Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Feds Open 'Total' Tech Spy System
Wired News ^ | 8/7/02 | Eliot Borin

Posted on 11/15/2002 10:17:28 AM PST by ksen

Edited on 06/29/2004 7:09:32 PM PDT by Jim Robinson. [history]

Had Winston Churchill been alive in the months subsequent to Sept. 11 he might well have described U.S. intelligence agencies' performance prior to the attack thusly: Never have so many known so much and done so little.

On Wednesday, the Defense Advanced Research Projects Agency (DARPA) will begin awarding contracts for the design and implementation of a Total Information Awareness (TIA) system.


(Excerpt) Read more at wired.com ...


TOPICS: Constitution/Conservatism; Culture/Society; Foreign Affairs; Government; Philosophy
KEYWORDS: 1984; bigbrother; privacylist; techindex
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-62 next last
To: Highest Authority
Oracle designs database's that support data warehousing, and are currently spending millions of R & D dollars developing biometrics.
21 posted on 11/15/2002 11:03:32 AM PST by HEY4QDEMS
[ Post Reply | Private Reply | To 18 | View Replies]

To: All
Here are some remarks from Adm. Poindexter himself about the IAO:

Defense Advanced Research
Projects Agency
3701 North Fairfax Drive
Arlington, VA 22203-1714

Remarks as prepared for delivery by Dr. John Poindexter, Director, Information Awareness Office of DARPA, at DARPATech 2002 Conference, Anaheim, Calif., August 2, 2002

OVERVIEW OF THE INFORMATION AWARENESS OFFICE

Good afternoon. Today I would like to tell you about the new Information Awareness Office and the programs we are developing. To introduce this I have a short video for you.

The world has changed dramatically since the Cold War when there existed two super powers. During the years I was in the White House it was relatively simple to identify our intelligence collection targets. It was sometimes hard to collect the intelligence, but the targets were clear. Today, we are in a world of asymmetries. The most serious asymmetric threat facing the United States is terrorism, a threat characterized by collections of people loosely organized in shadowy networks that are difficult to identify and define and whose goals are the destruction of our way of life. The intelligence collection targets are thousands of people whose identities and whereabouts we do not always know. It is somewhat analogous to the anti-submarine warfare problem of finding submarines in an ocean of noise - we must find the terrorists in a world of noise, understand what they are planning, and develop options for preventing their attacks. If we are to preserve our national security, we must figure out a way of combating this threat.

I think the solution is largely associated with information technology. We must become much more efficient and more clever in the ways we find new sources of data, mine information from the new and old, generate information, make it available for analysis, convert it to knowledge, and create actionable options. We must also break down the stovepipes - at least punch holes in them. By this, I mean we must share and collaborate between agencies, and create and support high-performance teams operating on the edges of existing organizations. Tools are needed to facilitate these collaborations, and to support these teams that work to ensure our security.

The Information Awareness Office at DARPA is about creating technologies that would permit us have both security and privacy. More than just making sure that different databases can talk to one another, we need better ways to extract information from those unified databases, and to ensure that the private information on innocent citizens is protected. The main point is that we need a much more systematic approach. A variety of tools, processes and procedures will be required to deal with the problem, but they must be integrated by a systems approach built around a common architecture to be effective.

Total Information Awareness - a prototype system -- is our answer. We must be able to detect, classify, identify, and track terrorists so that we may understand their plans and act to prevent them from being executed. To protect our rights, we must ensure that our systems track the terrorists, and those that mean us harm.

IAO programs are focused on making Total Information Awareness - TIA -- real. This is a high level, visionary, functional view of the world-wide system - somewhat over simplified. One of the significant new data sources that needs to be mined to discover and track terrorists is the transaction space. If terrorist organizations are going to plan and execute attacks against the United States, their people must engage in transactions and they will leave signatures in this information space. This is a list of transaction categories, and it is meant to be inclusive. Currently, terrorists are able to move freely throughout the world, to hide when necessary, to find sponsorship and support, and to operate in small, independent cells, and to strike infrequently, exploiting weapons of mass effects and media response to influence governments. We are painfully aware of some of the tactics that they employ. This low-intensity/low-density form of warfare has an information signature. We must be able to pick this signal out of the noise. Certain agencies and apologists talk about connecting the dots, but one of the problems is to know which dots to connect. The relevant information extracted from this data must be made available in large-scale repositories with enhanced semantic content for easy analysis to accomplish this task. The transactional data will supplement our more conventional intelligence collection.

While our goal is total information awareness, there will always be uncertainty and ambiguity in trying to understand what is being planned. That's why our tools have to build models of competing hypotheses. That is, we need to bring people with diverse points of view together in a collaborative environment where there is access to all source data, discovery tools and model building tools. Collaboration has not been so important in the past when problems were less complex, but now it is essential. And tools have to make the analysis process more efficient, to properly explore the multiple possibilities.

