How big data is paying off for DOD

There’s no silver bullet to handling huge sets of data, but the military is finding ways to put analytics to use.

The same big data techniques used by businesses to mine databases are being adopted by the military to glean more information from many different types of data it collects—from drones, automated cybersecurity systems, terrorist databases and many other sources. The technology will not only help warfighters on the battlefield, it will also be used to improve fields ranging from software development to vehicle maintenance. SSC-PAC is developing something to do just that. “The  [RAPIER] project takes satellite images and detects ships, providing data like size, heading and speed,” said Heidi Buck, head of its Automated Imagery Analysis Group. “We could put this on a satellite or UAV so the platform does the processing and only sends the results.”

Big Data 1 DARPA illustration

Analysts can monitor more inputs when computer analysis highlights potential areas of interest.


The hard part, of course, is making good use of all the information that’s becoming so easy to collect. And although no one claims to have completely solved the big data puzzle, the Navy, like the other services, is finding ways to take advantage of the power of analytics.

At a basic level, big data takes over the grunt work of sifting through reams of information that would be just about impossible for humans to handle. Networked systems pull together input from a large number of sensors on unmanned aerial vehicles and satellites along with many other data sources. Humans can analyze some of this information, but there’s more information to be mined from the thousands of gigabytes being continuously generated. Computer analysis can handle mundane tasks, freeing humans to do chores that better fit their talents.

“Big data is a force multiplier for the folks making decisions,” said Thomas “Lee” Zimmerman, head of the Communication and Networks Department at the Space and Naval Warfare Systems Command’s Systems Center Pacific (SSC-PAC). “People are good at recognizing patterns and making judgments, but they’re not as good in rote tasks like looking for tiny ships on a huge ocean.”

Many of the Defense Department’s big data projects aim to make the best use of unmanned aerial vehicles. Some are designed to help analyze files, while others aim to use UAVs more efficiently for intelligence, surveillance and reconnaissance (ISR) work, which at times can come down to something as simple—though potentially huge—as storage.

“One challenge with UAVs is the vast amount of data they collect,” said Christopher Raney, head of SSC-PAC’s Command and Control Technology and Experimentation Division. “Video is often dropped on the floor; it’s not stored. If you put it in the cloud, you can save a lot of time. Widgets can be installed on UAVs to store select information.”

UAV inputs to cloud

This sequence shows a data cloud growing from UAV inputs--more than 10,000 inputs in 17 seconds.


He explained that when UAVs are scouring the seas for mines, for instance, a UAV operator and analyst typically work together. If the analyst is unsure about an area and wants to double-check it, the controller will have to send the UAV back over that section again. But if that data were stored, that section could be flagged for later review and the UAV could continue its planned flight path.

Data mining software can also spot objects of interest so analysts don’t have to personally scour huge images. Finding ships at sea is a primary example. Computers can quickly search for items that are likely to be ships. If these programs are put on smart sensors in the air, the volume of data will be reduced, freeing up bandwidth for other types of sensors.

Analytics software ship ID

Software can pinpoint ships so analysts don’t have to scour the seas to find vessels


Rapid Image Exploitation Resource

Targeted information

As more of this defense data is stored in the cloud, keeping it secure becomes a greater challenge. Making files accessible to most or all warfighters also makes data more of a target for foes. New technical solutions are being used to ensure that adversaries don’t alter data.

“From a cyber perspective, can adversaries inject disinformation into our systems?” said Peter Tran, senior director of RSA’s Advanced Cyber Defense Practice. “Counter analytics look for disruption, for example looking at UAV inputs that usually come in a pattern. If there’s a sudden change in the pattern, our software flags the anomaly.”

Cyber tools can also help analysts monitor the chatter that moves over various Web channels. Computers can find links between various online avatars and aliases, sifting through millions of transmissions to find communication patterns that may show closeness with known bad actors.

“The software can look at an actor’s handles and see who they’re talking to,” Tran said. “There’s such a conveyor belt of data that it’s difficult for humans to know what’s important or what’s not. It’s not just the huge volume of daily data. Computers can look at communications over far longer time spans.”

