Defense Advanced Research Projects AgencyOur Research

Our Research

DARPA’s investment strategy begins with a portfolio approach. Reaching for outsized impact means taking on risk, and high risk in pursuit of high payoff is a hallmark of DARPA’s programs. We pursue our objectives through hundreds of programs. By design, programs are finite in duration while creating lasting revolutionary change. They address a wide range of technology opportunities and national security challenges. This assures that while individual efforts might fail—a natural consequence of taking on risk—the total portfolio delivers. More

For reference, past DARPA research programs can be viewed in the Past Programs Archive.

Modern expeditionary military missions generate and exchange massive amounts of data that are used to produce situational awareness and guide decision-making. Much of the data must travel long distances along backbone communications networks composed of high-capacity links that interconnect command centers. More
The ultimate goal of the DARPA Accelerated Computation for Efficient Scientific Simulation (ACCESS) is to demonstrate new, specialized benchtop technology that can solve large problems in complex physical systems on the hour timescale, compared to existing methods that require full cluster-scale supercomputing resources and take weeks to months. The core principle of the program is to leverage advances in optics, MEMS, additive manufacturing, and other emerging technologies to develop new non-traditional hybrid analog and digital computational means. More
Efficient discovery and production of new molecules is essential to realize capabilities across the DoD, from simulants and medicines essential to counter emerging threats, to coatings, dyes and specialty fuels needed for advanced performance. More
The United States Government has an interest in developing and maintaining a strategic understanding of events, situations, and trends around the world, in a variety of domains. The information used in developing this understanding comes from many disparate sources, in a variety of genres, and data types, and as a mixture of structured and unstructured data. Unstructured data can include text or speech in English and a variety of other languages, as well as images, videos, and other sensor information. More
Over the past 40 years, our world has become increasingly connected. These connections have enabled major advances in national security from pervasive real-time intelligence and communications to optimal logistics. With this connectivity has come the threat of cyber attacks on both military systems and critical infrastructure. While we focus the vast majority of our security efforts on protecting computers and networks, more than 80% of cyber attacks and over 70% of those from nation states are initiated by exploiting humans rather than computer or network security flaws. To build secure cyber systems, it is necessary to protect not only the computers and networks that make up these systems but their human users as well. More
The military relies heavily on the Global Positioning System (GPS) for positioning, navigation, and timing (PNT), but GPS access is easily blocked by methods such as jamming. In addition, many environments in which our military operates (inside buildings, in urban canyons, under dense foliage, underwater, and underground) have limited or no GPS access. To solve this challenge, Adaptable Navigation Systems (ANS) seeks to provide GPS-quality PNT to military users regardless of the operational environment. More
Current airborne electronic warfare (EW) systems must first identify a threat radar to determine the appropriate preprogrammed electronic countermeasure (ECM) technique. This approach loses effectiveness as radars evolve from fixed analog systems to programmable digital variants with unknown behaviors and agile waveforms. Future radars will likely present an even greater challenge as they will be capable of sensing the environment and adapting their transmissions and signal processing to maximize performance and mitigate interference effects. More
| EW | ISR | Spectrum |
The Adaptive RF Technology (ART) program aims to significantly advance the hardware used in communication radios by developing a fully adaptive and reconfigurable architecture that is agnostic to specified waveforms and standards. ART-enabled “cognitive” radios would be able to reconfigure themselves to operate in any frequency band with any modulation and for multiple access specifications under a range of environmental and operating conditions. More
The Advanced Plant Technologies (APT) program seeks to develop plants capable of serving as next-generation, persistent, ground-based sensor technologies to protect deployed troops and the homeland by detecting and reporting on chemical, biological, radiological, nuclear, and explosive (CBRNE) threats. Such biological sensors would be effectively energy-independent, increasing their potential for wide distribution, while reducing risks associated with deployment and maintenance of traditional sensors. These technologies could also potentially support humanitarian operations by, for example, detecting unexploded ordnance in post-conflict settings. More
Today’s interconnected wireless world has led to congested airwaves, making Radio Frequency (RF) management a hot topic. For warfighters overseas, efficiently managing the congested RF spectrum is critical to ensure effective communications and intelligence gathering. More
The ability to see farther, with higher clarity, and through darkness and/or obscurants, is vital to nearly all military operations. At the same time, for advanced imaging systems there is an immense need to increase field of view (FOV), resolution, and day/night capability at reduced size, weight and power (SWaP) and cost. The main driver for these requirements is the need to provide dismounted soldiers and near-ground support platforms with the best available imaging tools to enhance combat effectiveness. More
Airspace for the flying public today is perpetually congested yet remarkably safe, thanks in no small part to a well-established air traffic control system that tracks, guides and continuously monitors thousands of flights a day. When it comes to small unmanned aerial systems (UAS) such as commercial quadcopters, however, no such comprehensive tracking system exists. And as off-the-shelf UAS become less expensive, easier to fly, and more adaptable for terrorist or military purposes, U.S. forces will increasingly be challenged by the need to quickly detect and identify such craft—especially in urban areas, where sight lines are limited and many objects may be moving at similar speeds. More
Difficult terrain and threats such as ambushes and Improvised Explosive Devices (IEDs) can make ground-based transportation to and from the front line a dangerous challenge. Helicopters can easily bypass those problems but present logistical challenges of their own, and can subject flight crew to different types of threats. They are also expensive to operate, and the supply of available helicopters cannot always meet the demand for their services, which cover diverse operational needs including resupply, fire-team insertion and extraction, and casualty evacuation. More
The Agile Teams (A-Teams) program aims to discover, test, and demonstrate generalizable mathematical abstractions for the design of agile human-machine teams and to provide predictive insight into team performance. More
Destroying bulk stores of chemical warfare agents (CWAs) and organic precursors is a significant challenge for the international community. Today, for example, there are no approaches that exploit chemistries that are truly agnostic in terms of the agents that can be processed. In addition, current approaches require transport of agents from the storage site to a neutralization site. Ensuring safe transport of the agent can add significant cost and time to the process. More
Military aircraft have evolved to incorporate ever more automated capabilities, improving mission safety and success rates. Yet operators of even the most automated aircraft must still manage dauntingly complex interfaces and be prepared to respond effectively in emergencies and other unexpected situations that no amount of training can fully prepare one for. More
The goal of All Together Now (ATN) is to develop theoretical protocols and experimental techniques that enable new collective atom regimes, leading to sensitivities approaching the ultimate fundamental limits of performance. More
Today’s electromagnetic (EM) systems use antenna arrays to provide unique capabilities, such as multiple beam forming and electronic steering, which are important for a wide variety of applications such as communications, signal intelligence (SIGINT), radar, and electronic warfare. More
Autonomy refers to a system’s ability to accomplish goals independently, or with minimal supervision from human operators in environments that are complex and unpredictable. Autonomous systems are increasingly critical to several current and future Department of Defense (DoD) mission needs. More
Precise timing is essential across DoD systems, including communications, navigation, electronic warfare, intelligence systems reconnaissance, and system-of-systems platform coordination, as well as in national infrastructure applications in commerce and banking, telecommunications, and power distribution. Improved clock performance throughout the timing network, particularly at point-of-use, would enable advanced collaborative capabilities and provide greater resilience to disruptions of timing synchronization networks, notably by reducing reliance on satellite-based global navigation satellite system (GNSS) timing signals. More
State-of-the-art magnetometers are used for diverse civilian and DoD applications, among them biomedical imaging, navigation, and detecting unexploded ordnance and underwater and underground anomalies. Commercially available magnetometers range from inexpensive Hall probes to highly sensitive fluxgate and atomic magnetometers to high-precision Superconducting Quantum Interference Device (SQUID) and Spin Exchange Relaxation Free (SERF) magnetometers. More
Manufacturing by assembly provides the flexibility to freely combine materials and components and is fundamental to creating devices from cell phones to appliances to airplanes. However, assembly processes are currently not practical at the nanoscale. The A2P program was conceived to deliver scalable technologies for assembly of nanometer- to micron-scale components—which frequently possess unique characteristics due to their small size—into larger, human-scale systems. More
The Autonomous Diagnostics to Enable Prevention and Therapeutics (ADEPT) program supports individual troop readiness and total force health protection by developing technologies to rapidly identify and respond to threats posed by natural and engineered diseases and toxins. A subset of ADEPT technologies specifically support use by personnel with minimal medical training, delivering centralized laboratory capabilities even in the low-resource environments typical of many military operations. The program is part of a portfolio of DARPA-funded research aimed at providing options for preempting or mitigating constantly evolving infectious disease threats. More
The Battlefield Medicine program supports military readiness in far-forward deployed settings by overcoming logistical obstacles to manufacturing and delivery of urgently needed pharmaceutical products used to treat emerging threats. More
The Behavioral Learning for Adaptive Electronic Warfare (BLADE) program is developing the capability to counter new and dynamic wireless communication threats in tactical environments. BLADE is enabling a shift from today's manual-intensive lab-based countermeasure development approach to an adaptive, in-the-field systems approach. The program will achieve this by developing novel machine-learning algorithms and techniques that can rapidly detect and characterize new radio threats, dynamically synthesize new countermeasures, and provide accurate battle damage assessment based on over-the-air observable changes in the threat. More
| EW | ISR | Spectrum |
Some of the systems that matter most to the Defense Department are very complicated. Ecosystems, brains and economic and social systems have many parts and processes, but they are studied piecewise, and their literatures and data are fragmented, distributed and inconsistent. It is difficult to build complete, explanatory models of complicated systems, and so effects in these systems that are brought about by many interacting factors are poorly understood. More
| AI | Automation | Data |
The Biological Control program seeks to support a wide range of potential Department of Defense (DoD) applications by establishing design and control principles that lead to reliable performance in biological systems. Leveraging technologies developed under this program will enable consistent operation of systems that combat biological threats; speed healing after physical trauma; and support military readiness by complementing the body’s natural defenses against emerging diseases. More
The Biological Robustness in Complex Settings (BRICS) program aims to transform engineered microbial biosystems into reliable, cost-effective strategic resources for the Department of Defense (DoD), enabling future applications in the areas of intelligence, readiness, and force protection. Examples include the identification of the geographical provenance of objects; protection of critical systems and infrastructure against corrosion, biofouling, and other damage; sensing of hazardous compounds; and efficient, on-demand bio-production of novel coatings, fuels, and drugs. More
