{"id":2994,"date":"2018-05-22T08:30:36","date_gmt":"2018-05-22T11:30:36","guid":{"rendered":"https:\/\/www.nachodelatorre.com.ar\/mosconi\/?p=2994"},"modified":"2018-05-22T08:30:36","modified_gmt":"2018-05-22T11:30:36","slug":"lucha-contra-el-terrorismo-y-almacenamiento-de-informacion-en-la-era-de-los-grandes-datos","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=2994","title":{"rendered":"Lucha contra el terrorismo y almacenamiento de informaci\u00f3n en la era de los grandes datos"},"content":{"rendered":"<p>Varias compa\u00f1\u00edas que asistieron a la Exposici\u00f3n de Fuerzas de Operaciones Especiales la semana pasada no trajeron misiles, cohetes, helic\u00f3pteros o drones, sino computadoras port\u00e1tiles u otros dispositivos con software dise\u00f1ado para dar sentido a la gran cantidad de datos e inteligencia que fluyen para las operaciones antiterroristas en el medio Oriente.<!--more--><\/p>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\"><img loading=\"lazy\" class=\" alignright\" src=\"https:\/\/www.armytimes.com\/resizer\/lgVz8S0CW3iLO4_gkj-loOUgN4Y=\/1200x0\/filters:quality(100)\/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com\/public\/J5FODECZPVGZ3DDWPCLEGHR3PM.jpg\" alt=\"\" width=\"407\" height=\"229\" \/>AMMAN, Jordan \u2014 Several companies in attendance at the Special Operations Forces Exposition last week didn\u2019t bring missiles, rockets, helicopters or drones, but rather laptops or other devices with software designed to make sense of the huge amount of data and intelligence flowing in for counterterror operations\u00a0<a class=\"selected-link\" title=\"\" href=\"https:\/\/www.defensenews.com\/digital-show-dailies\/sofex\/2018\/05\/08\/the-isis-tactics-that-have-left-iraqi-special-forces-weakened\/\" target=\"_blank\" rel=\"noopener noreferrer\">in the Middle East<\/a>.<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">The fight against terrorism has become more complicated in a data-rich and data-dependent, international stage. Terrorists have adeptly used avenues through social media to spread philosophy and recruit members while engaging in campaigns of misinformation to influence communities.<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">The United States and its allies admit they haven\u2019t caught up to waging war against campaigns of misinformation fought through social media because of the difficulty involved in keeping track of the online activity.<\/p>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">At the\u00a0<a class=\"\" title=\"\" href=\"https:\/\/www.defensenews.com\/video\/2018\/05\/07\/latest-snapshot-of-isis-emerges-at-mideast-conference\/\" target=\"_blank\" rel=\"noopener noreferrer\">Middle East Special Operations Commanders Conference<\/a>, an Iraqi commander recounted the struggles of going up against the Islamic State group as the country fought to take back Mosul from the militant organization.<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">ISIS was effective at hiding among the population, essentially forcing families to give up their homes as safe havens and serve as human shields, making precision airstrike targeting difficult for coalition forces fighting the militants. Some ISIS members used children as shields when moving about the city and dressed as women to avoid detection.<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\"><b>Insight into the adversary<\/b><\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">Even though terrorist organizations are skilled in campaigns of misinformation, Raytheon\u2019s Multimedia Monitoring System, or M3S, is touted as one way to fight back.<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">The company showed off the distributed and scalable monitoring tool at SOFEX. The M3S provides analysis of foreign language broadcast media, websites and social media. It is essentially a set of very organized, intelligent eyes and ears.<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">It can take information flowing from Facebook, Twitter or other social media as well as what is broadcast on local TV news and translate a foreign language into English and pinpoint content of interest.<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">\u201cTools like this are invaluable to the special operations community, particularly when it comes to targeting adversaries, particularly in a terrorism kind of environment that you face in the world today,\u201d said Tom Goodman, director of Raytheon\u2019s international cyber business. \u201cThey hide among the population, they hide in plain sight. \u2026 And they co-opt and sometimes coerce the population into collaborating with them.\u201d<\/p>\n<\/div>\n<\/div>\n<div class=\"row\"><\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">Tools like the M3S \u201care invaluable to the targeteers, as they are looking to get precision strikes in. No one wants to see collateral damage,\u201d he said.<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">\u201cSo tools like this and being able to see what may look like a signature on a building from the air, if you can marry it up with contextual analysis from managing and monitoring what is going on in the broadcast media and other types of intelligence sources, that gives you a clearly better refinement of your targeting capabilities and not only minimizes that damage,\u201d Goodman added. \u201cIt also ensures that you send a message clearly to the adversary that it doesn\u2019t matter where you go, doesn\u2019t matter what you do; we will find you, we will hunt you down and take care of you.\u201d<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">The system can bring context and clarity to the plethora of information flowing through. \u201cThere is a lot of information that can be understood as it links to not only the context of the messaging that comes across media outlets but also who\u2019s listening, what are the trends,\u201d he said, \u201cthe following of what is being tweeted, retweeted, things like that.