April 13, 2018
How network tools can improve base security
In 2011, the simple exploitation of an existing data set could have prevented a near disaster in northern Afghanistan.
Then, an entire operations center watched as the feed from an MQ-1 drone, newly reassigned from its original mission, displayed a growing group of protesters at the perimeter of a small U.S. forward operating base. Although conventional signals intelligence indicated a possible disturbance, full-motion video confirmed the severity of the threat only well after it had matured. Intelligence analysts didn’t understand what the protestors were doing — and why they were doing it — until they had already massed at the entry point. If used properly, automated social media monitoring and geofencing, which calls for creating virtual geographic boundaries, could have filled this critical gap in situational awareness.
Read the full article at C4ISRNET
More from CNAS
-
Technology & National Security
Dutch Export Controls Don’t Go Far Enough on ChinaControlling the machines that make chips matters more than controlling any specific chip....
By Michelle Nie
-
Technology & National Security
China’s AI Is Spreading Fast. Here’s How to Stop the Security RisksThe first problem is not about China, but about AI as a technology: It is incredibly difficult to audit the global supply chain for AI software....
By Ryan Fedasiuk
-
Technology & National Security
Anthropic, the Pentagon, and the Future of Autonomous WeaponsThe last big story right before the war in Iran started was the collapse in the relationship between the Pentagon and Anthropic, with the latter objecting to any potential use...
By Paul Scharre
-
Technology & National Security
Off TargetThe pace of progress in frontier artificial intelligence (AI) capabilities shows no sign of slowing. Frontier models offer transformative potential for national security—from ...
By Caleb Withers, Jay Kim & Ethan Chiu