Archive for the ‘military’ category: Page 11

Oct 20, 2023

Marines Test Fire Robot Dog Armed With Rocket Launcher

Posted by in categories: military, robotics/AI

Dogs of War bots.

Armed with a rocket launcher or other kinds of weapons, including small arms, a quadrupedal robot could also just be used to scout ahead of friendly forces, and then have the ability to immediately engage any threats it finds.

Uncrewed ground systems like this have the ability to get in and out of spaces where a person might not be able to at all, as well, which could again be particularly useful when maneuvering through dense urban environments. The U.S. military sees operations in large built-up areas as a key component of any future major conflict.

Continue reading “Marines Test Fire Robot Dog Armed With Rocket Launcher” »

Oct 20, 2023

Gilead Sciences researchers collected data

Posted by in categories: business, computing, military, neuroscience

From every study they could find, including research that was never published, research by the military and private businesses, and research that had sat dormant on hard drives for decades to find out how personality and intelligence relate to each another.⁠

Fourteen years later, the massive data catalog has dropped. It contains 79 personality traits and 97 cognitive abilities from 1,300 studies from over 50 countries including over 2 million participants. And an early meta-analysis published in the Proceedings of the National Academy of Sciences shows that personality and intelligence relate in some surprising ways.⁠

Personality describes how someone generally thinks, feels, and behaves. Intelligence (termed cognitive ability by the researchers) describes how well someone can understand and apply information.⁠

Here are 3 of the 5 findings:⁠

1. Extraversion, a measure of sociality and enthusiasm, was only negligibly related to intelligence overall. However, the activity facet more strongly correlated, and (surprisingly) sociability had a small negative relationship with some cognitive abilities. ⁠

2. Neuroticism encompasses negative emotionality, which can inhibit advanced thinking. Despite the trope of the moody genius, perhaps it’s no surprise that higher levels of neuroticism predicted lower levels of intelligence, albeit weakly. The uneven temper and depression facets were particularly strong predictors of decreased intelligence. ⁠

3. Conscientiousness, a measure of self-regulation and orderliness, correlated positively with intelligence overall. But some facets, including cautiousness and routine seeking, predicted lower cognitive abilities.⁠

For the rest of the findings, along with something interesting they learned about extraversion, click here:…jjjrtebdkm.

Article by Elizabeth Gilbert.

Oct 19, 2023

AI Could Usher in a New Age of Bioweapons, RAND Report Warns

Posted by in categories: biotech/medical, military, robotics/AI

AI couldn’t necessarily provide instructions for how to create a bioweapon but could bridge gaps in knowledge that have soiled previous attempts.

Oct 17, 2023

Silent Predator Unveiled: Decoding WebWyrm Stealthy Malware affecting 50 countries

Posted by in categories: cryptocurrencies, cybercrime/malcode, employment, evolution, finance, military

In the intricate landscape of global cybersecurity, Webwyrm malware has surfaced as a formidable adversary, casting its ominous shadow across 50 nations and leaving in its wake over 100,000 compromised victims. This insidious digital menace successfully emulates in excess of 1,000 reputable companies globally, with the ensuing potential financial fallout estimated to surpass a staggering $100 million. It is imperative for cybersecurity professionals and organizations alike to comprehend the multifaceted nature of this threat to devise and implement robust defensive strategies effectively.

In the dynamic realm of cyber threats, malicious actors incessantly refine their Tactics, Techniques, and Procedures (TTPs), exploiting extant vulnerabilities and augmenting the efficacy of their malicious campaigns. Webwyrm epitomizes this relentless pursuit of evolution, embodying a level of sophistication reminiscent of infamous cyber threats of yore, such as the notorious ‘Blue Whale Challenge.’

WebWyrm malware orchestrates a complex, deceptive narrative aimed at duping unsuspecting job seekers into relinquishing their cryptocurrency. Initiating contact predominantly via WhatsApp, the malefactors likely leverage data procured from employment portals to pinpoint and engage individuals predisposed to their deceptive overtures. Prospective victims are enticed with promises of lucrative weekly remuneration, ranging between $1200 and $1500, contingent upon the completion of daily task “packets” or “resets.”

