By 2025, it is predicted that there can be as many as 100 billion connected IoT devices or network of everyday objects as well as sensors that will be infused with intelligence and computing capability. These devices shall comprise of personal devices such as smart watches, digital glasses and fitness …
Read More »TimeLine Layout
February, 2019
-
13 February
US Navy found Faulty Welding in Submarine Missile Tubes, developing non-destructive weld inspection methods
In 2000, a Russian cruise-missile submarine — Kursk — sank, killing all 118 sailors on board. The Russian government concluded the ship sunk due to a faulty weld which caused a gas leak and led to an explosion. The U.S. Navy in August 2018 said that there’s a problem …
Read More » -
12 February
Navies exploring Biomimetics, Bio-inspired mechanisms to improve military underwater sensing, control and communications systems
“It was in the oceans that life first evolved and where complex animals have thrived for over 600 million years. Marine animals survive in environments as diverse as tropical coral reefs, polar ice-capped oceans, and the lightless abyssal depths,” says Frank E. Fish from West Chester University and Donna M. …
Read More » -
8 February
Technology breakthroughs in GaN enabling large growth in Semiconductor devices market in Defence and Aerospace
GaN is a semiconductor material that can amplify high power radio frequency signals efficiently at microwave frequencies to enhance a system’s range. Therefore it has become the technology of choice for high-RF power applications that require the transmission of signals over long distances such as EW, radar, base stations and satellite communications. The advantages of GaN-based devices stems largely from the attractive intrinsic physical properties of the material. The material …
Read More » -
8 February
Vulnerabilities in 3D printing could be exploited for Cyber-Physical attacks and Cyber Warfare
3D printing or additive manufacturing is ongoing revolution in manufacturing with its potential to fabricate any complex object and is being utilized from aerospace components to human organs, textiles, metals, buildings and even food. Additive manufacturing, is defined by ASTM International as the process of joining materials together, layer by …
Read More » -
7 February
DARPA’s SMISC program to identify misinformation or deception campaigns on Social Media and conduct its own propaganda campaigns
The conditions under which our Armed Forces conduct operations are rapidly changing with the spread of blogs, social networking sites, and media‐sharing technology (such as YouTube), and further accelerated by the proliferation of mobile technology. Changes to the nature of conflict resulting from the use of social media are likely to …
Read More » -
7 February
Neuro- or Biohybrid systems to synthesize fuels, and chemicals and act as sensors for military
Neuro- or Biohybrid systems are systems formed by at least one biological component – i.e. already existing in living systems – and at least one artificial – newly engineered – component. Biological and artificial components are not independent but are passing information either in one or both directions, thereby forming …
Read More » -
5 February
Future Blended Physical-Cyber Attack shall use multiple attack vectors to cause the mayhem, report anticipates 2M Fatalities
Governments, military forces and critical national infrastructure organisations typically deal with some of the most sophisticated cyber threats in use today. These cyber threats continue to grow in sophistication and automation, with attackers ranging from highly skilled and motivated organisations, including nation states, or individuals to less skilled attackers using …
Read More »
January, 2019
-
29 January
New technology to fight human and drug smuggling across maritime borders
One of the threat of maritime security is human and drug smuggling across maritime borders. This is particularly important because terrorists may use similar pathways to sneak illegal weapons through the border or to deliver a dirty bomb to seaports. There has been a noticeable growth in maritime criminal …
Read More » -
28 January
Cyber Red teaming or penetration testing uncovers the vulnerabilities of an organisation, NEC develops automated tool
Cyberattacks are being conducted daily on any type of target, and any notion that a state of full cyber security can be reached is a mere illusion. Cybersecurity is about managing risks and to ascertain that, to a certain extent, proper procedures and adequate security measures are being taken. Exposed …
Read More »