Award for Fundamental Research in Socio-Mathematics of Information and Influence

The summary for the Award for Fundamental Research in Socio-Mathematics of Information and Influence grant is detailed below. This summary states who is eligible for the grant, how much grant money will be awarded, current and past deadlines, Catalog of Federal Domestic Assistance (CFDA) numbers, and a sampling of similar government grants. Verify the accuracy of the data FederalGrants.com provides by visiting the webpage noted in the Link to Full Announcement section or by contacting the appropriate person listed as the Grant Announcement Contact. If any section is incomplete, please visit the website for the Department of Defense, which is the U.S. government agency offering this grant.
Award for Fundamental Research in Socio-Mathematics of Information and Influence: SynopsisA. Program DescriptionBackground:Information has become a domain of warfare that now extends well beyond compromising or disabling the data-handling platforms, and into subtler forms of content manipulation, in order to elicit specific psychological and sociological responses. The existence of systemic campaigns of disinformation is now well established, conducted or supervised by malicious state and non-state actors, using the cover of widespread social media outlets. These rely on automated software agents (“bots”), designed and engineered with increasing levels of sophistication, as well as trained human agents who can control the bot deployment, adjust the network, and refine the strategies. Modern technology greatly facilitates Internet-based programs of social hysteria propagation, propaganda, disinformation, and influence operations, and as technological capabilities improve, the threat will grow accordingly. In an environment of widespread information uncertainty, open societies lose coherence and risk disorderly devolvement, the ultimate objective of the adversaries. Relying on various, authoritative tools of data analysis and network science, the forensic evidence of this social manipulation is undeniable. Even so, this is far from an optimal situation: detection of such campaigns can be difficult and inaccurate when dealing with an adversary who can quickly adapt strategies, and finding a-posteriori evidence of malicious disinformation yields little opportunity for timely and effective counter-measure. Thus, there is a critical need for an ability to: a) detect and counteract disinformation in real-time, especially if the adversary is able to rapidly adapt, as well as; b) predict future strategies and tactics of information warfare in order to design the appropriate defenses.Given the rapidly growing complexity of the information networks for ubiquitous access to information, as well as the pervasive deployment of malicious bots with fast expanding learning capabilities, these detection and prediction tasks can only be achieved by intelligent software, armed with highly efficient algorithms and operating on modern computing platforms. However, disinformation also relies on subtle factors, based on the study of emotional and cognitive processes inherent to the human targets. Those cannot be modeled as rational actors when under such influences, vastly increasing the uncertainty of predictive scenarios. Therefore, it is equally essential to incorporate this knowledge into the models and methods for detection and prediction of malign influence operations.Program Objective: The overarching goal of this research program is to enhance and extend the understanding of the theoretical underpinnings of future information warfare, towards rapid detection, tracking and prediction of attempts at social manipulation. The problem requires the deep integration of two, currently distinct scientific fields, mathematics and social sciences. While modern mathematical methods are often and well-used in social science studies, this research program is going well beyond the state of the art and is calling for the development of a new mathematical foundation for describing, analyzing and predicting human social behavior at multiple scales and in complex and dynamic environments, thus laying the groundwork for a new field.The first aspect concerns the mathematical understanding of the threat and the environment, leading to the design of efficient counter-measures. One must deal, especially, with the critical problems of malicious activity detection and inference of their sources in a very dynamic environment. The growing employment of Machine Learning (ML) methods, as well as other mathematical techniques for data analytics (e.g. topological data analysis – TDA, manifold reconstruction, etc.), provides some formidable capabilities, but is far from sufficient. For example, these tools deal with static data, not adversarial agents who can quickly adapt their strategies, effectively changing the rules of the game. The behavioral dynamics also evolve over a complex multi-layer network that includes cyber, media and a multitude of social dimensions. The true nature and scaling properties of these real-life networks may still be elusive, possibly disrupting an accurate interpretation of measurements, and these networks will evolve rapidly as technology and social conditions change. These are fundamental and unresolved problems for which current techniques are insufficient.The social dimension is the second aspect of the problem. It is already well appreciated how different forms of communication influence individual and group understandings of knowledge and behavior, but the acceleration of cyber influence by sophisticated software agents could have significant implications for social