By: Lyvon T.
We put a lot of trust in the United States military to protect us from harm. To do that, they must have access to the best technology, such as data mining. Our military has always been collecting and storing data but in recent decades, the amount of data as increased to an extent that data mining software is needed to aide them in their work. Today, they use it in tactical systems, surveillance, and medical databases just to name a few. The ability to collect, analyze, and determine new information from that data is extremely useful to the military. Having access to useful information makes them more efficient in what they do.
Due to the nature of their work, the software they use must be perfect for the task needed, therefore they do not use public data mining tools like most organizations that use data mining. Almost all the software and technology is created by the Defense Advanced Research Projects Agency, also known as DARPA. Each individual data mining task, such as a missile deflection system, has a custom software created to aid that specific task. A good handful of new data mining software are listed on the DARPA website along with a brief description of it and the person who developed it. The website even has a catalog of the software they can share to the public but that part of the website is insecure and currently inaccessible.
One data mining software developed by DARPA is a Chaff Electronic Countermeasure System. It is used to detect missile near the ship, calculate the missile’s trajectory towards the ship and release chaff rockets to deflect the incoming missile to another calculated trajectory away from the ship. This was built to analyze and act faster than a captain of the ship. The software also has different modes to deflect the incoming missiles including seduction, distraction, and confusion that will be used automatically depending on the ship’s behavior, rockets available, and other factors. This is a very important on Navy ships.
Another data mining software created by DARPA is not used in combat, but medical field. The Joint Medical Asset Repository (JMAR) is a database used by Air Force, Army, and Navy to access the entire medical inventory owned by those sectors of the military but has technical difficulties in accessing the data so a data mining interface has been implemented. It is to improve the JMAR database with accessing hundreds of system inventory databases owned by the military, displaying the data on the supplies in an easy to read interface, and assisting in the transfer of large amounts of medical supplies to locations in need.
Data mining in the military has the same challenges that regular data mining has. There is poor quality/missing data, the amount of data, and the variety of data hey must worry about when managing their software. Also, due to being a part of the government, they must also be secretive about their work. They cannot release everything that they gather and create since it can easily land in the wrong hands. If an enemy was able to get their hands on certain data mining software for a surveillance system, they would be able to understand how it worked and find flaws in the software to break in to a military facility. DARPA only allows certain software to be public in their catalog for the protection of this country.
Data mining is extremely important and necessary for the military to operate they do today. All the useful data it produces to help in the efficiency of it as a whole is truly amazing. New data mining software is still developed constantly by DARPA to improve the way the military operates so it is not limited to the things I’ve described. On the battlefield and in he hospitals, data mining has surely changed the military for the better.
Ceruti, M. G. (2000). .The relationship between artificial intelligence and data mining: application to future military information systems. Systems, Man, and Cybernetics, 2000 IEEE International Conference on, Volume(3), pp. 1875.
Lee, W., Stolfo, S. J. & Mok, K. W. (1999). A data mining framework for building intrusion detection models. Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344). pp. 120-132.
Motta, A. A., Alves A. S., & Ebecken N. F. F. (2007). Data Mining In Military Systems. WIT Technology on Modelling and Simulation, Volume(45), pp. 171-180.
Sloane, E. B., Rosow, E., Adam, J., & Shine, D. (2006). JEDI – An Executive Dashboard and Decision Support System for Lean Global Military Medical Resource and Logistics Management. 2006 International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 5440-5443.
Sloane, E., Rosow, E., Adam, J., & Shine, D. (2006). Clinical/Biomedical Engineering Strategic Graphical Dashboard to Enhance Medical Device Maintenance and Asset Management”. Proceedings of the Twelfth Americas Conference on Information Systems, pp. 4587-4591.