A Freedom of Information request reveals that aerial drones are rife with expensive technical problems.
The aerial disasters described draw attention not only to the technical limitations of drone warfare, but to larger conceptual flaws inherent in such operations. Launched and landed by aircrews close to battlefields in places like Afghanistan, the drones are controlled during missions by pilots and sensor operators—often multiple teams over many hours—from bases in places like Nevada and North Dakota. They are sometimes also monitored by “screeners” from private security contractors at stateside bases like Hurlburt Field in Florida. (A recent McClatchy report revealed that it takes nearly 170 people to keep a single Predator in the air for 24 hours.)
M. David Weisman, a magistrate judge in Illinois’s Eastern Division, denied a federal warrant application that would have allowed law enforcement officers to force suspects to unlock their mobile devices with a fingerprint, ruling that the suspects’ Fourth Amendment (undue search and seizure) and Fifth Amendment (self-incrimination) rights protected them from being forced to unlock […]
Elenco’s Night ‘n Day Mechanical Globe uses a system of translucent, exposed gears to rotate an internally illuminated globe that displays the seasonally adjusted, real-time night/day terminator as it spins.
DJI is the world’s leading designer and producer of easy-to-fly drones and aerial photography systems. If you’re a drone enthusiast, you want a DJI. If you know absolutely nothing about drones and think they’re weird, if you win a DJI you’re going to become a drone enthusiast.Enter this giveaway (for free, yes) and you’ll get a […]
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]