Results


indian-military-drone-crosses-chinese-airspace-crashes-due-technical-glitch-2625182

International Business Times

The Chinese military, Thursday, strongly condemned and opposed the trespassing of an Indian Unmanned Aerial Vehicle (UAV) into Chinese airspace. India, on the same day, claimed that the UAV "lost control" and entered into Chinese territory through the Sikkim (a state in India) border. According to a report by the Hindustan Times, an Indian news website, India replied to the incident, Thursday, claiming that the UAV was on a "regular training mission," lost control and crossed the border area from Sikkim. A statement by the Indian Defense Ministry said: "An Indian UAV which was on a regular training mission inside the Indian territory lost contact with the ground control due to some technical problem and crossed over the LAC [Line of Actual Control] in the Sikkim Sector. As per standard protocol, the Indian border security personnel immediately alerted their Chinese counterparts to locate the UAV."


South Korea Will Deploy Drones To Counter North Korean Nuclear Missile Threat

International Business Times

South Korea planned to introduce a new counter to North Korea's burgeoning nuclear weapons program: drones. South Korean news wire agency Yonhap reported Tuesday that the nation planned to roll out a new weaponized drone unit next year. "The Army plans to set up a special organization to lead the development of dronebots, establish a standard platform and expand the dronebot program by function," an Army official told Yonhap, asking not be named because they weren't authorized to discuss the matter. "To begin with, we will launch a dronebot combat unit next year and use it as a'game changer' in warfare." The drones primary function will be for surveillance -- North Korea has launched a number of ballistic missile tests this year and many of them came without warning.


US Army Testing Soldier-Enhancing Exoskeleton To Improve Battlefield Energy

International Business Times

Science fiction has a funny habit of becoming science fact after enough time has passed. The wide-eyed wonder of children sitting cross-legged in front of the TV eventually becomes inspiration for incredible feats of engineering, or the means of our own destruction. The latest example of this phenomenon is a new, powered up exoskeleton the U.S. Army is testing, per Scout. There are tons of examples of this sort of thing in science fiction. It usually involves military personnel enhancing their combat capabilities with some manner of armor or exoskeleton.


AI Experts Warn Autonomous Weapons May Become 'Third Revolution In Warfare'

International Business Times

Artificial Intelligence (AI) in warfare has been growing rapidly. Several weapons now use integrated AI software to slowly reduce the number of soldiers in direct mortal peril. These weapon systems can target and attack anyone without human intervention. But, the growth of this technology is raising a few eyebrows. Several prominent scientists have already questioned the future of AI machinery simply because of the unpredictability.


Putin Predicts Superhuman Soldiers Will Be Worse Than Nuclear Bombs

International Business Times

Russian president Vladimir Putin wanted world leaders to have regulations in store for superhuman soldiers in the future in case they turn in to mass killers who feel no pain or fear, The Express reported Monday. The statement came after he warned attendees of the "World Festival of Youth and Students" Saturday. Genetically-modified superhuman soldiers are a possible danger, because scientists are close to breaking the genetic code. "He can be a genius mathematician, a brilliant musician or a soldier, a man who can fight without fear, compassion, regret or pain," Putin said in his speech for the festival's closing ceremony, according to Express. "What I have just described might be worse than a nuclear bomb," Putin proclaimed, in front of the 20,000 young women and men attending the festival, which was held in the Olympic Park in Sochi.


spacex-launch-photos-see-latest-falcon-9-launches-2601362

International Business Times

The Falcon 9 used for the mission launched 10 Iridium satellites from Vandenberg Air Force Base in California. The launch got 10 satellites into orbit, SpaceX is contracted to launch 75 of these communication satellites for Iridium and with Monday's launch has successfully put 30 into orbit. After the launch and deployment of the satellites the first stage of the rocket then entered Earth's atmosphere again and landed upright on the drone ship "Just Read The Instructions." The third launch of a bath of 10 Iridium satellites took place at Vandenberg Air Force base in California.


Who Is Sally Jones? ISIS Member 'White Widow' Allegedly Killed In Syria

International Business Times

Sally Jones, a former punk rocker from Kent, United Kingdom, who gained notoriety as "Mrs Terror" after joining the Islamic State group (also called ISIS), was reportedly killed in a United States drone strike along with her 12-year old son Jojo in Syria as she tried to escape Raqqa, the Sun reported. Though Whitehall sources confirmed reports that Jones was killed, according to the Guardian, the Pentagon was unable to confirm the news. Jones collected another nickname -- White Widow --after Hussain was killed by a U.S. army drone in IS group capital of Raqqa in 2015. Metro reported that in a Twitter post after Hussain's death, Jones claimed she was "proud my husband was killed by the biggest enemy of Allah, may Allah be pleased with him."


North Korea Hacking War: Attack Planned To Target US Power Grid

International Business Times

North Korea had plans to direct a cyber attack against power grids in the United States and successfully launched an attack directed at South Korea's Ministry of Defense, NBC News reported. While the campaign may have failed, the attempts of North Korean hackers to target utility companies presents a growing risk for American companies that are responsible for keeping the lights on for millions of homes across the country. Many power grids operate on a network separate from the public internet, insulating the systems that control the grid from attackers. North Korean hackers were able to successfully infiltrate South Korea's defense ministry and stole a large collection of military documents that purport to detail wartime contingency plans developed by South Korea and the U.S. A total of 235 gigabytes of military documents were reported to be stolen from South Korea's Defense Integrated Data Centre in a breach that took place in September 2016, and 80 percent of those stolen files have yet to be identified.


SpaceX Launch Schedule: Two Rocket Launches, Landings Planned For This Weekend

International Business Times

Elon Musk's company SpaceX is planning two rocket launches and recoveries both happening in a span of just 48 hours. The two launches will occur on different coasts of the country from one another, the first at Kennedy Space Center in Florida and the second from the Vandenberg Air Force Base in California. The second launch of the 48-hour period is scheduled for 8:37 a.m. EDT Monday from the Vandenberg Air Force Base in California. This is the third launch SpaceX will conduct for Iridium, the company has contracted SpaceX to launch 75 communications satellites for them.


will-artificial-intelligence-solve-cybersecurity-put-experts-out-work-2595731

International Business Times

Artificial intelligence and machine learning is making its way into more security products, helping organizations and individuals automate certain tasks required to keep their services and information safe. Kashyap, the senior vice president and chief product officer at Cylance--a cybersecurity firm known for its use of AI--doesn't view AI and machine learning as a replacement for human workers but rather as a supplemental service that can enable those workers to do their job more efficiently. He said there were now "billions of pieces of malware" in the wild, and "well thought-out cyber campaigns" being carried out on the regular, with targeted threats directed at individuals and organizations that require a more efficient way to check the validity of code and defend against attacks. With a widening gap between the number of security professionals needed compared to the number available--a shortage of more than 1.5 million is expected by 2020--Kashyap determined the issue no longer just required a human scale solution; it needed a computing solution.