\u201d<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">The system allows analysts to be able to monitor terrorist propaganda and the communities being targeted, as well as provide insight into an organization\u2019s behaviors and what it might be planning.<\/p>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">This capability is particularly important as ISIS moves through North Africa, Southeast Asia and Afghanistan following its defeat in Iraq.<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">The M3S \u201cis very good at separating the bad messaging from the good messaging, and it gives you the ability to be able to say, \u2018No, here\u2019s the reality, here\u2019s what actually happened,\u2019 and you can get ahead of that messaging that much faster, and so that is very critical,\u201d Goodman said.<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">While the M3S is not a new system, it continues to improve alongside advancements in artificial intelligence, which continues to refine its ability to translate a variety of languages.<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">\u201cThere is a tremendous amount of intelligence that is built into this platform,\u201d he said. \u201cNot only is it looking for the keywords and able to do the translation not only in Arabic, for example, but the various dialects in Arabic and understanding the context, understanding the inflections and variation of words. It looks at how messages are being conveyed, the construct of certain words within a sentence and sentences leading up to it that gives you some insight into the intent of what is said.\u201d<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">The system is also able to translate languages from Southeast Asia, Europe, South America and Africa, even breaking it down to tribal dialects.<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\"><b>Patterns of life<\/b><\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">Massing the multitude of intelligence, surveillance and reconnaissance data from airborne sensors continues to be a challenge, particularly in saving that data for the long term in a digestible manner.<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\"><a class=\"\" title=\"\" href=\"https:\/\/www.defensenews.com\/digital-show-dailies\/sofex\/2018\/05\/11\/us-drone-sales-could-heat-up-in-the-middle-east\/\" target=\"_blank\" rel=\"noopener noreferrer\">General Atomics<\/a>\u00a0\u2014 best known for being the manufacturer of the famed Predator, Reaper and Gray Eagle unmanned aircraft systems \u2014 created a product now used by customers in the United States called the System for Tactical, Archival, Retrieval, and Exploitation, or STARE.<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">It\u2019s software that runs on a computer with very large storage drives, which customers use to store ISR data, archiving it in ways that make it easy to later retrieve and exploit.<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">\u201cIt\u2019s not just for General Atomics data. It doesn\u2019t matter if it\u2019s a King Air or a FLIR camera,\u201d Jim Thomson, company regional vice president of international strategic development in the Middle East, North Africa and the Americas, told Defense News at SOFEX. \u201cAs long as it\u2019s a common format &#8230; it can all be stored in the STARE server.\u201d<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">The system enables the customer to put all of its data into one storage device and call up information. For example, a user can pull up imagery of a certain area over the past six months to see if there are any changes, or the user can look for \u201cpatterns of life,\u201d Thomson explained.<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">The company has conducted demonstrations in the Middle East, including for Jordan, the United Arab Emirates, Saudi Arabia, Morocco and Egypt, Thomson said.<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">\u201cIt\u2019s a capability that our competitors don\u2019t have,\u201d he said. \u201cYou buy a system from a competitor, that video comes down off an airplane, and what do you do with it? Maybe you look at it that day. A week from now, do you still have access to that data? Probably not.\u201d<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">The ability to examine patterns of life in a place like Mosul as the coalition forces worked to drive out ISIS was crucial to keeping collateral damage to a minimum and to hone in on appropriate strikes.<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">\u201cIt\u2019s about really understanding who the enemy is and it\u2019s not about taking out one bad guy \u2015 you want to know where he is going, who his leader is and who his leader\u2019s leader is.\u201d<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><strong>Fuente:<\/strong>\u00a0<em><a href=\"https:\/\/www.c4isrnet.com\/digital-show-dailies\/sofex\/2018\/05\/15\/fighting-terrorism-and-storing-intel-in-the-age-of-big-data\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.c4isrnet.com<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Varias compa\u00f1\u00edas que asistieron a la Exposici\u00f3n de Fuerzas de Operaciones Especiales la semana pasada no trajeron misiles, cohetes, helic\u00f3pteros o drones, sino computadoras port\u00e1tiles&hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,29],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/2994"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2994"}],"version-history":[{"count":0,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/2994\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2994"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2994"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2994"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}