Satellite Imagery + Social Media = A New Way To Spot Emerging Nuclear Threats

Hiding illicit nuclear programs might be getting harder, thanks to new ways of gleaning and combining clues from various rivers of digital data. That’s the conclusion of new research funded in part by the US Energy Department’s National Nuclear Security Administration.

Satellites offer one kind of information; social media another, particularly inside countries that may be trying to flout inspections. But large volumes of satellite imagery and social media data aren’t similar.

You can have one analyst examine satellite pictures and another look at social media posts to see if they align, but the process is time-consuming and generally far from comprehensive. The study’s authors developed a method for fusing different types of data in a machine-readable way to offer a much clearer picture.

“In light of their ubiquitous emergence, social media increasingly promise to be of great value even though associated applications have thus far remained simple, and their fusion with other data has been largely ad hoc,” the team from North Carolina State University writes in “Fusing Heterogeneous Data: A Case for Remote Sensing and Social Media.

Only by creating a new statistical method for fusing the outputs of satellite data and social media data do you get something you can use to predict what might happen next within a given area of interest, such as a specific nation’s nuclear enrichment or weapons development.

The researchers looked at satellite and social media data from August 2013, when deadly floods killed eight people and caused widespread damage in Colorado.

They sought to show that if you could algorithmically identify which imagery showed the flooding from space, and which geotagged tweets described it on the ground, you could much more quickly verify one data set against another, that is, you could determine whether incoming social media data supports the conclusions you might be reaching from your satellite data, and vice versa.

“Next steps for the project include evaluating nuclear facilities in the West to identify common characteristics that may also be applicable to facilities in more isolated societies, such as North Korea,” notes a press release on the paper.

One of the authors, NCSU computer and electrical engineering professor Hamid Krim, said the team would try to “address the insufficient knowledge in general in areas of great interest (N. Korea and Iran).

The goal is to come up with systematic methodologies to transport knowledge about nuclear environments available in other areas (e.g., in the West) to these domains where there is very little available. Creating such an environment in these places of interest will help them detect potential undesired activity.”

Of course, there are limitations to media monitoring in Iran and North Korea. The former’s social media environment is largely underground, thanks to bans on Twitter and many other social networks. The latter has virtually no social media environment at all.

Krim noted that the “adversarial strategy” of social-media censorship makes his team’s analysis harder. But even social posts from nearby countries can help illuminate their more secretive neighbors, he said, think tweets from Japan after earth tremors are felt.

DefenseOne

You Might Also Read: 

The Pentagon's AI Program To Find Hidden Nuclear Missiles:

AI Increases The Risks of Nuclear War:

 

« Criminals Are Driving Australian Data Breaches
GDPR Means Revisiting Email Marketing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Talend

Talend

Talend is a leader in cloud and big data integration software. Applications include Risk and Compliance management.

Lynx Software Technologies

Lynx Software Technologies

Lynx provide secure software and operating systems for use in mission critical applications such as aerospace, medical, transportation and IoT.

Crossmatch

Crossmatch

Crossmatch is a world leader in risk-based composite authentication and biometric identity management.

Seric Systems

Seric Systems

Seric is a technology business specialising in security, infrastructure and data management.

Calian Group

Calian Group

Calian is a diverse Canadian company offering professional services in areas including Advanced Technologies, Health, Learning and IT & Cyber Solutions.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

Blockchain Firm

Blockchain Firm

Blockchain Firm is a leading Blockchain based software solutions and service provider with our roots of expertise running deep into the technology.

DataViper

DataViper

Data viper is a threat intelligence platform designed for organizations, investigators, and law enforcement.

Vumetric Cybersecurity

Vumetric Cybersecurity

Vumetric is an ISO9001 certified company offering penetration testing, IT security audits and specialized cybersecurity services.

HENSOLDT Cyber

HENSOLDT Cyber

HENSOLDT Cyber introduces a paradigm shift to cyber security. Our products have been designed to ensure the integrity of embedded systems at the core: the operating system and the processor.

SpeQtral

SpeQtral

SpeQtral offers commercial space-based Quantum Key Distribution (QKD) founded on technology developed at the National University of Singapore.

Core to Cloud

Core to Cloud

Core to Cloud provide consultancy and technical support for the planning and implementation of sustainable security strategies.

CCX Technologies

CCX Technologies

CCX Technologies design and develop a wide range of cybersecurity and testing solutions for the aviation, and military and government markets.

Minorities in Cybersecurity (MiC)

Minorities in Cybersecurity (MiC)

MiC was developed out of a unique passion to help fill the gap that exists in the support and development of women and minority leaders in the cybersecurity field.

Professional Labs

Professional Labs

Professional Labs specialize in simplifying complex problems for our customers with Cloud Services, Managed Services and Cyber Security.

Ultima

Ultima

Ultima are on a mission to help businesses unlock their true potential by using the right IT to protect your company’s revenue and reputation – 24/7.