Autonomous Unmanned Vehicles (s) are sent to complex and faraway espionage and reconnaissance missions, thereby avoiding the high risks posed to manned missions.
This specialedition will shed some light, as far as is allowed to divulge, about the special intelligence ops s undertake.http://bit.ly/1mpRyZw #Drone, #UAS, #כטבמ
The Ground X-Vehicle Technology (GXV-T) program is a concept based on the idea of increased mobility – improvements in armor-penetration are moving faster than those in the school of armor protection. For this reason, DARPA opted to design a vehicle based around maneuverability.
“GXV-T’s goal is not just to improve or replace one particular vehicle—it’s about breaking the ‘more armor’ paradigm and revolutionizing protection for all armored fighting vehicles,” DARPA writes on the tank concept’s site.
The GXV-T design allow for U.S. troops to account for more varied combat scenarios in multifarious environments. DARPA wants this tank’s base speed to be double that of other tanks, and wants a weight reduction of at least 50 percent. The plan to achieve this include removing unnecessary crew members. DARPA’s video on YouTube highlights some of the factors playing into the tank’s development.
As more modern military advancements open up new options, designers and engineers need to start thinking outside of the box, DARPA writes – and this could be the next step in military evolution.http://bit.ly/1mkWWNa #ArmoredVehicle, #DARPA, #Tank, #USArmy, #מחקרופיתוח, #צבאארהב, #שריון
It is hardly a secret that when some people visit their family members or friends in prison, they have been to known to smuggle them drugs and other contraband. Visitors often pass stringent examinations, check ups and detection points in order to prevent this.
A study is currently underway at Israel’s Institute of Technology (Technion) in cooperation with the Internal Security Ministry, focusing on developing a new technology for detecting drugs and other foreign objects secreted on people’s person using the test subject’s smell patterns. Prison visitors will be obliged to exhale into the device, and samples of their breath will indicate whether they are carrying any drugs or foreign objects surreptitiously.
Zvi Kanfar, head of Exact Sciences, Natural Sciences and Technologies Division under the Chief Scientist at the Ministry of Internal Security explains: “nowadays, the check points use invasive tests or screening. We are in contact with the Technion’s Chemical Engineering Department, where Professor Hossam Haick is conducting a study focusing on early detection of various conditions, including cancer, using smell patterns emitted from the lungs.
The study, estimated at millions of Euro, is conducted in cooperation with the EU. A feasibility study completed earlier has already proven successfully. There is a positive outlook for a prototype of a portable device in two years’ time. The test subject will exhale and emit air into the device, generating an immediate indication whether this person is hiding any drugs or foreign objects.
Kanfar explains the difficulty involved with the experiments into this new technology, as the experiment’ volunteers are required to swallow a foreign object that may pose a health risk. Work is underway to find techniques that will enable safe experiments.
The project involves the Ministry of Internal Security, the Technion and Israel’s Prison Service, which is a natural client for the device. Experts claim that in later stages, such devices will be a common occurrence at airport checkpoints.http://bit.ly/1o7Dhfi #ElectronicNose, #RD, #אףאלקטרוני, #מחקרופיתוח
The Summary of the “Daniel Project” report states as follows: “we are faced with ’irrational’ enemies, countries or terrorist organizations, armed with nuclear or biological weapons and poised to use them. In view of this, we must not rule out that Israel might find itself in a ’conflict situation’ not only vis-à-vis a well-defined adversary-country, but also against a non-governmental body which will apply a ’suicide bomber’ which will serve as the ’trigger’ for a war designed to ’annihilate the cancer of Zionism’. In such an eventuality, Israel will not be able to apply its nuclear capabilities against an adversarial country, since none could be designated as the source of the unconventional terrorist attack. For this reason, the team suggest Israel develop a practical and effective preemptive strike policy.
Israel’s strategic future, the team notes further, vastly depends on the prosperity of the Israeli economy. Clearly, an ever-increasing expenditure on defense in terms of the
share of Israel’s GNP would have an adverse economic effect. A defense budget that would exceed 7% of Israel’s GNP would seriously hinder Israel’s strength.
