Feeds

DARPA wants to out-Google-Google

A boutique chocolate factor to counter slavery

Internet Security Threat Report 2014

The military, researchers, and spooks have long known of the value of public domain information, and now DARPA wants to create a search engine to out-Google-Google in the business of organising that information.

The agency has put out a call for developers to work on “domain-specific indexing, domain-specific search, and DoD-specified applications”.

DARPA's complaint is that the Internet search paradigm isn't really so useful for a specialist: going after information with Google “remains a largely manual process that does not save sessions, requires nearly exact input with one-at-a-time entry, and doesn't organize or aggregate results beyond a list of links,” the agency says.

The agency also remarks that the so-called “deep web” is missed by standard search engines (hence the name), and that search engines like Google and Bing “ignore shared content across pages”.

It also has an application for the project: first up, it wants to use the search engine to combat human trafficking: “The use of forums, chats, advertisements, job postings, hidden services, etc., continues to enable a growing industry of modern slavery. An index curated for the counter-trafficking domain, along with configurable interfaces for search and analysis, would enable new opportunities to uncover and defeat trafficking enterprises,” DARPA's release states.

It's called on a name from the past for the program: Memex, coined in a 1945 The Atlantic Monthly article by Vannevar Bush, director of the US Office of Scientific Research and Development during WW2. Bush imagined a “mesh of associative trails” running through documents to help users both search and gain insights from the information available to them.

DARPA is at pains to emphasise that Memex isn't interested in de-anonymisation applications, nor does it want the search engine attribute identity to IP addresses or servers, nor access information not intended to be published. ®

Beginner's guide to SSL certificates

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Microsoft to bake Skype into IE, without plugins
Redmond thinks the Object Real-Time Communications API for WebRTC is ready to roll
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
Mozilla: Spidermonkey ATE Apple's JavaScriptCore, THRASHED Google V8
Moz man claims the win on rivals' own benchmarks
Yes, Virginia, there IS a W3C HTML5 standard – as of now, that is
You asked for it! You begged for it! Then you gave up! And now it's HERE!
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Ubuntu 14.10 tries pulling a Steve Ballmer on cloudy offerings
Oi, Windows, centOS and openSUSE – behave, we're all friends here
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.