Back to news

November 5, 2020 | International, C4ISR, Security

Pentagon research office wants innovative tools to spot influence campaigns

WASHINGTON — A new broad agency announcement shows that the Pentagon's top research arm wants to work with industry to develop technology that can track adversarial influence operations across social media platforms.

The announcement from the Defense Advanced Research Projects Agency (DARPA) for a project called INfluence Campaign Awareness and Sensemaking (INCAS) will use an automated detection tool to unveil influence operations online.

“INCAS tools will directly and automatically detect implicit and explicit indicators of geopolitical influence in multilingual online messaging to include author's agenda, concerns, and emotion,” the BAA reads.

The BAA comes as the federal government seeks solutions to defend against foreign influence campaigns, particularly surrounding political campaigns, that aim to sow discord among Americans with inflammatory messages.

“The US is engaged with its adversaries in an asymmetric, continual, war of weaponized influence narratives. Adversaries exploit misinformation and true information delivered via influence messaging: blogs, tweets, and other online multimedia content. Analysts require effective tools for continual sensemaking of the vast, noisy, adaptive information environment to identify adversary influence campaigns,” the BAA reads.

Through the project, DARPA seeks to improve upon current social media tools to track influence operations. The current tools, the solicitation reads, requires a major manual effort in which analysts have to sift through “high volumes” of messages and decide which ones are relevant and gaining traction, using tools for digital marketing.

“These tools lack explanatory and predictive power for deeper issues of geopolitical influence,” the solicitation reads. “Audience analysis is often done using static, demographic segmentation based on online and survey data. This lacks the flexibility, resolution, and timeliness needed for dynamic geopolitical influence campaign detection and sensemaking.”

The program has five technical areas. Technical area one focuses on using automated influence detection to enable analysts to analyze influence campaigns. The second area will “dynamically segment" the population that is responding to influence campaigns, and identify “psychographic attributes relevant to geopolitical influence,” such as “worldviews, morals and sacred values.”

The INCAS tool's third technical area will assist analysts in linking influence indicators and population response over time across several platforms, in order to capture influence campaigns as they evolve over time. The fourth area will create infrastructure to provide data feeds from online sources to the other three technical areas, and the final technical area will conduct technology evaluations and will not be competed as part the the BAA.

DARPA expects multiple awards for technical areas one and two, and single awards for technical areas three and four. Abstracts are due Nov. 17, 2020, with proposals due Jan. 8, 2021. Awards will be made around July 2012 using standard procurement contracts or Other Transaction Agreements.

https://www.c4isrnet.com/artificial-intelligence/2020/11/03/pentagon-research-office-wants-innovative-tools-to-spot-influence-campaigns/

