Tech
China Unveils Mosquito-Sized Spy Drone for Battlefield Reconnaissance
A Chinese military research institution has unveiled a mosquito-sized microdrone designed for battlefield reconnaissance, highlighting the growing use of insect-inspired technologies in modern warfare.
The tiny spy device, resembling a mosquito in both form and size, was presented on China’s state-run military broadcaster CCTV-7 on June 20. It was developed by students at the National University of Defence Technology (NUDT), a leading military research institution in China.
“Here in my hand is a mosquito-like type of robot,” said Liang Hexiang, a NUDT student, while demonstrating the device on camera. “Miniature bionic robots like this one are especially suited to information reconnaissance and special missions on the battlefield.”
Roughly 2 cm in length and weighing only 0.3 grams, the device mimics the appearance and movement of a real insect, equipped with two rapidly flapping wings and three spindly legs. According to Korean media outlet Chosun Ilbo, the wings can flap up to 500 times per second, enabling the device to maneuver with agility.
Another prototype, reportedly featuring four wings and controllable via smartphone, was also introduced, according to the South China Morning Post.
Although the Chinese military has not publicly disclosed the specific surveillance capabilities of the device, military experts suggest that its extremely small size and silent flight could make it ideal for covert operations. Its radar cross-section is believed to be too small to be detected by standard radar systems, making it nearly invisible during missions.
The reveal comes amid a global trend in developing miniature unmanned aerial vehicles (UAVs) for tactical operations. Similar systems have already been fielded by other militaries, including the U.S., which uses the palm-sized Black Hornet drone—a helicopter-style UAV equipped with cameras and thermal imaging—across multiple branches of its armed forces.
The concept of insect-inspired surveillance technology is not new. In 2006, the U.S. Defense Advanced Research Projects Agency (DARPA) launched the HI-MEMS program, aiming to develop insect cyborgs by integrating micro-mechanical systems into live insects for surveillance purposes.
China’s latest development appears to be a continuation of this push toward ultra-small, biologically inspired reconnaissance tools. While the exact timeline for deployment is unclear, the introduction of such microdrones signals a strategic shift toward more sophisticated and stealthy intelligence-gathering capabilities on the battlefield.
Tech
European Journalist Suspended for Using AI-Generated Fake Quotes
Journalist Peter Vandermeersch, who worked with Dutch publisher Mediahuis, reportedly fabricated expert quotes into 15 of 53 articles written for them. Vandermeersch, a senior European journalist, has been temporarily suspended after an investigation revealed he published quotes generated by artificial intelligence (AI) as if they were genuine.
The Dutch newspaper NRC reported that Vandermeersch inserted “dozens” of fabricated quotes into articles published on two Mediahuis websites. Some of the statements attributed to experts could not be found in the sources Vandermeersch cited, including news articles and scientific studies. Seven of the individuals whose quotes were used confirmed they had never made the statements attributed to them.
Vandermeersch served as chief executive of Mediahuis Ireland from 2022 to 2025 before taking on a fellowship role in journalism and society at Mediahuis. He confirmed his temporary suspension on his blog, saying he relied on AI tools including ChatGPT, Perplexity, and Google’s Notebook to summarise lengthy reports, trusting the outputs to be accurate.
Instead, the systems generated fabricated quotes that “put words into people’s mouths,” Vandermeersch admitted. “That was not just careless, it was wrong,” he wrote. “It is particularly painful that I made precisely the mistake I have repeatedly warned colleagues about: these language models are so good that they produce irresistible quotes you are tempted to use as an author.”
Vandermeersch said he first discovered the issue last year, when two of his articles were found to contain AI-generated quotes. He did not correct the errors at the time, which allowed the problem to persist. “When I realised this a few months ago, my enthusiasm diminished, as did my use of AI,” he said.
He explained that he continues to use AI for tasks such as translation, generating ideas, creating headlines, and developing story angles, but with “far less naive trust than before.” Mediahuis has yet to announce any further disciplinary measures or whether it will retract the affected articles.
The case has raised fresh concerns about the use of AI in journalism, highlighting the risks of relying on automated systems to generate content without verification. Industry experts warn that while AI tools can be valuable for research and drafting, uncritical use can lead to serious ethical breaches, including the misrepresentation of sources.
Mediahuis said it takes the matter seriously and is reviewing editorial procedures to prevent similar incidents in the future. The scandal has sparked a wider discussion in European media about the ethical boundaries of AI in reporting, particularly when it comes to quoting real people.
The incident underscores the growing tension between technological convenience and journalistic integrity, as newsrooms across Europe experiment with AI tools while balancing accuracy and accountability.
Tech
Cyberattacks Intensify as Iran Conflict Spills Into Digital Domain
State-linked and hacktivist groups have claimed a series of cyberattacks against the United States and Israel since the war with Iran began, marking a significant escalation in the digital dimension of the conflict.
One of the most notable incidents involved Stryker, which confirmed on March 11 that a cyberattack had disrupted its global network. According to reports, employees encountered the logo of Handala, an إيران-linked hacking group, on login pages across the company’s systems. The breach reportedly targeted the firm’s Microsoft-based infrastructure, though the full extent of the disruption remains unclear.
Handala has claimed responsibility for the attack, stating it exploited cloud management systems to remotely wipe large numbers of devices worldwide. The group said the operation was carried out in retaliation for a missile strike in Iran. Independent verification of these claims is still pending.
Cybersecurity analysts say the attack is part of a broader campaign by groups linked to Iran’s security apparatus. According to findings from CloudSek, organisations associated with the Islamic Revolutionary Guard Corps have targeted US critical infrastructure. These include CyberAv3ngers, APT33 and APT55, which are accused of attempting to infiltrate industrial systems such as power grids and water facilities.
Experts say some of these groups use simple methods, including default passwords, to access systems, while others deploy malware aimed at disrupting operations or gathering intelligence. Additional networks linked to Iran’s Ministry of Intelligence have also been active, targeting telecommunications, energy companies and government organisations.
At the same time, the United States and Israel are conducting their own cyber operations. General Dan Caine said US Cyber Command played a key role early in the conflict, disrupting Iranian communications and sensor networks. Defence Secretary Pete Hegseth confirmed that artificial intelligence and cyber tools are being used alongside conventional military operations.
Israeli intelligence has also reportedly relied on hacked data to support military planning, highlighting the growing role of cyber capabilities in modern warfare.
Hacktivist activity has surged as well. More than 60 groups formed a loose coalition known as the Cyber Islamic Resistance, coordinating attacks through online platforms. These groups have claimed hundreds of operations, including attempts to disrupt Israeli infrastructure and private sector systems. Analysts warn that such actors are often less restrained and may pose risks to civilian networks.
The conflict has also drawn in groups from outside the region, including actors based in Iraq, Russia and other parts of the Middle East. Some have targeted government websites and transport infrastructure, while pro-Israeli groups have carried out retaliatory attacks against Iranian entities.
Security experts say the growing scale and coordination of cyber operations reflect a shift in how modern conflicts are fought, with digital attacks now running parallel to military action on the ground.
Tech
Study Finds Hormone-Disrupting Chemicals in Popular Headphones Sold Across Europe
-
Entertainment2 years agoMeta Acquires Tilda Swinton VR Doc ‘Impulse: Playing With Reality’
-
Business2 years agoSaudi Arabia’s Model for Sustainable Aviation Practices
-
Business2 years agoRecent Developments in Small Business Taxes
-
Home Improvement1 year agoEffective Drain Cleaning: A Key to a Healthy Plumbing System
-
Politics2 years agoWho was Ebrahim Raisi and his status in Iranian Politics?
-
Business2 years agoCarrectly: Revolutionizing Car Care in Chicago
-
Sports2 years agoKeely Hodgkinson Wins Britain’s First Athletics Gold at Paris Olympics in 800m
-
Business2 years agoSaudi Arabia: Foreign Direct Investment Rises by 5.6% in Q1
