Showing posts with label Drones. Show all posts
Showing posts with label Drones. Show all posts

January 20, 2013

Under The Beautiful Sea

The Defense Advanced Research Project Agency (DARPA) is looking for a place to stash some new military capabilities.

In a DARPA news release (11 January 2013) it states they are looking to support the navy by placing hibernated deep-sea capsules with payloads at under water locations and at the seafloor strategically around the globe--"almost half of the world's oceans are more than four kilometers deep" providing "cheap stealth".

The capsules with carry non-lethal payloads for "operational support and situational awareness"--such as command, control, communication, computers, intelligence, surveillance, and reconnaissance (C4ISR). 

Examples of pre-deployed payloads could be unmanned aerial vehicles (UAVs) and probably, unmanned underwater vehicles (UUVs). The release specifically states that this is "not a weapons program," but you could imagine future evolutions of this.

The initial capabilities sought are for "situational awareness, disruption, deception, networking, rescue, or any mission that benefits from being pre-distributed and hidden." 

The deep-sea capsules will need to survive under extreme pressure and be able to communicate at vast ocean depths to be remotely awoken and recalled when needed. 

Having capabilities available when and where needed--from the bottom of the sea to forward deployment--potentially mitigating some use of costly and non-stealth land bases.

I think this is an exciting idea especially since China was able to demonstrate its anti-satellite missiles in January 2007 in shooting down its own satellite, and I would think that these new underwater pods being sought may be able to provide some alternatives for sensing and communicating in conflicts where satellites are destroyed or disabled and/or other military muscle in not readily available. 

(Source Photo: here with attribution to Rakel SdPC)

Share/Save/Bookmark

December 2, 2012

Flying Gizmo At Brookstone


I took this video of a flying drone at Brookstone at Avetura Mall in Miami. 

The drone is flying among the crowds and actually goes right over my head a couple of times--I literally had to duck (as I think the salesperson was having some fun with me recording)!

The device is called the Parrot AR.Drone 2.0 and sells for $299.

The drone is being controlled via wi-fi by a iPhone and also works with iPads and Droid devices.

The controlled flying as well as the stunts seemed easy to do. 

It has a front facing camera (and I think the salesperson said it has a rear-facing one too). 

You can capture the flight imagery and post the recorded video and still photos online. 

The quadricopter has stabilization controls and hull protection to keep the device safe and in the air. 

If you appreciate this technology and likes to have some fun, you may want to take this for a little spin around the yard, park, and beach. 

Also, watch out at the mall--this flying gizmo may be coming right at you. ;-)

(Source Video: Andy Blumenthal)

Share/Save/Bookmark

October 7, 2012

The iFirefighter


This the the first fire fighting robot and is built by Howe and Howe called the Thermite. 

Key features:

- Moves steadily on treads instead of wheels

- 1 ton of fire fighting power

- Fits through most doorways

- Douses fires with 600 gallons per minutes

- Doesn't tire like a human firefighter 

- Costs about $96,000 per unit

- Useful in chemical, radiological and other hazardous incidents

While I generally like these fire fighting robots, there are a number of  thoughts that come to mind about these:

- If someone is caught in a burning building or otherwise needs to be rescued, I believe that for now we are still going to be on the lookout  for the real human hero to come through the door and save the day. 

- The next advance will be autonomous firefighting robots (firefighting drones that can identify the fire, encircle it, and put the right suppressants to work to put it out quickly and safely.

- Soon it will be drones, drones everywhere--fighting everything from fires to the enemy and we will no longer be just people, performing alone, but surrounded by our little assistants--perhaps pulling the majority of the weight, leaving higher value activities to us humans.

Share/Save/Bookmark

June 1, 2012

We're In It Together


This is a cool vision by Tom Clancy of the "future soldier" from the Ghost Recon game series. 

The mixture of advanced weaponry, high-tech reconnaissance and surveillance, drones and robotics, future combat uniforms, and cloaking technology is just super.

If you have time and interest, there is another longer video here with footage that is particularly good starting at about the 3:40 marker. 

