AUTHOR ARCHIVES

Patrick Tucker

Technology Editor Patrick Tucker is technology editor for Defense One. He’s also the author of The Naked Future: What Happens in a World That Anticipates Your Every Move? (Current, 2014). Previously, Tucker was deputy editor for The Futurist for nine years. Tucker has written about emerging technology in Slate, The Sun, MIT Technology Review, Wilson Quarterly, The American Legion Magazine, BBC News Magazine, Utne Reader, and elsewhere.
Results 921-930 of 1188

Hackers to Military: Replace Us With Robots? Ha!

August 10, 2015 FROM NEXTGOV arrow LAS VEGAS, Nev.— Every year, thousands of information-security specialists, computer scientists, and a few mohawked geeks who proudly wear the moniker of hacker gather here for a very particular digital war game:, the DEF CON capture- the-flag, or CTF, competition. To win, you have to find weaknesses in other teams'...

Someone At DEF CON Made a Drone That Hacks Computers

August 10, 2015 LAS VEGAS, Nev. – Forget Facebook drones that broadcast Wifi. The future is drones that hack from above. A company called Aerial Assault has turned a quadcopter into a flying hacker that scans the world below for insecure devices and vulnerable Wifi ports. Its makers say they built the tool...

Hackers to Military: Replace Us With Robots? Ha!

August 9, 2015 LAS VEGAS, Nev.— Every year, thousands of information-security specialists, computer scientists, and a few mohawked geeks who proudly wear the moniker of hacker gather here for a very particular digital war game:, the DEF CON capture- the-flag, or CTF, competition. To win, you have to find weaknesses in other teams’...

The Robots Taking Your Job Could Get You Killed

August 8, 2015 FROM NEXTGOV arrow So you decided to let the robots run your factory, but to make sure you could watch them from your lounge chair in Maui, you hooked your 1990s supervisory control system to the Internet of 2015. Now the whole thing is going haywire. Someone has remotely commanded your automated plant...

The Robots Taking Your Job Could Get You Killed

August 6, 2015 LAS VEGAS, Nev. — So you decided to let the robots run your factory, but to make sure you could watch them from your lounge chair in Maui, you hooked your 1990s supervisory control system to the Internet of 2015. Now the whole thing is going haywire. Someone has remotely...

Hacker Cracks Satellite Communications Network

August 6, 2015 FROM NEXTGOV arrow LAS VEGAS, Nev. — A researcher says he can eavesdrop on — and even alter — data flowing through a satellite network operated by Globalstar, which provides communications services and equipment to militaries, oil companies, and many other organizations. “I can say with 100-percent confidence I did inject data back...

Hacker Cracks Satellite Communications Network

August 6, 2015 LAS VEGAS, Nev. — A researcher says he can eavesdrop on — and even alter — data flowing through a satellite network operated by Globalstar, which provides communications services and equipment to militaries, oil companies, and many other organizations. “I can say with 100-percent confidence I did inject data back...

Air Force Looks To Make Smarter and Deadlier Drones

August 4, 2015 Can a weapon designed to take out low-tech terrorists be upgraded to attack an enemy with its own air force? Today, the United States operates armed drones like the General Atomics Predator and Reaper primarily in what’s called permissive environments — places like Syria or Iraq where the enemy lacks...

The Air Force Wants To Make Its Drones Smarter and Deadlier

August 3, 2015 Can a weapon designed to take out low-tech terrorists be upgraded to attack an enemy with its own air force? Today, the United States operates armed drones like the General Atomics Predator and Reaper primarily in what’s called permissive environments — places like Syria or Iraq where the enemy lacks...

Hacking Critical Infrastructure: A How-To Guide

July 31, 2015 How easy would it be to pull off a catastrophic cyber attack on, say, a nuclear power plant? At next week’s Black Hat and DEF CON cybersecurity conferences, two security consultants will describe how bits might be used to disrupt physical infrastructure. U.S. Cyber Command officials say this is the...