Information Awareness Office
According to the official U.S. Government web site, the Mission of the DARPA Information Awareness Office (IAO) is to "imagine, develop, apply, integrate, demonstrate, and transition information technologies, components, and prototype closed-loop information systems that will counter asymmetric threats by achieving total information awareness that is useful for preemption, national security warning, and national security decision making."
Attempting to traverse the quagmires and mine fields of jargon in the "official" IAO Vision, example technologies, and programs literally can boggle the mind:
"The most serious asymmetric threat facing the United States is terrorism, a threat characterized by collections of people loosely organized in shadowy networks that are difficult to identify and define. IAO plans to develop technology that will allow understanding of the intent of these networks, their plans, and potentially define opportunities for disrupting or eliminating the threats. To effectively and efficiently carry this out, we must promote sharing, collaborating and reasoning to convert nebulous data to knowledge and actionable options. IAO will accomplish this by pursuing the development of technologies, components, and applications to produce a proto-type system."
Example technologies include:
- Collaboration and sharing over TCP/IP networks across agency boundaries.
- Large, distributed repositories with dynamic schemas that can be changed interactively by users.
- Foreign language machine translation and speech recognition.
- Biometric signatures of humans.
- Real time learning, pattern matching and anomalous pattern detection.
- Entity extraction from natural language text.
- Human network analysis and behavior model building engines.
- Event prediction and capability development model building engines.
- Structured argumentation and evidential reasoning.
- Story telling, change detection, and truth maintenance.
- Business rules sub-systems for access control and process management.
- Biologically inspired algorithms for agent control.
- Other aids for human cognition and human reasoning.
"It is difficult to counter the threat that terrorists pose. Currently, terrorists are able to move freely throughout the world, to hide when necessary, to find unpunished sponsorship and support, to operate in small, independent cells, and to strike infrequently, exploiting weapons of mass effects and media response to influence governments. This low-intensity/low-density form of warfare has an information signature, albeit not one that our intelligence infrastructure and other government agencies are optimized to detect. In all cases, terrorists have left detectable clues that are generally found after an attack. Even if we could find these clues faster and more easily, our counter-terrorism defenses are spread throughout many different agencies and organizations at the national, state, and local level. To fight terrorism, we need to create a new intelligence infrastructure to allow these agencies to share information and collaborate effectively, and new information technology aimed at exposing terrorists and their activities and support systems. This is a tremendously difficult problem, because terrorists understand how vulnerable they are and seek to hide their specific plans and capabilities. The key to fighting terrorism is information. Elements of the solution include gathering a much broader array of data than we do currently, discovering information from elements of the data, creating models of hypotheses, and analyzing these models in a collaborative environment to determine the most probable current or future scenario. DARPA has sponsored research in some of these technology areas, but additional research and development is warranted to accelerate, integrate, broaden, and automate current approaches."
- Total Information Awareness (TIA) System
- Effective, Affordable, Reusable Speech-to-Text (EARS)
- Evidence Extraction and Link Discovery (EELD)
- Genoa II
- Human ID at a Distance (HumanID)
- Translingual Information Detection, Extraction and Summarization (TIDES)
- Wargaming the Asymmetric Environment (WAE)
Related SourceWatch Resources
- Total Information Awareness Resource Center. A source of information and action regarding the Total Information Awareness program for concerned citizens, legislators and the media.
- Information Awareness Office.
- John Sutherland, No more Mr Scrupulous Guy. How one of the two brains behind the Iran-Contra scandal this week became one of America's most powerful men, Guardian Unlimited, February 18, 2002.
- SRS Technologies, News Release, April 19, 2002: "SRS Technologies was recently selected as the single prime contractor to support DARPA's Information Awareness Office. We are excited and proud to be supporting this group, and their initiatives in the development of technologies and systems to 'counter asymmetric threats by achieving total information awareness useful for preemption and security warning & decision-making.'"
- Information Awareness Office. How's This for Paranoid?, July 22, 2002. Contains definitions and links.
- Remarks as prepared for delivery by Dr. John Poindexter, Director, Information Awareness Office of DARPA, at DARPATech 2002 Conference, Anaheim, Calif., August 2, 2002.
- Jesse Walker, Artifact: No Go Logo. Creepy agency casts evil eye on Planet Earth, reasononline.com, October 2002.
- Robert O'Harrow, Jr., U.S. Hopes to Check Computers Globally. System Would Be Used to Hunt Terrorists, The Washington Post, November 12, 2002.
- Anthony Lappé, Information Awareness Office Goes Primetime, Guerrilla News Network, November 14, 2002
- Charles V. Peña, Information Awareness Office Makes Us a Nation of Suspects, CATO Institute, November 29, 2002.
- Information Awareness Office Website Deletes Its Logo, The Memory Hole, December 18, 2002.
- K.A. Taipale, Data mining and Domestic Security: Connecting the Dots to Make Sense of Data, Center for Advanced Studies in Science and Technology Policy. 5 Columbia Sci. & Tech. L. Rev 2 (December 2003).