April 13, 2018

How network tools can improve base security

In 2011, the simple exploitation of an existing data set could have prevented a near disaster in northern Afghanistan.

Then, an entire operations center watched as the feed from an MQ-1 drone, newly reassigned from its original mission, displayed a growing group of protesters at the perimeter of a small U.S. forward operating base. Although conventional signals intelligence indicated a possible disturbance, full-motion video confirmed the severity of the threat only well after it had matured. Intelligence analysts didn’t understand what the protestors were doing — and why they were doing it — until they had already massed at the entry point. If used properly, automated social media monitoring and geofencing, which calls for creating virtual geographic boundaries, could have filled this critical gap in situational awareness.

Read the full article at C4ISRNET

  • Podcast
    • October 17, 2024
    U.S. Chip Controls and the Future of AI Compute

    That escalated quickly! Emily and Geoff discuss why the U.S. aim to deny China access to the computing power necessary for frontier AI capabilities has led to an ever expandin...

    By Emily Kilcrease, Geoffrey Gertz & Pablo Chavez

  • Podcast
    • October 11, 2024
    Asymmetry and AI: The Battle for Power

    Paul Scharre, Vice President and Director of Studies at CNAS, joins Zero Pressure to discuss the world of asymmetric warfare, a term used to describe imbalances in conflict. F...

    By Paul Scharre

  • Commentary
    • Just Security
    • September 19, 2024
    Competition, Not Control, is Key to Winning the Global AI Race

    The United States, with much of the world’s AI-enabling infrastructure, has positioned itself as the global leader in AI innovation. That might not be the case for much longer...

    By Keegan McBride & Matthew Mittelsteadt

  • Commentary
    • Time
    • September 16, 2024
    Regulating AI Is Easier Than You Think

    Countries can regulate AI from the ground up by controlling access to highly specialized chips...

    By Paul Scharre

View All Reports View All Articles & Multimedia