Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Delivering the Digital Government Mission
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: drones
Unmanned drones are vulnerable to computer hacking that could allow outside force to control them, according to new research.
After a decade of costly conflict in Iraq and Afghanistan, the American way of war is evolving toward less brawn, more guile.
Drone aircraft spy on and attack terrorists with no pilot in harm's way. Small teams of special operations troops quietly train and advise foreign forces. Viruses sent from computers to foreign networks strike silently, with no American fingerprint.
The White House is partially lifting the lid of secrecy on its counterterrorism campaign against al-Qaida in Yemen and Somalia by formally acknowledging for the first time that it is conducting lethal attacks in those countries.
Civilian cousins of the unmanned military aircraft that have tracked and killed terrorists in the Middle East and Asia are in demand by police departments, border patrols, power companies, news organizations and others wanting a bird's-eye view that's too impractical or dangerous for conventional planes or helicopters to get.
The new Predator-B Unmanned Aerial System will be the fourth launched at at the National Air Security Operations Center in Sierra Vista, Ariz., and the second of two aircrafts earmarked in an August 2010 budget supplemental.
Steven Gitlin, vice president of Aerovironment, which creates the backpackable drone — formally known as the Switchblade Agile Munition Systems — joined the Federal Drive with Tom Temin and Amy Morris to discuss how it works.
Recent report in The New York Times explains how.
The computer virus that hit the Pentagon's drone program last month was not directed at the military systems but was common malware used to steal log-ins and passwords used in online gaming, military officials said Wednesday.
So did US drones kill Usama Bin Laden's son Saad? Words like probably and likely are being used to address the question. Why? Intelligence sources close to the situation say when people are killed in missile strikes, the only way to identify them is to test the DNA at the scene. Problem is in some countries for a number of reasons. DNA testing is not allowed. So, without a body, there's no way to say for sure that he was killed or even there.