Secret Military Technology Now On Your Smartphone

In the last 10 years, the world has been observing an information revolution in the form of space reconnaissance, showcasing a transition from complex military to user-friendly mainstream. 

In most cases, the more efficient and advanced mainstream counterpart will then be used to fill existing military needs. 

Space reconnaissance was, and still is, the most classified work the military does in space. With space reconnaissance, the enemy doesn’t know what you know, making the information yielded by the technology even more powerful. 

While in the past these technologies were never discussed, they are now available on anyone’s cell phones. 

This includes detailed satellite imagery of every location in the world, including the most classified locations such as the infamous Area 51, in which you can see everything except the classified aircraft in the hangars. This area had previously never been seen by the public.

Google maps and Google Earth are prime examples of the previous waves of revolutionary commercialisation of space reconnaissance. While google maps was revolutionary in its ease of use, Google Earth delivered the accuracy.
In the latest wave, Hawkeye 360 is bringing radio signal identification and tracking to the commercial world. This ability allows cell phone companies to better understand their customer locations and usage out of the normal range of their own transmission. 

It also allows for potential logistical tracking of truck fleets or aircraft and ships globally. This same ability has always been an obvious military need.

The ultimate commercial reconnaissance will be Capella, a global radar satellite constellation using small Cube Sats (miniaturised satellites). This will allow real-time tracking of all moving vehicles: cars, trucks, aircraft and missiles over the earth with or without cloud cover.

This is another military need that will likely be mostly filled by commercial data. The FAA tracking airliners, for example, will greatly benefit from Capella, as reported by townhall.com.

The latest addition to this capability is Artificial Intelligence (AI). This takes the drudgery out of imagery review. 

Instead of having humans looking at hundreds of images with no interesting information, we would have a computer do that part and simply present the identified data to human intelligence interpreters that can then derive meaning from the data.

iHLS:

You Might Also Read:

Satellite Imagery + Social Media = A New Way To Spot Emerging Nuclear Threats

« California Bans 'Secret' Election Bots
Financial Sector Breaches Soar Despite Heavy Security Spending »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ExaGrid Systems

ExaGrid Systems

ExaGrid provides Tiered Backup Storage with a unique disk-cache Landing Zone, long-term retention repository, and scale-out architecture.

Hack Miami

Hack Miami

HackMiami is the premier resource in South Florida for highly skilled hackers that specialize in vulnerability analysis, penetration testing, digital forensics, and all manner of IT security.

Redbud

Redbud

Redbud is a specialist search and recruitment firm for Information Security professionals.

Zix

Zix

Zix offers secure email encryption, threat protection, archiving, DLP and BYOD security for hospitals, financial services, government, and more.

Air Informatics

Air Informatics

Air Informatics LLC provides security, information management, analytics and informatics for IT and wirelessly enabled airplanes and operations.

Tecnalia Research & Innovation

Tecnalia Research & Innovation

Tecnalia is the largest center of applied research and technological development in Spain, a benchmark in Europe and a member of the Basque Research and Technology Alliance.

Garner Products

Garner Products

Garner design, manufacture, and sell equipment that delivers complete, permanent, and verifiable data elimination.

T-REX

T-REX

T-REX is a coworking space, technology incubator, and entrepreneur resource center for technology startups.

Bedrock Systems

Bedrock Systems

BedRock Systems is on a mission to deliver a trusted computing base from edge to cloud, where safety and security isn’t just a perception, it’s a formally proven reality.

Trilateral Research

Trilateral Research

Trilateral Research provide regulatory and policy advice; develop new data-driven technologies and contribute to the latest standards in safeguarding privacy, ethics and human rights.

Xscale Accelerator

Xscale Accelerator

Xscale's vision is to create world-class startups out of India by transforming sales and providing access to global markets.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Certihash

Certihash

Certihash have developed the world’s first blockchain empowered suite of information security tools based on the NIST cybersecurity framework.

StealthPath

StealthPath

StealthPath is focused on endpoint protection, securing the “implicit trust” vulnerabilities of current leading information security solutions.

Avalon Cyber

Avalon Cyber

Arm your organization in the fight against cyberattacks by partnering with the experts at Avalon Cyber.

Trustmi

Trustmi

Trustmi is a leading fintech cybersecurity solution designed to prevent financial losses from fraud and errors, 24/7.