Unmanned underwater vehicles (UUVs) have inherent operational and tactical advantages such as stealth and surprise. UUV size, weight and volume are constrained by the handling, launch and recovery systems on their host platforms, however, and UUV range is limited by the amount of energy available for propulsion and the power required for a given underwater speed. Current state-of-the-art energy sources are limited by safety and certification requirements for host platforms. More
How can society responsibly reap the benefits of big data while protecting individual privacy? More
| Data | Privacy |
Expanded global access to diverse means of communication is resulting in more information being produced in more languages more quickly than ever before. The volume of information encountered by DoD, the speed at which it arrives, and the diversity of languages and media through which it is communicated make identifying and acting on relevant information a serious challenge. At the same time, there is a need to communicate with non-English-speaking local populations of foreign countries, but it is at present costly and difficult for DoD to do so. More
Modern-day software operates within a complex ecosystem of libraries, models, protocols and devices. Ecosystems change over time in response to new technologies or paradigms, as a consequence of repairing discovered vulnerabilities (security, logical, or performance-related), or because of varying resource availability and reconfiguration of the underlying execution platform. When these changes occur, applications may no longer work as expected because their assumptions on how the ecosystem should behave may have been inadvertently violated. More
Over the last 15 years, the U.S. military has increasingly been called upon to face complex operational environments (OE) and diverse enemies. Such complex OEs require the actions of U.S. forces and host-nation or coalition partners to be based on a common holistic understanding of the OE (e.g., governments, population groups, security forces, and violent non-state actors) and, in particular, the causal dynamics that can manifest as unanticipated and often counter-intuitive outcomes. More
It can cost up to $100 million and take more than two years for a large team of engineers to design custom integrated circuits for specific tasks, such as synchronizing the activity of unmanned aerial vehicles or the real-time conversion of raw radar data into tactically useful 3-D imagery. This is why Defense Department engineers often turn to inexpensive and readily available general-purpose circuits, and then rely on software to make those circuits run the specialized operations they need. More
The Clean-Slate Design of Resilient, Adaptive, Secure Hosts (CRASH) program will pursue innovative research into the design of new computer systems that are highly resistant to cyber-attack, can adapt after a successful attack to continue rendering useful services, learn from previous attacks how to guard against and cope with future attacks, and can repair themselves after attacks have succeeded. Exploitable vulnerabilities originate from a handful of known sources (e.g., memory safety); they remain because of deficits in tools, languages and hardware that could address and prevent vulnerabilities at the design, implementation and execution stages. More
| Cyber | Trust |
The U.S. military’s investments in unmanned aircraft systems (UAS) have proven invaluable for missions ranging from intelligence, surveillance and reconnaissance (ISR) to tactical strike, but most current systems demand continuous control by a dedicated pilot and sensor operator supported by numerous telemetry-linked analysts. More
The explosive growth in mobile and telecommunication markets has pushed the semiconductor industry toward integration of digital, analog, and mixed-signal blocks into system-on-chip (SoC) solutions. Advanced silicon (Si) complementary metal oxide semiconductor (CMOS) technology has enabled this integration, but has also led to a rise in costs associated with design and processing. Driven by aggressive digital CMOS scaling for high-volume products, Intellectual Property (IP) reuse has emerged as a tool to help lower design costs associated with advanced SoCs. More
The Communicating with Computers (CwC) program aims to enable symmetric communication between people and computers in which machines are not merely receivers of instructions but collaborators, able to harness a full range of natural modes including language, gesture and facial or other expressions. For the purposes of the CwC program, communication is understood to be the sharing of complex ideas in collaborative contexts. Complex ideas are assumed to be built from a relatively small set of elementary ideas, and language is thought to specify such complex ideas—but not completely, because language is ambiguous and depends in part on context, which can augment language and improve the specification of complex ideas. More
| AI | Autonomy | Data |
The continued growth in unmanned, sensor, and networked devices is expected to drive the need for larger, more capable and more diverse communications systems. Among other enhancements, these systems must improve jam-resistance and low probability of detection to keep pace with adversaries’ growing electronic sophistication and must adapt to fast-changing operational environments. By contrast, today’s military communications architectures are static and inflexible. More
Defense forces rely on electromagnetic dominance for command, control, intelligence, surveillance, reconnaissance, and related applications that use the electromagnetic spectrum. Similarly, spectrum use by our adversaries, coupled with extensive commercial use, yields an increasingly congested space, time and frequency environment. More
System-of-Systems (SoS) architectures are increasingly central in managing defense, national security and urban infrastructure applications. However, it is difficult to model and currently impossible to systematically design such complex systems using existing tools, which has led to inferior performance, unexpected problems and weak resilience. More
Commercial Test and Measurement equipment has advanced greatly with the emergence of sophisticated cellular and wireless local area network technology and can be used to intercept, analyze and exploit our military communications signals. More
A rapidly increasing percentage of the world’s population is connected to the global information environment. At the same time, the information environment is enabling social interactions that are radically changing how and at what rate information spreads. Both nation-states and nonstate actors have increasingly drawn upon this global information environment to promote their beliefs and further related goals. More
The Department of Defense (DoD) maintains information systems that depend on Commercial off-the-shelf (COTS) software, Government off-the-shelf (GOTS) software, and Free and open source (FOSS) software. Securing this diverse technology base requires highly skilled hackers who reason about the functionality of software and identify novel vulnerabilities. More
The growth of the internet-of-things (IoT) and network-connected composed systems (e.g., aircraft, critical-infrastructure, etc.) has led to unprecedented technical diversity in deployed systems. From consumer IoT devices developed with minimal built-in security, which are often co-opted by malware to launch large distributed denial of service (DDoS) attacks on internet infrastructure, to remote attacks on Industrial Control System (ICS) devices, these newly connected, composed systems provide a vast attack surface. While the diversity of functionality and the scope of what can now be connected, monitored, and controlled over the Internet has increased dramatically, economies of scale have decreased platform diversity. More
Recent technological advances have made the longstanding dream of on-orbit robotic servicing of satellites a near-term possibility. The potential advantages of that unprecedented capability are enormous. Instead of designing their satellites to accommodate the harsh reality that, once launched, their investments could never be repaired or upgraded, satellite owners could use robotic vehicles to physically inspect, assist, and modify their on-orbit assets. That could significantly lower construction and deployment costs while dramatically extending satellite utility, resilience, and reliability. More
Dominance of the radio frequency (RF) spectrum is critical to successful U.S. military operations. Today, we do this using discrete radar, electronic warfare (EW), and communication payloads that are separately designed, procured, and integrated on platforms. These payloads typically use dedicated apertures, are realized with tightly coupled hardware and software, and are not well-coordinated in their use of spectrum. This rigid and constrained approach makes it difficult and time-consuming to adopt new technology, adapt to rapidly changing adversary threats, maneuver functions effectively in spectrum, and create comprehensive compact RF systems. More
The Cross-Domain Maritime Surveillance and Targeting (CDMaST) program seeks to identify and implement architectures consisting of novel combinations of manned and unmanned systems to deny ocean environments to adversaries as a means of projecting power. By exploiting promising new developments in unmanned systems along with emerging long-range weapon systems, the program aims to develop an advanced, integrated undersea and above-sea warfighting capability able to execute long-range attacks against submarines and ships over large contested maritime areas. More
Embedded computing systems are ubiquitous in critical infrastructure, vehicles, smart devices, and military systems. Conventional wisdom once held that cyberattacks against embedded systems were not a concern since they seldom had traditional networking connections on which an attack could occur. However, attackers have learned to bridge air gaps that surround the most sensitive embedded systems, and network connectivity is now being extended to even the most remote of embedded systems. More
| Cyber | Formal | Trust |
The rapid pace of innovation in software and hardware over the past three decades has produced computational systems that, despite security improvements, remain stubbornly vulnerable to attack. Although clean-sheet design can produce fundamental security improvements that gradually diffuse into the installed base, this process can take years. More
DARPA’s Cyber Grand Challenge is a first-of-its-kind tournament designed to speed the development of automated security systems able to defend against cyberattacks as fast as they are launched. More
Networks within the United States and abroad face increasingly broad-spectrum cyber threats from numerous actors and novel attack vectors. Malicious activity also crosscuts organizational boundaries, as nefarious actors use networks with less protection to pivot into networks containing key assets. Detection of these threats requires adjustments to network and host sensors at machine speed. Additionally, the data required to detect these threats may be distributed across devices and networks. In all of these cases, the threat actors are using technology to perpetrate their attacks and hide their activities and movement, both physical and virtual, inside DoD, commercial, and Internet Access Provider (IAP) networks. More
The DARPA Space Environment Exploitation (SEE) program seeks to develop new models and sensing modalities to predict and observe the dynamics of the near-earth space environment. The SEE program explores how to go beyond magnetohydrodynamic descriptions of the magnetosphere, ionosphere, thermosphere coupled system to include wave/wave, wave/particle, and particle/particle interactions while using the latest advances in high performance computing such as GPUs and TPUs. More
The DARPA Subterranean (SubT) Challenge aims to develop innovative technologies that would augment operations underground. The SubT Challenge will explore new approaches to rapidly map, navigate, search, and exploit complex underground environments, including human-made tunnel systems, urban underground, and natural cave networks. More
Understanding the complex and increasingly data-intensive world around us relies on the construction of robust empirical models, i.e., representations of real, complex systems that enable decision makers to predict behaviors and answer “what-if” questions. Today, construction of complex empirical models is largely a manual process requiring a team of subject matter experts and data scientists. More
Department of Defense (DoD) operators and analysts collect and process copious amounts of data from a wide range of sources to create and assess plans and execute missions. However, depending on context, much of the information that could support DoD missions may be implicit rather than explicitly expressed. Having the capability to automatically extract operationally relevant information that is only referenced indirectly would greatly assist analysts in efficiently processing data. More
