To address a changing mission amid broader challenges, the U.S. Marines are implementing the service’s future warfighting strategy this year through training, war gaming and experimentation. The strategy calls for forces to be dispersed over wide areas and will require technologies that enhance warfighters’ effectiveness over greater distances.
research and development
Researchers working on behalf of the U.S. intelligence agencies can use reams of open source, anonymous data to foretell social turmoil such as disease outbreaks or international political unrest. Once fully developed, the capability to predict coming events may allow U.S. officials to more effectively respond to public health threats; to improve embassy security before an imminent attack; or to more quickly and effectively respond to humanitarian crises.
Software developed by university researchers accurately predicts cloud computing issues before they occur, enhancing reliability; cutting costs; potentially improving cybersecurity; and saving lives on the battlefield.
Infrastructure-as-a-service clouds are prone to performance anomalies because of their complex nature. But researchers at North Carolina State University (NCSU) have developed software that monitors a wide array of system-level data in the cloud infrastructure—including memory used, network traffic and computer power usage—to define normal behavior for all virtual machines in the cloud; to detect deviations; and to predict anomalies that could create problems for users.
Scientists and engineers from MITRE Corporation and Harvard University published a paper this week revealing the development of what they call the most dense nanoelectronic system ever built. The ultra-small, ultra-low-power processor could be used for tiny robotics, unmanned vehicles and a broad range of commercial applications, including medical sensors.
Fiscal constraints and technology evolution are forcing the government to re-evaluate procurement efforts with a renewed vigor. Industry has suggestions for improving processes, but progress will require a different level of dialogue between companies and their public-sector clients. Company leaders believe they can help government overcome some of its issues because they understand both realistic technical solutions as well as the effect policies have on acquisition cycles. But they need the opportunity to show what is available. Government personnel increasingly are calling for that knowledge; however, legal and fair competition concerns often limit meaningful discussion, resulting in misunderstanding and frustration.
The U.S. Navy is expanding its autonomous subsurface fleet with the introduction of a platform designed for persistent intelligence, surveillance and reconnaissance (ISR) as well as offensive capabilities. Dubbed the Large Displacement Unmanned Undersea Vehicle (LDUUV), the program of record should result in a system that offloads missions from other assets.
A new printing technology could move the production of nano-sized electronic components from multibillion-dollar facilities into the hands of users, including military users in the field. The device, which is about the size of a desktop printer, will allow rapid prototyping of nanomaterials, contribute to stem cell and other medical research, offer a range of commercial uses and save potentially billions of dollars. Furthermore, because the product builds upon already widely available technology, it could be fielded within two years, researchers say.
To ease the load on weary warfighters inundated with too much information, U.S. Navy scientists are turning to artificial intelligence and cognitive reasoning technologies. Solutions that incorporate these capabilities could fill a broad array of roles, such as sounding the alarm when warfighters are about to make mistakes.
The U.S. Navy intends to deploy an arsenal of airborne, surface and underwater unmanned systems for its new shallow-water combat ship. The array of unmanned systems will extend the ship’s intelligence, surveillance and reconnaissance capabilities, enhancing awareness of enemy activities, and will reduce the number of sailors deployed to minefields, saving lives.
The U.S. Department of Homeland Security is seeking participants for the Software Assurance Marketplace (SWAMP), which is expected to open to beta users in January. The ultimate goal for the marketplace is to help protect the nation’s critical infrastructure by improving software used for essential functions, such as electrical power, gas and oil, and banking and finance. Potential participants are invited to register at the continuous assurance website.
Current fiscal and world conditions are taking their toll on the ability of the U.S. Army’s signals community to keep soldiers equipped with the latest developments. However, leadership embraces the challenges as impetus to improve, ensuring that troops are prepared as they transition from an operational to a contingency force. Necessity is inspiring creativity to developing solutions, with the government reaching out to industry for more help. As the service branch’s chief information officer/G-6, Lt. Gen. Susan Lawrence, USA, said, “You can’t wring your hands if you’re rolling up your sleeves.”
Swarms of cyborg cockroaches may one day aid in search and rescue, military reconnaissance and an array of other missions.
The U.S. Army’s goal to push the network down to the dismounted soldier is now reality as Rangers units and the 10th Mountain Division begin employing Nett Warrior. But developers are not resting on their laurels. They already are adding advancements to increase capability and improve functionality.
A prototype sensor technology under development will enable soldiers to identify threats more rapidly in low-light environments and to share target images with other squad members. Consisting of several types of small multispectral cameras, the system will use smartphone technology in the form of a warfighter’s handheld mobile device to process and fuse the camera data into high-resolution color images for the soldier’s helmet display. That display imagery can then be transmitted wirelessly to other soldiers.
U.S. Army researchers are developing a software program that will provide signal corps officers will an improved common operating picture of the network, enhance the ability to manage the plethora of electronic systems popping up on the modern battlefield, advance information sharing capabilities and allow warfighters to make more informed and more timely decisions. In short, the system will assist in planning, building, monitoring and defending the network.
NASA’s core culture is to push the boundaries of what has been to create what can be. And within this cutting-edge organization is an entire group dedicated solely to ensuring that the revolutions continue to expand. The Game Changing Development Program exists to find the disruptive technologies available in relevant fields, then move them into the proper channels for development and deployment.
U.S. Navy researchers are developing a state-of-the-art encryption device for integration onto KC-130 tankers and unmanned aerial systems. An existing version of the device is being installed onto B-52 bombers, E-4s, which serve as airborne command centers for the U.S. president and other National Command Authority officials, and E-6s, which are command and control centers for nuclear weapons. The encryption system can be integrated into virtually any platform and offers backward-compatible, software-definable algorithms that can be updated during operations without downtime.
Two ongoing military programs, one getting ready to deploy and another still in the prototype stage, aim to connect troops at the very tactical edge back to larger military data and communications networks. These programs—one service-oriented, the other an agency effort—are part of the Defense Department’s thrust to make warfighters, especially individual soldiers in small units, more connected.
In the next few years, usernames and passwords could gradually fade from popular use as a way to conduct business online. A public/private coalition is working on a new policy and technical framework for identity authentication that could make online transactions less dependent on these increasingly compromised identity management tools. A second round of federal grants from the group, expected this fall, will lead to continued work on what is expected to become a private sector-operated identity management industry.
Scientists are enabling DNA analysis to function as a virtual sketch artist to figure out who people are and what they look like even in situations with no eyewitnesses. The developments have particular application to counterterrorism but could affect a wider array of fields as well. Even more importantly, the personnel are developing bioinformatic software solutions databases to manage quick interpretation of data for usability.