April 13, 2018
How network tools can improve base security
In 2011, the simple exploitation of an existing data set could have prevented a near disaster in northern Afghanistan.
Then, an entire operations center watched as the feed from an MQ-1 drone, newly reassigned from its original mission, displayed a growing group of protesters at the perimeter of a small U.S. forward operating base. Although conventional signals intelligence indicated a possible disturbance, full-motion video confirmed the severity of the threat only well after it had matured. Intelligence analysts didn’t understand what the protestors were doing — and why they were doing it — until they had already massed at the entry point. If used properly, automated social media monitoring and geofencing, which calls for creating virtual geographic boundaries, could have filled this critical gap in situational awareness.
Read the full article at C4ISRNET
More from CNAS
-
As Trump Reshapes AI Policy, Here’s How He Could Protect America’s AI Advantage
The nation that solidifies its AI advantage will shape the trajectory of the most transformative technology of our era....
By Janet Egan, Paul Scharre & Vivek Chilukuri
-
Ukraine Symposium – The Continuing Autonomous Arms Race
This war-powered technology race does not appear to be losing steam, and what happens on the battlefields of Ukraine can potentially define how belligerents use military auton...
By Samuel Bendett
-
Beyond DeepSeek: How China’s AI Ecosystem Fuels Breakthroughs
While the United States should not mimic China’s state-backed funding model, it also can’t leave AI’s future to the market alone....
By Ruby Scanlon
-
Averting AI Armageddon
In recent years, the previous bipolar nuclear order led by the United States and Russia has given way to a more volatile tripolar one, as China has quantitatively and qualitat...
By Jacob Stokes, Colin H. Kahl, Andrea Kendall-Taylor & Nicholas Lokker