<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3-mathml3.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ali="http://www.niso.org/schemas/ali/1.0/" article-type="research-article" dtd-version="1.3" xml:lang="EN">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Polit. Sci.</journal-id>
<journal-title-group>
<journal-title>Frontiers in Political Science</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Polit. Sci.</abbrev-journal-title>
</journal-title-group>
<issn pub-type="epub">2673-3145</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fpos.2026.1730568</article-id>
<article-version article-version-type="Version of Record" vocab="NISO-RP-8-2008"/>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Original Research</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Artificial intelligence, Cyber Statecraft, and Amazonian security: operational integration of AI&#x2013;SAR in the Brazilian Air Force</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>de Borba Costa</surname>
<given-names>Gabriela Alves</given-names>
</name>
<xref ref-type="aff" rid="aff1"/>
<uri xlink:href="https://loop.frontiersin.org/people/3362155"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="conceptualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/conceptualization/">Conceptualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Data curation" vocab-term-identifier="https://credit.niso.org/contributor-roles/data-curation/">Data curation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Formal analysis" vocab-term-identifier="https://credit.niso.org/contributor-roles/formal-analysis/">Formal analysis</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Funding acquisition" vocab-term-identifier="https://credit.niso.org/contributor-roles/funding-acquisition/">Funding acquisition</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="investigation" vocab-term-identifier="https://credit.niso.org/contributor-roles/investigation/">Investigation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="methodology" vocab-term-identifier="https://credit.niso.org/contributor-roles/methodology/">Methodology</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Project administration" vocab-term-identifier="https://credit.niso.org/contributor-roles/project-administration/">Project administration</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="resources" vocab-term-identifier="https://credit.niso.org/contributor-roles/resources/">Resources</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="software" vocab-term-identifier="https://credit.niso.org/contributor-roles/software/">Software</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="supervision" vocab-term-identifier="https://credit.niso.org/contributor-roles/supervision/">Supervision</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="validation" vocab-term-identifier="https://credit.niso.org/contributor-roles/validation/">Validation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="visualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/visualization/">Visualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x0026; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Azevedo</surname>
<given-names>Carlos Eduardo Franco</given-names>
</name>
<xref ref-type="aff" rid="aff1"/>
<xref ref-type="corresp" rid="c001"><sup>&#x002A;</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/3252200"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="conceptualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/conceptualization/">Conceptualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Formal analysis" vocab-term-identifier="https://credit.niso.org/contributor-roles/formal-analysis/">Formal analysis</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Funding acquisition" vocab-term-identifier="https://credit.niso.org/contributor-roles/funding-acquisition/">Funding acquisition</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="investigation" vocab-term-identifier="https://credit.niso.org/contributor-roles/investigation/">Investigation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="methodology" vocab-term-identifier="https://credit.niso.org/contributor-roles/methodology/">Methodology</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="resources" vocab-term-identifier="https://credit.niso.org/contributor-roles/resources/">Resources</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="supervision" vocab-term-identifier="https://credit.niso.org/contributor-roles/supervision/">Supervision</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="validation" vocab-term-identifier="https://credit.niso.org/contributor-roles/validation/">Validation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="visualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/visualization/">Visualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x0026; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Ferraz</surname>
<given-names>Luiz Fernando Rezende</given-names>
</name>
<xref ref-type="aff" rid="aff1"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="conceptualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/conceptualization/">Conceptualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="investigation" vocab-term-identifier="https://credit.niso.org/contributor-roles/investigation/">Investigation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="methodology" vocab-term-identifier="https://credit.niso.org/contributor-roles/methodology/">Methodology</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="software" vocab-term-identifier="https://credit.niso.org/contributor-roles/software/">Software</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="visualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/visualization/">Visualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x0026; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
</contrib>
</contrib-group>
<aff id="aff1"><institution>Departamento de P&#x00F3;s-Gradua&#x00E7;&#x00E3;o em Ci&#x00EA;ncias Militares, Escola de Comando e Estado-Maior do Ex&#x00E9;rcito</institution>, <city>Rio de Janeiro</city>, <country country="br">Brazil</country></aff>
<author-notes>
<corresp id="c001"><label>&#x002A;</label>Correspondence: Carlos Eduardo Franco Azevedo, <email xlink:href="mailto:francoazevedo@francoazevedo.com.br">francoazevedo@francoazevedo.com.br</email></corresp>
</author-notes>
<pub-date publication-format="electronic" date-type="pub" iso-8601-date="2026-02-27">
<day>27</day>
<month>02</month>
<year>2026</year>
</pub-date>
<pub-date publication-format="electronic" date-type="collection">
<year>2026</year>
</pub-date>
<volume>8</volume>
<elocation-id>1730568</elocation-id>
<history>
<date date-type="received">
<day>22</day>
<month>10</month>
<year>2025</year>
</date>
<date date-type="rev-recd">
<day>23</day>
<month>12</month>
<year>2025</year>
</date>
<date date-type="accepted">
<day>19</day>
<month>01</month>
<year>2026</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x00A9; 2026 de Borba Costa, Azevedo and Ferraz.</copyright-statement>
<copyright-year>2026</copyright-year>
<copyright-holder>de Borba Costa, Azevedo and Ferraz</copyright-holder>
<license>
<ali:license_ref start_date="2026-02-27">https://creativecommons.org/licenses/by/4.0/</ali:license_ref>
<license-p>This is an open-access article distributed under the terms of the <ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution License (CC BY)</ext-link>. The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</license-p>
</license>
</permissions>
<abstract>
<p>This study examines the integration of artificial intelligence (AI) into the processing of Synthetic Aperture Radar (SAR) imagery by the Brazilian Air Force to strengthen the strategic monitoring of the Amazon. Although the literature on the Revolution in Military Affairs and Network-Centric Warfare is well established, how AI-based automation transforms state capacity for territorial governance and the projection of sovereignty in contexts of non-traditional threats remains underexplored. Methodologically, the research adopts a qualitative and exploratory approach, based on document analysis and a systematic review of specialized literature (2022&#x2013;2025). The analysis is conducted in light of the concepts of Data-Centric Warfare and Cyber Statecraft, examining how AI&#x2013;SAR integration reconfigures data-mediated territorial governance and strengthens informational and technological sovereignty. The results demonstrate significant operational gains: reduced analysis time, increased target-detection accuracy, resource optimization, and compression of the Observe&#x2013;Orient&#x2013;Decide&#x2013;Act cycle. Long-term sustainability requires robust ethical governance, algorithmic transparency, and accountability to mitigate risks of bias and discriminatory surveillance. It is concluded that AI&#x2013;SAR integration represents a strategic reconfiguration of the relationship between the state, technology, and sovereignty, offering an adaptable model for Global South countries facing analogous challenges of territorial control.</p>
</abstract>
<kwd-group>
<kwd>Amazon</kwd>
<kwd>artificial intelligence</kwd>
<kwd>Cyber Statecraft</kwd>
<kwd>Synthetic Aperture Radar (SAR)</kwd>
<kwd>territorial sovereignty</kwd>
</kwd-group>
<funding-group>
<funding-statement>The author(s) declared that financial support was received for this work and/or its publication. The financial support for the publication of this article was indicated in the form of an Article Processing Charge (APC) waiver to be granted by Frontiers, specifically in recognition of authors from the Global South, as indicated by one of the Topic Editors of the special issue &#x2018;Global Perspectives on Cyber Statecraft: Bridging Theory and Practice&#x2019; (Professor Luiz Rog&#x00E9;rio Goldoni). Additionally, the authors received financial support for conducting this research from the Coordena&#x00E7;&#x00E3;o de Aperfei&#x00E7;oamento de Pessoal de N&#x00ED;vel Superior (CAPES) [Brazilian Federal Agency for Support and Evaluation of Graduate Education], through the National Defense Scientific and Technological Research and Teaching Support Program - Pr&#x00F3;-Defesa V, Public Call 36/2023, Process No. 23038.011220/2023-31. This support was fundamental for conducting the field research that resulted in the present manuscript.</funding-statement>
</funding-group>
<counts>
<fig-count count="1"/>
<table-count count="2"/>
<equation-count count="0"/>
<ref-count count="56"/>
<page-count count="12"/>
<word-count count="9752"/>
</counts>
<custom-meta-group>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Politics of Technology</meta-value>
</custom-meta>
</custom-meta-group>
</article-meta>
</front>
<body>
<sec sec-type="intro" id="sec1">
<label>1</label>
<title>Introduction</title>
<p>The Amazon represents a region of strategic importance for Brazil due to its vast territorial extent and abundance of natural resources. However, its low demographic density and limited institutional presence facilitate transnational illicit networks, such as illegal mining and drug trafficking (<xref ref-type="bibr" rid="ref33">Jasper and Nunes, 2022</xref>). &#x201C;Narco-mining&#x201D; depends critically on clandestine air routes and improvised airstrips dispersed throughout the forest. The detection of these activities is hindered by dense vegetation cover, adverse climatic conditions, and the limitations of conventional surveillance assets, such as fixed radar coverage, which is ineffective at low altitudes (<xref ref-type="bibr" rid="ref23">F&#x00F3;rum Brasileiro de Seguran&#x00E7;a P&#x00FA;blica, 2023</xref>; <xref ref-type="bibr" rid="ref26">Furtado et al., 2024</xref>).</p>
<p>Given the territorial complexity of the Amazon, aerial and space-based monitoring constitutes an essential tool for national sovereignty and environmental protection. The Brazilian Air Force (FAB) has strengthened its operational capacity through remote sensing technologies. Synthetic Aperture Radar (SAR) is deployed both on aircraft and within the Lessonia Project satellite constellation, generating high-resolution imagery at any time of day and under any meteorological conditions.</p>
<p>However, the massive volume of data generated by these sensors challenges timely analysis. To overcome this constraint, the FAB has integrated artificial intelligence (AI) systems that automate and accelerate the interpretation of SAR imagery. This technological synergy optimizes the detection of targets and illicit activities, enhancing operational response capacity.</p>
<p>The literature shows a growing body of research on remote sensing technologies and AI in environmental monitoring (<xref ref-type="bibr" rid="ref19">Flores et al., 2019</xref>; <xref ref-type="bibr" rid="ref38">Kuck et al., 2021</xref>). Nevertheless, how AI-based automation transforms state capacity for territorial governance and the projection of sovereignty in these spaces remains insufficiently explored. Questions regarding how this technological integration translates into efficiency gains, resource optimization, and strengthened field-level response capacity remain underexamined.</p>
<p>This gap is particularly critical for Global South countries facing similar challenges of territorial surveillance in remote regions characterized by high biodiversity and the presence of Indigenous peoples. Brazil, Colombia, Peru, and Indonesia share analogous contexts: vast tropical forest areas, pressure from illicit activities (illegal mining, deforestation, trafficking), and the need to strengthen state monitoring capacities without compromising the territorial rights of Indigenous communities (<xref ref-type="bibr" rid="ref62">Virtanen et al., 2025</xref>). AI&#x2013;SAR integration thus represents not merely a Brazilian technical solution, but a potentially replicable and adaptable model for Global South countries seeking technological autonomy in territorial surveillance.</p>