The team recognizes that Israel is facing intensifying isolation in the international community, so they are of the opinion that Israel would have to rely on its own resources and capabilities than ever before.
This top secret US-Israeli issue had already been uncovered by Nativ Online back in April 2014. The full report has also been released on Wikipedia as well as in a lecture by Prof. Louis Beres at Bet Yeshurun, Huston, Texas. According to various publications, the members of the “Daniel Project” comprise of the following figures: Louis René Beres from the US; Na’aman Belkind, former “Aid on Special Means” to Israel’s minister of Defense, a member of Israel’s Atomic Energy Committee and adviser to Prime Minister Begin on the strike against Iraq’s nuclear reactor; former MAFAT chief Prof. Yitzhak Ben Israel; Rand H. Fishbein, former advisor to Senator Daniel Inouye; Dr. Adir Pridor, mathematician, retired Lt. Colonel in the Israeli Air Force, where he served as senior systems designer and former chief military analyst at RAFAEL; retired MK Yoash Tzidon, retired Colonel in the Israeli Air Force.http://bit.ly/1BQhtgh #Atomic, #CBRNE, #WMDWeapons, #אטום, #נבק, #נשקבלתיקונבנציונאלי
Chief designer Zhang Bing Yan introduced the “software aircraft”, which he filed patents for in 2011. In comments reported by local media he made it clear that he required greater funding to better develop the concept.
According to IHS JANES 360, the inflatables at Tianjin were designated SF-1, SF-2 and SF-3 with wingspans of 2.5 m, 3 m and 4.3 m respectively. Zhang explained they have a useful load of 25 kg, a speed of about 20 km/h, range of about 100 km and a maximum altitude of 4,000 m. The s can be filled with normal air, helium or hydrogen to achieve greater buoyancy.
Apparently constructed of thin polyvinal chloride (PVC) akin to that used for common air mattresses, thes also use air inflation valves from an air mattress and were seen at the show being filled with a simple electric air-pump. Payloads apparently are carried near the centre-of-gravity, while externally-mounted servos operate control flaps. The s at the show used electric motors and Zhang’s craft employs automatic program/computer-control to fly missions.
Theweighs 130 kg while carrying a payload of 50 kg at a maximum speed of 6 km/h. It can traverse a 30 degree slope and has an endurance of two hours. An image showed it carrying four backpacks.http://bit.ly/1mhW7oc #InflatableUAV, #UAS, #כטבמ, #כטבממתנפח
On September 5, the US Army activated a new Cyber Protection Brigade— the first of its kind in the Army — at Fort Gordon, Georgia.
Col. Donald Bray took command of the brigade from Lt. Col. Philippe Persaud, who had been serving as the brigade’s interim commander while it was being set up. Lt. Col. Persaud will stay on as the brigade’s deputy commander.
Armytimes reports that the brigade’s inauguration represents a higher Army investment in its cyberspace capabilities, said Lt. Gen. Edward Cardon, commanding general of Army Cyber Command, in a statement.
The Cyber Protection Brigade comprises Cyber Protection Teams, manned by a mix of soldiers and civilians. The brigade will have 20 of these teams, each with about 39 personnel. The teams will conduct defensive cyberspace operations in support of joint and Army missions, according to information from Army Cyber Command.
All Cyber Protection Teams are trained to a common joint standard, according to the command.
The brigade is “aggressively” manning, training and equipping its teams to support the Army and U.S. Cyber Command, Army Cyber Command said. This push is part of an Army-wide effort to fill the ranks of a selective new military occupational specialty, “cyber network defender,” or 25D. There are more than 700 25D positions across the Army, and the MOS is open to experienced soldiers in the grades of staff sergeant to sergeant major.
