launch. The satellites can detect Rudolph's bright red nose with practically no problem. With so many years of experience, NORAD has become good at tracking aircraft entering North America, detecting worldwide missile launches and tracking the progress of Santa, thanks to Rudolph. It is important to note, however, that our scientists have tried to determine the chemical process that occurs that creates the heat that is generated by Rudolph's nose but they have not been able to thus far.
The third system we use is the Santa Cam. We began using it in 1998 - the year we put our Santa Tracking program on the Internet. NORAD Santa Cams are ultra-cool high-tech high-speed digital cameras that are pre-positioned at many places around the world. NORAD only uses these cameras once a year - Christmas Eve. We turn the cameras on about one hour before Santa enters a country then switch them off after we capture images of him and the Reindeer. We immediately download the images on to our web site for people around the world see. Santa Cams produce both video and still images.

The last system we use is the NORAD jet fighter. Canadian NORAD fighter pilots, flying the CF-18, take off out of Newfoundland to intercept and welcome Santa to North America. Then at numerous locations in Canada other CF-18 fighter pilots escort Santa, while in the United States American NORAD fighter pilots in either the F-15 or F-16 get the thrill of flying with Santa and the famous Reindeer Dasher, Dancer, Prancer, Vixen, Comet, Cupid, Donner, Blitzen and Rudolph. About a dozen NORAD fighters in Canada and the United States are equipped with Santa Cams.

LINKS: Technorati tags: and or and or or Rememberance Hanukkah 5768 and Robert Goddard Space Pioneer and MIT's 'electronic nose' could detect hazards

Sunday, December 02, 2007

China's eye on the Internet

China's eye on the Internet

The "Great Firewall of China," used by the government of the People's Republic of China to block users from reaching content it finds objectionable, is actually a "panopticon" that encourages self-censorship through the perception that users are being watched, rather than a true firewall, according to researchers at UC Davis and the University of New Mexico.

The researchers are developing an automated tool, called ConceptDoppler, to act as a weather report on changes in Internet censorship in China. ConceptDoppler uses mathematical techniques to cluster words by meaning and identify keywords that are likely to be blacklisted.

Many countries carry out some form of Internet censorship. Most rely on systems that block specific Web sites or Web addresses, said Earl Barr, a graduate student in computer science at UC Davis who is an author on the paper. China takes a different approach by filtering Web content for specific keywords and selectively blocking Web pages.

In 2006, a team at the University of Cambridge, England, discovered that when the Chinese system detects a banned word in data traveling across the network, it sends a series of three "reset" commands to both the source and the destination. These "resets" effectively break the connection. But they also allow researchers to test words and see which ones are censored.

Barr, along with Jed Crandall, a recent UC Davis graduate who is now an assistant professor of computer science at the School of Engineering, University of New Mexico; UC Davis graduate students Daniel Zinn and Michael Byrd; and independent researcher Rich East sent messages to Internet addresses within China containing a variety of different words that might be subject to censorship.

If China's censorship system were a true firewall, most blocking would take place at the border with the rest of the Internet, Barr said. But the researchers found that some messages passed through several routers before being blocked.

A firewall would also block all mentions of a banned word or phrase, but banned words reached their destinations on about 28 percent of the tested paths, Byrd said. Filtering was particularly erratic at times of heavy Internet use.

The words used to probe the Chinese Internet were not selected at random.

"If we simply bombarded the Great Firewall with random words, we would waste resources and time," Zinn said.

The researchers took the Chinese version of Wikipedia, extracted individual words and used a mathematical technique called latent semantic analysis to work out the relationships between different words. If one of the words was censored within China, they could look up which other closely related words are likely to be blocked as well.

Examples of words tested by the researchers and found to be banned included references to the Falun Gong movement and the protest movements of 1989; Nazi Germany and other historical events; and general concepts related to democracy and political protest.

"Imagine you want to remove the history of the Wounded Knee massacre from the Library of Congress," Crandall said. "You could remove 'Bury My Heart at Wounded Knee' and a few other selected books, or you could remove every book in the entire library that contains the word 'massacre.'"

By analogy, Chinese Internet censorship based on keyword filtering is the equivalent of the latter -- and indeed, the keyword "massacre" (in Chinese) is on the blacklist.

Because it filters ideas rather than specific Web sites, keyword filtering stops people from using proxy servers or "mirror" Web sites to evade censorship. But because it is not completely effective all the time, it probably acts partly by encouraging self-censorship, Barr said. When users within China see that certain words, ideas and concepts are blocked most of the time, they might assume that they should avoid those topics.

The original panopticon was a prison design developed by the English philosopher Jeremy Bentham in the 18th century. Bentham proposed that a central observer would be able to watch all the prisoners, while the prisoners would not know when they were being watched.

The work was presented at the Association for Computing Machinery Computer and Communications Security Conference in Alexandria, Va., Oct. 29-Nov. 2, 2007. ###

Related: Contact: Andy Fell, ahfell@ucdavis.edu. 530-752-4533. University of California - Davis

Technorati Tags: and or and or Rememberance Hanukkah 5768 and A Visit from St. Nicholas and Micro microwave does pinpoint cooking for miniaturized labs