F-18
By Firestorm29481
Source: Deviantart.com
@cavalierzee / cavalierzee.tumblr.com
By Firestorm29481
Source: Deviantart.com
~ The US Navy's Ghost WarShip ~
Built by Juliet Marine Systems, a private company in Portsmouth, N.H., it’s designed to fight swarm attacks, water-born IEDs, and, aargghh, piracy. According to Business Insider, “Ghost is intended to have zero radar signature, and the vessel is supposedly difficult for the enemy to spot, let alone target. The ship is nonmagnetic and hard to detect via sonar, making it ideal for infiltration and surveillance of enemy areas.”
~ US Navy Autonomous Swarm Boats ~ A fleet of U.S. Navy boats approached an enemy vessel like sharks circling their prey. Iin this case, part of an exercise conducted by the U.S. Office of Naval Research (ONR), the boats operated without any direct human control: they acted as a robot boat swarm. The tests on Virginia’s James River this past summer represented the first large-scale military demonstration of a swarm of autonomous boats designed to overwhelm enemies. This capability points to a future where the U.S. Navy and other militaries may deploy underwater, surface, and flying robotic vehicles to defend themselves or attack a hostile force. “What’s new about the James River test was having five USVs [unmanned surface vessels] operating together with no humans on board,” said Robert Brizzolara, an ONR program manager. In the test, five robot boats practiced an escort mission that involved protecting a main ship against possible attackers. To command the boats, the Navy use a system called the Control Architecture for Robotic Agent Command and Sensing (CARACaS). The system not only steered the autonomous boats but also coordinated its actions with other vehicles—a larger group of manned and remotely-controlled vessels.
~ Dead In The Water ~
How Israel Committed The Cold Blooded Murder Of US Sailors. June 8, 1967: USS Liberty attacked by Israel in international waters During the Six-Day War, 06 08, Israel attacked and nearly sank the USS Liberty belonging to its closest ally, the USA. Thirty-four American servicemen were killed in the two-hour assault by Israeli warplanes and torpedo boats. BBC Four Investigative Report: Broadcast Saturday 17 May 2003 Israel claimed that the whole affair had been a tragic accident based on mistaken identification of the ship. The American government accepted the explanation. For more than 30 years many people have disbelieved the official explanation but have been unable to rebut it convincingly. Now, Dead in the Water uses startling new evidence to reveal the truth behind the seemingly inexplicable attack. The film combines dramatic reconstruction of the events, with new access to former officers in the US and Israeli armed forces and intelligence services who have decided to give their own version of events. Interviews include President Lyndon Johnson's Secretary of Defence Robert McNamara, former head of the Israeli navy Admiral Shlomo Errell and members of the USS Liberty crew.
~ John Reed and His 1950 Boeing Stearman ~ Photo and caption by Kyle Dykes Photo of the Day: April 29, 2013 Photographed April 2012, Sonoma, CA
~ United States Marine Corps Silent Drill Platoon ~ This is the USMC Silent Drill Platoon when they visited the US Marine Air Station in Beaufort, SC. I happened to be there with my camera. The exhibition was scheduled to be held on the parade field. However, it was moved inside a jet fighter hanger due to rain. Shot with one camera (GY-HD100) in a fixed location. The only editing was to add a title page and take out a few camera movements. Hope you enjoy. By SunDolphin Video Productions
US Navy's PlaceRaider Malware Turns SmartPhone Into A Spy
Malware Produces 3D Models Of Your Phone's Surroundings
Researchers from the U.S. Naval Surface Warfare Center have developed malicious software that can remotely seize control of the camera on an infected smartphone and employ it to spy on the phone’s user.
The malware, dubbed “PlaceRaider,” “allows remote hackers to reconstruct rich, three-dimensional models of the smartphone owner’s personal indoor spaces through completely opportunistic use of the camera,” the researchers said in a study published last week.
The program uses images from the camera and positional information from the smartphone’s gyroscopic and other sensors to map spaces the phone’s user spends a lot of time in, such as a home or office.
“Remote burglars” could use these three-dimensional models to “study the environment carefully and steal virtual objects [visible to the camera] … such as as financial documents [or] information on computer monitors,” the researchers reported.
Because users often do not realize that a smartphone is basically a small computer, and because there are few security products available, smartphones are considered highly vulnerable to hackers.
Commercial software, for instance, can turn smartphones into microphones and tracking devices.
But PlaceRaider is the first known example of malware developed to exploit the high-definition cameras that are now ubiquitous on smartphones.
The study was a collaboration between the Navy center team and researchers from the School of Informatics and Computing at Indiana University.