On February 6, 2014, Defense and media personnel gathered in the Pentagon’s Hall of Heroes, not to award a medal – which is the hall’s normal use – but to celebrate a bookkeeping milestone. The Marine Corps had done something that no other military branch had done: passed an audit.

The labyrinthine Defense budgets have proven immune to normal accounting procedures. The Department of Defense (DoD) is the only government agency that has failed to comply with a 1992 law that all departments get their records in order. No one is even going to try to audit the Pentagon itself until 2017. The Marines had been the only service to pass an audit.

Unfortunately, the number of military services that have passed an audit have once again returned to zero. On March 23, 2015, the DoD’s Office of the Inspector General revoked their earlier glowing recommendation of the Marines’ record keeping. There are allegations of sloppy paperwork, missing records, and independent auditors who may not be so independent.

According to news articles, folks high up in the Inspector General office ignored their team’s report on the inadequacy of the Marine’s accounts. Furthermore, a civilian auditing team that was supposed to bring in an outside point-of-view may have been compromised.

This is not a small matter. As the Reuters’ news service noted:

“Chronic pay errors damp troop morale. Incompatible logistics and personnel systems complicate deployments. And the lack of reliable accounts conceals huge sums lost to waste, fraud and mismanagement.”

Reuters’ did an investigative piece about the failed audit (evidently a few investigative reporters still exist). To read it, click here.

We asked for an opinion from Rob Culver, AMREL’s Director of Business Development, DoD Programs. In addition to his career in Special Forces, he spent a number of years in procurement.  As someone who has been an end-user, a vendor as well as an acquisition officer, he has a unique perspective.

According to Mr. Culver:

“Part of the problem is the fact that DOD is not a team.  There are more than 30 different bureaucratic entities involved in procurement and financial management. Don’t forget the sixteen Assistant Secretaries of Defense, four Deputy Secretaries of Defense, five Undersecretaries, Joints Chiefs of Staff with their ten subordinate directorates and on and on.

“Most of the above is duplicated by the individual military services (USA, USN, USAF, USMC). This doesn’t include the fifteen+ independent agencies under OSD as well as the nine Unified Combatant Command. Of course, there are the ever present meddling fingers or Congress and the Whitehouse.

No one, absolutely no one in any of these individual fiefdoms, is ever rewarded for cooperating outside their own little DoD entity. Employees are rewarded for protecting their bosses’ turf.

“I don’t have an answer. I’m just pointing out the inherent dysfunction of DoD’s highly politicized, bureaucratic labyrinth. Soldiers don’t run DoD; civilian politicians and political appointees do.  DoD is criticized for not being able to pass an audit, but I suspect the last thing Congress wants is for DoD to completely and unabashedly open its financial kimono.”

Whatever you think of Donald Rumsfeld, Mr. Culver feels he hit the nail on the head with this speech, given early in his term as Secretary of Defense:

“… The topic today is an adversary that poses a threat, a serious threat, to the security of the United States of America. This adversary is one of the world’s last bastions of central planning. It governs by dictating five-year plans. From a single capital, it attempts to impose its demands across time zones, continents, oceans, and beyond. With brutal consistency, it stifles free thought and crushes new ideas. It disrupts the defense of the United States and places the lives of men and women in uniform at risk.

“Perhaps this adversary sounds like the former Soviet Union, but that enemy is gone: our foes are more subtle and implacable today. You may think I’m describing one of the last decrepit dictators of the world. But their day, too, is almost past, and they cannot match the strength and size of this adversary.

“The adversary’s closer to home. It’s the Pentagon bureaucracy. Not the people, but the processes. Not the civilians, but the systems. Not the men and women in uniform, but the uniformity of thought and action that we too often impose on them.”

AUVSI Unmanned Systems Conference was bigger and better than ever. AMREL was there of course. What did our team think of this tradeshow?

Unmanned Aerial Vehicle (UAV) explosion

UAVs were everywhere. It seemed as if everyone was peddling their own UAV or looking for one to invest in.

Not all were impressed with the proliferation of UAVs. “They all look the same,” complained one person. “Like quadcopter toys from a hobby shop.”

One unusual UAV that got people’s attention was the Goose BRAVO from Mist Mobility Integrated Systems Technology (MMIST). An upgrade of the CQ-10A that supported Special Forces, it is a modern version of an old technology: gyrocopter (autogyro). Usually, a gyrocopter is something you see in 1930’s movies, not in modern skies. Yet, it can lift 600 pounds, fly 70 mph, and reach 18,000 feet.

Operator Control Unit (OCU) explosion

Since AMREL is the premier supplier of OCUs, we were especially interested in the control units. Again, individuals in our staff were not impressed. There were as many control units as there were UAVs. Every developer was controlling their UAVs with devices that were dedicated to their specific offering. It seems that the Pentagon’s decades long campaign for interoperability is being completely ignored.

“Nobody is paying them to make interoperable control units,” explained Rob Culver, AMREL’s Director of Business Development, DOD Programs.  That’s because…

Defense is no longer the key target market

UAV developers are going after the civilian market big time. Targeted applications include photography, videography, filming, mapping, inspection, logistics (delivery), crowd control, patrolling, spot spraying fields, seeding farms, mining, herding, follow me, and of course the old standby, reconnaissance.

Defense is increasingly seen as a troublesome market. Lots of grumbling on the tradeshow floor about congressional shenanigans creating uncertainty in military funding.

At first glance, the UAV developers’ fixation with civilian applications seems warranted. Consumer Electronics Association predicts 1 million flights a day in American airspace during the next 20 years. Investors are looking forward to a billion dollar commercial market once the FAA permits non-Line Of Sight operation.

Indeed, at the conference, the FAA raised everyone’s hopes with its announcement about the Project Pathfinder initiative. Project Pathfinder is an agreement with CNN, PrecisionHawk and BNSF Railway to explore civilian applications.

However, the Defense market is far from finished. At a presentation at the conference, Derrick Maple, principal unmanned systems analyst for IHS Aerospace, predicted a global defense and security UAV market of $11.1 billion by 2024, a doubling of the current one. The US military may be slowing down its procurement of UAVs, but other countries are ramping up their purchases. Maple cited “Australia, the Netherlands, France, Germany, Poland, Spain and the Middle East region” as areas of opportunities for American manufacturers.

