Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Artificial intelligence and national security: Integrating online data

By Alex Ciarniello
SEC1020-Cyber-Feat-slide1_900px
October 21, 2020

Artificial intelligence (AI) is now a major priority for government and defense worldwide — one that some countries, such as China and Russia, consider the new global arms race. AI has the potential to support a number of national and international security initiatives, from cybersecurity to logistics and counter-terrorism.

The overwhelming amount of public data available online is crucial for supporting a number of these use cases. These sources include unstructured social media data from both fringe and mainstream platforms, as well as deep and dark web data.

echosec1
User offering an updated version of govRAT malware on a deep web hacking forum—discovered by Echosec Systems

While valuable, these sources are not always easily accessible through commercial threat intelligence platforms. Additionally, commercial data solutions, such as APIs, often deliver raw data in formats unsuitable for developing AI in the intelligence community.

How does public online data support AI and national security, and how can these feeds more effectively meet defense requirements for AI development?

 

AI and national security: The value of online data

AI applications in defense rely on training data from a variety of inputs. These could include technical cybersecurity feeds, aerial photography, or data from physical sensors in the field.

From these available databases, data scientists can develop machine learning models that automatically detect cyberattacks, monitor on-the-ground enemy activity, direct autonomous vehicles, and inform a plethora of other national security strategies.

Publicly available online data, specifically from social, deep, and dark web sources, is increasingly valuable for supporting a variety of AI applications in defense. For example:

  • Communication channels across the deep and dark web often signal targeted cybersecurity threats, like leaked classified data or coordinated malware attacks. Combining these sources with technical feeds like network traffic data creates a more robust artificial intelligence and national security strategy for addressing cyber risks.
  • A variety of online spaces — from mainstream social networks to fringe sites like 4chan and 8kun — are used by extremist groups worldwide to sow disinformation, recruit, and plan violent attacks. Machine learning models are now required to monitor online extremism, as its growth and obfuscation techniques are surpassing current detection algorithms and human analysis. AI can help locate intentionally obfuscated chatter and imminent threat indicators like manifestos and planned attacks.
  • AI is used by foreign nation-states to conduct information warfare both domestically and abroad. Conversely, military technology like AI helps monitor these targeted disinformation threats for intelligence applications.
  • For some military operations, AI supports stronger command and control systems, which analyze data feeds from multiple domains in a centralized display. Cross-referencing data points from online social, deep, and dark web sources allows defense analysts to get more value from other feeds, expand AI functionality, and persistently monitor environments more effectively.

echosec1
Data leak targeting an ordnance supplier on Pastebin — discovered by Echosec Systems

 

Making online data “AI-ready”

While online data sources are valuable for developing AI in defense, aggregating data from a variety of online spaces efficiently is only half the battle. Data scientists in defense must also be able to collect, organize, and store data optimally for AI applications — a process that the JAIC describes as getting “AI-ready.”

“...the transition to AI ready systems will require the implementation of methodical and highly deliberative processes for collecting and curating data.”
—The JAIC, June 2020

As stated by the United States Congressional Research Service, most commercial innovations supporting AI serve the private sector, not federal requirements. Consequently, many off-the-shelf threat intelligence platforms and APIs gathering social, deep, and dark web data do not organize and store data for effective AI development in defense.

Data scientists in defense require solutions that not only aggregate relevant data efficiently — but are also underpinned by a well-maintained data lake. This means gathering a wide variety of data sources and types, effectively cataloguing this data, and collecting a large enough database to build effective machine learning models.

As a result, any structured or unstructured data collected online is ready for supporting AI development.

To meet this need, many vendors have developed a proprietary API that combines well-known sources like dark web marketplaces and mainstream social networks with obscure social sources on the deep and dark web. The solution, built with a data lake, allows data scientists to integrate unstructured data from these sources and effectively develop machine learning models for defense initiatives.

The API also includes built-in machine learning models, which allow analysts to get up and running quickly on a number of common defense use cases — including automatic detection of data disclosure and PII.

Public social, deep, and dark web data is increasingly valuable for informing national security initiatives. However, data scientists require this unstructured data to be collected, curated, and stored specifically for AI development — which is not always possible through existing commercial APIs and threat intelligence platforms.

Even as defense departments worldwide invest more in AI, emerging technology often evolves faster than public policy. Solutions that deliver “AI-ready” data will allow governments to keep up with AI technologies and more effectively integrate them into defense environments. This will ultimately drive more effective, scalable, and better-informed national security strategies.

KEYWORDS: artificial intelligence (AI) counterterrorism cyber security international security national security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Alex Ciarniello is a technical writer for Echosec Systems, which supports defense organizations with online data feeds and tooling. Alex’s writing focuses on online threat intelligence and OSINT gathering, and addressing gaps in emerging digital and physical security threats. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Oracle GSOC in Scotland - Security Magazine

    Beyond standard risk feeds: Adopting a more holistic API solution

    See More
  • cybersecurity

    New research shows how security teams can avoid cyberattacks by utilizing the right data and artificial intelligence

    See More
  • Piggy bank tipped over

    How to use artificial intelligence to keep financial data safe

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing