Satellite Imagery + Social Media = A New Way To Spot Emerging Nuclear Threats

Hiding illicit nuclear programs might be getting harder, thanks to new ways of gleaning and combining clues from various rivers of digital data. That’s the conclusion of new research funded in part by the US Energy Department’s National Nuclear Security Administration.

Satellites offer one kind of information; social media another, particularly inside countries that may be trying to flout inspections. But large volumes of satellite imagery and social media data aren’t similar.

You can have one analyst examine satellite pictures and another look at social media posts to see if they align, but the process is time-consuming and generally far from comprehensive. The study’s authors developed a method for fusing different types of data in a machine-readable way to offer a much clearer picture.

“In light of their ubiquitous emergence, social media increasingly promise to be of great value even though associated applications have thus far remained simple, and their fusion with other data has been largely ad hoc,” the team from North Carolina State University writes in “Fusing Heterogeneous Data: A Case for Remote Sensing and Social Media.

Only by creating a new statistical method for fusing the outputs of satellite data and social media data do you get something you can use to predict what might happen next within a given area of interest, such as a specific nation’s nuclear enrichment or weapons development.

The researchers looked at satellite and social media data from August 2013, when deadly floods killed eight people and caused widespread damage in Colorado.

They sought to show that if you could algorithmically identify which imagery showed the flooding from space, and which geotagged tweets described it on the ground, you could much more quickly verify one data set against another, that is, you could determine whether incoming social media data supports the conclusions you might be reaching from your satellite data, and vice versa.

“Next steps for the project include evaluating nuclear facilities in the West to identify common characteristics that may also be applicable to facilities in more isolated societies, such as North Korea,” notes a press release on the paper.

One of the authors, NCSU computer and electrical engineering professor Hamid Krim, said the team would try to “address the insufficient knowledge in general in areas of great interest (N. Korea and Iran).

The goal is to come up with systematic methodologies to transport knowledge about nuclear environments available in other areas (e.g., in the West) to these domains where there is very little available. Creating such an environment in these places of interest will help them detect potential undesired activity.”

Of course, there are limitations to media monitoring in Iran and North Korea. The former’s social media environment is largely underground, thanks to bans on Twitter and many other social networks. The latter has virtually no social media environment at all.

Krim noted that the “adversarial strategy” of social-media censorship makes his team’s analysis harder. But even social posts from nearby countries can help illuminate their more secretive neighbors, he said, think tweets from Japan after earth tremors are felt.

DefenseOne

You Might Also Read: 

The Pentagon's AI Program To Find Hidden Nuclear Missiles:

AI Increases The Risks of Nuclear War:

 

« Criminals Are Driving Australian Data Breaches
GDPR Means Revisiting Email Marketing »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Indelible Data

Indelible Data

Indelible Data is an established information security and technology consultancy and a Cyber Essentials Certification Body.

Fieldfisher

Fieldfisher

Fieldfisher's Technology, Outsourcing & Privacy Group has class-leading expertise in privacy, data & cybersecurity, digital media, big data, the cloud, mobile payments and mobile apps.

ThetaRay

ThetaRay

ThetaRay’s solution for Industrial cyber security protects against unknown cyber-attacks that target industry and critical infrastructure.

Wilson Sonsini Goodrich & Rosati (WSGR)

Wilson Sonsini Goodrich & Rosati (WSGR)

WSGR is the premier provider of legal services to technology, life sciences, and growth enterprises worldwide. Practice areas include cybersecurity and data protection.

CERT.LV

CERT.LV

CERT.LV is the national Computer Emergency Response Team for Latvia.

Cyber Security For Critical Assets (CS4CA)

Cyber Security For Critical Assets (CS4CA)

Cyber Security For Critical Assets is a global series of summits focusing on cyber security for critical infrastructure.

Steganos

Steganos

Steganos offers highly secure and easy to use software tools that protect and secure on and offline data.

TCN

TCN

TCN is an advanced System Integrator and Infrastructure Company in Albania.

Wipro

Wipro

Wipro Limited is a leading global information technology, consulting and business process services company.

IAR Systems

IAR Systems

IAR Systems are a frontrunner in a changing industry, and a future-proof software supplier enabling the IoT.

Axiomtek

Axiomtek

Axiomtek is a leading design and manufacturing company in the industrial computer and embedded field.

LOGbinder

LOGbinder

LOGbinder eliminates blind spots in security intelligence for endpoints and applications.

Institute for Security and Technology (IST)

Institute for Security and Technology (IST)

The Institute for Security and Technology's goal is to provide the tools and insights needed for companies and governments to outpace emerging global security threats.

Deeper Network

Deeper Network

Deeper Network represents the world's first decentralized blockchain network for building a truly private, secure and fair Internet.

Marcum Technology

Marcum Technology

Marcum Technology consultants are focused on helping you reach your company’s full potential by exploring creative ways to integrate tomorrow’s technology into your business today.

PagerDuty

PagerDuty

PagerDuty is the central nervous system for a company’s digital operations. We identify issues in real-time and bring together the right people to respond to problems faster.