Toggle light / dark theme

WASHINGTON — The public’s idea of a war in space is almost entirely a product of Hollywood fantasy: Interstellar empires battling to conquer the cosmos, spaceships going head to head in pitched dogfights.

The reality of how nations will fight in space is much duller and blander. And some of the key players in these conflicts will be hackers and lawyers.

Savvy space warriors like Russia’s military already are giving us a taste of the future. They are jamming GPS navigation signals, electronically disrupting satellite communications links and sensors in space. Not quite star wars. [The Most Dangerous Space Weapons Concepts Ever].

Read more

After less than eight months of development, the algorithms are helping intel analysts exploit drone video over the battlefield.

Earlier this month at an undisclosed location in the Middle East, computers using special algorithms helped intelligence analysts identify objects in a video feed from a small ScanEagle drone over the battlefield.

A few days into the trials, the computer identified objects — people, cars, types of building — correctly about 60 percent of the time. Just over a week on the job — and a handful of on-the-fly software updates later — the machine’s accuracy improved to around 80 percent. Next month, when its creators send the technology back to war with more software and hardware updates, they believe it will become even more accurate.

Read more

From 2008–2011, Sandia National Labs and Northrop Grumman designed nuclear drones that would be able to fly for many months.

China has put $3.3 billion into making new highly compact nuclear reactors which would also use for nuclear powered drones.

The potential impact of nuclear-powered drones can be seen by comparing them with existing aircraft such as the MQ-9 Reaper, which is used extensively in Afghanistan and Pakistan in operations against insurgents. The Reaper presently carries nearly two tonnes of fuel in addition a similar weight of munitions and other equipment and can stay airborne for around 42 hours, or just 14 hours when fully loaded with munitions.

Read more

Underground settings are becoming increasingly relevant to global security and safety. Rising populations and urbanization are requiring military and civilian first responders to perform their duties below ground in human-made tunnels, underground urban spaces, and natural cave networks. Recognizing that innovative, enhanced technologies could accelerate development of critical lifesaving capabilities, DARPA today announced its newest Grand Challenge: the DARPA Subterranean Challenge, or SubT for short.

Read more

But the F-35 program, usually not one to shy away from boasting about their achievements, has been hushed about the prospect of defeating one of the gravest threats to the US.

“I can tell you that the F-35 is a multi-mission fighter,” Commander Patrick Evans of the Office of the Secretary of Defense told Business Insider when asked about the program. “It would be inappropriate to speculate on future capabilities or missions of the weapon system.”

Rep. Duncan Hunter, a member of the House Armed Services Committee, was more open to speculating about why the Pentagon hadn’t gone through with missile intercepting planes.

Read more

Daniel Ellsberg gained notoriety in the early 1970s for leaking the Pentagon Papers, the Defense Department’s top-secret history of the Vietnam War, and then for outspokenly protesting the war and the government’s secrecy which sustained it. Yet few, then or now, are aware that he spent much of the previous decade immersed in highly classified studies of the U.S. nuclear-war machine: how it works, who can launch an attack, and how much devastation it can wreak if someone ever pushed the button.

His new book, The Doomsday Machine: Confessions of a Nuclear War Planner, is his long-gestating memoir of those times and the years since, and it is one of the best books ever written on the subject—certainly the most honest and revealing account by an insider who plunged deep into the nuclear rabbit hole’s mad logic and came out the other side.


Dr. Strangelove “was a documentary,” writes the man behind the Pentagon Papers.

Read more

Max Tegmark’s Life 3.0 tries to rectify the situation. Written in an accessible and engaging style, and aimed at the general public, the book offers a political and philosophical map of the promises and perils of the AI revolution. Instead of pushing any one agenda or prediction, Tegmark seeks to cover as much ground as possible, reviewing a wide variety of scenarios concerning the impact of AI on the job market, warfare and political systems.


Yuval Noah Harari responds to an account of the artificial intelligence era and argues we are profoundly ill-prepared to deal with future technology.

Read more

‘UN diplomats confirmed that the new email release would worsen the “bad name” of gene drives in some circles. “Many countries [will] have concerns when this technology comes from DARPA, a US military science agency,” one said.‘.


Cutting-edge gene editing tools such as Crispr-Cas9 work by using a synthetic ribonucleic acid (RNA) to cut into DNA strands and then insert, alter or remove targeted traits. These might, for example, distort the sex-ratio of mosquitoes to effectively wipe out malarial populations.

Some UN experts, though, worry about unintended consequences. One told the Guardian: “You may be able to remove viruses or the entire mosquito population, but that may also have downstream ecological effects on species that depend on them.”

“My main worry,” he added, “is that we do something irreversible to the environment, despite our good intentions, before we fully appreciate the way that this technology will work.”

Cryptography and radar were technologies that won World War 2. Broken codes let the allies know where major forces were being moved. So the US fleet could choose where to intercept the Japanese Navy for the Battle of Midway. Radar and sonar then provided realtime tracking of the Japanese forces during the battle.

This is a summary of information from a Foreign Policy article by Thomas E. Ricks.

Quantum entanglement, quantum superposition, and quantum tunneling can be applied in new forms of computation, sensing, and cryptography.

Read more