In 2011, the simple exploitation of an existing data set could have prevented a near disaster in northern Afghanistan.
Then, an entire operations center watched as the feed from an MQ-1 drone, newly reassigned from its original mission, displayed a growing group of protesters at the perimeter of a small U.S. forward operating base. Although conventional signals intelligence indicated a possible disturbance, full-motion video confirmed the severity of the threat only well after it had matured. Intelligence analysts didn’t understand what the protestors were doing — and why they were doing it — until they had already massed at the entry point. If used properly, automated social media monitoring and geofencing, which calls for creating virtual geographic boundaries, could have filled this critical gap in situational awareness.
Read the full article at C4ISRNET
More from CNAS
PodcastAre ‘killer robots’ the future of warfare?
Paul Scharre joins host Suzanna Kianpour to discuss the technology, fears and even potential advantages of developing autonomous weapons. Listen to the full conversation from...
By Paul Scharre
CommentarySteering in the Right Direction in the Military-Technical Revolution
A couple of years ago at the Beijing Xiangshan Forum, a senior executive at one of China’s largest defense companies claimed that “mechanized equipment is just like the hand o...
By Robert O. Work, James Winnefeld & Stephanie O'Sullivan
PodcastThe Xi Jinping—Josh Hawley tech consensus
Jordan Schneider talks to The Cyberlaw Podcast about China and tech policy. Listen to the full interview from The Cyberlaw Podcast....
By Jordan Schneider
CommentaryWhat the Biden Administration Gets Right and Wrong on ICT in the New Supply Chain Executive Order
The Department of Commerce not only should serve as the lead agency for ICT and semiconductors but also, moving forward, should be the center of any strategy to ensure securit...
By John Costello & Robert Morgus