Toggle light / dark theme

Start listening with a 30-day Audible trial and your first audiobook is free. Visit.
http://www.audible.com/isaac or text “isaac” to 500–500.
Future battlefields will employ ever-more technology, whether that battlefield is on earth, in the sea, in space, or in cyberspace. Today we will examine the roles robots, drones, artificial intelligence, armored suits, and nanotech may play in the future of war.

Visit our Website: http://www.isaacarthur.net.
Support us on Patreon: https://www.patreon.com/IsaacArthur.
Facebook Group: https://www.facebook.com/groups/1583992725237264/
Reddit: https://www.reddit.com/r/IsaacArthur/
Twitter: https://twitter.com/Isaac_A_Arthur on Twitter and RT our future content.
SFIA Discord Server: https://discord.gg/53GAShE

Listen or Download the audio of this episode from Soundcloud:
Episode’s Audio-only version: https://soundcloud.com/isaac-arthur-148927746/the-next-century-of-war.
Episode’s Narration-only version: https://soundcloud.com/isaac-arthur-148927746/the-next-centu…ation-only.

Credits:

If you’re ready for connectivity on the move, SpaceX’s Starlink satellite broadband may soon be the answer. The US Federal Communications Commission on Thursday gave the internet provider the greenlight to provide service on moving vehicles, boats and planes.

The new authority should help SpaceX meet “the growing user demands that now require connectivity while on the move,” wrote FCC international bureau chief Tom Sullivan wrote in the approval, “whether driving an RV across the country, moving a freighter from Europe to a U.S. port, or while on a domestic or international flight.”

Earlier this year, Starlink began selling Starlink for RVs, but the service wasn’t designed to work on the move — it was intended for users traveling to areas with slow or no broadband alternatives.

Shadow IT refers to the practice of users deploying unauthorized technology resources in order to circumvent their IT department. Users may resort to using shadow IT practices when they feel that existing IT policies are too restrictive or get in the way of them being able to do their jobs effectively.

An old school phenomenon

Shadow IT is not new. There have been countless examples of widespread shadow IT use over the years. In the early 2000s, for example, many organizations were reluctant to adopt Wi-Fi for fear that it could undermine their security efforts. However, users wanted the convenience of wireless device usage and often deployed wireless access points without the IT department’s knowledge or consent.

What else can deepfakes do?We’ve seen examples of deepfakes being used almost to change the course of history when a Zelensky footage emerged back in March and told the Ukrainian army to lay down arms amid the Russian invasion. Fortunately, it was sloppy, and the army didn’t buy that. And now, if you consider what happens when a post-covid world that birthed many remote job opportunities for digital nomads merges with AI, The FBI Internet Crime Complaint Center (IC3) has t… See more.


The Federal Bureau of Investigation (FBI) has warned that some people are using deepfakes to apply for remote tech jobs.

SpaceX’s Starlink provided the fastest satellite internet in the world.

Starlink has been equally praised in recent months for helping civilians in Ukraine and criticized for making astronomical work harder to the point it might endanger humanity.

There’s no denying the experience it provides is impressive, with one user recently telling IE it allowed him to live an enviable off-grid lifestyle with 300 watts of solar energy.

If you need the hardware.


A separate study used metasurfaces as a telephone of sorts to help two people text simple messages, all without lifting a finger.

Direct brain-to-brain communication isn’t new. Previous studies using non-invasive setups had participants playing 20 questions with their brain waves. Another study built a BrainNet for three volunteers, allowing them to play a Tetris-like game using brainwaves alone. The conduit for those mindmelds relied on cables and the internet. One new study asked if metasurfaces could do the same.

Led by Dr. Tie Jun Cui at the Institute of Electromagnetic Space, Southeast University in China, the study linked a well-known brainwave signal, P300, to the properties of a metasurface. Their setup, electromagnetic brain-computer-metasurface (EBCM), used brainwaves to control a particular type of metasurface known as an information metasurface, which can code 0s and 1s like an electronic circuit board.

To solve a long-standing puzzle about how long a neutron can “live” outside an atomic nucleus, physicists entertained a wild but testable theory positing the existence of a right-handed version of our left-handed universe. They designed a mind-bending experiment at the Department of Energy’s Oak Ridge National Laboratory to try to detect a particle that has been speculated but not spotted. If found, the theorized “mirror neutron”—a dark-matter twin to the neutron—could explain a discrepancy between answers from two types of neutron lifetime experiments and provide the first observation of dark matter.

“Dark matter remains one of the most important and puzzling questions in science—clear evidence we don’t understand all matter in nature,” said ORNL’s Leah Broussard, who led the study published in Physical Review Letters.

Neutrons and protons make up an atom’s nucleus. However, they also can exist outside nuclei. Last year, using the Los Alamos Neutron Science Center, co-author Frank Gonzalez, now at ORNL, led the most precise measurement ever of how long free neutrons live before they decay, or turn into protons, electrons and anti-neutrinos. The answer—877.8 seconds, give or take 0.3 seconds, or a little under 15 minutes—hinted at a crack in the Standard Model of particle physics. That model describes the behavior of subatomic particles, such as the three quarks that make up a neutron. The flipping of quarks initiates neutron decay into protons.

By Chuck Brooks


Our Growing Digital Connected World — Made For Botnets

There are dire implications of having devices and networks so digitally interconnected when it comes to bot nets. Especially when you have unpatched vulnerabilities in networks. The past decade has recorded many botnet cyber-attacks. Many who are involved in cybersecurity will recall the massive and high profile Mirai botnet DDoS attack in 2016. Mirai was an IoT botnet made up of hundreds of thousands of compromised IoT devices, It targeted Dyn—a domain name system (DNS) provider for many well-known internet platforms in a distributed denial-of-service (DDoS) attack. That DDoS attack sent millions of bytes of traffic to a single server to cause the system to shut down. The Dyn attacks leveraged Internet of Things devices and some of the attacks were launched by common devices like digital routers, webcams and video recorders infected with malware.