A U.S. military that has dropped its guard on advanced technology development must now steel itself to catch up to and overtake peer rivals that have capitalized on U.S. complacency to surge ahead in defense research and development. Taking back the initiative and restoring U.S. military supremacy will require rapid advances in space-based lasers, cyber countermeasures and hypersonic attack vehicles. And linking these systems will require communications capabilities that establish and maintain spectrum dominance.
An alternative to radio frequency-based communications, laser communications, or optic-based technologies, are emerging as another tool for warfighters.
Stakeholders across the laser communications sector have formed an industry group, known as the Laser Communications Coalition. At the Institute of Electrical and Electronics Engineers (IEEE) and AFCEA International’s MILCOM conference in Los Angeles on October 30, some stakeholders shared their view of the technology and market outlook for their optic-based communications equipment or services.
Researchers envision a day when shape-shifting materials, novel sensors and other interactive technologies replace the flat, insipid computer screen. Such advances will allow users to interact in a tactile manner, enhancing their understanding of information and data. Researchers on the cutting edge of human-computer interaction are working on physical representations of data or information. Computer scientists portend that computers can, and should, have an output of information that mirrors the adroitness and expressiveness of the human body.
While the U.S. Defense Department struggles to connect tactical and strategic networks, industry has cracked the interoperability code. Commercial pressure to develop a digital ecosystem where any device delivers content across platforms and service providers has led to robust industry standards and intuitive application programming interfaces.
Increased interoperability and access, however, bring increased risk, which discourages the bridging of networks and enterprise services. Innovators must face these fears head-on. Strategic-tactical network integration requires a plan for analyzing risk, employing control measures, developing operating procedures and training across organizations.
Congress has increased emphasis on more rapid prototyping, including prototyping up through operational capability and more rapid acquisition. This focus will redefine how the U.S. Defense Department works with other parts of the government as well as with industry and academia, notes Michael Griffin, undersecretary of defense for research and engineering. The answers may lie in maximizing the innovative nature of researchers by clearing away the underbrush impeding their progress.
Technology that allows easy renewal of CAC identification and a system to provide full virtual reality training on goggles prevailed in the premier AFCEA innovation shark tank of fiscal year 2019. Held October 25, the competition featured the first tie in an elimination round since the shark tanks began running earlier in 2018. Both technologies will advance to the final competition, which will be held in April 2019.
Implementing a new system can be an exciting time, but the nagging questions and doubts about the fate of data you’ve literally spent years collecting, organizing and storing can dampen this excitement.
This legacy data often comes from a variety of sources in different formats maintained by a succession of people. Somehow, all the data must converge in a uniform fashion, resulting in its utility in the new solution. Yes, it is hard work and no, it is not quick. Fortunately, this scrubbing and normalization does not have to be a chaotic process replete with multiple failures and rework.
Researchers at the Georgia Institute of Technology have created a one-step approach to fabricating complex origami structures whose lightweight, expandability and strength could offer a wide range of benefits, including biomedical devices and equipment used in space exploration. Until now, making such structures has involved multiple steps, more than one material and assembly from smaller parts.
The U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives, known as the ATF, granted a Federal Explosives License to Aquabotix Ltd. The explosives license will allow the unmanned aquatic vehicle company to develop, manufacture, store and sell unmanned vehicles with explosive capabilities, according to a company statement.
Innovative pioneers looking to bring their ideas and concepts to reality are pushing the edge of aerospace capabilities. In some cases, the technologies are the result of university research, while others come from markets outside of defense. The entrepreneurs purport that their technologies will be, if not groundbreaking, useful and more efficient. The entrepreneurs presented their nascent products and discoveries at a pitch meeting hosted by The MITRE Corporation in McLean, Virginia on October 11 as part of Starburst Aerospace Accelerator’s annual East Coast Selection Committee event.
