Tag Archives: DARPA

The Subterraneans

subway NYC

From the DARPA website:

Underground settings are becoming increasingly relevant to global security and safety. Rising populations and urbanization are requiring military and civilian first responders to perform their duties below ground in human-made tunnels, underground urban spaces [e.g. mass transit, water infrastructure] and natural cave networks. Recognizing that innovative, enhanced technologies could accelerate development of critical lifesaving capabilities, DARPA today announced its newest challenge: the DARPA Subterranean Challenge.

The DARPA Subterranean or “SubT” Challenge aims to explore new approaches to rapidly map, navigate, and search underground environments. Teams from around the world will be invited to propose novel methods for tackling time-critical scenarios through unknown courses in mapping subsurface networks and unpredictable conditions, which are too hazardous for human first responders.

“One of the main limitations facing warfighters and emergency responders in subterranean environments is a lack of situational awareness; we often don’t know what lies beneath us,” said Timothy Chung, program manager in DARPA’s Tactical Technology Office (TTO). “The DARPA Subterranean Challenge aims to provide previously unimaginable situational awareness capabilities for operations underground.”

“We’ve reached a crucial point where advances in robotics, autonomy, and even biological systems could permit us to explore and exploit underground environments that are too dangerous for humans,” said TTO Director Fred Kennedy.“Instead of avoiding caves and tunnels, we can use surrogates to map and assess their suitability for use. Through the DARPA Subterranean Challenge, we are inviting the scientific and engineering communities—as well as the public—to use their creativity and resourcefulness to come up with new technologies and concepts to make the inaccessible accessible.

Excerpts from DARPA Subterranean Challenge Aims to Revolutionize Underground Capabilities, Dec. 21, 2017

Bitcoin Technology and the US Military

The United States Department of Defense and DARPA [seek to establish] a secure messaging system that can provide repudiation or deniability, perfect forward and backward secrecy, time to live/self delete for messages, one time eyes only messages, a decentralized infrastructure to be resilient to cyber-attacks, and ease of use for individuals in less than ideal situations….The messaging platform will transfer messages via a secure decentralized protocol that will be secured across multiple channels, including but not limited to: 1) Transport protocol, 2) Encryption of messages via various application protocols, 3) Customized blockchain implementation of message deconstruction and reconstruction, and decentralized ledger implementation

Excerpts from SBIR.defense business. org

Like Wolves Like Drones: DARPA CODE

A drone from Fleet Composite Squadron (VC) 6 fires from the flight deck of USS Pearl Harbor (LSD 52) during UNITAS exercises. Image from wikipedia

Excerpts from the DARPA website

Most unmanned aerial systems (UAS) [i.e. drones] require constant control by a dedicated pilot and sensor operator as well as a large number of analysts, all via telemetry. These requirements severely limit the scalability and cost-effectiveness of UAS operations and pose operational challenges in dynamic, long-distance engagements with highly mobile targets in contested electromagnetic environments.  DARPA’s Collaborative Operations in Denied Environment (CODE) program aims to overcome these challenges by developing algorithms and software,,,with the goal of improving U.S. forces’ ability to conduct operations in denied or contested airspace.

CODE intends to focus in….the capability for groups of UAS to work together under a single human commander’s supervision….. CODE’s envisioned improvements to collaborative autonomy would help transform UAS operations from requiring multiple people to operate each UAS to having one person who is able to command and control six or more unmanned vehicles simultaneously. Commanders could mix and match different systems with specific capabilities that suit individual missions instead of depending on a single UAS that integrates all needed capabilities but whose loss would be potentially catastrophic.

“Just as wolves hunt in coordinated packs with minimal communication, multiple CODE-enabled unmanned aircraft would collaborate to find, track, identify and engage targets, all under the command of a single human mission supervisor,” said Jean-Charles Ledé, DARPA program manager.

