Internet Anthropologist Think Tank: The "Future Cyber Soldier of 2030"

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Monday, May 04, 2009

    The "Future Cyber Soldier of 2030"




    "when they go on patrol in Iraq. But by 2030, their uniforms will be packed with nano-antenna arrays, capable of communicating with everything from drones to satellites. The soldiers will all be Hulk-strong, and Spiderman-agile, thanks to their nanotech-based exoskeletons. “Neural prosthetics” and “smart drugs” will make them battlefield geniuses. On-board computers will let them understand every language — and every cultural reference — as if they were natives. Naturally, their flexible, nanofiber uniforms will be all-but-impervious to bullets, flame, and lasers, too.

    That’s the thinking, at least, over at the Soldier Research Design and Engineering Center in Natick, MA. Researchers there have spent years of effort — and tens of millions of dollars — to give tomorrow’s soldiers high-tech supersuits. The results have been… well, less than super. One such program, “Future Force Warrior,” was supposed to deploy next year. Now: never mind. A simpler effort, to give G.I.s digital maps and software radios, “Land Warrior,” had to fight a rear-guard action within the Army to keep from getting canceled.

    So now the folks at Natick are starting over again. They recently released a white paper, on the “Future Soldier 2030 Initiative.” It’s not official U.S. Army doctrine or anything. “Nor is it intended to answer every question raised about warfare in 2030. Our intent is to stir imaginations, and start a dialogue about how best to equip the soldier,” the paper says."

    SOURCE: Permalink

    XXXXXXXXXXXXXXXXXXXXXXXXXX

    The "Future Cyber Soldier of 2030"

    Our contribution.

    By Gerald Internet AQnthropologist Think Tank

    05.05.09

    These "uniforms will be packed with nano-antenna arrays, capable of communicating with everything from drones to satellites. The soldiers will all be Hulk-strong, and Spiderman-agile, thanks to their nanotech-based exoskeletons. “Neural prosthetics” and “smart drugs” will make them battlefield geniuses. On-board computers will let them understand every language — and every cultural reference — as if they were natives. Naturally, their flexible, nanofiber uniforms will be all-but-impervious to bullets, flame, and lasers, too." troops are WWW active connected to a squad of dedecitated cyber Masters by voice,video on either the helmet screen or retina, or even deep bone transmiter.

    One of the Cyber squad ID the local Taiban cheifs and his webmasters.

    He scans both the leaders PC and the PC and server for the webmaster, he calls up a phalanax

    of Bots on call should it be nessary to run a dos attack on any of the above mentioned targets.

    To shut off any outside communication on demand.

    He also taps all local cell and satlite traffic,

    Members monitor emails, IMS and cell traffic for any mentions of the local area.

    Which are transmitted in summary to the troop in the field.


    The field trooper questions a suspect, and finds a list of paswords 

    and screen names, this data is fed directly into a Bot Surveillance Unit,

    And URLs are texted back to the cyber Trooper as the Bots locate forums

    and blogs world wide that accept any of the passwords and screen names.

    The cyber trooper reviews and searches each url for posts from the suspect

    in the field, And a cyber trooper whispers into the Field troopers ear

    what this "suspect" most recent post on the Terrorist forum says, while

    the field trooper is staring into the suspects eyes.

    Another cyber trooper searches the "suspects cell phone" remotely

    when the field trooper calls the cyber squad on the suspects phone.

    They project a list of the names in the cell phone call list

    cross referenced  to known terrorist in the local area on to the Fields troopers retina.

    And then over lay a map with the Field Troopers locations and the physical locations of all the

    cell phone numbers in the Suspects cell phone.


    There is also a cyber heavy weapons squad on call for 

    any attacks on the field troopers www connections or his helmet PC.

    They monitor all traffic into and out of the helmet PC and track it

    to its destination and ID owner.

    A Cyber heavy weapons squad has enough punch to

    take down a Web node by themselves.

    And the capability to launch multiple Dos attacks

    on demand.

    Or penetrate and take down a PC or server that 

    will take a week to fix,

    Another cyber trooper is monitoring 56 search engines

    all blogs, Terrorist forums and the news for any mention of the 

    field troopers local or targets in his area.

    Only filtered data is fed to the Field trooper,

    Physical locations of cell phones of terrorists in 

    his local, location of webmasters and his PC 

    Or turning off the terrorist leaders cell phone

    at the start of the Field troopers assult on his

    position.

    A world view of their front line and control of it.

    I'll return to play with this some more.


    G


    Over Watch for Cyber Troops


    .






    Labels:

    0 Comments:

    Post a Comment

    Subscribe to Post Comments [Atom]

    << Home