Technological innovation

  • Spectrum Challenge: more robust, resilient, reliable radio communications

    Reliable wireless communications today requires careful allocation of specific portions of the electromagnetic spectrum to individual radio networks. While pre-allocating spectrum is effective in benign environments, radios remain vulnerable to inadvertent interference from other emitters and intentional jamming by adversaries. On 19-20 March 2014, fifteen teams from around the country demonstrated new ways to help overcome these challenges by participating in the final event of the DARPA Spectrum Challenge — a national competition to develop advanced radio techniques capable of communicating in congested and contested electromagnetic environments without direct coordination or spectrum preplanning.

  • New consortium dedicated to developing nuclear arms control verification technologies

    A consortium of thirteen universities and eight national laboratories, led by the University of Michigan and including the Los Alamos National Laboratory as a partner, has been awarded a $25 million grant by the NNSA. The consortium is dedicated to the research and development (R&D) of nuclear arms control verification technologies, including nuclear safeguards effectiveness.

  • Cutting edge, animatronic mannequin to test CB protective suits, equipment

    See video

    The U.K. Defense Science and Technology Laboratory (DSTL) has taken delivery of a new robotic mannequin which will be used to test chemical and biological (CB) protective suits and equipment for the U.K.’s Armed Forces. The “Porton Man” uses state of the art technology and is able to walk, march, run, sit, kneel and even lift its arms as if to sight a weapon just like an infantry soldier.

  • Scale model WWII-era plane flies with fuel from the sea

    U.S. Navy researchers demonstrated proof-of-concept of novel technologies developed for the recovery of carbon dioxide (CO2) and hydrogen (H2) from seawater and conversion to a liquid hydrocarbon fuel. Fueled by a liquid hydrocarbon — a component of NRL’s novel gas-to-liquid (GTL) process which uses CO2 and H2 as feedstock — the research team demonstrated sustained flight of a radio-controlled (RC) P-51 replica of the legendary Red Tail Squadron, powered by an off-the-shelf (OTS) and unmodified two-stroke internal combustion engine.

  • DARPA launches Biological Technologies Office

    DARPA has established a new technology office — the Biological Technologies Office (BTO) — which will merge biology, engineering, and computer science to harness the power of natural systems for national security. With the establishment of the new office last week, biology takes its place among the core sciences that represent the future of defense technology.

  • New center will work to improve methods to detect, prevent the spread of nuclear weapons

    The National Nuclear Security Administration (NNSA) has awarded the University of Michigan $25 million to establish the Center for Verification Technology. A team from thirteen universities will work with eight national labs to analyze nuclear nonproliferation efforts, improve technologies for monitoring weapons-grade materials and detecting secret weapon tests, and train the next generation of nonproliferation experts.

  • Invisibility cloaks, stealth technology a step closer

    It may seem easy in Hollywood movies, but is hard to create invisibility cloaks in real life because no material in nature has the properties necessary to bend light in such a way. Scientists have managed to create artificial nanostructures that can do the job, called metamaterials. The challenge, however, has been making enough of the material to turn science fiction into a practical reality.

  • Prosecutors ask for confidentiality in NY “Death Ray” case

    Glendon Scott Crawford,a former General Electric Co. industrial mechanic, is standing trails in Albany, New York, for developed a radiological dispersal device which he tried to sell to both the KKK and to Jewish organizations so they could use it to kill Muslims. Several experts argued the device would not work since it would require massive amounts of electricity, weigh enough to crush most vehicles and would require victims to remain still in order to face prolonged exposure from close-range radiation.

  • World record in high altitude wind turbine set to be broken

    See video

    Boston, Massachusetts-based Altaeros Energies, a wind energy company formed out of MIT, said its Alaska demonstration project is set to break the world record for the highest wind turbine ever deployed. The $1.3 million, 18-month project will deploy the Altaeros BAT at a height 1,000 feet above ground. At that height, the BAT commercial-scale pilot project in Alaska will be over 275 feet taller than the current record holder for the highest wind turbine, the Vestas V164-8.0-MW. Investment into the high altitude wind sector has recently gained momentum with several large acquisitions.

  • New infrared technique remotely to detect dangerous materials

    Researchers say that infrared technology holds the potential to spot from afar whether a site is being used to make nuclear weapons. They developed a model which precisely characterizes the material in each pixel of an image taken from a long-wave infrared camera. The U.S. National Nuclear Security Administration (NNSA) funded the project. The government’s long-term goal for infrared technology is remotely to detect the exact materials, chemicals and gases coming and going from factories or other sites suspected of illegal nuclear production.

  • DARPA Grand Challenge: Ten years on

    At the break of dawn on 13 March 2004, fifteen vehicles left a starting gate in the desert outside of Barstow, California, to make history in the DARPA Grand Challenge, a first-of-its-kind race to foster the development of self-driving ground vehicles. It is not easy to quantify the effects of these DARPA challenges on the development and deployment of autonomous vehicle technology, but ten years later defense and commercial applications are proliferating. The rapid evolution of the technology and rules for how to deploy it are being driven by the information technology and automotive industries, academic and research institutions, the Defense Department and its contractors, and federal and state transportation agencies.

  • Innovative solar-powered toilet to be unveiled in India next week

    Unsafe methods to capture and treat human waste result in serious health problems and death — food and water tainted with pathogens from fecal matter results in the deaths of roughly 700,000 children each year. A revolutionary toilet fueled by the sun is being developed by University of Colorado Boulder researchers to help some of the 2.5 billion people around the world lacking safe and sustainable sanitation. It will be unveiled in India this month.

  • Compact UV laser for biological, chemical detection

    In addition to detecting chemical and biological agents in the field — or at home to protect against mass terror attacks — UV lasers have many other uses. The new class of UV lasers envisioned by DARPA’s Laser UV Sources for Tactical Efficient Raman (LUSTER) program is expected to be of use for a broad range of applications such as point-of-need medical diagnostics, advanced manufacturing, and compact atomic clocks.

  • Biometric security for mobile devices becoming mainstream

    Biometric security such as fingerprint, face, and voice recognition is set to hit the mainstream as global technology companies market the systems as convenient and easy to use. The latest biometric technologies are not without their security issues, but they are marketed as more convenient than traditional methods rather than more secure, and encourage adoption by people who currently do not have any security on their phone at all.

  • Platform for operating systems would outwit cyber criminals

    As smartphone use surges, consumers are just beginning to realize their devices are not quite as secure as they thought. A Swedish research team is working on a way to secure mobile operating systems so that consumers can be confident that their data is protected.