<p>This article addresses this gap by moving beyond technical validation to focus on practical and strategic application. Its objective is to analyze whether and how this technological synergy has transformed surveillance, territorial control, and national security in the Amazon. The analysis examines the role of the FAB through the lens of Cyber Statecraft, understood as the strategic use of digital capabilities within security and defense policy (<xref ref-type="bibr" rid="ref15">Devanny, 2024</xref>; <xref ref-type="bibr" rid="ref63">Woods, 2017</xref>).</p>
<p>The study advances the hypothesis that AI&#x2013;SAR integration not only enhances the operational efficiency of territorial monitoring, but also reconfigures the ways in which the state exercises governance and projects sovereignty in regions characterized by low institutional density.</p>
<p>This perspective is relevant because it shifts attention from mere informational superiority to the analytical capacity to extract actionable intelligence in a timely manner, articulating sensors, algorithms, and decision-making processes within an integrated system of territorial governance. By examining AI&#x2013;SAR integration in the Amazon, the article contributes to the debate on how contemporary states mobilize digital technologies to exercise sovereignty in territories marked by low institutional density and high geopolitical complexity.</p>
<p>The article is structured as follows: Section 2 presents the qualitative and exploratory methodology adopted, based on document analysis and a systematic review of specialized literature; Section 3 develops the theoretical&#x2013;conceptual framework, articulating the concepts of Data-Centric Warfare and Cyber Statecraft with the structural challenges of territorial control in the Amazon; Section 4 describes the technological capabilities of the FAB in remote sensing and SAR image processing; Section 5 discusses the political and strategic implications of AI&#x2013;SAR integration for territorial governance, informational sovereignty, and technological autonomy; and Section 6 presents the conclusions, the limitations of the study, and the future research agenda.</p>
</sec>
<sec sec-type="materials|methods" id="sec2">
<label>2</label>
<title>Materials and methods</title>
<p>This study adopts a qualitative and exploratory research design, appropriate for investigating complex phenomena involving multiple dimensions&#x2014;technological, strategic, and environmental&#x2014;for which no previously consolidated metrics exist (<xref ref-type="bibr" rid="ref14">Creswell and Poth, 2018</xref>; <xref ref-type="bibr" rid="ref64">Yin, 2018</xref>). The analysis is based on a single case study (the Brazilian Amazon), focusing on the integration of artificial intelligence and Synthetic Aperture Radar (AI&#x2013;SAR) as a strategic resource of the state (<xref ref-type="bibr" rid="ref29">Gerring, 2017</xref>).</p>
<p>The empirical corpus was constructed from official documents, technical reports, and public statements produced between 2022 and 2025, as well as specialized scientific literature without a rigid temporal delimitation. Documents were selected according to three criteria: thematic relevance to the use of artificial intelligence and Synthetic Aperture Radar in security, defense, or the monitoring of the Amazon; institutional authority of the sources (Brazilian Air Force, Ministry of Defense, Operations and Management Center of the Amazonian Protection System&#x2014;CENSIPAM&#x2014;and other governmental bodies); and public accessibility, as all analyzed documents were drawn from open sources (<xref ref-type="bibr" rid="ref8">Bowen, 2009</xref>).</p>
<p>For analytical purposes, the corpus was organized into four categories: (1) doctrine and strategy; (2) capabilities and platforms; (3) operations and performance; and (4) AI technologies and data flows. <xref ref-type="table" rid="tab1">Table 1</xref> summarizes the composition of the documentary corpus, indicating document types, issuing institutions, and their temporal distribution within the analyzed period. The analysis focused on analytically relevant document excerpts, enabling cross-sectional comparison across different types of evidence and triangulation between strategic and operational dimensions.</p>
<table-wrap position="float" id="tab1">
<label>Table 1</label>
<caption>
<p>Synthesis of the document corpus analyzed.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Analytical category</th>
<th align="left" valign="top">Types of documents</th>
<th align="left" valign="top">Issuing institutions</th>
<th align="left" valign="top">Time frame</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="middle">Doctrine and strategy</td>
<td align="left" valign="middle">National defense policies, strategic guidelines, and command and control (C2/C4ISR) documents</td>
<td align="left" valign="middle">Brazilian Ministry of Defense, Brazilian Air Force, Aerospace Operations Command</td>
<td align="left" valign="middle">2022&#x2013;2025</td>
</tr>
<tr>
<td align="left" valign="middle">Capabilities and platforms</td>
<td align="left" valign="middle">Reports on surveillance satellites and aerial platforms for Amazon monitoring</td>
<td align="left" valign="middle">Brazilian Air Force, Aerospace Operations Command, Ministry of Science, Technology, and Innovation</td>
<td align="left" valign="middle">2022&#x2013;2025</td>
</tr>
<tr>
<td align="left" valign="middle">Operations and performance</td>
<td align="left" valign="middle">Operational reports on surveillance missions, response times, and territorial coverage</td>
<td align="left" valign="middle">Brazilian Air Force, Amazon Protection System Management and Operations Center</td>
<td align="left" valign="middle">2022&#x2013;2025</td>
</tr>
<tr>
<td align="left" valign="middle">Artificial intelligence technologies and data flows</td>
<td align="left" valign="middle">Documents on AI models, data processing, and machine learning workflows, including scientific literature</td>
<td align="left" valign="middle">Brazilian Air Force, Brazilian government agencies, academic journals</td>
<td align="left" valign="middle">Institutional documents: 2022&#x2013;2025; Scientific literature: no fixed timeframe</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The collected material was examined through thematic content analysis, a procedure that identifies recurring patterns, meaning categories, and latent relationships within the documentary corpus (<xref ref-type="bibr" rid="ref7">Bardin, 2011</xref>). The analytical process involved three stages: (i) floating and systematic reading of the corpus; (ii) coding of recording units into thematic categories; and (iii) interpretive synthesis, relating empirical findings to analytical categories in order to highlight convergences, tensions, and strategic implications.</p>
<p>The analytical categories were defined through a combined deductive&#x2013;inductive strategy. Initially, coding was guided by ex ante categories derived from the theoretical framework. During the systematic reading and coding of the corpus, additional categories emerged inductively from the empirical data, relating to operational integration between sensors and decision-making systems, performance and efficiency in the employment of technological capabilities, territorial prioritization of critical areas, and institutional framings of innovation and modernization. Analytical codes were assigned to specific documentary excerpts and refined iteratively, ensuring internal coherence and interpretive consistency. <xref ref-type="table" rid="tab2">Table 2</xref> synthesizes the categories and the main codes used in the analysis.</p>
<table-wrap position="float" id="tab2">
<label>Table 2</label>
<caption>
<p>Analytical categories and coding scheme.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Category type</th>
<th align="left" valign="top">Analytical category</th>
<th align="left" valign="top">Main codes (illustrative)</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="middle" rowspan="4">Ex ante (theory-driven)</td>
<td align="left" valign="middle">Non-traditional security</td>
<td align="left" valign="middle">Environmental monitoring; border surveillance; combatting transnational illicit activities; protection of critical infrastructure</td>
</tr>
<tr>
<td align="left" valign="middle">Securitization</td>
<td align="left" valign="middle">Threat construction; prioritization of the Amazon; risk framing; justification of exceptional measures</td>
</tr>
<tr>
<td align="left" valign="middle">Informational sovereignty</td>
<td align="left" valign="middle">State control of data; national data processing; data-driven decision-making; dependence on external data</td>
</tr>
<tr>
<td align="left" valign="middle">Technological sovereignty</td>
<td align="left" valign="middle">Technological autonomy; national capability development; institutional innovation; force modernization</td>
</tr>
<tr>
<td align="left" valign="middle" rowspan="4">Ex post (data-driven)</td>
<td align="left" valign="middle">Operational integration between sensors and decision systems</td>
<td align="left" valign="middle">Integration between artificial intelligence and Synthetic Aperture Radar; sensor fusion; interoperability between platforms; command and control integration</td>
</tr>
<tr>
<td align="left" valign="middle">Performance and efficiency of technological capabilities</td>
<td align="left" valign="middle">Accuracy; response time; territorial coverage; operational effectiveness</td>
</tr>
<tr>
<td align="left" valign="middle">Territorial prioritization and identification of critical areas</td>
<td align="left" valign="middle">Hotspots; prioritization of regions; differentiated allocation of assets</td>
</tr>
<tr>
<td align="left" valign="middle">Institutional framings of innovation and modernization</td>
<td align="left" valign="middle">Digital transformation; innovation discourse; organizational modernization; enhancement of state capabilities</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Triangulation was conducted during the interpretive synthesis stage through the systematic comparison of strategic and normative documents, technical-operational reports, and specialized scientific literature (<xref ref-type="bibr" rid="ref40">Lincoln and Guba, 1985</xref>; <xref ref-type="bibr" rid="ref1">Abdalla et al., 2018</xref>). This procedure allowed for the verification of convergence among findings and supported the refinement of analytical categories, reducing biases associated with isolated sources.</p>
</sec>
<sec id="sec3">
<label>3</label>
<title>Cyber Statecraft and Amazonian sovereignty: AI&#x2013;SAR integration and territorial governance</title>
<sec id="sec4">
<label>3.1</label>
<title>Data-centric warfare, Cyber Statecraft, and the exercise of data-mediated territorial power</title>
<p>The transformation of warfare in the contemporary era is intrinsically linked to the growing centrality of information as the primary strategic asset. This qualitative shift means that military power is no longer defined solely by the number of platforms, but by the capacity to collect, process, and disseminate data in a timely manner, transforming them into knowledge that is useful for decision-making (<xref ref-type="bibr" rid="ref4">Alberts et al., 2002</xref>).</p>
<p>The most notable practical expression of this new logic was the transition from Platform-Centric Warfare, whose operational effectiveness was limited to the isolated capabilities of each system, to Network-Centric Warfare (NCW). The core premise of NCW is that the electronic interconnection of geographically dispersed forces generates a synergistic effect that enhances combat power. By enabling shared situational awareness and accelerating decision speed, NCW operationalizes the principle of information superiority, seeking asymmetric advantage by integrating personnel, platforms, and formations into a single Command and Control system (<xref ref-type="bibr" rid="ref4">Alberts et al., 2002</xref>).</p>
<p>However, the very conception of NCW, although revolutionary, encountered its limits as the volume of data generated by sensors, satellites, and radars grew exponentially. The natural evolution of NCW thus led to Data-Centric Warfare (DCW), a concept that deepens the previous logic by recognizing that the central contemporary challenge is not merely data sharing, but the real-time processing of massive data volumes to extract actionable intelligence (<xref ref-type="bibr" rid="ref51">Nizienko et al., 2021</xref>).</p>
<p>This shift toward DCW is not exhausted by strictly operational implications. By making continuous data collection, automated processing, and algorithmic analysis central conditions of military effectiveness, DCW produces effects that extend beyond the conduct of war and directly affect how the state exercises authority over territory. It is precisely at this point that the literature situates the concept of Cyber Statecraft.</p>
<p>The term Cyber Statecraft describes the strategic use of digital infrastructures, data, and algorithms as core instruments of governance, security, and the projection of sovereignty in the physical world (<xref ref-type="bibr" rid="ref63">Woods, 2017</xref>; <xref ref-type="bibr" rid="ref15">Devanny, 2024</xref>; <xref ref-type="bibr" rid="ref59">Stevens and Devanny, 2024</xref>). Unlike approaches that treat the digital domain as an autonomous space, this concept emphasizes its instrumental function in the exercise of state power over physical territories. From this perspective, the collection, processing, and analysis of territorial data in real time constitute a structural component of contemporary sovereignty, rather than a mere operational resource.</p>