In addition, the major obstacles to commercial UAV applications are not going away soon. There are solid reasons why FAA has been dragging its heels on integrating UAVs into civilian airspace. No one has yet solved the fundamental challenges of poor visibility and collision avoidance. This isn’t even mentioning such problems as radio frequency conflicts, which will become more significant as commercial UAVs increase.

Seems like an awful lot of people are betting an awful lot of money that the FAA will overcome these problems soon. I hope they aren’t expecting a quick return on their investment.

Hot rumor#1: The rugged vs. non rugged debate lives on

Not all the talk at AUVSI 2015 was about unmanned systems. There was a rumor about the military’s utilization of non-rugged mobile handhelds.

Some have argued that Defense doesn’t need rugged mobile devices. Ordinary commercial devices have a better supply train, are more advanced, and are cheaper. Just stick a protective case on them, and you have a solution that is “rugged enough.”

Rugged proponents counter that using a protective case on a commercial mobile device is like trying to fly by sticking wings on a car. Looks good, but it just won’t work. To be truly tough, one needs a device built rugged from the ground up.

Way back in 2011, we reported on rumors of end-user discontent following the Network Integration Evaluation (NIE). Soldiers didn’t like the fragility of the commercial handhelds. Sand, high temperatures, and sunlight readability were significant problems.

Despite these negative results, the vision of buying off-the-shelf smartphones for soldiers proved too alluring. The non-rugged advocates preserved.

Commercial handhelds advocates may not have gone away, but neither have the problems. According to rumor, there is continued end-user dissatisfaction with non-rugged smartphones. Again, sunlight readability is a problem. Turns out the protective case does an OK job guarding against shock and drop, but actually makes temperature and vibration problems worse (An enclosed case around an electronic device causing heat problems? Should have been obvious).

Despite the latest brouhaha, it remains to be seen if the non-rugged advocates will finally concede to reality.

Hot rumor#2: ARMY aviation shake-up

Traditional aviation personnel are among the people who have had the most difficulties adjusting to the unmanned era. In their eyes, the Air Force exists so pilots can fly. Predator UAVs may be cool, but are obviously secondary to the thrill one feels at operating a jet going Mach 2.

Similarly, aviation personnel in the ARMY have been unenthusiastic about Tactical UAVs (TUAV). While foot soldiers value their backpackable TUAVS, the ARMY aviation folks would rather forget these toys, and concentrate on helicopters and their few fixed wing assets.

According to rumor, the responsibility of TUAVs will be transferred from ARMY aviation to the ground pounders. Undoubtedly, the once unloved TUAVS will now be greeted with affection and enthusiasm by their end-users.

The military doing something smart? We could use a lot more rumors like that.

Heard a hot rumor lately? What were your impressions of AUVSI 2015?  Send your stories to editor@amrel.com.

Biometric applications for financial services have emerged as the darling of venture capitalists. Business journals are filled with reports about banks, such as the giant Oversea-Chinese Banking Corporation (OCBC bank), adopting biometric applications that allow it clients to access their accounts on their mobile devices. When biometric development companies, such as EyeVerify and Nymi secure funding, financial magazines pay attention.

Considering the use of biometrics by financial services is expected to top $8 billion by the year 2020, investor interest is understandable. Up until recently biometrics were applied to law enforcement, military, and other niche security applications. Why is banking jumping on the biometric bandwagon?

 

Follow the fear

There is a growing perception that traditional methods of securing information (such as passwords) have become increasingly unreliable and vulnerable. Just look at a few recent headlines:

  • In the last 10 years, Identity Theft Resource Center calculates that more than 778 million records have been exposed by data breaches.
  • In 2014 alone, NASDAQ estimates that 700 breaches exposed an estimated 81.5 million consumer records.
  • Highly-publicized hacks include Home Depot, Target, and even the personal financial information of the First Lady, Michelle Obama.

In addition, the growth of mobile devices has created a demand for password alternatives.  People want to conduct financial transactions on their telephone, but they do not want to input account numbers and complex passwords on small mobile screens. Biometric authentication is not only seen as more secure than passwords, but also more convenient.

 

What is biometrics?

Biometrics technologies identify a person through physical characteristics.  Fingerprints are perhaps the most well-known. Other biometric technologies include iris & retinal scans, heart rhythms, facial & voice recognition, and palm vein identification. Their permanence, convenience, and uniqueness are considered advantageous over conventional passwords.

Biometric applications occupy several broad categories:

  • Enrollment – Entering a person’s physical characteristic and identity into a database. Enrollment is the first experience anyone has with a biometric application. When a person is arrested, they are enrolled, i.e. their fingerprints are inputted into a police database. Enrollment overlaps with registration, which is a process that involves your identity claims. If I enter my fingerprints into a database, while claiming to be Joe Smith, but I am really John Doe, I have successfully enrolled, but have fraudulently registered. Enrollment applications can be very technologically demanding. The quality of digital information entered into national databases is highly regulated, and can be difficult to achieve.
  • Verification (AKA matching) – Are you who you say you are? This is by far the most common use for biometric technologies. Every time someone checks the photograph on your driver’s license, they are verifying your identity by comparing it to a physical characteristic. A closely related application is authentication, which determines if you are authorized for access, i.e. not only you are really John Smith as you claim, but you also are entitled to enter the building. Most biometric applications focus on verification, since it is the one most in demand, and the technologically easiest to create.
  • Identification – Who are you? If you are arrested, and refuse to identify yourself, a police officer can try to find out your name by running your fingerprints through a database. Unlike the verification process, identification doesn’t deal with any claims about identity; it simply establishes identity through a physical characteristic alone. This is a technologically more demanding process than simple verification.

There no standard, universally accepted classification scheme for biometric applications. Even terms can have different meanings (you will notice that sometimes in this article, I use the same word to mean slightly different things). However, the categorizations as defined above are useful in that they communicate broadly the different technologies and needs that are in demand today.

 

Passé passwords

The adoption of biometric applications by financial services has been driven by the assumption that they are more secure than passwords. There is reason to doubt this.

