In 2011, the simple exploitation of an existing data set could have prevented a near disaster in northern Afghanistan.
Then, an entire operations center watched as the feed from an MQ-1 drone, newly reassigned from its original mission, displayed a growing group of protesters at the perimeter of a small U.S. forward operating base. Although conventional signals intelligence indicated a possible disturbance, full-motion video confirmed the severity of the threat only well after it had matured. Intelligence analysts didn’t understand what the protestors were doing — and why they were doing it — until they had already massed at the entry point. If used properly, automated social media monitoring and geofencing, which calls for creating virtual geographic boundaries, could have filled this critical gap in situational awareness.
Read the full article at C4ISRNET
More from CNAS
CommentaryWhy Huawei Isn’t So Scary
5G may have become a buzzword, but the notion that countries must rush to be first to deploy it is mistaken and reckless—and increases the odds of security breaches. There’s n...
By Elsa B. Kania & Lindsey R. Sheppard
CommentaryChina’s Military Biotech Frontier: CRISPR, Military-Civil Fusion, and the New Revolution in Military Affairs
China’s national strategy of military-civil fusion (军民融合, junmin ronghe) has highlighted biology as a priority. It is hardly surprising that the People’s Republic of China (PR...
By Elsa B. Kania & Wilson VornDick
PodcastChinaEconTalk, Live from Washington, D.C.
ChinaEconTalk is live from the Carnegie Endowment for International Peace in Washington, D.C., with Martijn Rasser, a senior fellow in the Technology and National Security Pro...
By Martijn Rasser
VideoKara Frederick on the rise of robocalls
Kara Frederick joins America's News Headquarters to talk about how robocalls take advantage of people. View the full conversation on Fox News....
By Kara Frederick