Deep Purple aims to advance the modeling of complex dynamic systems using new information-efficient approaches that make optimal use of data and known physics at multiple scales. The program is investigating next-generation deep learning approaches that use not only high throughput multimodal scientific data from observations and controlled experiments (including behaviors such as phase transitions and chaos), but also of the known science of such systems at whatever scales it exists. More
The Dialysis-Like Therapeutics (DLT) program aims to support force protection and military readiness by improving critical care in low-resource environments and delivering a new tool for rapid response to emerging infectious disease threats. DLT specifically addresses a life-threatening blood infection known as sepsis, but DARPA is working to expand the DLT technology to also mitigate threats from harmful bacteria, viruses, fungi, and toxic agents in the blood. More
The Direct On-Chip Digital Optical Synthesizer (DODOS) program seeks to create a technological revolution in optical frequency control analogous to the disruptive advances in microwave frequency control in the 1940s. More
Conventional analog-to-digital converters (ADCs) are fundamentally limited by timing jitter in the sampling source, forcing a trade-off between bandwidth and resolution. As a result, radio frequency (RF) systems are typically designed with narrow-bandwidth channels. These engineering constraints present problems when faced with broadband signals and ultra-short pulses. At high carrier frequencies, RF systems are further limited by the tuner that must mix down to baseband for electronic digitization. More
In the current art, users with significant computing requirements have typically depended on access to large, highly shared data centers to which they backhaul their data (e.g., images, video, or network log files) for processing. However, in many operational scenarios, the cost and latency of this backhaul can be problematic, especially when network throughput is severely limited or when the user application requires a near real-time response. In such cases, users’ ability to leverage computing power that is available “locally” (in the sense of latency, available throughput, or similar measures that are relevant to the user or mission) could substantially improve application performance while reducing mission risk. More
As commercial technologies become more advanced and widely available, adversaries are rapidly developing capabilities that put our forces at risk. To counter these threats, the U.S. military is developing systems-of-systems concepts in which networks of manned and unmanned platforms, weapons, sensors, and electronic warfare systems interact over robust satellite and tactical communications links. These approaches offer flexible and powerful options to the warfighter, but the complexity introduced by the increase in the number of employment alternatives creates a battle management challenge. More
Complex Defense systems, such as RADAR, communications, imaging and sensing systems rely on a wide variety of microsystems devices and materials. These diverse devices and materials typically require different substrates and different processing technologies, preventing the integration of these devices into single fabrication process flows. Thus, integration of these device technologies has historically occurred only at the chip-to-chip level, which introduces significant bandwidth and latency-related performance limitations on these systems, as well as increased size, weight, power, and packaging/assembly costs as compared to microsystems fully integrated on a single chip. More
DRINQS is a fundamental science program that aims to investigate a recent paradigm shift in quantum research, which maintains that periodically driving a system out of equilibrium may increase the length of time that its quantum state endures. DRINQS aims to investigate this phenomenon and demonstrate significant gains over conventional states in timekeeping, field sensing, and information processing for use in national security applications. More
| Materials | PNT |
The Dynamic Network Adaptation for Mission Optimization (DyNAMO) program is developing and testing technologies that enable adaptive, mission-responsive networking among diverse airborne platforms in contested environments. More
The United States military is heavily dependent on networked communication to fulfill its missions. The wide-area network (WAN) infrastructure that supports this communication is vulnerable to a wide range of failures and cyber attacks that can severely impair connectivity and mission effectiveness at critical junctures. Examples include inadvertent or malicious misconfiguration of network devices, hardware and software failures, extended delays in Internet Protocol (IP) route convergence, denial of service (DoS) flooding attacks, and a variety of control-plane and data-plane attacks resulting from malicious code embedded within network devices. More
Next-generation military microsystems in areas such as radar, guidance and high-data-rate communications will require advances in integrated circuit (IC) technology. The technical goal of the Efficient Linearized All-Silicon Transmitter ICs (ELASTx) program, now in its final states, has been to develop monolithic, high power-added-efficiency (PAE), high-linearity, millimeter-wave, silicon-based transmitter ICs. More
The Electrical Prescriptions (ElectRx) program aims to support military operational readiness by reducing the time to treatment, logistical challenges, and potential off-target effects associated with traditional medical interventions for a wide range of physical and mental health conditions commonly faced by our warfighters. ElectRx seeks to deliver non-pharmacological treatments for pain, general inflammation, post-traumatic stress, severe anxiety, and trauma that employ precise, closed-loop, non-invasive modulation of the patient’s peripheral nervous system. More
Complex physical systems, devices and processes important to the Department of Defense (DoD) are often poorly understood due to uncertainty in models, parameters, operating environments and measurements. The goal of DARPA’s Enabling Quantification of Uncertainty in Physical Systems (EQUiPS) program is to provide a rigorous mathematical framework and advanced tools for propagating and managing uncertainty in the modeling and design of complex physical and engineering systems. Of particular interest to the program are systems with multi-scale coupled physics and uncertain parameters in extremely high-dimensional spaces, such as new aerospace vehicles and engines. More
The goal of the Engineered Living Materials (ELM) program is to develop living materials that combine the structural properties of traditional building materials with attributes of living systems, including the ability to rapidly grow, self-repair, and adapt to the environment. Living materials represent a new opportunity to leverage engineered biology to solve existing problems associated with the construction and maintenance of our built environments, as well as new capabilities to craft smart infrastructure that dynamically responds to the surroundings. More
Malicious actors in cyberspace currently operate with little fear of being caught due to the fact that it is extremely difficult, in some cases perhaps even impossible, to reliably and confidently attribute actions in cyberspace to individuals. The reason cyber attribution is difficult stems at least in part from a lack of end-to-end accountability in the current Internet infrastructure. More
In counterinsurgent, counter-terror campaigns, risks associated with conventional weapons in combat operations can severely limit their use and effectiveness, particularly in urban environments. These risks are largely associated with challenges posed by confining intended effects to adversary combatants and forces. More
DARPA’s Experimental Spaceplane program (formerly known as XS-1) aims to build and fly the first of an entirely new class of hypersonic aircraft that would bolster national security by providing short-notice, low-cost access to space. The program aims to achieve a capability well out of reach today—launches to low Earth orbit in days, as compared to the months or years of preparation currently needed to get a single satellite on orbit. Success will depend upon significant advances in both technical capabilities and ground operations, but would revolutionize the Nation’s ability to recover from a catastrophic loss of military or commercial satellites, upon which the United States today is critically dependent. More
| Cost | Launch | Space |
Dramatic success in machine learning has led to a torrent of Artificial Intelligence (AI) applications. Continued advances promise to produce autonomous systems that will perceive, learn, decide, and act on their own. However, the effectiveness of these systems is limited by the machine’s current inability to explain their decisions and actions to human users (Figure 1). The Department of Defense (DoD) is facing challenges that demand more intelligent, autonomous, and symbiotic systems. Explainable AI—especially explainable machine learning—will be essential if future warfighters are to understand, appropriately trust, and effectively manage an emerging generation of artificially intelligent machine partners. More
Materials with superior strength, density and resiliency properties are important for the harsh environments in which Department of Defense platforms, weapons and their components operate. Recent scientific advances have opened up new possibilities for material design in the ultrahigh pressure regime (up to three million times higher than atmospheric pressure). Materials formed under ultrahigh pressure, known as extended solids, exhibit dramatic changes in physical, mechanical and functional properties and may offer significant improvements to armor, electronics, propulsion and munitions systems in any aerospace, ground or naval platform. More
The threat of distributed denial of service (DDoS) attacks has been well-recognized in the data networking world for two decades. Such attacks are orchestrated by sets of networked hosts that collectively act to disrupt or deny access to information, communications or computing capabilities, generally by exhausting critical resources such as bandwidth, processor capacity or memory of targeted resources. More
The goal of the EXTREME Program is to develop new optical components, devices, systems, architectures and design tools using Engineered Optical Materials (EnMats) to enable new functionality and/or vastly improve size, weight, and power characteristics of traditional optical systems. EnMats are broadly defined to include, but are not limited to, metamaterials (both metallic and dielectric), scattering surfaces and volumes, holographic structures, and diffractive elements. More
The goal of the FLA program is to explore non-traditional perception and autonomy methods that could enable a new class of algorithms for minimalistic high-speed navigation in cluttered environments. Through this exploration, the program aims to develop and demonstrate the capability for small (i.e., able to fit through windows) autonomous UAVs to fly at speeds up to 20 m/s (45 mph) with no communication links to the operator and without GPS guidance. The FLA program is demonstrating a sequence of novel capabilities, beginning with lower-clutter, fly-by missions and progressing to higher-clutter, fly-through missions. More
Health threats often evolve more quickly than health solutions. Despite ongoing research in the government and the biopharmaceutical industry to identify new therapies, the Department of Defense (DoD) currently lacks tools to address the full spectrum of chemical, biological, and disease threats that could impact the readiness of U.S. forces. More
The Friend or Foe program aims to develop biosurveillance technology that can detect bacterial pathogens as, or even before, they threaten the military and homeland. The goal of the program is to quickly determine whether an unknown bacterium is harmless or virulent by directly identifying pathogenic behavior, avoiding conventional strategies that rely on known biomarkers. More
The goal of the Fundamental Design (FUN Design) program is to determine whether we can develop or discover a new set of building blocks to describe conceptual designs. The design building blocks will capture the components’ underlying physics allowing a family of nonintuitive solutions to be generated. More
Machine learning has shown remarkable success across many application areas in recent years, leveraging advances in computing power and the availability of large sets of training data. It provides a tremendous opportunity to deploy data-driven systems in more complex and interactive tasks including personalized autonomy, agile robotics, self-driving vehicles, and smart cities. Despite dramatic progress, the machine learning community still lacks an understanding of the trade-offs and mathematical limitations of related technologies for a given domain, problem, or dataset. More
Detection of photons—the fundamental particles of light—is ubiquitous, but performance limitations of existing photon detectors hinders the effectiveness of applications such as light/laser detection and ranging (LIDAR/LADAR), photography, astronomy, quantum information science, medical imaging, microscopy and communications. In all of these applications, performance could be improved by replacing classical, analog light detectors with high-performance photon counting detectors. More