Historically, the U.S. Department of Defense (DOD) has been the driver of technological innovation, inventing remarkable capabilities to empower warfighter mission effectiveness and improve warfighter safety. Yet over the past 25 years, a transformational shift has taken place in several key technology sectors, and technology leadership in these sectors is no longer being driven by the military, but rather by the private sector.
The move away from technologies meant for a static battlefield environment continues for the U.S. Marine Corps, as the service fields technologies needed for operating in austere environments.
Leaders want ruggedized and resilient technologies that are low in size, weight and power for soldiers on the move. The technology gaps to fill come across all aspects of command, control, communications and computing, or C4. Marine Corps leaders identified the service’s top technological needs during the Modern Day Marine event September 25-27 at the Marine Corps Quantico base.
This summer, the U.S. Marine Corps accepted delivery of five compact laser weapon systems, and is now considering many aspects of the weapon’s functionality. The service is looking for reliable, cost effective protection against the growing threat of unmanned aerial vehicles.
The director of the Defense Advanced Research Projects Agency, Steven Walker, pictures the future battlefield as a mosaic of lower-cost, less complex systems linked together in a vast number of ways to create desired, interwoven effects tailored to any scenario. The agency, known as DARPA, is standing up a new program office and investing in an array of technologies, from artificial intelligence to robotics to systems for hypersonic flight and space, to make that picture a reality.
The Defense Information Systems Agency, or DISA, is applying both traditional and innovative infrastructure protection methods to its worldwide networking for U.S. defense installations. In some cases, conventional methods can hold services together. But in others, especially with cross-border telecommunications, DISA must secure its commercial connectivity without the benefit of the authorities inherent in a host country agency.
New ways of commercial networking widen the threat picture. Variety is the spice of vulnerability as networks evolve with innovative approaches. Having the right information for a network architecture is vital to moving information across global ranges, according to DISA officials.
In a world where the U.S. Defense Department is facing asymmetric threats, department leaders are counting on long-term research and development to provide primary solutions to protect the nation. For the Johns Hopkins University Applied Physics Laboratory, which has helped create technologies that have changed the course of history, the pressure is on to find the next significant contribution, says the laboratory’s director, Ralph Semmel. “When you look back in history, we had nine of those [groundbreaking technologies], so we are holding ourselves to a very high bar,” Semmel says. “But the key is that we don’t know which technology is actually going to turn into a defining innovation.”
The impact of world events on military operators in the field have made missions exponentially more demanding, and in tandem, the very simple concept of connectivity has transformed into a complex and challenging task. As new events occur around the globe, military and government users in remote and often hostile environments require instant and reliable connectivity empowered by robust intelligence, surveillance and reconnaissance sensor data. Resilient and secure satellite communications capabilities warfighters rely on also must be accessible at a moment’s notice.
One of the fundamental ingredients to a secure future is having a sustainable and engaged technology-savvy workforce. This means we must be preparing our youth for today’s and tomorrow’s technologies. We need to cultivate the next generation of technology innovators and masters.
While traveling this spring and summer, I met and spoke with many high school and college-age students. I heard quite a bit about their desire to better understand and be more involved in cybersecurity. Specifically, they asked about authentication solutions for mobile applications, better identity management, and how to protect and understand their data.
Artificial intelligence and machine learning are powering a new generation of technology that can identify computer users by the way they handle their keyboard and mouse.
Known as behavioral biometrics, the technology provides a way to continuously authenticate users—guarding against credential theft and account takeover, two of the most common forms of online attacks.
Artificial Intelligence (AI) and Machine Learning (ML). Unprecedented insight generated at the edge and in the data center. Hardened, comprehensive end-to-end security. These are just a few of the technology possibilities and requirements driving public sector transformation forward.
At Intel, we’re focused on accelerating innovation and insight, with secure edge-to-cloud solutions, throughout the public sector.
How are we doing this? It starts by taking a wholistic approach to the opportunities and challenges within the public sector.