12
Total Information Awareness with Informational Transparency in Secure Channels March 16, 2005 Core Ontology safeguarding national security Ontology Tutorial 2, copyright, Paul S Prueitt 2005

Total Information Awareness with Informational Transparency in Secure Channels March 16, 2005 Core Ontology safeguarding national security Ontology Tutorial

Embed Size (px)

Citation preview

Page 1: Total Information Awareness with Informational Transparency in Secure Channels March 16, 2005 Core Ontology safeguarding national security Ontology Tutorial

Total Information Awareness with

Informational Transparency in

Secure Channels

March 16, 2005

Core Ontology

safeguarding national security

Ontology Tutorial 2, copyright, Paul S Prueitt 2005

Page 2: Total Information Awareness with Informational Transparency in Secure Channels March 16, 2005 Core Ontology safeguarding national security Ontology Tutorial

The BCNGroup Inc, is a not for profit foundation registered in the Commonwealth of Virginia. www.bcngroup.org since 1997.

Our conjecture is that a new open systems based science is being created.

• The formalism extends Hilbert type mathematics.

• Human-centric Information Production (HIP) replaces the current Information Technology paradigm.

A proposal is currently directed towards government agencies who need ontology management systems. Proposals have been discussed in the context of a Treasury / IC / DHS / State Department knowledge science and technology program.

The second step in this program is to develop an universally accessible CoreSystem CoreOntology expression medium. (20 M over two years) Current and future relevant IP will be compensated according to a Red hat type business model.

The third step is to fund the development of a K-12 curriculum in the knowledge sciences. (1.2 B over five years) This funding is offset by reducing funding for computer science and IT programs.

Page 3: Total Information Awareness with Informational Transparency in Secure Channels March 16, 2005 Core Ontology safeguarding national security Ontology Tutorial

Semantic Extraction

Link Analysis

Pattern recognition

Ontology Tools

Statistics

Cyber Security Data

National Targeting Center Data

Detailed work with tools over available data

Practical problem: Limited access to data means that who gets the right to work on the solution is strongly constrained by business criterion. A Core System CoreOntology would change this circumstance.

Integrated collection of reified ontologies with specific inferences, information organization and retrieval

Possible deployment as Intelligence Community (TIA) capability

Page 4: Total Information Awareness with Informational Transparency in Secure Channels March 16, 2005 Core Ontology safeguarding national security Ontology Tutorial

Semantic Extraction

Link Analysis

Pattern recognition

Ontology Tools

Statistics

Advanced Trade Data

Harmonized Tariff Schedule

Detailed work with tools over available data

Practical problem: Provide the three Cs, clarity, consistency, and completeness in EACH judicial review of a commodity in passage across national boarders.

Integrated collection of reified ontologies with some specific inferences and some information organization and retrieval

Possible deployment as U. S. Custom’s Total Information Awareness (TIA) capability

Page 5: Total Information Awareness with Informational Transparency in Secure Channels March 16, 2005 Core Ontology safeguarding national security Ontology Tutorial

Semantic Extraction

Link Analysis

Pattern recognition

Ontology Tools

Statistics

DHS Data acquisition centers

National intelligence analysis centers

Detailed work with tools over available data

Practical problem: Each community of practice is observed to use a specific managed vocabulary. These vocabularies can be used to store data in locations that are the context (and thus requiring no search).

Integrated collection of reified ontologies with some specific inferences and some information organization and retrieval

Possible deployment as department wide Department of Homeland Security (TIA) capability

Page 6: Total Information Awareness with Informational Transparency in Secure Channels March 16, 2005 Core Ontology safeguarding national security Ontology Tutorial

Semantic Extraction

Link Analysis

Pattern recognition

Ontology Tools

Statistics

Medical data acquisition centers

National biodefense rapid analysis center

Detailed work with tools over available data

Practical problem: Medical community is not deeply trustful of the intelligence communities. A Core System Core Ontology would lay cards on the top and make trust relationship negotiable based on shared knowledge of mutual value.

