An official website of the United States Government 
Here's how you know

Official websites use .gov

.gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS

A lock ( lock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Technology Proliferation, Influence Ops May Be as Disruptive as COVID-19

You have accessed part of a historical collection on defense.gov. Some of the information contained within may be outdated and links may not function. Please contact the DOD Webmaster with any questions.

The COVID-19 pandemic has been globally disruptive in nearly every facet of life. But other things may prove as disruptive in the future, said leaders of the military intelligence community.

Military personnel sit at computer terminals in a room with a large screen.  One service member is standing.
Cyber Ops
Personnel with the 175th Cyberspace Operations Group conduct cyber operations at Warfield Air National Guard Base, Middle River, Md., June 3, 2017.
Photo By: J.M. Eddins Jr., Air Force
VIRIN: 170603-F-LW859-023A

One advancement that may possibly be as disruptive as COVID-19 is the revolution in information technology that's available to everybody — not just the U.S. and its allies, Navy Vice Adm. Robert Sharp, director of the National Geospatial-Intelligence Agency, said during an online forum today with the Armed Forces Communications and Electronics Association and the Intelligence and National Security Alliance.

"It's this revolution in remotely-sensed and geo-located data, which is available to everyone," he said. "It's available to us, but it's also available to our competitors. [Also] the revolution in smart machines and artificial intelligence — once again, [it's a] great opportunity for us, but it's not only our opportunity. That's the competition space."

Another area of concern is something Sharp called "GEOINT assurance." With the growth of open-source geospatial intelligence coming from multiple sources, it becomes less certain that the information can be trusted, he said.

A graphic, computer-generated line map of the world highlights points of cyber activity.
Colorful Data
The Norse data wall on the operations floor of the 275th Cyber Operations Squadron provides real-time, worldwide cyberattack sources, Dec. 12, 2017. The squadron is part of the Maryland Air National Guard's 175th Cyberspace Operations Group.
Photo By: Joseph M. Eddins Jr., Air Force
VIRIN: 171202-F-LW859-014
A computer-generated line map highlights points of cyber activity around the world.
Cyber Activity
Real-time cyber attacks -- including information on the attack's origin, type and target and the attacker's IP address, geographic location and ports being used -- are displayed on an attack map on the 275th Cyberspace Squadron's operations floor, June 3, 2017. The squadron is part of the Maryland Air National Guard's 175th Cyberspace Operations Group.
Photo By: Joseph M. Eddins Jr., Air Force
VIRIN: 170603-F-LW859-001

"How do you have confidence in the ones and zeros that you're using for making decisions based off of," he asked.

Army Gen. Paul Nakasone, director of the National Security Agency and commander of U.S. Cyber Command, cited influence operations as the next possible great disruptor. Influence operations, he said, have a very low barrier to entry, enabling just about anybody to engage in them.

"We've seen it now in our democratic processes," Nakasone said. "I think we're going to see it in our diplomatic processes, we're going to see it in warfare, and we're going to see it in sowing civil distrust in different countries."

A man in a military uniform sits before two computer screens; one displays a map while the other displays related data.
Computer Work
A member of the 178th Wing of the Springfield Ohio Air National Guard analyzes airborne and commercial satellite imagery, Aug. 31, 2017.
Photo By: Air Force Sr. Master Sgt. Joseph Stahl, Ohio Air National Guard
VIRIN: 170831-Z-PX427-072M

Influence operations, he said, are all enabled by the proliferation of inexpensive technology that allows anybody with an agenda to get online.

"The great technology that's enabling so much of what we're doing is also that dual-edged sword that malicious cyber actors and others are being able to use to create doubt, or to be able to question authority, or to be able to ... to spread messages that are far from true," he said. "I think influence operations, just in general, will be for us one of the things that we'll be dealing with not just every two or four years, but this is the competitive space that we're going to be in as intelligence agencies and as our nation.

Related Stories