Defense Advanced Research Projects AgencyTagged Content List

Threat Countermeasures

Actions that mitigate adversaries' capabilities

Showing 34 results for Countermeasures RSS
07/29/2016
Throughout game day, DARPA is roaming around the Paris Las Vegas Convention Center to capture attendees’ reflections on the historic experiment in cyber security unfolding before them.
September 30, 2016,
United States Institute of Peace
DARPA’s Biological Technologies Office (BTO) is hosting a Proposers Day to provide information to potential proposers on the objectives of the upcoming Safe Genes program. The program aims to help unlock the potential of advanced gene editing technologies by developing a set of biosafety and biosecurity tools to address potential risks of this rapidly advancing field.
Defense forces rely on electromagnetic dominance for command, control, intelligence, surveillance, reconnaissance and related applications that use the electromagnetic spectrum. Similarly, spectrum use by our adversaries, and extensive unaffiliated commercial uses result in an increasingly congested, space, time and frequency environment. Severe pressure on available spectrum from all spectrum users creates a situation demanding significant adaptivity and flexibility of our communications systems to communicate successfully and achieve mission goals.
Based on promising results obtained under the Crosshairs program, the C-Sniper program will develop the capability to detect and neutralize enemy snipers before they can engage U.S. Forces, with the goal of delivering a field testable prototype suitable for experimentation as an integrated part of the DARPA Crosshairs system. The C-Sniper system will operate day and night from a moving military vehicle and provide the operator with sufficient information to make a timely engagement decision.
The rapid pace of innovation in software and hardware over the past three decades has produced computational systems that, despite security improvements, remain stubbornly vulnerable to attack. Although clean-sheet design can produce fundamental security improvements that gradually diffuse into the installed base, this process can take years.