AI Satellite Image Analysis Will Be Regulated

Satellite programs have generally been some of the most secret  spying  programs. The first such program to take pictures from space, Corona, began in 1958, when the satellite successfully recorded its first  film. Only a few days later US President Dwight Eisenhowe was shown a spool of celluloid film with detailed images of  military installations in the old Soviet Union. 

Today, the use of  Artificial Inelligence (AI) to analyse satellite images could  revolutionise the way governments and researchers track changes in the world around them. 

But if you’re a US maker of such software, it’s about to become harder to export your products. New US Federal rules published on 6th January, affects software ‘specially designed’ to train deep learning neural networks on the analysis of geospatial imagery.

The software would be classified as a dual-use technology under the, Wassenaar Arrangement subject to many of the same restrictions for exporting arms. The Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies is a is a multilateral export control regime (MECR) with 42 participating states including many former Warsaw Pact countries.

The Wassenaar Arrangement was established to contribute to regional and international security and stability by promoting transparency and greater responsibility in transfers of conventional arms. 

The Bureau of Industry and Security (BIS) of the US Commerce Department has released for publication in the Federal Register an interim final rule, along with a request for comments, to amend the Export Administration Regulations (EAR). The aim is to make certain software specially designed to automate the analysis of geospatial imagery subject to the EAR and to impose a license requirement for the export and re-export of this software to all destinations, except Canada.

The new rule will go into effect in 60 days, though the public may submit comments on the rule for another 60 days after that. The rule affects software that would “provide a graphical user interface that enables the user to identify objects (e.g., vehicles, houses, etc.) from within geospatial imagery”.

Also software that “Trains a Deep Convolutional Neural Network to detect the object of interest from the positive and negative samples; and identifies objects in geospatial imagery using the trained Deep Convolutional Neural Network.”

Applying machine learning to the identification of objects in satellite imagery is a big US military concern.

Military leaders frequently talk about the wide disconnect between the amount of video and satellite footage that the United States collects and scarcity of analysts to look through the footage and see what’s relevant to operations.They’ve invested a-lot in software tools that can monitor or scan that footage, including satellite footage, and then tip a human analyst to pay attention to something of relevance. 

One of the best example is Project Maven, a military AI project to identify objects of interest or detect changes in scenery to help analysts and operators cut through lots of imagery and footage very quickly. The US military isn’t the only group or entity with a legitimate interest in overhead satellite imagery, and possibly automating the detection of objects of interest in that imagery.

For instance, hedge funds and other financial analysts use satellite images to predict retail trends, such as parking lot density around the holidays.Also healthcare researchers and epidemiologists can use satellite footage to track health trends also by monitoring parking lot density at hospitals and clinics.Non-profit civic research groups use satellite images to draw global attention toward events and happenings like resource pillaging and ethnic cleansing.

The rule change would have big effects for the future of software makers that are looking to produce AI tools for the analysis of satellite photos. But it could also, potentially, have a chilling effect on the ability of civilian groups to monitor changes and events of public interest.

DefenseOne:        KPMG:      The Verge:      National Security Arcive 1:     

National Security Archive 2:     Wassenaar Arrangement:

You Might Also Read:

Satellite Imagery + Social Media = A New Way To Spot Emerging Nuclear Threats:

Chinese Satellite Sends Hack-Proof Messages:



 

« Five Risks That Will Define Cyber Security In 2020
Online Bank Fraud Is Up 40% In The UK »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Pondurance

Pondurance

Pondurance is an IT Security and Compliance company providing services in Cyber Security, Continuity, Compliance and Threat Management.

Oracle Cloud Security

Oracle Cloud Security

Oracle’s cloud security solutions enable organizations to implement and manage consistent security policies across the hybrid data center.

RIGCERT

RIGCERT

RIGCERT provides training, audit and certification services for multiple fields including Information Security.

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic's main goal is toward establishing an international reference centre for excellence in the field of digital forensics and data recovery services.

Cybersecurity Manufacturing Innovation Institute (CyManII)

Cybersecurity Manufacturing Innovation Institute (CyManII)

CyManII was established to create economically viable, pervasive, and inconspicuous cybersecurity in American manufacturing to secure the digital supply chain and energy automation.

Fiserv

Fiserv

Fiserv offers a wide array of Risk & Compliance solutions to help you prevent losses from fraud and ensure adherence to regulatory and compliance mandates.

360° Online Brand Protection

360° Online Brand Protection

360° Online Brand Protection have developed a response to monitor counterfeiting and piracy activity at the online point of sale.

Stamus Networks

Stamus Networks

Stamus Networks offers Scirius Security Platform solutions that marry real-time network traffic data with enhanced Suricata intrusion detection (IDS) and an advanced analytics engine.

Iron Bow Technologies

Iron Bow Technologies

Iron Bow Technologies is a leading IT solution provider dedicated to successfully transforming technology investments into business capabilities for government, commercial and healthcare clients.

Open Data Security (ODS)

Open Data Security (ODS)

Open Data Security is a market leader in the information security sector, offering services to companies, governments and individuals, helping them shield from hackers and cyber attacks.

NetCentrics

NetCentrics

NetCentrics leverages an innovative, agile, ‘what’s-next’ approach to our customers’ IT and cyber challenges.

Bores Security Consultancy

Bores Security Consultancy

Bores Security Consultancy are an established family-run business delivering expertise in security and technology.

Techmentum

Techmentum

At Techmentum, our mission is to utilize technology to help companies succeed. Our expertise includes fully managed IT services, cybersecurity, cloud, and custom technology solutions.

Olympix

Olympix

Dev-first Web3 security that starts at the source. Olympix is a pioneering DevSecOps tool that puts security in the hands of the developer by proactively securing code from day one.

2021.AI

2021.AI

2021.AI serves the growing business need for full oversight and management of applied AI.

Windstream

Windstream

Windstream is a leading provider of advanced network communications and technology solutions for consumers, small businesses, enterprise organizations and carrier partners across the US.