Like Star Trek paving the way for real-life advances in technology and space exploration, Clancy's future soldier will be another example of life imitating art.  

When we marry the vision and creativity of our entertainment industry, with the technical skills of our scientists and engineers, and the risk-taking of our entrepreneurs, we can do truly awesome things. 

"No one can do everything, but everyone can do something"--we're in it together! 

Share/Save/Bookmark

December 16, 2011

Decloaking The Adversary

Yes, we lost a drone in Iran and they won't give it back--that stinks!
Initially, the word coming out was it was a mishap, an accident, but the Iranians claimed otherwise--that they brought it down.
Who believed that they could actually do that?
Then there was word that the craft being displayed by the Iranians was a fake, a mock-up, only to reversed with a confirmation, as reported in Christian Science Monitor, that the drone "is almostly certainly the one lost by U.S. forces."
Well now, InformationWeek is reporting (16 December 2011) that Iran really did bring down the stealth drone as well as how they claim to have done it.
First they jammed the communications of the RQ-170 Sentinel, so that with its command, control, and communications (C3) no longer intact, it was forced to go into autopilot and rely on GPS signals to find its way.
Then, the Iranians spoofed the GPS signal making the Sentinel think it was landing at a U.S. base rather than right into hostile territory.
If this is true, then not only is all the captured sensitive technology aboard the craft (such as radar, fuselage, coating, and electronics) in jeopardy of being comprised by reverse engineering, but also as the article states, the Iranians may have demonstrated the means to be able to literally "divert any GPS-guided missiles launched at targets inside its borders."
Quite a scary thought when according to Reuters reports, Iran is less than a year from going nuclear!
So what is the truth and what is misinformation (PsyOps) to confuse or outwit the enemy and how much does any of that really matter if the Iranians have possession of our advanced technology along with the time and the nefarious partners to study it and use it against us?
Or perhaps, this is a great ruse by us and we intended for the Iranians to get the drone--tick, tick, tick... ;-)
We live in a new sophisticated world of electronic and cyber warfare and that combined with nukes makes for some truly dangerous scenarios.
Finally, we should never underestimate the capabilities or intent of our adversaries--surprise may be the the most potent enemy of them all.
(Source Photo: here)

Share/Save/Bookmark

December 9, 2011

Losing The Edge, No More

For years, there has been all sorts of uproar about the U.S. and its citizens and businesses losing their edge.

From critics who point out to how our educational system (especially through high school) is not keeping up, how we are not attracting and graduating enough folks in science, technology, engineering, and math (STEM), how our inventions are freely copied overseas, and how innovation and entrepreneurship is suffering at home whether due to challenging economic or social conditions.

Yet, when it comes to losing our edge, nothing is more maddening than when the technological advances we do have are taken from us--this happens in numerous ways, including:

- Cyber Attacks: According to the Pentagon Strategy on Cyberwar as per the Wall Street Journal (15 July 2011) "each year a volume of intellectual property the size of the Library of Congress is stolen from U.S. government and private-sector networks." Cyber espionage has affected a broad range of our prized national assets: from Space Shuttle designs to the Joint U.S. Defense Strategy with South Korea as del as the plans for the F-35 Joint Strike Fighter and more. Moreover and unfortunately, this is only the tip of the iceberg. For example, this past August, McAfee disclosed a cyber spying operation dubbed Operation Shady Rat that infiltrated some 71 government and corporate entities of which 49 were in the U.S. and which included more than a dozen defense firms over five years, compromising a massive amount of information.

- Spies/Insider Threats: Spies and insider threats can turn over state secrets to foreign powers or entities causing a major lose to our competitive advantage. This has happened with convicted spies from Aldrich Ames to FBI agent Robert Hanssen, and more recently to Army Corporal Bradley Manning accused of turning over troves of restricted documents to WikLleaks. And despite the amazing efforts to catch these subversives, presumably, there are plenty more where they came from.

- Expropriations: We lose our edge to foreign nations and organizations when our high-technology or intellectual assets are used without our consent or otherwise seized and compromised. This can happen from having our copyrights trampled on, our designs simply copied and "knockoffs" produced and peddled, or even when we are in a sense forced to exchange our intellectual property for basic entry into foreign markets. But this also happens more explicitly and violently when our assets are literally taken from us. For example this happened in April 2001, when Chinese fighter jets intercepted (in international air space) and crashed a U.S. EP-3 reconnaissance plane and didn't return it until July in disassembled pieces. Similarly, when the tail of the stealth modified MH-60 Black Hawk helicopter, with sensitive military technology, used in the raid in Osama bin Laden's was recovered and held by Pakistan for weeks before it was returned to the U.S. And we saw this again this week when the Iranians showed off a prized RQ-170 Sentinel stealth drone they now have seized, and which secrets presumably may end up in Russian, Chinese, or ultimately terrorist hands.

Developing an edge is not something we should take lightly or for granted--It is based on lots of talent, experience, and hard work and we do not have an exclusive hold on any of these.

We must prize our scientific and technological advances and secure these the way a mother protects it's young--fiercely and without compromise.

No matter how much or fast we churn out the advances, it will not matter if we do not safeguard our investments from those who would take it right out from under us. We can do this by significantly increasing investment in cyber security, strengthening counterespionage efforts, and not letting any nation or organization take something that doesn't belong to them without consequences--economic or military--that restore our edge and then some.

Share/Save/Bookmark

October 2, 2011

Robots Are Not Just For Fighting

"The AlphaDog Proto is a lab prototype for the Legged Squad Support System [LS3], a robot being developed by Boston Dynamics with funding from DARPA and the US Marine Corps. When fully developed the system will carry 400 lbs of payload on 20-mile missions in rough terrain. The first version of the complete robot will be completed in 2012."

According to Boston Dynamics, AlphaDog will follow a leader with computer vision or travel via GPS to designated locations.

The video shows a truly amazing display of the robot galloping, traversing obstacles, recovering from being pushed, and even rolling over and getting up from a supine position.

AlphaDog is designed as a true workhorse and resembles something more out of a Mad Max movie than what you would think of as supporting our next generation war fighters. Note: I'll take a flying hovercraft with pinpoint fire laser ray beams over a 4-legged robot workhorse any day! :-)

But with the array of sensors and weapons supported by drones flying overhead and robotics sentries on the ground, and 4-legged robots ferrying supplies to the front lines, the battlefield is quickly changing to man and machine fighting side by side, and maybe one day machines fighting in lieu of people.

While MIT Technology Review states "This is just what soldiers need," I'm interested in seeing future applications of these robots not just for the military, but also in terms of how they will change areas such as law enforcement, fire and rescue, construction, assembly-line production, transportation, medicine, service industries, and more.

Robots are not just for fighting, although it looks like AlphaDog could give anyone a good kick in the teeth and keep on lugging its load.

Share/Save/Bookmark

September 10, 2011

Kamikaze UAVs

Check out the new AeroVironment's Switchblade--a weaponized Unmanned Aerial Vehicle (UAV)--demoed at the Association for Unmanned Vehicle Systems International (AUVSI).

The Switchblade is a backpack-sized, portable drone that can be launched by our soldiers on the battlefield to locate the enemy and take them out.

The Switchblades are weaponized drones--they are easily deployed from their launch tunes and then piloted remotely or autonomously to recon enemy positions.

Once the enemy is located, the operator can arm the drone and quietly send it in on a suicide bombing run--flying straight into the enemy target.

Popular Science and MSNBC is reporting that the U.S. Army has made a multi-million dollar order for these little kamikazes.

The video demonstrates how soldiers under attack quickly and effectively use the Swichblade drones to safely counter and strike against enemy attackers.

Instead of calling in for reinforcements, our troops will now have the capability to deploy their own aerial support--anytime, anywhere.

Self-sufficiency is a great thing, especially when the enemy thinks they have you pinned down--and then boom! ;-)

Share/Save/Bookmark

July 30, 2011

Sensors, Sensors Everywhere

Three_surveillance_cameras

Sensors will soon be everywhere--waiting, watching, and working to capture information about you and the environment we inhabit.

Every sensor is an opportunity to collect data and use that data for making better decisions.

Of course, we see sensors deployed first and foremost from our military overseas, in Iraq and Afghanistan, which uses drones to spy on and strike on our adversaries. The drones are really flying platforms of sensors and in some cases with weapons at ready. According to the New York Times (20 June 2011) "From blimps to bugs, an explosion in aerial drones is transforming the way America fights and thinks about its wars..the pentagon now has some 7,000 aerial drones...[and] has asked for nearly $5 billion for drones for next year." These drones are providing "a Tsunami of data" from intelligence, surveillance, and reconnaissance. The change to drones is so significant in our military that the Times reports that "already the Air Force is training more remote pilots, 350 this year alone, than fighter and bomber pilots combined."

Similarly, the Wall Street Journal (5 July 2011) reports that another type of sensor--surveillance cameras--are being deployed big time in China with a new surveillance network in Chongqing of 500,000 cameras (Beijing already has 280,000 cameras in its system) "that officials says will prevent crime but that human-rights advocates warn could target political dissent." While this project is significantly larger and more aggressive than other cities have deployed, China is certainly not alone in deploying surveillance cameras in their cities--Chicago has 10,000, New York has 8,000, and London has over 10,000. According to the WSJ, the overall market last year for surveillance-equiptments sales, not including networking gear or software totaled $1.7 billion! So smile, you are on camera--and it's candid, indeed.

A third article ran in Government Computer News (July 2011) on a more innocuous type of sensors to be used--this being the mass deployment of mobile sensors for the National Weather Service (NWS) on vehicle fleets such as Greyhound buses etc. Beginning in October, "2,000 commercial vehicles will be equipped with sensors...and will be sending data to NWS in near real time. We will be rolling out coverage on the national level." The mobile sensors will be taking 100,000 observations daily--every 10 seconds, about every 300 meters--measuring temperature, humidity, dew, precipitation, and solar information." In the future, we are looking at the potential of a "a sensing probe in every car"--for collecting information on hazardous roads, traffic patterns, and preventing accidents. Other applications for mobile sensors could be for "monitoring chemical and biological agents," nuclear and radiological ones, or CO2 and Ozone and more.

While sensors can collect data that can be used to analyze situations early and often to help people; certainly, they can also be misused to spy on one's citizens and suppress freedom. It can be a slippery slope. Perhaps that why Wired Magazine recently ask (July 2011) who's "Watching the Watchers" making the distinction between:

1) Surveillance--the monitoring of events by those above, the authorities--with CCTV etc. and monitoring events from control rooms, potentially from anywhere around the world.
2) Sousveillance--the monitoring of events by those below, the citizens--with everyday smartphones, cameras, and videocams and posting the digital images and sound bytes to YouTube, Facebook, Twitter, and so on for the world to see.

With IPV6 providing enough Internet address for attaching sensors to every atom on the surface of the earth and sensors becoming smaller and more imperceptible, we can soon monitor and report on everything, everywhere all the time. Some of the biggest challenges remain ensuring the information monitored is kept secure, private, and used legally and ethically and sifting through all the data to identify the truly meaningful information from what's just noise.

(Source Photo: here)

Share/Save/Bookmark

January 2, 2011

The Robots Are Coming

Forget waiters and waitresses, the new Japanese Hajime Robot restaurant in Bangkok, Thailand invested almost $1 million on 4 robotic waitstaff.

You order your food by touch screen computer, and there is a countdown on the screen for when the food is ready and the robot brings it out to you.

While the samurai clad robots are not the best looking—their huge eyes are a little cartoonish—they are certainly quite dexterous and able as they nimbly serve the food in this restaurant and dance for the customers in between courses without missing a beat.

Initially automation affected the jobs of blue-collar workers in manufacturing and mechanical work as robots displaced people on the “assembly line.” Now we see the trend continuing and expanding with automation entering the service industry and jobs involving customer interaction, entertainment, and retail being affected. This is happening not only in restaurants, but also elder care (like robot uBot5 being developed out of University of Massachusetts), and in major retail establishments such as in warehouse automation with Kiva Systems robots being employed by major companies like Gap, Staples, and Zappos.

Further, the expansion of robots into traditional human work is also happening in our military—think Unmanned Aerial Vehicles (UAVs or Drones) like the Predators and Reapers, the robotics pack animals that can carry hundreds of pounds of gear (like Big Dog) and various bomb disposal robots. This is just the beginning.

We are witnessing the transformation of our workforce from traditional blue- and now even white-collar jobs to those with an emphasis on knowledge management (think engineers and technology professionals working at companies like iRobot, Intel, and Apple). This has obvious implications for selection of education pursuits and availability of professional opportunities in the future for our children and grandchildren.

The robots are coming. The robots ARE coming!


Share/Save/Bookmark

December 19, 2009

How $26 Can Buy You A Billion-Dollar Surveillance System

If $26 software can give our enemies on the ground access to our drone feeds and cyber warfare can inflict indefinite havoc on our critical infrastructure, we need to rethink what technological superiority means and how we keep it.

No defense system is foolproof. That’s why we build redundancy into the system and layer our defenses with “defense in depth,” so that just because the enemy infiltrates one layer, doesn’t mean that our defenses are laid bare.

When in fact, we become aware that our systems have been compromised, it is only responsible for us to re-secure them, bolster them with additional defenses, or take those systems out of commission.

It was shocking to learn this week in multiple reports in the Wall Street Journal that our UAV drones and their surveillance systems that have been so critical in our fight against terror in Iraq and Afghanistan were compromised, and the feeds intercepted by $25.95 software sold over the Internet. These feeds were found on the laptops of the very militants we were fighting against. Reportedly, we knew about this vulnerability ever since the war in Bosnia.

It is incredible to imagine our massive multi-billion dollar defense investments and technological know-how being upended by some commercial-off-the-shelf software bought online for the price of a family dinner at McDonalds. But what makes it even worse is that we knew for nearly two decades that the enemy had compromised our systems, yet we did not fix the problem.

A number of reasons have been circulated about why the necessary encryption was not added to the drones, as follows:

- It would have resulted in an increase in cost to the development and deployment of the systems.

- There would be a detriment to our being able to quickly share surveillance information within the U.S. military and with allies.

- There was immediate battlefield need for the drones because of the immediate concern about roadside bombs and therefore there was apparently no time to address this issue.

Based on the above, one may possibly be able to understand why the Joint Chiefs “largely dismissed” the need to repair the drones’ security flaw. However, it also seems that they were overconfident. For any “Are You Smarter Than A Fifth Grader” contestant can tell you that if the enemy can see and hear what we see and hear, then they can take action to subvert our military and intelligence resources, and the critical element of surprise is gone—the mission is compromised.

Of course as civilians we are not privy to all the information that our leaders have. And one can say that if all you have are compromised drones, then those are what you must use. Nevertheless, officials interviewed by the Journal point to the hubris that influenced the decision in this situation – as the report states:

“The Pentagon assumed that local adversaries [in Iraq and Afghanistan] wouldn’t know how to exploit” the vulnerability. So, the result was that we kept building and deploying the same vulnerable systems, over a long period of time!

This is not the first time that we have both been overconfident in our technological superiority and underestimated competitors and opponents in foreign countries—with disastrous results. There are the human tragedies of Pearl Harbor and 9/11, to name just two. And then there are the economic challenges of global competition, such as in the automobile industry and overseas manufacturing in general.

And if some terrorist cells on the run can so clearly compromise our technical know-how, shouldn’t we be even more concerned about established nations who are well financed and determined to undermine our security? For example, just this week, a group calling itself the “Iranian Cyber Army” hacked and defaced Twitter and we were helpless to prevent it. Also noteworthy is that this same week, it was reported that our defense plans with respect to South Korea, including operational details, were hacked into and stolen by North Korea.

