Aerial Vehicle Systems Aeryon Small Unmanned Aerial Systems Why sUAS? Small Unmanned Aerial Systems (sUAS), also known as Unmanned Aerial Vehicles (UAV), provide immediate high-quality aerial intelligence. Can we expect the economy to keep growing? If we read the financial pages, economic growth seems to be viewed as the “normal” situation to which economies inevitably return. But is it really? If we look back over the past 50 years, or even over the past 100 years, economic growth has predominated. Over the longer term, we know that people have become more prosperous, and that world population has grown. The natural assumption is that economic growth will continue in the future as it has in the past.
Prospective U.S. Cyber Commander Talks Terms of Digital Warfare For years, the military has worried about the vulnerability of the United States to cyberattack — and how and when to return fire in digital warfare. Now, the issue is taking center stage, as the Senate considers the nomination of an Army general to head the military’s first four-star Cyber Command. In a hearing this morning, the Senate Armed Services Committee will review the nomination of Army Lt. Gen. Keith Alexander to be the head of the Pentagon’s new Cyber Command. It’s a chance to get a closer look at the kind of capabilities for waging network warfare the Pentagon thinks it needs.
Global Cybersecurity Agenda (GCA) Introduction The Need for International Cooperation Current Models of International Cooperation Areas for Potential International Coordination in Legal Efforts International conventions and recommendations Hackers Build Cheap Spy Drone that Rivals CIA Predator August 10th, 2011 · 10 Comments Garage-built DIY drone plane can cause serious damage worldwideBy Erick Hansen LAS VEGAS (Hollywood Today) 8/10/11 – Hackers have built a DIY flying drone that can launch remote attacks which astounded attendees at the Black Hat/Defcon meet here. The hackers built their drone for about $6,000, while the CIA coughs up about S4.5 million each for their Predator drones. Though it doesn’t fire a pair of Hellfire missiles like the CIA models, the hacker drone has some serious teeth. Hackers could use them to to intercept all wifi traffic and steal credit card numbers, fly above corporations to steal intellectual property and other data from a network, as well as launch denial-of-service or man-in-the-middle attacks.
The Price of Assassination - Opinionator Blog I wouldn’t have believed you if you’d told me 20 years ago that America would someday be routinely firing missiles into countries it’s not at war with. For that matter, I wouldn’t have believed you if you’d told me a few months ago that America would soon be plotting the assassination of an American citizen who lives abroad. Shows you how much I know. President Obama, who during his first year in office oversaw more drone strikes in Pakistan than occurred during the entire Bush presidency, last week surpassed his predecessor in a second respect: he authorized the assassination of an American — Anwar al-Awlaki, the radical Imam who after 9/11 moved from Virginia to Yemen, a base from which he inspires such people as the Fort Hood shooter and the would-be underwear bomber. I’m not qualified to answer these questions, and, besides, it doesn’t really matter what the correct answers are.
The 10 Tools of Online Oppressors - Reports SAN FRANCISCO In reporting news from the world’s most troubled nations, journalists have made a seismic shift this year in their reliance on the Internet and other digital tools. Blogging, video sharing, text messaging, and live-streaming from cellphones brought images of popular unrest from the central square of Cairo and the main boulevard of Tunis to the rest of the world. In Other Languages • Español • Português • Français • Русский • العربية • Multimedia • Audio Report: Offenders and TacticsIn Print • Download the pdfMore on This Issue • CPJ Internet Channel: Danny O'Brien's blog • Blogging in Egypt: Virtual network, virtual oppression • Burmese exile news site endures hacking, DDoS attacks
Personal recreation drones being developed By Daily Mail Reporter Updated: 13:13 GMT, 8 November 2010 They could put your mind at ease - or do very much the opposite. A new arms race is on and it could change everything from the way we parent to how we get our celebrity gossip. For the technology currently being used by the CIA to ferret out terrorist leaders in the hills of Pakistan is set to arrive in a neighbourhood near you - and there's nowhere to hide. Coming to a sky near you? A remote CCTV camera drone circles in the sky during a political rally in Britain last year. Peak oil is real and will stunt any economic recovery During the last century, society squandered 500 million years of captured sunlight on drag races, traffic jams, private jets and overheated office buildings - warns campaign group Oil company cheerleaders proclaiming huge supplies of oil are dead wrong. Peak oil is as real as rain, and it is here now. Not 2050. Not 2020. Now.
Friends and enemies in the Middle East. Who is connected to whom? - interactive As the US and UK are set to again commit to military involvement in the Middle East, this interactive visualises the intricate, complex and sometimes hidden relationships and alliances across the region. Its tangled, opened state is meant as a kind of visual joke, showing how its fabric defies simple solutions. You can filter relationship types ‘on’ and ‘off’ in the bottom left and also rollover and click on different players to get a clarified view. Understandably, this is an ongoing, evolving diagram which we hope to add to. So feel free to help us make this diagram more accurate.
Booby-trapping PDF files: A new how-to High performance access to file storage Updated A security researcher has demonstrated a mechanism that exploits PDF files without taking advantage of any particular vulnerabilities. Didier Stevens' proof of concept exploit relies on running an executable embedded in a PDF file - something that ought to be blocked - by launching a command that ultimately runs an executable. In the case of Adobe Reader, such attempted launches generate a pop-up dialog box asking users if they want to proceed. However, this is not necessarily a major hurdle because Stevens was also able to manipulate the text displayed by the pop-up in a way that might easily fool most users. "With Adobe Reader, the only thing preventing execution is a warning," Stevens explains.
$230,000 For a Guard Dog: Why the Wealthy Are Afraid Of Violence From Below July 29, 2011 | Like this article? Join our email list: Stay up to date with the latest headlines via email. “Violence in the streets, aimed at the wealthy. That’s what I worry about.” IEA's "Golden Age of Gas Scenario" Leads to More Than 6°F Warming and Out-of-Control Climate Change By Joe Romm on June 7, 2011 at 12:50 pm "IEA’s “Golden Age of Gas Scenario” Leads to More Than 6°F Warming and Out-of-Control Climate Change" The International Energy Agency has just issued a special report titled, “Are We Entering a Golden Age of Gas?”