<p>This dynamic does not eliminate the political dimension of sovereignty, but reconfigures it by shifting a significant portion of decision-making autonomy toward control over informational and technological infrastructures. To that extent, the capacity to mobilize information as a strategic asset becomes conditioned on the reduction of external dependencies&#x2014;whether political, economic, or technical&#x2014;that may impose constraints on state action (<xref ref-type="bibr" rid="ref52">Payne, 2018</xref>; <xref ref-type="bibr" rid="ref58">Schmidt, 2022</xref>). This issue is particularly critical for countries in the Global South, where technological dependence has historically limited decision-making autonomy in security and defense contexts.</p>
<p>Another issue that emerges in debates on the incorporation of artificial intelligence into the exercise of Cyber Statecraft concerns the potential generation of informational asymmetries and accountability challenges associated with the use of algorithmic systems. Studies on military AI indicate that such challenges do not arise solely from misuse, but from structural features of automation itself, such as algorithmic opacity&#x2014;often described as black boxes&#x2014;the embedding of biases within models, and the gradual expansion of system purposes beyond their original objectives (function creep) (<xref ref-type="bibr" rid="ref52">Payne, 2018</xref>; <xref ref-type="bibr" rid="ref30">Horowitz, 2018</xref>).</p>
<p>This combination may shift effective control over critical decisions, concentrating technical knowledge in developers or suppliers and complicating the clear attribution of responsibility within the state apparatus (<xref ref-type="bibr" rid="ref30">Horowitz, 2018</xref>). In this context, the literature emphasizes that the consolidation of AI-based surveillance as an instrument of territorial power requires robust institutional arrangements of algorithmic governance, capable of ensuring operational transparency, continuous human oversight, and clear mechanisms of accountability (<xref ref-type="bibr" rid="ref54">Pohle and Thiel, 2020</xref>; <xref ref-type="bibr" rid="ref30">Horowitz, 2018</xref>).</p>
<p>Such safeguards are understood not as obstacles to strategic effectiveness, but as central components for preserving the legitimacy of data-mediated power, by reducing the risk of abusive or disproportionate uses of algorithmic surveillance without compromising its functionality in the fields of security and defense (<xref ref-type="bibr" rid="ref52">Payne, 2018</xref>; <xref ref-type="bibr" rid="ref15">Devanny, 2024</xref>).</p>
</sec>
<sec id="sec5">
<label>3.2</label>
<title>Structural challenges of territorial control in the Amazon and the integration of AI and SAR in the construction of situational awareness</title>
<p>Understanding contemporary security challenges in the Amazon requires a reappraisal of the traditional concept of security, historically centered on military defense against state-based threats. In the post&#x2013;Cold War context, the international security literature incorporated non-traditional threats&#x2014;of a transnational and non-state nature, such as organized crime, terrorism, and environmental degradation&#x2014;which, although not manifesting as conventional conflicts, can erode state sovereignty (<xref ref-type="bibr" rid="ref10">Buzan et al., 1998</xref>).</p>
<p>The transition from a social, economic, or policing problem to an issue of national defense occurs through a political process known as securitization, in which a political actor frames a given issue as an existential threat that requires emergency measures and the use of extraordinary means (<xref ref-type="bibr" rid="ref10">Buzan et al., 1998</xref>). If the audience (public, parliament, elites) accepts this definition, the issue becomes securitized, legitimizing the use of tools normally reserved for military defense.</p>
<p>It is in this context that non-traditional security and securitization converge in the Brazilian case. The Amazon constitutes a region of 8.5 million km<sup>2</sup> distributed across nine South American countries, with 62% located within Brazil (<xref ref-type="bibr" rid="ref57">Santos et al., 2024</xref>). Its low population density and dense, humid forests impose natural barriers to movement and hinder the installation of state infrastructure, creating favorable conditions for the activity of illicit actors who exploit the spatial discontinuity of state power (<xref ref-type="bibr" rid="ref31">Instituto Brasileiro de Geografia e Estat&#x00ED;stica, 2023</xref>; <xref ref-type="bibr" rid="ref24">Franchi, 2023</xref>). It should be noted that such challenges are not exclusive to Brazil. Colombia, Peru, and Indonesia face similar dynamics of surveillance over vast forested areas with discontinuous state presence, where these threats likewise exploit structural limitations of governance.</p>
<p>Not by coincidence, at least 22 criminal factions currently operate in the region, with recorded presence in 178 municipalities, equivalent to approximately 23% of the Brazilian Amazon (<xref ref-type="bibr" rid="ref23">F&#x00F3;rum Brasileiro de Seguran&#x00E7;a P&#x00FA;blica, 2023</xref>). The dynamics of these organizations reinforce the perception of an existential threat to sovereignty and territorial control, manifesting the outcome of the securitization process.</p>
<p>Illicit networks are structured as flexible transnational circuits, articulated around strategic points that are difficult to control&#x2014;territorial nodes&#x2014;often located along border zones. In these areas, illegal mining and drug trafficking operate in an integrated manner, sharing infrastructure, logistics, and trafficking routes (<xref ref-type="bibr" rid="ref23">F&#x00F3;rum Brasileiro de Seguran&#x00E7;a P&#x00FA;blica, 2023</xref>; <xref ref-type="bibr" rid="ref9">Johnson, 2023</xref>). This capacity for spatial adaptation reveals that such networks exercise indirect forms of territorial domination, precisely by exploiting gaps in the physical presence of the state.</p>
<p>The configuration of this border zone, which combines thousands of kilometers of dry land, flooded areas, dense forests, and navigable rivers, hinders the imposition of effective barriers (<xref ref-type="bibr" rid="ref23">F&#x00F3;rum Brasileiro de Seguran&#x00E7;a P&#x00FA;blica, 2023</xref>). In twin cities, located on opposite sides of international borders, social, economic, and cultural ties among transboundary populations render national borders even more porous (<xref ref-type="bibr" rid="ref56">Santos, 2016</xref>; <xref ref-type="bibr" rid="ref2">Aguiar, 2021</xref>; <xref ref-type="bibr" rid="ref16">Dias and Paiva, 2022</xref>; <xref ref-type="bibr" rid="ref53">Pedreira, 2023</xref>). These borders function as zones of intense circulation of people, goods, and capital, both legal and illegal. Territorial sovereignty is not directly challenged, but progressively hollowed out by practices that escape continuous state oversight (<xref ref-type="bibr" rid="ref23">F&#x00F3;rum Brasileiro de Seguran&#x00E7;a P&#x00FA;blica, 2023</xref>).</p>
<p>Amazonian territorial dynamics demonstrate that governance predominantly based on permanent physical presence&#x2014;through posts, patrols, and fixed infrastructure&#x2014;proves inadequate in the face of a vast, mobile space exploited by highly adaptive actors. The central problem is not the absence of legal or administrative instruments, but the capacity to produce continuous territorial visibility and to efficiently activate enforcement and combat mechanisms against criminal actors and activities. In this securitized context, the state seeks tools that enable more rapid and adaptive intervention, justifying the use of means that go beyond traditional civil surveillance.</p>
<p>In this setting, Synthetic Aperture Radar emerges as a fundamental tool. SAR stands out for its ability to generate images of the Earth&#x2019;s surface using microwaves, operating continuously and independently of weather conditions or illumination&#x2014;an advantage that is decisive in regions of dense forest and persistent cloud cover (<xref ref-type="bibr" rid="ref50">NASA Earthdata, 2025</xref>).</p>
<p>This capability makes it possible to generate detailed images under adverse weather conditions (rain, dense clouds, or fog), dense vegetation, and independently of sunlight&#x2014;an essential attribute for the Amazon, where constant cloud cover and forest density impose significant barriers to the visual observation of illegal deforestation, clandestine airstrips, and illegal mining camps (<xref ref-type="bibr" rid="ref19">Flores et al., 2019</xref>).</p>
<p>Despite its advantages, SAR presents relevant limitations for defense applications. First, the large volume of data generated requires substantial storage and processing capacity. In addition, SAR images exhibit characteristic noise known as speckle, which gives them a granular appearance and complicates visual interpretation (<xref ref-type="bibr" rid="ref44">Meyer, 2019</xref>; <xref ref-type="bibr" rid="ref55">Saatchi, 2019</xref>).</p>
<p>Although the sensor operates continuously, the extraction of useful information is not always immediate. Traditionally, this task depends on specialized analysts, who combine technical expertise with long hours of work to identify targets and patterns. In the Amazonian case, this difficulty is even greater: dense vegetation cover, irregular topography, and an extensive hydrographic network produce complex visual scenarios in which improvised airstrips, riverine vessels, or illegal mining areas can be camouflaged within the natural landscape (<xref ref-type="bibr" rid="ref47">Minist&#x00E9;rio da Defesa, 2025a</xref>).</p>
<p>In light of these limitations, artificial intelligence becomes an essential instrument for enhancing the strategic value of SAR. Machine learning and deep learning algorithms automate image processing, reducing the impact of noise and identifying visual patterns that are difficult to detect through traditional human analysis (<xref ref-type="bibr" rid="ref18">Falqueto et al., 2023</xref>). This AI&#x2013;SAR integration accelerates the analytical cycle, transforming large volumes of raw data into actionable operational information in real time.</p>
<p>This process strengthens situational awareness, understood as an internal state of knowledge that involves the perception of relevant elements in the environment, the comprehension of their meaning in relation to the operator&#x2019;s objectives, and the projection of their status into the near future (<xref ref-type="bibr" rid="ref17">Endsley, 1995</xref>). By automating the identification of elements and dynamics within the monitored environment, AI&#x2013;SAR enhances Level 1 situational awareness (Perception); by integrating and organizing these data coherently, it contributes to Level 2 (Comprehension); and by enabling inferences about trends and future behaviors, it supports Level 3 (Projection). This AI&#x2013;SAR integration does not constitute the decision-making process itself, but rather functions as a critical knowledge base that underpins decision-making in complex and dynamic environments.</p>
<p>Beyond enhancing situational awareness, such integration can compress decision cycles associated with territorial control, particularly those described by the OODA model (Observe&#x2013;Orient&#x2013;Decide&#x2013;Act) (<xref ref-type="bibr" rid="ref27">Gaire, 2023</xref>). According to this model, the effectiveness of state action in complex environments depends on the ability to observe, interpret, decide, and act more rapidly and adaptively than adversarial actors (<xref ref-type="bibr" rid="ref37">Konaev et al., 2020</xref>; <xref ref-type="bibr" rid="ref30">Horowitz, 2018</xref>). In extensive territorial contexts marked by high uncertainty&#x2014;such as the Amazon&#x2014;the decision bottleneck is concentrated in the early phases of the cycle, particularly observation and orientation, which require the collection, processing, and interpretation of large volumes of spatial and temporal data.</p>
<p>Despite the gains associated with the compression of decision cycles, the literature on decision-support systems cautions that reducing the time between observation and action may amplify the risk of decisions based on incomplete, poorly contextualized, or excessively filtered information produced by algorithmic models (<xref ref-type="bibr" rid="ref17">Endsley, 1995</xref>).</p>
<p>The distinction between data, information, and actionable intelligence thus becomes central. As <xref ref-type="bibr" rid="ref42">Lowenthal (2017)</xref> argues, actionable intelligence is not limited to event detection, but involves contextual interpretation, relevance assessment, and integration with broader strategic objectives. AI-based systems, while efficient in identifying recurring visual patterns, operate on the basis of specific training datasets and statistical assumptions that do not capture the socioterritorial complexity of the observed space. Speed in the production of alerts does not guarantee more effective decisions and may induce premature responses when information is not adequately validated or contextualized.</p>
<p>Specialized analyses highlight that algorithmic errors tend to propagate more rapidly in accelerated and automated decision systems, amplifying operational and ethical risks (<xref ref-type="bibr" rid="ref49">Morgan et al., 2020</xref>). The compression of the OODA loop through AI integration does not always produce a positive outcome. In AI&#x2013;SAR territorial surveillance, decisions that rely solely on automated systems may generate a structural trade-off between speed and accuracy, in which gains in temporal efficiency are accompanied by new forms of decision vulnerability. This vulnerability constitutes an inherent risk of the securitization logic: by legitimizing the use of extraordinary and accelerated means in the name of survival, the process may inadvertently generate new dilemmas of governance and legitimacy, replacing normal policies with faster &#x201C;emergency policies&#x201D; that are potentially less accurate and less subject to democratic scrutiny.</p>
</sec>
</sec>
<sec id="sec6">
<label>4</label>
<title>Technological capabilities of the Brazilian Air Force in the surveillance of the Amazon region</title>
<p>Surveillance and control of the Amazonian airspace represent an operational and strategic challenge, given the region&#x2019;s vast territorial extent and the recurring incidence of illicit activities. Historically, the Brazilian response to this challenge has been marked by a critical dependence on foreign space infrastructure (<xref ref-type="bibr" rid="ref46">Minist&#x00E9;rio da Defesa, 2022</xref>). In this context of informational vulnerability, the development of the Amazon Protection System (SIPAM) represented the first integrated effort to mitigate this dependence, establishing a platform oriented toward environmental monitoring and the strengthening of national sovereignty (<xref ref-type="bibr" rid="ref11">Centro Gestor e Operacional do Sistema de Prote&#x00E7;&#x00E3;o da Amaz&#x00F4;nia, 2009</xref>).</p>
<p>Designed as a multi-sensor system, SIPAM integrates remote sensing technologies, surveillance radars, satellite imaging, and data processing, enabling near-real-time situational awareness over strategic areas of the Amazon. Over the past two decades, the system has evolved into a highly complex interagency framework, benefiting from the technological capabilities of the Brazilian Air Force, especially through the incorporation of Synthetic Aperture Radar sensors fitted on satellites and aircraft (<xref ref-type="bibr" rid="ref12">Centro Gestor e Operacional do Sistema de Prote&#x00E7;&#x00E3;o da Amaz&#x00F4;nia, 2021</xref>).</p>
<p>In this setting, the FAB has consolidated itself as a central actor in Amazon surveillance through a diversified fleet of reconnaissance, maritime patrol, and search-and-rescue aircraft (<xref ref-type="supplementary-material" rid="SM1">Appendix A, Table 1</xref>), all equipped with SAR sensors that enable persistent surveillance, high-resolution mapping, and rapid detection of irregularities in hard-to-access regions (<xref ref-type="bibr" rid="ref47">Minist&#x00E9;rio da Defesa, 2025a</xref>; <xref ref-type="bibr" rid="ref60">Teixeira and Pinheiro, 2015</xref>).</p>
<p>Complementing these imaging capabilities for regional surveillance, the FAB also developed the Lessonia Project, which is part of the Strategic Space Systems Program (PESE). This project materializes through the acquisition and operation of a constellation of Radar Remote Sensing satellites, specifically using SAR technology, operating in Low Earth Orbit (<xref ref-type="bibr" rid="ref46">Minist&#x00E9;rio da Defesa, 2022</xref>). The satellites that comprise the initial phase of this capability were designed to significantly expand surveillance coverage over strategic areas such as the Legal Amazon and national borders (<xref ref-type="supplementary-material" rid="SM1">Appendix A, Table 2</xref>) (<xref ref-type="bibr" rid="ref46">Minist&#x00E9;rio da Defesa, 2022</xref>).</p>
<p>A particularly significant milestone of the project was the achievement, in 2025, of the FAB&#x2019;s autonomous operation capability for the Lessonia-1 Space System (<xref ref-type="fig" rid="fig1">Figure 1</xref>). As a result, the Aerospace Operations Command (COMAE) came to hold full control over the SAR image acquisition cycle of these satellites&#x2014;ranging from planning and image acquisition to the reception and initial processing of the data.</p>
<fig position="float" id="fig1">
<label>Figure 1</label>
<caption>
<p>Aspects of the Lessonia-1 Project.</p>
</caption>
<graphic xlink:href="fpos-08-1730568-g001.tif" mimetype="image" mime-subtype="tiff">
<alt-text content-type="machine-generated">Illustration of the Lessonia Project-1, a dual-use satellite constellation for Brazilian monitoring. It serves military and civil purposes. Main users are armed forces, the Amazonian Protection System, and government agencies. The satellite features all-weather, day and night SAR imaging. Technical specifications include dimensions of one cubic meter, weight of one hundred kilograms, five solar panels, and a power output of three hundred watts. A satellite is shown orbiting above Brazil with a beam pointing toward the Earth.</alt-text>
</graphic>
</fig>
<p>This operational autonomy represents a qualitative leap in national observation capacity, reducing dependence on foreign systems or operators and ensuring that Brazilian strategic needs can be met with priority and security. Autonomous operation substantially increases the flexibility, frequency, and coverage of SAR observation over the region and other areas of national interest, integrating and complementing the data obtained by aerial platforms (<xref ref-type="supplementary-material" rid="SM1">Appendix A, Table 5</xref>) (<xref ref-type="bibr" rid="ref21">For&#x00E7;a A&#x00E9;rea Brasileira, 2025</xref>).</p>
<p>Despite the recognized operational advantages of the FAB&#x2019;s use of SAR sensors, the analysis of images generated by this technology presented significant limitations, especially in the complex Amazonian environment. Challenges such as river morphology&#x2014;often narrow, long, and sinuous&#x2014;the variety of non-cooperative targets (dredges and barges), and persistent cloud cover hindered optical observation.</p>
<p>In this context, AI emerged as a strategic tool for automating image processing, producing substantial gains in speed, precision, and analytical efficiency compared to conventional methods. The service, through COMAE, incorporated AI into regional surveillance in order to promote efficiency in the reading of collected images.</p>
<p>The adoption of this technology, in articulation with other advanced solutions such as deep learning algorithms, has enabled near-real-time processing of SAR data, significantly increasing surveillance efficiency and the institution&#x2019;s response effectiveness. Among the architectures used, notable examples include convolutional neural networks (CNNs)&#x2014;artificial intelligence models designed for image analysis&#x2014;such as YOLOv4, as well as models such as VGG16 and VGG19 (<xref ref-type="supplementary-material" rid="SM1">Appendix A, Table 4</xref>), successfully applied to the automated detection of complex visual patterns.</p>
<p>According to the computer vision development report issued by the Joint Operational Intelligence Center (CCOI) in 2025, the most recent model used by the Air Force not only identified illegal vessels with greater precision, but was also able to distinguish visual elements that had previously been incorrectly classified as targets (<xref ref-type="bibr" rid="ref48">Minist&#x00E9;rio da Defesa, 2025b</xref>). The report indicates results with high operational precision (above 95%) in the automatic detection of critical targets, such as illegal mining dredges, small vessels, and clandestine aircraft in the Amazon region.</p>
<p>This metric, although impressive, should be interpreted in light of external validity and methodological trade-offs. The high precision refers to specific campaigns in which AI models such as YOLOv4 were trained on 3-meter-resolution SAR Stripmap imagery, using labeled datasets with ground truth obtained through real missions (<xref ref-type="bibr" rid="ref48">Minist&#x00E9;rio da Defesa, 2025b</xref>). However, studies such as <xref ref-type="bibr" rid="ref18">Falqueto et al. (2023)</xref> show that, in similar contexts, it is possible to reach accuracy close to 90% using CNNs on Sentinel-1 SAR imagery, reinforcing the technical plausibility of the results reported here.</p>
<p>The efficiency gains are notable (<xref ref-type="supplementary-material" rid="SM1">Appendix A, Table 1</xref>): activities that previously required up to five business days for manual analysis came to be executed in approximately 2&#x202F;h with computational support, although the need for human validation remains in certain operationally sensitive cases. Comparison with airborne reconnaissance further reinforces the advantages of the new model: in the case of covering 33,000&#x202F;km of Amazonian rivers in search of dredges, satellite remote sensing with AI consumed approximately 20&#x202F;min of satellite time, at a cost equivalent to 8.5&#x202F;h of operation of the P-95BM aircraft&#x2014;representing a drastic reduction compared to the 25 flight hours required for an equivalent mission by aerial means. Average processing time was also reduced by approximately 40% (<xref ref-type="bibr" rid="ref48">Minist&#x00E9;rio da Defesa, 2025b</xref>).</p>
<p>This integrated arrangement has already made it possible to achieve surveillance over areas of up to 85,000&#x202F;km<sup>2</sup> in the Amazon region. As a consequence, the need for repetitive overflights was reduced, generating savings in fuel, flight hours, and aircraft wear. Greater agility in activating field teams strengthened preventive action, enabling the early interruption of illicit activities (<xref ref-type="bibr" rid="ref48">Minist&#x00E9;rio da Defesa, 2025b</xref>).</p>
<p>It is worth emphasizing that the entire process described is sustained by a continuous training regime, which involves the systematic curation of new samples, the updating of labeled datasets, and the iterative refinement of algorithms. Maintaining this cycle requires the permanent availability of highly qualified technical personnel, as well as stable financial resources (<xref ref-type="bibr" rid="ref6">Azevedo et al., 2021</xref>), since model accuracy and adaptation to regional specificities depend directly on data quality, sensor calibration, and the institutional capacity to sustain computational infrastructure and specialized teams over time (<xref ref-type="bibr" rid="ref48">Minist&#x00E9;rio da Defesa, 2025b</xref>).</p>
<p>Finally, specific characteristics of the sensors (<xref ref-type="supplementary-material" rid="SM1">Appendix A, Table 3</xref>)&#x2014;such as spatial, spectral, radiometric, and temporal resolutions&#x2014;influence total mission time, which prevents direct comparisons across assets with different operational profiles. Given this diversity of technical variables, the report recommends that an imagery intelligence technician carefully assess the convergence between operational objectives, the capabilities of available sensors, and financial constraints, in order to guide the choice of the most appropriate asset for each mission (<xref ref-type="bibr" rid="ref48">Minist&#x00E9;rio da Defesa, 2025b</xref>).</p>
</sec>
<sec id="sec7">
<label>5</label>
<title>Discussion: political and strategic implications of AI&#x2013;SAR in the Brazilian Amazon</title>
<p>The implementation of AI&#x2013;SAR in Amazonian territorial surveillance generates political and strategic implications that transcend technical issues. This section analyzes how the integration of detection capabilities, decision acceleration, technological autonomy, and algorithmic governance redefines the exercise of state power in the region. Understanding these implications is essential to assess whether AI&#x2013;SAR strengthens Brazilian sovereignty or reproduces historical political vulnerabilities at a new technological scale.</p>
<sec id="sec8">
<label>5.1</label>
<title>Territorial visibility and situational awareness</title>
<p>The implementation of AI&#x2013;SAR in Amazonian surveillance provides large-scale capabilities for continuous detection and monitoring. SAR penetrates cloud cover and operates independently of solar illumination, features that are critical for equatorial regions (<xref ref-type="bibr" rid="ref50">NASA Earthdata, 2025</xref>). When integrated with optical remote sensing, HUMINT, and OSINT, it enables the construction of comprehensive situational awareness&#x2014;the capacity to perceive, understand, and anticipate changes in the operational environment (<xref ref-type="bibr" rid="ref17">Endsley, 1995</xref>; <xref ref-type="bibr" rid="ref13">Couture and Toupin, 2019</xref>). In the context of territorial surveillance, this includes: (1) the identification of illicit activities (deforestation, illegal mining, invasions) in territorial nodes and twin cities; (2) the detection of behavioral patterns indicating threats; (3) the precise localization of targets; and (4) escalation forecasting based on trends (<xref ref-type="bibr" rid="ref24">Franchi, 2023</xref>; <xref ref-type="bibr" rid="ref23">F&#x00F3;rum Brasileiro de Seguran&#x00E7;a P&#x00FA;blica, 2023</xref>). AI&#x2013;SAR systems amplify these elements by automating detection, classification, and data integration.</p>
<p>In Brazil, CENSIPAM incorporates AI&#x2013;SAR to integrate data from multiple sources, enabling continuous identification of forest changes, localization of built structures (camps, airstrips, mining sites), and tracking of movements with unprecedented precision (<xref ref-type="bibr" rid="ref24">Franchi, 2023</xref>; <xref ref-type="bibr" rid="ref11">CENSIPAM, 2009</xref>, <xref ref-type="bibr" rid="ref12">2021</xref>; <xref ref-type="bibr" rid="ref9001">Instituto Brasileiro de Geografia e Estat&#x00ED;stica, 2022</xref>). This allows for rapid responses to emerging threats, reducing windows of opportunity for illicit activities (<xref ref-type="bibr" rid="ref13">Couture and Toupin, 2019</xref>). Similar capabilities are strategically relevant for other Amazonian countries in the Global South.</p>
<p>This improvement benefits both environmental protection and the territorial defense of Indigenous peoples. Early detection of invasions, deforestation, and illegal mining enables FUNAI and environmental agencies to respond before irreversible damage occurs (<xref ref-type="bibr" rid="ref24">Franchi, 2023</xref>). Demarcated Indigenous lands present significantly lower deforestation rates, evidencing the effectiveness of Indigenous governance when supported by rapid detection and response (<xref ref-type="bibr" rid="ref62">Virtanen et al., 2025</xref>). This integration not only enhances state surveillance, but also strengthens the self-defense of Indigenous communities by providing up-to-date information on threats (<xref ref-type="bibr" rid="ref13">Couture and Toupin, 2019</xref>; <xref ref-type="bibr" rid="ref24">Franchi, 2023</xref>).</p>
<p>However, the quality of situational awareness depends critically on training data, model robustness, and computational capacity. CNN-based models applied to Sentinel-1 SAR imagery achieve accuracy close to 90%, with AUC values above 87% when optimized (<xref ref-type="bibr" rid="ref18">Falqueto et al., 2023</xref>; <xref ref-type="bibr" rid="ref48">Minist&#x00E9;rio da Defesa, 2025b</xref>). Classification errors may generate false positives (incorrect identification of legitimate activities as illicit) or false negatives (failure to detect illicit activities), undermining operational effectiveness and the protection of Indigenous and local communities (<xref ref-type="bibr" rid="ref24">Franchi, 2023</xref>).</p>
</sec>
<sec id="sec9">
<label>5.2</label>
<title>Acceleration of decision cycles and resource optimization</title>
<p>The integration of AI&#x2013;SAR not only expands surveillance, but also compresses cycles of state analysis and response. Conventional Amazonian surveillance systems rely on manual image analysis, cross-referencing with multiple databases, and interagency coordination&#x2014;processes that take days or weeks. The incorporation of AI&#x2013;SAR significantly reduces this interval by automating the detection of spatial and environmental anomalies, target and structure classification, within much shorter timeframes, often measured in hours (<xref ref-type="bibr" rid="ref48">Minist&#x00E9;rio da Defesa, 2025b</xref>; <xref ref-type="bibr" rid="ref11">Centro Gestor e Operacional do Sistema de Prote&#x00E7;&#x00E3;o da Amaz&#x00F4;nia, 2009</xref>, <xref ref-type="bibr" rid="ref12">2021</xref>). This temporal reduction transforms the dynamics between surveillance and action.</p>
<p>This action&#x2013;reaction dynamic is embedded in the strategic transformation known as data-centric warfare (<xref ref-type="bibr" rid="ref51">Nizienko et al., 2021</xref>). Military concepts such as the OODA loop emphasize that strategic advantage belongs to those who process information and decide more rapidly than their adversaries (<xref ref-type="bibr" rid="ref9">Johnson, 2023</xref>; <xref ref-type="bibr" rid="ref27">Gaire, 2023</xref>). AI&#x2013;SAR optimizes each stage: continuous and automated observation; accelerated orientation through predictive analysis; decisions informed by algorithmic recommendations; and coordinated action through integrated systems. The result is a temporal reduction of the decision cycle, altering the speed at which the state responds to threats (<xref ref-type="bibr" rid="ref11">Centro Gestor e Operacional do Sistema de Prote&#x00E7;&#x00E3;o da Amaz&#x00F4;nia, 2009</xref>, <xref ref-type="bibr" rid="ref12">2021</xref>).</p>
<p>This compression offers operational advantages. Rapid responses to illegal deforestation reduce environmental damage; efficient interdiction of drug and arms trafficking strengthens public and international security; accelerated detection of illegal mining protects natural resources and the rights of Indigenous peoples. However, this acceleration generates a structural trade-off between speed and precision (<xref ref-type="bibr" rid="ref17">Endsley, 1995</xref>; <xref ref-type="bibr" rid="ref42">Lowenthal, 2017</xref>), as temporal gains amplify the risks of algorithmic error (<xref ref-type="bibr" rid="ref30">Horowitz, 2018</xref>; <xref ref-type="bibr" rid="ref52">Payne, 2018</xref>; <xref ref-type="bibr" rid="ref49">Morgan et al., 2020</xref>). Decisions based solely on algorithmic recommendations reduce the time available for human review, contextualization, or correction (<xref ref-type="bibr" rid="ref26">Furtado et al., 2024</xref>).</p>
<p>Algorithms may misclassify activities&#x2014;identifying legitimate actions as suspicious, or vice versa. The literature shows that algorithmic errors propagate more rapidly in accelerated decision-making contexts, amplifying operational risks when adequate verification mechanisms are absent (<xref ref-type="bibr" rid="ref49">Morgan et al., 2020</xref>; <xref ref-type="bibr" rid="ref17">Endsley, 1995</xref>). An authorized controlled burn for forest management, if erroneously flagged as illegal deforestation, could trigger preliminary administrative responses. Dual-verification protocols&#x2014;manual analysis, consultation with local communities, and prior review&#x2014;can mitigate these risks, ensuring that state interventions are grounded in an appropriate assessment of the legitimacy of the activity (<xref ref-type="bibr" rid="ref11">Centro Gestor e Operacional do Sistema de Prote&#x00E7;&#x00E3;o da Amaz&#x00F4;nia, 2009</xref>, <xref ref-type="bibr" rid="ref12">2021</xref>).</p>
<p>The integration of AI&#x2013;SAR optimizes human and financial resources by reducing operational costs and the need for permanent personnel mobilization in territorial monitoring. These gains may strengthen environmental protection and rationalize public spending. However, their impact is not automatic and depends on the institutional arrangements that regulate decision cycles.</p>
<p>In contexts where such compression occurs without safeguards for transparency, auditability, and control, technological efficiency may generate institutional asymmetries, shifting the balance between state capacity and democratic oversight. Thus, the quality of institutional use becomes as relevant as technical capabilities themselves.</p>
</sec>
<sec id="sec10">
<label>5.3</label>
<title>Technological sovereignty and strategic autonomy</title>
<p>The development of Lessonia-1 represents a significant achievement in Brazilian technological independence (<xref ref-type="bibr" rid="ref46">Minist&#x00E9;rio da Defesa, 2022</xref>; <xref ref-type="bibr" rid="ref13">Couture and Toupin, 2019</xref>; <xref ref-type="bibr" rid="ref28">Galdino, 2022</xref>). Historically, Brazil has depended on foreign suppliers for critical surveillance technologies, creating geopolitical vulnerability through access denial, the imposition of political conditions, or mandatory data sharing. Indigenous capabilities in remote sensing and AI algorithms provide autonomy vis-&#x00E0;-vis external suppliers, allowing control over critical surveillance infrastructure.</p>
<p>Such independence is strategically significant in the context of geopolitical competition for technological supremacy. Powers such as the United States and China invest heavily in AI and remote sensing as strategic assets (<xref ref-type="bibr" rid="ref13">Couture and Toupin, 2019</xref>; <xref ref-type="bibr" rid="ref58">Schmidt, 2022</xref>). For Brazil, developing AI&#x2013;SAR capabilities reduces external dependence and affirms technological sovereignty (<xref ref-type="bibr" rid="ref6">Azevedo et al., 2021</xref>), particularly in the Amazon, where foreign geopolitical interests&#x2014;environmental, economic, and strategic&#x2014;frequently conflict with national interests.</p>
<p>However, technological autonomy does not automatically guarantee the implementation of AI&#x2013;SAR aligned with democratic and inclusive values (<xref ref-type="bibr" rid="ref54">Pohle and Thiel, 2020</xref>). Brazil may manage SAR image acquisition and algorithm development, but the quality of this implementation depends on regulatory frameworks that define how the technology is applied and who participates in decision-making processes. The inclusion of Indigenous peoples and Amazonian communities in governance processes strengthens the legitimacy of public policies and incorporates territorial knowledge essential for more effective and context-sensitive monitoring.</p>
<p>The autonomous operation of Lessonia-1 initiated in 2025 (<xref ref-type="bibr" rid="ref21">For&#x00E7;a A&#x00E9;rea Brasileira, 2025</xref>; <xref ref-type="bibr" rid="ref11">Centro Gestor e Operacional do Sistema de Prote&#x00E7;&#x00E3;o da Amaz&#x00F4;nia, 2009</xref>, <xref ref-type="bibr" rid="ref12">2021</xref>; <xref ref-type="bibr" rid="ref62">Virtanen et al., 2025</xref>) allows Brazil full control over the collection and processing of SAR imagery, positioning the country as a regional reference for Global South states seeking to reduce external dependence in territorial surveillance.</p>
<p>SAR imagery reveals strategic infrastructure and patterns of territorial occupation that require robust protection against unauthorized access. Such protection constitutes an institutional and political challenge, not merely a technical one: it requires regulation governing data access, safeguards against commercialization, and audit mechanisms that ensure transparency. Thus, full technological sovereignty requires not only independence in technological development but also robust data governance capable of protecting national security and the territorial rights of Indigenous peoples.</p>
</sec>
<sec id="sec11">
<label>5.4</label>
<title>Governance, accountability, and ethical constraints</title>
<p>The implementation of AI&#x2013;SAR in Amazonian surveillance requires robust algorithmic governance&#x2014;processes, norms, and institutions that regulate the development, deployment, and oversight of AI systems, ensuring that automated decisions remain aligned with democratic values and fundamental rights (<xref ref-type="bibr" rid="ref54">Pohle and Thiel, 2020</xref>). It is particularly important to consider how the securitization of the Amazon may influence how such systems are applied, requiring safeguards against misuse and function creep (<xref ref-type="bibr" rid="ref10">Buzan et al., 1998</xref>; <xref ref-type="bibr" rid="ref9002">Brayne, 2020</xref>; <xref ref-type="bibr" rid="ref34">Jobin et al., 2019</xref>).</p>
<p>Effective governance rests on four pillars: (1) operational transparency&#x2014;explaining how the system identifies targets and generates alerts; (2) accountability&#x2014;clear responsibility for errors and inappropriate decisions; (3) mitigation of algorithmic bias&#x2014;ensuring that models do not induce discriminatory processes; and (4) protection of human rights and privacy&#x2014;mechanisms against selective surveillance and data misuse (<xref ref-type="bibr" rid="ref26">Furtado et al., 2024</xref>; <xref ref-type="bibr" rid="ref32">Islam and Wasi, 2024</xref>; <xref ref-type="bibr" rid="ref35">Kazmi, 2024</xref>).</p>
<p>In Brazil, the coordination of Amazonian territorial surveillance through remote sensing falls under the responsibility of CENSIPAM (<xref ref-type="bibr" rid="ref11">Centro Gestor e Operacional do Sistema de Prote&#x00E7;&#x00E3;o da Amaz&#x00F4;nia, 2009</xref>, <xref ref-type="bibr" rid="ref12">2021</xref>). which integrates data from multiple sources, including satellites such as Lessonia-1, to monitor threats to territorial integrity. Although subject to audit and oversight mechanisms, these are not sufficient to ensure comprehensive ethical governance, particularly when operations may be affected by erroneous classifications (<xref ref-type="bibr" rid="ref24">Franchi, 2023</xref>).</p>
<p>In this regard, the procedural rights of Indigenous communities&#x2014;particularly the right to participate in the review of algorithmic decisions, to present evidence of the legitimacy of their practices, and to receive reasoned decisions&#x2014;are safeguarded by institutions such as FUNAI and non-governmental organizations working to defend territorial and cultural rights (<xref ref-type="bibr" rid="ref34">Jobin et al., 2019</xref>). The effectiveness of these institutions depends on infrastructure&#x2014;remote sensing, monitoring equipment, and data-processing capabilities&#x2014;that enables operations at a territorial scale (<xref ref-type="bibr" rid="ref25">FUNAI, 2025</xref>; <xref ref-type="bibr" rid="ref62">Virtanen et al., 2025</xref>; <xref ref-type="bibr" rid="ref26">Furtado et al., 2024</xref>). Brazil has the largest Indigenous population in Latin America and the largest extent of demarcated Indigenous lands (<xref ref-type="bibr" rid="ref62">Virtanen et al., 2025</xref>).</p>
<p>Beyond this, AI&#x2013;SAR governance also involves protecting sensitive data against unauthorized access, commercialization, or misuse, requiring regulation on who may access data, under what conditions, and with which safeguards (<xref ref-type="bibr" rid="ref13">Couture and Toupin, 2019</xref>; <xref ref-type="bibr" rid="ref54">Pohle and Thiel, 2020</xref>; <xref ref-type="bibr" rid="ref18">Falqueto et al., 2023</xref>). Without robust technological infrastructure to sustain these frameworks, independence in remote sensing (Lessonia-1) and operational coordination (CENSIPAM) would not guarantee adequate protection of Indigenous communities&#x2019; procedural rights: Brazil would possess technical sovereignty in image collection, but might lack capabilities in processing, storage, and computational systems that enable ethical controls, transparent auditing, and contestation (<xref ref-type="bibr" rid="ref13">Couture and Toupin, 2019</xref>).</p>
<p>The central question is whether Brazil will achieve full technological autonomy&#x2014;not only in remote sensing and algorithms, but also in critical infrastructure for processing, storage, and computational systems&#x2014;and whether this independence will be accompanied by ethical governance frameworks that ensure use consistent with human rights and the protection of local communities (<xref ref-type="bibr" rid="ref62">Virtanen et al., 2025</xref>).</p>