FunCC aims to uncover fundamental principles of resilient self-organized complex systems applicable to domains spanning autonomous systems to biological networks, the immune system, and ecosystems. The dynamics and evolution of complex collectives are explored using new frameworks that embrace agent heterogeneity, stochasticity, distributed control, and diffusion of (mis)information. More
Scientific imagination is critical to our economy as well as our national security and defense. Research and development, as an expression of scientific imagination, is now a global and intensely competitive enterprise. This competition is heightened by digital and network disruptors that increase the speed and extend the borders of idea exchange affecting the nature and spread of threats and opportunities. Organizations fundamentally based on shaping the future need to leverage every possible advantage to succeed in this environment. More
The Geospatial Cloud Analytics (GCA) program is developing technology to rapidly access the most up-to-date commercial and open-source satellite imagery, as well as automated machine learning tools to analyze this data. Current approaches to geospatial analysis are ad hoc and time intensive, as they require gathering and curating data from a large number of available sources, downloading the data to specific locations, and running it through separate suites of analytics tools. More
For decades, U.S. military air operations have relied on increasingly capable multi-function manned aircraft to execute critical combat and non-combat missions. Adversaries’ abilities to detect and engage those aircraft from longer ranges have improved over time as well, however, driving up the costs for vehicle design, operation and replacement. An ability to send large numbers of small unmanned air systems (UASs) with coordinated, distributed capabilities could provide U.S. forces with improved operational flexibility at much lower cost than is possible with today’s expensive, all-in-one platforms—especially if those unmanned systems could be retrieved for reuse while airborne. More
The social sciences can play important roles in assisting military planners and decision-makers who are trying to understand complex human social behaviors and systems, potentially facilitating a wide range of missions including humanitarian, stability, and counter-insurgency operations. Current social science approaches to studying behavior rely on a variety of modeling methods—both qualitative and quantitative—which seek to make inferences about the causes of social phenomena on the basis of observations in the real-world. Yet little is known about how accurate these methods and models really are, let alone whether the connections they observe and predict are truly matters of cause and effect or mere correlations. More
For the past 100 years of mechanized warfare, protection for ground-based armored fighting vehicles and their occupants has boiled down almost exclusively to a simple equation: More armor equals more protection. Weapons’ ability to penetrate armor, however, has advanced faster than armor’s ability to withstand penetration. As a result, achieving even incremental improvements in crew survivability has required significant increases in vehicle mass and cost. More
Military commanders responsible for situational awareness and command and control of assets in space know all too well the challenge that comes from the vast size of the space domain. The volume of Earth’s operational space domain is hundreds of thousands times larger than the Earth’s oceans. It contains thousands of objects hurtling at up to 17,000 miles per hour. More
With a focus on wounded warriors and facilitating their return to military service, the Hand Proprioception and Touch Interfaces (HAPTIX) program is pursuing key technologies to enable precision control of and sensory feedback from sensor-equipped upper-limb prosthetic devices. If successful, the resulting system would provide users near-natural control of prosthetic hands and arms via bi-directional peripheral nerve implants. The program has a strong focus on technology handoff and aims to create and transition clinically relevant technology in support of wounded warriors suffering from single or multiple limb loss. More
Malicious actors are currently able to compromise and use with impunity large numbers of devices owned and operated by third parties. Such collections of compromised and conscripted devices, commonly referred to as botnets, are used for criminal, espionage, and computer network attack purposes (often a combination of all three). Recent examples of botnets and similar malicious code include Mirai, Hidden Cobra, WannaCry, and Petya/NotPetya More
Social media, sensor feeds, and scientific studies generate large amounts of valuable data. However, understanding the relationships among this data can be challenging. Graph analytics has emerged as an approach by which analysts can efficiently examine the structure of the large networks produced from these data sources and draw conclusions from the observed patterns. More
The effectiveness of combat operations across all domains increasingly depends on our ability to control and exploit the electromagnetic (EM) spectrum and to deny its use to our adversaries. Below 30 GHz, the proliferation of inexpensive high-power commercial radio frequency (RF) sources has made the EM spectrum crowded and contested, challenging our spectrum dominance. The numerous tactical advantages offered by operating at higher frequencies, most notably the wide bandwidths available, is driving both commercial and DoD solid-state and vacuum electronic amplifiers into the millimeter wave (mm-wave) spectrum above 30 GHz. More
Embedded systems form a ubiquitous, networked, computing substrate that underlies much of modern technological society. Such systems range from large supervisory control and data acquisition (SCADA) systems that manage physical infrastructure to medical devices such as pacemakers and insulin pumps, to computer peripherals such as printers and routers, to communication devices such as cell phones and radios, to vehicles such as airplanes and satellites. Such devices have been networked for a variety of reasons, including the ability to conveniently access diagnostic information, perform software updates, provide innovative features, lower costs, and improve ease of use. More
| Cyber | Formal | Trust |
The Hunter program seeks to develop an innovative concept for the delivery of advanced undersea payloads from extra-large unmanned underwater vehicles (XLUUVs). The Hunter program will be executed in phases. Phase 1 seeks to design and build the payload delivery device to fit inside a government-provided payload module. Phases 2 and 3 aim to support integration of the payload delivery device into the XLUUV and perform testing. More
No matter how capable, even the most advanced vessel can only be in one place at a time. U.S. Navy assets must cover vast regions of interest around the globe even as force reductions and fiscal constraints continue to shrink fleet sizes. To maintain advantage over adversaries, U.S. Naval forces need to project key capabilities in multiple locations at once, without the time and expense of building new vessels to deliver those capabilities. More
Modern networks and platforms rely on access to the radio frequency (RF) spectrum for communications, radar sensing, command and control, time transfer, and geo-location. Electromagnetic interference, due to congestion in the spectrum or malicious jamming, can have catastrophic effects. Countering such interference is particularly important for unmanned platforms. To address this challenge, the Hyper-wideband Enabled RF Messaging (HERMES) program seeks to provide an assured link for essential communications by developing a jammer- countering capability that is orders of magnitude beyond the state-of-the-art. More
Systems that operate at hypersonic speeds—five times the speed of sound (Mach 5) and beyond—offer the potential for military operations from longer ranges with shorter response times and enhanced effectiveness compared to current military systems. Such systems could provide significant payoff for future U.S. offensive strike operations, particularly as adversaries’ capabilities advance. More
| Air |
ITA3 will determine the practical and fundamental limits to imaging using low frequency electromagnetic waves. More
The proliferation of low cost, highly sophisticated commercial technology and the global access to knowledge about how to construct and apply these systems has narrowed the divide and placed sophisticated systems and capabilities in the hands of hobbyists across the world. The DARPA Improv program investigated the threat posed by commercial-off-the-shelf (COTS) devices. More
The In Vivo Nanoplatforms (IVN) program supports military readiness through the development of in vivo sensing technologies and therapeutics that facilitate optimal health and performance in individual warfighters. The program pursues technologies that provide early indication of physiological abnormalities or illness that can be proactively addressed with therapeutics or supportive care. More
The Insect Allies program is pursuing scalable, readily deployable, and generalizable countermeasures against potential natural and engineered threats to the food supply with the goals of preserving the U.S. crop system. National security can be quickly jeopardized by naturally occurring threats to the crop system, including pathogens, drought, flooding, and frost, but especially by threats introduced by state or non-state actors. Insect Allies seeks to mitigate the impact of these incursions by applying targeted therapies to mature plants with effects that are expressed at relevant timescales—namely, within a single growing season. More
The Intense and Compact Neutron Sources (ICONS) program seeks to achieve highly portable, intense neutron sources to enable deployable, high-resolution neutron and x-ray imaging for DoD applications such as non-destructive evaluation, detection of explosives and special nuclear materials, and forensics. More
| CBRN | Sensors |
Viral pathogens pose a continuous and shifting biological threat to military readiness and national security overall in the form of infectious disease with pandemic potential. Today’s limited vaccines and other antivirals are often circumvented by quickly mutating viruses that evolve to develop resistance to treatments that are carefully formulated to act only specific strains of a virus. More
The increased density of components in today’s electronics has pushed heat generation and power dissipation to unprecedented levels. Current thermal management solutions, usually involving remote cooling, where heat must be conducted away from components before rejection to the air, are unable to limit the temperature rise of today’s complex electronic components without adding considerable weight and volume to electronic systems. The result is complex military systems that continue to grow in size and weight due to the inefficiencies of existing thermal management hardware. More
The Lagrange program seeks to develop new mathematical approaches to optimization problems in uncertain, dynamic, multiscale, and high-dimensional settings. By bridging methodologies developed for both discrete and continuous optimizations, Lagrange aims to enable solutions for complex, realistic problems that involve dynamic environments, rapidly changing requirements, and increasing or decreasing amounts of information. More
Coherent, short-wavelength UV light is useful for a range of applications such as decontamination, precision manufacturing, real-time medical diagnostics, and chemical and biological identification using Raman spectroscopy. However, many applications are unable to transfer out of the lab because the UV lasers needed to generate these coherent photons are prohibitively large, complicated and expensive. More
In supervised machine learning (ML), the ML system learns by example to recognize things, such as objects in images or speech. Humans provide these examples to ML systems during their training in the form of labeled data. With enough labeled data, we can generally build accurate pattern recognition models. More
| AI | Algorithms | Data |
LADS will develop a new protection paradigm that separates security-monitoring functionality from the protected system, focusing on low-resource, embedded and Internet of Things (IoT) devices. The program will explore technologies to associate the running state of a device with its involuntary analog emissions across different physical modalities including, but not limited to, electromagnetic emissions, acoustic emanations, power fluctuations and thermal output variations. More
Artificial intelligence (AI) and machine learning (ML) systems have advanced significantly in recent years. Despite a wide range of impressive results, current AI is not intelligent in the biological sense. These systems are limited to performing only those tasks for which they have been specifically programmed and trained, and are inherently subject to safety hazards when encountering situations outside them. More
