47 lines
2.7 KiB
Markdown
47 lines
2.7 KiB
Markdown
Points from Bill Playte
|
|
- paint a picture with an example:
|
|
- Warfighters in the field want to ID themselves as friendly to a UAV or call in a drone strike. Right now they call that in over the radio. What happens if a red threat actor impersonates their voice? ...
|
|
- when starlink brings high-bandwidth commutation to field, will warfighters be able to enter long complex passcodes every time the do anything on their phone?
|
|
- nKode should be Tactical Readiness Level (TRL) 6.5 or 6.6 maybe 6.7
|
|
- emphasize low-bandwidth
|
|
|
|
Video Submission process:
|
|
https://chatgpt.com/share/67b7b41f-0c38-8009-8513-49f843647c26
|
|
- **Video length**: No more than **7 minutes**.
|
|
- **Format**: MP4, HD 1280x720, under **1 GB**.
|
|
- **Required elements**: Problem definition, advancement beyond the current state, team capability, and defense/commercial impact.
|
|
|
|
Each video must address **four required elements**:
|
|
|
|
1. **Problem Definition & Current State of the Art**:
|
|
- Clearly define the problem your technology solves.
|
|
- Explain the **current state of the art** and why existing solutions are inadequate.
|
|
- Must fit within **at least one of the DARPA topic areas**.
|
|
2. **Advancing the State of the Art**:
|
|
- How does your solution improve on existing technologies?
|
|
- Identify what is "new" in your approach.
|
|
- Discuss potential barriers to innovation.
|
|
3. **Team Capability**:
|
|
- Highlight the key personnel, their expertise, and why they are the best team for the project.
|
|
- Demonstrate past experience and qualifications.
|
|
4. **Defense/Commercial Market Impact**:
|
|
- Describe **real-world applications** in both defense and commercial markets.
|
|
- Explain how the solution will impact national security and/or the private sector.
|
|
|
|
## Warfighter Situations
|
|
|
|
#### senario 1
|
|
Warfighters in the field communicate with the base by radio. Radio is line-of-sight. Warfighers want to do something that requires authentication like calling in backup, Identifying themselves as friendly if they've been out of communication range for awhile, or call in an airstrike
|
|
##### Questions
|
|
1) What are some situations where authentication (I am who i say i am) needed? Is it enough to have an encrypted radio?
|
|
2) Do warfighters have passphrase they used to authenticate?
|
|
3) Are these fighters using smart phones?
|
|
4) Are these guys the warfighers at the tactical edge?
|
|
|
|
#### Senario 2
|
|
A centralized base is setup with all it's own infrastructure including 5G networks. Warfighters radio in (from senario 1) that they want an air strike.
|
|
#### Questions
|
|
1) does the commanding officer of the base authroize that? If so, how do they authenticate? are they getting on smartphones and entering a password?
|
|
2) Are these guys also warfighters at the tactical edge?
|
|
|