Feeds

DARPA, US Army seek 'social computing' tech

Not Deathbook/Facekill; more Asimov 'Psychohistory'

Reducing security risks from open source software

The social computing phenomenon continues to spread, with news now emerging that Pentagon warboffins are commencing work on a military project entitled "Technologies for the Applications of Social Computing (TASC)" - meant to "support leadership decision making at the strategic, operational, and tactical levels".

But this is not Facebook-style social computing: it's more like gas dynamics for human beings.

The attempt to harness the awesome power of networked social interactions for the benefit of the US war machine comes, of course, from DARPA - the military research bureau so far beyond the bleeding edge it serves moon-on-a-stick as canapés.

The US warboffins seem to use the phrase "social computing" more to indicate a simulation or model than in the online-chumship sense. According to a request for whitepapers issued this week, the agency wants nothing less than a sort of automated, rigorous science of people-en-masse:

The Defense Advanced Research Projects Agency (DARPA), Information Processing Techniques Office (IPTO), invites ... the development of new technologies to rapidly create theoretically-informed, data-driven models of complex human, social, cultural, and behavioral dynamics that are instantiated in near-realtime simulations ... technologies of interest include the formalization and semantic representation of social science theories, the semantic integration of disparate types of social science data, techniques for analyzing these data, and efficient computational techniques for rapid data processing.

DARPA anticipates all these technologies would be integrated to develop a flexible, modular social simulation system that integrates sound social science theory with real world data, that facilitates a wide spectrum of military and intelligence applications, and that supports reliable, real-world decisions ...

They really should have called it Computer Psychohistory, it seems to us, rather than "social computing" - but perhaps nobody at IPTO has read Isaac Asimov's Foundation novels, unlikely as that seems.

Meanwhile the regular US Army has also made a similar effort this week, handing out $2m to research engineers in Arizona. Professor Jerzy Rozenblit of Arizona Uni and his team will use this cash to develop software with similar Psychohistory-esque capabilities to those of the proposed TASC.

"I call it CPR, which in this case stands for conflict prediction and resolution," says Rozenblit. "Ultimately, these mathematical tools are intended to generate solutions that give us equilibrium, or status quo solutions."

According to the university's PR department:

It is compelling to imagine what the world look like today had such software been available during historical asymmetric conflicts, such as between the Greeks and Persians at Thermopylae, or the Rebels and British during the Revolutionary War ... this project is entering the realm of science fiction ... [the software's] potential spreads far beyond the limits of defense ... into the financial world, for example ...

Or indeed into establishing political hegemony over the entire human race. Fortunately projects like this seldom really work. Pesky free will or Heisenberg or something gumming up the works, maybe. ®

Maximizing your infrastructure through virtualization

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.