</sec>
</sec>
<sec sec-type="conclusions" id="sec12">
<label>6</label>
<title>Conclusion</title>
<p>This study analyzed the integration of artificial intelligence and Synthetic Aperture Radar remote sensing in the operations of the Brazilian Air Force in the defense of the Amazon, highlighting its transformative role in expanding state presence and strengthening national security. Building on the conceptual evolution of warfare&#x2014;from platform-centricity to networks and, ultimately, to data&#x2014;it demonstrated that informational superiority today depends less on mere connectivity and more on the analytical capacity to extract actionable intelligence in a timely manner.</p>
<p>At the empirical&#x2013;operational level, the analysis evidenced a shortening of the OODA cycle, increased accuracy in the detection of targets of interest, and measurable efficiency gains (time, coverage, and prioritization of &#x201C;hotspots&#x201D;). These results not only enhance decision-making processes but also shift the employment of means from predominantly reactive patterns toward more anticipatory postures, with direct impacts on interagency coordination and the optimization of the use of aerial and space-based platforms.</p>
<p>From a strategic perspective, the analysis indicated that informational sovereignty and technological sovereignty are mutually constitutive conditions: control over critical data, model architectures, and Machine Learning Operations (MLOps) cycles must be sustained by domestic infrastructure, software, and human capital. Within the framework of expanded security, the findings suggest that defense, environmental protection, and internal order operate in the Amazon as complementary dimensions of a single sovereignty agenda.</p>
<p>The ability to continuously observe environmental transformations and emerging infrastructures, combined with algorithmic pattern analysis, provides inputs for preventive and enforcement policies in hard-to-access areas, reinforcing the integration between territorial surveillance and the protection of strategic ecosystems. Nevertheless, the study identified limits and requirements: (i) model performance depends on data curation, sensor calibration, and continuous updating; (ii) the reduction of false positives and operational validation require stable institutional routines and qualified teams; and (iii) the expansion of capabilities requires predictable investments. These conditions do not negate the observed gains, but indicate that their sustainability depends on long-term planning and technical&#x2013;institutional governance. It should be noted that the results presented in this research reflect operations in a specific context (the Brazilian Amazon, 2022&#x2013;2025) and depend on factors such as SAR data density, near-real-time processing capacity, and established interagency coordination&#x2014;conditions that may not be replicated in other regions or institutions.</p>
<p>Technological capability, however, is not an end in itself, but an instrument that must be subordinated to principles of democratic governance and the protection of human rights. The integration of AI&#x2013;SAR in Amazonian territorial surveillance offers significant operational gains&#x2014;shorter decision cycles, more accurate detection, and resource optimization&#x2014;but simultaneously amplifies risks of discriminatory surveillance, algorithmic profiling, and the constraining of legitimate activities in local communities.</p>
<p>This critical trade-off between operational efficiency and rights protection cannot be resolved solely through technical means; it requires institutional mechanisms that ensure: (i) enhanced algorithmic transparency measures and independent auditing of AI&#x2013;SAR systems; (ii) continuous technical validation to reduce algorithmic biases and false positives through real-time debiasing techniques; (iii) guarantees that systems do not discriminate against legitimate traditional practices of Amazonian communities; and (iv) clear accountability for automated decisions that affect fundamental rights.</p>
<p>The long-term sustainability of AI&#x2013;SAR integration requires that countries seeking to follow the path taken by Brazil develop their own critical infrastructure capabilities. The feasibility of this transition depends on substantial investments, qualified human capital, and institutional stability&#x2014;preconditions that are not always present in contexts of limited state capacity.</p>
<p>Specifically, consolidating autonomy in three essential areas is required: (i) the capacity to process large volumes of radar data in real operations, supported by distributed and secure computational systems; (ii) the secure storage of sensitive surveillance data, protecting it against cyberattacks; and (iii) proprietary computational systems for autonomous operations, reducing dependence on foreign technology. These three pillars are interdependent and constitute the foundation upon which any sustainable technological autonomy must be built.</p>
<p>Scenarios of full technological independence must articulate not only technical capabilities in AI, SAR, and critical infrastructure, but also social and ethical legitimacy. Independence that privileges only operational dimensions risks reproducing political and social vulnerabilities. Future research should examine how this integration relates to legitimate traditional practices of Amazonian communities, ensuring that technical capability is accompanied by democratic legitimacy.</p>
<p>The geopolitical implications are significant: positioning the country as a power in AI&#x2013;SAR not only strengthens its territorial defense, but also its influence in international negotiations on data governance, digital sovereignty, and emerging technologies. This multidimensional vision&#x2014;technical, democratic, and strategic&#x2014;offers a sustainable comparative advantage.</p>
<p>Nevertheless, significant limitations of this research are acknowledged. The findings are valid for Amazonian contexts under metric-resolution SAR surveillance, with near-real-time processing capabilities and established federal coordination, and are not directly generalizable to regions with more limited technological infrastructure or different regulatory frameworks. The study relied on publicly accessible documents and specialized literature, with a limited temporal scope (2022&#x2013;2025), which may not capture long-term dynamics or critical information necessary for a comprehensive understanding of operations.</p>
<p>The performance of AI&#x2013;SAR models fundamentally depends on continuous data curation, precise sensor calibration, and permanent architectural updates&#x2014;factors whose sustainability requires predictable investments and robust mechanisms for retaining specialized personnel. Moreover, real-world operational validation of systems in the complex Amazonian environment remains only partially explored, calling for further empirical investigation into actual impacts on communities and ecosystems.</p>
<p>In sum, the integration of AI and SAR by the Brazilian Air Force in Amazonian defense represents not merely a technical&#x2013;operational advance, but a strategic reconfiguration of the relationship between the state, technology, and sovereignty in remote territories. However, this technological capability is meaningful only if accompanied by robust ethical governance, autonomy in critical infrastructure, and social legitimacy among Amazonian communities. The challenge for the coming decade is to consolidate this triad&#x2014;technical capability, strategic autonomy, and responsible governance&#x2014;as the foundation of an Amazonian defense that is simultaneously effective, autonomous, and ethically sustainable.</p>
<p>The research agenda should prioritize: (i) strengthening ethical governance through mechanisms of algorithmic transparency and independent auditing; (ii) continuous technical validation across diverse Amazonian scenarios, with real-time debiasing techniques; (iii) the development of national capabilities in critical infrastructure for processing, storage, and computation; and (iv) investigations into applications of emerging quantum technologies to optimize radar data processing in future operational scenarios.</p>
<p>Comparative studies involving Colombia, Peru, and Indonesia may elucidate how Global South countries adapt territorial surveillance technologies to their specific geopolitical realities, consolidating governance models that articulate strategic autonomy with the protection of Indigenous territorial rights. Examining how to implement ethical safeguards without compromising operational efficiency, as well as analyzing the sociopolitical impacts of AI-based surveillance on Amazonian communities&#x2014;by incorporating their perspectives and territorial knowledge into technological governance processes&#x2014;constitutes a shared challenge for countries seeking to reduce geopolitical asymmetries in critical defense technologies.</p>
</sec>
</body>
<back>
<sec sec-type="data-availability" id="sec13">
<title>Data availability statement</title>
<p>The original contributions presented in the study are included in the article/<xref ref-type="supplementary-material" rid="SM1">supplementary material</xref>, further inquiries can be directed to the corresponding author.</p>
</sec>
<sec sec-type="author-contributions" id="sec14">
<title>Author contributions</title>
<p>GB: Conceptualization, Data curation, Formal analysis, Funding acquisition, Investigation, Methodology, Project administration, Resources, Software, Supervision, Validation, Visualization, Writing &#x2013; original draft, Writing &#x2013; review &#x0026; editing. CA: Conceptualization, Formal analysis, Funding acquisition, Investigation, Methodology, Resources, Supervision, Validation, Visualization, Writing &#x2013; original draft, Writing &#x2013; review &#x0026; editing. LF: Conceptualization, Investigation, Methodology, Software, Visualization, Writing &#x2013; original draft, Writing &#x2013; review &#x0026; editing.</p>
</sec>
<sec sec-type="COI-statement" id="sec15">
<title>Conflict of interest</title>
<p>The author(s) declared that this work was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="ai-statement" id="sec16">
<title>Generative AI statement</title>
<p>The author(s) declared that Generative AI was not used in the creation of this manuscript.</p>
<p>Any alternative text (alt text) provided alongside figures in this article has been generated by Frontiers with the support of artificial intelligence and reasonable efforts have been made to ensure accuracy, including review by the authors wherever possible. If you identify any issues, please contact us.</p>
</sec>
<sec sec-type="disclaimer" id="sec17">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<sec sec-type="supplementary-material" id="sec18">
<title>Supplementary material</title>
<p>The Supplementary material for this article can be found online at: <ext-link xlink:href="https://www.frontiersin.org/articles/10.3389/fpos.2026.1730568/full#supplementary-material" ext-link-type="uri">https://www.frontiersin.org/articles/10.3389/fpos.2026.1730568/full#supplementary-material</ext-link></p>
<supplementary-material xlink:href="Data_Sheet_1.docx" id="SM1" mimetype="application/vnd.openxmlformats-officedocument.wordprocessingml.document" xmlns:xlink="http://www.w3.org/1999/xlink"/>
</sec>
<ref-list>
<title>References</title>
<ref id="ref1"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Abdalla</surname><given-names>M. M.</given-names></name> <name><surname>Oliveira</surname><given-names>L. G. L.</given-names></name> <name><surname>Azevedo</surname><given-names>C. E. F.</given-names></name> <name><surname>Gonzalez</surname><given-names>R. K.</given-names></name></person-group> (<year>2018</year>). <article-title>Qualidade em Pesquisa Qualitativa Organizacional: tipos de triangula&#x00E7;&#x00E3;o como alternativa metodol&#x00F3;gica. Administra&#x00E7;&#x00E3;o: Ensino E Pesquisa,</article-title> <volume>19</volume>, <fpage>66</fpage>&#x2013;<lpage>98</lpage>. doi: <pub-id pub-id-type="doi">10.13058/raep.2018.v19n1.578</pub-id></mixed-citation></ref>
<ref id="ref2"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Aguiar</surname><given-names>H. R.</given-names></name></person-group> (<year>2021</year>). <source>A quest&#x00E3;o da soberania na Amaz&#x00F4;nia Ocidental: uma an&#x00E1;lise &#x00E0; luz dos tratados de fronteiras, dos crimes transnacionais, da imigra&#x00E7;&#x00E3;o venezuelana e da din&#x00E2;mica das cidades-g&#x00EA;meas. Monograph (Curso de Altos Estudos de Pol&#x00ED;tica e Estrat&#x00E9;gia&#x2014;CAEPE)</source>. <publisher-loc>Rio de Janeiro</publisher-loc>: <publisher-name>Escola Superior de Guerra</publisher-name>.</mixed-citation></ref>
<ref id="ref4"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Alberts</surname><given-names>D. S.</given-names></name> <name><surname>Garstka</surname><given-names>J. J.</given-names></name> <name><surname>Stein</surname><given-names>F. P.</given-names></name></person-group> (<year>2002</year>). <source>Network centric warfare: developing and leveraging information superiority</source>. <edition>2nd</edition> Edn. <publisher-loc>Washington, DC</publisher-loc>: <publisher-name>CCRP</publisher-name>.</mixed-citation></ref>
<ref id="ref6"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Azevedo</surname><given-names>C. E. F.</given-names></name> <name><surname>de Borba</surname><given-names>G. A.</given-names></name> <name><surname>de Ara&#x00FA;jo</surname><given-names>L. E.</given-names></name></person-group> (<year>2021</year>). <article-title>Desafios para a pol&#x00ED;tica de inova&#x00E7;&#x00E3;o no setor de defesa brasileiro: &#x00F3;bices e barreiras culturais e estruturais</article-title>. <source>Rev. Esc. Guerra Nav.</source> <volume>27</volume>, <fpage>121</fpage>&#x2013;<lpage>160</lpage>. doi: <pub-id pub-id-type="doi">10.21544/1809-3791.v27n1.p121-160</pub-id></mixed-citation></ref>
