Secret Military Technology Now On Your Smartphone

In the last 10 years, the world has been observing an information revolution in the form of space reconnaissance, showcasing a transition from complex military to user-friendly mainstream. 

In most cases, the more efficient and advanced mainstream counterpart will then be used to fill existing military needs. 

Space reconnaissance was, and still is, the most classified work the military does in space. With space reconnaissance, the enemy doesn’t know what you know, making the information yielded by the technology even more powerful. 

While in the past these technologies were never discussed, they are now available on anyone’s cell phones. 

This includes detailed satellite imagery of every location in the world, including the most classified locations such as the infamous Area 51, in which you can see everything except the classified aircraft in the hangars. This area had previously never been seen by the public.

Google maps and Google Earth are prime examples of the previous waves of revolutionary commercialisation of space reconnaissance. While google maps was revolutionary in its ease of use, Google Earth delivered the accuracy.
In the latest wave, Hawkeye 360 is bringing radio signal identification and tracking to the commercial world. This ability allows cell phone companies to better understand their customer locations and usage out of the normal range of their own transmission. 

It also allows for potential logistical tracking of truck fleets or aircraft and ships globally. This same ability has always been an obvious military need.

The ultimate commercial reconnaissance will be Capella, a global radar satellite constellation using small Cube Sats (miniaturised satellites). This will allow real-time tracking of all moving vehicles: cars, trucks, aircraft and missiles over the earth with or without cloud cover.

This is another military need that will likely be mostly filled by commercial data. The FAA tracking airliners, for example, will greatly benefit from Capella, as reported by townhall.com.

The latest addition to this capability is Artificial Intelligence (AI). This takes the drudgery out of imagery review. 

Instead of having humans looking at hundreds of images with no interesting information, we would have a computer do that part and simply present the identified data to human intelligence interpreters that can then derive meaning from the data.

iHLS:

You Might Also Read:

Satellite Imagery + Social Media = A New Way To Spot Emerging Nuclear Threats

« California Bans 'Secret' Election Bots
Financial Sector Breaches Soar Despite Heavy Security Spending »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT GRC Forum

IT GRC Forum

The IT GRC Forum is an online resource and networking platform for the Governance, Risk Management, and Compliance (GRC) community

Global Digital Forensics (GDF)

Global Digital Forensics (GDF)

GDF specialise in Digital Forensics and e-Discovery. Other services include Data Breach Response and Cyber Security.

Mobile Mentor

Mobile Mentor

Mobile Mentor is an independent provider of enterprise mobility solutions in New Zealand and Australia.

ICS2

ICS2

ICS² is the first cyber security company focusing on protecting the control system of power, oil, gas, and petrochemicals plants.

Cyberlitica

Cyberlitica

Cyberlitica (formerly iPhish) provides a Workforce Threat Intelligence application that significantly augments companies’ cyber threat prevention efforts.

CodeSealer

CodeSealer

CodeSealer provide invisible end-to-end user interface protection with a unique web security solution to eliminate Man-in-the-Middle and Man-in-the-Browser vulnerabilties.

R2S Technologies

R2S Technologies

R2S can help you implement a cyber security framework to ensure your business is more resilient towards the growing threat of cyber crime. We provide Web and Mobile Application Security Assessment..

MicroEJ

MicroEJ

MicroEJ is a software vendor of cost-driven solutions for embedded and IoT devices.

Siemens

Siemens

Siemens Industrial Security Services provide solutions for cybersecurity in automation environments based on the recommendations of the international standard IEC 62443.

MorganFranklin Consulting

MorganFranklin Consulting

MorganFranklin Consulting is a management advisory firm that works with businesses and government to address complex and transformational technology and business objectives including cybersecurity.

Gorilla Technology Group

Gorilla Technology Group

Gorilla specializes in video analytics, OT network security and big data to support a wide range of solutions for commercial, industrial, cities and government purposes.

Clarity

Clarity

Clarity is an AI cybersecurity startup that protects against deepfakes and new social engineering and phishing attack vectors accelerated by the rapid adoption of Generative AI.

CSIRT-Gnd

CSIRT-Gnd

CSIRT-Gnd provides 24x7 Computer Security Incident Response Services to citizens, companies and government agencies in Grenada.

Continent 8 Technologies

Continent 8 Technologies

Continent 8 Technologies is the leading provider of managed hosting, connectivity, cloud and cybersecurity solutions to the global online gambling industry.

P3M Works

P3M Works

P3M Works delivers Cyber Security and Digital Transformation projects across both private and public sector clients.

Concertium

Concertium

Concertium is a complete cybersecurity partner equipped with the expertise and services to deliver end-to-end visibility and protection from evolving cyber threats.