April 13, 2018
How network tools can improve base security
In 2011, the simple exploitation of an existing data set could have prevented a near disaster in northern Afghanistan.
Then, an entire operations center watched as the feed from an MQ-1 drone, newly reassigned from its original mission, displayed a growing group of protesters at the perimeter of a small U.S. forward operating base. Although conventional signals intelligence indicated a possible disturbance, full-motion video confirmed the severity of the threat only well after it had matured. Intelligence analysts didn’t understand what the protestors were doing — and why they were doing it — until they had already massed at the entry point. If used properly, automated social media monitoring and geofencing, which calls for creating virtual geographic boundaries, could have filled this critical gap in situational awareness.
Read the full article at C4ISRNET
More from CNAS
-
Five Objectives to Guide U.S. AI Diffusion
The Framework for AI Diffusion (the Framework) is an ambitious proposal to shape the global distribution of critical AI capabilities, maintain U.S. AI leadership, and prevent ...
By Janet Egan & Spencer Michaels
-
Shaping the World’s AI Future: How the U.S. and China Compete to Promote Their Digital Visions
As the United States navigates evolving global AI competition, balancing these elements will be crucial in determining whose AI systems — and by extension, whose approaches, v...
By Keegan McBride
-
Countering the Digital Silk Road: Brazil
Project Overview This year marks the 10th anniversary of the Digital Silk Road (DSR), China’s ambitious initiative to shape critical digital infrastructure around the world to...
By Ruby Scanlon & Bill Drexel
-
Promethean Rivalry
Executive Summary Just as nuclear weapons revolutionized 20th-century geopolitics, artificial intelligence (AI) is primed to transform 21st-century power dynamics—with world l...
By Bill Drexel