Page 59 - Coespu 2018-3
P. 59
The technological innovations in PKO's
-The use of social media and the potential compromise of security-
By Maj. Stefano ESPOSITO VANGONE
In the most fervid collective imagination,
technological innovation encompasses
exclusively those features of novelty aimed at
improving the living conditions of users of a
service, an application or any other tool deemed
useful for effective effectiveness or tendency,
often and in surreptitiously, without being
understood that from that same technology arise
many factors that, although corollary,
unknowingly and potentially, could cause
greater harm than good, to the detriment of
people and communities including, not least, the military team. Precisely because of its innate
operational connotation, it could, in fact, represent the privileged recipient, or even better the
target, of all those who consider technological innovation to be a tool for the broader concept of
asymmetric threat, with potentially fatal consequences.
0It is well-known and maximum experience as on the national territory, but even more in the
Operational Theater Foreign, the military makes use of social media, smartphones and countless
applications that allow you to break down the distances with their loved ones left over
Homeland, but which, at the same time and in a prodigious way, also reduce safety levels, with
an actual compromise of the same, to the detriment of the entire team. Focusing the attention
more in detail, it is possible to understand how the use of networked apparatuses, now an
appendix of the human being, represent, in T.O.E. a “vulnus” (Latin word: to break/to force a
right) of the Force Protection, as they provide outside the Armed Forces system. and without the
military having actual perception or understanding, a multitude of data, (from geo-referencing,
with attribution of position, itinerary and altitude, to the location and composition of reserved or
neuralgic areas) - even more interesting if enclosed in a shot of which they can boast - by
interfacing with easily violent sharing servers
from anyone with real interest. Consider, in this
regard, the strategic value of the acquisition of
photos taken inside a compound that, without the
user's knowledge, could be cataloged and put into
a system to acquire the areal mapping of the
entire base, or the information offered on the
level of safety in terms of active and passive
measures or individual or departmental
57