Current and emerging Department of Defense (DoD) capabilities rely upon access to a number of critical, high-value molecules that are often prohibitively expensive, unable to be domestically sourced, and/or impossible to manufacture using traditional synthetic approaches. DARPA’s Living Foundries program aims to enable adaptable, scalable, and on-demand production of such molecules by programming the fundamental metabolic processes of biological systems to generate a vast number of complex molecules that are not otherwise accessible. More
The Low Cost Thermal Imager - Manufacturing (LCTI-M) program seeks to enable widespread use of infrared imaging (IR) technology by individual warfighters, with a special focus on affordability and ease of use for dismounted soldiers and individual intelligence personnel, for whom situational awareness and instant sharing of information is critical. IR imaging has the capability to “see” through obscurants, providing valuable information even in environments with severely degraded visibility. Low-cost infrared cameras would empower each warfighter with this essential capability and could open the way to new tactical procedures that demand a common view of the battlefield. More
The U.S. Government operates globally and frequently encounters so-called “low-resource” languages for which no automated human language technology capability exists. Historically, development of technology for automated exploitation of foreign language materials has required protracted effort and a large data investment. Current methods can require multiple years and tens of millions of dollars per language—mostly to construct translated or transcribed corpora. More
The Magnetic Miniaturized and Monolithically Integrated Components (M3IC) program aims to integrate magnetic components onto semiconductor materials, improving the size and functionality of electromagnetic (EM) systems for communications, radar, and electronic warfare (EW). Current EM systems use magnetic components such as circulators, inductors, and isolators, but these are bulky and cannot be integrated with miniaturized electronic circuitry. More
Synthetic chemistry is important across countless technological areas, from medicines to energetics to advanced coatings to functional materials. While our synthetic capabilities have developed rapidly over the last century, current approaches are still slow and inefficient, with poor reproducibility and scalability and limited use of prior knowledge. Such an approach not only limits production of known materials, but also impedes discovery of better synthetic routes and completely new molecules. More
Military platforms—such as ships, aircraft and ground vehicles—rely on advanced materials to make them lighter, stronger and more resistant to stress, heat and other harsh environmental conditions. Currently, the process for developing new materials to field in platforms frequently takes more than a decade. This lengthy process often means that developers of new military platforms are forced to rely on decades-old, mature materials because potentially more advanced materials are still being developed and tested, and are considered too large a risk to be implemented into platform designs. More
Transductional materials convert energy between different forms or domains, such as thermal to electrical energy, or electric field to magnetic field. More
Historically, the U.S. Government deployed and operated a variety of collection systems that provided imagery with assured integrity. In recent years however, consumer imaging technology (digital cameras, mobile phones, etc.) has become ubiquitous, allowing people the world over to take and share images and video instantaneously. More
The Memex program seeks to develop the next generation of search technologies and revolutionize the discovery, organization and presentation of search results. More
The Microphysiological Systems (MPS) program supports military readiness by enabling timely evaluation of the safety and efficacy of novel medical countermeasures against a wide range of natural and man-made health threats, including emerging infectious disease and chemical or biological attack. Testing these types of countermeasures is particularly challenging using current methods because it is often both unethical and impractical to evaluate countermeasures using human clinical trials. Instead, the U.S. Food and Drug Administration (FDA) must base its determination of efficacy and toxicity on data from animal studies, despite the fact that animal models have limited relevance to humans and poorly predict effects in humans. More
Many defense electronics are susceptible to radiation and high temperatures. Developing electronics that can withstand harsh conditions would expand the types of environments in which DoD electronics may be used. More
The Military Imaging and Surveillance Technology (MIST) program seeks to develop a fundamentally new optical Intelligence, Surveillance, and Reconnaissance (ISR) capability able to provide high-resolution 3-D images to locate and identify a target at much longer ranges than is possible with existing optical systems. More
As computing devices become more pervasive, the software systems that control them have become increasingly more complex and sophisticated. Consequently, despite the tremendous resources devoted to making software more robust and resilient, ensuring that programs are correct—especially at scale—remains a difficult and challenging endeavor. Unfortunately, uncaught errors triggered during program execution can lead to potentially crippling security violations, unexpected runtime failure or unintended behavior, all of which can have profound negative consequences on economic productivity, reliability of mission-critical systems, and correct operation of important and sensitive cyber infrastructure. More
The February 2011 Federal Cloud Computing Strategy released by the U.S. Chief Information Officer reinforces the United States Government’s plans to move information technology away from traditional workstations and toward cloud computing environments. Where compelling incentives to do this exist, security implications of concentrating sensitive data and computation into computing clouds have yet to be fully addressed. The perimeter defense focus of traditional security solutions is not sufficient to secure existing enclaves. It could be further marginalized in cloud environments where there is a huge concentration of homogeneous hosts on high-speed networks without internal checks, and with implicit trust among hosts within those limited perimeter defenses. More
The Mobile Hotspots program envisions air, mobile and fixed assets that provide a gigabit-per-second tactical millimeter-wave backbone network extending to the lowest-echelon warfighters. More
Modern adversary submarine quieting technology challenges passive anti-submarine warfare sonar detection range and performance. The Mobile Offboard Clandestine Communications and Approach (MOCCA) program aims to achieve breakthrough capability for extended range submarine detection and precision target tracking through collaborative operations using unmanned vehicles and active sonar techniques. More
The goal of the Modeling Adversarial Activity (MAA) program is to develop mathematical and computational techniques for modeling adversarial activity for the purpose of producing high-confidence indications and warnings of efforts to acquire, fabricate, proliferate, and/or deploy weapons of mass terror (WMTs). MAA assumes that an adversary’s WMT activities will result in observable transactions. More
Complex, nonlinear, multiscale dynamical systems are ubiquitous. Examples include weather, fluids, materials, biological systems, communication networks, and social systems. These systems often evolve to a critical state built up from a series of irreversible and unexpected events, which severely limits development and implementation of mathematical models to accurately predict formation and evolution of patterns in such systems. More
Free-space optics today requires a telescope, bulk lasers with mechanical beam-steering, detectors, and electronics. The Modular Optical Aperture Building Blocks (MOABB) program seeks to design all of these components into a single integrated device. In what would be deemed as the most complex electronic-photonic circuit ever fashioned, the program’s performers will work to create a wafer-scale system that is 100x smaller and lighter than conventional systems and can steer the optical beam 1,000x faster than mechanical components. More
The Molecular Informatics program brings together a collaborative interdisciplinary community to explore completely new approaches to store and process information with molecules. Chemistry offers an untapped, rich palette of molecular diversity that may yield a vast design space to enable dense data representations and highly versatile computing concepts outside of traditional digital, logic-based approaches. More
The U.S. Department of Defense (DoD) develops and uses molecules and materials across a diverse range of areas including therapeutics, electronics, coatings, and fuels. Application areas with particularly unique relevance to national security, such as energetics, tend not to keep pace with the need for innovation and new performance characteristics. More
Attacks by unmanned vehicles, missiles, small planes, fast in-shore attack craft and other platforms pose a perennial, evolving and potentially lethal threat to ships and other maritime vessels. The escalating risks posed by these ever-morphing threats demand that vessels have access to defensive capabilities at the leading edge of air and surface combat technologies. In particular, current close-range gun systems would greatly benefit from an ability to engage multiple and diverse targets coming from a range of directions and do so rapidly and with high precision. More
Military aircraft are vulnerable in conditions of degraded visibility due to pilots’ inability to discern obstacles, cables, or other aircraft during flight or while landing. The danger is particularly acute in demanding, harsh environments such as Iraq and Afghanistan. More
| Air | ISR | Sensors | SWAP |
Recent advances in our understanding of light-matter interactions, often with patterned and resonant structures, reveal nascent concepts for new interactions that may impact many applications. Examples of these novel phenomena include interactions involving active media, symmetry, non-reciprocity, and linear/nonlinear resonant coupling effects. More
State-of-the-art military sensors rely on “active electronics” to detect vibration, light, sound or other signals for situational awareness and to inform tactical planning and action. That means the sensors constantly consume power, with much of that power spent processing what often turns out to be irrelevant data. This power consumption limits sensors’ useful lifetimes to a few weeks or months with even the best batteries and has slowed the development of new sensor technologies and capabilities. The chronic need to service or redeploy power-depleted sensors is not only costly and time-consuming but also increases warfighter exposure to danger. More
The Neural Engineering System Design (NESD) program seeks to develop high-resolution neurotechnology capable of mitigating the effects of injury and disease on the visual and auditory systems of military personnel. In addition to creating novel hardware and algorithms, the program conducts research to understand how various forms of neural sensing and actuation might improve restorative therapeutic outcomes. More
Military personnel control sophisticated systems, experience extraordinary stress, and are subject to injury of the brain. DARPA created the Neuro Function, Activity, Structure, and Technology (Neuro-FAST) program to begin to address these challenges by combining innovative neurotechnology with an advanced understanding of the brain. Using a multidisciplinary approach that combines data processing, mathematical modeling, and novel optical interfaces, the program seeks to open new pathways for understanding and treating brain injury, enable unprecedented visualization and decoding of brain activity, and build sophisticated tools for communicating with the brain. More
The explosive growth of global digital connectivity has opened new possibilities for designing and conducting social science research. Once limited by practical constraints to experiments involving just a few dozen participants-often university students or other easily available groups-or to correlational studies of large datasets without any opportunity for determining causation, scientists can now engage thousands of diverse volunteers online and explore an expanded range of important topics and questions. More
The Next-Generation Nonsurgical Neurotechnology (N3) program aims to develop high-performance, bi-directional brain-machine interfaces for able-bodied service members. Such interfaces would be enabling technology for diverse national security applications such as control of unmanned aerial vehicles and active cyber defense systems or teaming with computer systems to successfully multitask during complex military missions. More
DARPA's Oceans of Things program seeks to enable persistent maritime situational awareness over large ocean areas by deploying thousands of small, low-cost floats that could form a distributed sensor network. Each smart float would contain a suite of commercially available sensors to collect environmental data-such as ocean temperature, sea state, and location-as well as activity data about commercial vessels, aircraft, and even maritime mammals moving through the area. The floats would transmit data periodically via satellite to a cloud network for storage and real-time analysis. More
DARPA’s OFFensive Swarm-Enabled Tactics (OFFSET) program envisions future small-unit infantry forces using swarms comprising upwards of 250 small unmanned aircraft systems (UASs) and/or small unmanned ground systems (UGSs) to accomplish diverse missions in complex urban environments. By leveraging and combining emerging technologies in swarm autonomy and human-swarm teaming, the program seeks to enable rapid development and deployment of breakthrough capabilities. More
Uncertainties in materials and component manufacturing processes are a primary cause of cost escalation and delay during the development, testing and early production of defense systems. In addition, fielded military platforms may have unanticipated performance problems, despite large investment and extensive testing of their key components and subassemblies. These uncertainties and performance problems are often the result of the random variations and non-uniform scaling of manufacturing processes. These challenges, in turn, lead to counterproductive resistance to adoption of new, innovative manufacturing technologies that could offer better results. More
The Pandemic Prevention Platform (P3) program aims to support military readiness and global stability through pursuit of novel methods to dramatically accelerate discovery, integration, pre-clinical testing, and manufacturing of medical countermeasures against infectious diseases. P3 confronts the reality that Department of Defense (DoD) personnel are not only deployed around the world for routine operations, but are often among the first responders to outbreaks of emerging or re-emerging disease with pandemic potential (e.g., Ebola). P3 aims specifically to develop a scalable, adaptable, rapid response platform capable of producing relevant numbers of doses against any known or previously unknown infectious threat within 60 days of identification of such a threat in order to keep the outbreak from escalating and decrease disruptions to the military and homeland. More
The Pathogen Predators program focuses on force readiness and homeland protection through development of novel countermeasures against biological threats involving bacterial agents. Currently, the most common defense against such a threat is traditional antibiotics, but while such antibiotics have been remarkably effective in the past, their widespread use has heightened the risk of our troops contracting antibiotic-resistant bacterial infections that are difficult or impossible to treat. A new type of countermeasure is needed to overcome the threat posed by antibiotic-resistant bacteria. More
The Persistent Aquatic Living Sensors (PALS) program aims to leverage biology to augment the Department of Defense’s existing, hardware-based maritime monitoring capabilities. The program will tap into marine organisms’ innate abilities to sense and respond to perturbations in their environments and apply those abilities to the detection, characterization, and reporting of manned or unmanned underwater vehicles ranging from small autonomous vessels to large nuclear submarines. More
The traditional process of designing, developing, building and deploying space systems is long, expensive and complex. These difficulties apply especially to the increasing number of expensive, mission-critical satellites launched every year into geosynchronous Earth orbit (GEO), approximately 22,000 miles above the Earth. Unlike objects in low Earth orbit (LEO), such as the Hubble Space Telescope, satellites in GEO are essentially unreachable with current technology. More
The POEM program aims to address electrical communications link limitations by developing chip-scale, integrated photonic technology to enable seamless intrachip and offchip photonic communications that provide the required bandwidth with low energy/bit. The POEM program will exploit wavelength division multiplexing (WDM), allowing much higher bandwidth capacity per link, which is imperative to meeting the communication needs of future microprocessors. Such a capability would propel the microprocessor onto a new performance trajectory and impact the actual runtime performance of DoD-relevant computing tasks for power-starved embedded applications and supercomputing. More
The warfighter's effectiveness in current and future combat missions can be severely limited by inadequate target discrimination, and an inability to view the operational scene with larger fields of view and longer standoff distances. For ground combat and near-ground support operations where tactical information is urgently needed to make timely decisions, there is a significant capability gap for day and night intelligence, surveillance, and reconnaissance (ISR). More
Cyberspace is now recognized as a critical domain of operations by the U.S. military and its protection is a national security issue. More
The Global Positioning System (GPS) is the predominant means of obtaining positioning, navigation, and timing (PNT) information for both military and civilian systems and applications. However, the radio frequency basis for GPS also means that its signals cannot penetrate seawater, and thus undersea GPS is effectively denied. The Positioning System for Deep Ocean Navigation (POSYDON) program aims to develop an undersea system that provides omnipresent, robust positioning across ocean basins. More
| Maritime | PNT |
Computational capability is an enabler for nearly every military system, but increases in this capability are limited by available system power and constraints on the ability to dissipate heat. This is a challenge for embedded applications such as soldier-borne applications, UAVs and command and control systems on submarines. Today’s intelligence, surveillance and reconnaissance (ISR) systems have sensors that collect far more information than they can process in real time; as a result, what could be invaluable real-time intelligence data in the hands of our warfighters is simply discarded, or perhaps recorded and processed hours or days after it was collected. More
The Precise Robust Inertial Guidance for Munitions (PRIGM) program is developing inertial sensor technologies to enable positioning, navigation, and timing (PNT) in GPS-denied environments. PRIGM comprises two focus areas: development of a navigation-grade inertial measurement unit (NGIMU) based on micro-electromechanical systems (MEMS) platforms, and basic research of advanced inertial micro sensor (AIMS) technologies for future gun-hard, high-bandwidth, high-dynamic-range, GPS-free navigation. More
Pathogens with pandemic potential, toxic chemicals, and radioactive materials all endanger public health and pose a threat to national security. Despite investment in the development of medical countermeasures (MCMs) to address these threats, many existing MCMs suffer from limited applicability, insufficient efficacy, requirements for repeat dosing, lengthy and complex manufacturing processes, and logistically burdensome storage requirements. In many cases, unique threats require unique responses, setting up a “one threat, one MCM” paradigm. More
United States military forces deploy to remote locations around the world, often in areas where emerging infectious diseases are common. The PREventing EMerging Pathogenic Threats (PREEMPT) program seeks to preserve military readiness by protecting against the infectious disease threat; however, rather than treating people, PREEMPT targets viral pathogens within the animal reservoirs and insect vectors where many diseases originate before they spill over into humans. More
Machine learning – the ability of computers to understand data, manage results and infer insights from uncertain information – is the force behind many recent revolutions in computing. Email spam filters, smartphone personal assistants and self-driving vehicles are all based on research advances in machine learning. Unfortunately, even as the demand for these capabilities is accelerating, every new application requires a Herculean effort. Teams of hard-to-find experts must build expensive, custom tools that are often painfully slow and can perform unpredictably against large, complex data sets. More
Defense applications, such as geo-location, navigation, communication, coherent imaging and radar, depend on the generation and transmission of stable, agile electromagnetic radiation. Improved radiation sources—for example, lower noise microwaves or higher flux x-rays—could enhance existing capabilities and enable entirely new technologies. More
The Prometheus program aims to improve military readiness and force health through development of a prognostic that can determine if an individual is contagious before he exhibits symptoms of illness. DARPA’s goal is to develop a molecular test for determining if an individual is likely to spread disease following exposure to an infectious agent and predict within 24 hours of exposure if that individual will become contagious. That ability to predict contagiousness would allow for specific planning and concentration of resources to prevent the spread of an illness from an individual to a population within the confined settings and close quarters typical of military operations. More
As nation-state and non-state adversaries adapt and apply commercially available state-of-the-art technology in urban conflict, expeditionary U.S. forces face a shrinking operational advantage in potential future military conflicts, which are most likely to be fought in littoral and coastal cities. The goal of the Prototype Resilient Operations Testbed for Expeditionary Urban Operations (PROTEUS) program is to create and demonstrate tools to develop and test agile expeditionary urban operations concepts based on dynamically composable force packages. More
From phony news on Web sites to terrorist propaganda on social media to recruitment videos posted by extremists, conflict in the information domain is becoming a ubiquitous addition to traditional battlespaces. Given the pace of growth in social media and other networked communications, this bustling domain of words and images—once relegated to the sidelines of strategic planning—is poised to become ever more critical to national security and military success around the globe. More
Typically, the performance of measurement devices is limited by deleterious effects such as thermal noise and vibration. Notable exceptions are atomic clocks, which operate very near their fundamental limits. Driving devices to their physical limits will open new application spaces critical to future DoD systems. Indeed, many defense-critical applications already require exceptionally precise time and frequency standards enabled only by atomic clocks. The Global Positioning System (GPS) and the internet are two key examples. More
The goal of the Radio Frequency Machine Learning Systems (RFMLS) Program is to develop the foundations for applying modern data-driven Machine Learning (ML) to the RF Spectrum domain. These innovations form the basis of a new wave of Signal Processing technologies to address performance limitations of conventionally designed radio frequency (RF) systems such as radar, signals intelligence, electronic warfare, and communications. More
The RadioBio program aims to establish whether functional signaling via electromagnetic waves between biological cells exists and, if it does, to determine what mechanisms are involved and what information is being transferred. The program seeks to determine the validity of electromagnetic biosignaling claims and, where evidence exists, understand how the structure and function of these natural “antennas” are capable of generating and receiving information in a noisy, cluttered electromagnetic environment. More
A substantial and prolonged disruption of electric power would have profound economic and human costs for the United States. From a defense perspective, a major power outage could hamper military mobilization and logistics and impair the capability to project force. More
The Rapid Threat Assessment (RTA) program aims to provide critical information to speed production of medical countermeasures to protect U.S. forces against novel chemical and biological weapons. Such weapons have historically been mass-produced within a year of discovery. Development of countermeasures, however, currently takes far longer. Using current methods and technologies, researchers require decades of study to gain a cellular-level understanding of how new threat agents exert their effects. More
The Resilient Anonymous Communication for Everyone (RACE) program will research technologies for a distributed messaging system that can: a) exist completely within a given network, b) provide confidentiality, integrity, and availability of messaging, and c) preserve privacy to any participant in the system. Compromised system data and associated networked communications should not be helpful for compromising any additional parts of the system. More
RSPACE seeks to create a revolutionary distributed planning capability to provide resilient command and control (C2) and to manage complex military operations even when communications are limited and unreliable. RSPACE is developing human-centered software decision aids that, based on the commander’s intent, will help operators throughout the C2 enterprise control daily operations in a complex battlespace – composing mission packages (coordinating across the network as needed), responding to emerging opportunities, and assessing progress towards achieving the commander’s intent. RSPACE is focused on the operational level of the air operations domain. More
