AI Satellite Image Analysis Will Be Regulated

Satellite programs have generally been some of the most secret  spying  programs. The first such program to take pictures from space, Corona, began in 1958, when the satellite successfully recorded its first  film. Only a few days later US President Dwight Eisenhowe was shown a spool of celluloid film with detailed images of  military installations in the old Soviet Union. 

Today, the use of  Artificial Inelligence (AI) to analyse satellite images could  revolutionise the way governments and researchers track changes in the world around them. 

But if you’re a US maker of such software, it’s about to become harder to export your products. New US Federal rules published on 6th January, affects software ‘specially designed’ to train deep learning neural networks on the analysis of geospatial imagery.

The software would be classified as a dual-use technology under the, Wassenaar Arrangement subject to many of the same restrictions for exporting arms. The Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies is a is a multilateral export control regime (MECR) with 42 participating states including many former Warsaw Pact countries.

The Wassenaar Arrangement was established to contribute to regional and international security and stability by promoting transparency and greater responsibility in transfers of conventional arms. 

The Bureau of Industry and Security (BIS) of the US Commerce Department has released for publication in the Federal Register an interim final rule, along with a request for comments, to amend the Export Administration Regulations (EAR). The aim is to make certain software specially designed to automate the analysis of geospatial imagery subject to the EAR and to impose a license requirement for the export and re-export of this software to all destinations, except Canada.

The new rule will go into effect in 60 days, though the public may submit comments on the rule for another 60 days after that. The rule affects software that would “provide a graphical user interface that enables the user to identify objects (e.g., vehicles, houses, etc.) from within geospatial imagery”.

Also software that “Trains a Deep Convolutional Neural Network to detect the object of interest from the positive and negative samples; and identifies objects in geospatial imagery using the trained Deep Convolutional Neural Network.”

Applying machine learning to the identification of objects in satellite imagery is a big US military concern.

Military leaders frequently talk about the wide disconnect between the amount of video and satellite footage that the United States collects and scarcity of analysts to look through the footage and see what’s relevant to operations.They’ve invested a-lot in software tools that can monitor or scan that footage, including satellite footage, and then tip a human analyst to pay attention to something of relevance. 

One of the best example is Project Maven, a military AI project to identify objects of interest or detect changes in scenery to help analysts and operators cut through lots of imagery and footage very quickly. The US military isn’t the only group or entity with a legitimate interest in overhead satellite imagery, and possibly automating the detection of objects of interest in that imagery.

For instance, hedge funds and other financial analysts use satellite images to predict retail trends, such as parking lot density around the holidays.Also healthcare researchers and epidemiologists can use satellite footage to track health trends also by monitoring parking lot density at hospitals and clinics.Non-profit civic research groups use satellite images to draw global attention toward events and happenings like resource pillaging and ethnic cleansing.

The rule change would have big effects for the future of software makers that are looking to produce AI tools for the analysis of satellite photos. But it could also, potentially, have a chilling effect on the ability of civilian groups to monitor changes and events of public interest.

DefenseOne:        KPMG:      The Verge:      National Security Arcive 1:     

National Security Archive 2:     Wassenaar Arrangement:

You Might Also Read:

Satellite Imagery + Social Media = A New Way To Spot Emerging Nuclear Threats:

Chinese Satellite Sends Hack-Proof Messages:



 

« Five Risks That Will Define Cyber Security In 2020
Online Bank Fraud Is Up 40% In The UK »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Logically Secure

Logically Secure

Logically Secure provide penetration testing and security assessment services.

National Cyber Security Centre (NCSC) - Netherlands

National Cyber Security Centre (NCSC) - Netherlands

NCSC Netherlands coordinates enhancing the cyber resilience of the Netherlands in the digital domain.

National Cyber-Forensics & Training Alliance (NCFTA)

National Cyber-Forensics & Training Alliance (NCFTA)

NCFTA is a trusted alliance of private industry and law enforcement partners dedicated to information sharing and disrupting cyber-related threats.

Polyverse

Polyverse

Polyverse offers application security, zero-day defense, proactive cyber resiliency and more. Protect your critical applications with moving target defense.

Quokka

Quokka

Quokka (formerly Kryptowire) is the source for mobile security and privacy solutions, staying steps ahead of the threat and delivering peace of mind.

Yelbridges

Yelbridges

Yelbridges is your reliable partner in all fields of IT-Security, from developing of Security Policies and Guidelines to the design and implementation of secure processes.

Ksmartech

Ksmartech

Ksmartech provide services related to security and authentication in all areas where the connection of people to objects, and objects and objects is necessary.

Amadeus Capital Partners

Amadeus Capital Partners

Amadeus Capital Partners offers over 20 years’ experience in technology investment. Our areas of focus include AI & machine learning and cyber security.

ToucanX

ToucanX

ToucanX has eliminated remote attack vectors without sacrificing productivity. We’ve brought embedded near real time virtualization to the enterprise endpoint.

Riskaware

Riskaware

CyberAware, by Riskaware, provides business-critical cyber attack analysis and impact assessments using NIST standards aligned with NCSC guidance.

CITRA - Information Security and Emergency Response

CITRA - Information Security and Emergency Response

CITRA is responsible for overseeing the telecommunications sector, monitoring and protecting the interests of users and service providers, and regulating the services of telecomms networks in Kuwait.

Clearvision

Clearvision

As an Atlassian Platinum Solution Partner, Clearvision works with teams in the UK and US, providing solutions for the Atlassian stack, Git and open source tooling.

ASMGi

ASMGi

ASMGi is a managed services, security and GRC solutions, and software development provider.

Exiger

Exiger

Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers.

Logiq Consulting

Logiq Consulting

Logiq Consulting provide a full range of Cyber Security, Information Assurance and System Engineering services.

Togggle

Togggle

Togggle offers seamless identity verification solutions and distributed infrastructure, enabling organizations to combat fraud and ensure compliance with data protection regulations.