Award for Fundamental Research in Socio-Mathematics of Information and Influence

SynopsisA.

Program DescriptionBackground:Information has become a domain of warfare that now extends well beyond compromising or disabling the data-handling platforms, and into subtler forms of content manipulation, in order to elicit specific psychological and sociological responses.

The

credit: Design Boom


existence of systemic campaigns of disinformation is now well established, conducted or supervised by malicious state and non-state actors, using the cover of widespread social media outlets.

These rely on automated software agents (“bots”), designed and engineered with increasing levels of sophistication, as well as trained human agents who can control the bot deployment, adjust the network, and refine the strategies.

Modern technology greatly facilitates Internet-based programs of social hysteria propagation, propaganda, disinformation, and influence operations, and as technological capabilities improve, the threat will grow accordingly.

In an environment of widespread information uncertainty, open societies lose coherence and risk disorderly devolvement, the ultimate objective of the adversaries.

Relying on various, authoritative tools of data analysis and network science, the forensic evidence of this social manipulation is undeniable.

Even so, this is far from an optimal situation:
detection of such campaigns can be difficult and inaccurate when dealing with an adversary who can quickly adapt strategies, and finding a-posteriori evidence of malicious disinformation yields little opportunity for timely and effective counter-measure.

Thus, there is a critical need for an ability to:
a) detect and counteract disinformation in real-time, especially if the adversary is able to rapidly adapt, as well as; b) predict future strategies and tactics of information warfare in order to design the appropriate defenses.Given the rapidly growing complexity of the information networks for ubiquitous access to information, as well as the pervasive deployment of malicious bots with fast expanding learning capabilities, these detection and prediction tasks can only be achieved by intelligent software, armed with highly efficient algorithms and operating on modern computing platforms.

However, disinformation also relies on subtle factors, based on the study of emotional and cognitive processes inherent to the human targets.

Those cannot be modeled as rational actors when under such influences, vastly increasing the uncertainty of predictive scenarios.

Therefore, it is equally essential to incorporate this knowledge into the models and methods for detection and prediction of malign influence operations.Program Objective:
The overarching goal of this research program is to enhance and extend the understanding of the theoretical underpinnings of future information warfare, towards rapid detection, tracking and prediction of attempts at social manipulation.

The problem requires the deep integration of two, currently distinct scientific fields, mathematics and social sciences.

While modern mathematical methods are often and well-used in social science studies, this research program is going well beyond the state of the art and is calling for the development of a new mathematical foundation for describing, analyzing and predicting human social behavior at multiple scales and in complex and dynamic environments, thus laying the groundwork for a new field.The first aspect concerns the mathematical understanding of the threat and the environment, leading to the design of efficient counter-measures.

One must deal, especially, with the critical problems of malicious activity detection and inference of their sources in a very dynamic environment.

The growing employment of Machine Learning (ML) methods, as well as other mathematical techniques for data analytics (e.g.

topological data analysis – TDA, manifold reconstruction, etc.), provides some formidable capabilities, but is far from sufficient.

For example, these tools deal with static data, not adversarial agents who can quickly adapt their strategies, effectively changing the rules of the game.

The behavioral dynamics also evolve over a complex multi-layer network that includes cyber, media and a multitude of social dimensions.

The true nature and scaling properties of these real-life networks may still be elusive, possibly disrupting an accurate interpretation of measurements, and these networks will evolve rapidly as technology and social conditions change.

These are fundamental and unresolved problems for which current techniques are insufficient.The social dimension is the second aspect of the problem.

It is already well appreciated how different forms of communication influence individual and group understandings of knowledge and behavior, but the acceleration of cyber influence by sophisticated software agents could have significant implications for social trust and how people live, learn, and communicate.

Questions range up to the fundamental issues of how manipulating information at greater speeds and with greater specificity and customizability affects the social relations on which society relies.

With the advent of 5G technology and beyond, people may be instantaneously exposed to a deluge of information, from the geo-political to the trivial.

How does this accelerated information and network complexity impact social relations across micro, meso, and macro scales? Are new ways of manipulating opinion, even subtler than before, made accessible, and could we detect them? Who then become the principal agents of manipulation, whether complicit or unwitting?While relying on fundamental and exploratory studies in their respective fields, these two directions must eventually be integrated, as the mathematical models of the network, their agents, and the social behavior, must be based on realistic models at multiple scales of aggregation.

The comprehensive basic research being sought-after in this opportunity should provide the basis for a unique ability to detect and predict evolving malign social influence, in realistic and ever-changing conditions.Research Areas:The fundamental science behind the objective of this topic covers multiple, coupled areas, thus requiring a combination of expertise, for example:
computer science and machine learning, mathematics, cognitive psychology and sociology, network theory and/or game theory.

Some specific research topics to be addressed in this undertaking may include, but are not limited to, the following:1) Carefully designed mathematical abstractions based on behavioral science for modeling the agent’s psychological and social variables, e.g.:
emotional and cognitive states, human intent and belief, and group dynamics.

These models should include approaches to multi-scale clustering for accurate comprehension and modeling of aggregate behavior, e.g.

individual – group – nation.2) Game-theoretical and Machine Learning concepts, e.g.

multi-agent reinforcement learning (RL) or distributional RL, as well as other innovative ideas that can consider a hybrid distribution of irrational and rational agents, including artificial ones (e.g.

bots).3) Efficient mathematical methods and algorithms to detect malicious intent and learn agent behavior and objectives from limited and noisy observations.4) Concepts and methods for strategy optimization (inverse design), which may include counter-messaging, network-based intervention, or other means.The list above is not exhaustive and is only intended to provide examples of research directions.

Strong emphasis is placed on the novelty of suggested approaches, their potential for generalizability and scaling, and their rigorous underpinnings.

A generative approach that considers a dual evolutionary co-design of threat and defense strategies is particularly welcome, in order to enhance the ability at some future time to predict threat scenarios and verify the defensive posture.Proposals should aim to produce novel conceptual frameworks that present disruptive ways of thinking about the fundamental scientific problems described above.

The research is exploratory and can be conducted on publically available data-sets, synthetic data, or real data that can be readily obtained by the performer.

Proposals should not rely on the need for data to be supplied by the Government, which does not already exist and is publicly available.
Agency: Department of Defense

Office: Department of Defense

Estimated Funding: $3,000,000


Who's Eligible


Relevant Nonprofit Program Categories





Obtain Full Opportunity Text:
http://grants.nih.gov/grants/guide/rfa-files/RFA-DK-12-509.html

Additional Information of Eligibility:
Includes UARCs.

Full Opportunity Web Address:
http://grants.nih.gov/grants/guide/rfa-files/RFA-DK-12-509.html

Contact:


Agency Email Description:
sharon.a.hilton.civ@mail.mil

Agency Email:


Date Posted:
2020-07-16

Application Due Date:


Archive Date:
2020-09-27


Meticulon, a project of Autism Calgary Association in partnership with the federal government and the Sinneave Family Foundation, operates as a social enterprise that renders high-tech services provided by people with autism, leveraging their natural abilities at requiring attention to detail, repetition, and sequencing.






More Federal Domestic Assistance Programs


Breastfeeding Promotion and Support Improving Maternity Care Practices project financed solely by 20 | Promotion of the Humanities_Research | Fair Housing and Equal Credit Opportunity | PPHF-2012 Cooperative Agreements for Prescription Drug Monitoring Program Electronic Health Record ( | National Estuary Program |  Site Style by YAML | Grants.gov | Grants | Grants News | Sitemap | Privacy Policy


Edited by: Michael Saunders

© 2004-2024 Copyright Michael Saunders