April 13, 2018
How network tools can improve base security
In 2011, the simple exploitation of an existing data set could have prevented a near disaster in northern Afghanistan.
Then, an entire operations center watched as the feed from an MQ-1 drone, newly reassigned from its original mission, displayed a growing group of protesters at the perimeter of a small U.S. forward operating base. Although conventional signals intelligence indicated a possible disturbance, full-motion video confirmed the severity of the threat only well after it had matured. Intelligence analysts didn’t understand what the protestors were doing — and why they were doing it — until they had already massed at the entry point. If used properly, automated social media monitoring and geofencing, which calls for creating virtual geographic boundaries, could have filled this critical gap in situational awareness.
Read the full article at C4ISRNET
More from CNAS
-
The Just Security Podcast: Diving Deeper into DeepSeek
The DeepSeek saga raises urgent questions about China’s AI ambitions, the future of U.S. technological leadership, and the strategic implications of open-source AI models. How...
By Keegan McBride
-
The Implications of DeepSeek
When the Chinese artificial intelligence company DeepSeek unveiled its AI chatbot just weeks ago, it shook up the U.S. tech industry and set off an AI competition. DeepSeek sa...
By Jordan Schneider
-
The Brute Force Method for Training AI Models Is Dead, Says Full-Stack Generative AI CEO May Habib
Full-Stack Generative AI CEO May Habib and Jordan Schneider, adjunct fellow in the Technology and National Security Program, join 'Power Lunch' to discuss Nvidia, Singapore an...
By Jordan Schneider
-
DeepSeek DeepDive + Hands-On With Operator + Hot Mess Express!
ChinaTalks’ Jordan Schneider, adjunct fellow of the Technology and National Security Program at the Center for a New American Security, joins to explain the Chinese A.I. indus...
By Jordan Schneider