Blasting Airplane With Lasers Makes It Harder For Ice to Stick

researchers from Fraunhofer Institute for Material and Beam Technology IWS, aircraft manufacturer Airbus, and the Dresden University of Technology in Germany have co-developed a better way to keep planes free of ice and snow. It uses a technology called Direct Laser Interference Patterning (DLIP), where a laser is split into multiple beams that overlap each other creating complex etched patterns on a surface where the beams are focused.

Illustration for article titled Blasting Airplanes With Lasers Makes It Much Harder For Ice to Stick to Wings
Photo: Fraunhofer Institute

By adapting the DLIP technique to create three-dimensional structures at the microscopic level, the laser etching technique is able to turn an airplane’s wing into a material with reduced surface area that ice simply has a hard time holding onto. As a result, after reaching a certain thickness and weight, built up ice simply falls off a wing all on its own. It could not only reduce the need for de-icing procedures at airports, but it could also remove the need for antifreeze and other chemical agents altogether.

Waiting for ice to spontaneously fall off on its own isn’t always an option, like when you’re cruising along at 500+ miles per hour, 30,000 feet in the air. So additional testing by the researchers found that while it took over a minute for ice to melt off a wing surface with 60 watts of heat applied, the same material, treated with the laser etching process, saw ice completely vanish after just five seconds with the same amount of heat. Not only does it mean an aircraft could be cleared of ice much faster without the use of chemicals, but it also means that aircraft manufacturers could include smaller heating systems that were just as effective, but with drastically reduced fuel consumption.

The new use for the DLIP technology isn’t only useful for keeping aircraft safe and free of ice, it could be applied to everything from the blades on giant power-generating windmills, to the hulls of ships braving icy waters. The biggest benefit could be applying it to the windows of a car, making scraping them clean on a cold winter’s morning as easy as wiping away raindrops—assuming, of course, that the etching process still lets you actually see through the glass.

Source: Blasting Airplane With Lasers Makes It Harder For Ice to Stick

Banjo, the company that will use an AI to spy on all of Utah through all their cams Used a Secret Company and Fake Apps to Scrape Social Media

Banjo, an artificial intelligence firm that works with police used a shadow company to create an array of Android and iOS apps that looked innocuous but were specifically designed to secretly scrape social media, Motherboard has learned.

The news signifies an abuse of data by a government contractor, with Banjo going far beyond what companies which scrape social networks usually do. Banjo created a secret company named Pink Unicorn Labs, according to three former Banjo employees, with two of them adding that the company developed the apps. This was done to avoid detection by social networks, two of the former employees said.

Three of the apps created by Pink Unicorn Labs were called “One Direction Fan App,” “EDM Fan App,” and “Formula Racing App.” Motherboard found these three apps on archive sites and downloaded and analyzed them, as did an independent expert. The apps—which appear to have been originally compiled in 2015 and were on the Play Store until 2016 according to Google—outwardly had no connection to Banjo, but an analysis of its code indicates connections to the company. This aspect of Banjo’s operation has some similarities with the Cambridge Analytica scandal, with multiple sources comparing the two incidents.

“Banjo was doing exactly the same thing but more nefariously, arguably,” a former Banjo employee said, referring to how seemingly unrelated apps were helping to feed the activities of the company’s main business.

[…]

Last year Banjo signed a $20.7 million contract with Utah that granted the company access to the state’s traffic, CCTV, and public safety cameras. Banjo promises to combine that input with a range of other data such as satellites and social media posts to create a system that it claims alerts law enforcement of crimes or events in real-time.

“We essentially do most of what Palantir does, we just do it live,” Banjo’s top lobbyist Bryan Smith previously told police chiefs and 911 dispatch officials when pitching the company’s services.

[…]

Motherboard found the apps developed by Pink Unicorn Labs included code mentioning signing into Facebook, Twitter, Instagram, Russian social media app VK, FourSquare, Google Plus, and Chinese social network Sina Weibo.

[…]

One of the former employees said they saw one of the apps when it was still working and it had a high number of logins.

“It was all major social media platforms,” they added. The particular versions of the apps Motherboard obtained, when opened, asked a user to sign-in with Instagram.

Business records for Pink Unicorn Labs show the company was originally incorporated by Banjo CEO Damien Patton. Banjo employees worked directly on Pink Unicorn Labs projects from Banjo’s offices, several of the former employees said, though they added that Patton made it clear in recent years that Banjo needed to wind down Pink Unicorn Labs’ work and not be linked to the firm.

“There was something about Pink Unicorn that was important for Damien to distance himself from,” another former employee told Motherboard.

[…]

ome similar companies, like Dataminr, have permission from social media sites to use large amounts of data; Twitter, which owns a stake in Dataminr, gives the firm exclusive access to its so-called “fire hose” of public posts.