Oct 14, 2023

China Makes Advances In Space Lasers, Microwave Weapons

Posted by in categories: military, nuclear energy, satellites

Chinese scientists claim they’ve had unexpected success in developing a high-powered microwave (HPM) weapon, according to The Diplomat. The magazine notes that in January, Huang Wenhua, deputy director of China’s Northwest Institute of Nuclear Technology, was awarded for his research on directed energy, which HPM weapons use.

HPM systems are able to destroy electronic equipment, and in an age when most combat systems—from tanks to planes, radios to satellites—rely on electronics, the weapons could change the way wars are fought. Warships will be fitted with HPM weapons to intercept incoming missiles.

The HPM project, alongside other projects involving lasers and electromagnetic pulses, is part of the Chinese regime’s “Assassin’s Mace” (or “Trump Card”) program designed to defeat a technologically superior opponent by disabling or destroying the technology that makes the opponent superior.

Oct 14, 2023

New AI algorithm promises defense against cyberattacks on robots

Posted by in categories: cybercrime/malcode, information science, internet, military, robotics/AI

The researchers tested their algorithm on a replica of a US Army combat ground vehicle and found it was 99% effective in preventing a malicious attack.

Australian researchers have developed an artificial intelligence algorithm to detect and stop a cyberattack on a military robot in seconds.

The research was conducted by Professor Anthony Finn from the University of South Australia (UniSA) and Dr Fendy Santoso from Charles Sturt University in collaboration with the US Army Futures Command. They simulated a MitM attack on a GVT-BOT ground vehicle and trained its operating system to respond to it, according to the press release.

Continue reading “New AI algorithm promises defense against cyberattacks on robots” »

Oct 13, 2023

Raytheon to build revolutionary rotating detonation engine for DARPA

Posted by in categories: energy, military

DARPA has contracted Raytheon to develop a practical version of a revolutionary air-breathing rotating detonation engine called Gambit, which would have no moving parts and could lead to lighter missiles with longer ranges at lower cost.

Gas turbines are remarkable power plants that have made possible modern air travel and many weapon systems, but they suffer from a number of disadvantages. They are complex machines that are heavy, have many moving parts that are costly to assemble and maintain, and they require exotic materials and special processing to handle the tremendous temperatures they operate at.

It’s bad enough when such an engine is installed in an aircraft, but when it’s part of a throwaway weapon like a cruise missile, this not only limits the payload, it runs into some serious money.

Oct 12, 2023

New cyber algorithm shuts down malicious robotic attack

Posted by in categories: cybercrime/malcode, information science, military, robotics/AI

Australian researchers have designed an algorithm that can intercept a man-in-the-middle (MitM) cyberattack on an unmanned military robot and shut it down in seconds.

In an experiment using deep learning to simulate the behavior of the human brain, artificial intelligence experts from Charles Sturt University and the University of South Australia (UniSA) trained the robot’s operating system to learn the signature of a MitM eavesdropping cyberattack. This is where attackers interrupt an existing conversation or .

The algorithm, tested in real time on a replica of a United States army combat ground vehicle, was 99% successful in preventing a malicious attack. False positive rates of less than 2% validated the system, demonstrating its effectiveness.

Oct 12, 2023

Operation Behind Predator Mobile Spyware Is ‘Industrial Scale’

Posted by in categories: internet, military, surveillance

Amnesty International’s Predator Files investigation traces the widespread abuse of spyware by some nations against their own citizens. The ops are “industrial scale.” @jaivijayan explains:

The Intellexa alliance has been using a range of tools for intercepting and subverting mobile and Wi-Fi technologies to deploy its surveillance tools, according to an investigation by Amnesty International and others.

Oct 10, 2023

Regulate AI Now

Posted by in categories: military, policy, robotics/AI

In the six months since FLI published its open letter calling for a pause on giant AI experiments, we have seen overwhelming expert and public concern about the out-of-control AI arms race — but no slowdown. In this video, we call for U.S. lawmakers to step in, and explore the policy solutions necessary to steer this powerful technology to benefit humanity.

Page 11 of 292First89101112131415Last