April 13, 2018
How network tools can improve base security
In 2011, the simple exploitation of an existing data set could have prevented a near disaster in northern Afghanistan.
Then, an entire operations center watched as the feed from an MQ-1 drone, newly reassigned from its original mission, displayed a growing group of protesters at the perimeter of a small U.S. forward operating base. Although conventional signals intelligence indicated a possible disturbance, full-motion video confirmed the severity of the threat only well after it had matured. Intelligence analysts didn’t understand what the protestors were doing — and why they were doing it — until they had already massed at the entry point. If used properly, automated social media monitoring and geofencing, which calls for creating virtual geographic boundaries, could have filled this critical gap in situational awareness.
Read the full article at C4ISRNET
More from CNAS
-
Energy, Economics & Security / Technology & National Security
Export Controls: Janet Egan, Sam Levy, and Peter Harrell on the White House's Semiconductor DecisionJanet Egan, a senior fellow with the Technology and National Security Program at the Center for a New American Security, discussed the Trump administration’s recent decision t...
By Janet Egan
-
Indo-Pacific Security / Technology & National Security
America Should Rent, Not Sell, AI Chips to ChinaSelling AI chips to China outright reduces America's AI lead for little benefit....
By Janet Egan & Lennart Heim
-
Defense / Technology & National Security
The Dawn of Automated WarfareDrone-on-drone battle is now a central part of the war....
By Greg Grant & Eric Schmidt
-
Energy, Economics & Security / Technology & National Security
Scrapping AI Export Controls Is Self-DefeatingBeijing surely has two goals in mind: Signal to domestic companies that they ought to shun American technology as soon as possible, and manipulate Nvidia to reveal how it desi...
By Liza Tobin & Matt Pottinger