Passwords, despite their bad reputation, actually work fairly well. In spite of alarming headlines, the vast majority of people do not experience hacks, or at least ones with severe consequences. This is especially true if they take some commonsense precautions, such as separate passwords for important financial accounts, and frequent changes in passwords.

Biometric technology, like passwords, can be hacked. For years, experts have warned about criminals using gelatin “sleeves” to “spoof” fingerprints. Of course, countermeasures can be implemented, but then criminals will work hard to defeat them, which lead to different countermeasures, and so on. Pretty soon, the back-and-forth war of biometric technologies begins to look like the current state of passwords, in which criminals and security experts are involved in a constant battle.

The presence of fingerprint sensors on the iPhone 6 and other popular mobile devices has increased the attractiveness of biometric authentication to financial services. Why not exploit the hardware that many of their customers already have? Of course, the very popularity of these sensors increases their value as targets for criminals.

In addition to fraud, another problem with biometrics is the human body itself. For example, fingerprints can be “rubbed away” by hard physical labor or aging. A bank servicing farmers or an elderly population will have to consider this before mandating fingerprint authentication for accessing financial services.

I am not downplaying the importance of biometrics as an emerging technology. I am simply stating that financial services should adopt them cautiously and be aware that they are not without their problems.

I believe that biometric technology will be used in the financial sector primarily in combination with passwords. Two forms of independent authentication will enable the greatest security.

 

Enrollment

Since many biometric firms focus their efforts on the “low-hanging fruit” of verification, their potential customers in the financial services are often uninformed about the technological challenges of enrollment.

This is especially important for in-house security. Already, in some banks, officers can only make important transactions after they verify their identity with a biometric authentication. Obviously, when a new employee is hired, enrollment into the bank’s database must happen. For this, the bank will need its own enrollment equipment.

Biometric enrollment equipment need not be cumbersome or difficult to use, but they should be sturdy. Enrollment is often performed by various employees with different levels of skill, not to mention clumsiness. Some commercial biometric devices are fragile, and subject to frequent breakdowns, which can lead to costly delays. It actually makes economic sense for the bank to invest in ruggedized devices that may cost more, but are far more reliable.

Enrollment creates unique demands on biometric devices. The quality of any given device captures varies greatly and could be critical to their utility.

Biometric information is stored in Electronic Fingerprint Templates (EFT) or Electronic Biometric Templates (EBT). To access national databases EFTs/EBTs need to conform to strict criteria. Currently, the Automated Biometric Identification System (ABIS) and the Integrated Automated Fingerprint Identification System (IAFIS) demand that EFTs/EBTs match the latest Fingerprint Acquisition Profile (FAP) (the current highest standard being FAP 45). A financial service that wishes to authenticate the identity of its employees or clients would be wise to use enrollment devices that generate FAP 45 quality files.

 

Solve a security problem by creating a larger one

Although biometric spoofing is a common criminal practice, I am unaware of anyone using a digital biometric file to commit fraud. However, it doesn’t take a lot of imagination to envision a stolen EFT/EBT being used to fake an authentication. One day we will see news banners declaring a high-profile hack has pilfered “millions of fingerprints.”

Consequently, biometric applications will force financial services to take stricter security measures, not more relaxed ones. As one skeptic of biometric authentication remarked, a person can change their password, but not their fingerprints. Consumers will want the greatest assurances from banks that their biometric information is safe.

 

All’s well that ends Orwell

Consumers will need other kinds of assurances as well. There is something a little Orwellian about large institution having intimate information about your physical characteristics.

Any financial service using biometric applications will need to be proactive in assuring their clients. Privacy policies must be public and displayed prominently. Clients should be informed that biometric information will only be used for identification purposes and will not be shared with any third party.

The good news is that, for the most part, consumers have shown little fear of most biometric applications and appreciate their convenience.

 

Conclusion

The enthusiasm venture capitalists have shown for biometric banking applications is well-founded, but there are unknowns. For example:

  • Will passwords be replaced or merely supplemented?
  • Will facial or voice recognition ever be as robust or support an infrastructure as developed as fingerprints?
  • Will the future demand multimodal or single mode biometrics?

Pioneers who develop and adopt biometric technologies dream their applications will be gold mines. If they guess wrong or lack caution, their gold mine may turn into a money pit.

To learn more about AMREL’s Biometric Solutions, click here.

Every once in a while, we learn of a new technology that’s scary. This is one of those times.

Very few people in the current military are as respected or as well trained as the sniper. Along with unmanned systems and Special Forces, snipers have come to embody the modern face of war.

Snipers have a long history. Their skillset has continually transformed as weapon technology itself has been constantly upgraded. For example, once upon a time, snipers were expected to be proficient in making their own ammunition. Familiarity with the idiosyncrasies of their particular ordinance was vital to their ability to successfully make a long shot. Obviously, standardization and good quality control has rendered this particular talent obsolete.

Snipers are expected to be able mentally calculate wind direction, elevation, and other factors that affect the trajectory of a bullet. Ballistic computers have downgraded the importance of these mental gymnastics, but many snipers still learn the necessary mathematics. Like the ballistic computer, a self-calibrating smart scope also threatens to render certain sniper skills archaic.

But all these technological advances pale in comparison with DARPA’s self-guided bullets. Everybody’s favorite mad scientists are running an Extreme Accuracy Tasked Ordnance (EXACTO) program. In other words, a self-steering bullet for difficult, long-distance shots.

“True to DARPA’s mission, EXACTO has demonstrated what was once thought impossible: the continuous guidance of a small-caliber bullet to target,” said Jerome Dunn, DARPA program manager.

Dunn went on to describe a live-fire demonstration that utilized a standard rifle.  “… EXACTO is able to hit moving and evading targets with extreme accuracy at sniper ranges unachievable with traditional rounds. Fitting EXACTO’s guidance capabilities into a small .50-caliber size is a major breakthrough and opens the door to what could be possible in future guided projectiles across all calibers.”

As demonstrated by the video below, an EXACTO bullet can change direction in mid-flight. How is this accomplished? One source states that:

“Each ‘self-guided bullet’ is around 4 inches in length.  At the tip lies an optical sensor that can detect a laser beam being shone on a far-off target. Actuators inside the bullet gather information from the bullet’s sensor allowing them to steer using tiny fins to guide the bullet accurately to its intended target. The bullet can self-correct its navigational path 30 times a second, all while flying more than twice the speed of sound!”