This is the analytical environment. I could have called it the intelligence community, but in the case of counter-terrorism, it is broader to include law enforcement, friendly allies, outside experts etc. A similar environment exists for the policy and operations community, but the functions and tools are different. The mission here is to take the competing hypotheses from the analytical environment and estimate a range of plausible futures. The objective is to identify common nodes, representing situations that could occur, and to explore the probable impact of various actions or interventions that authorities might make in response to these situations.

The Information Awareness Office has a number of ongoing projects to address the functional requirements of this vision, and we will be starting new projects to complete the picture. The program managers who follow will give you the details, but I want to show you how they all fit into this system plan.

Jonathon Phillips is working on Human Identification at Distance, to achieve positive identification of humans using multi-modal biometric technologies. Such a system could be used for security systems, for example, or could be used to track potential terrorists.

Doug Dyer is starting a new program called Genisys, which addresses our database needs. This project will imagine and develop ultra-large-scale, semantically rich, easily implementable database technologies. One goal is to develop ways of treating the world-wide, distributed, legacy data bases as if they were one centralized data base, and another is to develop privacy protection technologies.

Charles Wayne leads the programs called TIDES and EARS. These projects address our needs in natural language processing, to provide discovery tools for finding information in foreign languages and converting speech to text. Automated tools are essential in order to reduce our need for expert foreign language translators and listeners in the thousands of existing human languages.

Ted Senator is the program manger for EELD, which stands for Evidence Extraction and Link Discovery. This is a key program in the area of tools for discovery of information. I will let Ted tell you the details on how this goes beyond traditional data mining techniques.

War Gaming the Asymmetric Environment is led by Larry Willis. This is an essential component of our modeling efforts. Bio-Surveillance is another of Ted Senator's programs looking at novel data sources for early warning of the release of biological agents.

Tom Armour is back on the DARPA team to extend the work on the Genoa project with a new program that we have creatively named Genoa II. I told him he had to come back to finish his work. As some of you know I've been working on Genoa for the past six years. We have transitioned some of the Genoa tools and will build on the past work primarily to address tools for collaborative reasoning, estimating plausible futures and creating actionable options for the decision maker. While the original Genoa project was aimed primarily at supporting intelligence analysis, under Genoa II we plan to focus on supporting policy and decision-making at strategic levels.

The overarching program that binds IAO's efforts together is Total Information Awareness or TIA System. The primary goal of TIA is the integration and assured transition of components developed in the programs Genoa, Genoa II, GENISYS, EELD, WAE, TIDES, HumanID and Bio-Surveillance. TIA will develop a modular system architecture using open standards that will enable a spiral development effort that will allow the insertion of new components when they are available. We will produce a complete, end-to-end, closed-loop proto-type system in a realistic environment.

To accomplish this we have established an organization whose structure is as diagramed here. We will supplement the programs in IAO with commercial and other government components to rapidly implement early versions of TIA system at our R&D laboratory. We have already begun a spiral development and experiment program in conjunction with Army partners. Over the next few years we will continuously add functionality to the system as components become available.

Where will IAO's projects get data in order to develop their algorithms? To proceed with development, without intruding on domestic or foreign concerns, we are creating a data base of synthetic transactions using a simulation model. This will generate billions of transactions constituting realistic background noise. We will insert into this noise simulated transactions by a red team acting as a terrorist organization to see if we can detect and understand this activity. In the Genisys program we will be investigating the DARPA-hard problem of developing technologies that can give us the capability to detect foreign terrorist activities in this transaction space and achieve enhanced privacy for the innocents.

There are significant information policy issues related when considering data mining in actual transaction spaces. The U.S., and other countries as well, have just begun to consider some of the issues and consequences. There are ways in which technology can help preserve rights and protect people's privacy while helping to make us all safer. We are taking a number of steps to begin a reasoned discussion of the policy issues, imbued with knowledge of technology capabilities. DARPA's Information Systems and Technology panel (ISAT) has been tasked with a summer study on how we can achieve the necessary security we need and still have privacy. Discussions have been started with the National Academy of Sciences to do a longer range study on Information Policy for the InfoSpace of the Future.

We believe that total information awareness is a very difficult problem and in the tradition of the very hard problems that DARPA has addressed in the past. We think we have some very good ideas about how to solve the problem. IAO has an open BAA that was issued last March, and will be open for a year. We will be funding some of the good ideas that we have already received, but if you have good ideas that we haven't seen yet, please tell us about them. The BAA is on the DARPA web site.

I believe the ultimate solution to countering terrorism requires a co-evolution in 4 areas: technology, process/operations, policy and culture. Our focus is on developing the technology, the first area, and making sure that decisions in the other areas, such as policy, are knowledgeable about what is possible and what isn't. It's an exciting area, and I am proud of the contributions that we will all be collectively making to National security.

Thank you. Now you will hear from the program managers.


22 posted on 11/15/2002 11:07:23 AM PST by ksen
[ Post Reply | Private Reply | To 19 | View Replies]

To: ksen
Psst! The feds. suck at building anything like this. And most of the boneheaded contractors that get these types of jobs usually screw them up.

