April 13, 2018
How network tools can improve base security
In 2011, the simple exploitation of an existing data set could have prevented a near disaster in northern Afghanistan.
Then, an entire operations center watched as the feed from an MQ-1 drone, newly reassigned from its original mission, displayed a growing group of protesters at the perimeter of a small U.S. forward operating base. Although conventional signals intelligence indicated a possible disturbance, full-motion video confirmed the severity of the threat only well after it had matured. Intelligence analysts didn’t understand what the protestors were doing — and why they were doing it — until they had already massed at the entry point. If used properly, automated social media monitoring and geofencing, which calls for creating virtual geographic boundaries, could have filled this critical gap in situational awareness.
Read the full article at C4ISRNET
More from CNAS
-
How Can the Trump Administration Strengthen U.S. AI Leadership?
With a new administration just around the corner, now is the time for the US to strengthen its position as a global leader in AI. Even with changing leadership, there remain n...
By Paul Scharre
-
How China’s Antitrust Tactics Undermine U.S. Tech Leadership
If the United States fails to address this threat, it risks not just losing ground in the technology race, but ceding control over the rules that govern it....
By Ruby Scanlon
-
Sharper: Tariffs
The incoming Trump administration has signaled that tariffs will be a central pillar of its economic strategy, with significant implications for international trade, the Ameri...
By Eleanor Hume, Charles Horn & Gwendolyn Nowaczyk
-
Technology to Secure the AI Chip Supply Chain: A Working Paper
Advanced artificial intelligence (AI) systems, built and deployed with specialized chips, show vast potential to drive economic growth and scientific progress....
By Tim Fist, Tao Burga & Vivek Chilukuri