United States opened a new line of combat against the Islamic State, directing the military’s eight-year-old Cyber Command for the first time to mount computer-network attacks that are now being used alongside more traditional weapons. In 2009, US established, USCYBERCOM for more effective and coordinated efforts for conducting cyberspace operations. Cyber Command, …
Read More »TimeLine Layout
September, 2019
-
24 September
In the era of Electronic, and Cyber Warfare, Pigeons still provide alternative mode to transfer massive amount of data securely
The homing pigeon is a variety of domestic pigeon (Columba livia domestica) derived from the rock pigeon, selectively bred for its ability to find its way home over extremely long distances. The wild rock pigeon has an innate homing ability, meaning that it will generally return to its nest, (it …
Read More » -
23 September
Fake news is difficult to identify and fix, require new regulations and technologies for combating it.
Fake news or junk news or pseudo-news is a type of yellow journalism or propaganda that consists of deliberate disinformation or hoaxes spread via traditional print and broadcast news media or online social media. This type of news, found in traditional news, social media or fake news websites, has no …
Read More » -
22 September
Low‐Latency, Low‐Power technologies and communications devices are required for IoT Networks
The Internet-of-Things is an emerging revolution in the ICT sector under which interconnecting physical objects communicate with each other and/or with humans over internet in order to offer a given service. The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people …
Read More » -
14 September
Cyber criminals favouring stealthier attacks like Cryptojacking to make free money
Cyber criminals are switching away from ransomware to stealthier attacks as the main sources of generating revenue, according to analysis by British artificial intelligence (AI)-based cyber security firm Darktrace. Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency. Cryptocurrency is a form of digital currency that can …
Read More » -
13 September
Quantum sensors using Rydberg atoms enable ultrasensitive and ultrawideband electric field sensors, communication receivers from VLF to Terahertz
Quantum sensing uses some nonintuitive properties of nature to measure things like time, magnetic fields, gravity, or acceleration. Quantum sensing has become a distinct and rapidly growing branch of research within the area of quantum science and technology, with the most common platforms being spin qubits, trapped ions and flux qubits. …
Read More » -
12 September
DARPA L2M program exploring new approaches to enable lifelong learning for AI systems and making them smarter, safer, and more reliable
Machine learning (ML) methods have demonstrated outstanding recent progress and, as a result, artificial intelligence (AI) systems can now be found in myriad applications, including autonomous vehicles, industrial applications, search engines, computer gaming, health record automation, and big data analysis. However, Current ML systems experiencing errors when they encounter …
Read More » -
8 September
The Israel Defense Forces , the first army in the world to operationally deploy robots (UGVs), also becoming their big exporter
Israel is a high-tech superpower and one of the world’s top weapons exporters with approximately $6.5 billion in annual arms sales. Since 1985, for example, Israel is the world’s largest exporter of drones, responsible for about 60 percent of the global market, trailed by the US, whose market share is under …
Read More » -
6 September
Metamaterial based Analog computers can provide extremely high computational power with low energy consumption
High speed Supercomputers enable advanced computational modeling and data analytics applicable to all areas of science and engineering. They are being widely used in applications like Astrophysics, to understand stellar structure, planetary formation, galactic evolution and other interactions; Material Sciences to understand the structure and properties of materials and creation …
Read More » -
5 September
Militaries race for Psychological warfare dominance, from Russia’s Gerasimov doctrine to China’s three Warfares to DARPA’s mind control
Psychological warfare involves the planned use of propaganda and other psychological operations to influence the opinions, emotions, motives, reasoning, attitudes, and behavior of opposition groups. Psychological warfare consists of attempts to make your enemy lose confidence, give up hope, or feel afraid, so that you can win. It is used …
Read More »