The Restoring Active Memory (RAM) program aims to mitigate the effects of traumatic brain injury (TBI) in military Service members by developing neurotechnologies to facilitate memory formation and recall in the injured brain. More than 270,000 Service members have been diagnosed with TBI since 20001. The condition frequently results in an impaired ability to retrieve memories formed prior to injury and a reduced capacity to form or retain new memories following injury. Despite the scale of the problem, few effective therapies currently exist to mitigate the long-term consequences of TBI on memory. Enabling restoration of memory function would support military readiness by providing injured personnel the option of returning to duty, and would improve quality of life for wounded veterans. More
Access to the electromagnetic spectrum is critical to military forces today. Electronic warfare seeks to deny or degrade adversaries’ access to spectrum while minimizing impacts on friendly forces. Currently, electronic warfare strikes are conducted primarily by monolithic, high-value platforms that can have powerful but insufficiently precise effects. These strikes typically impact large geographic areas, for example, and may inadvertently deny spectrum access to friendly users. More
Conventional optical imaging systems today largely limit themselves to the measurement of light intensity, providing two-dimensional renderings of three-dimensional scenes and ignoring significant amounts of additional information that may be carried by captured light. More
Thanks to improvements in body armor and combat casualty care, military Service members are now surviving severe battlefield injuries that involve traumatic limb amputation. However, because these survivors are predominantly young, they must live with their injuries for decades. This severely diminishes affected individuals’ quality of life and places a massive responsibility on the military's medical and rehabilitation system. More
Due to advancements in component technology, microsatellite systems are increasingly viable solutions to address earth science and remote sensing missions. For example, constellations of commercial, small, optical satellites are proliferating, supporting a variety of tasks and data applications. The ability to economically launch microsatellites on diverse launch vehicles promises advantages in rapid technology refresh, responsive space operations, and resilient (i.e., redundant) systems. More
| Space |
Hundreds of military, government and commercial satellites reside today in geosynchronous Earth orbit (GEO) some 22,000 miles (36,000 kilometers) above the Earth—a perch ideal for providing communications, meteorology and national security services, but one so remote as to preclude inspection and diagnosis of malfunctioning components, much less upgrades or repairs. Even fully functional satellites sometimes find their working lives cut short simply because they carry obsolete payloads—a frustrating situation for owners of assets worth hundreds of millions of dollars. More
Existing speech signal processing technologies are inadequate for most noisy or degraded speech signals that are important to military intelligence. More
Today, code for input data validation is typically written manually in an ad-hoc manner. For commonly-used electronic data formats, input validation is, at a minimum, a problem of scale whereby specifications of these formats comprise hundreds to thousands of pages. Input validation thus translates to thousands or more conditions to be checked against the input data before the data can be safely processed. More
The Safe Genes program supports force protection and military health and readiness by protecting Service members from accidental or intentional misuse of genome editing technologies. Additional work will leverage advances in gene editing technology to expedite development of advanced prophylactic and therapeutic treatments against gene editors. Advances within the program will ensure the United States remains at the vanguard of the broadly accessible and rapidly progressing field of genome editing. More
It is easy to reverse engineer software today. An attacker generally requires no more than a basic debugger, a compiler and about a day's effort to de-obfuscate code that has been obfuscated with the best current methods. The reason for the relative ease is that program obfuscation is primarily based on "security through obscurity" strategies, typified by inserting passive junk code into a program’s source code. Existing program obfuscation methods also do not have quantifiable security models, and so it is difficult even to measure how much security is gained by a given obfuscation effort. More
Troops in remote regions around the world often struggle to operate with limited networks for data sharing and communication—an encumbrance that is amplified when soldiers need to share classified or otherwise secure data with each other and with coalition partners. The usual process for sharing such information requires an end-to-end connection to secure servers located across the world via a dedicated digital “pipe” approved for the specific security level of data being transmitted. More
The Seeker Cost Transformation (SECTR) program seeks to develop novel weapon terminal sensing and guidance technologies and systems for air-launched, air-delivered weapons. SECTR technologies would enable weapons to acquire fixed and moving targets with only minimal external support; achieve high navigation accuracy in a GPS-denied environment; and be low size, weight, and cost. More
For decades, miniaturizing electronics has been key to a wide array of technology innovations and an important economic driver. As an example, the seemingly endless shrinking of the transistor has allowed the semiconductor industry to place ever more devices on the same amount of silicon. Each time the size decreased, transistors became faster and used less power, allowing increasingly capable electronics in smaller packages at reduced cost. More
The Shared Spectrum Access for Radar and Communications (SSPARC) program seeks to improve radar and communications capabilities through spectrum sharing. More
Terrorist attacks involving the use of proliferated radiological and special nuclear materials pose a potential threat to U.S. citizens and servicemembers. Early detection of such materials and devices made from them is a critical part of the U.S. strategy to prevent attacks. Lower-cost and more sensitive detectors, along with innovative deployment strategies, could significantly enhance detection and deterrence of attack. More
| CBRN | Sensors |
The SIGMA+ program aims to expand SIGMA’s advance capability to detect illicit radioactive and nuclear materials by developing new sensors and networks that would alert authorities to chemical, biological, and explosives threats as well. More
The electromagnetic (EM) spectrum is a scarce resource, in which a variety of friendly, unfriendly and neutral entities contend for available spectrum at any given time, location and frequency. DoD radio frequency (RF) systems, such as communication networks and radar, must operate within the context of an increasingly congested and contested electromagnetic spectrum. More
The exponential growth of diverse science data represents an unprecedented opportunity to make substantial advances in complex science and engineering, such as discovery of novel materials or drugs. However, without tools to unify principles, results, models and other kinds of data into a single computational representation, it is difficult to relate data from any one scientific problem or area to the broader body of knowledge. More
Dense constellations of low-earth-orbit (LEO) micro-satellites can provide new intelligence, surveillance, and reconnaissance (ISR) capabilities, which are persistent, survivable and available on-demand for tactical warfighting applications. The Small Satellite Sensors program seeks to explore new sensor concepts that are well-matched to the capabilities achievable in small satellites. More
The increasing lethality of enemy ballistic and blast threats—such as bullets, fragments, explosively formed projectiles, shaped charges and improved explosive devices (IEDs) — has resulted in substantial increases in the weight of protective armor and, consequently, the weight of tactical and combat vehicles. The DARPA Soldier Protection Systems (SPS) Program is developing and demonstrating lightweight armor material systems to defeat current and potential ballistic and blast threats with performance substantially better than today’s protective armor systems. More
Today, the lowest echelon members of the U.S. military deployed in remote overseas locations are unable to obtain on-demand satellite imagery in a timely and persistent manner for pre-mission planning. This is due to lack of satellite overflight opportunities, inability to receive direct satellite downlinks at the tactical level and information flow restrictions. More
As new defensive technologies make old classes of vulnerability difficult to exploit successfully, adversaries move to new classes of vulnerability. Vulnerabilities based on flawed implementations of algorithms have been popular targets for many years. However, once new defensive technologies make vulnerabilities based on flawed implementations less common and more difficult to exploit, adversaries will turn their attention to vulnerabilities inherent in the algorithms themselves. More
The Global Positioning System (GPS) is the predominant means of positioning, navigation, and timing (PNT) for a majority of systems and applications, both military and civilian. The Spatial, Temporal, and Orientation Information in Contested Environments (STOIC) program seeks to develop a backup PNT system that provides GPS-level and better performance without relying on GPS. More
| PNT | Spectrum |
Our ability to detect and identify chemical and biological signals of interest is critical for security at home and abroad. While optical spectroscopy is a valuable tool in the laboratory, current technologies lack the sensitivity and broad spectral coverage needed to detect and distinguish among agents of interest given ubiquitous, dynamic background signals generated by common components in the atmosphere. More
Across the nation and around the world, the wireless revolution is fueling a voracious demand for access to the radio frequency (RF) spectrum. In the civilian sector, consumer devices from smartphones to wearable fitness recorders to smart kitchen appliances are competing for bandwidth. Managing this increasing demand, while combating what appears to be a looming scarcity of RF spectrum is a serious problem for our nation, militarily, socially, and economically. More
To succeed in their missions, military units must have a robust, multi-faceted picture of their operational environments, including the location, nature and activity of both threats and allied forces around them. Technology is making this kind of rich, real-time situational awareness increasingly available to airborne and other vehicle-assigned forces, along with a capacity to deploy precision armaments more safely, quickly and effectively. Dismounted infantry squads, however, have so far been unable to take full advantage of some of these highly effective capabilities because many of the technologies underlying them are too heavy and cumbersome for individual Soldiers and Marines to carry or too difficult to use under demanding field conditions. More
The security and integrity of DoD electronic systems is challenged by the presence of counterfeit integrated circuits (ICs) in the supply chain. Counterfeiters use a variety of easy and inexpensive techniques to recycle discarded ICs, alter them, and reintroduce them to the supply chain for profit. These parts have questionable reliability and may not function as specified. The failure of a fielded DoD system due to the presence of a counterfeit IC can jeopardize the success of a mission and put lives at risk. More
The Synergistic Discovery and Design (SD2) program aims to develop data-driven methods to accelerate scientific discovery and robust design in domains that lack complete models. Engineers regularly use high-fidelity simulations to create robust designs in complex domains such as aeronautics, automobiles, and integrated circuits. In contrast, robust design remains elusive in domains such as synthetic biology, neuro-computation, and polymer chemistry due to the lack of high-fidelity models. SD2 seeks to develop tools to enable robust design despite the lack of complete scientific models. More
The SoSITE program aims to develop system of systems architectures to maintain U.S. air superiority in contested environments. More
Electronic system security has become an increasingly critical area of concern for the DoD and more broadly for security of the U.S. as a whole. Current efforts to provide electronic security largely rely on robust software development and integration. Present responses to hardware vulnerability attacks typically consist of developing and deploying patches to the software firewall without identifying or addressing the underlying hardware vulnerability. As a result, while a specific attack or vulnerability instance is defeated, creative programmers can develop new methods to exploit the remaining hardware vulnerability and a continuous cycle of exploitation, patching, and subsequent exploitations ensues. More
