April 13, 2018
How network tools can improve base security
In 2011, the simple exploitation of an existing data set could have prevented a near disaster in northern Afghanistan.
Then, an entire operations center watched as the feed from an MQ-1 drone, newly reassigned from its original mission, displayed a growing group of protesters at the perimeter of a small U.S. forward operating base. Although conventional signals intelligence indicated a possible disturbance, full-motion video confirmed the severity of the threat only well after it had matured. Intelligence analysts didn’t understand what the protestors were doing — and why they were doing it — until they had already massed at the entry point. If used properly, automated social media monitoring and geofencing, which calls for creating virtual geographic boundaries, could have filled this critical gap in situational awareness.
Read the full article at C4ISRNET
More from CNAS
-
U.S. Chip Controls and the Future of AI Compute
That escalated quickly! Emily and Geoff discuss why the U.S. aim to deny China access to the computing power necessary for frontier AI capabilities has led to an ever expandin...
By Emily Kilcrease, Geoffrey Gertz & Pablo Chavez
-
Asymmetry and AI: The Battle for Power
Paul Scharre, Vice President and Director of Studies at CNAS, joins Zero Pressure to discuss the world of asymmetric warfare, a term used to describe imbalances in conflict. F...
By Paul Scharre
-
Competition, Not Control, is Key to Winning the Global AI Race
The United States, with much of the world’s AI-enabling infrastructure, has positioned itself as the global leader in AI innovation. That might not be the case for much longer...
By Keegan McBride & Matthew Mittelsteadt
-
Regulating AI Is Easier Than You Think
Countries can regulate AI from the ground up by controlling access to highly specialized chips...
By Paul Scharre