On the same subject

  • Why the Navy wants more of these hard-to-find software developers

    April 20, 2018 | International, Naval

    Why the Navy wants more of these hard-to-find software developers

    By: Mark Pomerleau With a relative dearth of cyber expertise in the military, Congress mandated last year the services begin direct commissioning pilot programs. The Navy, however has been doing direct commissioning for highly skilled software engineers for a few years, albeit on a small scale. The cyber warfare engineer (CWE) program is a highly competitive program with officers on five year rotations performing software or tool development for cyber operators. CWEs serve as members of the cyber mission force, the Navy's cyber mission force teams that serve as the cyber warriors for U.S. Cyber Command, producing cyber tools, but can also conduct target analysis, vulnerability research, and counter-measure development against malicious cyber activities. Since 2011, the Navy has only recruited 25 of these commissioned officers to its ranks. “Twenty-five developers in the Navy as military officers is definitely not enough,” Lt. Christopher Liu, the most senior cyber warfare engineer told Fifth Domain in an interview at the Navy League's Sea Air Space conference April 9. With a relative dearth of cyber expertise in the military, Congress mandated last year the services begin direct commissioning pilot programs. The Navy, however has been doing direct commissioning for highly skilled software engineers for a few years, albeit on a small scale. The cyber warfare engineer (CWE) program is a highly competitive program with officers on five year rotations performing software or tool development for cyber operators. CWEs serve as members of the cyber mission force, the Navy's cyber mission force teams that serve as the cyber warriors for U.S. Cyber Command, producing cyber tools, but can also conduct target analysis, vulnerability research, and counter-measure development against malicious cyber activities. Since 2011, the Navy has only recruited 25 of these commissioned officers to its ranks. “Twenty-five developers in the Navy as military officers is definitely not enough,” Lt. Christopher Liu, the most senior cyber warfare engineer told Fifth Domain in an interview at the Navy League's Sea Air Space conference April 9. “We definitely need to increase the billets and increase the amount that we can hire ... to have more talents to be able to work on the cyber mission,” he said. “As soon as the number increases, we'll be able to expand the program rather than just five years to eight years, hopefully make it into a 20 year career so people can get trained up and work on missions and not be forced into different fields.” The Pentagon has been besieged by concerns about the DoD's ability to both retain and attract cyber talent among its ranks when similar jobs in the private sector pay significantly more. Vice Adm. Michael Gilday, commander of 10th Fleet/Fleet Cyber Command, acknowledged in recent congressional testimony that the military is not competitive with the private sector and noted that the base pay for the CWE position is around $37,000 a year. “That's what we pay somebody to answer the phones around here,” Senator Claire McCaskill, responded to Gilday interrupting him in frustration. “We're asking them to have incredible expertise. That seems to me totally unrealistic.” Some current CWEs feel the work they're doing inside the Navy has greater meaning than similar work they did in the private sector. “I find that this is a lot more fulfilling,” Ensign Jordan Acedera, the most junior CWE told Fifth Domain. “You finish a project, you're given something that's a lot more challenging and that really tests you.” For Lt. (j.g.) George John, who was formerly writing software at a stock trading company, work with the CWE provides a better environment that's not driven so much by profit margins and hitting quarterly revenue targets. “We don't have to worry about profitability or bringing to market,” he said. “We can pursue a little more ... what's possible. Throw stuff against the wall, see what sticks, take our time to figure out a plan of action.” One of the biggest challenges, however, is lack of knowledge of the program, even inside the Navy. “You still walk across captains and commander who say 'CWE, what in god's name is that,” John said. With more CWE personnel in the force, the Navy could build a more informed and skilled software engineering cadre, the group said. “There's tons of software. Everybody has some type of software pet project,” John said. “To be able to get more CWEs on those things and coordinate with one another and say here's what [Consolidated Afloat Networks and Enterprise Services] is doing with their communications and their infrastructure. How are we doing that differently on the base side? You can talk and address security concerns with one another. Just within the cyber operations realm, Liu said, as the headcount increases, the CWEs could work on the requirements the operational community within the cyber mission force rather than having to prioritize projects. They could even start to look at developing capability prior to a specific requirement coming in as a means of staying ahead of the game as opposed to waiting for and reacting on requirements from operators. https://www.defensenews.com/digital-show-dailies/navy-league/2018/04/11/why-the-navy-wants-more-of-these-hard-to-find-software-developers/

  • Italy signals slowdown on F-35 orders

    November 12, 2018 | International, Aerospace

    Italy signals slowdown on F-35 orders

    By: Tom Kington ROME — Italy will stretch out the order of F-35 fighter jets, buying six or seven of the aircraft in the next five years instead of the previously planned 10 jets, a government source told Defense News. The decision follows a review of the program by Italy's populist government, which took office in June and is mulling defense spending cuts to pay for social welfare programs and cover tax cuts. The source said the plan did not envisage a reduction in orders, merely a slowdown of intake, which would leave the decision of the total F-35 purchase to a future government. Previous governments planned to buy 60 F-35As and 30 F-35Bs for a total of 90 aircraft. The new government will focus on spending plans over its five-year mandate and not beyond, the source said, adding that discussions are underway with the U.S. about the change in schedule. The decision on the slowdown keeps with Italian policy on the F-35 set out by Defence Minister Elisabetta Trenta after she took office in June. “What I would like to do is lighten the load, since we have other spending commitments in Europe. We will try to stretch out deliveries instead of cutting the order, which would reduce offsets and mean penalties,” she told Defense News at the time. Italy has taken delivery of 10 F-35As and one F-35B. Two of the "A" models as well as the "B" model are being used for training in the U.S., while eight "A" models are now based at the Italian Air Force's base in Amendola, southern Italy. Trenta was tapped for office by the Five Star party, one of two political parties in Italy's current coalition government. Five Star politicians took a hostile line toward the F-35 program before taking office, at one point promising to scrap it. However, a defense spending document released last month suggests the government will maintain spending on the program in the next two years, with €766 million (U.S. $874 million) due to be spent in 2019 and €783 million in 2020. Those figures should be treated as provisional until the overall budget is signed in Parliament in the coming weeks. Five Star politicians have also shown hostility toward another U.S. defense program — the ground station planned in Sicily to support the Mobile User Objective System, or MUOS, network, a U.S. Navy-run satellite network providing voice and data communications to U.S. military personnel and platforms around the world, even when they are under thick forest canopies. Long held up by legal challenges in Sicily amid health fears, sources have said the MUOS antenna in Sicily could soon see final approval from the Italian government. https://www.defensenews.com/air/2018/11/09/italy-signals-slowdown-on-f-35-orders

  • Trump anxiety spurs investment in European defence startups

    August 22, 2024 | International, Aerospace, C4ISR, Security

    Trump anxiety spurs investment in European defence startups

All news