Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Intelligence Agencies Seek Tools To Predict Global Events

IARPA wants to analyze data from websites, blogs, wikis, social media and other sources to better predict events such as international crises and disease or violence outbreaks.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
The research arm for federal intelligence agencies is seeking to mine data from websites, blogs, social media, and other public information to help it better forecast global events.

The Intelligence Advanced Research Project Agency's (IARPA) Open Source Indicators (OSI) Program aims to develop technology for "continuous, automated analysis" of data from myriad Web-based sources to predict when events such as disease outbreaks, political and humanitarian crises, riots, economic instability, mass violence and resource shortages may occur, according to a solicitation on its website.

"Many significant societal events are preceded and/or followed by population-level changes in communication, consumption, and movement," according to the solicitation. "Some of these changes may be indirectly observable from publicly available data, such as Web search queries, blogs, micro-blogs, Internet traffic, financial markets, traffic webcams, Wikipedia edits, and many others."

IARPA's interest in the program is based on research that claims these data sources are useful for early detection of events, but that currently there aren't methods for aggregating and integrating data available from multiple sources to come up with accurate predictions.

Those interested in responding to IARPA's request for information should be prepared to offer information for developing methods for using population behavior change in anticipation of and response to events of interest, and for processing publicly available data that reflect those population behavior changes.

IARPA also is looking for ideas to develop data-extraction techniques focusing on volume rather than depth, and an innovative use of statistical methods to fuse combinations of time series to generation event warnings, among others.

IARPA's interest in developing better event-prediction technologies is not new. The agency already is developing software that can aggregate knowledge from different analysts and generate probable forecasts for a range of events through the Aggregative Contingent Estimation (ACE) program.

Using social media data for analysis purposes also is an interest of the Defense Advanced Research Project Agency (DARPA), the Department of Defense's (DOD's) research arm.

Through a program called Social Media in Strategic Communication, DARPA wants to use social media activity to help the DOD better understand the environment in which it operates and use information more nimbly to support its missions.

Attend Enterprise 2.0 Santa Clara, Nov. 14-17, 2011, and learn how to drive business value with collaboration, with an emphasis on how real customers are using social software to enable more productive workforces and to be more responsive and engaged with customers and business partners. Register today and save 30% off conference passes, or get a free expo pass with priority code CPHCES02. Find out more and register.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15570
PUBLISHED: 2020-07-06
The parse_report() function in whoopsie.c in Whoopsie through 0.2.69 mishandles memory allocation failures, which allows an attacker to cause a denial of service via a malformed crash file.
CVE-2020-15569
PUBLISHED: 2020-07-06
PlayerGeneric.cpp in MilkyTracker through 1.02.00 has a use-after-free in the PlayerGeneric destructor.
CVE-2020-7690
PUBLISHED: 2020-07-06
It's possible to inject JavaScript code via the html method.
CVE-2020-7691
PUBLISHED: 2020-07-06
It's possible to use <<script>script> in order to go over the filtering regex.
CVE-2020-15562
PUBLISHED: 2020-07-06
An issue was discovered in Roundcube Webmail before 1.2.11, 1.3.x before 1.3.14, and 1.4.x before 1.4.7. It allows XSS via a crafted HTML e-mail message, as demonstrated by a JavaScript payload in the xmlns (aka XML namespace) attribute of a HEAD element when an SVG element exists.