The Office of the Chief of Signal accepts application packets from soldiers with backgrounds in information assurance and information technology — regardless of their MOS — mostly at the staff sergeant level. There are limited opportunities for sergeants first class and master sergeants.http://bit.ly/1yieS0c #Cyber, #CyberSecurity, #CyberWarfare, #USArmy, #אבטחתסייבר, #לוחמתסייבר, #סייבר, #צבאארהב
The Vienna-based organization told the Austria Press Agency (APA) the unmanned and unarmed Camcopter drones made by Austrian company Schiebel will be used to support its Special Monitoring Mission (SMM) to monitor the situation on the border between Russia and Ukraine, in particular with regard to the current cease-fire.
According to Global Post the technology will be used to monitor larger areas and to collect information in real-time, which the OSCE will then decide if it will make public.
The OSCE said it was the first time it had used such technology and equipment as part of its operations, and stressed that at no time will the Camcopter drones be armed either at present or in the future, and that their use is solely for reconnaissance and surveillance.
Under the contract Schiebel will provide a minimum of two of the unmanned aerial vehicles () along with a control station, six operators, and three technical staff. Their operation is expected to begin at the end of September or in early October.
Total expenses for the arrangement are not yet known, the APA report stated, though will be paid for by the OSCE participating states.
A new technology installed at the Baltimore City Detention Center (BCDC) will crack down on contraband cell phone use at the facility. Calls are instantly analyzed and any unauthorized phone is simply blocked, although 911 calls will still go through.
Tecore Networks created the Intelligent Network Access Controller (iNAC) Managed Access solution. The iNAC technology prohibits access of contraband cell phones to commercial networks for voice calls, text messaging and Internet services within the facility, while approved users are automatically redirected to the commercial service operator. This is according to Correctional News.
The BCDC has had several issues with illegal cell phone use inside the detention facility, and authorities have said inmates used them to direct a contraband smuggling scheme, transfer payments and alert associates of planned searches.
Governor Martin O’Malley announced last year that he planned on creating specific cell phone legislation after facing national criticism when more than a dozen correctional officers and multiple inmates involved in the Black Guerrilla Family were indicted on charges ranging from money laundering to drug trafficking.
“Contraband cell phone use by inmates represents a clear danger to the citizens of Maryland. We commend Governor O’Malley and the state of Maryland for responding to this threat by being the first state to successfully deploy a comprehensive managed access solution to a facility in a densely populated urban area,” said Harry Lewis, Vice President Sales of Tecore Networks, in a statement. “Our success at both facilities could not have been achieved without the cooperation and support of the Federal Communications Commission and the six national cellular network operators.”
While the new technology is meant to block unwanted calls to the facility, a recent report says that the technology may be blocking calls in surrounding areas as well. The article stated that three people said calls they made when driving near the jail were interrupted with a recording that said they were using an unauthorized or illegal device. Since the cell phone users in the surrounding areas reported the technology malfunction, Tecore did a sweep of the facility and found no issues with the technology, according to The Baltimore Sun.
The FCC has banned the use of cell phone jamming technology except in federal facilities; however, Tecore officials said their technology still allows authorized users to place calls and is therefore not a blanket jam.http://bit.ly/1pk9BLj #CellphoneMonitoring, #CellphoneTracking, #אמצעימעקב, #ניטורטלפוניםניידים
AT&T announced it was introducing a pilot system to its Customer Service Relations (CSR) for recording customers’ calls as well as analyzing content and voice, and in particular for deduction, which will also be based on parallel search in for information in social networks.
Nearly each private or public organization, in Israel and worldwide, which provides customer service over the phone to the general public, records most of the incoming calls to its customer service center. Some of these organizations record all the calls. The stated purpose of recording calls is “improving the service”.
What else do the major corporations (cellular providers, banks, health funds, energy companies, etc.) do with the millions of calls they have recorded and stored? How do the recordings take place and what, in fact, are the technological systems at CSRs?
CSR recording systems for incoming calls have become a major and inseparable part of the array of support technologies at any major organization with a call center. They are used as a critical management tool by the service, marketing and executive divisions of these companies for the purposes of providing service, monitoring malfunctions, marketing and sales.
Nevertheless, the recording systems are only part, albeit significant, of the assortment of technological terms at the disposal of customer service.
