Feeds

DARPA software to trawl Bin Laden laptops, thumb drives

Mil-spook gear to deal with haul from Special Ops raids

  • alert
  • submit to reddit

SANS - Survey on application security programs

Famous Pentagon mad-scientist bureau DARPA says it would like some miracle software to help hard-pressed US spooks and military intelligence officers trawl through the massive troves of imagery retrieved from gadgetry seized in the ongoing massive campaign of special-forces raids across southwest Asia.

The new project has been dubbed Visual Media Reasoning (VMR) and is the subject of a new solicitation (44-page/364KB PDF) issued this week by the military boffins. In the announcement, DARPA says:

VMR's focus is on extracting as much information as possible from fuzzy, noisy, and ill-posed images that have little or no associated metadata and originate from unknown sources and unknown context. These images may be from captured adversary cameras, laptops, and related devices ...

Another intended use case for the VMR program is longer-term forensic analysis on captured media done by investigators in support of theater operations.

It was widely reported that super-elite US Navy SEALs from the unit variously known as Team Six or the Naval Special Warfare Development Group (aka DevGru) seized a large stash of thumb drives, laptops and other gadgets at Osama bin Laden's Pakistani hideout after shooting the famous terrorist dead. That raid alone probably provided enough data to tie up a large number of human intelligence analysts from the military, CIA etc for a long time.

The elite-of-the-elite "Tier One" operatives of the US Joint Special Operations Command* alone are carrying out more than 1,700 raids in a year at the moment and the many other kinds of special forces active across Afghanistan and sometimes Pakistan, the Horn of Africa etc must be carrying out many more such operations. It seems likely that the haul of gadgetry loaded with data must be quite considerable, hence the DARPA push to automate more of the analysis.

According to DARPA:

Our adversaries frequently use video, still and cellphone cameras to document their training and operations and occasionally post this content to widely available websites. The volume of this visual media is growing rapidly and is quickly outpacing our ability to review, let alone analyze, the contents of every image. The VMR technology will serve as a "force-multiplier" by extracting tactically relevant information for the human analyst and alerting the analyst to scenes that warrant the analyst's expert attention ...

With the VMR solution, a warfighter in one military service branch can use the same cutting- edge facial recognition and geo-location technologies as an analyst in an intelligence agency and can avoid applying multiple software applications to extract different visual information from the same image. Imagine needing to use scores of different internet search engines in order to research a complex subject, because each search engine was limited to a particular type of content ...

If DARPA can crack the problem of automated image analysis, there would of course be many other applications for the tech than merely trawling through Osama bin Laden's personal gadgets. But there have been quite a few such military- and intelligence-funded efforts before, so the debut of VMR is probably more an indication that the need for such kit is growing, rather than a sign that it will soon be here. ®

Bootnote

*JSOC is thought to be made up of just three main operational units: Team 6/DevGru, Delta Force, and the constantly name-changing Intelligence Support Activity. There are tens of thousands of other US "Tier Two" special ops personnel such as ordinary SEALs, Rangers, Green Berets, Marine Force Recon etc – and allied units such as the British SAS, SBS and SFSG to boot.

Top three mobile application threats

More from The Register

next story
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
OpenBSD founder wants to bin buggy OpenSSL library, launches fork
One Heartbleed vuln was too many for Theo de Raadt
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.