Bear in mind that the above quote was taken from an unconfirmed source. Fins on a rifled bullet? Could a laser-guided projectile adjust for fog and dust?  No one knows how DARPA is performing this magic trick and they are not talking.

What’s so scary about a self-guided bullet? Not the fact that people will be able to shoot around corners. Heck, that’s just one of the myriad ways a modern combatant can get killed. Also, there’s a real possibility that self-guided bullets will reduce collateral damage. Imagine a Predator UAV firing self-guided .50 caliber bullets instead of Hellfire missiles. The greater accuracy may mean a smaller impact area and consequently fewer casualties.

What’s so scary about the self-guided bullet is that, as the video demonstrates below, an untrained novice hit a long-range target the first time he used this technology. Snipers will no longer constitute a rarefied elite with difficult-to-learn skills. Virtually anyone will now be able to use ordinary rifles to hit targets a mile away.

That’s scary.

Nothing illustrates the problems of Defense procurement better than the troubled program of the F-35.  Every year the 5th generation combat plane seems to grow more expensive, less capable, and more delayed in schedule.

What both American critics and proponents of the F-35 often forget is that it’s a multinational project. The US strategy is to spread the cost of this advanced plane among its allies.

One ally invested in the F-35 is Israel. I was curious what its Defense establishment thought of this plane. While not immune to political shenanigans, Israel’s military likes to thinks of itself as ruthlessly practical. Could they cut through the agenda-driven arguments that dog the F-35 in America?

A Times of Israel article details the debate within Israel about the F-35.  Some of the criticism will sound familiar to American military analysts.

The F-35:

The expense criticism is somewhat ironic, since US aid will pay for most of the F-35s’ cost. Still, some Israelis think the aid money could be better spent.

One difference between American and Israeli commentators is that the latter do not worship at the altar of the new and more readily embrace the virtues of older, more established systems. As quoted in the Times of Israel, Yiftah Shapir, of the Middle East Military Balance Project, said:

“Take the army we had in 1985 – the F-15 and F-16 A and B; the Merkava Mark I and II, and all the rest – and ask yourself whether the IDF,” using those weapons, “could defend Israel today against its enemies,”

His answer is an unhesitating yes. Not every technological leap is one Israel is forced to take, he said.

While some in America have also argued that upgrading older fighters would be a better use of resources, it is hard to imagine any of our military analysts blithely dismissing the “latest and greatest.” For example, one of the F-35 strongest critics is Moshe Arens, former Defense minister and a trained aeronautical engineer. He boasted that Vietnam War-era armored personnel carriers were effective in the latest Gaza incursions. When was the last time you heard an American military leader argue that we do not need to invest in new technology?

The Israeli Air Force (IAF) point man for the F-35 is “Lt. Col. B” (Israeli military and intelligence leaders are often granted anonymity in the media). He counters Arens’ arguments with dire predictions of declining Israeli air superiority. Furthermore the comparisons of the early models of the F-35s with the latest versions of the F-16s and F-15s are inappropriate. Rather, “…the first model of the F-35 should be compared to the F-16’s first model and not the plane that has been steadily improved for the past 35 years.”

“Lt. Col. B” continued:

“The question,” he said, “is where to place the seam between the present and the future” – in other words, when does it no longer pay to continue to upgrade the existing platform…”

“Lt. Col. B” bolstered his arguments with a detailed historical perspective. Virtually, all new jet fighter purchases were opposed by the IAF at the time.

Some advocate abandoning the F-35 and waiting for unmanned fighters to become practical. While it is possible that the F-35 will be the last manned combat aircraft, waiting for unmanned fighters is not a practical strategy. Granted, the US Navy has done amazing things with Unmanned Combat Aircraft Vehicles (UCAV), such as carrier landings and aerial refueling. However, basic problems remain. UCAVs crash more often than their manned counterparts, and remote operators hate the poor visibility. In one famous incident an operator flew a UCAV upside down without realizing it.

Since Russia’s announcement of the sale of S-300 Integrated Aircraft Defense Systems to Iran, F-35 advocates have become embolden. According to “Lt. Col. B,” the problem with operating in the depths of enemy territory is not lack of fuel, but inadequate intelligence. The pilot of an F-35 has vastly superior situational awareness than his counterpart in the F-16. This difference is literally a matter of life and death.

Those of you who have been following the sale of the S-300 to Iran may be a little confused by the last paragraph. Depending on who you listen to, the S-300 sale is game changing or a nuisance that can be overcome. Indeed, even without the F-35, Israel has already conducted training exercises against the S-300. Does the S-300 sale strengthen the case for F-35 acquisition or not? This last question depresses me, because I cannot get a good objective answer.

Defense procurement in Israel suffers the same limitations as its American counterpart. For example, Moshe Arens, who was mentioned earlier, is an informed expert on Israeli defense issues. However, he has been waging a decades’ long campaign to restore Israel’s ability to build its own homegrown jets. No matter how legitimate are his criticisms about the F-35, it is entirely possible that no non-Israeli jet would ever satisfy him.

This is the central problem in both American and Israeli Defense procurement. Competent people of good will are involved, but everybody is driven by their own personal agendas. It is impossible to get an unbiased neutral judgment.

The American solution is to ignore the difference of opinion, and try to satisfy everyone. Politicians can’t decide what areas of the world constitute core American interests? Fine, we need the capability to project power everywhere simultaneously. The Pentagon can’t figure out what kind of war we will fight? We will simply prepare for every kind of war. No one really knows what a 5th generational fighter should be? Great, we’ll simply build a plane that is all things to all people.

Obviously, such a policy is not sustainable, not mention ruinously expensive. I do not know what the solution is. I dread that 20 years from now, as commentators examine the latest over-budget weapon system, the F-35 program will look like a model of efficiency and economy.

Suppliers of military unmanned systems are constantly on look out for possible civilian applications. One promising civilian application is their use in disaster response. Unmanned Ground Vehicles crawl through the rubble of destroyed buildings looking for survivors. Unmanned Aerial Vehicles and Unmanned Underwater Vehicles inspect buildings, bridges, wharfs, and other structures for damage and structural integrity. Unmanned systems used in response to disasters are referred to as “Search-And Rescue” (SAR) or “Urban Search and Rescue” (USAR).

