Defense Advanced Research Projects AgencyTagged Content List

Threat Countermeasures

Actions that mitigate adversaries' capabilities

Showing 30 results for Countermeasures RSS
DARPA’s Strategic Technology Office (STO) is focused on technologies that enable fighting as a network to increase military effectiveness, cost leverage, and adaptability.
05/18/2015
DARPA’s Strategic Technology Office (STO) is focused on technologies that enable fighting as a network to increase military effectiveness, cost leverage, and adaptability. STO's areas of interest include: Battle Management, Command and Control; Communications and Networks; Intelligence, Surveillance, and Reconnaissance; Electronic Warfare; Positioning, Navigation, and Timing; and Foundational Strategic Technologies and Systems.
01/01/1977
In the early 1970s, a DARPA study brought to light the extent of vulnerabilities of U.S. aircraft and their on-board equipment to detection and attack by adversaries, who were deploying new advanced air-defense missile systems. These systems integrated radar-guided surface-to-air missiles (SAMs) and air-launched radar-guided missiles, all networked with early-warning, acquisition, and targeting radars, and coordinated within sophisticated command and control frameworks.
01/01/1971
With the blue water threat of free-ranging, nuclear-armed Soviet submarines coming to a head in 1971, the DoD assigned DARPA a singular mission: Revamp the U.S. military’s antisubmarine warfare (ASW) capabilities to track enemy subs under the open ocean where the U.S. Navy’s existing Sound Surveillance System (SOSUS) was falling short.
03/18/2013
In areas lacking trustworthy communications infrastructure, deployed servicemembers rely on wireless devices to perform double duty: they not only provide access to the network; they are the network. Protocols for these networks require nodes to coordinate among themselves to manage resources, such as spectrum and power, and determine the best configurations to enable sharing of information. A problem with these protocols is that they implicitly trust all information shared about the security and operational state of each node, and the network as a whole. Consequently, inaccurate control or security information can quickly render the network unusable. This shortcoming could put productivity and mission success at risk as use of military wireless systems increases.