Menu

Blog

Archive for the ‘surveillance’ category: Page 35

May 31, 2016

For $20M, These Israeli Hackers Will Spy On Any Phone On The Planet

Posted by in categories: mobile phones, surveillance

The latest surveillance tech from Israel “will open a new era in data interception,” says the CEO of profitable but troubled snoop supplier Ability. It’s sitting on the “golden key of surveillance” with a $20M product.

Read more

May 10, 2016

Draper Gets DARPA Contract to Improve Stealth Capabilities for Undersea Vehicles

Posted by in categories: government, military, robotics/AI, surveillance

I love contract season with the US Government because you get to see all of the cool projects being awarded.


CAMBRIDGE, MA — The U.S. military’s unmanned underwater vehicles (UUVs) depend on stealth as they conduct surveillance and reconnaissance and other missions in the deep oceans. With Global Positioning System (GPS) signals unable to penetrate the ocean’s surface, these UUVs can rely on inertial sensors to provide acceptable positioning information during short missions. On longer missions, however, inertial sensors accumulate error, forcing the vehicles to risk exposing themselves to enemies as they periodically surface to obtain a GPS fix.

The Defense Advanced Research Projects Agency (DARPA) is addressing this issue by funding the development of a small number of acoustic transmitters that can be anchored to fixed locations around ocean basins to serve as an undersea navigation constellation, according to a May 10 release by the Cambridge-based nonprofit company Draper.

Continue reading “Draper Gets DARPA Contract to Improve Stealth Capabilities for Undersea Vehicles” »

May 6, 2016

Air Force wants swarms of small ‘kamikaze’ drones to defeat missiles

Posted by in categories: drones, economics, military, neuroscience, surveillance

Nice; let’s hope they hit the right target.


“I need a stealth bomber that’s going to get close, and then it’s going to drop a whole bunch of smalls – some are decoys, some are jammers, some are [intelligence, surveillance, and reconnaissance] looking for where the SAMs are. Some of them are kamikaze airplanes that are going to kamikaze into those SAMs, and they’re cheap. You have maybe 100 or 1,000 surface-to-air missiles, but we’re going to hit you with 10,000 smalls, not 10,000 MQ-9s. That’s why we want smalls.”

SAMs stands for “Surface-to-Air Missile,” and they’re one of the reasons that the Air Force has invested so much in stealth technology over the years: if a missile can’t see a plane, it can’t hit it. The problem is that the economics don’t quite work that way: it’s easier to make a new, better missile than it is to make an existing airplane even stealthier, and modern Air Force fighters serve for around 30 years each—longer if they’re bombers. Missiles are generally cheaper than airplanes, so anyone who wants to protect against aerial attack just needs to invest in a lot of missiles.

Continue reading “Air Force wants swarms of small ‘kamikaze’ drones to defeat missiles” »

Apr 15, 2016

Ghost in the Shell and the transhumanist future of sexuality

Posted by in categories: military, security, surveillance, transhumanism

The sky above Osaka Bay is saturated in light pollution teeming from the neon-soaked metropolis below. Military bi-copters circle in patterns between the antenna towers of Niihama City’s looming skyscrapers as they survey the scene of an ongoing domestic security operation. Kneeling from atop the edge of one of these towers is a figure; a mauve-haired saboteur of the state clad in a leotard, side holster, and leather jacket. Combat boots and leggings hiked just past her knees with her upper thighs left exposed. An external HD cable juts from a small input jack indented at the base of her neck.

Her pupils dilate, sifting through the visual noise of an embedded surveillance feed while combing the room below for suspicious movements. She detaches the cable at her subordinate’s signal, stands upright and removes her clothing. She leans over the edge of the building, a smirk streaking across her otherwise stoic expression. A rappel line heaves sharply, suspending her body directly adjacent to that of her target, who is now only a trigger pull from annihilation.

Read more

Apr 7, 2016

US spy planes use AR software above major US cities and ‘target Muslim areas’

Posted by in categories: augmented reality, surveillance

Interesting


The software can be used by pilots to superimpose information onto pilots’ screens as they circle above areas, which include one San Bernardino mosque after the shooting last year.

Continue reading “US spy planes use AR software above major US cities and ‘target Muslim areas’” »

Oct 20, 2015

U.S. Plans $6 Billion Investment in Space Situational Awareness

Posted by in categories: business, military, satellites, science, security, space, surveillance

http://spacenews.com/planned-u-s-investment-in-space-awarene…PqrOS.dpuf

Oct 20, 2015

Drone ‘Angst’ extends beyond backyard spying

Posted by in categories: automation, counterterrorism, defense, disruptive technology, drones, ethics, military, privacy, surveillance

http://aviationweek.com/defense/drone-angst-extends-beyond-backyard-spying

Jul 23, 2015

2015 IEEE International Geoscience and Remote Sensing Symposium | July 26–31, 2015 | Milan, Italy

Posted by in categories: big data, complex systems, computing, food, information science, machine learning, mapping, space, surveillance, sustainability

MilanPhotoCollage_md


Hosted by the IEEE Geoscience and Remote Sensing Society, the International Geoscience and Remote Sensing Symposium 2015 (IGARSS 2015) will be held from Sunday July 26th through Friday July 31th, 2015 at the Convention Center in Milan, Italy. This is the same town of the EXPO 2015 exhibition, whose topic is “Feeding the planet: energy for life”.

Read more

May 16, 2015

So, the NSA Has an Actual Skynet Program — Kim Zet Wired

Posted by in categories: privacy, robotics/AI, security, Skynet, supercomputing, surveillance

We’ve suspected it all along—that Skynet, the massive program that brings about world destruction in the Terminator movies, was just a fictionalization of a real program in the hands of the US government. And now it’s confirmed—at least in name.

As The Intercept reports today, the NSA does have a program called Skynet. But unlike the autonomous, self-aware computerized defense system in Terminator that goes rogue and launches a nuclear attack that destroys most of humanity, this one is a surveillance program that uses phone metadata to track the location and call activities of suspected terrorists. A journalist for Al Jazeera reportedly became one of its targets after he was placed on a terrorist watch list. Read more

Nov 29, 2014

The Most Wanted Man in the World

Posted by in categories: government, hacking, privacy, security, surveillance

Wired.com

The message arrives on my “clean machine,” a MacBook Air loaded only with a sophisticated encryption package. “Change in plans,” my contact says. “Be in the lobby of the Hotel ______ by 1 pm. Bring a book and wait for ES to find you.”

ES is Edward Snowden, the most wanted man in the world. For almost nine months, I have been trying to set up an interview with him—traveling to Berlin, Rio de Janeiro twice, and New York multiple times to talk with the handful of his confidants who can arrange a meeting. Among other things, I want to answer a burning question: What drove Snowden to leak hundreds of thousands of top-secret documents, revelations that have laid bare the vast scope of the government’s domestic surveillance programs? In May I received an email from his lawyer, ACLU attorney Ben Wizner, confirming that Snowden would meet me in Moscow and let me hang out and chat with him for what turned out to be three solid days over several weeks. It is the most time that any journalist has been allowed to spend with him since he arrived in Russia in June 2013. But the finer details of the rendezvous remain shrouded in mystery. I landed in Moscow without knowing precisely where or when Snowden and I would actually meet. Now, at last, the details are set.

Read more

Page 35 of 39First3233343536373839