<ref id="ref7"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Bardin</surname><given-names>L.</given-names></name></person-group> (<year>2011</year>). <source>An&#x00E1;lise de conte&#x00FA;do</source>. <publisher-loc>Lisboa</publisher-loc>: <publisher-name>Edi&#x00E7;&#x00F5;es</publisher-name>, <fpage>70</fpage>.</mixed-citation></ref>
<ref id="ref8"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Bowen</surname><given-names>G. A.</given-names></name></person-group> (<year>2009</year>). <article-title>Document analysis as a qualitative research method</article-title>. <source>Qual. Res. J.</source> <volume>9</volume>, <fpage>27</fpage>&#x2013;<lpage>40</lpage>. doi: <pub-id pub-id-type="doi">10.3316/QRJ0902027</pub-id></mixed-citation></ref>
<ref id="ref9002"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Brayne</surname><given-names>S.</given-names></name></person-group> (<year>2020</year>). <source>Predict and surveil: data, discretion, and the future of policing</source>. <publisher-loc>New York</publisher-loc>: <publisher-name>Oxford University Press</publisher-name>.</mixed-citation></ref>
<ref id="ref10"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Buzan</surname><given-names>B.</given-names></name> <name><surname>W&#x00E6;ver</surname><given-names>O.</given-names></name> <name><surname>de Wil</surname><given-names>J.</given-names></name></person-group> (<year>1998</year>). <source>Security: a new framework for analysis</source>. <publisher-loc>Boulder, CO</publisher-loc>: <publisher-name>Lynne Rienner Publishers</publisher-name>.</mixed-citation></ref>
<ref id="ref11"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab id="coll3">Centro Gestor e Operacional do Sistema de Prote&#x00E7;&#x00E3;o da Amaz&#x00F4;nia</collab></person-group> (<year>2009</year>). <source>Relat&#x00F3;rio de Gest&#x00E3;o 2007&#x2013;2008</source>. <publisher-loc>Bras&#x00ED;lia</publisher-loc>: <publisher-name>CENSIPAM</publisher-name>.</mixed-citation></ref>
<ref id="ref12"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab id="coll4">Centro Gestor e Operacional do Sistema de Prote&#x00E7;&#x00E3;o da Amaz&#x00F4;nia</collab></person-group> (<year>2021</year>). <source>Relat&#x00F3;rio de Atividades 2020</source>. <publisher-loc>Bras&#x00ED;lia</publisher-loc>: <publisher-name>CENSIPAM</publisher-name>.</mixed-citation></ref>
<ref id="ref13"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Couture</surname><given-names>S.</given-names></name> <name><surname>Toupin</surname><given-names>S.</given-names></name></person-group> (<year>2019</year>). <article-title>What does the notion of &#x2018;data sovereignty&#x2019; refer to? A literature review</article-title>. <source>Media, Culture &#x0026; Society.</source> doi: <pub-id pub-id-type="doi">10.1177/1461444819865984</pub-id></mixed-citation></ref>
<ref id="ref14"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Creswell</surname><given-names>J. W.</given-names></name> <name><surname>Poth</surname><given-names>C. N.</given-names></name></person-group> (<year>2018</year>). <source>Qualitative inquiry and research design: choosing among five approaches</source>. <edition>4th</edition> Edn. <publisher-loc>Thousand Oaks, CA</publisher-loc>: <publisher-name>SAGE</publisher-name>.</mixed-citation></ref>
<ref id="ref15"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Devanny</surname><given-names>J.</given-names></name></person-group> (<year>2024</year>). <source>Artificial intelligence and cyber power: foreign policy implications</source>. <publisher-loc>Miami, FL</publisher-loc>: <publisher-name>Jack D. Gordon Institute for Public Policy, Florida International University</publisher-name>.</mixed-citation></ref>
<ref id="ref16"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Dias</surname><given-names>C. N.</given-names></name> <name><surname>Paiva</surname><given-names>L. F. S.</given-names></name></person-group> (<year>2022</year>). <article-title>Fac&#x00E7;&#x00F5;es prisionais em dois territ&#x00F3;rios fronteiri&#x00E7;os</article-title>. <source>Tempo Soc.</source> <volume>34</volume>, <fpage>217</fpage>&#x2013;<lpage>238</lpage>. doi: <pub-id pub-id-type="doi">10.11606/0103-2070.ts.2022.191220</pub-id></mixed-citation></ref>
<ref id="ref17"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Endsley</surname><given-names>M. R.</given-names></name></person-group> (<year>1995</year>). <article-title>Toward a theory of situation awareness in dynamic systems</article-title>. <source>Hum. Factors</source> <volume>37</volume>, <fpage>32</fpage>&#x2013;<lpage>64</lpage>. doi: <pub-id pub-id-type="doi">10.1518/001872095779049543</pub-id></mixed-citation></ref>
<ref id="ref18"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Falqueto</surname><given-names>L. E.</given-names></name> <name><surname>Paes</surname><given-names>R. L.</given-names></name> <name><surname>Passaro</surname><given-names>A.</given-names></name></person-group> (<year>2023</year>). <article-title>KNN e Rede Neural Convolucional para o Reconhecimento de Plataformas de Petr&#x00F3;leo em Imagens SAR do Sentinel-1</article-title>. <source>Aplica&#x00E7;&#x00F5;es Operacionais em &#x00C1;reas de Defesa</source> <volume>24</volume>, <fpage>29</fpage>&#x2013;<lpage>33</lpage>. doi: <pub-id pub-id-type="doi">10.55972/spectrum.v24i1.395</pub-id></mixed-citation></ref>
<ref id="ref19"><mixed-citation publication-type="book"><person-group person-group-type="editor"><name><surname>Flores</surname><given-names>A.</given-names></name> <name><surname>Herndon</surname><given-names>K.</given-names></name> <name><surname>Thapa</surname><given-names>R.</given-names></name> <name><surname>Cherrington</surname><given-names>E.</given-names></name></person-group> (Eds.) (<year>2019</year>). <source>SAR handbook: comprehensive methodologies for forest monitoring and biomass estimation</source>. <publisher-loc>Washington, DC</publisher-loc>: <publisher-name>National Aeronautics and Space Administration</publisher-name>.</mixed-citation></ref>
<ref id="ref21"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll6">For&#x00E7;a A&#x00E9;rea Brasileira</collab></person-group>. (<year>2025</year>). <article-title>COMAE inicia opera&#x00E7;&#x00E3;o aut&#x00F4;noma do Sistema Espacial Lessonia-1</article-title>. Available online at: <ext-link xlink:href="https://www.fab.mil.br/noticias/mostra/43878/" ext-link-type="uri">https://www.fab.mil.br/noticias/mostra/43878/</ext-link> (Accessed January 24, 2026)</mixed-citation></ref>
<ref id="ref23"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab id="coll8">F&#x00F3;rum Brasileiro de Seguran&#x00E7;a P&#x00FA;blica</collab></person-group> (<year>2023</year>). <source>Cartografias da viol&#x00EA;ncia na Amaz&#x00F4;nia</source>. <edition>2nd</edition> Edn. <publisher-loc>S&#x00E3;o Paulo</publisher-loc>: <publisher-name>F&#x00F3;rum Brasileiro de Seguran&#x00E7;a P&#x00FA;blica</publisher-name>.</mixed-citation></ref>
<ref id="ref24"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Franchi</surname><given-names>T.</given-names></name></person-group> (<year>2023</year>). <article-title>Soberania e crimes ambientais na Amaz&#x00F4;nia: uma oportunidade para o Brasil atuar como l&#x00ED;der regional?</article-title> <source>Di&#x00E1;logos Soberania e Clima</source> <volume>2</volume>, <fpage>98</fpage>&#x2013;<lpage>108</lpage>. Available online at: <ext-link xlink:href="https://soberaniaeclima.org.br/publicacoes/revista-dialogos/v-2-n-8-2023/" ext-link-type="uri">https://soberaniaeclima.org.br/publicacoes/revista-dialogos/v-2-n-8-2023/</ext-link></mixed-citation></ref>
<ref id="ref25"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll9">FUNAI</collab></person-group>. (<year>2025</year>). Available online at: <ext-link xlink:href="https://www.gov.br/funai/pt-br" ext-link-type="uri">https://www.gov.br/funai/pt-br</ext-link> (Accessed January 24, 2026)</mixed-citation></ref>
<ref id="ref26"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Furtado</surname><given-names>E. B.</given-names></name> <name><surname>Franchi</surname><given-names>T.</given-names></name> <name><surname>Rodrigues</surname><given-names>L. B.</given-names></name> <name><surname>Sim&#x00F5;es</surname><given-names>G. D. F. A.</given-names></name></person-group> (<year>2024</year>). <article-title>Asas que devastam a Amaz&#x00F4;nia: uma an&#x00E1;lise do cen&#x00E1;rio de pistas de pouso e voos irregulares que d&#x00E3;o suporte ao garimpo ilegal na TI Yanomami</article-title>. <source>Revista (Re)Defini&#x00E7;&#x00F5;es das Fronteiras</source> <volume>2</volume>, <fpage>1</fpage>&#x2013;<lpage>43</lpage>. doi: <pub-id pub-id-type="doi">10.59731/rdf.v2i6.4</pub-id></mixed-citation></ref>
<ref id="ref9"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Johnson</surname><given-names>J.</given-names></name></person-group> (<year>2023</year>). <article-title>Automating the OODA loop in the age of intelligent machines: reaffirming the role of humans in command-and-control decision-making in the digital age</article-title>. <source>Def. Secur. Anal.</source> <volume>39</volume>, <fpage>43</fpage>&#x2013;<lpage>67</lpage>. doi: <pub-id pub-id-type="doi">10.1080/14702436.2022.2102486</pub-id></mixed-citation></ref>
<ref id="ref27"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Gaire</surname><given-names>U. S.</given-names></name></person-group> (<year>2023</year>). <article-title>Application of artificial intelligence in the military: an overview</article-title>. <source>Unity J.</source> <volume>4</volume>, <fpage>161</fpage>&#x2013;<lpage>174</lpage>. doi: <pub-id pub-id-type="doi">10.3126/unityj.v4i01.52237</pub-id></mixed-citation></ref>
<ref id="ref28"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Galdino</surname><given-names>J. F.</given-names></name></person-group> (<year>2022</year>). <article-title>Sobre a soberania tecnol&#x00F3;gica de elementos de capacidades militares</article-title>. Available online at: <ext-link xlink:href="https://www.defesanet.com.br/doutrina/noticia/45685/Sobre-a-soberania-tecnologica-de-elementos-de-capacidades-militares" ext-link-type="uri">https://www.defesanet.com.br/doutrina/noticia/45685/Sobre-a-soberania-tecnologica-de-elementos-de-capacidades-militares</ext-link> (Accessed January 24, 2026)</mixed-citation></ref>
<ref id="ref29"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Gerring</surname><given-names>J.</given-names></name></person-group> (<year>2017</year>). <source>Case study research: principles and practices</source>. <edition>2nd</edition> Edn. <publisher-loc>Cambridge</publisher-loc>: <publisher-name>Cambridge University Press</publisher-name>.</mixed-citation></ref>
<ref id="ref30"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Horowitz</surname><given-names>M. C.</given-names></name></person-group> (<year>2018</year>). <article-title>Artificial intelligence, international competition, and the balance of power</article-title>. <source>Tex. Natl. Secur. Rev.</source> <volume>1</volume>, <fpage>36</fpage>&#x2013;<lpage>57</lpage>. doi: <pub-id pub-id-type="doi">10.15781/T2639KP49</pub-id></mixed-citation></ref>
<ref id="ref9001"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll101">Instituto Brasileiro de Geografia e Estat&#x00ED;stica (IBGE)</collab></person-group>. (<year>2022</year>). <article-title>Amaz&#x00F4;nia Legal</article-title>. Available online at: <ext-link xlink:href="https://www.ibge.gov.br/geociencias/cartas-e-mapas/informacoes-ambientais/15819-amazonia-legal.html" ext-link-type="uri">https://www.ibge.gov.br/geociencias/cartas-e-mapas/informacoes-ambientais/15819-amazonia-legal.html</ext-link></mixed-citation></ref>
<ref id="ref31"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll10">Instituto Brasileiro de Geografia e Estat&#x00ED;stica</collab></person-group>. (<year>2023</year>). <article-title>Censo Demogr&#x00E1;fico 2022</article-title>. Available online at: <ext-link xlink:href="https://bit.ly/458nOb0" ext-link-type="uri">https://bit.ly/458nOb0</ext-link> (Accessed January 24, 2026)</mixed-citation></ref>
<ref id="ref32"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Islam</surname><given-names>M. R.</given-names></name> <name><surname>Wasi</surname><given-names>A. T.</given-names></name></person-group> (<year>2024</year>). &#x201C;<article-title>Balancing power and ethics: a framework for addressing human rights concerns in military AI</article-title>&#x201D; in <source>Social impact of AI: research, diversity and inclusion frameworks</source> (<publisher-loc>Cham</publisher-loc>: <publisher-name>Springer</publisher-name>).</mixed-citation></ref>
<ref id="ref33"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Jasper</surname><given-names>F. N. H.</given-names></name> <name><surname>Nunes</surname><given-names>A. F.</given-names></name></person-group> (<year>2022</year>). <article-title>Soberania e controle do espa&#x00E7;o a&#x00E9;reo: Uma vis&#x00E3;o brasileira</article-title>. <source>Rev. Tempo Mundo</source> <volume>28</volume>, <fpage>346</fpage>&#x2013;<lpage>366</lpage>. doi: <pub-id pub-id-type="doi">10.38116/rtm28art12</pub-id></mixed-citation></ref>
<ref id="ref34"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Jobin</surname><given-names>A.</given-names></name> <name><surname>Ienca</surname><given-names>M.</given-names></name> <name><surname>Andorno</surname><given-names>R.</given-names></name></person-group> (<year>2019</year>). <article-title>The global landscape of AI ethics guidelines</article-title>. <source>Nat. Mach. Intell.</source> <volume>1</volume>, <fpage>389</fpage>&#x2013;<lpage>399</lpage>. doi: <pub-id pub-id-type="doi">10.1038/s42256-019-0088-2</pub-id></mixed-citation></ref>
