Risk
4/10/2013
03:16 PM
Connect Directly
Google+
RSS
E-Mail
50%
50%

Military Intelligence Tries To Tame Data 'Monster'

University workshop featuring experts in ontology, the study of the nature of existence, will try to answer how the military can extract useful information out of huge unorganized collection of intelligence data.

Big Data's Surprising Uses: From Lady Gaga To CIA
Big Data's Surprising Uses: From Lady Gaga To CIA
(click image for larger view and for slideshow)
Military intelligence involves the collection of a wide variety of data, the management of which poses challenges to government agencies responsible for curating, storing, analyzing and sharing this often-sensitive information.

Can ontology, an esoteric study of the nature of existence, and computer science combine to help manage military data? An April 18 workshop at the University at Buffalo (UB) will explore this big data conundrum, as well as related topics.

The one-day "Ontologies for Information Integration" event will include presentations from experts in ontology and military intelligence, according to workshop co-organizer Barry Smith, a UB professor and director of the National Center for Ontological Research, which provides ontological services to a variety of organizations, including the U.S. Department of Defense.

For ontology researchers, military intelligence is an intriguing challenge. The U.S. Army, for instance, uses a cloud-based system called the Distributed Common Ground System-Army (DCGS-A) to collect, process and distribute large amounts of data from myriad sources.

[ The military intelligence cloud is about to get bigger. Read Military Plans Multi-Exabyte Storage Cloud. ]

"It's a gigantic, big data monster … which they try to put all their data into, particularly (information) pertaining to things like terrorist movements in Afghanistan," Smith told InformationWeek in a phone interview. As a data management platform, however, DCGS-A is far from perfect.

"As you can imagine, this data is very heterogeneous," said Smith. "It includes things like weather and disease data, and (information) about meetings, weapons and so forth. And it comes from many different sources, which means that it's practically impossible to search, in any sensible way, by the usual retrieval procedures."

Government officials have tested various strategies to make this data easier to manage, but more work is needed. "I'm part of an attempt to demonstrate that ontology can help to retrieve data from this cloud store," Smith said.

The DCGS-A challenge involves structured data, but one where the "structures are very different from one case to the next," Smith explained.

One database, for instance, might include information about people with certain skills. "In that database, the heading for people would be something like 'P,'" said Smith. "And then you have another database, which is about people and their addresses. And in that database, the heading for people might be something like 'Person.'"

And then a third database might include data about people's organizations. Its heading for people might be "human beings."

Not surprisingly, this lack of consistency spells trouble.

"You and I know that a person is a human being, but a computer doesn't know that," Smith said. "Ontology … gives you a smaller set of labels so that you can tag those data headings using common labels, and thereby merge the data in ways that prove useful for retrieval and analysis." This approach shares common ground with the proposed semantic Web, a framework that would extend Web principles from documents to data.

"In essence, all you're doing is tagging data and giving it a description of what it is," Cambridge Semantics chief technical officer and semantic Web guru Sean Martin told InformationWeek in November.

According to Smith, researchers are developing ontologies to address the information integration needs of military and other complex government projects. One such undertaking is the development of a next-generation air traffic control system, a massive project that requires input from government and commercial entities, including the U.S. Air Force, weather agencies and international airlines.

"The idea is to get rid of the control towers, and the air traffic control will take place inside the cockpit," said Smith. Air traffic control would be managed via "a gigantic network of computers inside airplanes, rather than what we have at the moment … a point-to-point messaging system between people in towers and human beings in cockpits," he said. However, the project's global scope presents many challenges, including the fact that airlines outside the U.S. have different ways of classifying weather phenomena and other data.

Companies want more than they're getting today from big data analytics. But small and big vendors are working to solve the key problems. Also in the new, all-digital Analytics Wish List issue of InformationWeek: Jay Parikh, the Facebook's infrastructure VP, discusses the company's big data plans. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Eric F.
50%
50%
Eric F.,
User Rank: Apprentice
4/11/2013 | 4:46:12 PM
re: Military Intelligence Tries To Tame Data 'Monster'
Hi Jeff,

At the beginning of the post, you point to a definition of "ontology" that is misleading in this case. Rather than "an esoteric study of the nature of existence..." the definition that is relevant here is found in the Wikipedia entry: http://en.wikipedia.org/wiki/O....

Best,
-Eric Franzon
SemanticWeb.com
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2010-5075
Published: 2014-12-27
Integer overflow in aswFW.sys 5.0.594.0 in Avast! Internet Security 5.0 Korean Trial allows local users to cause a denial of service (memory corruption and panic) via a crafted IOCTL_ASWFW_COMM_PIDINFO_RESULTS DeviceIoControl request to \\.\aswFW.

CVE-2011-4720
Published: 2014-12-27
Hillstone HS TFTP Server 1.3.2 allows remote attackers to cause a denial of service (daemon crash) via a long filename in a (1) RRQ or (2) WRQ operation.

CVE-2011-4722
Published: 2014-12-27
Directory traversal vulnerability in the TFTP Server 1.0.0.24 in Ipswitch WhatsUp Gold allows remote attackers to read arbitrary files via a .. (dot dot) in the Filename field of an RRQ operation.

CVE-2012-1203
Published: 2014-12-27
Cross-site request forgery (CSRF) vulnerability in starnet/index.php in SyndeoCMS 3.0 and earlier allows remote attackers to hijack the authentication of administrators for requests that add user accounts via a save_user action.

CVE-2012-1302
Published: 2014-12-27
Multiple cross-site scripting (XSS) vulnerabilities in amMap 2.6.3 allow remote attackers to inject arbitrary web script or HTML via the (1) data_file or (2) settings_file parameter to ammap.swf, or (3) the data_file parameter to amtimeline.swf.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.