Risk
4/10/2013
03:16 PM
Connect Directly
Google+
RSS
E-Mail
50%
50%

Military Intelligence Tries To Tame Data 'Monster'

University workshop featuring experts in ontology, the study of the nature of existence, will try to answer how the military can extract useful information out of huge unorganized collection of intelligence data.

Big Data's Surprising Uses: From Lady Gaga To CIA
Big Data's Surprising Uses: From Lady Gaga To CIA
(click image for larger view and for slideshow)
Military intelligence involves the collection of a wide variety of data, the management of which poses challenges to government agencies responsible for curating, storing, analyzing and sharing this often-sensitive information.

Can ontology, an esoteric study of the nature of existence, and computer science combine to help manage military data? An April 18 workshop at the University at Buffalo (UB) will explore this big data conundrum, as well as related topics.

The one-day "Ontologies for Information Integration" event will include presentations from experts in ontology and military intelligence, according to workshop co-organizer Barry Smith, a UB professor and director of the National Center for Ontological Research, which provides ontological services to a variety of organizations, including the U.S. Department of Defense.

For ontology researchers, military intelligence is an intriguing challenge. The U.S. Army, for instance, uses a cloud-based system called the Distributed Common Ground System-Army (DCGS-A) to collect, process and distribute large amounts of data from myriad sources.

[ The military intelligence cloud is about to get bigger. Read Military Plans Multi-Exabyte Storage Cloud. ]

"It's a gigantic, big data monster … which they try to put all their data into, particularly (information) pertaining to things like terrorist movements in Afghanistan," Smith told InformationWeek in a phone interview. As a data management platform, however, DCGS-A is far from perfect.

"As you can imagine, this data is very heterogeneous," said Smith. "It includes things like weather and disease data, and (information) about meetings, weapons and so forth. And it comes from many different sources, which means that it's practically impossible to search, in any sensible way, by the usual retrieval procedures."

Government officials have tested various strategies to make this data easier to manage, but more work is needed. "I'm part of an attempt to demonstrate that ontology can help to retrieve data from this cloud store," Smith said.

The DCGS-A challenge involves structured data, but one where the "structures are very different from one case to the next," Smith explained.

One database, for instance, might include information about people with certain skills. "In that database, the heading for people would be something like 'P,'" said Smith. "And then you have another database, which is about people and their addresses. And in that database, the heading for people might be something like 'Person.'"

And then a third database might include data about people's organizations. Its heading for people might be "human beings."

Not surprisingly, this lack of consistency spells trouble.

"You and I know that a person is a human being, but a computer doesn't know that," Smith said. "Ontology … gives you a smaller set of labels so that you can tag those data headings using common labels, and thereby merge the data in ways that prove useful for retrieval and analysis." This approach shares common ground with the proposed semantic Web, a framework that would extend Web principles from documents to data.

"In essence, all you're doing is tagging data and giving it a description of what it is," Cambridge Semantics chief technical officer and semantic Web guru Sean Martin told InformationWeek in November.

According to Smith, researchers are developing ontologies to address the information integration needs of military and other complex government projects. One such undertaking is the development of a next-generation air traffic control system, a massive project that requires input from government and commercial entities, including the U.S. Air Force, weather agencies and international airlines.

"The idea is to get rid of the control towers, and the air traffic control will take place inside the cockpit," said Smith. Air traffic control would be managed via "a gigantic network of computers inside airplanes, rather than what we have at the moment … a point-to-point messaging system between people in towers and human beings in cockpits," he said. However, the project's global scope presents many challenges, including the fact that airlines outside the U.S. have different ways of classifying weather phenomena and other data.

Companies want more than they're getting today from big data analytics. But small and big vendors are working to solve the key problems. Also in the new, all-digital Analytics Wish List issue of InformationWeek: Jay Parikh, the Facebook's infrastructure VP, discusses the company's big data plans. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Eric F.
50%
50%
Eric F.,
User Rank: Apprentice
4/11/2013 | 4:46:12 PM
re: Military Intelligence Tries To Tame Data 'Monster'
Hi Jeff,

At the beginning of the post, you point to a definition of "ontology" that is misleading in this case. Rather than "an esoteric study of the nature of existence..." the definition that is relevant here is found in the Wikipedia entry: http://en.wikipedia.org/wiki/O....

Best,
-Eric Franzon
SemanticWeb.com
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.