Secret Military Technology Now On Your Smartphone

In the last 10 years, the world has been observing an information revolution in the form of space reconnaissance, showcasing a transition from complex military to user-friendly mainstream. 

In most cases, the more efficient and advanced mainstream counterpart will then be used to fill existing military needs. 

Space reconnaissance was, and still is, the most classified work the military does in space. With space reconnaissance, the enemy doesn’t know what you know, making the information yielded by the technology even more powerful. 

While in the past these technologies were never discussed, they are now available on anyone’s cell phones. 

This includes detailed satellite imagery of every location in the world, including the most classified locations such as the infamous Area 51, in which you can see everything except the classified aircraft in the hangars. This area had previously never been seen by the public.

Google maps and Google Earth are prime examples of the previous waves of revolutionary commercialisation of space reconnaissance. While google maps was revolutionary in its ease of use, Google Earth delivered the accuracy.
In the latest wave, Hawkeye 360 is bringing radio signal identification and tracking to the commercial world. This ability allows cell phone companies to better understand their customer locations and usage out of the normal range of their own transmission. 

It also allows for potential logistical tracking of truck fleets or aircraft and ships globally. This same ability has always been an obvious military need.

The ultimate commercial reconnaissance will be Capella, a global radar satellite constellation using small Cube Sats (miniaturised satellites). This will allow real-time tracking of all moving vehicles: cars, trucks, aircraft and missiles over the earth with or without cloud cover.

This is another military need that will likely be mostly filled by commercial data. The FAA tracking airliners, for example, will greatly benefit from Capella, as reported by townhall.com.

The latest addition to this capability is Artificial Intelligence (AI). This takes the drudgery out of imagery review. 

Instead of having humans looking at hundreds of images with no interesting information, we would have a computer do that part and simply present the identified data to human intelligence interpreters that can then derive meaning from the data.

iHLS:

You Might Also Read:

Satellite Imagery + Social Media = A New Way To Spot Emerging Nuclear Threats

« California Bans 'Secret' Election Bots
Financial Sector Breaches Soar Despite Heavy Security Spending »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Virus Bulletin

Virus Bulletin

Virus Bulletin is an online security information portal and certification body, providing users with independent intelligence about the latest developments in the global threat landscape.

BSA - The Software Alliance

BSA - The Software Alliance

BSA is the leading advocate for the global software industry before governments and in the international marketplace.

ID Quantique (IDQ)

ID Quantique (IDQ)

ID Quantique is a world leader in quantum-safe crypto solutions, designed to protect data for the long-term future.

CTERA Networks

CTERA Networks

CTERA provides cloud storage solutions that enable service providers and enterprises to launch managed storage, backup, file sharing and mobile collaboration services using a single platform.

National Cybersecurity Society (NCSS) - USA

National Cybersecurity Society (NCSS) - USA

The National Cybersecurity Society is a non-profit organization focused on providing cybersecurity education, awareness and advocacy to small businesses.

ProSearch Partners

ProSearch Partners

ProSearch Partners are national talent acquisition specialists exclusively focussing on Technology and Digital talent including Cybersecurity, Data Analytics and Execs.

Bolt Learning

Bolt Learning

Bolt's Cyber Security eLearning module provides users with an in-depth understanding of cybercrime, how it can occur and what everyone can contribute to preventing it.

HARMAN International

HARMAN International

HARMAN designs and engineers connected products and solutions for automakers, consumers, and enterprises worldwide.

INVISUS

INVISUS

INVISUS protects businesses against the latest cyber risks – including business and employee identity theft, data breaches, and cybersecurity compliance.

JFrog

JFrog

JFrog is on a mission to enable continuous updates through Liquid Software, empowering developers to code high-quality applications that securely flow to end-users with zero downtime.

Certo Software

Certo Software

Certo are trusted experts in mobile security. At Certo, mobile security is not an afterthought, it’s what we do.

XpertDPO

XpertDPO

XpertDPO provides data security, governance, risk and compliance, GDPR and ISO consultancy to public and private sector organisations.

Eleos Labs

Eleos Labs

Eleos Labs' suite of security tools prevent Web3 cyber attacks, reduce economic risks, and protect digital assets.

Stack Identity

Stack Identity

Stack Identity protects access to cloud data by prioritizing identity and access vulnerabilities via a live data attack map.

US Department of State - Bureau of Cyberspace & Digital Policy

US Department of State - Bureau of Cyberspace & Digital Policy

The Bureau of Cyberspace and Digital Policy leads and coordinates the Department’s work on cyberspace and digital diplomacy to encourage responsible state behavior in cyberspace.

SignPath

SignPath

SignPath provides leading-edge software and SaaS services that ensure code integrity from development to distribution.