Risk

9/27/2012
04:36 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

14 Amazing DARPA Technologies On Tap

Go inside the labs of the Defense Advanced Research Projects Agency for a look at some of the most intriguing technologies they're developing in computing, electronics, communications, and more.
Previous
1 of 14
Next


The Defense Advanced Research Projects Agency has announced its latest technological advance, a combination of "mind and machine" to help soldiers on the battlefield respond more quickly to deadly threats. It's the latest in a series of technical breakthroughs from the Penatgon's research arm, some of which can be applied in areas other than national defense.

A few months ago, DARPA revealed it had successfully tested a camera (pictured above) with 1.4 gigapixel resolution. To achieve that resolution--the equivalent of 1,400 megapixels--the camera builds a panoramic image from more than 100 micro cameras.

DARPA's newest development, called the Cognitive Technology Threat Warning System (CT2WS), includes a 120-megapixel camera, radar, computers with cognitive visual-processing algorithms, and brainwave scanners worn by soldiers. It aims to help scouts assess battlefield input using a portable visual threat-detection device.

DARPA is trying to solve a common problem with CT2WS, said program manager Gill Pratt, in a statement on the initiative's progress: "How can you reliably detect potential threats and targets of interest without making it a resource drain?"

CT2WS is based on the concept that humans have a natural ability to "detect the unusual," according to DARPA. The soldier wears an electroencephalogram (EEG) cap that monitors brain signals and records when a threat is detected. Users are shown images, about 10 per second, and their brain signals indicate which images are significant.

Launched in 2008, the program is being transitioned to the Army's Night Vision Lab. Field tests and demonstrations resulted in a low rate of false alarms--five out of 2,304 "target events" per hour--and the technology identified 91% of threats. Common alternatives such as binoculars and cameras have a much higher error rate.

DARPA draws a lot of attention for far-out research projects like the world's fastest robot and a plan to capture and recycle space junk, but electronics, communications, and IT are core to its mission. That's been true since the agency created ARPANET, the predecessor to the Internet, in 1969.

The research agency has dozens of projects underway in various research offices. Its Information Innovation Office focuses on IT research and development, its Microsystems Technology Office on electronics and photonics, and its Strategic Technology Office on communications, networks, and electronic warfare.

Dig into our InformationWeek Government visual guide to 14 of DARPA's most innovative technology projects. Image credit: DARPA

Previous
1 of 14
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Leo Regulus
50%
50%
Leo Regulus,
User Rank: Apprentice
9/28/2012 | 7:06:15 PM
re: 14 Amazing DARPA Technologies On Tap
As previously noted, CANNOT 'READ' SLIDE SHOWS.
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
What Israel's Elite Defense Force Unit 8200 Can Teach Security about Diversity
Lital Asher-Dotan, Senior Director, Security Research and Content, Cybereason,  5/21/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Shhh!  They're watching... And you have a laptop?  
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-3018
PUBLISHED: 2018-05-24
The AXIS webapp in deploy-tomcat/axis in IBM Tivoli Application Dependency Discovery Manager (TADDM) 7.1.2 and 7.2.0 through 7.2.1.4 allows remote attackers to obtain sensitive configuration information via a direct request, as demonstrated by happyaxis.jsp. IBM X-Force ID: 84354.
CVE-2013-3023
PUBLISHED: 2018-05-24
IBM Tivoli Application Dependency Discovery Manager (TADDM) 7.1.2 and 7.2.0 through 7.2.1.4 might allow remote attackers to obtain sensitive information about Tomcat credentials by sniffing the network for a session in which HTTP is used. IBM X-Force ID: 84361.
CVE-2013-3024
PUBLISHED: 2018-05-24
IBM WebSphere Application Server (WAS) 8.5 through 8.5.0.2 on UNIX allows local users to gain privileges by leveraging improper process initialization. IBM X-Force ID: 84362.
CVE-2018-5674
PUBLISHED: 2018-05-24
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
CVE-2018-5675
PUBLISHED: 2018-05-24
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...