The DIVA program is creating automatic activity detectors that can watch hours of video and highlight the few seconds when a person or vehicle does a specific activity (e.g., carry something heavy, load it into a vehicle, then drive away). These activity detectors work in single-and multi-camera streaming video environments, and can...
The CREATE program developed tools and methods designed to improve analytic reasoning through the use of crowdsourcing and structured analytic techniques. These new resources empower multi-disciplinary collaboration among analysts to provide the Intelligence Community with accurate, timely, and evidence-based analyses. Structured analytic...
CORE3D developed a methodology for the automated creation of dimensionally-accurate, realistic-looking, lightweight 3-D models from satellite imagery to provide situational awareness essential to military, humanitarian, and intelligence mission planning. Timely, spatially-accurate, and realistic models are essential for mission planning,...
UC Santa Cruz - Cryptographic techniques for computing have evolved rapidly over the past decade. Many advanced techniques are gaining traction in real-world applications, due in large part to the rise of decentralized cryptocurrencies and blockchains. ... The $14.7 million project is funded by the Intelligence Advanced...
Cyber-attacks evolve in a phased approach. Detection typically occurs in the later phases of an attack, and analysis often occurs post-mortem to investigate and discover indicators from earlier phases. Observations of earlier attack phases, such as target reconnaissance, planning, and delivery, may enable warning of significant cyber...
Power and cooling for large-scale computing systems are rapidly becoming unmanageable problems for the enterprises which depend on them. The trend towards large, centralized computing facilities to house supercomputers, data centers, and special purpose computers continues to grow, driven by cloud computing, support of mobile devices, Internet...
The BETTER program aims to dramatically compress the information discovery cycle for Intelligence Community analysts by designing systems that extract personalized, mission-relevant semantic information from text and leverage this information to substantially improve search capabilities Massive volumes of multilingual, unstructured...
The Amon-Hen program seeks innovative, low-cost approaches for passive, ground-based interferometric imaging of GEO satellites. The program is envisioned as a 33-month effort that is intended to begin by March2018. Phase 1 will last for a period of 15 months and will focus on the development of component technologies, physics-based system modeling ...
Nextgov - The intelligence community is working to build biometric identification systems that can single out individuals from hundreds of yards away or more, a feat that’s virtually impossible using the technology that exists today. Ultimately, the tech would let spy agencies rapidly identify people using cameras deployed on far off rooftops...
The Intelligence Advanced Research Projects Activity (IARPA), within the Office of the Director of National Intelligence, announces today a multi-year research effort called the Homomorphic Encryption Computing Techniques with Overhead Reduction (HECTOR) program. Today’s computing systems and data services are constrained by a small...
IARPA has laid the groundwork for two programs focused on ways to overcome adversarial machine learning and prevent adversaries from using AI tools against users. Read...
The Intelligence Advanced Research Projects Activity, within the Office of the Director of National Intelligence, announced today award of Phase 2 of the Molecular Analyzer for Efficient Gas-Phase Low-Power Interrogation program research contracts. Read...
The Atlantic - ...In 2005, [Philip] Tetlock published his results, and they caught the attention of the Intelligence Advanced Research Projects Activity, or IARPA, a government organization that supports research on the U.S. intelligence community’s most difficult challenges. In 2011, IARPA launched a four-year prediction tournament in which...
GCN - With the rise of adversarial AI, government researchers are looking for ways to automatically inspect artificial intelligence and machine learning systems to see if they've been tampered with. [...] The Army Research Office and the Intelligence Advanced Research Projects Activity are investigating techniques to spot...
Biometric Update - The U.S. government’s Intelligence Advanced Research Projects Activity (IARPA) is planning a pair of programs to prevent training data from being maliciously tampered with to turn artificial intelligence systems against their users.... One project, Trojans in Artificial Intelligence...
Chemical and Engineering News - For decades, theoretical physicists and computer scientists have been compiling evidence that quantum computers will eventually leave our current top-of-the-line supercomputers in the dust…. Quantum computers have been limited to simple problems because of their hardware. The basic elements of quantum...
Forbes - What if you could be warned about a scam email even before it arrived in your inbox? And what if you could be told exactly what it would say and what it would do to you and your computer? Back in 2015, the Intelligence Advanced Research Projects Activity (IARPA), a research unit within the Office of the Director of National...
Federal News Network - The intelligence community, like every other federal and private sector organization, suffers from the common employee disease of “linkclickitis.” It’s described by doctors as a condition where the employee has an uncontrollable urge to press the left button on the mouse while hovering over a link sent by...
Government CIO - In a near-future world of self-driving cars, delivery drones and even machine-piloted passenger planes whizzing about in a tidy, efficient metropolis, it’s not hard to imagine a scenario where one or more (or all) of the machines suddenly go haywire... The Intelligence Community’s research arm has one idea about how something ...
fedscoop - The most serious attack on an artificial intelligence system may not come from malware but rather from a single sticky note. ... Officials from the Intelligence Advanced Research Projects Activity (IARPA) are looking for a software package that could help thwart such a scenario, known as Trojan or backdoor attack, and are reaching out t...