Risk
12/14/2012
02:04 PM
John Foley
John Foley
Slideshows
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Military Drones Present And Future: Visual Tour

The Pentagon's growing fleet of unmanned aerial vehicles ranges from hand-launched machines to the Air Force's experimental X-37B space plane.
Previous
19 of 22
Next


If you've ever thrown a paper airplane, you have a general idea of how to get the Puma AE (All Environment) into the air. It's small, simple and rugged, and it can land on the ground or water. Designed for intelligence, surveillance, reconnaissance and targeting, the Puma is equipped with both an electro-optical camera and an infrared camera.

Image credit: Aerovironment

RECOMMENDED READING:

Drones To Fly U.S. Skies, In DOD Plans

Military Transformers: 20 Innovative Defense Technologies

Spy Tech: 10 CIA-Backed Investments

14 Amazing DARPA Technologies On Tap

Air Force Drone Controllers Embrace Linux, But Why?

Secret Spy Satellite Takes Off: Stunning Images

5 Items Should Top Obama's Technology Agenda

U.S. Military Robots Of The Future: Visual Tour

Iran Hacked GPS Signals To Capture U.S. Drone

Previous
19 of 22
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
jc
50%
50%
jc,
User Rank: Apprentice
1/3/2013 | 6:42:33 PM
re: Military Drones Present And Future: Visual Tour
Phantom Ray looks exactly like a 1950s cartoon of a UFO. Perhaps they've been test flying these things prior to last year!
D. Henschen
50%
50%
D. Henschen,
User Rank: Apprentice
1/3/2013 | 3:55:35 PM
re: Military Drones Present And Future: Visual Tour
It might alarm you to learn that the use of surveillance drones has been authorized by executive order over U.S. skies. It's all part of the post-9/11, police-state mentality that gave rise to the Patriot Act and other tramplings upon personal freedoms and privacy that could easily be abused...
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0560
Published: 2014-09-17
Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors.

CVE-2014-0561
Published: 2014-09-17
Heap-based buffer overflow in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0567.

CVE-2014-0562
Published: 2014-09-17
Cross-site scripting (XSS) vulnerability in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on OS X allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Universal XSS (UXSS)."

CVE-2014-0563
Published: 2014-09-17
Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allow attackers to cause a denial of service (memory corruption) via unspecified vectors.

CVE-2014-0565
Published: 2014-09-17
Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0566.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
CISO Insider: An Interview with James Christiansen, Vice President, Information Risk Management, Office of the CISO, Accuvant