Satellite Imagery + Social Media = A New Way To Spot Emerging Nuclear Threats

Hiding illicit nuclear programs might be getting harder, thanks to new ways of gleaning and combining clues from various rivers of digital data. That’s the conclusion of new research funded in part by the US Energy Department’s National Nuclear Security Administration.

Satellites offer one kind of information; social media another, particularly inside countries that may be trying to flout inspections. But large volumes of satellite imagery and social media data aren’t similar.

You can have one analyst examine satellite pictures and another look at social media posts to see if they align, but the process is time-consuming and generally far from comprehensive. The study’s authors developed a method for fusing different types of data in a machine-readable way to offer a much clearer picture.

“In light of their ubiquitous emergence, social media increasingly promise to be of great value even though associated applications have thus far remained simple, and their fusion with other data has been largely ad hoc,” the team from North Carolina State University writes in “Fusing Heterogeneous Data: A Case for Remote Sensing and Social Media.

Only by creating a new statistical method for fusing the outputs of satellite data and social media data do you get something you can use to predict what might happen next within a given area of interest, such as a specific nation’s nuclear enrichment or weapons development.

The researchers looked at satellite and social media data from August 2013, when deadly floods killed eight people and caused widespread damage in Colorado.

They sought to show that if you could algorithmically identify which imagery showed the flooding from space, and which geotagged tweets described it on the ground, you could much more quickly verify one data set against another, that is, you could determine whether incoming social media data supports the conclusions you might be reaching from your satellite data, and vice versa.

“Next steps for the project include evaluating nuclear facilities in the West to identify common characteristics that may also be applicable to facilities in more isolated societies, such as North Korea,” notes a press release on the paper.

One of the authors, NCSU computer and electrical engineering professor Hamid Krim, said the team would try to “address the insufficient knowledge in general in areas of great interest (N. Korea and Iran).

The goal is to come up with systematic methodologies to transport knowledge about nuclear environments available in other areas (e.g., in the West) to these domains where there is very little available. Creating such an environment in these places of interest will help them detect potential undesired activity.”

Of course, there are limitations to media monitoring in Iran and North Korea. The former’s social media environment is largely underground, thanks to bans on Twitter and many other social networks. The latter has virtually no social media environment at all.

Krim noted that the “adversarial strategy” of social-media censorship makes his team’s analysis harder. But even social posts from nearby countries can help illuminate their more secretive neighbors, he said, think tweets from Japan after earth tremors are felt.

DefenseOne

You Might Also Read: 

The Pentagon's AI Program To Find Hidden Nuclear Missiles:

AI Increases The Risks of Nuclear War:

 

« Criminals Are Driving Australian Data Breaches
GDPR Means Revisiting Email Marketing »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Juniper Networks

Juniper Networks

Juniper Networks is the industry leader in network innovation. We provide network infrastructure and network security solutions.

MIIS Cyber Initiative

MIIS Cyber Initiative

The Cyber Initiative's mission is to assess the impact of the information age on security, peace and communications.

Korea Internet & Security Agency (KISA)

Korea Internet & Security Agency (KISA)

KISA is committed to improving the competitiveness, reliability and security of Internet information and knowledge in Korea.

Precise Biometrics

Precise Biometrics

Precise Biometrics develop and sell fingerprint software for convenient and secure authentication of people’s identity in mobile devices, smart cards and other products with fingerprint sensors.

CSO GmbH

CSO GmbH

CSO GmbH provide specialist consultancy services in the area of IT security.

Destel

Destel

Destel is a system integrator and provider of IT services focused on Advanced Network & Security Solutions.

CYBER.ORG

CYBER.ORG

CYBER.ORG's goal is to empower educators as they prepare the next generation to succeed in the cyber workforce of tomorrow.

Onevinn

Onevinn

Onevinn's goal is to create a transparent, cost-effective security that is noticed as little as possible by the users. We simply call it "intelligent security."

Mitnick Security

Mitnick Security

Mitnick Security is a leading global provider of information security consulting and training services.

Dawgen Global

Dawgen Global

Dawgen Global is an integrated multidisciplinary professional service firm in the Caribbean Region providing a range of services including Risk Management and Information Systems Assurance.

Avanade

Avanade

Avanade is a leading provider of innovative digital, cloud and advisory services, industry solutions and design-led experiences across the Microsoft ecosystem.

Versent

Versent

Versent is an Australian-born technology company, focused on architecting, building & operating cloud native applications, data streams, platforms, and services.

Saidot

Saidot

Saidot is a Finnish AI governance and alignment company committed to helping businesses safely and transparently integrate AI into their operations.

Blackmere Consulting

Blackmere Consulting

Blackmere Consulting is a Nationwide Technical and Executive Recruiting firm dedicated to Cyber Security and Information Technology.

SECQAI

SECQAI

At SECQAI we create dual-use hardware and software to enable the future of computing.

ecfirst

ecfirst

ecfirst's mission is to establish AI platforms and service capabilities to assess and manage client compliance with global mandates on a continual basis to secure business data and assets.