Essentially, USAR robots act as the eyes and ears in environments that that are too difficult or too dangerous for humans to go. Preserving the safety of human rescuers is not a trivial concern. According to Center for Robot-Assisted Search and Rescue (CRASAR), 135 rescuers died in rescue operations in response to a Mexico City earthquake.

Unmanned systems operating in irradiated areas of a nuclear accident is the classic example of a dangerous and hard-to-reach environment. Recently, the Japanese utility TEPCO sent a 2-foot long, snake-shaped robot into severely radioactive areas of the Fukushima reactor to collect temperature and radiation data. The video images created by this robot are the first we have seen of the damaged containment chamber. The information collected by this and other unmanned systems are expected to be critical in removing radioactive debris. For more information on the role of unmanned systems in the Fukushima disaster, see this blog’s post, Where are the Japanese robots?

[layerslider id=”31″]

The first known use of USAR robots was in response to the 9/11 bombing of the World Trade Center. Personnel from Foster-Miller, iRobot, University of South Florida, NAVSEA SPAWAR, DARPA, CRASAR operated or contributed upwards to 17 unmanned systems. This disaster highlighted the potential of USAR unmanned systems as well as the need for further development. Read more about the use of robots at the World Trade Center here.

Since then, USAR robots have been used over dozens of times, as indicated by the following table.

CRASAR Table

Source CRASAR

All USAR unmanned systems (ground, aerial, and marine) are remotely operated. Autonomous systems are not used due to real-time needs. Operators had expected that mobility and hardware capabilities would present the biggest challenges. Instead, Human-Robot Interactions and sensor limitations have been the leading problems.

This short video gives an excellent introduction to USAR robots as well as the CRASAR’s role in deploying them.

The voice you hear in the above video is Professor Dr. Robin Murphy, Director of CRASAR. She has been indefatigable in promoting USAR. Below is an interview with her discussing USAR unmanned systems and their role following 9/11.

Probably, the biggest single limitation to widespread deployment of USAR robots is money. Institutions are willing to invest in machines that replace expensive workers. They are more reluctant to expend resources on costly hardened systems that may be used rarely or never at all. In the above referenced blog post on the Fukushima disaster, I concluded that financial concerns were the major factors in the lack of an unmanned system response.

USAR robots save lives and hold the promise to limit the monetary consequences of disasters. Governments and other institutions should be heavily investing in them. It remains to be seen if the deadly combination of short-sighted economic concerns and wishful thinking can be overcome, so the full potential of USAR robots can be realized.

[layerslider id=”31″]

Even by contemporary political standards, the debate about Net Neutrality has been clouded by an extraordinary amount of dishonesty. While legitimate arguments can be made in both sides, some common assertions are simply untrue. Furthermore, the people who are saying these deceitful things are often high-level bureaucrats or CEOs of internet companies who presumably should know better.

What is Net Neutrality?

The “default setting” of the internet is “neutral.” In theory, an end-user’s ability to download a PDF of his child’s school cafeteria menu is similar to that of downloading an ebook from Amazon. The end-user’s access is the same, in theory, no matter what the size of the website.

Internet Service Providers (ISP) sell internet access (bandwidth) to end-users, as well as to website owners. ISPs don’t like Net Neutrality and want to charge large content producers (such as Netflix) premium rates for higher-speed access to the their customers. This would create a “Fast Lane” model, in which the end user would experience slower downloads from smaller, less prosperous websites.

[layerslider id=”31″]

It is no surprise that ISPs hate Net Neutrality, while content producers are in favor of it.

net neutrality table

As you might imagine, when billionaires fight, lawyers get rich. After attempts to enforce Net Neutrality were overturned by court cases, the FCC adopted several historic regulations governing ISP behavior, including:

  • No blocking of legal content
  • No throttling of Internet traffic on the basis of content
  • No paid prioritization of content

The FCC clarified that these rules prevent ISPs from “unreasonably interfering with or unreasonably disadvantaging” the ability of end-users and content providers to connect with each other. Furthermore the rationalization of “reasonable network management” must “primarily be used for and tailored to achieving a legitimate network management–and not commercial–purpose.” In other words, ISPs can’t use corporate doublespeak to justify arbitrary bills on end-users, or throttling access to websites.

Although previous court rulings had overturned Net Neutrality policies, these new FCC regulations essentially maintain the status quo. Historically, the internet has grown and thrived in “neutral” conditions.

In the wake of the FCC rulings, the media has been deluged with a torrent of fraudulent information. Take the quiz below and see if you can spot which quotes or talking points are false.

1. “We are for net neutrality, but some services should be prioritized over others.” Deutsche Telekom CEO Timotheus Hoettges, New York Times

I thought I start off with an easy one. Hint: the above statement is like saying “I am for equal pay for equal work, but no woman should be paid as much as a man.”

2. “The Internet is not broken. There is no problem for the government to solve….The evidence of these continuing threats? There is none; it’s all anecdote, hypothesis, and hysteria.” Commissioner Ajit Pai, FCC Commissioner, fcc.gov

“Net Neutrality is unnecessary. It’s designed to solve problems that haven’t happened.” Talking Point.

 Let’s look at some “nonexistent” problems that have been reported by CNN:

  • Verizon blocked Google Wallet and PayPal phone applications. Presumably, it won’t block its own tap-to-pay product, Softcard.
  •  AT&T, Sprint,T-Mobile, and Verizon blocked or charged extra for tethering apps that make your mobile device a hotspot. Using Net neutrality reasoning, the FCC blocked these blocks.
  •  AT&T blocked FaceTime on Apple devices and Google Hangouts on Android devices.
  • Comcast throttled BitTorrent, legal as well as illegal content.

As FCC Commissioner Clyburn said, “This is more than a theoretical exercise. Providers here in the United States have, in fact, blocked applications on mobile devices, which not only hampers free expression, it also restricts…innovation by allowing companies, not the consumer to pick winners and losers.”