Excerpts from DARPA website

 

The 1 Trillion Cycles Per Second Circuit: DARPA

Terahertz waves lie at the far end of the infrared band, just before the start of the microwave band.  Image from wikipeda

Officials from Guinness World Records today recognized DARPA’s Terahertz Electronics program for creating the fastest solid-state amplifier integrated circuit ever measured. The ten-stage common-source amplifier operates at a speed of one terahertz (1012 GHz), or one trillion cycles per second—150 billion cycles faster than the existing world record of 850 gigahertz set in 2012.…Developed by Northrop Grumman Corporation, the Terahertz Monolithic Integrated Circuit (TMIC) exhibits power gains several orders of magnitude beyond the current state of the art…  For years, researchers have been looking to exploit the tremendously high-frequency band beginning above 300 gigahertz where the wavelengths are less than one millimeter. The terahertz level has proven to be somewhat elusive though due to a lack of effective means to generate, detect, process and radiate the necessary high-frequency signals.  Current electronics using solid-state technologies have largely been unable to access the sub-millimeter band of the electromagnetic spectrum due to insufficient transistor performance.,,,

According to  Dev Palmer, DARPA program manager. “This breakthrough could lead to revolutionary technologies such as high-resolution security imaging systems, improved collision-avoidance radar, communications networks with many times the capacity of current systems and spectrometers that could detect potentially dangerous chemicals and explosives with much greater sensitivity.”

DARPA has made a series of strategic investments in terahertz electronics through itsHiFIVE, SWIFT and TFAST programs. Each program built on the successes of the previous one, providing the foundational research necessary for frequencies to reach the terahertz threshold.

Excerpts from DARPA CIRCUIT ACHIEVES SPEEDS OF 1 TRILLION CYCLES PER SECOND, EARNS GUINNESS WORLD RECORD, DARPA website, http://www.darpa.mil, Oct. 28, 2014

This technology can be used for Security and Communications (including military communications): Here from Wikipedia

Security:
Terahertz radiation can penetrate fabrics and plastics, so it can be used in surveillance, such as security screening, to uncover concealed weapons on a person, remotely. This is of particular interest because many materials of interest have unique spectral “fingerprints” in the terahertz range…. In January 2013, the NYPD announced plans to experiment with the newfound technology to detect concealed weapons, prompting Miami blogger and privacy activist Jonathan Corbett to file a lawsuit against the department in Manhattan federal court that same month, challenging such use: “For thousands of years, humans have used clothing to protect their modesty and have quite reasonably held the expectation of privacy for anything inside of their clothing, since no human is able to see through them.” He seeks a court order to prohibit using the technology without reasonable suspicion or probable cause.

Communication:Potential uses exist in high-altitude telecommunications eg aircraft to satellite, [e.g. the Phantom SWIFT] or satellite to satellite.

 

The Manipulation of Wireless Networks and DARPA

MAC address. image from wikipedia

From the DARPA website and DARPA-BAA-14-44 WND Phases 2 and 3

The majority of work to develop and mature military wireless networks to date has focused on efficiency and stability in benign conditions…As the use of wireless systems expands, the likelihood of network compromise (whether maliciously or by unwitting misconfiguration) will increase. Beyond the conventional node-by-node security in use today, a set of network-based checks are needed to ensure that misinformation inserted into the control protocols does not disable the network functionality.

The Wireless Network Defense (WND) program is developing and demonstrating new technology to protect the control protocols of wireless networks from the effects of advanced attacks or other forms of compromise. The program focuses on the protocols at the network and medium access control (MAC) layers of the network stack with the goal of protecting those protocols that coordinate among the distributed devices’ management of resources such as spectrum, time, and power, and delivery of information.

The development of this technology will both improve the robustness of the class of wireless networks that are being procured and fielded in the near future, and also provide a reliable foundation on which to build the next generation of wireless systems. These new defenses will minimize the impact of attacks on network control and will force attacks to be observable and attributable in order to be effective.

Ideally…[one] should anticipate both passive listeners and active attackers; colluding attackers; dynamic attacks; and informed adversaries…[One]should assume that passive listeners and  active attackers will be able to collude. That is, the threat model is a real-world adversary.  Systems should be designed to mitigate attacks under all combinations of attackers and attacks…. [One]should further design mitigations and enhancements such that these mitigations and enhancements cannot themselves be leveraged by a knowledgeable adversary to attack the network.

See DARPA-BAA-14-44 WND Phases 2 and 3

Replacing GPS: the C-SCAN of DARPA

C-SCAN-W

Teaming up with Northrop Grumman as its primary contractor, DARPA is working today to integrate micro-electro-mechanical systems, called MEMS, and atomic inertial guidance technologies, forming a new “single inertial measurement unit” in a project designated the “Chip-Scale Combinatorial Atomic Navigator” — C-SCAN.

