National Academies Press: OpenBook

Big Data: A Workshop Report (2012)

Chapter: 1 Motivation for the Workshop

« Previous: Front Matter
Suggested Citation:"1 Motivation for the Workshop." National Research Council. 2012. Big Data: A Workshop Report. Washington, DC: The National Academies Press. doi: 10.17226/13541.
×

1

Motivation for the Workshop

In 2012, the Defense Intelligence Agency (DIA) approached the National Research Council’s TIGER standing committee and asked it to develop a list of workshop topics to explore the impact of emerging science and technology. From the list of topics given to DIA, three were chosen to be developed by the Committee for Science and Technology Challenges to U.S. National Security Interests. The first in a series of three workshops was held on April 23-24, 2012. This report summarizes that first workshop, which explored the phenomenon known as big data.

The objective for the first workshop is given in the statement of task (see Box 1-1), which states, “The workshop will review emerging capabilities in large computational data to include speed, data fusion, use, and commodification of data used in decision making. The workshop will also review the subsequent increase in vulnerabilities over the capabilities gained and the significance to national security.”

The committee devised an agenda that helped the committee, sponsors, and workshop attendees probe issues of national security related to so-called big data as well as gain understanding of potential related vulnerabilities. The workshop (see the agenda in Appendix B) was used to gather data that is described in this report, which presents views expressed by individual workshop participants. Although the committee is responsible for the overall quality and accuracy of the report as a record of what transpired at the workshop, the views presented are not necessarily those of all the workshop participants, the committee, or the National Research Council. This workshop report was not intended to provide a comprehensive review of the state of big data.

Chapter 2 of this report summarizes presentations made and discussions held on the first day of the workshop, April 23, 2012. Chapter 3 chronicles the presentations and discussions from the second day of the workshop, April 24, 2012. The three appendixes contain, in order, the biographies of the committee members, the workshop agenda and lists of attendees, and the biographies of the presenters.

Suggested Citation:"1 Motivation for the Workshop." National Research Council. 2012. Big Data: A Workshop Report. Washington, DC: The National Academies Press. doi: 10.17226/13541.
×

BOX 1-1

Statement of Task

An ad hoc committee will plan and conduct three workshops on the science and technology (S&T) fields noted below that have potential impact on U.S. national security.

• Big Data—The workshop will review emerging capabilities in large computational data to include speed, data fusion, use, and commodification of data used in decision making. The workshop will also review the subsequent increase in vulnerabilities over the capabilities gained and the significance to national security.

• Future of Antennas—The workshop will review trends in advanced antenna research and design. The workshop will also review trends in commercial and military use of advanced antennas that enable improved communication, data transfer, soldier health monitoring, and other overt and covert methods of standoff data collection.

• Future Battlespace Situational Awareness—The workshop will review the technologies that enable battlespace situational awareness 10-20 years into the future for both red and blue forces. The workshop will emphasize the capabilities within air, land, sea, space, and cyberspace.

The committee will design the workshops to address U.S. and foreign research, why S&T applications of technologies in development are important in the context of military capabilities, and what critical scientific breakthroughs are needed to achieve advances in the fields of interest—focusing detailed attention on specific developments in the foregoing fields that might have national security implications for the United States. The workshops will each also consider methodology to track the relevant technology landscape for the future.

Each of the three workshops will feature invited presentations and panelists and include discussions on a selected topic including themes relating to defense warning and surprise. The committee will plan the agenda for the workshops, select and invite speakers and discussants, and moderate the discussions. Each event will result in a workshop summary that will be subject to appropriate institutional review prior to release.

Suggested Citation:"1 Motivation for the Workshop." National Research Council. 2012. Big Data: A Workshop Report. Washington, DC: The National Academies Press. doi: 10.17226/13541.
×
Page 1
Suggested Citation:"1 Motivation for the Workshop." National Research Council. 2012. Big Data: A Workshop Report. Washington, DC: The National Academies Press. doi: 10.17226/13541.
×
Page 2
Next: 2 First-Day Presentations »
Big Data: A Workshop Report Get This Book
×
Buy Paperback | $25.00 Buy Ebook | $20.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

In 2012, the Defense Intelligence Agency (DIA) approached the National Research Council's TIGER standing committee and asked it to develop a list of workshop topics to explore the impact of emerging science and technology. From the list of topics given to DIA, three were chosen to be developed by the Committee for Science and Technology Challenges to U.S. National Security Interests. The first in a series of three workshops was held on April 23-24, 2012. This report summarizes that first workshop which explored the phenomenon known as big data.

The objective for the first workshop is given in the statement of task, which explains that that workshop will review emerging capabilities in large computational data to include speed, data fusion, use, and commodification of data used in decision making. The workshop will also review the subsequent increase in vulnerabilities over the capabilities gained and the significance to national security. The committee devised an agenda that helped the committee, sponsors, and workshop attendees probe issues of national security related to so-called big data, as well as gain understanding of potential related vulnerabilities. The workshop was used to gather data that is described in this report, which presents views expressed by individual workshop participants.

Big Data: A Workshop Report is the first in a series of three workshops, held in early 2012 to further the ongoing engagement among the National Research Council's (NRC's) Technology Insight-Gauge, Evaluate, and Review (TIGER) Standing Committee, the scientific and technical intelligence (S&TI) community, and the consumers of S&TI products.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!