Military technology

  • Terrorists develop tactics to evade U.S. drones

    The CIA’s use of Predator drones against Islamic militants in the Middle East began shortly after the 9/11 attacks and has increased dramatically during the Obama administration. As the number of drone strikes in Yemen increased, AQAP militants began to develop tactics to hide themselves from a drone’s sensors.

  • Deadly debris: Northwestern U students report on U.S. landmine legacy

    Despite a 20-year cleanup effort, the explosive remnants of war left behind by the United States after sustained military campaigns around the world continue to kill and maim thousands of people in Cambodia, Iraq, and other countries. Since 1993 the United States has spent $3.2 billion on efforts to clear unexploded ordnance, assist victims, and wipe out aging munitions stockpiles, but civilians are still dying and the “deadly debris” is inflicting incalculable damage on communities, regions, and entire countries.

  • Speedy, agile UAVs for troops in urban missions

    DARPA aims to give small unmanned aerial vehicles (UAVs) advanced perception and autonomy rapidly to search buildings or other cluttered environments without teleoperation. The program aims to develop and demonstrate autonomous UAVs small enough to fit through an open window and able to fly at speeds up to twenty meters per second (45 miles per hour) — while navigating within complex indoor spaces independent of communication with outside operators or sensors and without reliance on GPS waypoints.

  • New cyber test range trains soldiers for simultaneous cyber and combat operations

    A unique mix of training technologies sponsored by the Office of Naval Research (ONR) is preparing front-line soldiers to conduct cyber and combat operations simultaneously, as Marines demonstrated during a recent amphibious exercise off the coast of Virginia. During last month’s Bold Alligator exercise, Marines used ONR’s Tactical Cyber Range to emulate adversary communications hidden in a noisy, dense electromagnetic spectrum —as much a battleground in today’s digital world as any piece of land.

  • Turning deadly chemical warfare agents into harmless soil

    Destroying chemical warfare agents in bulk is a challenge for the military and international community. Current methods of eradication, such as incineration or hydrolysis, create toxic waste which requires further processing. The logistics required to transport large stockpiles from storage to a disposal site can be risky and expensive. DARPA is seeking portable system that turns stockpiles of chemical warfare agents into dirt or other safe organic compounds without generating hazardous waste.

  • A first: U.S. Navy shipboard laser operates in Persian Gulf

    The U.S. Navy announced that a laser weapon system (LaWS) — a cutting-edge weapon that brings significant new capabilities to America’s Sailors and Marines — was for the first time successfully deployed and operated aboard a naval vessel in the Persian Gulf. The operational demonstrations, which took place from September to November aboard USS Ponce (AFSB[I] 15), were historic not only because they showed a laser weapon working aboard a deployed U.S. Navy ship, but also because LaWS operated seamlessly with existing ship defense systems. During the tests, LaWS hit targets mounted aboard a speeding oncoming small boat, shot a Scan Eagle unmanned aerial vehicle (UAV) out of the sky, and destroyed other moving targets at sea.

  • view counter
  • Israel attacks targets in Syria to prevent advanced arms shipments to Hezbollah

    Israeli jets bombed two military targets in Syria – one near the Damascus International Airport, the other near the town of Dima, north of Damascus and near the Syria-Lebanon border – and as has been the case in previous such attacks, there was no confirmation or elaboration from Jerusalem. Syrian general command sources said that several facilities had been hit, both at the Damascus International Airport and in the area of Dimas. This is the tenth Israeli attack against military depots in Syria since January 2013. The attacks have had a specific goal: to prevent the Assad regime and Iran from transferring advanced weapon systems to Hezbollah. When Israel’s intelligence services notice that such systems are gathered for the purpose of shipping them to Hezbollah, the shipments are destroyed before they are delivered to Hezbollah.

