Pentagon Wants to Use Social Media On the Battlefield

Artificial intelligence will weave open-source and satellite data into useful intelligence in real time, the Pentagon says.

It still takes the US military too long to turn social media and other open-source information into something that operators in the field can use. Artificial intelligence is going to change that, and give U.S. troops a distinct battlefield edge, says US Deputy Defense Secretary Bob Work.(pictured)

Take the 2014 downing of Malaysian flight MH17 over Ukraine. (A conventional investigation by a European Union Joint Investigation Team took more than a year to affix blame to pro-Russian separatists operating a Russian-made BUK surface-to-air missile.)

To test the current state of machine learning applied to open source intelligence, the Pentagon hired a data integration and geospatial intelligence company called Orbital Insight, a big-data analytics company with a focus on satellite imagery and geospatial data. Most of their business is commercial, for example, they, analyze pictures of parking lots from space to predict holiday sales trends.

The company quickly scanned all available open-source media and assembled a picture of evidence, and did it instantly. He used slides to tell the story to an audience at the Center for Strategic and International Studies: “On the lower left is a Twitter shot of MH17 taking off…The next one comes from ParisMatch.com. It is the picture of the Russian SA-11 launcher with a serial number on it, date and time stamped near the village where the shoot-down occurred; then on Bellingcat.com, the exact same SA-11, at the exact same location. Then there’s a Twitter shot of a contrail of a missile rising at the time of the shoot-down.

Then a rebel leader takes credit for the shoot down on VK.com. That was immediately taken down, by the way. Finally, on YouTube, there’s a picture of the exact same SA-11 with a missile rail that is now mysteriously empty going back into Russia. Learning machines did this without any human interaction.”

That sort of rapid insight will be key to winning future conflicts where not all the players wear uniforms, like the masked “little green men” who invaded the Crimean peninsula in 2014. The United States and other international observers believed that Russian military officers were working with the separatists, a charge Russia at first denied. The ambiguity surrounding the identity of the invaders inhibited a coordinated international response.

“This type of stuff will allow us new indications and warning in gray-zone operations, the little green men,” said Work. “Learning machines can say, ‘There is an influence operation going on. We don’t know who is doing it but here are the key themes of the influence operation.’ There will be new means of going after terrorists. There will be new means of operating against regional powers. There will be new ways of operating against great state powers. This is totally transferable across the range of operations.”  

It’s an example of why next-generation machine learning and artificial intelligence are key to the Pentagon’s push for technologies that will secure military dominance over competing nations, sometimes referred to as the Third Offset.

The military, of course, already uses social media for operations. In 2015, Air Combat Command’s Gen. Hawk Carlisle described how it helped the Air Force pull off a precision strike against ISIS. The airmen were “combing through social media and they see some moron standing at this command,” Carlisle said. “So they do some work, long story short, about 22 hours later through that very building, three JDAMs take that entire building out.”

The goal now is to shorten the time from data collection to actionable intelligence from a day to immediately.

Some observers pointed out that each of those data sources, particularly Bellingcat, the international open source news collective, provided a good indication of an influence operation afoot, and were doing so in real time.

DefenseOne

« Facebook’s Drone Ambitions Are Getting Bigger
Education Is The Key To Minimise Cyber Risk For Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Tiro Security

Tiro Security

Tiro Security is a boutique company specializing in information security and IT audit recruitment and solutions.

Technology Industries of Finland (TIF)

Technology Industries of Finland (TIF)

Technology Industries of Finland (TIF) is a business and labour market lobbying organization that promotes the competitiveness and business conditions of Finland’s most crucial export industry.

Atomicorp

Atomicorp

Atomicorp, the leader in Secure Linux, is a developer of solutions for the protection and support of cloud, virtual, shared, and dedicated web hosting environments.

Cyberint

Cyberint

Cyberint, the Impactful Intelligence company, fuses open-deep-and darkweb Threat Intelligence with Attack Surface Management to deliver maximum protection from external threats.

CSIRT GOV - Poland

CSIRT GOV - Poland

Computer Security Incident Response Team CSIRT GOV, run by the Head of the Internal Security Agency, acts as the national CSIRT responsible for coordinating the response to computer incidents.

Cask Government Services

Cask Government Services

Cask Government Services focuses on program management, cybersecurity, logistics, business analysis and engineering services for Federal, State and Local Government.

Hysolate

Hysolate

Hysolate has transformed the endpoint, making it the secure and productive environment it was meant to be.

Enclave Networks

Enclave Networks

Our mission is to give IT professionals a simple way to rapidly build secure connectivity between any application, computer system, device or infrastructure - regardless of the underlying network.

Bleckwen

Bleckwen

Bleckwen is a proven fraud detection system that helps financial institutions build trust with customers.

DeNexus

DeNexus

DeNexus is the leading provider of cyber risk modeling for industrial networks. Our Mission is to build the Global Standard for Industrial Cyber Risk Quantification.

Nigerian Communications Commission (NCC)

Nigerian Communications Commission (NCC)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.

Verichains

Verichains

Verichains Lab is a pioneer and leading APAC blockchain security firm with extensive expertise in the areas of security, cryptography and core blockchain technology.

CERT.ar

CERT.ar

CERT.ar is the national Computer Emergency Response Team for the technical-administrative management of computer security incidents in the National Public Sector of Argentina.

Seven AI

Seven AI

Seven AI develops cyber security software designed to identify online threats.

Amnet Technology Solutions (Amnet Systems)

Amnet Technology Solutions (Amnet Systems)

Amnet Systems is a technology services organization that provides Managed IT, Cloud Computing, Cyber Security, Data Center and Audio Visual services since 1995.

Quantum Dice

Quantum Dice

Quantum Dice is an award-winning venture-backed spinout from Oxford University’s world-renowned quantum optics laboratory.