April 13, 2018
How network tools can improve base security
In 2011, the simple exploitation of an existing data set could have prevented a near disaster in northern Afghanistan.
Then, an entire operations center watched as the feed from an MQ-1 drone, newly reassigned from its original mission, displayed a growing group of protesters at the perimeter of a small U.S. forward operating base. Although conventional signals intelligence indicated a possible disturbance, full-motion video confirmed the severity of the threat only well after it had matured. Intelligence analysts didn’t understand what the protestors were doing — and why they were doing it — until they had already massed at the entry point. If used properly, automated social media monitoring and geofencing, which calls for creating virtual geographic boundaries, could have filled this critical gap in situational awareness.
Read the full article at C4ISRNET
More from CNAS
-
China Is Flirting With AI Catastrophe
Today’s AI sprint would not be the first time Beijing’s desire to hasten progress invited disaster....
By Bill Drexel & Hannah Kelley
-
Congress ponders regulation of powerful emergent A.I. platforms
Can Congress keep up with the pace of growth in artificial intelligence? Paul Scharre of the Center for a New American Security talks about the current attempts to regulate A....
By Paul Scharre
-
Chinese Data Restrictions Undermine US-China Stability
By refusing dialogue, China increases the risk of miscalculation, crises, and even conflict....
By Paul Scharre
-
Controlling Access to Advanced Compute via the Cloud: Options for U.S. Policymakers, Part I
We do not recommend controlling access to cloud computing services for entities in China, because, based on our analysis, it does not appear feasible and may have adverse cons...
By Hanna Dohmen, Jacob Feldgoise, Emily Weinstein & Tim Fist