Bizarrely, anti-Net Neutrality FCC Commissioner Pai cites some of the above examples as “proof” that problems didn’t happened. He dismisses them as examples that are “picayune and stale.” I suspect that if he personally had been charged $20 a month for tethering a device, he would discover that one man’s “picayune” is another man’s “crime against humanity.”

 3. “The Obama Administration needs to get beyond its 1930s rotary-telephone mindset and embrace the future,” Senate Majority Leader Mitch McConnell, R-Ky, NPR.

“The FCC’s pro-Net Neutrality decision is based on 1934 law that was designed for outmoded technology.” Talking point pushed by ISPs.

In the first place, laws written for one technology are constantly being applied to newer ones. For example, the President couldn’t kick Rush Limbaugh off the air on the basis that “Freedom of the press” doesn’t apply to radio and television. Personally, I would love for Mitch McConnell to declare before the National Rifle Association that the Second Amendment was written for muskets and front-loading rifles, so it couldn’t possibly apply to modern weapons. Heck, I would pay money to see that speech.

[layerslider id=”31″]

However, the main problem with this talking point is that it is has a false premise.  The FCC Net Neutrally rulings weren’t just based on the 1934 law, but also the Telecommunications Act of 1996 and a 2010 court ruling, both of which specifically permit the recent FCC actions.

So, the people pushing this particular talking point are either lying or just plain stupid.  Hint: they’re not stupid.

 4) “Net neutrality has not been necessary to date. I don’t see any reason why it’s suddenly become important, when the Internet has functioned quite well for the past 15 years without it…Government attempts to regulate technology have been extraordinarily counterproductive in the past.” Peter Thiel, PayPal founder and Facebook  Wikipedia

“The Internet is not broken, and it got here without government regulation and probably in part because of lack of government regulation.” Max Levchin, PayPal co-founder. Wikipedia

“The Internet has thrived in the absence of net neutrality rules, thank you very much.”  Robert M. McDowell, a former FCC commissioner turned telecom lawyer in Washington, D.C. Wikipedia

The government created the Internet (Thank you DARPA). The Internet has always been regulated. If not for the early government oversight, we would have a byzantine patchwork of private internets that would be unable to communicate with each other. Furthermore, the FCC Net Neutrality rulings are not an attempt to impose new conditions, but are measures design to preserve the environment under which the Internet has prospered.

I’m not sure if the above quotes count as actual lies. People have very emotional beliefs about government regulations that cause them to say all sorts of strange things. Sort of like those folks who are fearful that the “Government is trying to take over Social Security!”

 5.“Net neutrality does not eliminate the Fast Lane. Lack of competition among the ISPs is the real problem.” Talking point.

Although this statement has been made to criticize the recent FCC rulings, it is actually true.

Fast Lanes currently exist. High end content and hosting providers add “nodes” to the “Backbone” of the Internet, i.e. they build hardware solutions to deliver their large volume of content. These types of Fast Lanes benefit everybody, because they increase the overall carrying capacity of the Internet. Net Neutrality bans the type of Fast Lane solutions in which the flow of content is artificially restricted.

Lack of competitions among ISPs is a real problem. For a more complete explanation of Fast Lanes and ISPs, see the excellent article by Robert McMillan in Wired.

6. “Net Neutrality advocates do not understand the Internet.” Talking point.

Among the people who testified in front of the FCC in favor of the Net Neutrality was Sir Tim Berners-Lee. Are we to assume that the man who designed the World Wide Web doesn’t understand the Internet? Another high profile supporter of Net Neutrality is Google.  They also do not understand the Internet?

What is especially annoying about this talking point (aside from the fact that it usually delivered in an arrogant, condescending manner) is that the more you know about the Internet, the more likely you are to be in favor of Net Neutrality.

The web designers, software engineers, IT guys, and all rest of the intellectual workers who support the Internet are a politically diverse bunch. However, they are united in their support of Net Neutrality.  It’s easy to see why.  Many have dreams of sitting in their garage or a dorm room, and building the next Facebook or Google. Without Net Neutrality, those dreams are ash.

7. “The recent FCC rulings open the door to taxing the Internet.” Talking Point.

This talking point is true. The FCC swears it won’t use this ruling to implement taxes, but more than a few people are suspicious of this promise.

This is a legitimate criticism of the ruling (unless you are in favor of taxing the Internet, but that’s another issue). Unlike most of the criticisms presented in this article, it actually informs the listener, rather than confuse them.

This is why I have deliberately chosen to use the inflammatory description of the other anti-Net Neutrality arguments as “lies.” These talking points are designed to deceive.

As has been pointed out by observers, ISPs often use very different arguments when addressing stockholders than the FCC. While they loudly complain of the economic hardship posed by these regulations, their stockholder letters are full of cheery optimism.

Even though I am in favor of Net Neutrality, I do think there are legitimate arguments to be made against it. Unfortunately, its opponents have chosen the route of propaganda, rather than education.

 8) Finally one last example:

“US Rep. Marsha Blackburn (R-TN) this week filed legislation she calls the ‘Internet Freedom Act’ to overturn the Federal Communications Commission’s new network neutrality rules.” Arstechnica.

Is the “Internet Freedom Act” an accurate name? What do you think?

 This post is the opinion solely of the author and does not reflect the positions of AMREL or its other employees. Comments can be mailed to editor@amrel.com (comments may be used in future postings).

[layerslider id=”31″]

Since AMREL customizes most of the products we sell, we pay pretty close attention to what our customers want. While we do not claim to be prophets, we have noticed certain trends when we discuss computing solutions with our clients. Here is what we think will be “The Next Big Things” for rugged computers.

Big displays/ Small form factors
We get a lot of inquires about the RF10, the only rugged laptop that has a 17” display. Same thing about our DK10 tablet that has a 12” display. Maybe it’s the popularity of mapping applications or maybe everyone is aging and getting poor eyesight. Whatever the reason, people want BIG screens.

At the same time, they want smaller form factors. People are using tablets for tasks that once required laptops, and are using handhelds for applications that once needed tablets. Please call us if you know how to put a 17” display on a smartphone.

ARM race
One key to the popularity of smaller from factors are ARM processors. While more limited in their ability to support full computer functions, they use less energy than traditional processors (such as Intel).