Unfortunately, however, we do not even seem to take threats from other nations as seriously as we should: As the Journal reported, “senior U.S. military officers working for the Joint Chiefs of Staff discussed the danger of Russia and China intercepting and doctoring video from the drone aircraft in 2004, but the Pentagon didn’t begin securing signals until this year.”

I am deeply respectful of our military and the men and women who put their lives on the line for our nation. It is because of that deep respect that I reach out with concern about our overconfidence that we are technologically superior, and about our dismissal and underestimation of the resolve of our enemies.



Share/Save/Bookmark

July 18, 2009

IT as a Surrogate Weapon

There is a fascinating controversy going on now over the CIA plans to kill known al Qaeda terrorists. Should we “stoop to their level” and take them out or is this “assassination” style technique out of bounds for a free and democratic society?

Wow. I don’t think too many Americans the day after 9/11 would be asking that question.

We are quickly swayed by the events of the times and our emotions at play.

When 3,000 people—mostly civilians—were killed in a vicious surprise attack on our financial and military hubs in this country; when the Twin Towers were still burning and crashing down; when smoke was rising out of the Pentagon; and when a plane crashed in Pennsylvania—I think most of us would say, these terrorists need to be dealt a severe and deadly blow.

Who would’ve though that just a mere 8 years later, questions would abound on the righteousness of killing the terrorists who planned, executed, and supported these murderous attacks and still seek every day to do us incredible harm—quite likely with chemical, nuclear, biological, or radiological (CNBR) weapons—it they could pull it off in the future.

We are a society with a short-term memory. We are a reactive society. As some have rightly said, we plan to fight the wars of the past, rather than the wars of the future.

We are also a doubting society. We question ourselves, our beliefs, and our actions. And to some extent this is a good thing. It elevates our humanity, our desire to do what is right, and to improve ourselves. But it can also be destructive, because we lose heart, we lose commitment, we change our minds, we are swayed by political currents, and to some extent we swing back and forth like a pendulum—not knowing where the equilibrium really is.

What makes the current argument really fascinating to me from an IT perspective is that we are okay with drones targeting missiles at terrorist targets (and even with a certain degree of civilian “collateral damage”) from these attacks from miles in the sky, but we are critical and repugnant to the idea the CIA wanted to hunt down and put bullets in the heads of the terrorists who committed the atrocities and are unwavering in their desire to attack again and again.

Is there an overreliance on technology to do our dirty work and an abrogation of hands-on business process to do it with our own “boots on the ground” hands?

Why is it okay to pull the trigger on a missile coming from a drone, but it is immoral to do it with a gun?

Why is it unethical to fight a war that we did not choose and do not want, but are victims of?

Why are we afraid to carry out the mission to its rightful conclusion?

The CIA, interrogators, military personnel and so forth are demonized for fighting our fight. When they fight too cautiously—they have lost their will and edge in the fight, we suffer consequences to our nation’s safety, and we call them incompetent. When they fight too vigorously, they are immoral, legal violators, and should be prosecuted. We are putting “war” under a huge microscope—can anyone come out looking sharp?

The CIA is now warning that if these reputational attacks continue, morale will suffer, employees will become risk-averse, people will quit, and the nation will be at risk.

Do we want our last lines of defense to be gun-shy when the terrorists come hunting?

According to the Wall Street Journal, “one former CIA director, once told me that the ‘CIA should do intelligence collection and analysis, not covert actions. Covert actions almost never work and usually get the Agency in trouble.’”

The Journal asks “perhaps covert action should be done by someone else.” Who is this someone else?

Perhaps we need more technology, more drones to carry out the actions that we cannot bear to face?

I believe that we should not distinguish between pulling the trigger on a drone missile and doing the same on a sniper rifle. Moreover, a few hundred years ago the rifle was the new technology of the time, which made killing less brutal and dehumanized. Now we have substituted sophisticated drones with the latest communication, navigation and weapons technologies. Let’s be honest about what we are doing – and what we believe needs to be done.

(As always, my views are my own and do not represent those of any other entity.)


Share/Save/Bookmark