AI Satellite Image Analysis Will Be Regulated

Satellite programs have generally been some of the most secret  spying  programs. The first such program to take pictures from space, Corona, began in 1958, when the satellite successfully recorded its first  film. Only a few days later US President Dwight Eisenhowe was shown a spool of celluloid film with detailed images of  military installations in the old Soviet Union. 

Today, the use of  Artificial Inelligence (AI) to analyse satellite images could  revolutionise the way governments and researchers track changes in the world around them. 

But if you’re a US maker of such software, it’s about to become harder to export your products. New US Federal rules published on 6th January, affects software ‘specially designed’ to train deep learning neural networks on the analysis of geospatial imagery.

The software would be classified as a dual-use technology under the, Wassenaar Arrangement subject to many of the same restrictions for exporting arms. The Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies is a is a multilateral export control regime (MECR) with 42 participating states including many former Warsaw Pact countries.

The Wassenaar Arrangement was established to contribute to regional and international security and stability by promoting transparency and greater responsibility in transfers of conventional arms. 

The Bureau of Industry and Security (BIS) of the US Commerce Department has released for publication in the Federal Register an interim final rule, along with a request for comments, to amend the Export Administration Regulations (EAR). The aim is to make certain software specially designed to automate the analysis of geospatial imagery subject to the EAR and to impose a license requirement for the export and re-export of this software to all destinations, except Canada.

The new rule will go into effect in 60 days, though the public may submit comments on the rule for another 60 days after that. The rule affects software that would “provide a graphical user interface that enables the user to identify objects (e.g., vehicles, houses, etc.) from within geospatial imagery”.

Also software that “Trains a Deep Convolutional Neural Network to detect the object of interest from the positive and negative samples; and identifies objects in geospatial imagery using the trained Deep Convolutional Neural Network.”

Applying machine learning to the identification of objects in satellite imagery is a big US military concern.

Military leaders frequently talk about the wide disconnect between the amount of video and satellite footage that the United States collects and scarcity of analysts to look through the footage and see what’s relevant to operations.They’ve invested a-lot in software tools that can monitor or scan that footage, including satellite footage, and then tip a human analyst to pay attention to something of relevance. 

One of the best example is Project Maven, a military AI project to identify objects of interest or detect changes in scenery to help analysts and operators cut through lots of imagery and footage very quickly. The US military isn’t the only group or entity with a legitimate interest in overhead satellite imagery, and possibly automating the detection of objects of interest in that imagery.

For instance, hedge funds and other financial analysts use satellite images to predict retail trends, such as parking lot density around the holidays.Also healthcare researchers and epidemiologists can use satellite footage to track health trends also by monitoring parking lot density at hospitals and clinics.Non-profit civic research groups use satellite images to draw global attention toward events and happenings like resource pillaging and ethnic cleansing.

The rule change would have big effects for the future of software makers that are looking to produce AI tools for the analysis of satellite photos. But it could also, potentially, have a chilling effect on the ability of civilian groups to monitor changes and events of public interest.

DefenseOne:        KPMG:      The Verge:      National Security Arcive 1:     

National Security Archive 2:     Wassenaar Arrangement:

You Might Also Read:

Satellite Imagery + Social Media = A New Way To Spot Emerging Nuclear Threats:

Chinese Satellite Sends Hack-Proof Messages:



 

« Five Risks That Will Define Cyber Security In 2020
Online Bank Fraud Is Up 40% In The UK »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

SecureDevice

SecureDevice

SecureDevice is a Danish IT Security company.

Kivu Consulting

Kivu Consulting

Kivu Consulting combines technical and legal expertise to deliver data breach response, investigative, discovery and forensic solutions worldwide.

CodeSealer

CodeSealer

CodeSealer provide invisible end-to-end user interface protection with a unique web security solution to eliminate Man-in-the-Middle and Man-in-the-Browser vulnerabilties.

MaskTech

MaskTech

MaskTech supplies highest security embedded chipsets, operating systems and related middleware for electronic identification cards, travel documents and authentication solutions.

Network Integrated Business Solutions (NIBS)

Network Integrated Business Solutions (NIBS)

NIBS is an IT services provider offering a range of services with the aim of simplifying and securing technology.

Aporeto

Aporeto

The Aporeto platform protects cloud applications from attack by authenticating and authorizing all communications with a cryptographically signed identity assigned to every workload.

GoCyber

GoCyber

GoCyber is a new, highly innovative cyber security training app that uses action based learning to significantly improve the online behaviour of all employees in less than a month.

Cysiv

Cysiv

Cysiv SOC-as-a-Service combines all the elements of an advanced, proactive, threat hunting SOC, with a managed security stack for hybrid cloud, network, and endpoint security.

swIDCH

swIDCH

swIDch is a technology company that aims to eliminate CNP (card not present) Fraud.

Tetrad Digital Integrity (TDI)

Tetrad Digital Integrity (TDI)

TDI is a world-class consulting firm offering cybersecurity services to government agencies and commercial clients around the world.

Lifetech

Lifetech

Lifetech is a software development, product engineering and system integration company. Cybersecurity services include SIEM deployment and training.

Real Protect

Real Protect

Real Protect is a Brazilian provider of managed security (MSS) and cyber defense services.

ORS Consulting

ORS Consulting

ORS Consulting is a specialist provider of risk management advisory services supporting asset-intensive industries such as chemicals, energy, power and utilities, defence and maritime.

8com

8com

8com is an established Managed Security Service Provider (MSSP) with over 75 employees and customers in over 40 countries.

Aeries Technology

Aeries Technology

Aeries is a technology services organization offering capabilities in Technology Services, Digital Transformation, and Business Process Management.

NopalCyber

NopalCyber

NopalCyber makes cybersecurity manageable, affordable, reliable, and powerful for companies that need to be resilient and compliant.