Secret Military Technology Now On Your Smartphone

In the last 10 years, the world has been observing an information revolution in the form of space reconnaissance, showcasing a transition from complex military to user-friendly mainstream. 

In most cases, the more efficient and advanced mainstream counterpart will then be used to fill existing military needs. 

Space reconnaissance was, and still is, the most classified work the military does in space. With space reconnaissance, the enemy doesn’t know what you know, making the information yielded by the technology even more powerful. 

While in the past these technologies were never discussed, they are now available on anyone’s cell phones. 

This includes detailed satellite imagery of every location in the world, including the most classified locations such as the infamous Area 51, in which you can see everything except the classified aircraft in the hangars. This area had previously never been seen by the public.

Google maps and Google Earth are prime examples of the previous waves of revolutionary commercialisation of space reconnaissance. While google maps was revolutionary in its ease of use, Google Earth delivered the accuracy.
In the latest wave, Hawkeye 360 is bringing radio signal identification and tracking to the commercial world. This ability allows cell phone companies to better understand their customer locations and usage out of the normal range of their own transmission. 

It also allows for potential logistical tracking of truck fleets or aircraft and ships globally. This same ability has always been an obvious military need.

The ultimate commercial reconnaissance will be Capella, a global radar satellite constellation using small Cube Sats (miniaturised satellites). This will allow real-time tracking of all moving vehicles: cars, trucks, aircraft and missiles over the earth with or without cloud cover.

This is another military need that will likely be mostly filled by commercial data. The FAA tracking airliners, for example, will greatly benefit from Capella, as reported by townhall.com.

The latest addition to this capability is Artificial Intelligence (AI). This takes the drudgery out of imagery review. 

Instead of having humans looking at hundreds of images with no interesting information, we would have a computer do that part and simply present the identified data to human intelligence interpreters that can then derive meaning from the data.

iHLS:

You Might Also Read:

Satellite Imagery + Social Media = A New Way To Spot Emerging Nuclear Threats

« California Bans 'Secret' Election Bots
Financial Sector Breaches Soar Despite Heavy Security Spending »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Bromium

Bromium

Bromium deliver a new technology called micro-virtualization to address the enterprise security problem and provide protection for end users against advanced malware.

MarQuest

MarQuest

MarQuest provides services and systems to enhance network reliability and security.

Business Intelligence Associates (BIA)

Business Intelligence Associates (BIA)

BIA's TotalDiscovery is a defensible and cost-effective corporate preservation and legal compliance software solution.

Menlo Security

Menlo Security

Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email.

AllClear ID

AllClear ID

AllClear ID provides products and services that help protect people and their personal information from threats related to identity theft.

NEC

NEC

NEC offers a complete array of solutions to governments and enterprises to protect themselves from the threats of digital disruption.

ObjectSecurity

ObjectSecurity

ObjectSecurity is a leader in authorization policy automation. With OpenPMF, you can manage application security policies for access control and auditing.

SAS Institute

SAS Institute

SAS is a leader in business analytics software and services providing solutions for a wide range of critical business areas including risk management, compliance and fraud prevention.

Department of Justice & Equality - Cybercrime Division

Department of Justice & Equality - Cybercrime Division

The Cybercrime division is responsible for developing policy in relation to the criminal activity and coordinating a range of different cyber initiatives at national and international level.

Greylock Partners

Greylock Partners

Greylock Partners is a leading venture capital firm based in Silicon Valley. We invest in all sectors of enterprise software technology including applications, cloud/SaaS, networking and security.

Transmit Security

Transmit Security

The Transmit Security Platform provides a solution for managing identity across applications while maintaining security and usability.

Softcat

Softcat

Softcat offer a broad portfolio of IT services and solutions covering Hybrid Infrastructure, Cyber Security, Digital Workspace and IT Intelligence.

Secure Cyber Defense

Secure Cyber Defense

Secure Cyber Defense provides expert cybersecurity consulting and managed detection and response services to companies, local government, schools and universities.

Conceal

Conceal

Conceal’s mission is to stop ransomware and credential theft for companies of all sizes by developing innovative solutions that provide social engineering protection in any browser.

Bitdefender Voyager Ventures (BVV)

Bitdefender Voyager Ventures (BVV)

Bitdefender Voyager Ventures is an early-stage investment vehicle focused on cybersecurity, data analytics and automation startups.

Xygeni

Xygeni

Xygeni is a leader in Application Security Posture Management (ASPM). Our advanced technology detects malicious code in real-time to prevent malware infections.