This solicitation is now closed
Rapid Identification of Asymmetric Threat Networks from Large Amounts of Unstructured Data
Navy SBIR 2008.1 - Topic N08-084
ONR - Mrs. Tracy Frost - [email protected]
Opens: December 10, 2007 - Closes: January 9, 2008

N08-084 TITLE: Rapid Identification of Asymmetric Threat Networks from Large Amounts of Unstructured Data

TECHNOLOGY AREAS: Information Systems, Battlespace

ACQUISITION PROGRAM: PMA 480 AT/FP(Anti Terrorism/ Force Protection); ACAT II

The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), which controls the export and import of defense-related material and services. Offerors must disclose any proposed use of foreign nationals, their country of origin, and what tasks each would accomplish in the statement of work in accordance with section 3.5.b.(7) of the solicitation.

OBJECTIVE: Develop algorithms and technologies that will rapidly process massive amounts of unstructured data in order to expose at risk populations and determine the likelihood of threat activity in time to warn or intervene. It is most desirable that the large volumes of data be processed on laptop computers forward deployed as opposed to reach back nodes. The technical objective is to develop neural networks that are able to understand how word, entity and theme occurrence can be used as a predictor of risk. Developed neural network based analysis tools need to be able to model a new domain quickly, requiring only months of past data. Once trained, the analysis tool should be capable of monitoring a large number of processed open sources in real time, monitoring trends and threats. Warnings and intervention shall consist of determining impending threats in order to quickly generate the actionable intelligence needed to accelerate the friendly strategic communications and/or force planning decision-making and execution cycle. This faster cycle will increase friendly operational tempo, depriving asymmetric and irregular foes of the initiative and forcing them into reactive modes, thus rendering them susceptible to disruption, manipulation, and defeat. Databases to be considered are open source intelligence (OSINT) including BLOGs and other available unstructured data sources.

DESCRIPTION: Most unstructured inputs are currently analyzed using manual or automatic extraction technologies in order to identify entities of interest and link them in relation to times, places and events. Unstructured data is numerically reduced and inputted to graph analysis systems. This SBIR will explore automatic analysis of reduced unstructured data using artificial neural networks in order to enable trend analysis of at risk populations and the measurement of threat levels. The inputs to the neural net can be themes, specific words or bundles of words, mentions of entities, or entity relationships found in open source references pertaining to an area of interest.

Anticipated asymmetric and irregular adversaries are ever-changing entities, often seeking to hide among indigenous populations and exhibiting decentralized, yet self-synchronizing, network structures, as well as the ability to quickly adjust their techniques, tactics, and procedures (TTP) in response to U.S. actions. Future threats will most assuredly be more adaptive, deadly, complicated, and harder to discern than those the US currently faces.

It is understood that blind extraction of relevant predictive information (as actionable intelligence) from such a large set of data is an inherently complex computational problem. However, the potential for approximate but fast and robust computational algorithms exists. Neural networks are generally relevant to this class of problem.

PHASE I: Develop an approach that will support the processing of large streams of unstructured data using artificial neural networks. The approach should be efficient and timely to minimize processing power requirements to enable real-time or near real-time operation. The offeror may use as is or improve existing open source word, entity and theme tools to create the structured input needed by the analysis tool

PHASE II: Develop a prototype system that uses artificial neural networks to predict trends in at risk populations and threat levels by processing large unstructured data streams in near real time. The offeror may use a mixture of existing tools and new tools to rapidly create structure out of large amounts of unstructured text.

PHASE III: Demonstrate the products developed under Phases I and II can perform in operational systems via real field or simulated demonstrations. Provide software and hardware packages for field use as appropriate.

PRIVATE SECTOR COMMERCIAL POTENTIAL/DUAL-USE APPLICATIONS: Homeland Security initiatives are driving municipal, county, state, and federal agencies to obtain an interoperable communications capability. The technology developed from this topic is directly applicable to these non-DOD threat-warning applications.

REFERENCES:
1. Abdi, Herve (1994). A Neural Network Primer, School of Human Development: The University of Texas at Dallas, Richardson, TX http://www.utdallas.edu/

herve/abdi.primer.pdf

2. Bar-Yam, Yaneer (2003). Dynamics of Complex Systems, Chapter 2. http://necsi.org/publications/dcs/Bar-YamChap2.pdf

3. Bar-Yam, Yaneer (2003). Dynamics of Complex Systems, Chapter 3. http://necsi.org/publications/dcs/Bar-YamChap3.pdf

4. Bar-Yam, Yaneer (2005). Making Things Work. http://necsi.org/publications/mtw/

5. A close view to Artificial Neural Networks Algorithms (2007). http://www.learnartificialneuralnetworks.com/

KEYWORDS: fast, robust, artificial neural network algorithms

TPOC: Martin Kruger
Phone: 703-696-5349
Fax:
Email: [email protected]
2nd TPOC: Geoffrey Main
Phone: (703)696-1180
Fax:
Email: [email protected]
3rd TPOC: Andre des Rosiers
Phone: (202) 404-4436
Fax:
Email: [email protected]

** TOPIC AUTHOR (TPOC) **
DoD Notice:  
Between November 13 and December 9, 2007, you may talk directly with the Topic Author(s) to ask technical questions about the topics. Their contact information is listed above. For reasons of competitive fairness, direct communication between proposers and topic authors is
not allowed starting December 10, 2007, when DoD begins accepting proposals for this solicitation.
However, proposers may still submit written questions about solicitation topics through the DoD's SBIR/STTR Interactive Topic Information System (SITIS), in which the questioner and respondent remain anonymous and all questions and answers are posted electronically for general viewing until the solicitation closes. All proposers are advised to monitor SITIS (08.1 Q&A) during the solicitation period for questions and answers, and other significant information, relevant to the SBIR 08.1 topic under which they are proposing.

If you have general questions about DoD SBIR program, please contact the DoD SBIR Help Desk at (866) 724-7457 or email weblink.