To get around the limitation of ARM processors, computing solutions have adopted “fat server/thin client” model. Computing functions are off-loaded to the cloud. You no longer need a powerful desktop computer to download your email. When your email is cloud based, a simple low powered smartphone can easily check it.

My smartphone, my trash
A consequence of the preference for ARM- based small form factors is that hardware is cheaper and more disposable. If your desktop computer is destroyed, you have not only lost an expensive piece of equipment, but also a lot of valuable data as well. If your smartphone gets trashed, it’s less expensive to replace, and your data lives on in the cloud.

Considering disposability is one of its main attractions, a smartphone that is also rugged may sound like a contradiction in terms. Even if it is relatively cheap to replace, a broken smartphone is still a time waster and a general pain in the rear end. So, we are getting many requests for durable handheld computers. In addition to the DB6, DF6 and our other established small platforms, we plan to soon launch a new line of super-tough handhelds.

[layerslider id=”31″]

Android rules, but mobile Windows is not dead yet
Android OS is clearly on the rise. Interestingly, this has not slowed down inquires to AMREL for Windows CE-based platforms. Institutions with legacy applications haven’t jumped on the Android bandwagon yet. While continuing to support mobile Windows OS, we plan to dramatically expand our Android offerings in the near future.

Attack of the super-thin computers
As you probably noticed, thin is in. Leaf through any computer magazine, and you will see ads boasting of their slim platforms. While this is primarily a phenomenon of consumer electronics, even the rarefied world of rugged platforms has been affected by “computer anorexia.”

Never one to pass up a good trend, AMREL offers:
• RS11 – With a 13” display, it’s the thinnest rugged laptop in the world
• DB6 – The super lightweight handheld
• RV11 – It is the thinnest rugged laptop with a 15” display on the market

This year we plan to offer a rugged tablet so thin you can cut cheese with it. Well, maybe not that thin, but still…

COTS, COTS, and more COTS
Classify this trend as “more of the same.” One of the biggest consumers of rugged platforms is the US Department of Defense (DOD). They have been COTS obsessed for years, and there is no sign of this mania letting up. COTS products are supposedly cheaper, have better supply lines, and the DOD doesn’t have to worry about keeping their production capabilities alive in times of low demand.

Of course the DOD still hasn’t lost its taste for highly specific requirements. This has led to the phenomena of “Customized COTS,” i.e. off-the-shelf products that can be easily modified. For almost 30 years, AMREL has pioneered “Customized COTS” and continues to be a leader in this field.

Quick & inexpensive prototyping
Incorporating end-user feedback for rugged solutions has always been problematic. With the pace of technological change rapidly accelerating and the increasing uncertainty surrounding possible future wars, adaptability has become ever more critical. Rugged solutions must be designed to be easily and inexpensively modifiable. Since customization is one of AMREL’s core capabilities, we feel very confident in meeting this challenge.

What do you think?
The above list is not be meant to be exhaustive, but just an informal collection of our impressions. What is your vision of the future of rugged computers? Send your thoughts to editor@amrel.com.

Learn more about AMREL’s offerings at computers.amrel.com

[layerslider id=”31″]

Recently, Chief of Staff Gen. Raymond T. Odierno gave a presentation to the Association of United States Army on “Force 2025 and Beyond.” If you want to know what the Army’s head honcho is planning for its future, check out this nifty PDF.

One thing that will definitely not change is the military’s fondness for acronyms. Reading Odierno’s presentation requires a high tolerance for initials as well as an instinctual knowledge about matters such as the difference between USAPRAC and USPACOM. After wandering through his dense forest of acronyms, I came away with the following impressions:

The Army doesn’t have a clue about the future. While it is true that he identifies possible threats, you don’t have to read between the lines too much to know that Odierno has no idea what kind of war the Army should prepare for. This is not a big surprise, and is something that this blog has discussed before (see here).

Odierno’s solution for this quandary?  Among other things, the Army needs “adaptability.”  I suggest you play a drinking game with a buddy. Download the PDF of Odierno’s presentation, and have your friend read it out loud. Every time he says “adapt” or “adaptability,” take a shot. You may want to start off with something light, because you’ll take 6 shots on the first page alone.

Doubling down on technology. Seeing a high-level bureaucrat reject common institutional wisdom is a bit like watching a magnificent sunrise. It has happened before and it will happen again. However, you should still pause and admire its beauty.

Odierno clearly feels like he is operating in a financial squeeze (in real terms, the Defense budget continues to rise). However, he is not following the usual institutional practice of cutting Research & Development in times of austerity. Odierno could have simply followed recent trends and simply off-loaded R&D responsibilities onto vendors, i.e. “I don’t know what we want, but I want you to build it.”

While the Army will use commercial suppliers, Odierno makes it clear that he is not abandoning R&D. In fact, technology and innovation is a big priority and he discusses it a great deal.

While I applaud Odierno’s not sacrificing R&D on the budget chopping block, I do wonder about the US military’s continued reliance on technology to give it an “edge” (or in Odierno-ese, “overmatch capabilities”), especially in counter-insurgency scenarios. Does it make sense to use million dollar missiles to destroy ancient pick-up trucks?

Most US military personnel in the Pacific region belong to the Army. Odierno makes a point of making this point. You know all those folks who say that the Pacific Tilt means cutting the Army’s budget, so that money can be diverted to the Air Force and Navy?  This is Odierno’s way of thumbing his nose at them.

80% of “rotorcraft” will be replaced.  Good time to be a helicopter manufacturer.

High Energy Laser Mobile Demonstrator (HEL MD) will reduce the need for stockpiles.  Yeah! We’re finally going to get ray guns!  Or at least “ray cannons.”

“Alternative sources of water.”  What has the Army learned after fighting for 13 years in an arid environment?  The importance of water.  I wouldn’t be surprised that out of all the technologies the military is currently developing that water purifications and generation end-up being the most world changing.

Healthcare & medicine.  More than a few areas of technological development that Odierno describes involved healthcare of some kind. Considering its skyrocketing cost, not a big surprise.

The future of unmanned systems is so last year. Odierno mentions Autonomous Aerial Resupply as a “potential capability.”  This is the only time he mentions unmanned systems.