Another nice big hole in which to pour money.

23 posted on 11/15/2002 11:07:52 AM PST by isthisnickcool
[ Post Reply | Private Reply | To 1 | View Replies]

To: Overtaxed; ItsOurTimeNow; HairOfTheDog; Corin Stormhands
Bumping FYI......
24 posted on 11/15/2002 11:09:27 AM PST by ksen
[ Post Reply | Private Reply | To 22 | View Replies]

To: HEY4QDEMS
Ah so! Then the reference was to buy Oracle STOCK! I thought that maybe Oracle came up with something new that would defeat Big Brother's intrusion.
25 posted on 11/15/2002 11:09:28 AM PST by Highest Authority
[ Post Reply | Private Reply | To 21 | View Replies]

To: isthisnickcool
I hope you're right, but it seems that if the FedGov can gain power by doing something then they tend to do it quite well.

So you're advocating we shouldn't be too worried about this?

Should we fight to get it abolished?
26 posted on 11/15/2002 11:11:14 AM PST by ksen
[ Post Reply | Private Reply | To 23 | View Replies]

To: Highest Authority
Dingdingdingding......Oracle Stock....Correct
27 posted on 11/15/2002 11:13:35 AM PST by HEY4QDEMS
[ Post Reply | Private Reply | To 25 | View Replies]

To: ksen
So you're advocating we shouldn't be too worried about this?

They will close and control our entire border 100% before they get this to work. /sarcasm off

28 posted on 11/15/2002 11:28:35 AM PST by isthisnickcool
[ Post Reply | Private Reply | To 26 | View Replies]

To: HEY4QDEMS
Oracle Stock....Correct

I'll just wait until the chart forms a handle near its high.

29 posted on 11/15/2002 11:30:39 AM PST by Overtaxed
[ Post Reply | Private Reply | To 27 | View Replies]

To: ksen
To heck with Oracle! - Buy stock in aluminum foil!


30 posted on 11/15/2002 11:35:36 AM PST by HairOfTheDog
[ Post Reply | Private Reply | To 24 | View Replies]

To: HairOfTheDog
;^P
31 posted on 11/15/2002 11:43:04 AM PST by ksen
[ Post Reply | Private Reply | To 30 | View Replies]

To: isthisnickcool
I see... ;^)
32 posted on 11/15/2002 11:43:47 AM PST by ksen
[ Post Reply | Private Reply | To 28 | View Replies]

To: HairOfTheDog
What, exactly, do you find tin-foilish about this?
33 posted on 11/15/2002 11:44:34 AM PST by ksen
[ Post Reply | Private Reply | To 30 | View Replies]

To: ksen
sometimes i think the whole tinfoil thing is a cop out for people who cant think or debate - just like calling someone a homophobe....you take the debate off the issue...
34 posted on 11/15/2002 11:53:48 AM PST by goldylight
[ Post Reply | Private Reply | To 33 | View Replies]

To: goldylight; HairOfTheDog
Usually I think you're right goldylight, but Hair and I are friends over at The Hobbit Hole so I think she was just bustin' me. ;^)
35 posted on 11/15/2002 11:56:55 AM PST by ksen
[ Post Reply | Private Reply | To 34 | View Replies]

To: ksen
I was serious about needing tinfoil! Tinfoil would be the only protection against this!

Just giving you a hard time... I don't really know what to do about this.
36 posted on 11/15/2002 12:08:53 PM PST by HairOfTheDog
[ Post Reply | Private Reply | To 33 | View Replies]

To: HairOfTheDog

37 posted on 11/15/2002 12:23:30 PM PST by ksen
[ Post Reply | Private Reply | To 36 | View Replies]

To: ksen
I think #4 is what we are already familiar with, iris scan, face mapping etc, but speeded up in universal networks with cameras everywhere.

I can only guess about #11.

#5 is a biggie, that is the mega data cruncher that figures out what is "normal" human activity in many situations, and then looks for subtle patterns which indicate terrorist plannng activity. That's why they want to collect everything about everybody: for advanced data mining. The more data in, the more supercompputers crunching it, the better is what they believe.

38 posted on 11/15/2002 1:35:00 PM PST by Travis McGee
[ Post Reply | Private Reply | To 1 | View Replies]

To: ksen
Jonathon Phillips is working on Human Identification at Distance, to achieve positive identification of humans using multi-modal biometric technologies.

This means "from space and from UAVs". Expect lots more missiles from the sky blowing up terrorists.

39 posted on 11/15/2002 1:39:07 PM PST by Travis McGee
[ Post Reply | Private Reply | To 22 | View Replies]

To: TEXASPROUD; Joe Brower; Squantos; harpseal; Myrddin; AAABEST; Poohbah; SLB; blam; river rat; ...
This thread, and the remarks by John Poindexter, are very well worth a read.
40 posted on 11/15/2002 1:42:38 PM PST by Travis McGee
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-62 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson