Military technology

  • CyberwarNew cyber test range trains soldiers for simultaneous cyber and combat operations

    A unique mix of training technologies sponsored by the Office of Naval Research (ONR) is preparing front-line soldiers to conduct cyber and combat operations simultaneously, as Marines demonstrated during a recent amphibious exercise off the coast of Virginia. During last month’s Bold Alligator exercise, Marines used ONR’s Tactical Cyber Range to emulate adversary communications hidden in a noisy, dense electromagnetic spectrum —as much a battleground in today’s digital world as any piece of land.

  • Chemical agentsTurning deadly chemical warfare agents into harmless soil

    Destroying chemical warfare agents in bulk is a challenge for the military and international community. Current methods of eradication, such as incineration or hydrolysis, create toxic waste which requires further processing. The logistics required to transport large stockpiles from storage to a disposal site can be risky and expensive. DARPA is seeking portable system that turns stockpiles of chemical warfare agents into dirt or other safe organic compounds without generating hazardous waste.

  • Ray gunsA first: U.S. Navy shipboard laser operates in Persian Gulf

    The U.S. Navy announced that a laser weapon system (LaWS) — a cutting-edge weapon that brings significant new capabilities to America’s Sailors and Marines — was for the first time successfully deployed and operated aboard a naval vessel in the Persian Gulf. The operational demonstrations, which took place from September to November aboard USS Ponce (AFSB[I] 15), were historic not only because they showed a laser weapon working aboard a deployed U.S. Navy ship, but also because LaWS operated seamlessly with existing ship defense systems. During the tests, LaWS hit targets mounted aboard a speeding oncoming small boat, shot a Scan Eagle unmanned aerial vehicle (UAV) out of the sky, and destroyed other moving targets at sea.

  • SyriaIsrael attacks targets in Syria to prevent advanced arms shipments to Hezbollah

    Israeli jets bombed two military targets in Syria – one near the Damascus International Airport, the other near the town of Dima, north of Damascus and near the Syria-Lebanon border – and as has been the case in previous such attacks, there was no confirmation or elaboration from Jerusalem. Syrian general command sources said that several facilities had been hit, both at the Damascus International Airport and in the area of Dimas. This is the tenth Israeli attack against military depots in Syria since January 2013. The attacks have had a specific goal: to prevent the Assad regime and Iran from transferring advanced weapon systems to Hezbollah. When Israel’s intelligence services notice that such systems are gathered for the purpose of shipping them to Hezbollah, the shipments are destroyed before they are delivered to Hezbollah.

  • TECHEXPO - Exclusive Security-Cleared Hiring Events - Register Now!
    view counter
  • Nuclear weaponsU.S. nuclear arsenal must be upgraded to maintain effective deterrence: Experts

    Former military officers, academic strategists, scientists, and congressional leaders have recently been calling for the development of new nuclear weapons to replace the nation’s older, outdated stockpiles. Twenty-five years since the cold war ended, the U.S. nuclear arsenal has been significantly reduced to its current level of 4,804 nuclear weapons — from a peak of 31,000 weapons in 1967.As cooperation with Russia deepened in the 1990s, U.S. weapons complexes deteriorated. A recent “60 Minutes” story on the U.S. nuclear forces found that missileers charged with watching over and controlling Minuteman III ICBMs in Wyoming were still using floppy disks to store critical information. One expert arguing for shoring up and upgrading the U.S. nuclear deterrence says that “one of the reasons deterrence is so valuable is that it provides incentives for self-discipline in the behavior of states that otherwise cannot be trusted to behave peaceably.”

  • CybersecurityU.S. Army creates a Cyber branch

    Soldiers who want to defend the nation in cyberspace, as part of the U.S. Army’s newest and most technologically advanced career field, now have an Army branch to join that will take its place alongside infantry, artillery, and the other Army combat arms branches. Army Secretary John McHugh and Chief of Staff Gen. Raymond Odierno approved the creation of the Cyber branch in September. “The establishment of a Cyber Branch shows how important and critical the cyber mission is to our Army, and allows us to focus innovative recruiting, retention, leader development, and talent management needed to produce world-class cyberspace professionals,” said Lt. Gen. Edward Cardon, the commanding general of Army Cyber Command.

  • In the trenchesNavy considering allowing sailors temporary leave before returning to active duty

    The U.S. Navy is considering allowing sailors to take temporary leave and return to active duty after earning degrees or working in the private sector. The plan would save the Navy money spent on training new sailors, while retaining experienced personnel for the long term.

  • Offensive cyber operationsPentagon mulls “byte for a byte” cyber retaliatory operations

    Much has been made of the phrase “an eye for an eye” throughout history, and it is beginning to appear that the oft-used motto will extend to the new fields of cyber warfare as well.This “approach is something our adversaries will readily understand,” one analyst writes. “If they escalate, we escalate. They know they will lose because we have far more cyber resources to draw on than they have, and we can cause real harm if they mess with us.”

  • ISISISIS has sufficient quantities of arms to carry on fighting for two years: UN

    A new report prepared for the United Nations Security Council warns that Islamic State (ISIS) has in its possession sufficient reserves of small arms, ammunition, and vehicles to wage its war for Syria and Iraq for up to two years. The size and diversity the Islamist organization’s arsenal allow the group durable mobility, range, and a limited defense against low-flying aircraft. The report notes that even if the U.S.-led air campaign continues to destroy the group’s vehicles and heavier weapon systems, such a campaign “cannot mitigate the effect of the significant volume of light weapons” Isis possesses.

  • In the trenchesTransforming planes into flying aircraft carriers

    Military air operations typically rely on large, manned, robust aircraft, but such missions put these expensive assets — and their pilots — at risk. While small unmanned aircraft systems (UAS) can reduce or eliminate such risks, they lack the speed, range, and endurance of larger aircraft. These complementary traits suggest potential benefits in a blended approach — one in which larger aircraft would carry, launch, and recover multiple small UAS. A flying carrier would allow the United States to use of drones in areas where the United States has no access to nearby airfields, but recovering a drone in mid-air remains a daunting technical challenge.

  • DetectionWi-Fi signals enable through-wall detection

    Engineers prove the concept that local Wi-Fi signals can be used to monitor moving objects and bodies that are otherwise visually obscured. Although fundamentally similar to traditional radar systems, their novel approach is entirely passive — utilizing the wireless signals that already swamp our urban airways. This technology has a wide range of applications from healthcare monitoring, security and emergency disaster relief, to finding earthquake survivors in fallen buildings.

  • Killer robotsAutonomous weapons which select, destroy targets without human intervention proliferate

    More scientists are expressing concern over autonomous weapons which are able to select and destroy targets without human control or oversight. Armed drones can be operated by remote pilots, but weapons of the future will rely more on artificial intelligence to decide what to target and whom to kill.

  • CybersecurityNew report urges policy overhaul, transparency in offensive cyber operations

    A newly released report, titled Joint Publication 3-12(R) and authored by the Joint Chiefs of Staff, has revealed that some top commanders are calling for a policy overhaul and more public transparency in offensive cyber operations, given the growing need for such operations. Some previous documents have been published on the topic, but there is no official U.S. military policy book for cyber operations.

  • CommunicationBoeing completes testing of new anti-jamming technology

    Boeing says it has proven its new anti-jamming communications technology is capable of operating as either a ground-based user terminal or satellite-based networking hub, enabling the military to send and receive secure communications at a significantly lower cost by using existing terminals and satellites.

  • DronesLegal framework needed to govern soon-to-arrive autonomous killer drones: Experts

    With about 8,000 unmanned aircrafts and roughly 12,000 unmanned ground vehicles, the U.S. military boasts the world’s largest drone arsenal, followed by Israel, with China, Europe, India, and Russia in the second tier. Unmanned aerial vehicles (UAV) will pose a challenge to current international laws of warfare since someday, and sooner rather than later, they will be able to act autonomously – and kill autonomously. The international community has yet to adopt special laws to govern the use of drones in combat.