The Department of Defense (DoD) often leverages social and behavioral science (SBS) research to design plans, guide investments, assess outcomes, and build models of human social systems and behaviors as they relate to national security challenges in the human domain. However, a number of recent empirical studies and meta-analyses have revealed that many SBS results vary dramatically in terms of their ability to be independently reproduced or replicated, which could have real-world implications for DoD’s plans, decisions, and models. To help address this situation, DARPA’s Systematizing Confidence in Open Research and Evidence (SCORE) program aims to develop and deploy automated tools to assign "confidence scores" to different SBS research results and claims. More
The Systems-Based Neurotechnology for Emerging Therapies (SUBNETS) program aims to improve force health by using neurotechnology as the basis for effective, informed, and precise treatments for neuropsychiatric illnesses in military Service members. The effects of such illnesses, brought on by war, traumatic injuries, and other experiences, remain challenging to treat. Current treatment approaches—surgery, medications, and psychotherapy—can often help to alleviate the worst effects of illnesses such as major depression and post-traumatic stress, but they are imprecise and not universally effective. Through SUBNETS, DARPA seeks to generate the knowledge and technology required to deliver relief to patients with otherwise intractable neuropsychiatric illness. More
Systems that operate at hypersonic speeds—five times the speed of sound (Mach 5) and beyond—offer the potential for military operations from longer ranges with shorter response times and enhanced effectiveness compared to current military systems. Such systems could provide significant payoff for future U.S. offensive strike operations, particularly as adversaries’ capabilities advance. More
| Air |
The Tactical Undersea Network Architectures (TUNA) program seeks to develop and demonstrate novel optical-fiber-based technology options and designs to temporarily restore tactical data network connectivity in a contested environment. TUNA is currently in an initial phase that emphasizes concept and technology development in three technical areas: system design, small fiber optic cable systems, and buoy nodes. More
The capabilities and technical specifications required for Department of Defense (DoD) platforms are constantly changing due to unanticipated circumstances, needs and emerging threats. However, complex development and design cycles and the associated high costs of structural design changes for current technologies significantly limit our ability to rapidly and affordably evolve such systems. More
In a target-dense environment, the adversary has the advantage of using sophisticated decoys and background traffic to degrade the effectiveness of existing automatic target recognition (ATR) solutions. Airborne strike operations against relocatable targets require that pilots fly close enough to obtain confirmatory visual identification before weapon release, putting the manned platform at extreme risk. Radar provides a means for imaging ground targets at safer and far greater standoff distances; but the false-alarm rate of both human and machine-based radar image recognition is unacceptably high. Existing ATR algorithms also require impractically large computing resources for airborne applications.   More
The Targeted Neuroplasticity Training (TNT) program supports improved, accelerated training of military personnel in multifaceted and complex tasks. The program is investigating the use of non-invasive neurotechnology in combination with training to boost the neurochemical signaling in the brain that mediates neural plasticity and facilitates long-term retention of new cognitive skills. If successful, TNT technology would apply to a wide range of defense-relevant needs, including foreign language learning, marksmanship, cryptography, target discrimination, and intelligence analysis, improving outcomes while reducing the cost and duration of the Defense Department’s extensive training regimen. More
The Technologies for Host Resilience (THoR) Program aims to develop new methods to maintain and optimize force health in the face of new and emerging infectious diseases. The goal is to discover the molecular mechanisms for tolerance of infection in animals, and develop therapeutic strategies that modulate the resilience of humans against infection. This capability would support military readiness by enabling warfighters to weather the storm of infectious diseases in low-resource or remote settings where pathogen-specific therapeutics or intensive care unit capabilities may not be locally available. More
Effective 21st-century warfare requires the ability to conduct airborne intelligence, surveillance and reconnaissance (ISR) and strike mobile targets anywhere, around the clock. Current technologies, however, have their limitations. Helicopters are relatively limited in their distance and flight time. Fixed-wing manned and unmanned aircraft can fly farther and longer but require either aircraft carriers or large, fixed land bases with runways often longer than a mile. Moreover, establishing these bases or deploying carriers requires substantial financial, diplomatic and security commitments that are incompatible with rapid response. More
Imaging, radar, spectroscopy, and communications systems that operate in the millimeter-wave (MMW) and sub-MMW bands of the electromagnetic spectrum have been difficult to develop because of technical challenges associated with generating, detecting, processing and radiating the high-frequency signals associated with these wavelengths. More
The Topological Excitations in Electronics program aims to demonstrate the utility of topological excitations in various applications including memory, logic, sensors, and quantum information processing. Developing the ability to design materials with new controllable functionalities is crucial for the future of the Nation’s economic, energy, and defense security. More
New manufacturing technologies such as additive manufacturing have vastly improved the ability to create shapes and material properties previously thought impossible. Generating new designs that fully exploit these properties, however, has proven extremely challenging. Conventional design technologies, representations, and algorithms are inherently constrained by outdated presumptions about material properties and manufacturing methods. As a result, today’s design technologies are simply not able to bring to fruition the enormous level of physical detail and complexity made possible with cutting-edge manufacturing capabilities and materials. More
Modern computing systems act as black boxes in that they accept inputs and generate outputs but provide little to no visibility of their internal workings. This greatly limits the potential to understand cyber behaviors at the level of detail necessary to detect and counter some of the most important types of cyber threats, particularly advanced persistent threats (APTs). APT adversaries act slowly and deliberately over a long period of time to expand their presence in an enterprise network and achieve their mission goals (e.g., information exfiltration, interference with decision making and denial of capability). More
The DoD has become increasingly reliant on intelligence, surveillance and reconnaissance (ISR) applications. With the advent of expanded ISR capabilities, there is a pressing need to dramatically expand the real-time processing of wide-area, high-resolution video imagery, especially for target recognition and tracking a large number of objects. Not only is the volume of sensor data increasing exponentially, there is also a dramatic increase in the complexity of analysis, reflected in the number of operations per pixel per second. These expanding processing requirements for ISR missions, as well as other DoD sensor applications, are quickly outpacing the capabilities of existing and projected computing platforms. More
The Understanding Group Biases (UGB) program seeks to develop and prove out capabilities that can radically enhance the scale, speed, and scope of automated, ethnographic-like methods for capturing group biases and cultural models from increasingly available large digital datasets. More
For the past 60 years, helicopters have provided essential vertical takeoff and landing (VTOL) capabilities–omnidirectional maneuverability, hovering, landing on almost any flat surface–for countless military operations. Even as VTOL aircraft technology continues to advance, however, one key goal still remains elusive: improving top speed beyond 150 kt-170 kt. Faster VTOL aircraft could shorten mission times and increase the potential for successful operations, while reducing vulnerability to enemy attack. Unfortunately, new VTOL designs so far have been unable to increase top speed without unacceptable compromises in range, efficiency, useful payload or simplicity of design. More
Government agencies and the military rely upon many kinds of Commercial Off-the-Shelf (COTS) commodity Information Technology (IT) devices, including mobile phones, printers, computer workstations and many other everyday items. Each of these devices is the final product of long supply chains involving many vendors from many nations providing various components and subcomponents, including considerable amounts of software and firmware. Long supply chains provide adversaries with opportunities to insert hidden malicious functionality into this software and firmware that adversaries can exploit to accomplish harmful objectives, including exfiltration of sensitive data and sabotage of critical operations. More
Cloudy skies, dust and other vision-obscuring conditions often limit the support capabilities overhead aircraft can provide warfighters on the ground. Airborne weapon systems that use electro-optic and infrared (EO/IR) sensors during support missions can’t “see” through clouds, and current synthetic aperture radar (SAR) technology can’t provide high-resolution video imagery of moving ground targets through clouds. More
The low cost of digital imaging devices has allowed them to become ubiquitous consumer products. This low cost is made possible by leveraging a mature complementary metal oxide semiconductor (CMOS) processing infrastructure and the ability to fabricate complete focal plane arrays (FPAs) at the wafer scale. A similar trend is occurring at a smaller scale with thermal imaging technologies. Microbolometers that are sensitive in the LWIR spectrum are also manufactured at the wafer scale and the resulting cost reduction is enabling thermal imagers at consumer-grade price points. More
Currently, understanding and assessing the readiness of the warfighter involves medical intervention with the help of advanced equipment, such as electrocardiographs (EKGs) and other specialized medical devices, that are too expensive and cumbersome to employ continuously or without supervision in non-controlled environments. On the other hand, currently 92 percent of adults in the United States own a cell phone, which could be used as the basis for continuous, passive health, and readiness assessment. More
| AI | Analytics | Data | Health |
The majority of work to develop and mature military wireless networks to date has focused on efficiency and stability in benign conditions. Insufficient attention has been paid to identifying and mitigating vulnerabilities arising from the new features being added to make these networks more efficient. Unfortunately, because of the focus on efficiency, the protocols that have been developed implicitly trust all information shared about the state of the nodes and the larger network. Consequently, when the information that is shared among these nodes is bad, the network quickly becomes unusable. More
The World Modelers program aims to develop technology that integrates qualitative causal analyses with quantitative models and relevant data to provide a comprehensive understanding of complicated, dynamic national security questions. The goal is to develop approaches that can accommodate and integrate dozens of contributing models connected by thousands of pathways—orders of magnitude beyond what is possible today. More
| AI | Automation | Data |
Current defense systems for processing information struggle to effectively scale to the volume and characteristics of changing data environments and the range of applications for data analysis. Overcoming these challenges requires fundamentally new approaches to data science, including distributed computation and interactive visualization. More
U.S. warfighters operate in all manner of environments, including tight urban terrain. The safety and effectiveness of the warfighter demand maximum flexibility for maneuvering and responding to circumstances. To overcome obstacles and secure entrance and egress routes, warfighters frequently rely on ropes, ladders and related climbing tools. Such climbing tools cost valuable time to use, have limited application and add to the load warfighters are forced to carry during missions. The Z-Man programs aims to develop biologically inspired climbing aids to enable warfighters to scale vertical walls constructed from typical building materials, while carrying a full combat load, and without the use of ropes or ladders. More