Back to news

July 31, 2018 | International, Aerospace

Satellite Imagery + Social Media = A New Way to Spot Emerging Nuclear Threats

BY PATRICK TUCKER

A research team is training computers to find and fuse clues from wildly different rivers of digital data.

Hiding illicit nuclear programs might be getting harder, thanks to new ways of gleaning and combining clues from various rivers of digital data. That's the conclusion of new research funded in part by the U.S. Energy Department's National Nuclear Security Administration.

Satellites offer one kind of information; social media another — particularly inside countries that may be trying to flout inspections. But large volumes of satellite imagery and social media data aren't similar. You can have one analyst examine satellite pictures and another look at social media posts to see if they align, but the process is time-consuming and generally far from comprehensive. The study's authors developed a method for fusing different types of data in a machine-readable way to offer a much clearer picture.

“In light of their ubiquitous emergence, social media increasingly promise to be of great value even though associated applications have thus far remained simple, and their fusion with other data has been largely ad hoc,” the team from North Carolina State University writes in “Fusing Heterogeneous Data: A Case for Remote Sensing and Social Media.” Only by creating a new statistical method for fusing the outputs of satellite data and social media data do you get something you can use to predict what might happen next within a given area of interest, such as a specific nation's nuclear enrichment or weapons development.

The researchers looked at satellite and social media data from August 2013, when deadly floods killed eight people and caused widespread damage in Colorado. They sought to show that if you could algorithmically identify which imagery showed the flooding from space, and which geotagged tweets described it on the ground, you could could much more quickly verify one data set against another — that is, you could determine whether incoming social media data supports the conclusions you might be reaching from your satellite data, and vice versa.

“Next steps for the project include evaluating nuclear facilities in the West to identify common characteristics that may also be applicable to facilities in more isolated societies, such as North Korea,” notes a press release on the paper.

One of the authors, NCSU computer and electrical engineering professor Hamid Krim, said the team would try to “address the insufficient knowledge in general in areas of great interest (e.g. N. Korea and Iran). The goal is to come up with systematic methodologies to transport knowledge about nuclear environments available in other areas (e.g., in the West) to these domains where there is very little available. Creating such an environment in these places of interest will help them detect potential undesired activity.”

Of course, there are limitations to media monitoring in Iran and North Korea. The former's social media environment is largely underground, thanks to bans on Twitter and many other social networks. The latter has virtually no social media environment at all. Krim noted that the “adversarial strategy” of social-media censorship makes his team's analysis harder. But even social posts from nearby countries can help illuminate their more secretive neighbors, he said — think tweets from Japan after earth tremors are felt.

https://www.defenseone.com/technology/2018/07/satellite-imagery-social-media-new-way-spot-emerging-nuclear-threats/150146/

On the same subject

  • DARPA program blending robots in the squad to find and destroy threats

    December 31, 2018 | International, C4ISR

    DARPA program blending robots in the squad to find and destroy threats

    By: Todd South The agency that invented stealth technology, the internet, and the M16 has its sights focused on enhancing how the infantry squad works on the battlefield with robots, and advanced targeting and sensing gear. The Squad X program saw its first week-long series of tests at Twentynine Palms, California, this past year. At that event, Marine squads used air and ground vehicles to detect physical, electromagnetic and cyber threats, according to the Defense Advanced Research Projects Agency. The agency's program manager for their Tactical Technology Office, Army Lt. Col. Phil Root said that the first experiment in the program demonstrated “the ability for the squad to communicate and collaborate, even while ‘dancing on the edge of connectivity.'” Squad X Core Technologies program, or SXCT, is an ongoing effort to develop novel technologies that would “extend squad awareness and engagement capabilities without imposing physical and cognitive burdens,” according to a DARPA press release. They aim to speed the development of new, lightweight, integrated systems that provide infantry squads awareness, adaptability and flexibility in complex environments. That effort is to enable dismounted soldiers and Marines to more intuitively understand and control their complex mission environments, according to Root. Those efforts fit within wider work being done by the Close Combat Lethality Task Force, a group set up this past year to enhance close combat capabilities for infantry, special operations, scouts and some engineers. Root is also the program manager for Squad X Core Technologies. He laid out four key technical areas that the program is exploring: Precision Engagement: Precisely engage threats while maintaining compatibility with infantry weapon systems and without imposing weight or operational burdens that would negatively affect mission effectiveness. Capabilities of interest include distributed, non-line-of-sight targeting and guided munitions. Non-Kinetic Engagement: Disrupt enemy command and control, communications and use of drones. Capabilities of interest include disaggregated electronic surveillance and coordinated effects from distributed platforms. Squad Sensing: Detect potential threats at a squad-relevant operational pace. Capabilities of interest include multi-source data fusion and autonomous threat detection. Squad Autonomy: Increase squad members' real-time knowledge of their own and teammates' locations in GPS-denied environments using embedded unmanned air and ground systems. Capabilities of interest include robust collaboration between humans and unmanned systems. Some of those areas were previously explored in 2015 with DARPA's squad technology integration efforts. The tools used to detect threats in the experiments were newer, lighter, versions of previous capabilities. But the release did not provide detailed examples of the gear that Marines tested. “Each run, they learned a bit more on the systems and how they could support the operation,” said Root. “By the end, they were using the unmanned ground and aerial systems to maximize the squad's combat power and allow a squad to complete a mission that normally would take a platoon to execute.” The August event at the Marine Corps Air Ground Combat Center was one of a number of experiments in communications, cyber, EW, loitering munitions and targeting that was conducted over the past year. Both Lockheed Martin Missiles and Fire Control, and CACI's BIT Systems are working for ways to enhance infantry capabilities using manned-unmanned teaming, according to the release. Marines testing Lockheed Martin's Augmented Spectral Situational Awareness, and Unaided Localization for Transformative Squads, known as the ASSAULTS system, used autonomous robots with sensor systems to detect enemy locations, allowing the Marines to target the enemy with a precision 40mm grenade before the enemy could detect their movement, according to the release. Small units using CACI's BITS Electronic Attack Module were able to detect, locate, and attack specific threats in the radio frequency and cyber domains. This is all part of larger efforts to put more detection and fires at lower echelons in both the Army and Marine Corps. https://www.militarytimes.com/news/your-army/2018/12/30/darpa-program-blending-robots-in-the-squad-to-find-and-destroy-threats

  • Remarks made by Minister of Foreign Affairs Mélanie Joly at the launch of the Arctic Foreign Policy
  • Chinese APT Exploits BeyondTrust API Key to Access U.S. Treasury Systems and Documents

    December 31, 2024 | International, C4ISR, Security

    Chinese APT Exploits BeyondTrust API Key to Access U.S. Treasury Systems and Documents

    U.S. Treasury breached by Chinese APT actors via BeyondTrust API key; critical CVE-2024-12356 exploited.

All news