Integrated collection of reified ontologies with some specific inferences and some information organization and retrieval

Possible deployment as National Bioterrorism Response System

Page 7: Total Information Awareness with Informational Transparency in Secure Channels March 16, 2005 Core Ontology safeguarding national security Ontology Tutorial

What is and is not a hard problem

1) New ways of thinking are introduced that are supported by actual new product lines appearing in the marketplace. A comprehensive review of the leading edge aspect of the market is suggested.

2) Use cases and data flow can be used to demonstrate these new ways of thinking, and existing commercial product can be shown to be available to architect a demonstration of Semantic Web capabilities.

3) A small community of leading scientists have defined a knowledge sharing core concept, that when equipped with the best Semantic Web capabilities will serve individual Governmental agencies and departments.

4) CoreTalk Inc is a commercial entity with a capability to re-factor the selected technical capabilities and express these as a CoreSystem CoreOntology.

Page 8: Total Information Awareness with Informational Transparency in Secure Channels March 16, 2005 Core Ontology safeguarding national security Ontology Tutorial

Observation: In regards to evaluating Semantic Web productsthe standard choice is not always the right choice

To elaborate on this observation:

Standard IT development processes do not adequately support individual understanding of the long term hard issues, e.g. no educational processes occurs over relevant Semantic Web technology.

Easy

Difficult

Short term Long term

In government procurement of IT, a mismatch between what is available and what is evaluated is often created.

The development of questions to be given to screen software vendors may not be well focused – either by what SW informed architects might want to do nor by what the product lines are designed to do.

The final selection of vendors may not be fully informed by what the market is bringing forward.

Expected result = wrong software integrated in the wrong way using a simple-minded architecture.

Page 9: Total Information Awareness with Informational Transparency in Secure Channels March 16, 2005 Core Ontology safeguarding national security Ontology Tutorial

Semantic Web mismatch issues

Because the SW issues are not well known, business decisions focuses on short term simple minded problems, where perceived risk are minimal.

Mismatch between low risk decisions and true problems create process that can not be rationalized. The dysfunction can be ignored in an business environment where marketing and public relations often disguises the absence of progress.

Short term Long term

Easy

Difficult

Page 10: Total Information Awareness with Informational Transparency in Secure Channels March 16, 2005 Core Ontology safeguarding national security Ontology Tutorial

Evaluating Semantic Web products:the identification of by-pass

Many problems that are critical are in fact mis-classified as long term and difficult when a simplification is being fielded by the markets.

The simplification may involve the use of ontology to organize how information is organized.

For Example: The definition of an ontology as a

{ concepts }

expressed within an constraint language. The check box

“does the product import and export OWL?”

may be improperly asked if the understanding of what is an ontology, and what is a constraint language is not present.

Short term Long term

Easy

Difficult

Page 11: Total Information Awareness with Informational Transparency in Secure Channels March 16, 2005 Core Ontology safeguarding national security Ontology Tutorial

Many problems that are critical are in fact classified as long term and difficult

In many cases, a by-pass around a long term difficult problem can be seen.

The by-pass moves the problem to the easy and short term category. However:

In security environments open minded search to re-frame problems is problematic for several understandable reasons.

1) Only a limited number of individuals have security clearance and have the training necessary to understand the history of semantic technology development.

2) Business practices themselves often re-enforce what is perceived to be minimization of professional risk, and thus these practices closes off an open discussion (even within secure environments).

Short term Long term

Easy

Difficult

Page 12: Total Information Awareness with Informational Transparency in Secure Channels March 16, 2005 Core Ontology safeguarding national security Ontology Tutorial

Many problems that are critical are in fact mis-classified as being long term and difficult

Example of by-pass

Problem: Write 1/3 into a computer.

This problem is considered to be unsolvable since in base 10 we have

1/3 = 0.33333. . .

Where the three dots means repeat to infinity.

But

1/3 in base ten is also the same as 1/3 in base 6.

In base 6, 1/3 = 0.2

So where did the intractable problem go?