The course of incoming calls to call centers begins with a call routing system, which applies some of the features of Interactive Voice Recognition (IVR) systems in order to optimally direct calls to specialized and available representatives, but also in order to “buy time” and regulate call queues during busy times and even in order to “get rid” of those with whom the company may prefer, in some cases, not to engage.
Before the call reaches the rep, the customer’s details are uploaded from the company’s computer systems, including those that may be relevant to the call and to the customer’s “quality grade”. The call also affords the company the chance of an upsell, which the rep may pitch. Synchronizing the call to the rep’s station complete with all the customer details is critical, and among the tools at the reps’ disposal are online logs and journals which enable making records that may be printed and sent to customer by way of call summary.
From the moment a call enters the call center, it is recorded by dedicated systems capable of handling hundreds and even thousands of calls. Each call must have an accurate time-stamp of its entry time and finish, complete with an indexed call description for future file retrieval in the form of an audio-file for various organizational uses.
These uses of recorded calls are many and varied, including genuine company attempts to improve service, but they are also used for practice and training, log record in case of dispute with customers – which is even admissible in many courts – marketing segmentation and so on.
Innovative recording and voice recognition systems (also) feature voice diagnostics enabling reps to identify a customer who is angry and disgruntled, and therefore requires attention, compensation and calming down, or a satisfied and happy customer whose call can also be used as a launching pad for an upsell. Recently, a producer of such call recording systems has featured fraud detection complete with a revolutionary marketing pitch promising the system for merely the cost of the relative decrease in the expenses on theft or fraud installing companies will have saved.
A mass of simultaneous incoming calls to call centers may be a significant sign or feedback for a malfunction (e.g., an energy company, a communications provider) or public order(car accident, fire and so on). CSR systems that direct the calls to the various call centers are capable of tracing their origin and deduce (using additional call features) effective operative conclusions, thereby dispatching first response teams or better prepare for unfolding events. Since CSR systems are interactive, the organizations can quickly or even automatically add an announcement played to waiting callers telling them the is addressed – thereby saving on resources on the one hand and saving customers’ waiting time on the other.
And now for the issue of privacy: each company has its own rules and procedures for using recorded material. Authorizations to play them are given to all sorts of employees (sometimes even junior employees), generally without the caller’s consent to use his or her voice, call information or other details divulged in the course of the conversation, for the purpose of training or some other sue.http://bit.ly/1qLmnsA #CallCenters, #CallRecording, #IVR, #VoiceRecognition, #זיהויקול, #מרכזשירות, #קולסנטר, #שיחותמוקלטות
The House Homeland Security Committee will meet today to address the terrorism fears in a hearing that is titled “Worldwide Threats to the Homeland.”
According to The Hill lawmakers have said ISIS has thousands of members that have U.S. or European passports and could slip into America undetected.
Homeland Security Chairman Rep. Michael McCaul (R-Texas) said it was important to access the vulnerability of U.S. facilities like airports to potential attacks.
“The brutality of ISIS shocks the international conscience as they continue to carry out gruesome attacks in Iraq and Syria,” he said in a statement. “Of major concern to our security is the rapid expansion of this terrorist organization and its recruitment of foreign fighters, many of whom have Western passports that could ease their travel to Europe and the United States to carry out attacks.”
Homeland Security Secretary Jeh Johnson, FBI Director James Comey and National Counterterrorism Center Director Matthew Olsen are scheduled to testify before the panel.
McCaul said the security officials would discuss “threats the United States faces from ISIS and highlight the efforts of the federal government to counter such security concerns here at home.
“We will also examine the continuing danger posed by al Qaeda and its affiliates, particularly in Yemen and Syria, as well as the rising threat of homegrown terrorism and the ever present and growing cyber security risks facing the United States,” he added.
The panel’s Transportation Security subcommittee will also hold a hearing on Thursday about “safeguarding privacy and civil liberties while keeping our skies safe.”http://bit.ly/YSeG8q #AlQaeda, #Cyber, #DHS, #ISIS, #Syria, #אלקעידה, #אלקאעידה, #דאעש, #מחלקתבטחוןהמולדת, #סוריה, #סייבר