trust and how people live, learn, and communicate. Questions range up to the fundamental issues of how manipulating information at greater speeds and with greater specificity and customizability affects the social relations on which society relies. With the advent of 5G technology and beyond, people may be instantaneously exposed to a deluge of information, from the geo-political to the trivial. How does this accelerated information and network complexity impact social relations across micro, meso, and macro scales? Are new ways of manipulating opinion, even subtler than before, made accessible, and could we detect them? Who then become the principal agents of manipulation, whether complicit or unwitting?While relying on fundamental and exploratory studies in their respective fields, these two directions must eventually be integrated, as the mathematical models of the network, their agents, and the social behavior, must be based on realistic models at multiple scales of aggregation. The comprehensive basic research being sought-after in this opportunity should provide the basis for a unique ability to detect and predict evolving malign social influence, in realistic and ever-changing conditions.Research Areas:The fundamental science behind the objective of this topic covers multiple, coupled areas, thus requiring a combination of expertise, for example: computer science and machine learning, mathematics, cognitive psychology and sociology, network theory and/or game theory. Some specific research topics to be addressed in this undertaking may include, but are not limited to, the following:1) Carefully designed mathematical abstractions based on behavioral science for modeling the agent’s psychological and social variables, e.g.: emotional and cognitive states, human intent and belief, and group dynamics. These models should include approaches to multi-scale clustering for accurate comprehension and modeling of aggregate behavior, e.g. individual – group – nation.2) Game-theoretical and Machine Learning concepts, e.g. multi-agent reinforcement learning (RL) or distributional RL, as well as other innovative ideas that can consider a hybrid distribution of irrational and rational agents, including artificial ones (e.g. bots).3) Efficient mathematical methods and algorithms to detect malicious intent and learn agent behavior and objectives from limited and noisy observations.4) Concepts and methods for strategy optimization (inverse design), which may include counter-messaging, network-based intervention, or other means.The list above is not exhaustive and is only intended to provide examples of research directions. Strong emphasis is placed on the novelty of suggested approaches, their potential for generalizability and scaling, and their rigorous underpinnings. A generative approach that considers a dual evolutionary co-design of threat and defense strategies is particularly welcome, in order to enhance the ability at some future time to predict threat scenarios and verify the defensive posture.Proposals should aim to produce novel conceptual frameworks that present disruptive ways of thinking about the fundamental scientific problems described above. The research is exploratory and can be conducted on publically available data-sets, synthetic data, or real data that can be readily obtained by the performer. Proposals should not rely on the need for data to be supplied by the Government, which does not already exist and is publicly available.
Federal Grant Title: Award for Fundamental Research in Socio-Mathematics of Information and Influence
Federal Agency Name: Department of Defense (DOD)
Grant Categories: Science and Technology and other Research and Development
Type of Opportunity: Mandatory
Funding Opportunity Number: BRO-20-SOMAII
Type of Funding: Grant
CFDA Numbers: 12.630
CFDA Descriptions: Information not provided
Current Application Deadline: August 28th, 2020
Original Application Deadline: August 28th, 2020
Posted Date: July 16th, 2020
Creation Date: July 16th, 2020
Archive Date: September 27th, 2020
Total Program Funding: $3,000,000
Maximum Federal Grant Award: $3,000,000
Minimum Federal Grant Award: $1,500,000
Expected Number of Awards: 2
Cost Sharing or Matching: No
Last Updated: August 20th, 2020
Applicants Eligible for this Grant
Public and State controlled institutions of higher education - Private institutions of higher education
Additional Information on Eligibility
Includes UARCs.
Grant Announcement Contact
Sharon A Hilton
Grantor
sharon.a.hilton.civ@mail.mil
Similar Government Grants
National Geospatial Intelligence Agency Boosting Innovative GEOINT Research Broad Agency A...
Evaluating Non-floodplain Wetlands for Flood-Risk Reduction and Nutrient Mediation in the ...
: Implementing Lifecycle Characterization of Embedded Dam Gate Anchorage Using Non-Destruc...
Northwestern Pond Turtle Study, Willamette Valley, Oregon
Data Anomaly Detection and Sediment Yield Estimation in the US Army Corps of EngineersR...
FY 06 Department of Defense (DoD) Infrastructure Support Program for Historically Black Co...
2006 Pathogen and Toxin Concentration Systems for Water Monitoring Broad Agency Announceme...
FY04 Postdoctoral Research Fellowship Program
More Grants from the Department of Defense
Acquisition Research Program (ARP)
National Defense Education Program (NDEP) Request for Information for the Office of the Un...
WWII 75th Celebration
Newton Award for Transformative Ideas during the COVID-19 Pandemic
National Defense Education Program (NDEP) for Science, Technology, Engineering, and Mathem...

FederalGrants.com is not endorsed by, or affiliated with, any government agency. Copyright ©2007-2021 FederalGrants.com