  • U.S. nuclear arsenal must be upgraded to maintain effective deterrence: Experts

    Former military officers, academic strategists, scientists, and congressional leaders have recently been calling for the development of new nuclear weapons to replace the nation’s older, outdated stockpiles. Twenty-five years since the cold war ended, the U.S. nuclear arsenal has been significantly reduced to its current level of 4,804 nuclear weapons — from a peak of 31,000 weapons in 1967.As cooperation with Russia deepened in the 1990s, U.S. weapons complexes deteriorated. A recent “60 Minutes” story on the U.S. nuclear forces found that missileers charged with watching over and controlling Minuteman III ICBMs in Wyoming were still using floppy disks to store critical information. One expert arguing for shoring up and upgrading the U.S. nuclear deterrence says that “one of the reasons deterrence is so valuable is that it provides incentives for self-discipline in the behavior of states that otherwise cannot be trusted to behave peaceably.”

  • U.S. Army creates a Cyber branch

    Soldiers who want to defend the nation in cyberspace, as part of the U.S. Army’s newest and most technologically advanced career field, now have an Army branch to join that will take its place alongside infantry, artillery, and the other Army combat arms branches. Army Secretary John McHugh and Chief of Staff Gen. Raymond Odierno approved the creation of the Cyber branch in September. “The establishment of a Cyber Branch shows how important and critical the cyber mission is to our Army, and allows us to focus innovative recruiting, retention, leader development, and talent management needed to produce world-class cyberspace professionals,” said Lt. Gen. Edward Cardon, the commanding general of Army Cyber Command.

  • Navy considering allowing sailors temporary leave before returning to active duty

    The U.S. Navy is considering allowing sailors to take temporary leave and return to active duty after earning degrees or working in the private sector. The plan would save the Navy money spent on training new sailors, while retaining experienced personnel for the long term.

  • Pentagon mulls “byte for a byte” cyber retaliatory operations

    Much has been made of the phrase “an eye for an eye” throughout history, and it is beginning to appear that the oft-used motto will extend to the new fields of cyber warfare as well.This “approach is something our adversaries will readily understand,” one analyst writes. “If they escalate, we escalate. They know they will lose because we have far more cyber resources to draw on than they have, and we can cause real harm if they mess with us.”

  • ISIS has sufficient quantities of arms to carry on fighting for two years: UN

    A new report prepared for the United Nations Security Council warns that Islamic State (ISIS) has in its possession sufficient reserves of small arms, ammunition, and vehicles to wage its war for Syria and Iraq for up to two years. The size and diversity the Islamist organization’s arsenal allow the group durable mobility, range, and a limited defense against low-flying aircraft. The report notes that even if the U.S.-led air campaign continues to destroy the group’s vehicles and heavier weapon systems, such a campaign “cannot mitigate the effect of the significant volume of light weapons” Isis possesses.

  • Transforming planes into flying aircraft carriers

    Military air operations typically rely on large, manned, robust aircraft, but such missions put these expensive assets — and their pilots — at risk. While small unmanned aircraft systems (UAS) can reduce or eliminate such risks, they lack the speed, range, and endurance of larger aircraft. These complementary traits suggest potential benefits in a blended approach — one in which larger aircraft would carry, launch, and recover multiple small UAS. A flying carrier would allow the United States to use of drones in areas where the United States has no access to nearby airfields, but recovering a drone in mid-air remains a daunting technical challenge.

  • Wi-Fi signals enable through-wall detection

    Engineers prove the concept that local Wi-Fi signals can be used to monitor moving objects and bodies that are otherwise visually obscured. Although fundamentally similar to traditional radar systems, their novel approach is entirely passive — utilizing the wireless signals that already swamp our urban airways. This technology has a wide range of applications from healthcare monitoring, security and emergency disaster relief, to finding earthquake survivors in fallen buildings.

  • Autonomous weapons which select, destroy targets without human intervention proliferate

    More scientists are expressing concern over autonomous weapons which are able to select and destroy targets without human control or oversight. Armed drones can be operated by remote pilots, but weapons of the future will rely more on artificial intelligence to decide what to target and whom to kill.