I have been optimistic about the role of unmanned systems in US forces (see here). However, their relative absence from a technology-heavy discussion by the Army’s Chief of Staff does raise a red flag. Vendors of unmanned systems have visions of military robots doing everything from flipping burgers to fighting fires. If they want the Army to share that vision, they have some work to do.

“Sustaining investments in the technical workforce is paramount…However, sequestration could undermine these efforts.” Some congressmen have been vigilant in protecting soldiers form budget cuts. Not so much the military’s civilian workforce, which has been hammered by reduced funds. Odierno wants folks to understand that the guys who carry guns and wear camouflage are not the only ones who need protecting. The guys who carry calculators and wear white shirts are also important.

Odierno covers a lot of ground in his brief discussion. The above list is far from complete and only represents my overall impression. His presentation is worth reading in its entirety.

What do you think? What struck you about Odierno’s presentation?

Send your thoughts to: editor@amrel.com

[layerslider id=”31″]

For years, “Bring Your Own Device” (BYOD) has been a dependable staple of top tech trend lists.  Originally started by employees demanding to use their own devices for business purposes, companies realized that they could boost productivity and decrease costs by adopting BYOD.

Should your enterprise adopt BYOD? Below is a summary of the pros and cons.

(Click image to expand)BYOD 4

 

Employees are happy to pay employers’ costs

To a certain extent, BYOD is part of a larger trend of employers shifting costs to employees. Some cost-conscious companies have declared long-time workers to be independent contractors. Workers are not only stripped of benefits, but also forced to pay for their own equipment.

The irony is that BYOD is often demanded by employees. The increased cost to them is usually negligible (they have personal smartphones anyway), and they are saved the hassle of dealing with a separate business device.

The first response by enterprises to BYOD is often negative. IT hates the nightmare of supporting apps for multi-platform use. More importantly, employers worry about securing proprietary information on the employees’ personal devices, which is by far the number one objection to BYOD.

A pretty good example of this is the military. When soldiers started bringing their own devices into theater (even into combat), the military was initially appalled.  How could they possibly keep information secure on consumer devices?

While the security issue is still not resolved, the military is actively exploring BYOD.  For one thing, they see it as a way of leveraging the leading edge of consumer technology.

[layerslider id=”31″]

Work better by checking your personal email

Probably the single biggest benefit of BYOD is increased employee productivity.  Given the flexibility of choosing their own device, applications, and service plans, workers have been extremely innovative in increasing their efficiency. Another reason for increased productivity is that employees are more likely to work on business activities during their personal time if they can do so on their own devices. Counter-intuitively, according to an exhaustive international study by Cisco, performing personal tasks during business hours also increases employee productivity. Think about that the next time the boss yells at you for playing Clash of Clans.

BYOD = Mobility

It is no coincidence that BYOD emerged as smartphones and tablets conquered the world. Smartphones is the overwhelming device of choice for BYOD with tablets rapidly gaining ground.

Some enterprises have seen BYOD as an efficient way to “go mobile.” No longer anchored to the office, employees can work from home or on the road. Switching work activities from desktop to smartphones is also considered beneficial, because “smartphones are the wave of the future,” i.e. all the cool kids are doing it.

Indeed, mobile phone use is so closely tied to BYOD that their benefits have become blurred. People touting BYOD talk about the wonderfulness of networking employees as well as the importance of sharing and distributing information. When the negatives are discussed, increased use of corporate Wi-Fi is sometimes mentioned, a phenomena that would happen with business-issued smartphones as well.

Your mileage may vary

By any standard, BYOD has been successful. According to Cisco’s study, “….69 percent of IT decision makers (up to 88 percent in some countries) feel that BYOD is a positive development for their organization.”

You may read BYOD enthusiasts citing costs benefits of BYOD. Cisco’s report states that companies can save up to “$1,650 per mobile employee.” The problem with these claims is that benefits are far from uniform.

For one thing, local culture plays a big factor. I wasn’t surprise to learn, for example, that workers using BYOD in Germany had negligible productivity gains. This is just anecdotal evidence, but an inventive acquaintance of mine went nuts working in Germany. He performed every task efficiently, under budget, and before deadline, but his employers hated him.  In the US, employers tell workers to perform task X and will often let them decide how to do it. In fact, they will encourage them to come up with new ideas. In Germany, my friend was told to “perform task X by completing the following steps…” Despite the fact that he successfully did his job, his original approach upset his superiors.  If you live in a culture (or work in a company) that doesn’t value employee innovation, you are unlikely to benefit from BYOD.

Everybody is a winner! (Except for those who lose)

Some supporters will spout various numerous financial benefits of BYOD (“20 to 30% savings!”) without mentioning that these high numbers apply only to the small minority of companies that employ “comprehensive BYOD.” “Comprehensive BYOD” is a term used by Cisco to describe systematic preparation for enterprise-wide integration of BYOD. Unfortunately, it is far more common for enterprises to have a poorly thought-out ad hoc approach for BYOD adoption. See insert below for Cisco’s list of “comprehensive BYOD” capabilities.

(Click image to expand)

BYOD 2

[layerslider id=”31″]

Some of the items in the above list illustrate a serious drawback to BYOD. If an enterprise adopts the “comprehensive BYOD” approach, employees may object to the loss of privacy. It is one thing to have monitoring software on a company desktop, but it is another to concede even partial control of your personal smartphone to an employer.

In conversation on a social website, a BYOD supporter claimed that some of these problems can be avoided through cloud applications. Say you’re a company with a highly prized list of clients. Your salesmen want access to this list on their personal smartphones.  Fine you say, as long as you can remote wipe the data on their phones. After all, you don’t want them quitting and taking the list to a competitor.

However, your salesmen are uncomfortable with their employer having any kind of control whatsoever over their personal devices. A solution is posting the list on the cloud (many Customer Relationship Management apps are cloud-based anyway). This solution doesn’t completely eliminate the problem of “data walking out the door,” but it does allow salesman to access to sensitive information, without feeling that their boss is snooping around their phone.

Look before you BYOD

Before adopting BYOD, you need to examine your specific situation. If you operate in a medical environment, how will you address the rather-strict rules on patient privacy? If you want your students to use their own devices for homework, what precautions do you need to curtail cheating? The benefits of BYOD are real, but as with any innovation, you should think carefully before adopting.