AI Satellite Image Analysis Will Be Regulated

Satellite programs have generally been some of the most secret  spying  programs. The first such program to take pictures from space, Corona, began in 1958, when the satellite successfully recorded its first  film. Only a few days later US President Dwight Eisenhowe was shown a spool of celluloid film with detailed images of  military installations in the old Soviet Union. 

Today, the use of  Artificial Inelligence (AI) to analyse satellite images could  revolutionise the way governments and researchers track changes in the world around them. 

But if you’re a US maker of such software, it’s about to become harder to export your products. New US Federal rules published on 6th January, affects software ‘specially designed’ to train deep learning neural networks on the analysis of geospatial imagery.

The software would be classified as a dual-use technology under the, Wassenaar Arrangement subject to many of the same restrictions for exporting arms. The Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies is a is a multilateral export control regime (MECR) with 42 participating states including many former Warsaw Pact countries.

The Wassenaar Arrangement was established to contribute to regional and international security and stability by promoting transparency and greater responsibility in transfers of conventional arms. 

The Bureau of Industry and Security (BIS) of the US Commerce Department has released for publication in the Federal Register an interim final rule, along with a request for comments, to amend the Export Administration Regulations (EAR). The aim is to make certain software specially designed to automate the analysis of geospatial imagery subject to the EAR and to impose a license requirement for the export and re-export of this software to all destinations, except Canada.

The new rule will go into effect in 60 days, though the public may submit comments on the rule for another 60 days after that. The rule affects software that would “provide a graphical user interface that enables the user to identify objects (e.g., vehicles, houses, etc.) from within geospatial imagery”.

Also software that “Trains a Deep Convolutional Neural Network to detect the object of interest from the positive and negative samples; and identifies objects in geospatial imagery using the trained Deep Convolutional Neural Network.”

Applying machine learning to the identification of objects in satellite imagery is a big US military concern.

Military leaders frequently talk about the wide disconnect between the amount of video and satellite footage that the United States collects and scarcity of analysts to look through the footage and see what’s relevant to operations.They’ve invested a-lot in software tools that can monitor or scan that footage, including satellite footage, and then tip a human analyst to pay attention to something of relevance. 

One of the best example is Project Maven, a military AI project to identify objects of interest or detect changes in scenery to help analysts and operators cut through lots of imagery and footage very quickly. The US military isn’t the only group or entity with a legitimate interest in overhead satellite imagery, and possibly automating the detection of objects of interest in that imagery.

For instance, hedge funds and other financial analysts use satellite images to predict retail trends, such as parking lot density around the holidays.Also healthcare researchers and epidemiologists can use satellite footage to track health trends also by monitoring parking lot density at hospitals and clinics.Non-profit civic research groups use satellite images to draw global attention toward events and happenings like resource pillaging and ethnic cleansing.

The rule change would have big effects for the future of software makers that are looking to produce AI tools for the analysis of satellite photos. But it could also, potentially, have a chilling effect on the ability of civilian groups to monitor changes and events of public interest.

DefenseOne:        KPMG:      The Verge:      National Security Arcive 1:     

National Security Archive 2:     Wassenaar Arrangement:

You Might Also Read:

Satellite Imagery + Social Media = A New Way To Spot Emerging Nuclear Threats:

Chinese Satellite Sends Hack-Proof Messages:



 

« Five Risks That Will Define Cyber Security In 2020
Online Bank Fraud Is Up 40% In The UK »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: 2024 and beyond: Top six cloud security trends

ON-DEMAND WEBINAR: 2024 and beyond: Top six cloud security trends

Learn about the top cloud security trends in 2024 and beyond, along with solutions and controls you can implement as part of your security strategy.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

SharkGate

SharkGate

SharGate provide a cloud-based website security solution to protect websites from being hacked.

Data Shepherd

Data Shepherd

Data Shepherds primary focus is to protect your business. We achieve this by offering extensive and unique expertise in innovative IT and Cyber security solutions.

Malware Patrol

Malware Patrol

Malware Patrol provides intelligent threat data that protects against cyber attacks.

Canadian Institute for Cybersecurity (CIC)

Canadian Institute for Cybersecurity (CIC)

The Canadian Institute for Cybersecurity (CIC) is a comprehensive multidisciplinary training, research and development, and entrepreneurial unit.

Cyber Science

Cyber Science

Cyber Science is the flagship conference of C-MRiC, focusing on pioneering research and innovation in Cyber Situational Awareness, Social Media, Cyber Security and Cyber Incident Response.

Rogers Cybersecure Catalyst

Rogers Cybersecure Catalyst

Rogers Cybersecure Catalyst helps Canadians and Canadian companies seize the opportunities and tackle the challenges of cybersecurity.

SOC.OS Cyber Security

SOC.OS Cyber Security

SOC.OS is an alert correlation and triage automation tool. It correlates and prioritises your alerts, boosting productivity, enhancing threat visibility and shortening mean time to respond.

Madrona Venture Group

Madrona Venture Group

Madrona Venture Group invests in seed and early-stage technology companies in areas including cybersecurity.

PKI Solutions

PKI Solutions

PKI Solutions offers Public Key Infrastructure (PKI) products, services, and training to help ensure the security of organizations now and in the future.

CoreStack

CoreStack

CoreStack helps enterprises overcome cloud challenges such as ever growing security risks, stringent regulatory compliance needs and operational complexities.

Center for Information Security Awareness (CFISA)

Center for Information Security Awareness (CFISA)

CFISA was formed by a group of academics, security and fraud experts to explore ways to increase security awareness among audiences, including consumers, employees, businesses and law enforcement.

ANY.RUN

ANY.RUN

ANY.RUN is an interactive online malware analysis service created for dynamic as well as static research of multiple types of cyber threats.

V2X

V2X

V2X delivers IT support, networking, and cybersecurity solutions that ensure optimal mission support and performance.

Omdia

Omdia

Omdia is a technology research and advisory group. Our deep knowledge of tech markets combined with our actionable insights empower organizations to make smart growth decisions.

CYTUR

CYTUR

CYTUR provide trusted and secured maritime cybersecurity solutions to keep ships safe, protecting them, their crews, cargo and all stakeholders from maritime cyber threats.

Cyberlocke

Cyberlocke

Cyberlocke is dedicated to finding inventive solutions to meet the distinct IT obstacles of each organization we support.