{"id":33286,"date":"2017-08-03T06:00:09","date_gmt":"2017-08-02T20:00:09","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=33286"},"modified":"2017-08-02T16:35:04","modified_gmt":"2017-08-02T06:35:04","slug":"big-data-national-security","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/big-data-national-security\/","title":{"rendered":"Big data in national security"},"content":{"rendered":"
<\/figure>\n

Big-data analytics and machine-learning algorithms have been key drivers for a number of high-profile developments over the past year. Data was used by Google DeepMind\u2019s AlphaGo first to smash through the AI winter, and then to surpass contemporary development projections by 10 years. Facebook has begun using similar learning algorithms<\/a> to detect and remove terrorist content and messaging. And the Brexit campaign and Donald Trump\u2019s election as US president<\/a> illustrated how big-data profiling and algorithmically generated \u2018news\u2019 can influence public sentiment.<\/p>\n

Today, ASPI released two research publications<\/a> that will add further granularity to Australia\u2019s public policy dialogue on big data in national security. The research was conducted with the support and sponsorship of DXC Technology<\/a>, formerly CSC Australia.<\/p>\n

The Strategic Insights report, Big data in national security<\/em>, provides a high-level summary of the concepts, applications and challenges of the use of big data in national security and gives a general and accessible explanation of big data. It concludes with recommendations on how the national security community should best govern its implementation and use of big data.<\/p>\n

ASPI\u2019s Big data in national security: online resource<\/em> provides a more detailed analysis of the key concepts, trends and challenges of this vexing policy issue.<\/p>\n

Big data is now widely used, but there hasn\u2019t been a corresponding increase in strategic public policy discussions on how the Australian government should use and manage a big-data capability.<\/p>\n

The Productivity Commission\u2019s report on data availability and use<\/a> provided a welcome start to discussions on how to improve data governance<\/a>. However, there\u2019s been scant informed discussion on the uses of big data by the national security community.<\/p>\n

Instead, media-led discourse has focused on government-mandated \u2018back doors\u2019 into encrypted messages<\/a> and the use of \u2018metadata\u2019. Unsurprisingly then, there\u2019s been no public discussion of the limitations of, challenges for and risks from the use of big data. Improving Australia\u2019s public policy dialogue will be an essential step in engendering public trust in the use of big data<\/a>.<\/p>\n

Big data in national security can assist in automatically indexing and integrating masses of unstructured information into a searchable feed. Data mining for knowledge discovery<\/a> can go through that data to uncover patterns and correlations. Those patterns and trends could then be used in predictive analytics.<\/p>\n

Several challenges arise in an age of big data. First, implementing big-data technology and practice is complex and expensive. Second, statistical issues of false-positive and false-negative results, the presence of bias in the data, and the potential for feedback loops mean that aggressive big-data projects will need similarly extensive audit and review functions. Maintaining that level of audit and review may be difficult as analytics programs become less interpretable. Third, reputational risks can arise from big-data analysis that is conducted without rigour and causes harm, as has been the case in the \u2018Robodebt\u2019 controversy<\/a>.<\/p>\n

Moreover, big-data capabilities are increasingly available to adversaries outside of the national security community. Hackers targeting Twitter accounts have been able to demonstrate<\/a> machine-learning algorithms that automatically learn details about targets, tailor a hook of personal interest based on those details, and send automated and highly effective spear-phishing communication.<\/p>\n

Adversarial attacks against big-data analysis systems have been shown to destroy the system\u2019s predictive performance. The attacks are able to \u2018poison\u2019 the malware detection algorithms used in anti-viruses<\/a> and to cause autonomous vehicles\u2019 vision systems to misinterpret stop signs and cause collisions<\/a>. That comes in addition to widespread and ongoing structural erosions to privacy and the security of personal information that have dominated the national security policy discussion.<\/p>\n

To effectively manage those challenges, benefit from the use of big-data analytics, and improve public confidence and personal information security, data governance needs to be made more explicit and systematic across the national security community and the wider Australian government.<\/p>\n","protected":false},"excerpt":{"rendered":"

Big-data analytics and machine-learning algorithms have been key drivers for a number of high-profile developments over the past year. Data was used by Google DeepMind\u2019s AlphaGo first to smash through the AI winter, and then …<\/p>\n","protected":false},"author":608,"featured_media":33296,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[646,301,107],"class_list":["post-33286","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-big-data","tag-national-security-2","tag-policymaking"],"acf":[],"yoast_head":"\nBig data in national security | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/big-data-national-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Big data in national security | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Big-data analytics and machine-learning algorithms have been key drivers for a number of high-profile developments over the past year. Data was used by Google DeepMind\u2019s AlphaGo first to smash through the AI winter, and then ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/big-data-national-security\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-02T20:00:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-08-02T06:35:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/08\/Big-data-report-graphic-5.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"385\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Chi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Chi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/big-data-national-security\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/08\/Big-data-report-graphic-5.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/08\/Big-data-report-graphic-5.jpg\",\"width\":640,\"height\":385},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/big-data-national-security\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/big-data-national-security\/\",\"name\":\"Big data in national security | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/big-data-national-security\/#primaryimage\"},\"datePublished\":\"2017-08-02T20:00:09+00:00\",\"dateModified\":\"2017-08-02T06:35:04+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/bf73a1a4a3c6adc42839e2f406680bb9\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/big-data-national-security\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/big-data-national-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/big-data-national-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Big data in national security\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/bf73a1a4a3c6adc42839e2f406680bb9\",\"name\":\"Michael Chi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9308fb9be6733bb4692a599b680cd09c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9308fb9be6733bb4692a599b680cd09c?s=96&d=mm&r=g\",\"caption\":\"Michael Chi\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/michael-chi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Big data in national security | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/big-data-national-security\/","og_locale":"en_US","og_type":"article","og_title":"Big data in national security | The Strategist","og_description":"Big-data analytics and machine-learning algorithms have been key drivers for a number of high-profile developments over the past year. Data was used by Google DeepMind\u2019s AlphaGo first to smash through the AI winter, and then ...","og_url":"https:\/\/www.aspistrategist.ru\/big-data-national-security\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2017-08-02T20:00:09+00:00","article_modified_time":"2017-08-02T06:35:04+00:00","og_image":[{"width":640,"height":385,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/08\/Big-data-report-graphic-5.jpg","type":"image\/jpeg"}],"author":"Michael Chi","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Michael Chi","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/big-data-national-security\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/08\/Big-data-report-graphic-5.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/08\/Big-data-report-graphic-5.jpg","width":640,"height":385},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/big-data-national-security\/","url":"https:\/\/www.aspistrategist.ru\/big-data-national-security\/","name":"Big data in national security | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/big-data-national-security\/#primaryimage"},"datePublished":"2017-08-02T20:00:09+00:00","dateModified":"2017-08-02T06:35:04+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/bf73a1a4a3c6adc42839e2f406680bb9"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/big-data-national-security\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/big-data-national-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/big-data-national-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Big data in national security"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/bf73a1a4a3c6adc42839e2f406680bb9","name":"Michael Chi","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9308fb9be6733bb4692a599b680cd09c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9308fb9be6733bb4692a599b680cd09c?s=96&d=mm&r=g","caption":"Michael Chi"},"url":"https:\/\/www.aspistrategist.ru\/author\/michael-chi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/33286"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/608"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=33286"}],"version-history":[{"count":9,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/33286\/revisions"}],"predecessor-version":[{"id":33300,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/33286\/revisions\/33300"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/33296"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=33286"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=33286"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=33286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}