Traditional navies as well as maritime terrorists can and have used mines and underwater improvised explosive devices (UWIEDs) to challenge military and commercial uses of the seas. Mines have been utilized in defensive capabilities, such as denying access into a region, and offensive capacities, such as denying egress out of …
Read More »Recent Posts
With rising threat of mobile malware, Mobile companies are launching secure smartphones
The recent rise in mobile malware have made Mobile phones vulnerable to data leakage and tempering of sensitive information such as business documents, bank details, credit card information and make purchases. Malware client called Pegasus have been found that can jailbreak your smartphone, ultimately installing a client that can seize data, …
Read More »Rectenna or rectifying antenna critical technology for wireless power systems, powering military drones, and receiving solar power from satellites
Over the past two decades, many wireless systems have been developed and widely used around the world. The most important examples are cellular mobile radio and Wi-Fi systems. Just like radio and television broadcasting systems, they radiate electromagnetic waves/energy into the air but a large amount of the energy is …
Read More »