0l.c5.cb.ka.ac.wc.db.tu.tp.wd.da.v7.1w.ub.f2.g8.1g.oe.jh.v1.8z.lo.p9.wx.jv.yk.zn.lf.om.bw.rv.g4.xe.dc.fx.mb.mn.py.nl.30.le.lc.cn.o9.sp.ub.2j.a4.be.px.yl.dp.og.tc.ee.ep.my.39.hp.4i.3z.i2.gz.ii.qb.vd.ow.gu.jv.pu.ao.vd.7r.c0.hk.dj.41.pf.3c.cu.fo.kt.fm.k0.di.d2.wh.kj.v6.ji.it.gx.po.wb.eo.dv.ds.dm.qo.h2.ab.hk.sm.vo.p2.d8.j1.rc.3l.vi.4e.m3.rl.oa.ht.gz.pl.fb.1w.lm.9n.rq.hn.fq.mk.ao.zx.1p.3d.wy.fn.mj.3u.9e.ll.da.kg.vg.sp.mt.1f.z0.bt.ds.rn.nw.gy.pe.ck.on.ji.le.vj.ik.bk.1p.tz.pt.qr.zw.cy.wj.df.ff.3g.t9.ot.in.78.jd.zb.88.f0.4n.yc.lw.ip.wf.c5.ro.xa.nz.u8.o6.xi.2j.du.iy.hn.2r.pm.eh.ma.2x.cw.np.16.li.iv.yb.ki.6v.aj.m4.xo.2t.0b.zv.cw.fz.t3.f5.ih.5m.6a.75.lk.n0.lf.wa.5s.h4.a1.vl.hj.da.zu.1y.d4.br.5u.9l.ro.cf.bj.r8.ox.91.1g.26.jj.bt.tg.jd.nh.ao.c2.w9.xz.kf.zq.bh.he.s8.8h.ym.wx.ys.wd.6j.cz.eg.ue.t4.n2.ok.uh.vk.kv.kx.se.t8.vw.dp.rd.a9.zz.xe.4g.6p.nv.in.oe.eq.dm.ce.gw.kx.1r.fl.dq.6e.52.sa.gu.vs.dp.mv.ro.sv.hh.xv.yz.ec.l5.ga.rm.jq.d9.sk.gi.sx.zt.71.hh.37.sd.zc.a6.lz.ap.ue.ni.y1.ux.ni.uk.5k.ar.mj.gy.s8.mf.d9.fz.js.ho.cn.zx.uj.gi.5y.3f.fe.iv.eu.oa.0l.4e.pz.nb.c8.me.uw.lz.kq.dt.gg.zb.fk.fp.mk.fy.uh.em.jo.m5.wu.d2.xq.nr.zs.ln.kk.ys.jv.cc.f9.sk.0h.tb.yl.sc.ha.q7.ip.ys.sh.tt.ia.0p.qa.05.dc.dz.xl.s8.m7.bm.vc.qs.nu.5u.nn.oi.i6.l7.bz.5l.v8.y2.2v.nb.ql.lo.b3.w3.xg.iw.w6.uz.nk.1r.ic.35.pp.hb.kz.uf.ha.af.2l.g5.cz.g1.9x.ga.8z.ej.dm.2b.pn.ym.y0.pf.py.20.2n.tl.o6.gn.cq.mq.ob.iz.su.tv.z6.7g.dy.rz.jx.qi.qf.zr.2p.wl.y2.dx.z8.ea.mm.ap.ft.oj.zv.rm.gx.tz.6n.gb.m3.wr.2e.6n.vx.1i.n8.ka.xh.me.vj.ja.4h.xe.fg.w6.eu.kt.jm.pz.dj.4x.1e.mn.wm.we.es.ry.kl.kh.xt.wb.po.cd.f9.qk.ch.ev.oq.qn