Translated into plain English, what C-SCAN aims to accomplish is to create a chip that performs the functions today served by orbiting GPS satellites. The chip would constantly “know” where it is in space-time, and would have this knowledge without having to ping a satellite (and maintain line-of-sight communication with a satellite) to do it… Elimination of the need to rely on satellites to determine one’s location would similarly enable the use of “GPS-like” technology for getting directions within buildings and underground — for example, in subway systems…

One of the primary vulnerabilities in today’s hi-tech, ultra-accurate weapons systems, you see, is their dependence upon GPS signals to guide them to their destinations. American “smart bombs” and guided missiles all depend greatly on GPS to know where they are, and to get where they’re going. American dominance in drone technology, similarly, depends on GPS.  Problem is, while we know this is a problem, the “bad guys” know it, too — and can sometimes hack GPS signals so as to confuse, and even hijack, American weapons systems. Case in point: in 2011, Iran boasted that it had commandeered and captured a Lockheed Martin (NYSE: LMT ) RQ-170 Sentinel — one of our most advanced “stealth” surveillance drones — in flight over Iranian territory. The Iranians didn’t have to shoot the drone down, either. Instead, they forced it to land in Iran, and captured it intact. According to Iranian engineers, this was accomplished by first jamming communications with the Sentinel’s remote controllers, then “spoofing” GPS signals, tricking the drone into landing at what it thought was its home base in Afghanistan — but what was actually an Iranian airfield.

Drones equipped with a future C-SCAN technology would be less likely to fall victim to such a trap. While their communications might be cut off, forcing them to default to autopilot and return to base, they’d at least return to the right base, because an internal chip would tell them how to get there.

Current weapons systems often include internal gyroscopes, granted, that perform some of the functions that C-SCAN aims to perfect. But as DARPA observes, present-day gyroscopes are “bulky” equipment, “expensive,” and don’t perform with the kind of accuracy that DARPA wants to see.  The objective, therefore, is to explore cutting edge technologies to put gyroscope-like functionality on a chip, resulting in “small size, low power consumption, high resolution of motion detection and a fast start up time” — all loaded onto one small microchip….

Microchip-based guidance could be the solution the military is seeking to an oft-discussed problem with the nation’s newest generation of Mach 7 railguns, whose great range, speed, power — and cheapness — make them an attractive weapons system… if we can only figure a way to guide their projectiles accurately

Rich Smith, Why Is the U.S. Government Working Frantically to Get Rid of GPS?, Motley Fool, June 15, 2015

Showing off American Military Hackers: DARPA Plan X

oculus

At the Pentagon Wednesday (May 21, 2014) the armed forces’ far-out research branch known as the Defense Advanced Research Projects Agency showed off its latest demos for Plan X, a long-gestating software platform designed to unify digital attack and defense tools into a single, easy-to-use interface for American military hackers. And for the last few months, that program has had a new toy: The agency is experimenting with using the Oculus Rift virtual-reality headset to give cyberwarriors a new way to visualize three-dimensional network simulations–in some cases with the goal of better targeting them for attack.

“You’re not in a two-dimensional view, so you can look around the data. You look to your left, look to your right, and see different subnets of information,” Darpa’s Plan X program manager Frank Pound told WIRED in an interview. “With the Oculus you have that immersive environment. It’s like you’re swimming in the internet…..If Plan X’s Oculus software ever reaches the eyeballs of actual soldiers–a development that Darpa says is still years away–Pound doesn’t deny that the interface would be used for actual offensive hacking as well as defense and reconnaissance. Like the rest of Plan X, he says it’s meant to be a simpler and more intuitive way for the U.S. Cyber Command and other American military hackers to visualize everything they do in their cyberwar operations. “Think of Plan X like an aircraft carrier,” says Pound. “It can carry any weapon system or capability.”

That sort of admission will no doubt set off alarm bells for critics of the American military’s increasingly aggressive posture on the Internet. The revelation in 2012 that the United States created the Iran-targeted Stuxnet malware and a year of Edward Snowden’s leaks have already demonstrated that the NSA engages in more advanced cyberattack operations than practically any country on the planet. Enabling American hackers to launch those attacks with a tool that’s literally designed for video games could be seen as encouraging a brazen attitude towards cyberwar, disconnecting it from the reality of its consequences.

But Darpa’s Pound counters that safeguards against reckless hacking will be built into Plan X, and that it may actually reduce collateral damage from military cyberattacks by allowing soldiers to better understand the networks they’re attacking.

Excerpt from ANDY GREENBERG, Darpa Turns Oculus Into a Weapon for Cyberwar, Wired, May 23, 2014

The Digital Bombs of DARPA: Plan X