Secret Military Technology Now On Your Smartphone

In the last 10 years, the world has been observing an information revolution in the form of space reconnaissance, showcasing a transition from complex military to user-friendly mainstream. 

In most cases, the more efficient and advanced mainstream counterpart will then be used to fill existing military needs. 

Space reconnaissance was, and still is, the most classified work the military does in space. With space reconnaissance, the enemy doesn’t know what you know, making the information yielded by the technology even more powerful. 

While in the past these technologies were never discussed, they are now available on anyone’s cell phones. 

This includes detailed satellite imagery of every location in the world, including the most classified locations such as the infamous Area 51, in which you can see everything except the classified aircraft in the hangars. This area had previously never been seen by the public.

Google maps and Google Earth are prime examples of the previous waves of revolutionary commercialisation of space reconnaissance. While google maps was revolutionary in its ease of use, Google Earth delivered the accuracy.
In the latest wave, Hawkeye 360 is bringing radio signal identification and tracking to the commercial world. This ability allows cell phone companies to better understand their customer locations and usage out of the normal range of their own transmission. 

It also allows for potential logistical tracking of truck fleets or aircraft and ships globally. This same ability has always been an obvious military need.

The ultimate commercial reconnaissance will be Capella, a global radar satellite constellation using small Cube Sats (miniaturised satellites). This will allow real-time tracking of all moving vehicles: cars, trucks, aircraft and missiles over the earth with or without cloud cover.

This is another military need that will likely be mostly filled by commercial data. The FAA tracking airliners, for example, will greatly benefit from Capella, as reported by townhall.com.

The latest addition to this capability is Artificial Intelligence (AI). This takes the drudgery out of imagery review. 

Instead of having humans looking at hundreds of images with no interesting information, we would have a computer do that part and simply present the identified data to human intelligence interpreters that can then derive meaning from the data.

iHLS:

You Might Also Read:

Satellite Imagery + Social Media = A New Way To Spot Emerging Nuclear Threats

« California Bans 'Secret' Election Bots
Financial Sector Breaches Soar Despite Heavy Security Spending »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Infosecurity Europe

Infosecurity Europe

Infosecurity Europe is Europe’s number one information security conference and exhibition.

Gigamon

Gigamon

Gigamon provides intelligent Traffic Visability solutions that provide unmatched visbility into physical & birtual networks without affecting the performance or stability of production environments.

DLA Piper

DLA Piper

DLA Piper is a global law firm with offices throughout the Americas, Asia Pacific, Europe and the Middle East. Practice areas include Cybersecurity.

Senetas

Senetas

Senetas is a leading developer and manufacturer of certified high-assurance encryption solutions, dedicated to protecting network transmitted data without compromising performance.

ZeroFox

ZeroFox

ZeroFox safeguards modern organizations from dynamic security risks across social, mobile, surface, deep and dark web, email and collaboration platforms.

BioConnect

BioConnect

BioConnect provide biometric access control solutions to verify a person’s identity across physical, IOT and digital applications.

Mosaic 451

Mosaic 451

Mosaic451 is a bespoke IT managed services provider and consultancy specializing in information security, operations and design.

ScienceSoft

ScienceSoft

ScienceSoft is a provider of software development and IT consulting services including Information Security.

DataFleets

DataFleets

DataFleets is a privacy-preserving data engine that unifies distributed data for rapid access, agile analytics, and automated compliance.

Intracom Telecom

Intracom Telecom

Intracom Telecom is a global telecommunication systems & solutions vendor offering a complete range of professional services and solutions including Information Security.

ENSCO

ENSCO

The ENSCO group of companies provides engineering, science and advanced technology solutions that guarantee mission success, safety and security to governments and private industries worldwide.

AHAD

AHAD

AHAD provides cybersecurity, digital transformation, and risk management services and solutions to Government, Fortune 500, And Start-Up Companies in the Middle East region.

Eden Data

Eden Data

Eden Data is on a mission to break the outdated mold of traditional cybersecurity consulting. We handle all of your security, compliance & data privacy needs.

Hydden

Hydden

Hydden gives security teams the ability to create a solid foundation to build a truly next-gen identity security practice by bridging the gaps between siloed teams and technologies.

Nova Microsystems

Nova Microsystems

Nova's mission is to revolutionize cybersecurity through continuous data analysis and dynamic AI-driven encryption.

Screwloose IT

Screwloose IT

Screwloose IT are a national provider of information technology services. We specialise in managed IT, cloud services, cyber security, website design and digital marketing for businesses of all sizes.