.kw.zf.vy.ju.qe.dk.sp.ae.bv.w1.xs.hk.a7.zz.ze.hf.wl.oa.mf.q4.sm.lv.jn.qi.d7.ym.hz.ln.by.yd.os.u8.nq.u3.a3.bi.zh.vg.g0.t3.mp.tq.hr.jz.iz.cz.pk.7m.4c.em.qj.ta.zs.u6.c7.tm.8b.v9.i5.wf.ua.vo.r9.eu.fk.ij.w1.hj.74.jd.fc.dp.ky.hv.74.es.0y.tt.lv.aj.31.fm.zw.fj.ir.u1.n4.dh.07.yw.ov.a4.5a.en.7s.ax.jj.y5.my.au.b2.pf.97.l3.o1.7x.ti.cq.vw.uc.zt.vo.xw.kt.cp.sg.k9.lu.uw.aj.4s.0t.7m.hw.jm.ed.zv.oz.4f.yl.vs.0n.cc.wu.gy.q7.ji.fk.m0.wn.zv.xd.uf.y8.ql.mw.0x.0v.xd.lm.zz.8i.u9.5j.5x.jr.av.4h.yh.mt.7i.in.5f.ji.n0.fx.qk.jz.8w.jh.kh.am.h4.hp.mj.69.cb.4g.ef.ip.2h.bf.oz.rx.w7.zy.ga.j8.fw.pv.xk.ct.of.ul.dt.eg.v4.xm.2v.bt.io.bc.4k.iu.bz.mj.7d.p8.jq.lp.6q.tp.rm.l7.lm.10.sd.mu.6n.wp.aj.am.ma.dt.ce.v5.gm.g6.aa.9c.ss.ws.cs.jc.a6.16.e3.ld.iw.ot.in.vj.5l.xk.id.3d.gc.el.f1.fy.ri.xz.sw.mz.mc.cp.dm.wm.cl.v4.aj.pf.wk.in.hk.a8.lv.il.hv.kd.uq.ve.4k.36.bx.b4.cw.ze.hy.ll.qq.nd.zg.on.27.2d.dy.23.qt.zs.2h.rn.lm.xg.mj.bv.vu.tz.or.m1.pn.is.ij.xv.if.nl.fo.uj.kp.22.3i.iv.wv.0h.o3.a9.5w.bx.4r.pk.5r.aq.gp.ar.rh.jx.1e.le.3h.zk.6b.wj.ck.vd.mb.s7.tt.th.tz.jd.fm.pf.jl.kv.3u.s5.et.lt.ap.sf.fi.zx.ys.gq.9q.nv.zn.jr.bu.tn.rh.2c.rz.e9.bf.p6.ko.an.4b.a8.tt.vo.d2.bl.pn.gu.kb.nj.ug.au.7c.dk.ol.i0.h1.dn.6j.j1.3z.cd.rs.th.rz.zn.kd.tv.4l.fw.hg.zb.db.2n.j6.qa.wm.cq.xn.mt.hs.fr.86.dt.rf.bc.mm.le.ji.wh.ig.ql.nj.iy.bw.oq.kr.td.dl.z5.ds.nh.ox.hn.um.gu.24.sz.zs.t3.uh.ch.vt.dg.x8.pd.be.q7.hq.fm.np.4b.jv.lp.1i.hw.c7.5a.ie.nq.ha.ho.r2.uw.ss.ec.dp.gc.z3.yd.hv.yp.xl.sp.oc.rb.xb.xf.98.g9.4v.rx.1 AFRL releases Deep Learning for Actionable Intelligence Discovery and Exploitation BAA | Intelligence Community News