Beyond the battlefield

Battlefield uses get a lot of attention, but big data techniques aren’t limited to ISR. Many projects focus on the support infrastructure. Big data techniques, for example, can help maintenance personnel reduce downtime and guide programmers to potential bugs.

One critical focal point is to reduce the amount of time that vehicles and other equipment spend in the shop. There’s a major effort to move to predictive diagnostics, which tell maintenance personnel when problems are imminent. Prognostics also maximize routine maintenance, monitoring parts so services are provided only when necessary instead of on scheduled times.

“When the hard disk drive comes off a V-22,* it has all the characteristics from the flight,” Raney said. “We can see the number one problem with V-22s and examine the sensor readings around the problem point. We can build a database that tells us which readings are indicators that a failure is imminent so repairs can be done when they’re necessary.”

Big data techniques are also being used to help DOD stay ahead in the technology race. One Defense Advanced Research Projects Agency program—Mining and Understanding Software Enclaves, or MUSE—aims to help programmers find open-source modules that can be plugged into their application packages. Software analysis techniques can help these programmers save time by determining whether the program will work and whether it has any potential problems.

“Military programmers are increasingly relying on open source. There’s a push to use it more for both front line and back office applications,” said Suresh Jagannathan, a program manager at DARPA. “Most of it is good. As long as the errors are small, we can mask out the errors. We look at similarities with known good Java and C programs that behave in a similar way, comparing them to a new open-source program. If the new program has an anomaly, we can track it to see if the anomaly is a bug or a vulnerability.”

These techniques are particularly useful in the large, complex programs used to manage many different levels of manpower and equipment. In these multifaceted programs, it’s far harder to find problems than in smaller applications.

“The real benefits arise in programs that are complex with mission-critical characteristics,” Jagannathan said. “You can save a tremendous amount of time and cost by synthesizing open source programs. When there are hundreds of thousands of lines of code, big data techniques can spot the anomalies and detect bugs.”

The human factor

While technology is the central element in big data analytics, humans obviously play an important role. All computer systems must be designed so people can gain benefits without investing a lot of time. System designers must focus on the ways users interact with systems and those in charge of users must be sure that maximizing the results provided by big data systems is part of the military culture.

If big data schemes are to work, all parties need to understand that their cooperation is a critical factor. Even with DOD’s focus on building the Joint Information Environment and sharing information, many commanders want to hold onto their data, citing a range of reasons. But computer systems tasked with finding links within large data sets will be more efficient and effective if they have as much relevant data as possible. Commanders and other personnel will have to be trained to pass their data on for further analysis.

“Getting access to data is the first part of the problem,” Raney said. “We also have to change the mindset from ‘need to know’ to ‘need to share.’ That’s a cultural change that may take a while.”

It’s also important to remember that the point of big data is to limit the data that reaches a user’s eyes. Analytics systems will send analysts alerts when the computer finds something that needs further attention. But the programmers who set up the big data parameters will have to be sure they’re not overloading operators with false positives.

“If we send too many alerts, users will not trust the system,” Buck said. “We need to work closely with the operators to avoid that. We want to present data to analysts and let them make the decisions. We also need to provide warfighters with a way to select the information they want for their requirements. It’s not a one-size-fits-all solution.”

There’s another spot where big data and humans come together—when it might actually be better for humans, rather than computer programs, to do search and analysis. This approach can be particularly effective when it’s difficult to precisely categorize search parameters. For example, in the event of a large societal conflict, thousands of military personnel could be tasked with examining border crossings—a tactic that is part of a research program for natural disasters to help the Navy, which is often a first responder.

“We’re looking at crowdsourcing,” Buck said. “Instead of using a computer for analysis, thousands of people look at images for something like a large disaster, when there might be thousands of square kilometers of damage. People can pick out problems. We don’t need to train the computer to find what we want.”

*Correction: An earlier version of this story incorrectly quoted Raney as saying "B-22."

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.