ISR

ISR

image provided by pixabay

Boeing has delivered its first "Orca" Extra Large Uncrewed Undersea Vehicle to the US Navy. The Orca is the first of a new class...
image provided by pixabay

Sometimes scientists struggling with innovation find the perfect solution right under their noses- in nature. Following is a selection of innovative nature-based technology, provided...
image provided by pixabay

Chinese scientists developed a new device called the “Golden Veil” that deceives air defense systems by disguising cruise missiles as large aircraft (like jetliners),...
image provided by pixabay

Armies worldwide use various automated machines for military purposes, combat, cargo, intelligence gathering, and much more. The following are 10 of the world’s most...
image provided by pixabay

Nano spy helicopters are seemingly besting the war of drones over the skies of Ukraine. Called Black Hornets, these small drones can fly unheard...
image provided by pixabay

The Royal New Zealand Navy will soon receive its first 6.8-meter renewable-powered Uncrewed Surface Vessel (USV) for trial. Called "Bluebottle," it is meant to provide persistent...
image provided by pixabay

AUKUS member countries (the United States, United Kingdom, and Australia) revealed they mean to use advanced AI to find and track Chinese submarines. Defense...
image provided by pixabay

American defense company “Anduril Industries” has signed with a US customer on a new subsonic VTOL drone that can be used for surveillance missions...
images provided by pixabay

There is a growing development and deployment of AI-controlled drones that can autonomously select and attack human targets. The US is reportedly developing a...
image provided by pixabay

In our increasingly digital society, privacy is getting more and more important, and according to the European General Data Protection Regulation there is a...
images provided by pixabay

iHLS is an accelerator for the security sector and its various unique characteristics that provides startups with recognition, international exposure, access to investors and...
images provided by pixabay

Researchers in China made UAVs communicate via “group chats” to discuss and assign work to one another, much like human teams. The research was done...
image provided by pixabay

Robotics experts claim that the future of the industry lies in shape-changing robots. Such robots provide unrivaled adaptability and versatility, and show promise in...
image provided by pixabay

Kraken Technology Group and L3Harris have announced an official collaboration to advance the K40 MANTA USSV, with an expected 10 days of autonomous operations...
image provided by pixabay

Two Defense Tech Firms Sign Deal for AI Military Surveillance Machine These two leading defense companies have signed a long-term agreement to develop and deliver...
image provided by pixabay

There is a worldwide growing significance in modern maritime security of drone submarines, also called "uncrewed underwater vehicles" (UUVs). These UUVs are becoming increasingly...
image provided by pixabay

Shield AI has unveiled its new V-BAT Teams system, which enables more V-BAT drones to work together as a giant swarm. The company reportedly...
images provided by pixabay

Many security cameras are exposed to hacktivists in Israel, which places their owners and the people around them at substantial risk. After Hamas’ attack on...
image provided by pixabay

Academic researchers from four US universities used artificial intelligence and machine learning in a technique called Side Eye to extract audio from static photos...
image provided by pixabay

Nowadays, most military spying is conducted by satellites in space, but there’s a surprisingly slow new kid on the block that might change the...
image provided by pixabay

Rights advocates call for the ban of various forms of biometric surveillance, predictive policing, and “harmful” uses of AI in migration control in the...
image provided by pixabay

A badly defended security camera is an easy target for hackers, as there are tools for easily hacking internet protocol (IP) cameras, and research...