Files
notes/archive/nKode Warfighter zero trust authentication at the tactical edge.md

2.7 KiB

Points from Bill Playte

  • paint a picture with an example:
    • Warfighters in the field want to ID themselves as friendly to a UAV or call in a drone strike. Right now they call that in over the radio. What happens if a red threat actor impersonates their voice? ...
    • when starlink brings high-bandwidth commutation to field, will warfighters be able to enter long complex passcodes every time the do anything on their phone?
  • nKode should be Tactical Readiness Level (TRL) 6.5 or 6.6 maybe 6.7
  • emphasize low-bandwidth

Video Submission process: https://chatgpt.com/share/67b7b41f-0c38-8009-8513-49f843647c26

  • Video length: No more than 7 minutes.
  • Format: MP4, HD 1280x720, under 1 GB.
  • Required elements: Problem definition, advancement beyond the current state, team capability, and defense/commercial impact.

Each video must address four required elements:

  1. Problem Definition & Current State of the Art:
    • Clearly define the problem your technology solves.
    • Explain the current state of the art and why existing solutions are inadequate.
    • Must fit within at least one of the DARPA topic areas.
  2. Advancing the State of the Art:
    • How does your solution improve on existing technologies?
    • Identify what is "new" in your approach.
    • Discuss potential barriers to innovation.
  3. Team Capability:
    • Highlight the key personnel, their expertise, and why they are the best team for the project.
    • Demonstrate past experience and qualifications.
  4. Defense/Commercial Market Impact:
    • Describe real-world applications in both defense and commercial markets.
    • Explain how the solution will impact national security and/or the private sector.

Warfighter Situations

senario 1

Warfighters in the field communicate with the base by radio. Radio is line-of-sight. Warfighers want to do something that requires authentication like calling in backup, Identifying themselves as friendly if they've been out of communication range for awhile, or call in an airstrike

Questions
  1. What are some situations where authentication (I am who i say i am) needed? Is it enough to have an encrypted radio?
  2. Do warfighters have passphrase they used to authenticate?
  3. Are these fighters using smart phones?
  4. Are these guys the warfighers at the tactical edge?

Senario 2

A centralized base is setup with all it's own infrastructure including 5G networks. Warfighters radio in (from senario 1) that they want an air strike.

Questions

  1. does the commanding officer of the base authroize that? If so, how do they authenticate? are they getting on smartphones and entering a password?
  2. Are these guys also warfighters at the tactical edge?