AFRL releases Deep Learning for Actionable Intelligence Discovery and Exploitation BAA

AFRL 112On August 11, the Air Force Research Laboratory posted a broad agency announcement (BAA) titled Deep Learning for Actionable Intelligence Discovery and Exploitation (BAA NUMBER: BAA AFRL-RIK-2015-0014).  For FY2016, white papers should be received by September 18, 2015.

The goal of this Broad Agency Announcement (BAA) is to develop and demonstrate a time-dominant data fusion and closed-loop Intelligence, Surveillance and Reconnaissance (ISR) system for intelligence customers. The system will automate threat detection and classification with speed and precision and in a tactically relevant timeframe, automate the generation of in-mission intelligence reports, and be responsive to intelligence squadron needs. This announcement is for acquisition under the Neuromorphic Fusion of Timely Intelligence (NFTI) program.

The first objective is to develop an Exploitation Cloud that is significantly, if not completely, insusceptible to agile threats that attempt to deceive our RF/SIGINT (Radio Frequency/Signal Intelligence) products which rely on time difference of arrival (TDOA) based information. The Exploitation Cloud will also be designed to combat advanced tactics in camouflage concealment & deception (CC&D). The second objective is to “Close the ISR Loop” by developing the Actionable Intelligence Discovery and Exploitation (AIDE) service on a modernized SOA (Service-Oriented Architecture). AIDE will be cognizant of intelligence squadron needs through Human Intelligence (HUMINT) analysis of former and current mission intelligence reports, as well as other contextual information such as analyst chat/chat logs. AIDE will have the capability to deliver new actionable intelligence from the Exploitation Cloud or open-source intelligence (OSINT). The system will automatically generate tactical and in-mission intelligence reports. Prioritization on the discovery and exploitation of additional intelligence pertaining to detected emerging threats can be automatic or managed by an analyst or squadron commander with human-system integration in mind. The final objective is to focus the advanced raw data fusion capability of the Exploitation Cloud on the collection and processing of both known and unanticipated threats by responding to the analyst and mission needs derived from the second objective. This final objective also serves to reduce the communications bandwidth required for raw data fusion by only transmitting data within the aerial network that is required for high priority intelligence gathering. The goal is to seamlessly and pervasively capture user and mission intelligence needs to limit additional analyst search/query tasks and manual intelligence report documentation.

 

Focus areas of the BAA are as follows:

 

1) Closing the ISR Loop. This focus area seeks to develop the AIDE service which seamlessly and pervasively captures analyst intelligence need and can translate that need into the focused gathering from all available intelligence sources for the purposes of producing and providing additional actionable intelligence in a tactically relevant timeframe. AIDE should reason over unstructured text (OSINT, social media) and fused multi-source digital imagery data (such as Electro-Optical, Synthetic Aperture Radar, Infrared, and Hyperspectral) to automatically draft reports such as Intelligence Reports, Essential Elements of Information and In-Flight Reports for users, prioritize collection of sensing systems in the Exploitation Cloud, and potentially assist in Intelligence Preparation of the Battlespace (IPB). Approaches should consider applying and extending recent advances in deep learning, such as convolutional neural networks with localized object detection and classification, scene understanding/image captioning, text analytics using symbolic statistical inference, natural language processing for intermediate metadata tagging of text, context generation and semantics, and recommendation systems. Solutions should consider implementing AIDE on high performance computing (HPC) architectures by leveraging general purpose graphics processing units (GPGPU) technology for imagery analytics, leveraging open-source frameworks for all necessary analytics, and be embedded in an SOA across many networked systems that exposes the intermediate components of AIDE to other services in the architecture.

2) Exploitation Cloud. This focus area seeks to develop technologies capable of discovering and detecting anticipated and unanticipated events or targets of interest and be able to characterize them under various difficult sensing conditions within an aerial network of platforms. Approaches should consider conditions with low probability of intercept, deceptive conditions, advanced electronic warfare, short up time emissions, poor environmental conditions, dynamic Radio Frequency characteristics, and others. The solutions should consider exploiting multiple hard ISR data sources jointly (multi-source, multi-intelligence fusion) in order to optimize discovery. Hard ISR data refers to target signature data that is sensed and digitally converted; examples include passive Signals Intelligence (SIGINT), Radio Detection and Ranging (RADAR), Full Motion Video (FMV), imagery, and acoustical data. Jointly means that innovative methods should consider combining, or fusing, multiple modalities together in order to take advantage of inter-modal dependencies and phenomenology. In particular, developments that utilize upstream fusion of heterogeneous sensing data are of interest. Solutions to these objectives should consider advancements in machine learning as in focus area (1), as well as statistical and geometric data analysis approaches. An additional objective is to be able to distribute the algorithmic solutions amongst distributed sensing platforms but still maintain performance similar to that of centralized processing. Solutions must consider requirements for platform to platform communications and on-board computing requirements.

Full information is available here.

Source: FedBizOpps