Satellite Imagery + Social Media = A New Way To Spot Emerging Nuclear Threats

Hiding illicit nuclear programs might be getting harder, thanks to new ways of gleaning and combining clues from various rivers of digital data. That’s the conclusion of new research funded in part by the US Energy Department’s National Nuclear Security Administration.

Satellites offer one kind of information; social media another, particularly inside countries that may be trying to flout inspections. But large volumes of satellite imagery and social media data aren’t similar.

You can have one analyst examine satellite pictures and another look at social media posts to see if they align, but the process is time-consuming and generally far from comprehensive. The study’s authors developed a method for fusing different types of data in a machine-readable way to offer a much clearer picture.

“In light of their ubiquitous emergence, social media increasingly promise to be of great value even though associated applications have thus far remained simple, and their fusion with other data has been largely ad hoc,” the team from North Carolina State University writes in “Fusing Heterogeneous Data: A Case for Remote Sensing and Social Media.

Only by creating a new statistical method for fusing the outputs of satellite data and social media data do you get something you can use to predict what might happen next within a given area of interest, such as a specific nation’s nuclear enrichment or weapons development.

The researchers looked at satellite and social media data from August 2013, when deadly floods killed eight people and caused widespread damage in Colorado.

They sought to show that if you could algorithmically identify which imagery showed the flooding from space, and which geotagged tweets described it on the ground, you could much more quickly verify one data set against another, that is, you could determine whether incoming social media data supports the conclusions you might be reaching from your satellite data, and vice versa.

“Next steps for the project include evaluating nuclear facilities in the West to identify common characteristics that may also be applicable to facilities in more isolated societies, such as North Korea,” notes a press release on the paper.

One of the authors, NCSU computer and electrical engineering professor Hamid Krim, said the team would try to “address the insufficient knowledge in general in areas of great interest (N. Korea and Iran).

The goal is to come up with systematic methodologies to transport knowledge about nuclear environments available in other areas (e.g., in the West) to these domains where there is very little available. Creating such an environment in these places of interest will help them detect potential undesired activity.”

Of course, there are limitations to media monitoring in Iran and North Korea. The former’s social media environment is largely underground, thanks to bans on Twitter and many other social networks. The latter has virtually no social media environment at all.

Krim noted that the “adversarial strategy” of social-media censorship makes his team’s analysis harder. But even social posts from nearby countries can help illuminate their more secretive neighbors, he said, think tweets from Japan after earth tremors are felt.

DefenseOne

You Might Also Read: 

The Pentagon's AI Program To Find Hidden Nuclear Missiles:

AI Increases The Risks of Nuclear War:

 

« Criminals Are Driving Australian Data Breaches
GDPR Means Revisiting Email Marketing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Exclusive Networks

Exclusive Networks

Exclusive Networks accelerate market entry and growth for innovative cybersecurity, networking and infrastructure technologies.

Cortado Mobile Solutions

Cortado Mobile Solutions

Cortado Mobile Solutions is the manufacturer of the mobile device management solution Cortado MDM.

Fair Isaac Corporation (FICO)

Fair Isaac Corporation (FICO)

FICO provides analytics software and tools used across multiple industries to manage risk, fight fraud, optimize operations and meet strict government regulations.

InPhySec

InPhySec

InPhySec is a leading New Zealand information, physical and cyber security company.

ENLIGHTENi

ENLIGHTENi

ENLIGHTENi are the platform to develop next-gen talent in Technology, Risk, and Cybersecurity. Our mission is to develop next-gen talent through challenge-based learning and team collaboration.

Southwest Research Institute (SwRI)

Southwest Research Institute (SwRI)

Southwest Research Institute SwRI are R&D problem solvers providing independent services to government and industry clients. Areas of expertise include Cybersecurity, Intelligent Networks and IoT.

oneM2M

oneM2M

oneM2M is a global organization creating a scalable and interoperable standard for communications of devices and services used in M2M applications and the Internet of Things.

Open Connectivity Foundation (OCF)

Open Connectivity Foundation (OCF)

OCF is dedicated to ensuring secure interoperability ensuring secure interoperability of IoT for consumers, businesses and industries.

Pinpoint Search Group

Pinpoint Search Group

Pinpoint Search Group's recruiters specialize in Information Management, Cyber Security, Cloud and Robotic Process Automation (RPA).

Elevate Security

Elevate Security

Elevate is the leading Security Behavior Platform, changing employee security habits while giving security teams unprecedented visibility.

Maven Security Consulting

Maven Security Consulting

Maven Security Consulting helps companies secure their information assets and digital infrastructure by providing a wide range of customized consulting and training services.

National Cyber Coordination & Command Centre (NC4) - Malaysia

National Cyber Coordination & Command Centre (NC4) - Malaysia

NC4 is established as a center for dealing with cyber threats and crisis at the national level in Malaysia.

mxHERO

mxHERO

mxHERO reduces the risks inherent with ransom and cyber-security threats specific to email.

Romanian Tech Startup Association (ROTSA)

Romanian Tech Startup Association (ROTSA)

Romanian Tech Startups Association is an umbrella organization that aims to promote, support and represent the interests of tech startups in Romania.

Trenton Systems

Trenton Systems

Trenton Systems are committed to providing high-performance computing solutions to customers running mission-critical applications in harsh settings worldwide and across various industries.

NetSfere

NetSfere

NetSfere provides next-generation messaging and mobility solutions to carriers and enterprises globally including its enterprise-grade, secure mobile messaging platform NetSfere Enterprise.