Risk
4/10/2013
03:16 PM
Connect Directly
Google+
RSS
E-Mail
50%
50%

Military Intelligence Tries To Tame Data 'Monster'

University workshop featuring experts in ontology, the study of the nature of existence, will try to answer how the military can extract useful information out of huge unorganized collection of intelligence data.

Big Data's Surprising Uses: From Lady Gaga To CIA
Big Data's Surprising Uses: From Lady Gaga To CIA
(click image for larger view and for slideshow)
Military intelligence involves the collection of a wide variety of data, the management of which poses challenges to government agencies responsible for curating, storing, analyzing and sharing this often-sensitive information.

Can ontology, an esoteric study of the nature of existence, and computer science combine to help manage military data? An April 18 workshop at the University at Buffalo (UB) will explore this big data conundrum, as well as related topics.

The one-day "Ontologies for Information Integration" event will include presentations from experts in ontology and military intelligence, according to workshop co-organizer Barry Smith, a UB professor and director of the National Center for Ontological Research, which provides ontological services to a variety of organizations, including the U.S. Department of Defense.

For ontology researchers, military intelligence is an intriguing challenge. The U.S. Army, for instance, uses a cloud-based system called the Distributed Common Ground System-Army (DCGS-A) to collect, process and distribute large amounts of data from myriad sources.

[ The military intelligence cloud is about to get bigger. Read Military Plans Multi-Exabyte Storage Cloud. ]

"It's a gigantic, big data monster … which they try to put all their data into, particularly (information) pertaining to things like terrorist movements in Afghanistan," Smith told InformationWeek in a phone interview. As a data management platform, however, DCGS-A is far from perfect.

"As you can imagine, this data is very heterogeneous," said Smith. "It includes things like weather and disease data, and (information) about meetings, weapons and so forth. And it comes from many different sources, which means that it's practically impossible to search, in any sensible way, by the usual retrieval procedures."

Government officials have tested various strategies to make this data easier to manage, but more work is needed. "I'm part of an attempt to demonstrate that ontology can help to retrieve data from this cloud store," Smith said.

The DCGS-A challenge involves structured data, but one where the "structures are very different from one case to the next," Smith explained.

One database, for instance, might include information about people with certain skills. "In that database, the heading for people would be something like 'P,'" said Smith. "And then you have another database, which is about people and their addresses. And in that database, the heading for people might be something like 'Person.'"

And then a third database might include data about people's organizations. Its heading for people might be "human beings."

Not surprisingly, this lack of consistency spells trouble.

"You and I know that a person is a human being, but a computer doesn't know that," Smith said. "Ontology … gives you a smaller set of labels so that you can tag those data headings using common labels, and thereby merge the data in ways that prove useful for retrieval and analysis." This approach shares common ground with the proposed semantic Web, a framework that would extend Web principles from documents to data.

"In essence, all you're doing is tagging data and giving it a description of what it is," Cambridge Semantics chief technical officer and semantic Web guru Sean Martin told InformationWeek in November.

According to Smith, researchers are developing ontologies to address the information integration needs of military and other complex government projects. One such undertaking is the development of a next-generation air traffic control system, a massive project that requires input from government and commercial entities, including the U.S. Air Force, weather agencies and international airlines.

"The idea is to get rid of the control towers, and the air traffic control will take place inside the cockpit," said Smith. Air traffic control would be managed via "a gigantic network of computers inside airplanes, rather than what we have at the moment … a point-to-point messaging system between people in towers and human beings in cockpits," he said. However, the project's global scope presents many challenges, including the fact that airlines outside the U.S. have different ways of classifying weather phenomena and other data.

Companies want more than they're getting today from big data analytics. But small and big vendors are working to solve the key problems. Also in the new, all-digital Analytics Wish List issue of InformationWeek: Jay Parikh, the Facebook's infrastructure VP, discusses the company's big data plans. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Eric F.
50%
50%
Eric F.,
User Rank: Apprentice
4/11/2013 | 4:46:12 PM
re: Military Intelligence Tries To Tame Data 'Monster'
Hi Jeff,

At the beginning of the post, you point to a definition of "ontology" that is misleading in this case. Rather than "an esoteric study of the nature of existence..." the definition that is relevant here is found in the Wikipedia entry: http://en.wikipedia.org/wiki/O....

Best,
-Eric Franzon
SemanticWeb.com
20 Questions to Ask Yourself before Giving a Security Conference Talk
Joshua Goldfarb, Co-founder & Chief Product Officer, IDDRA,  10/16/2017
Printers: The Weak Link in Enterprise Security
Kelly Sheridan, Associate Editor, Dark Reading,  10/16/2017
Hyatt Hit With Another Credit Card Breach
Dark Reading Staff 10/13/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.