Risk
12/14/2012
02:04 PM
John Foley
John Foley
Slideshows
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Military Drones Present And Future: Visual Tour

The Pentagon's growing fleet of unmanned aerial vehicles ranges from hand-launched machines to the Air Force's experimental X-37B space plane.
Previous
17 of 22
Next


The easy-to-assemble Micro Air Vehicle (MAV) is a modular system that can be set up and airborne within 10 minutes. Pictured here is the T-Hawk, manufactured by Honeywell, designed for use in support of intelligence, surveillance and reconnaissance and with real-time video capture for "hover and stare" situations.

Image credit: Navy

RECOMMENDED READING:

Drones To Fly U.S. Skies, In DOD Plans

Military Transformers: 20 Innovative Defense Technologies

Spy Tech: 10 CIA-Backed Investments

14 Amazing DARPA Technologies On Tap

Air Force Drone Controllers Embrace Linux, But Why?

Secret Spy Satellite Takes Off: Stunning Images

5 Items Should Top Obama's Technology Agenda

U.S. Military Robots Of The Future: Visual Tour

Iran Hacked GPS Signals To Capture U.S. Drone

Previous
17 of 22
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
jc
50%
50%
jc,
User Rank: Apprentice
1/3/2013 | 6:42:33 PM
re: Military Drones Present And Future: Visual Tour
Phantom Ray looks exactly like a 1950s cartoon of a UFO. Perhaps they've been test flying these things prior to last year!
D. Henschen
50%
50%
D. Henschen,
User Rank: Apprentice
1/3/2013 | 3:55:35 PM
re: Military Drones Present And Future: Visual Tour
It might alarm you to learn that the use of surveillance drones has been authorized by executive order over U.S. skies. It's all part of the post-9/11, police-state mentality that gave rise to the Patriot Act and other tramplings upon personal freedoms and privacy that could easily be abused...
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6090
Published: 2015-04-27
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) DataMappingEditorCommands, (2) DatastoreEditorCommands, and (3) IEGEditorCommands servlets in IBM Curam Social Program Management (SPM) 5.2 SP6 before EP6, 6.0 SP2 before EP26, 6.0.3 before 6.0.3.0 iFix8, 6.0.4 before 6.0.4.5 iFix...

CVE-2014-6092
Published: 2015-04-27
IBM Curam Social Program Management (SPM) 5.2 before SP6 EP6, 6.0 SP2 before EP26, 6.0.4 before 6.0.4.6, and 6.0.5 before 6.0.5.6 requires failed-login handling for web-service accounts to have the same lockout policy as for standard user accounts, which makes it easier for remote attackers to cause...

CVE-2015-0113
Published: 2015-04-27
The Jazz help system in IBM Rational Collaborative Lifecycle Management 4.0 through 5.0.2, Rational Quality Manager 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Team Concert 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Requirements Composer 4.0 through 4.0.7, Rational DOORS Next Generation...

CVE-2015-0174
Published: 2015-04-27
The SNMP implementation in IBM WebSphere Application Server (WAS) 8.5 before 8.5.5.5 does not properly handle configuration data, which allows remote authenticated users to obtain sensitive information via unspecified vectors.

CVE-2015-0175
Published: 2015-04-27
IBM WebSphere Application Server (WAS) 8.5 Liberty Profile before 8.5.5.5 does not properly implement authData elements, which allows remote authenticated users to gain privileges via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.