In the National Security section of The Washington Post, a fascinating look on how the "Al-Qaeda's leadership has assigned cells of engineers to find ways to shoot down, jam or remotely hijack U.S. drones" in the hopes to "exploit the technological vulnerabilities of a weapons system that has inflicted huge losses upon the terrorist network."
U.S. spy agencies have concluded that al-Qaeda faces "substantial" challenges in devising an effective way to attack drones, according to the top-secret report disclosed by Snowden. Still, U.S. officials and aviation experts acknowledge that unmanned aircraft have a weak spot: the satellite links and remote controls that enable pilots to fly them from thousands of miles away.
In July 2010, a U.S. spy agency intercepted electronic communications indicating that senior al-Qaeda leaders had distributed a "strategy guide" to operatives around the world advising them how "to anticipate and defeat" unmanned aircraft. The Defense Intelligence Agency (DIA) reported that al-Qaeda was sponsoring simultaneous research projects to develop jammers to interfere with GPS signals and infrared tags that drone operators rely on to pinpoint missile targets.
Other projects in the works included the development of observation balloons and small radio-controlled aircraft, or hobby planes, which insurgents apparently saw as having potential for monitoring the flight patterns of U.S. drones, according to the report.
|Vulnerability of Tiger Tanks|
|"It was a suicide mission. None of them had a doubt about that."|
|Snipers of the Taliban|
|You laik ma monkey?|
|The Hotter it Gets, The More We Want to Kill Each Other #ClimateChange|
|“A driverless electric truck began daily freight deliveries on a public road.”|
|CaptchaTweet: Write Tweets in Captcha Form|
|U.S.S. Enterprise Owner's Manual|
|Naked Preacher Lady [NSFW]|
|Recycled Vacuum Lamps|
|Fake Name Generator|
|The (Very Scary) People of Public Transit|
|“A new residential building under construction will feature a flying car skyport on the roof.”|
|Creepstream: Looking at Insecure Camera Feeds From Around the World|
|“You can often hide from an AI video system with the aid of a simple color printout.”|
|“A deep fake sex video emerges in a Google search of your name.”|
|“The company is losing billions, has essentially no underlying value, and its business could be hammered overnight.”|