Risk
4/3/2013
03:49 PM
50%
50%

DARPA Focuses On War Injuries In Brain Research

Department of Defense research agency will foot half the bill for the White House’s new R&D initiative into the human brain.

14 Amazing DARPA Technologies On Tap
14 Amazing DARPA Technologies On Tap
(click image for larger view and for slideshow)
The Defense Advanced Research Projects Agency will be a key participant in a new federal research initiative to better understand and map the human brain.

The Brain Research through Advancing Innovative Neurotechnologies (BRAIN) initiative, announced by President Obama on Tuesday, aims to develop new data processing and imaging technologies to help scientists improve their understanding of how brain function is linked to human behavior and learning. It will also address the treatment and prevention of Alzheimer's, schizophrenia, autism, epilepsy, traumatic brain injury and other neurological disorders.

The White House plans to provide $100 million in funding in the first year of the program, half of which will come from DARPA. The agency, which is part of the Department of Defense, is interested in brain research as it relates to post-traumatic stress disorder, as well as brain injuries and recovery.

DARPA said new tools are needed to measure and analyze electrical signals and the biomolecular dynamics that support brain function. Given its mission as a defense research agency, DARPA positioned its involvement in the scientific initiative as supporting national security.

[ Wondering what the government's brain research entails? Read Obama Brain Mapping Project Tests Big Data Limits. ]

"This kind of knowledge of brain function could inspire the design of a new generation of information processing systems; lead to insights into brain injury and recovery mechanisms; and enable new diagnostics, therapies and devices to repair traumatic injury," DARPA director Arati Prabhakar said in a written statement.

DARPA has seven programs underway that tie into the BRAIN initiative. They include a project called Revolutionizing Prosthetics that seeks to advance upper-limb prosthetic technology. So far, the program has resulted in the development of two prototype prosthetic arm systems, which will get added functionality as research progresses.

DARPA's Restorative Encoding Memory Integration Neural Device (REMIND) program is geared to determining how short-term memory is encoded to help soldiers recover from memory loss, while its Reorganization and Plasticity to Accelerate Injury Recovery (REPAIR) program aims to create a neuroscience community that uses brain models to treat injuries.

Other areas of investment and research by DARPA include the impact of stress on the brain; helping soldiers with amputations, spinal cord injuries, and neurological diseases; understanding traumatic brain injury by measuring the severity of blasts to which soldiers have been exposed; and developing analytical tools to assess soldiers' psychological state.

DARPA acknowledged that there are "societal questions" that could arise about research surrounding these technologies. The agency said it plans to work with experts to address these issues.

A well-defended perimeter is only half the battle in securing the government's IT environments. Agencies must also protect their most valuable data. Also in the new, all-digital Secure The Data Center issue of InformationWeek Government: The White House's gun control efforts are at risk of failure because the Bureau of Alcohol, Tobacco, Firearms and Explosives' outdated Firearms Tracing System is in need of an upgrade. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
John Foley
50%
50%
John Foley,
User Rank: Apprentice
4/3/2013 | 10:03:26 PM
re: DARPA Focuses On War Injuries In Brain Research
Of all the leading-edge R&D underway at DARPA -- the robots, drones, radars, night vision tech, laser guns, invisible cloaks, 3D optics, and much more -- research into the neural and mental health of our warfighters and veterans should be at the top of the list. I'm glad to see the important work that was already underway in this area has now been elevated in public policy and awareness.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3971
Published: 2014-12-25
The CmdAuthenticate::_authenticateX509 function in db/commands/authentication_commands.cpp in mongod in MongoDB 2.6.x before 2.6.2 allows remote attackers to cause a denial of service (daemon crash) by attempting authentication with an invalid X.509 client certificate.

CVE-2014-7193
Published: 2014-12-25
The Crumb plugin before 3.0.0 for Node.js does not properly restrict token access in situations where a hapi route handler has CORS enabled, which allows remote attackers to obtain sensitive information, and potentially obtain the ability to spoof requests to non-CORS routes, via a crafted web site ...

CVE-2004-2771
Published: 2014-12-24
The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an email address.

CVE-2014-3569
Published: 2014-12-24
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshak...

CVE-2014-4322
Published: 2014-12-24
drivers/misc/qseecom.c in the QSEECOM driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not validate certain offset, length, and base values within an ioctl call, which allows attackers to gain privileges or c...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.