The "Future Cyber Soldier of 2030"
"when they go on patrol in Iraq. But by 2030, their uniforms will be packed with nano-antenna arrays, capable of communicating with everything from drones to satellites. The soldiers will all be Hulk-strong, and Spiderman-agile, thanks to their nanotech-based exoskeletons. “Neural prosthetics” and “smart drugs” will make them battlefield geniuses. On-board computers will let them understand every language — and every cultural reference — as if they were natives. Naturally, their flexible, nanofiber uniforms will be all-but-impervious to bullets, flame, and lasers, too.
That’s the thinking, at least, over at the Soldier Research Design and Engineering Center in Natick, MA. Researchers there have spent years of effort — and tens of millions of dollars — to give tomorrow’s soldiers high-tech supersuits. The results have been… well, less than super. One such program, “Future Force Warrior,” was supposed to deploy next year. Now: never mind. A simpler effort, to give G.I.s digital maps and software radios, “Land Warrior,” had to fight a rear-guard action within the Army to keep from getting canceled.
So now the folks at Natick are starting over again. They recently released a white paper, on the “Future Soldier 2030 Initiative.” It’s not official U.S. Army doctrine or anything. “Nor is it intended to answer every question raised about warfare in 2030. Our intent is to stir imaginations, and start a dialogue about how best to equip the soldier,” the paper says."
SOURCE: Permalink
XXXXXXXXXXXXXXXXXXXXXXXXXX
The "Future Cyber Soldier of 2030"
Our contribution.
By Gerald Internet AQnthropologist Think Tank
05.05.09
These "uniforms will be packed with nano-antenna arrays, capable of communicating with everything from drones to satellites. The soldiers will all be Hulk-strong, and Spiderman-agile, thanks to their nanotech-based exoskeletons. “Neural prosthetics” and “smart drugs” will make them battlefield geniuses. On-board computers will let them understand every language — and every cultural reference — as if they were natives. Naturally, their flexible, nanofiber uniforms will be all-but-impervious to bullets, flame, and lasers, too." troops are WWW active connected to a squad of dedecitated cyber Masters by voice,video on either the helmet screen or retina, or even deep bone transmiter.
One of the Cyber squad ID the local Taiban cheifs and his webmasters.
He scans both the leaders PC and the PC and server for the webmaster, he calls up a phalanax
of Bots on call should it be nessary to run a dos attack on any of the above mentioned targets.
To shut off any outside communication on demand.
He also taps all local cell and satlite traffic,
Members monitor emails, IMS and cell traffic for any mentions of the local area.
Which are transmitted in summary to the troop in the field.
The field trooper questions a suspect, and finds a list of paswords
and screen names, this data is fed directly into a Bot Surveillance Unit,
And URLs are texted back to the cyber Trooper as the Bots locate forums
and blogs world wide that accept any of the passwords and screen names.
The cyber trooper reviews and searches each url for posts from the suspect
in the field, And a cyber trooper whispers into the Field troopers ear
what this "suspect" most recent post on the Terrorist forum says, while
the field trooper is staring into the suspects eyes.
Another cyber trooper searches the "suspects cell phone" remotely
when the field trooper calls the cyber squad on the suspects phone.
They project a list of the names in the cell phone call list
cross referenced to known terrorist in the local area on to the Fields troopers retina.
And then over lay a map with the Field Troopers locations and the physical locations of all the
cell phone numbers in the Suspects cell phone.
There is also a cyber heavy weapons squad on call for
any attacks on the field troopers www connections or his helmet PC.
They monitor all traffic into and out of the helmet PC and track it
to its destination and ID owner.
A Cyber heavy weapons squad has enough punch to
take down a Web node by themselves.
And the capability to launch multiple Dos attacks
on demand.
Or penetrate and take down a PC or server that
will take a week to fix,
Another cyber trooper is monitoring 56 search engines
all blogs, Terrorist forums and the news for any mention of the
field troopers local or targets in his area.
Only filtered data is fed to the Field trooper,
Physical locations of cell phones of terrorists in
his local, location of webmasters and his PC
Or turning off the terrorist leaders cell phone
at the start of the Field troopers assult on his
position.
A world view of their front line and control of it.
I'll return to play with this some more.
G
.
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home