How Network Tools Tin Amend Base Of Operations Security

By: Kara Frederick  

In 2011, the uncomplicated exploitation of an existing information laid could bring prevented a nigh disaster inwards northern Afghanistan. Then, an entire operations midpoint watched every bit the feed from an MQ-1 drone, newly reassigned from its master copy mission, displayed a growing grouping of protesters at the perimeter of a small-scale US of America frontwards operating base. Although conventional signals tidings indicated a possible disturbance, full-motion video confirmed the severity of the threat exclusively good later it had matured. Intelligence analysts didn’t empathise what the protestors were doing — as well as why they were doing it — until they had already massed at the entry point. If used properly, automated social media monitoring as well as geofencing, which calls for creating virtual geographic boundaries, could bring filled this critical gap inwards situational awareness.

Goodbye gates, guards as well as guns
New technologies are transforming physical safety from “gates, guards as well as guns” to an imperative that’s increasingly reliant on information systems. Efforts similar terminal year’s airplane pilot programme betwixt the Air Force as well as AT&T to institute a perimeter network utilizing multi-protocol label switching as well as SIM flake engineering via an LTE network at Maxwell Air Force Base are the novel normal. That scheme created a wireless smart perimeter alongside infrared sensors as well as facial recognition to discovery as well as position intruders every bit good every bit to alarm base of operations personnel of potential safety breaches.

The military’s role of biometric scanning through facial recognition software, license plate “grabbers,” UAV as well as aerostat surveillance, as well as radar as well as seismic detection sensors are well-nigh requisite for access control. The application of engineering of the meshing of things — every bit evidenced yesteryear well-nigh $9 billion of federal coin inwards 2015 — summation an encompass of artificial tidings feed into the growing chorus for “smart bases.”

Harnessing networks for geo-situational awareness

Yet, i application of novel engineering could rapidly exploit existing information sets as well as live on rapidly employed, probable preventing surprises similar the i inwards Transitional Islamic State of Afghanistan inwards 2011. Using geofencing to surface high-quality, publicly available information, layered atop conventional active as well as passive physical safety measures, would heighten situational awareness to a greater extent than or less military machine bases.

While many bases already exploit social media information as well as integrate large information streams into a mutual operational picture, similar Northrop Grumman’s Critical Incident Response System as well as AT&T’s Common Operational Portal, the US of America military machine tin strength out to a greater extent than widely apply as well as emphasize this concept overseas. For starters, analysts at the tactical score could decide the latitude, longitude as well as radius of the expanse of involvement to a greater extent than or less a frontwards operating base of operations as well as accommodate this geofence for monitoring. Designated social media aggregators would therefore comb available application programme interfaces to surface information inside the bounded area. These aggregators would deliver real-time information (e.g., geotagged photos posted to a diversity of social media platforms) for analysts to triage as well as therefore pigment a comprehensive intel picture, similar to targeters teasing out patterns of life through a watered-down version of activity-based intelligence. Such methodologies to position patterns as well as predictive indicators — oftentimes through automation — are already staples of individual sector as well as US of America police trace enforcement physical safety practices.

To become further, the role of natural linguistic communication processing for sentiment analysis inside this open-source tidings would amend indications as well as warning. Sentiment indicators that position potential threats inwards multiple languages are beingness used inwards the individual sector as well as yesteryear US of America police trace enforcement, alongside obvious applications overseas. Additional advantages of this big-data approach are a prodigious as well as archivable metadata trail, as well as the potential for interagency information-sharing that leverages the link analysis proficiency resident inwards many regime organizations.

Potential obstacles to implementation

Despite its quick deployment potential overseas, domestic applications for the US of America military’s role of geofencing as well as social media monitoring are limited. In a stark trial of litigation risk, Facebook, Instagram as well as Twitter suspended social media monitoring startup Geofeedia’s access later a challenge from the American Civil Liberties Union inwards 2016. Renewed reluctance yesteryear social media companies to portion information alongside 3rd parties, borne out of reported misuse of user information yesteryear the line solid Cambridge Analytica, would probable hinder hereafter evolution of similar technologies. And until costs are offset yesteryear to a greater extent than widely applied AI technology, monitoring as well as assessing the veracity of ingested information volition consume into analytical capacity. Yet, the responsible integration of open-source methodologies that trim jeopardy as well as amend situational awareness surrounding US of America military machine bases is worth the roadblocks. Otherwise, the jeopardy of surprise is also great.

Kara Frederick is a query associate for the engineering as well as national safety programme at the Center for a New American Security. She has worked for every bit an tidings analyst for Facebook as well as the Department of Defense.
Buat lebih berguna, kongsi:

Trending Kini: