Back to news

June 23, 2021 | International, C4ISR, Security

Unsupervised Machine Learning in the Military Domain

The STO is a NATO subsidiary body having the same legal status than the NATO itself, and created within the framework of the North Atlantic Treaty signed in Washington in 1949. It has been established with a view to meeting to the best advantage the collective needs of NATO, NATO Nations and partner Nations in the fields of Science and Technology. The STO is operated under the authority of the North Atlantic Council which has delegated the operations of the STO to a Board of Directors (the Science & Technology Board – STB) comprising the NATO Nations S&T managers. The STB is chaired by the NATO Chief Scientist who is a high level recognized S&T leader of a NATO Nation, being permanently assigned to the NATO headquarters in Brussels and also serving as the senior scientific advisor to the NATO leadership.

https://www.sto.nato.int/Lists/STONewsArchive/displaynewsitem.aspx?ID=642

On the same subject

  • Satellite Imagery + Social Media = A New Way to Spot Emerging Nuclear Threats

    July 31, 2018 | International, Aerospace

    Satellite Imagery + Social Media = A New Way to Spot Emerging Nuclear Threats

    BY PATRICK TUCKER A research team is training computers to find and fuse clues from wildly different rivers of digital data. Hiding illicit nuclear programs might be getting harder, thanks to new ways of gleaning and combining clues from various rivers of digital data. That's the conclusion of new research funded in part by the U.S. Energy Department's National Nuclear Security Administration. Satellites offer one kind of information; social media another — particularly inside countries that may be trying to flout inspections. But large volumes of satellite imagery and social media data aren't similar. You can have one analyst examine satellite pictures and another look at social media posts to see if they align, but the process is time-consuming and generally far from comprehensive. The study's authors developed a method for fusing different types of data in a machine-readable way to offer a much clearer picture. “In light of their ubiquitous emergence, social media increasingly promise to be of great value even though associated applications have thus far remained simple, and their fusion with other data has been largely ad hoc,” the team from North Carolina State University writes in “Fusing Heterogeneous Data: A Case for Remote Sensing and Social Media.” Only by creating a new statistical method for fusing the outputs of satellite data and social media data do you get something you can use to predict what might happen next within a given area of interest, such as a specific nation's nuclear enrichment or weapons development. The researchers looked at satellite and social media data from August 2013, when deadly floods killed eight people and caused widespread damage in Colorado. They sought to show that if you could algorithmically identify which imagery showed the flooding from space, and which geotagged tweets described it on the ground, you could could much more quickly verify one data set against another — that is, you could determine whether incoming social media data supports the conclusions you might be reaching from your satellite data, and vice versa. “Next steps for the project include evaluating nuclear facilities in the West to identify common characteristics that may also be applicable to facilities in more isolated societies, such as North Korea,” notes a press release on the paper. One of the authors, NCSU computer and electrical engineering professor Hamid Krim, said the team would try to “address the insufficient knowledge in general in areas of great interest (e.g. N. Korea and Iran). The goal is to come up with systematic methodologies to transport knowledge about nuclear environments available in other areas (e.g., in the West) to these domains where there is very little available. Creating such an environment in these places of interest will help them detect potential undesired activity.” Of course, there are limitations to media monitoring in Iran and North Korea. The former's social media environment is largely underground, thanks to bans on Twitter and many other social networks. The latter has virtually no social media environment at all. Krim noted that the “adversarial strategy” of social-media censorship makes his team's analysis harder. But even social posts from nearby countries can help illuminate their more secretive neighbors, he said — think tweets from Japan after earth tremors are felt. https://www.defenseone.com/technology/2018/07/satellite-imagery-social-media-new-way-spot-emerging-nuclear-threats/150146/

  • The Finnish Defence Forces purchase pilot training services from Patria

    January 11, 2019 | International, Aerospace

    The Finnish Defence Forces purchase pilot training services from Patria

    Patria and the Finnish Defence Forces have signed an agreement on preliminary and basic pilot training services. The contract with Patria Aviation Oy covers in addition to pilot training, maintenance of aircraft necessary during training. The contract is related to the development programme concerning air defence and to the development of pilot training. The training will focus on the Vinka and Grob aircraft used in basic pilot training. Further information: Jyrki Myyryläinen, VP, Training, p.+358 40 869 3315, jyrki.myyrylainen@patria.fi https://www.patria.fi/en/media/news/finnish-defence-forces-purchase-pilot-training-services-patria

  • Happy new (fiscal) year! Feds want more electronic warfare and cybersecurity tools

    October 2, 2018 | International, C4ISR

    Happy new (fiscal) year! Feds want more electronic warfare and cybersecurity tools

    By: Justin Lynch As the new federal fiscal year begins, cybersecurity analysts and industry leaders predict that electronic warfare and managed services will top the U.S. government's priority list to improve cybersecurity during the next fiscal cycle. Lockheed Martin, one of the five major cybersecurity contractors for the federal government, told Fifth Domain that they are focusing on signals intelligence and electronic warfare in the new year, which began Oct. 1. Cybersecurity and electronic warfare “can disrupt, deny, degrade, deceive and destroy adversaries' electronic systems,” Deon Viergutz, vice president of Lockheed Martin's cyber division told Fifth Domain in an email. “The ability to dominate the electromagnetic spectrum allows militaries to not only establish control, but also keep soldiers out of harm's way by providing offensive and defensive techniques from remote locations.” Russia's use of electronic warfare during its 2015 invasion of Ukraine exposed how the Department of Defense needs to boost its own digital combat tools, Brad Curran, an analyst at Front & Sullivan previously told Fifth Domain. The White House's new cybersecurity strategy states that the federal government will boost efforts to lawfully gather evidence of criminal activity and disrupt criminal networks through new legislation. It could translate into a greater need for tools that can manage large amounts of data, such as artificial intelligence. But along with the expected increase in electronic warfare, analysts and firms are predicting a rise in managed and cloud based services. Raytheon, another of the five major cybersecurity U.S. government contractors, said they expected the federal government to need more managed security operations. “Concepts like security operations center-as-a-service, and others are gaining momentum due to the desire for scalability. Federal agencies will continue to look to contracted service providers for expertise and support,” John DeSimone, a vice president for cybersecurity and special missions at Raytheon told Fifth Domain in an email. Curran said he expects the federal government to save money by using more cloud-based services, such as Amazon Web Services and Microsoft's Azure. The Trump administration has seen an increased in shared services, said Suzanne Spaulding, a former undersecretary at the Department of Homeland Security who now works at the Center for Strategic and International Studies. “Which services they will ultimately centralize is hard to see,” Spaulding said. She added the decision-space is “is tricky because at the end of the day, cabinet secretaries also need to be accountable for their own cybersecurity.” Distributed cloud-based communications is a key priority of the Department of Homeland Security, according to the agency's 2017 industry guide. The department also said they were looking to invest in metrics for cybersecurity effectiveness and data capture of networked devices. https://www.fifthdomain.com/industry/2018/10/01/happy-new-fiscal-year-feds-want-more-electronic-warfare-and-cybersecurity-tools

All news