Pentagon Wants to Use Social Media On the Battlefield

Artificial intelligence will weave open-source and satellite data into useful intelligence in real time, the Pentagon says.

It still takes the US military too long to turn social media and other open-source information into something that operators in the field can use. Artificial intelligence is going to change that, and give U.S. troops a distinct battlefield edge, says US Deputy Defense Secretary Bob Work.(pictured)

Take the 2014 downing of Malaysian flight MH17 over Ukraine. (A conventional investigation by a European Union Joint Investigation Team took more than a year to affix blame to pro-Russian separatists operating a Russian-made BUK surface-to-air missile.)

To test the current state of machine learning applied to open source intelligence, the Pentagon hired a data integration and geospatial intelligence company called Orbital Insight, a big-data analytics company with a focus on satellite imagery and geospatial data. Most of their business is commercial, for example, they, analyze pictures of parking lots from space to predict holiday sales trends.

The company quickly scanned all available open-source media and assembled a picture of evidence, and did it instantly. He used slides to tell the story to an audience at the Center for Strategic and International Studies: “On the lower left is a Twitter shot of MH17 taking off…The next one comes from ParisMatch.com. It is the picture of the Russian SA-11 launcher with a serial number on it, date and time stamped near the village where the shoot-down occurred; then on Bellingcat.com, the exact same SA-11, at the exact same location. Then there’s a Twitter shot of a contrail of a missile rising at the time of the shoot-down.

Then a rebel leader takes credit for the shoot down on VK.com. That was immediately taken down, by the way. Finally, on YouTube, there’s a picture of the exact same SA-11 with a missile rail that is now mysteriously empty going back into Russia. Learning machines did this without any human interaction.”

That sort of rapid insight will be key to winning future conflicts where not all the players wear uniforms, like the masked “little green men” who invaded the Crimean peninsula in 2014. The United States and other international observers believed that Russian military officers were working with the separatists, a charge Russia at first denied. The ambiguity surrounding the identity of the invaders inhibited a coordinated international response.

“This type of stuff will allow us new indications and warning in gray-zone operations, the little green men,” said Work. “Learning machines can say, ‘There is an influence operation going on. We don’t know who is doing it but here are the key themes of the influence operation.’ There will be new means of going after terrorists. There will be new means of operating against regional powers. There will be new ways of operating against great state powers. This is totally transferable across the range of operations.”  

It’s an example of why next-generation machine learning and artificial intelligence are key to the Pentagon’s push for technologies that will secure military dominance over competing nations, sometimes referred to as the Third Offset.

The military, of course, already uses social media for operations. In 2015, Air Combat Command’s Gen. Hawk Carlisle described how it helped the Air Force pull off a precision strike against ISIS. The airmen were “combing through social media and they see some moron standing at this command,” Carlisle said. “So they do some work, long story short, about 22 hours later through that very building, three JDAMs take that entire building out.”

The goal now is to shorten the time from data collection to actionable intelligence from a day to immediately.

Some observers pointed out that each of those data sources, particularly Bellingcat, the international open source news collective, provided a good indication of an influence operation afoot, and were doing so in real time.

DefenseOne

« Facebook’s Drone Ambitions Are Getting Bigger
Education Is The Key To Minimise Cyber Risk For Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Red Hat

Red Hat

Red Hat is a leader in open source software development. Our software security team proactively identifies weaknesses before they become problems.

Sparta Consulting

Sparta Consulting

Sparta Consulting is an information management and business development full service provider.

Thomas Miller Specialty

Thomas Miller Specialty

Thomas Miller Specialty is a commercial Managing General Agency providing specialty risks insurance including Cyber & e-crime insurance.

Upstream Security

Upstream Security

Upstream Security is the first cloud-based cyber-security solution that protects the technologies and applications of connected and autonomous vehicles.

Cryptshare

Cryptshare

Cryptshare is a communication solution that enables you to share e-mails and files of any size securely.

Accredia

Accredia

Accredia is the national accreditation body for Italy. The directory of members provides details of organisations offering certification services for ISO 27001.

GoCyber

GoCyber

GoCyber is a new, highly innovative cyber security training app that uses action based learning to significantly improve the online behaviour of all employees in less than a month.

Cohesity

Cohesity

Cohesity radically simplifies the way businesses back up, manage, protect, and extract value from their data—in the data center, at the edge, and in the cloud.

Nettoken

Nettoken

Nettoken is the first identity management platform designed for everyday internet users, to encourage awareness and control of our ever expanding digital footprint and personal cybersecurity.

ARIA Cybersecurity Solutions

ARIA Cybersecurity Solutions

The ARIA ADR Automatic Detection & Response solution was designed to find, verify, and stop all types of attacks - automatically and in real time.

Valimail

Valimail

Valimail delivers the only complete, cloud-native platform for validating and authenticating sender identity to stop phishing, protect and amplify brands, and ensure compliance.

AnzenSage

AnzenSage

AnzenSage is a cybersecurity advisory consultancy specializing in security risk resilience for the food sector: agriculture, food manufacturing, food supply chain, vineyards, and wineries.

Digital Catapult

Digital Catapult

Digital Catapult is the UK authority on advanced digital technology. We bring out the best in business by accelerating new possibilities with advanced digital technologies.

Unified Solutions

Unified Solutions

Unified Solutions provide a full continuum of cyber security services, compliance, and technology solutions.

RAH Infotech

RAH Infotech

RAH Infotech is India’s leading value added distributor and solutions provider in the Network and Security domain. We are specialists in Enterprise and App Security and Application Delivery.

Noma Security

Noma Security

Noma Security's mission is Application Security for the Entire Data & AI Lifecycle.