Risk
5/14/2012
02:39 PM
John Foley
John Foley
Slideshows
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Military Transformers: 20 Innovative Defense Technologies

Department of Defense technologies under development, from brainy microchips to battlefield transformer vehicles, promise to make the U.S. military more nimble. Here's a visual tour of 20 breakthrough ideas.
Previous
1 of 20
Next


President Obama and defense secretary Leon Panetta announced a new defense strategy earlier this year, one that hinges on the U.S. military becoming "more agile, flexible, innovative, and technically advanced." The Pentagon intends to meet that challenge by implementing new technologies, ranging from the latest mobile devices and applications to surveillance systems and next-generation aircraft.

In some cases, those will be revamped versions of long-used tools, such as a smaller, lighter "manpack" radio that the Army has begun using in Afghanistan. In other cases, they will be entirely new capabilities like the small, in-development drone nicknamed Shrike that will deliver intelligence to commanders in the field.

Building on its work with directed-energy technology, the Office of Naval Research has just revealed plans to take the next step in the development of solid-state laser weapons that can be used against small boats and aerial targets. ONR will host an industry day on May 16 to discuss its plans, to be followed by a request for proposals.

Much of the Department of Defense's most advanced research and development goes on at the Defense Advanced Research Projects Agency (DARPA), where work is underway on everything from a jet that shoots across the sky at Mach 20 to disaster-response robots. (See U.S. Military Robots Of The Future: Visual Tour.)

DARPA's not the only source of war-fighting innovations. The Naval Research Laboratory, major defense contractors, and IBM have projects underway, too.

In this visual tour, we highlight 20 defense technologies that are being deployed or on the drawing board. It remains to be seen which of the in-development systems see the light of day. The prospect of deep cuts to the defense budget--as much as $460 billion during the next 10 years--could put an end to some of the work. The proposed Defense budget for fiscal year 2013 would cut R&D funding by $2.2 billion, to $69.7 billion, though DARPA's budget would be spared significant cuts.

Some of the technologies in development, such as supersonic aircraft, have potential application in the commercial world. Others rewrite the rules of battleground transportation.

DARPA's Transformer (TX) program seeks to bring together the utility of a ground vehicle and the navigation properties of a helicopter in a hybrid vehicle that would feature maximum flexibility of movement (as pictured, above.) Applications could include transporting troops and supplies to the battlefield quickly, medical evacuation, and more. The design calls for a vehicle capable of transporting up to four people and that can be operated by a typical soldier as well as a trained pilot.
Credit: DARPA

Previous
1 of 20
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Leo Regulus
50%
50%
Leo Regulus,
User Rank: Apprentice
5/16/2012 | 4:03:30 PM
re: Military Transformers: 20 Innovative Defense Technologies
Where can I get the one-click version of the article, Please?
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6501
Published: 2015-03-30
The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_s...

CVE-2014-9209
Published: 2015-03-30
Untrusted search path vulnerability in the Clean Utility application in Rockwell Automation FactoryTalk Services Platform before 2.71.00 and FactoryTalk View Studio 8.00.00 and earlier allows local users to gain privileges via a Trojan horse DLL in an unspecified directory.

CVE-2014-9652
Published: 2015-03-30
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote atta...

CVE-2014-9653
Published: 2015-03-30
readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory ...

CVE-2014-9705
Published: 2015-03-30
Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.