Feeds

DARPA wants military iPhone and Android apps

Pentagon boffins spit on Windows phones

Website security in corporate America

Bandwagon-bothering boffins at everyone's favourite military tech hothouse DARPA have announced that they would like some apps written for the iPhone or for handsets running Google's Android OS - "with potential relevance to the military specifically and the national security community more generally".

The Pentagon deathnerds note that:

In today's military, handheld systems are characterized by a tight integration of specialized hardware with a narrowly focused software suite. Most of the handheld devices are heavily optimized for a particular task and are ill-suited for general-purpose use. A soldier's radio, for example, has very limited data capability and essentially no multimedia capability. Current language translation devices support neither messaging nor collaboration of any form ...

A transformation in technical approaches and business processes is called for.

But it won't be a transformation powered by Windows Mobile. DARPA specifies that "initial interest will focus on apps developed on the iPhone or Android platforms". The idea is to find apps which will be helpful "especially among the end-users at lower levels in the military echelon".

Famously there are already apps for the iPhone which can make ballistic calculations for a sniper. Other existing software which would obviously help a soldier could include various kinds of navigation kit, user interfaces for remote drones - again, several of which are already on offer - and so on.

Some military hardware, too, has already taken on many of the aspects of a smartphone - for instance the Land Warrior wearable comm/puter rig. And in fact, no matter DARPA's perferences, at least one maker has produced a covert version of military belt-computer software to run on a Windows smartphone.

DARPA, unusually, would seem to be very much with - or even a bit behind - the times on this one. The agency normally prefers to be well into the future.

Full instructions for developers to submit whitepapers to DARPA can be found here (Word doc). ®

Internet Security Threat Report 2014

More from The Register

next story
Brit telcos warn Scots that voting Yes could lead to HEFTY bills
BT and Co: Independence vote likely to mean 'increased costs'
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
ISPs' post-net-neutrality world is built on 'bribes' says Tim Berners-Lee
Father of the worldwide web is extremely peeved over pay-per-packet-type plans
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Turnbull: NBN won't turn your town into Silicon Valley
'People have been brainwashed to believe that their world will be changed forever if they get FTTP'
Google+ GOING, GOING ... ? Newbie Gmailers no longer forced into mandatory ID slurp
Mountain View distances itself from lame 'network thingy'
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.