Cyberspace is essential to all Air Force (AF) missions. It is a domain in which, from which, and through which AF missions are performed. Actions in cyberspace can have digital, kinetic, and human effects. Increasingly, the cyberspace domain is contested and/or denied. Yet our ability to address opportunities and threats …
Read More »DARPA developing GPS backup and beyond Technologies for GPS denied and degraded environments
The GPS system provides critical positioning capabilities to military, civil, and commercial users around the world. The Global Positioning System (GPS), is a global navigation satellite system (GNSS) that provides location and time information in all weather conditions, anywhere on or near the Earth where there is an unobstructed line of …
Read More »Industry preparing for Post Quantum or Quantum proof cryptography as Quantum computers threaten global communication digital infrastructure
Cryptography is a vital part of cybersecurity. Security properties like confidentiality, integrity, authentication, non-repudiation rely on strong cryptographic mechanisms, especially in an always connected, always online world. In addition, cryptography’s applications open up new opportunities and markets: digital signatures or online transactions would not be possible without it. Quantum …
Read More »Militaries adopting rugged 5G enabled Notebooks, tablets and smart phones into tactical operations, however their vulnerability requires secure solutions
Military is increasingly looking to commercial ICT devices like Smartphones and tablets and they are rapidly making their way into military operations. Mobility continues to transform how the Department of Defense (DoD) operates, connects, and supports its stakeholders – most significantly, through the use of commercial mobile solutions to provide …
Read More »Photoacoustic Imaging enable Seeing Through Solids, hackproof Biometrics and Image Underwater Objects
Alexander Graham Bell discovered photoacoustics by accident when he was working on the development of the photophone, a followup to his recently developed telephone that operated via modulated sunlight instead of electricity. You would operate a photophone by speaking into its transmitter toward a mirror placed inside of it. The vibrations …
Read More »DARPA’s AMP to develop rapid, assuredly safe, and scalable software patches for reducing vulnerabilities of mission-critical systems
Our society’s infrastructure is increasingly dependent on software deployed on a wide variety of computing devices other than commodity personal computers, such as industrial equipment, automobiles, and airplanes. Unlike commodity computers that have short upgrade cycles and are easily replaceable in case of failure, these computing devices are intended for …
Read More »Large Biohacking or DIY biology growth, to hack human brains and their bodies, with desire to improve performance, cure chronic diseases and live longer
Just as computers could be hacked and made to perform according to one’s wishes, now you hack your own body, a concept called Biohacking. It can be as simple as implementing lifestyle and dietary changes that improve the functioning of your body such as to feel more awake, or optimize …
Read More »Enhancing endpoint protection needs to be a top priority for civilian & military
Nation-states, organised crime, hacktivists and deliberate and unintentional insider attacks are at risk of organisations of all sizes. Endpoints such as mobile devices, desktops, laptops, and even medical and IoT devices are a popular attack vector, and the goal of an attacker is to not only compromise the endpoint but …
Read More »DARPA OPS-5G to mitigate security threats facing 5G and future wireless networks in military appliations
5G is the latest in a series of evolutions in public mobile networking, with widespread coverage and access on a subscription basis. 5G networks are characterized by improved capabilities across a variety of measures, including throughputs, latencies, numbers of devices, and battery life. 5G is used to attach small special …
Read More »Quantum cryptography vulnerable to hacking too, Researchers developing hackerproof MDI QKD schemes to enhance network encryption
With the age of quantum computing drawing ever-closer, traditional encryption methods are at risk. While brute force attacks can take months to break through security, quantum attacks can use more advanced techniques to break standard public key cryptography in a much shorter timeframe. Quantum cryptography is an emerging technology …
Read More »