Banjo did not have that sort of data access. So it created Pink Unicorn Labs, which one former employee described as a “shadow company,” that developed apps to harvest social media data.

“They were shitty little apps that took advantage of some of the data that we had but the catch was that they had a ton of OAuth providers,” one of the former employees said. OAuth providers are methods for signing into apps or websites via another service, such as Facebook’s “Facebook Connect,” Twitter’s “Sign In With Twitter,” or Google’s “Google Sign-In.” These providers mean a user doesn’t have to create a new account for each site or app they want to use, and can instead log in via their already established social media identity.

But once users logged into the innocent looking apps via a social network OAuth provider, Banjo saved the login credentials, according to two former employees and an expert analysis of the apps performed by Kasra Rahjerdi, who has been an Android developer since the original Android project was launched. Banjo then scraped social media content, those two former employees added. The app also contained nonstandard code written by Pink Unicorn Labs: “The biggest red flag for me is that all the code related to grabbing Facebook friends, photos, location history, etc. is directly from their own codebase,” Rahjerdi said.

[…]

“Banjo was secretly farming peoples’ user tokens via these shadow apps,” one of the former employees said. “That was the entire point and plan,” they added when asked if the apps were specifically designed to steal users’ login tokens.

[…]

The apps request a wide range of permissions, such as access to location data, the ability to create accounts and set passwords, and find accounts on the device.

Multiple sources said Banjo tried to keep Pink Unicorn Labs a secret, but Motherboard found several links between the two. An analysis of the Android apps revealed all three had code that contained web links to Banjo’s website; each app contained a set of identical data that appeared to be pulled from social network sites, including repeatedly the Twitter profile of Jennifer Peck, who works for Banjo and is also married to Banjo’s Patton. In registration records for the two companies, both Banjo and Pink Unicorn Labs shared the same address in Redwood, California; and Patton is listed as the creator of Pink Unicorn Labs in that firm’s own public records.

Source: Surveillance Firm Banjo Used a Secret Company and Fake Apps to Scrape Social Media – VICE

US Navy flies two EA-18G Growlers autonomously; third Growler used as controller

The US Navy (USN) flew two Boeing EA-18G Growlers as autonomous unmanned air vehicles (UAVs), using a third Growler as a flight controller.

In total, four flights were conducted at Naval Air Station Patuxent River, with tests starting in September 2019, says manufacturer Boeing on 4 February. The aircraft demonstrated 21 missions during flights that took place toward the end of 2019, says Boeing. The type of missions were not disclosed.

Two US Navy EA-18G Growlers over Afghanistan

Source: US Air Force

Two US Navy EA-18G Growlers fly over Afghanistan in January 2020

The flights are a forerunner to using the EA-18G as a mission-controlling platform for autonomous Loyal Wingman UAVs. Unmmaned-manned teaming is a new US Department of Defense concept in aerial combat where some work would be offloaded to UAVs, especially dangerous missions.

“This demonstration allows Boeing and the Navy the opportunity to analyse the data collected and decide where to make investments in future technologies,” says Tom Brandt, Boeing manned-unmanned teaming demonstration lead. “It could provide synergy with other US Navy unmanned systems in development across the spectrum and in other services.”

Boeing says the flights were conducted during the USN Warfare Development Command’s annual fleet experiment exercises.

[…]

The USN has said previously that it is planning on upgrading some, if not all, of its 160-example Growler fleet to a Block II configuration, which includes an advanced cockpit system, conformal fuel tanks, improved sensors and an upgraded electronic attack package. The upgrades would also include the ability to control Loyal Wingman aircraft, Boeing said.

Boeing Airpower Teaming System flying with EA-18G Growler

Source: Boeing

Rendering of Boeing Airpower Teaming System flying with EA-18G Growler

Boeing has not said previously that the Block II upgrade package would include the ability to fly the EA-18G autonomously.

“This technology allows the Navy to extend the reach of sensors while keeping manned aircraft out of harm’s way,” Brandt of Boeing says. “It’s a force multiplier that enables a single aircrew to control multiple aircraft without greatly increasing workload. It has the potential to increase survivability as well as situational awareness.”

The EA-18Gs were modified over summer 2019, says Boeing.

”Three Growlers were modified to support an open architecture processor and advanced networking, which allowed for two of the Growlers to be transformed into unmanned air system surrogate aircraft,” the company says. Those two pieces of technology were prototypes that are also planned as part of Boeing’s Block III upgrades for the Super Hornet, the Distributed Targeting Processor-Networked and the Rockwell Collins Tactical Targeting Network Technology radio.

Source: US Navy flies two EA-18G Growlers autonomously; third Growler used as controller | News | Flight Global

a tiny swarm 🙂