“It was in the oceans that life first evolved and where complex animals have thrived for over 600 million years. Marine animals survive in environments as diverse as tropical coral reefs, polar ice-capped oceans, and the lightless abyssal depths,” says Frank E. Fish from West Chester University and Donna M. …
Read More »Yearly Archives: 2019
Technology breakthroughs in GaN enabling large growth in Semiconductor devices market in Defence and Aerospace
GaN is a semiconductor material that can amplify high power radio frequency signals efficiently at microwave frequencies to enhance a system’s range. Therefore it has become the technology of choice for high-RF power applications that require the transmission of signals over long distances such as EW, radar, base stations and satellite communications. The advantages of GaN-based devices stems largely from the attractive intrinsic physical properties of the material. The material …
Read More »Vulnerabilities in 3D printing could be exploited for Cyber-Physical attacks and Cyber Warfare
3D printing or additive manufacturing is ongoing revolution in manufacturing with its potential to fabricate any complex object and is being utilized from aerospace components to human organs, textiles, metals, buildings and even food. Additive manufacturing, is defined by ASTM International as the process of joining materials together, layer by …
Read More »DARPA’s SMISC program to identify misinformation or deception campaigns on Social Media and conduct its own propaganda campaigns
The conditions under which our Armed Forces conduct operations are rapidly changing with the spread of blogs, social networking sites, and media‐sharing technology (such as YouTube), and further accelerated by the proliferation of mobile technology. Changes to the nature of conflict resulting from the use of social media are likely to …
Read More »Neuro- or Biohybrid systems to synthesize fuels, and chemicals and act as sensors for military
Neuro- or Biohybrid systems are systems formed by at least one biological component – i.e. already existing in living systems – and at least one artificial – newly engineered – component. Biological and artificial components are not independent but are passing information either in one or both directions, thereby forming …
Read More »Future Blended Physical-Cyber Attack shall use multiple attack vectors to cause the mayhem, report anticipates 2M Fatalities
Governments, military forces and critical national infrastructure organisations typically deal with some of the most sophisticated cyber threats in use today. These cyber threats continue to grow in sophistication and automation, with attackers ranging from highly skilled and motivated organisations, including nation states, or individuals to less skilled attackers using …
Read More »New technology to fight human and drug smuggling across maritime borders
One of the threat of maritime security is human and drug smuggling across maritime borders. This is particularly important because terrorists may use similar pathways to sneak illegal weapons through the border or to deliver a dirty bomb to seaports. There has been a noticeable growth in maritime criminal …
Read More »Cyber Red teaming or penetration testing uncovers the vulnerabilities of an organisation, NEC develops automated tool
Cyberattacks are being conducted daily on any type of target, and any notion that a state of full cyber security can be reached is a mere illusion. Cybersecurity is about managing risks and to ascertain that, to a certain extent, proper procedures and adequate security measures are being taken. Exposed …
Read More »Researchers developing efficient Vision Aided Navigation for UAV in GPS-Denied environments like building, underground or under the forest canopy
UAV navigation can be seen as a process that robots make a plan on how to safely and quickly reach the target location, which mostly relies on current environment and location. In order to successfully complete the scheduled mission, a UAV must be fully aware of its states, including location, …
Read More »DARPA’s CHASE to automate cybersecurity across the large, distributed Department of Defense, Enterprise Network
Secure networks are vital to U.S. military operations at all levels and are a source of tactical, operational and strategic advantages. They provide the capability to acquire, move and process massive amounts of information, make decisions rapidly and command distributed forces on an unparalleled scale. However, Networks within the …
Read More »