Feeds

DARPA seeks 'Machine Reading' AI auto-analysis bot

Human analysts' unanimous view - it'll never work

Security for virtualized datacentres

The US military is seeking revolutionary new AI software which would be able to read text - and so effectively do research - in the same way that humans do. The so-called "Machine Reading" ware would initially be used for such tasks as automated military-intelligence analysis, but it would have wide consequences in civilian life as well.

As regular readers would expect, the auto-reader notion comes from DARPA. DARPA has the usual Pentagon revolving doors connecting it to the military-industrial complex and the ivory tower; it also has an express lift to the castle in the sky, a secret tunnel to the secure wing of the scientists' insane asylum and a special shooting range situated on both sides of the Grand Canyon - where only long shots can be taken.

DARPA explain the problem thus:

The U.S. military frequently faces impediments to stability and reconstruction operations in a new location due to the lack of understanding of the local situation. Similarly, strategic assessment of a foreign nation’s science and technology base involves the continuous assessment of technical articles, bibliographies, conference agendas, etc. This information is often available on the World Wide Web, and some tools to assist this analysis are available, but the process would be significantly enhanced by a system that could directly analyze the information found in these text sources. The same reasoning could be equally valuable if applied to other types of open-source intelligence analysis, including assessing military readiness and posturing; political speeches, actions, and more obscure “messages”; economic trends and sentiments; and propaganda from terrorist groups and even their hidden web-based communications.

In other words, rather than having thousands of expensive human intel analysts surfing the web and putting together reports, why not just have some computers?

DARPA graphic explaining how you evaluate AI auto-reader software

It's as simple as a funnel stuck into your head

Well, it seems that it's all a matter of reasoning. The DARPA people say that computer software, even software dubbed "AI", doesn't do well at pulling together information in different kinds of document the way a human can - and indeed struggles to tie together information in single documents.

The Pentagon brainiacs say that this is because computers are best at "formal" language. While they can work with text, if the text is written in "natural" human languages - for instance standard English prose, as opposed to data in fields - the machines don't do very well.

That's where "Machine Reading" AI-ware would come in. According to DARPA, what's needed is simple to describe in natural language:

A successful Machine Reading Program will be enabling all knowledge encoded as natural text to be combined with the power of AI reasoning methodologies, which will unleash a wide variety of new AI applications ranging from intelligent bots to personal tutors. For example, all of the text in the World Wide Web will become available for automating the monitoring and analysis of technological and political activities of nations; plans, rhetoric, and activities of transnational organizations; and scientific discovery within various disciplines.

However, there's another thing which doesn't lend itself to natural language apart from computers - that is, federal contract awards. There has to be a formal-language way to decide which competing Machine Reader systems are better than others, and indeed much of the DARPA solicitation (pdf) is devoted to accomplishing that very feat (see pic, which makes the methods clear even to the meanest intelligence).

Normally, of course, one looks at AI systems from DARPA and it's clear that if they work the consequences would be awful: humanity's few survivors scuttling like rats in the ruins of civilisation, etc.

In this case, the casualties might be more tightly focused. Essentially, anyone whose job involves primarily reading text on the internet and producing more text from it would be out of work. Graduate students in the humanities subjects, intelligence analysts, think-tank people, quangocrats ... and about 90 per cent of journalists.

Plainly a mad notion; it'll never happen. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Show us your Five-Eyes SECRETS says Privacy International
Refusal to disclose GCHQ canteen menus and prices triggers Euro Human Rights Court action
Heavy VPN users are probably pirates, says BBC
And ISPs should nab 'em on our behalf
Former Bitcoin Foundation chair pleads guilty to money-laundering charge
Charlie Shrem plea deal could still get him five YEARS in chokey
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
'Serious flaws in the Vertigan report' says broadband boffin
Report 'fails reality test' , is 'simply wrong' and offers ''convenient' justification for FTTN says Rod Tucker
FAIL.GOV – Government asks Dropbox for accounts that don't exist
Storage locker's transparency report shows rise in government data gobble attempts
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.