Risk
4/10/2013
03:16 PM
Connect Directly
Google+
RSS
E-Mail
50%
50%

Military Intelligence Tries To Tame Data 'Monster'

University workshop featuring experts in ontology, the study of the nature of existence, will try to answer how the military can extract useful information out of huge unorganized collection of intelligence data.

Big Data's Surprising Uses: From Lady Gaga To CIA
Big Data's Surprising Uses: From Lady Gaga To CIA
(click image for larger view and for slideshow)
Military intelligence involves the collection of a wide variety of data, the management of which poses challenges to government agencies responsible for curating, storing, analyzing and sharing this often-sensitive information.

Can ontology, an esoteric study of the nature of existence, and computer science combine to help manage military data? An April 18 workshop at the University at Buffalo (UB) will explore this big data conundrum, as well as related topics.

The one-day "Ontologies for Information Integration" event will include presentations from experts in ontology and military intelligence, according to workshop co-organizer Barry Smith, a UB professor and director of the National Center for Ontological Research, which provides ontological services to a variety of organizations, including the U.S. Department of Defense.

For ontology researchers, military intelligence is an intriguing challenge. The U.S. Army, for instance, uses a cloud-based system called the Distributed Common Ground System-Army (DCGS-A) to collect, process and distribute large amounts of data from myriad sources.

[ The military intelligence cloud is about to get bigger. Read Military Plans Multi-Exabyte Storage Cloud. ]

"It's a gigantic, big data monster … which they try to put all their data into, particularly (information) pertaining to things like terrorist movements in Afghanistan," Smith told InformationWeek in a phone interview. As a data management platform, however, DCGS-A is far from perfect.

"As you can imagine, this data is very heterogeneous," said Smith. "It includes things like weather and disease data, and (information) about meetings, weapons and so forth. And it comes from many different sources, which means that it's practically impossible to search, in any sensible way, by the usual retrieval procedures."

Government officials have tested various strategies to make this data easier to manage, but more work is needed. "I'm part of an attempt to demonstrate that ontology can help to retrieve data from this cloud store," Smith said.

The DCGS-A challenge involves structured data, but one where the "structures are very different from one case to the next," Smith explained.

One database, for instance, might include information about people with certain skills. "In that database, the heading for people would be something like 'P,'" said Smith. "And then you have another database, which is about people and their addresses. And in that database, the heading for people might be something like 'Person.'"

And then a third database might include data about people's organizations. Its heading for people might be "human beings."

Not surprisingly, this lack of consistency spells trouble.

"You and I know that a person is a human being, but a computer doesn't know that," Smith said. "Ontology … gives you a smaller set of labels so that you can tag those data headings using common labels, and thereby merge the data in ways that prove useful for retrieval and analysis." This approach shares common ground with the proposed semantic Web, a framework that would extend Web principles from documents to data.

"In essence, all you're doing is tagging data and giving it a description of what it is," Cambridge Semantics chief technical officer and semantic Web guru Sean Martin told InformationWeek in November.

According to Smith, researchers are developing ontologies to address the information integration needs of military and other complex government projects. One such undertaking is the development of a next-generation air traffic control system, a massive project that requires input from government and commercial entities, including the U.S. Air Force, weather agencies and international airlines.

"The idea is to get rid of the control towers, and the air traffic control will take place inside the cockpit," said Smith. Air traffic control would be managed via "a gigantic network of computers inside airplanes, rather than what we have at the moment … a point-to-point messaging system between people in towers and human beings in cockpits," he said. However, the project's global scope presents many challenges, including the fact that airlines outside the U.S. have different ways of classifying weather phenomena and other data.

Companies want more than they're getting today from big data analytics. But small and big vendors are working to solve the key problems. Also in the new, all-digital Analytics Wish List issue of InformationWeek: Jay Parikh, the Facebook's infrastructure VP, discusses the company's big data plans. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Eric F.
50%
50%
Eric F.,
User Rank: Apprentice
4/11/2013 | 4:46:12 PM
re: Military Intelligence Tries To Tame Data 'Monster'
Hi Jeff,

At the beginning of the post, you point to a definition of "ontology" that is misleading in this case. Rather than "an esoteric study of the nature of existence..." the definition that is relevant here is found in the Wikipedia entry: http://en.wikipedia.org/wiki/O....

Best,
-Eric Franzon
SemanticWeb.com
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6278
Published: 2014-09-30
GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and m...

CVE-2014-6805
Published: 2014-09-30
The weibo (aka magic.weibo) application 1.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6806
Published: 2014-09-30
The Thanodi - Setswana Translator (aka com.thanodi.thanodi) application 1.0.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6807
Published: 2014-09-30
The OLA School (aka com.conduit.app_00f9890a4f0145f2aae9d714e20b273a.app) application 1.2.7.132 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6808
Published: 2014-09-30
The Active 24 (aka com.zentity.app.active24) application 1.0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
In our next Dark Reading Radio broadcast, we’ll take a close look at some of the latest research and practices in application security.