Page 59 - Coespu 2018-3
P. 59

The technological innovations in PKO's
                   -The use of social media and the potential compromise of security-


               By Maj. Stefano ESPOSITO VANGONE

               In  the  most  fervid  collective  imagination,
               technological      innovation      encompasses
               exclusively  those  features  of  novelty  aimed  at
               improving  the  living  conditions  of  users  of  a
               service, an application or any other tool deemed
               useful  for  effective  effectiveness  or  tendency,
               often  and  in  surreptitiously,  without  being
               understood that from that same technology arise
               many     factors   that,   although   corollary,
               unknowingly  and  potentially,  could  cause
               greater  harm  than  good,  to  the  detriment  of
               people and communities including, not least, the military team. Precisely because of its innate
               operational connotation, it could, in fact, represent the privileged recipient, or even better the
               target, of all those who consider technological innovation to be a tool for the broader concept of
               asymmetric threat, with potentially fatal consequences.
               0It is well-known and maximum experience as on the national territory, but even more in the
               Operational Theater Foreign, the military makes use of social media, smartphones and countless
               applications  that  allow  you  to  break  down  the  distances  with  their  loved  ones  left  over
               Homeland, but which, at the same time and in a prodigious way, also reduce safety levels, with
               an actual compromise of the same, to the detriment of the entire team. Focusing the attention
               more  in  detail,  it  is  possible  to  understand  how  the  use  of  networked  apparatuses,  now  an
               appendix of the human being, represent, in T.O.E. a “vulnus” (Latin word: to break/to force a
               right) of the Force Protection, as they provide outside the Armed Forces system. and without the
               military having actual perception or understanding, a multitude of data, (from geo-referencing,
               with attribution of position, itinerary and altitude, to the location and composition of reserved or
               neuralgic  areas)  -  even  more  interesting  if  enclosed  in  a  shot  of  which  they  can  boast  -  by
                                                             interfacing  with  easily  violent  sharing  servers
                                                             from anyone with real interest. Consider, in this
                                                             regard,  the  strategic  value  of  the  acquisition  of
                                                             photos taken inside a compound that, without the
                                                             user's knowledge, could be cataloged and put into
                                                             a  system  to  acquire  the  areal  mapping  of  the
                                                             entire  base,  or  the  information  offered  on  the
                                                             level  of  safety  in  terms  of  active  and  passive
                                                             measures    or   individual   or   departmental



                                                             57
   54   55   56   57   58   59   60   61   62   63   64