Feeds

DARPA, US Army seek 'social computing' tech

Not Deathbook/Facekill; more Asimov 'Psychohistory'

Securing Web Applications Made Simple and Scalable

The social computing phenomenon continues to spread, with news now emerging that Pentagon warboffins are commencing work on a military project entitled "Technologies for the Applications of Social Computing (TASC)" - meant to "support leadership decision making at the strategic, operational, and tactical levels".

But this is not Facebook-style social computing: it's more like gas dynamics for human beings.

The attempt to harness the awesome power of networked social interactions for the benefit of the US war machine comes, of course, from DARPA - the military research bureau so far beyond the bleeding edge it serves moon-on-a-stick as canapés.

The US warboffins seem to use the phrase "social computing" more to indicate a simulation or model than in the online-chumship sense. According to a request for whitepapers issued this week, the agency wants nothing less than a sort of automated, rigorous science of people-en-masse:

The Defense Advanced Research Projects Agency (DARPA), Information Processing Techniques Office (IPTO), invites ... the development of new technologies to rapidly create theoretically-informed, data-driven models of complex human, social, cultural, and behavioral dynamics that are instantiated in near-realtime simulations ... technologies of interest include the formalization and semantic representation of social science theories, the semantic integration of disparate types of social science data, techniques for analyzing these data, and efficient computational techniques for rapid data processing.

DARPA anticipates all these technologies would be integrated to develop a flexible, modular social simulation system that integrates sound social science theory with real world data, that facilitates a wide spectrum of military and intelligence applications, and that supports reliable, real-world decisions ...

They really should have called it Computer Psychohistory, it seems to us, rather than "social computing" - but perhaps nobody at IPTO has read Isaac Asimov's Foundation novels, unlikely as that seems.

Meanwhile the regular US Army has also made a similar effort this week, handing out $2m to research engineers in Arizona. Professor Jerzy Rozenblit of Arizona Uni and his team will use this cash to develop software with similar Psychohistory-esque capabilities to those of the proposed TASC.

"I call it CPR, which in this case stands for conflict prediction and resolution," says Rozenblit. "Ultimately, these mathematical tools are intended to generate solutions that give us equilibrium, or status quo solutions."

According to the university's PR department:

It is compelling to imagine what the world look like today had such software been available during historical asymmetric conflicts, such as between the Greeks and Persians at Thermopylae, or the Rebels and British during the Revolutionary War ... this project is entering the realm of science fiction ... [the software's] potential spreads far beyond the limits of defense ... into the financial world, for example ...

Or indeed into establishing political hegemony over the entire human race. Fortunately projects like this seldom really work. Pesky free will or Heisenberg or something gumming up the works, maybe. ®

Application security programs and practises

More from The Register

next story
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.