New Microchip Increases Military Intelligence

A new microchip could change life on the battlefield for US troops by bringing the massive data crunching power of multi-computer neural networks, a dream of the 1970s and 80s, into handheld devices.

The chip, announced by a team of researchers from MIT and funded by the Defense Advanced Research Projects Agency, or DARPA, could enable a smartphone-sized device to perform deep-learning functions.

What can the military do with deep learning? Effectively executing complex operations in places like Syria, Iraq, and Afghanistan is no longer just a matter of guts and glory. It’s also dependent on accessing and processing information in real time. The military has an abundance of data but always claims a shortage of useful intelligence. Consider that in 2011, during the height of the Iraq and Afghanistan Wars, the US Air Force was processing 1,500 hours of full-motion video and 1,500 still images taken from aerial drones every day.

When satellites or drones collect high-resolution photographs or video, it’s human operators that have to do the job of classifying all the objects in that footage. Did someone just move a missile launcher within range of a forward operating base, or is that just a strangely shaped pile of debris? Is that white van the same one that was on that street during last month’s IED attack? Or is it a different one? Is that bearded insurgent Abu Bakr al-Baghdadi or just a regular radical?

“Full exploitation of this information is a major challenge,” officials at DARPA wrote in a 2009 announcement on deep learning. “Human observation and analysis of [intelligence, surveillance and reconnaissance] assets is essential, but the training of humans is both expensive and time-consuming. Human performance also varies due to individuals’ capabilities and training, fatigue, boredom, and human attentional capacity.”

The promise of mobile deep learning for the military is in shrinking large “neural networks” into the palm of a soldier’s hand.  Neural networks are a technology that emerged in the 1970s to great hype and fanfare. They’re a method of information processing inspired by organic central nervous systems. Nodes establish links to other nodes in patterns to hold information in a sort of code somewhat the way that the synaptic connections in your brain hold information.

Fitting neural networks (of the sort that perform deep learning) into smaller platforms could enable drones to do that sort of object recognition on board, without sending imagery back to an overworked human analyst or a data processing center halfway around the world. It could also enable a team of special operators to do the same, using their own drones, portable cameras, or other devices, to make positive identifications of people or objects without human analysts far away looking at the footage.

Imagine a special operator getting a push notification the moment that a small camera on the other side of town detects–and correctly identifies–a particular person walking into a particular house. That sort of capability would require computers that are small enough to be inconspicuous in the sorts of places soldiers operate but that can also learn to recognize different people or objects. Those are among the many military applications for deep learning and neural networks.
 
In the seventies and throughout the eighties, the processing power didn’t exist to turn the concept of computer neural networks into anything useful in an information technology environment. Neural networks have since re-emerged thanks to the efforts of Google (and researchers like Andrew Ng at Stanford) who put them back on the map in 2012 with the announcement that they had used neural networks and deep learning to improve by 70 percent the ability of artificial intelligence to correctly recognize objects.  

But neural networks remain energy intensive and relatively inefficient. To do deep learning right, you currently need computational resources in the form of servers or large computers. That means if you want to access deep learning processes on your smartphone it probably has to be connected to the Internet and thus a different computer. That’s not ideal for anyone working from a forward operating base or disaster zone.

“Right now, the networks are pretty complex and are mostly run on high-power [graphical processing units]. You can imagine that if you can bring that functionality to your cell phone or embedded devices, you could still operate even if you don’t have a Wi-Fi connection. You might also want to process locally for privacy reasons. Processing it on your phone also avoids any transmission latency, so that you can react much faster for certain applications.” MIT’s Vivienne Sze explained in a press release. It also would allow for compartmentalizing sensitive intelligence or mission information from wider dissemination.  

Here’s how it works: the MIT researchers’ breakthrough microchip, dubbed “Eyeriss,” minimizes the number of times that the chip’s 168 cores have to access a memory bank, a process that eats away at energy efficiency in conventional graphical processing units, or GPU, chips. Every core in Eyeriss has its own memory. In effect, it’s like creating the functionality of 168 chips on a wafer where there was just one. That could lead to a pocket–sized device that can perform deep learning functions independently, potentially bringing a lot more brains into the devices that soldiers carry with them into the precision-guided counterterrorism battles of today and tomorrow.

DefenseOne:

« Cybersecurity Is A Great Career Choice
Twitter Steps Up Efforts To Combat ISIS »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

2|SEC Consulting (2-SEC)

2|SEC Consulting (2-SEC)

At 2|SEC Consulting, we deliver an end-to-end service of cyber and information security solutions which are tailored to each client’s exact security needs.

Freshfields Bruckhaus Deringer

Freshfields Bruckhaus Deringer

Freshfields Bruckhaus Deringer is a global law firm with a track record of successfully supporting the world's leading corporations, financial institutions and governments.

ABL Cyber Academy

ABL Cyber Academy

ABL provide certified training courses in the field of cyber security and IT project management.

Center for Identity - University of Texas at Austin

Center for Identity - University of Texas at Austin

The mission of the Center is to deliver the highest-quality discoveries, applications, education, and outreach for excellence in identity management, privacy, and security.

ComCERT

ComCERT

ComCERT SA is an independent, private consulting company focusing in the assistance of its customers facing the dangers of cyber threats and security incidents.

Wipro

Wipro

Wipro Limited is a leading global information technology, consulting and business process services company.

AXA XL

AXA XL

AXA XL is the P&C and Specialty Risk Division of AXA. Professional insurance products include Cyber Insurance.

Carbonite

Carbonite

Carbonite offers all the tools necessary for protecting data from the most common forms of data loss, including ransomware, accidental deletions, hardware failures and natural disasters.

GrrCON

GrrCON

GrrCON is an information security and hacking conference that provides the Midwest InfoSec community with a fun atmosphere to come together and engage with like minded people.

Basque Digital Innovation Hub (BDIH)

Basque Digital Innovation Hub (BDIH)

The aim of the BDIH initiative is to provide industrial enterprises, especially SMEs, with the technological capabilities needed to meet the challenges of industry 4.0.

Founder Shield

Founder Shield

Founder Shield is a data driven insurance brokerage focused excusively on rapidly evolving high-growth companies.

e360

e360

e360 (formerly Entisys360) is an award-winning IT consultancy specializing in advanced IT infrastructure, virtualization, security, automation and cloud first solutions.

Blue Cedar

Blue Cedar

Blue Cedar's mobile app security integration platform secures and accelerates mobile app deployment for enterprises and government organizations around the world.

Evanssion

Evanssion

Evanssion is a value added distributor specialized in Cloud Native & Cyber Security across Middle East & Africa.

Trenton Systems

Trenton Systems

Trenton Systems are committed to providing high-performance computing solutions to customers running mission-critical applications in harsh settings worldwide and across various industries.

BioID

BioID

BioID are a German company offering deepfake detection, liveness detection, facial authentication & identity verification as a Service.