<ref id="ref35"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kazmi</surname><given-names>S. T. H.</given-names></name></person-group> (<year>2024</year>). <article-title>The ethics of AI in warfare: a responsible innovation framework</article-title>. <source>Int. J. Multidiscip. Res.</source> <volume>6</volume>. doi: <pub-id pub-id-type="doi">10.36948/ijfmr.2024.v06i06.33019</pub-id></mixed-citation></ref>
<ref id="ref37"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Konaev</surname><given-names>M.</given-names></name> <name><surname>Chahal</surname><given-names>H.</given-names></name> <name><surname>Fedasiuk</surname><given-names>R.</given-names></name> <name><surname>Huang</surname><given-names>T.</given-names></name> <name><surname>Rahkovsky</surname><given-names>I.</given-names></name></person-group> (<year>2020</year>). <source>U.S. military investments in autonomy and AI: costs, benefits, and strategic effects</source>. <publisher-loc>Washington, DC</publisher-loc>: <publisher-name>Center for Security and Emerging Technology</publisher-name>.</mixed-citation></ref>
<ref id="ref38"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kuck</surname><given-names>T. N.</given-names></name> <name><surname>Silva Filho</surname><given-names>P. F. F.</given-names></name> <name><surname>Sano</surname><given-names>E. E.</given-names></name> <name><surname>Bispo</surname><given-names>P. C.</given-names></name> <name><surname>Shiguemori</surname><given-names>E. H.</given-names></name> <name><surname>Dalagnol</surname><given-names>R.</given-names></name></person-group> (<year>2021</year>). <article-title>Change detection of selective logging in the Brazilian Amazon using X-band SAR data and pre-trained convolutional neural networks</article-title>. <source>Remote Sens</source> <volume>13</volume>:<fpage>4944</fpage>. doi: <pub-id pub-id-type="doi">10.3390/rs13234944</pub-id></mixed-citation></ref>
<ref id="ref40"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Lincoln</surname><given-names>Y. S.</given-names></name> <name><surname>Guba</surname><given-names>E. G.</given-names></name></person-group> (<year>1985</year>). <source>Naturalistic inquiry</source>. <publisher-loc>Beverly Hills, CA</publisher-loc>: <publisher-name>SAGE</publisher-name>.</mixed-citation></ref>
<ref id="ref42"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Lowenthal</surname><given-names>M. M.</given-names></name></person-group> (<year>2017</year>). <source>Intelligence: from secrets to policy</source>. <edition>7th</edition> Edn. <publisher-loc>Washington, DC</publisher-loc>: <publisher-name>CQ Press</publisher-name>.</mixed-citation></ref>
<ref id="ref44"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Meyer</surname><given-names>F.</given-names></name></person-group> (<year>2019</year>). &#x201C;<article-title>Spaceborne Synthetic Aperture Radar&#x2014;principles, data access, and basic processing techniques</article-title>&#x201D; in <source>SAR handbook: comprehensive methodologies for forest monitoring and biomass estimation</source>. eds. <person-group person-group-type="editor"><name><surname>Flores</surname><given-names>A.</given-names></name> <name><surname>Herndon</surname><given-names>K.</given-names></name> <name><surname>Thapa</surname><given-names>R.</given-names></name> <name><surname>Cherrington</surname><given-names>E.</given-names></name></person-group> (<publisher-loc>Washington, DC</publisher-loc>: <publisher-name>National Aeronautics and Space Administration</publisher-name>).</mixed-citation></ref>
<ref id="ref46"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll15">Minist&#x00E9;rio da Defesa</collab></person-group>. (<year>2022</year>). <article-title>Projeto Less&#x00F4;nia: sat&#x00E9;lites da For&#x00E7;a A&#x00E9;rea Brasileira s&#x00E3;o lan&#x00E7;ados com sucesso</article-title>. Available online at: <ext-link xlink:href="https://www.gov.br/mcti/pt-br/acompanhe-o-mcti/noticias/2022/05/projeto-lessonia-satelites-da-forca-aerea-brasileira-sao-lancados-com-sucesso" ext-link-type="uri">https://www.gov.br/mcti/pt-br/acompanhe-o-mcti/noticias/2022/05/projeto-lessonia-satelites-da-forca-aerea-brasileira-sao-lancados-com-sucesso</ext-link> (Accessed January 24, 2026)</mixed-citation></ref>
<ref id="ref47"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab id="coll16">Minist&#x00E9;rio da Defesa</collab></person-group> (<year>2025a</year>). <source>Opera&#x00E7;&#x00F5;es da For&#x00E7;a A&#x00E9;rea Brasileira na Amaz&#x00F4;nia: Integra&#x00E7;&#x00E3;o de Sensoriamento Remoto por Radar e Intelig&#x00EA;ncia Artificial</source>. <publisher-loc>Bras&#x00ED;lia</publisher-loc>: <publisher-name>Minist&#x00E9;rio da Defesa</publisher-name>.</mixed-citation></ref>
<ref id="ref48"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab id="coll17">Minist&#x00E9;rio da Defesa</collab></person-group> (<year>2025b</year>). <source>Relat&#x00F3;rio de Desenvolvimento de Vis&#x00E3;o Computacional no CCOI</source>. <publisher-loc>Bras&#x00ED;lia</publisher-loc>: <publisher-name>Minist&#x00E9;rio da Defesa</publisher-name>.</mixed-citation></ref>
<ref id="ref49"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Morgan</surname><given-names>F. E.</given-names></name> <name><surname>Boudreaux</surname><given-names>B.</given-names></name> <name><surname>Lohn</surname><given-names>A. J.</given-names></name> <name><surname>Ashby</surname><given-names>M.</given-names></name> <name><surname>Curriden</surname><given-names>C.</given-names></name> <name><surname>Klima</surname><given-names>K.</given-names></name> <etal/></person-group>. (<year>2020</year>). <source>Military applications of artificial intelligence: ethical concerns in an uncertain world. RR-3139-1</source>. <publisher-loc>Santa Monica, CA</publisher-loc>: <publisher-name>RAND Corporation</publisher-name>.</mixed-citation></ref>
<ref id="ref50"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll18">NASA Earthdata</collab></person-group>. (<year>2025</year>). <article-title>Synthetic Aperture Radar (SAR)</article-title>. Available online at: <ext-link xlink:href="https://www.earthdata.nasa.gov/learn/earth-observation-data-basics/sar" ext-link-type="uri">https://www.earthdata.nasa.gov/learn/earth-observation-data-basics/sar</ext-link> (Accessed January 24, 2026)</mixed-citation></ref>
<ref id="ref51"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Nizienko</surname><given-names>B.</given-names></name> <name><surname>Dudush</surname><given-names>A.</given-names></name> <name><surname>Shulezhko</surname><given-names>V.</given-names></name> <name><surname>Romanchenko</surname><given-names>I.</given-names></name></person-group> (<year>2021</year>). <article-title>Evolution from the network-centric warfare concept to the data-centric operation theory</article-title>. <source>Adv. Mil. Technol.</source> <volume>16</volume>, <fpage>219</fpage>&#x2013;<lpage>234</lpage>. doi: <pub-id pub-id-type="doi">10.3849/aimt.01430</pub-id></mixed-citation></ref>
<ref id="ref52"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Payne</surname><given-names>K.</given-names></name></person-group> (<year>2018</year>). <article-title>Artificial intelligence: a revolution in strategic affairs?</article-title> <source>Survival</source> <volume>60</volume>, <fpage>7</fpage>&#x2013;<lpage>32</lpage>. doi: <pub-id pub-id-type="doi">10.1080/00396338.2018.1518374</pub-id></mixed-citation></ref>
<ref id="ref53"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Pedreira</surname><given-names>L. M. L.</given-names></name></person-group> (<year>2023</year>). &#x201C;<article-title>O feminic&#x00ED;dio nas cidades-g&#x00EA;meas fronteiri&#x00E7;as do estado de Mato Grosso do Sul (2015&#x2013;2021): do patriarcado ao tr&#x00E2;nsito em julgado</article-title>&#x201D; in <source>Master&#x2019;s dissertation</source> (<publisher-loc>Dourados, MS</publisher-loc>: <publisher-name>Universidade Federal da Grande Dourados</publisher-name>).</mixed-citation></ref>
<ref id="ref54"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Pohle</surname><given-names>J.</given-names></name> <name><surname>Thiel</surname><given-names>T.</given-names></name></person-group> (<year>2020</year>). <article-title>Digital sovereignty</article-title>. <source>Internet Policy Rev.</source> <volume>9</volume>:<fpage>1532</fpage>. doi: <pub-id pub-id-type="doi">10.14763/2020.4.1532</pub-id></mixed-citation></ref>
<ref id="ref55"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Saatchi</surname><given-names>S.</given-names></name></person-group> (<year>2019</year>). &#x201C;<article-title>SAR methods for mapping and monitoring forest biomass</article-title>&#x201D; in <source>SAR handbook: comprehensive methodologies for Forest monitoring and biomass estimation</source>. eds. <person-group person-group-type="editor"><name><surname>Flores</surname><given-names>A.</given-names></name> <name><surname>Herndon</surname><given-names>K.</given-names></name> <name><surname>Thapa</surname><given-names>R.</given-names></name> <name><surname>Cherrington</surname><given-names>E.</given-names></name></person-group> (<publisher-loc>Washington, DC</publisher-loc>: <publisher-name>National Aeronautics and Space Administration</publisher-name>).</mixed-citation></ref>
<ref id="ref56"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Santos</surname><given-names>G. A.</given-names></name></person-group> (<year>2016</year>). <source>Crimes transfronteiri&#x00E7;os em cidades g&#x00EA;meas do Mato Grosso do Sul. Master&#x2019;s dissertation in Geografia</source>. <publisher-loc>Dourados, MS</publisher-loc>: <publisher-name>Universidade Federal da Grande Dourados</publisher-name>.</mixed-citation></ref>
<ref id="ref57"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Santos</surname><given-names>D.</given-names></name> <name><surname>Lima</surname><given-names>M.</given-names></name> <name><surname>Ver&#x00ED;ssimo</surname><given-names>B.</given-names></name> <name><surname>Silva</surname><given-names>C.</given-names></name></person-group> (<year>2024</year>). <source>Fatos da Amaz&#x00F4;nia 2024</source>. <publisher-loc>Bel&#x00E9;m</publisher-loc>: <publisher-name>Imazon</publisher-name>.</mixed-citation></ref>
<ref id="ref58"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Schmidt</surname><given-names>E.</given-names></name></person-group> (<year>2022</year>). <article-title>AI, great power competition &#x0026; national security</article-title>. <source>Daedalus</source> <volume>151</volume>, <fpage>288</fpage>&#x2013;<lpage>298</lpage>. doi: <pub-id pub-id-type="doi">10.1162/daed_a_01916</pub-id></mixed-citation></ref>
<ref id="ref59"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Stevens</surname><given-names>T.</given-names></name> <name><surname>Devanny</surname><given-names>J.</given-names></name></person-group> (<year>2024</year>). &#x201C;<article-title>Introduction to the research handbook on cyberwarfare</article-title>&#x201D; in <source>Research handbook on cyberwarfare</source>. eds. <person-group person-group-type="editor"><name><surname>Stevens</surname><given-names>T.</given-names></name> <name><surname>Devanny</surname><given-names>J.</given-names></name></person-group> (<publisher-loc>Cheltenham</publisher-loc>: <publisher-name>Edward Elgar Publishing</publisher-name>), <fpage>1</fpage>&#x2013;<lpage>13</lpage>.</mixed-citation></ref>
<ref id="ref60"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Teixeira</surname><given-names>W. F.</given-names></name> <name><surname>Pinheiro</surname><given-names>E. S.</given-names></name></person-group> (<year>2015</year>). <source>Uso de imagens R99-SAR/SIPAM no programa de monitoramento do desmatamento da floresta amaz&#x00F4;nica brasileira</source>. <publisher-loc>Manaus</publisher-loc>: <publisher-name>Universidade Federal do Amazonas</publisher-name>.</mixed-citation></ref>
<ref id="ref62"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Virtanen</surname><given-names>P. K.</given-names></name> <name><surname>Gonzaga Roa</surname><given-names>A.</given-names></name> <name><surname>Fern&#x00E1;ndez-Llamazares</surname><given-names>&#x00C1;.</given-names></name></person-group> (<year>2025</year>). <article-title>Indigenous governance and relationality have effectively avoided forest loss in the Southwest Amazon</article-title>. <source>Commun. Earth Environ.</source> <volume>6</volume>:<fpage>289</fpage>. doi: <pub-id pub-id-type="doi">10.1038/s43247-025-02174-8</pub-id></mixed-citation></ref>
<ref id="ref63"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Woods</surname><given-names>B.</given-names></name></person-group> (<year>2017</year>). <article-title>Confronting transatlantic cybersecurity challenges in the internet of things</article-title>. Available online at: <ext-link xlink:href="http://www.jstor.com/stable/resrep03490" ext-link-type="uri">http://www.jstor.com/stable/resrep03490</ext-link> (Accessed January 24, 2026)</mixed-citation></ref>
<ref id="ref64"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Yin</surname><given-names>R. K.</given-names></name></person-group> (<year>2018</year>). <source>Case study research and applications: design and methods</source>. <edition>6th</edition> Edn. <publisher-loc>Thousand Oaks, CA</publisher-loc>: <publisher-name>SAGE</publisher-name>.</mixed-citation></ref>
</ref-list>
<fn-group>
<fn fn-type="custom" custom-type="edited-by" id="fn0001">
<p>Edited by: <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/3056594/overview">Joe Devanny</ext-link>, King&#x2019;s College London, United Kingdom</p>
</fn>
<fn fn-type="custom" custom-type="reviewed-by" id="fn0002">
<p>Reviewed by: <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/2729883/overview">Dwi Mariyono</ext-link>, Universitas Islam Malang, Indonesia</p>
<p><ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/3026046/overview">Aris Sarjito</ext-link>, Defense University, Indonesia</p>
</fn>
</fn-group>
</back>
</article>