Risk
4/26/2013
08:54 AM
Connect Directly
RSS
E-Mail
50%
50%

DARPA: New Threats Demand New Technologies

Agency shifts focus to layered capabilities and cyber as a tactical weapon, as budget constraints and new threats affect plans.

14 Amazing DARPA Technologies On Tap
14 Amazing DARPA Technologies On Tap
(click image for larger view and for slideshow)
The Defense Advanced Research Projects Agency is adjusting its approach to the development of new defense technologies to reflect the fiscal realities facing federal agencies and evolving nature of national threats.

"Our mission is unchanged -- to prevent and create technological surprise," DARPA director Arati Prabhakar said at a Pentagon briefing in which she presented a new framework for the agency's research and development. However, she added, "it's going to be a very challenging environment for an extended period of time."

The agency's primary strategic objectives are to demonstrate "breakthrough capabilities" for national security, help drive a highly capable U.S. technology base and ensure that DARPA itself delivers on its mission.

[ Perhaps teenagers can develop some of the new technologies that DARPA needs. Read Future Scientists Showcase Inventions At White House. ]

Three factors are driving that mission, according to Prabhakar. One is the emergence of new threats. Rather than addressing risks posed by adversarial countries alone, the military must be prepared to deal with criminal enterprises, terrorist organizations and ill-intentioned individuals, all of which have access to new kinds of weapons, including cyber threats.

A second factor is the rapid pace of technological change, especially in the area of components for military systems. Many tech components are no longer manufactured in the U.S., introducing an added element of risk to the military's systems and networks, Prabhakar said.

The third factor is financial. Sequestration has cut $202 million from DARPA's fiscal 2013 budget of $2.9 billion, resulting in furloughs of employees and an 8% budget cut across programs. Prabhakar cautioned that DARPA's ability to invest in R&D may not return to business as usual.

"There's a critical shift in how society allocates resources to national security," she said. "I'm not talking about sequestration. I'm really talking about fiscal pressures that could shape a different future."

To deal with the complexities of modern warfare, DARPA seeks to develop integrated and layered systems that can continue to give the military a decisive edge. Examples of technologies that could increase in potency when used in this way include "adaptive electronic warfare," manned and unmanned systems, tactical cyber capabilities, and advanced intelligence, surveillance and reconnaissance.

"Modern warfare may be too complex for a single new capability to deliver sustained superiority across a variety of scenarios," according to the document, titled "Driving Technological Surprise: DARPA's Mission In A Changing World."

The agency's investment strategy is to use advanced, commercially available technologies where possible while encouraging new development at universities, government labs and private sector companies, as well as through its own programs.

Cyber is an area of increased focus. "We all view cyber as a critical threat to our military, and national security more broadly," Prabhakar said. "It's a tool that can be part of our military suite of capabilities."

DARPA's so-called Plan X program is aimed at developing capabilities that will give the U.S. military an advantage in cyber warfare, but there will be no single weapon or capability that does that, Prabhakar said.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Ron Helton
50%
50%
Ron Helton,
User Rank: Apprentice
4/26/2013 | 8:20:04 PM
re: DARPA: New Threats Demand New Technologies
Welcome to George Orwell's 1984.
VINAY
50%
50%
VINAY,
User Rank: Apprentice
4/26/2013 | 4:01:06 PM
re: DARPA: New Threats Demand New Technologies
FREEDOM TIBET ...
Regor Elom
50%
50%
Regor Elom,
User Rank: Apprentice
4/26/2013 | 2:52:25 PM
re: DARPA: New Threats Demand New Technologies
They need to get politicians out of the planning stages and be free to get their jobs done.
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4907
Published: 2014-07-11
Cross-site scripting (XSS) vulnerability in share/pnp/application/views/kohana_error_page.php in PNP4Nagios before 0.6.22 allows remote attackers to inject arbitrary web script or HTML via a parameter that is not properly handled in an error message.

CVE-2014-4908
Published: 2014-07-11
Multiple cross-site scripting (XSS) vulnerabilities in PNP4Nagios through 0.6.22 allow remote attackers to inject arbitrary web script or HTML via the URI used for reaching (1) share/pnp/application/views/kohana_error_page.php or (2) share/pnp/application/views/template.php, leading to improper hand...

CVE-2014-2963
Published: 2014-07-10
Multiple cross-site scripting (XSS) vulnerabilities in group/control_panel/manage in Liferay Portal 6.1.2 CE GA3, 6.1.X EE, and 6.2.X EE allow remote attackers to inject arbitrary web script or HTML via the (1) _2_firstName, (2) _2_lastName, or (3) _2_middleName parameter.

CVE-2014-3310
Published: 2014-07-10
The File Transfer feature in WebEx Meetings Client in Cisco WebEx Meetings Server and WebEx Meeting Center does not verify that a requested file was an offered file, which allows remote attackers to read arbitrary files via a modified request, aka Bug IDs CSCup62442 and CSCup58463.

CVE-2014-3311
Published: 2014-07-10
Heap-based buffer overflow in the file-sharing feature in WebEx Meetings Client in Cisco WebEx Meetings Server and WebEx Meeting Center allows remote attackers to execute arbitrary code via crafted data, aka Bug IDs CSCup62463 and CSCup58467.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.