Satellite Imagery + Social Media = A New Way To Spot Emerging Nuclear Threats

Please log in to browse. Login now

Hiding illicit nuclear programs might be getting harder, thanks to new ways of gleaning and combining clues from various rivers of digital data. That’s the conclusion of new research funded in part by the US Energy Department’s National Nuclear Security Administration.

Satellites offer one kind of information; social media another, particularly inside countries that may be trying to flout inspections. But large volumes of satellite imagery and social media data aren’t similar.

You can have one analyst examine satellite pictures and another look at social media posts to see if they align, but the process is time-consuming and generally far from comprehensive. The study’s authors developed a method for fusing different types of data in a machine-readable way to offer a much clearer picture.

“In light of their ubiquitous emergence, social media increasingly promise to be of great value even though associated applications have thus far remained simple, and their fusion with other data has been largely ad hoc,” the team from North Carolina State University writes in “Fusing Heterogeneous Data: A Case for Remote Sensing and Social Media.

Only by creating a new statistical method for fusing the outputs of satellite data and social media data do you get something you can use to predict what might happen next within a given area of interest, such as a specific nation’s nuclear enrichment or weapons development.

The researchers looked at satellite and social media data from August 2013, when deadly floods killed eight people and caused widespread damage in Colorado.

They sought to show that if you could algorithmically identify which imagery showed the flooding from space, and which geotagged tweets described it on the ground, you could much more quickly verify one data set against another, that is, you could determine whether incoming social media data supports the conclusions you might be reaching from your satellite data, and vice versa.

“Next steps for the project include evaluating nuclear facilities in the West to identify common characteristics that may also be applicable to facilities in more isolated societies, such as North Korea,” notes a press release on the paper.

One of the authors, NCSU computer and electrical engineering professor Hamid Krim, said the team would try to “address the insufficient knowledge in general in areas of great interest (N. Korea and Iran).

The goal is to come up with systematic methodologies to transport knowledge about nuclear environments available in other areas (e.g., in the West) to these domains where there is very little available. Creating such an environment in these places of interest will help them detect potential undesired activity.”

Of course, there are limitations to media monitoring in Iran and North Korea. The former’s social media environment is largely underground, thanks to bans on Twitter and many other social networks. The latter has virtually no social media environment at all.

Krim noted that the “adversarial strategy” of social-media censorship makes his team’s analysis harder. But even social posts from nearby countries can help illuminate their more secretive neighbors, he said, think tweets from Japan after earth tremors are felt.

DefenseOne

You Might Also Read: 

The Pentagon's AI Program To Find Hidden Nuclear Missiles:

AI Increases The Risks of Nuclear War:

 

« Criminals Are Driving Australian Data Breaches
GDPR Means Revisiting Email Marketing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Quality Professionals (Q-Pros)

Quality Professionals (Q-Pros)

QPros are a recognized leader in providing full-cycle software quality assurance and application testing services.

UZCERT

UZCERT

UZCERT is the national Computer Emergency Response Team for Uzbekistan.

NetLib Security

NetLib Security

NetLib Security’s powerful, patented data security platform helps companies control data loss prevention (DLP) by managing what data can be transferred outside of their network.

Matta

Matta

Matta is a cyber security consulting company providing information security services and solutions including vulnerability assessments, penetration testing and emergency response.

BehavioSec

BehavioSec

BehavioSec uses the way your customers type, swipe, and hold their devices, and enables them to authenticate themselves through their own behavior patterns.

Cortado Mobile Solutions

Cortado Mobile Solutions

Cortado Mobile Solutions creates enterprise mobility and file sharing solutions for companies, teams and freelancers.

Kingsley Napley

Kingsley Napley

Cyber crime is an area of growing legal complexity. Our team of cyber crime lawyers have vast experience of the law in this area.

Asvin

Asvin

Asvin provides secure update management and delivery for Internet of Things - IoT Edge devices.

Gigacycle

Gigacycle

Gigacycle is one of the leading IT disposal and recycling providers in the UK. We specialise in IT asset disposal (ITAD) and data destruction.

Belle de Mai Incubator

Belle de Mai Incubator

Belle de Mai Incubator supports and funds innovative startup ideas in digital industries.

Mphasis

Mphasis

Mphasis is a leading applied technology services company applying next-generation technology to help enterprises transform businesses globally.

SafeTech Informatics & Consulting

SafeTech Informatics & Consulting

Safetech's OTShield detects, prevents and analyses cyber-attacks in SCADA and Industrial IoT systems by utilising state of the art deception techniques.

C3.ai Digital Transformation Institute

C3.ai Digital Transformation Institute

The C3.ai Digital Transformation Institute is a research consortium dedicated to accelerating the benefits of artificial intelligence for business, government, and society.

SecurityGen

SecurityGen

SecurityGen is a global cybersecurity start-up focused on telecom security, with a focus on 5G networks.

Hughes Network Systems

Hughes Network Systems

Hughes are industry leaders in networking technologies and services, innovating constantly to deliver the global solutions that power a connected future for people, enterprises and things everywhere.

Core42

Core42

Core42 provides a full-spectrum of AI enablement solutions covering cloud, data, cybersecurity and digital services designed for customer success.