Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Military To Develop Stealth Internet Communications Technology

The Defense Advanced Research Projects Agency will fund research on securing Web-based communications from being corrupted or intercepted by enemies.

Image Gallery: Who's Who In U.S. Intelligence
(click for larger image and for full photo gallery)
The Defense Advanced Research Projects Agency is developing technology that will allow military fighters to communicate stealthily over the Internet, particularly when third parties are trying to intercept their transmissions.

The military's experimental research agency is soliciting proposals for innovative technologies for what it's calling the Safer Warfighter Communications (SAFER) program, according to a document on the DARPA Web site. The agency released the request for proposals for SAFER last week.

In addition to enabling and protecting "safe, resilient communications over the Internet," the technology developed in the program also should be robust enough to support instant messaging, e-mail, social networking, streaming video, voice over Internet protocol, video conferencing, and other Web-based forms of communications, according to DARPA.

Specifically, DARPA is seeking any and all technologies that allow people to communicate anonymously over the Web. Technologies developed for SAFER should be immune from third-party efforts to suppress or corrupt transmissions, the agency said.

Some interception techniques DARPA is hoping to skirt with SAFER include IP address filtering or "blocking," which is typically done by blacklisting the IP addresses of Web sites or other services to deny the user access.

Domain naming service hijacking, which redirects a user to a different Web site or service from what the user intended, and content filtering that allows the capture of a user's network traffic are other infiltration techniques SAFER is meant to protect warfighters from, according to the RFP.

Firms have until July 6 to submit their initial responses to DARPA, and the proposal period closes on November 24.

SAFER is not the only program DARPA is working on that focuses on innovations in high-tech communications. Earlier this year, the agency sought requests to help develop a high-tech translation system -- called Robust Automatic Transcription of Speech -- that can accurately detect and translate speech even under noisy conditions.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-14
An issue was discovered in Joomla! 3.0.0 through 3.9.25. Inadequate escaping allowed XSS attacks using the logo parameter of the default templates on error page
PUBLISHED: 2021-04-14
An issue was discovered in Joomla! 3.0.0 through 3.9.25. Inadequate filters on module layout settings could lead to an LFI.
PUBLISHED: 2021-04-14
Command Injection in TOTOLINK X5000R router with firmware v9.1.0u.6118_B20201102, and TOTOLINK A720R router with firmware v4.1.5cu.470_B20200911 allows remote attackers to execute arbitrary OS commands by sending a modified HTTP request. This occurs because the function executes glibc's system funct...
PUBLISHED: 2021-04-14
An issue was discovered in the /api/connector endpoint handler in Yubico yubihsm-connector before 3.0.1 (in YubiHSM SDK before 2021.04). The handler did not validate the length of the request, which can lead to a state where yubihsm-connector becomes stuck in a loop waiting for the YubiHSM to send i...
PUBLISHED: 2021-04-14
AjaxSearchPro before 4.20.8 allows Deserialization of Untrusted Data (in the import database feature of the administration panel), leading to Remote Code execution.