A Marine radio operator using a Varjo XR-3 mixed reality headset during 1st ANGLICO certification exercise, January 2023 (Image source: DVIDS)
In a time when technology is central to military operations, ensuring the security of advanced innovations is paramount—and the Defense Advanced Research Projects Agency (DARPA) has long recognized this need and has recently launched the Intrinsic Cognitive Security (ICS) program.
This groundbreaking initiative focuses on improving the security of US military mixed reality (MR) solutions against cognitive exploits, thus ensuring the safety and effectiveness of military personnel operating in the virtual domain.
Cognitive Exploits: Unmasking the Threat
Cognitive exploits, in the context of military mixed reality, are digital assaults that target the connection between users and their virtual equipment. These diverse exploits can have severe consequences, affecting the performance, well-being, and trust of military personnel in MR platforms.
1 | Real-World Object Planting. This tactic involves planting real-world objects in the virtual environment, cluttering the projected displays, and creating user confusion. It can also lead to false alarms and distract military personnel.
2 | Information Flooding. Overwhelming users with excessive information can induce motion sickness and reduce the effectiveness of MR systems. It can make military personnel physically ill and unable to perform their duties effectively.
3 | Adding Virtual Data for Distraction. Injecting virtual data that distracts users from critical information and tasks can compromise the success of military missions. It can cause anxiety and reduce trust in MR platforms.
The Effects of Cognitive Exploits
The consequences of cognitive exploits are far-reaching and can significantly impact military operations. Some of these effects include:
In a time when technology is central to military operations, ensuring the security of advanced innovations is paramount—and the Defense Advanced Research Projects Agency (DARPA) has long recognized this need and has recently launched the Intrinsic Cognitive Security (ICS) program.
This groundbreaking initiative focuses on improving the security of US military mixed reality (MR) solutions against cognitive exploits, thus ensuring the safety and effectiveness of military personnel operating in the virtual domain.
Cognitive Exploits: Unmasking the Threat
Cognitive exploits, in the context of military mixed reality, are digital assaults that target the connection between users and their virtual equipment. These diverse exploits can have severe consequences, affecting the performance, well-being, and trust of military personnel in MR platforms.
1 | Real-World Object Planting. This tactic involves planting real-world objects in the virtual environment, cluttering the projected displays, and creating user confusion. It can also lead to false alarms and distract military personnel.
2 | Information Flooding. Overwhelming users with excessive information can induce motion sickness and reduce the effectiveness of MR systems. It can make military personnel physically ill and unable to perform their duties effectively.
3 | Adding Virtual Data for Distraction. Injecting virtual data that distracts users from critical information and tasks can compromise the success of military missions. It can cause anxiety and reduce trust in MR platforms.
The Effects of Cognitive Exploits
The consequences of cognitive exploits are far-reaching and can significantly impact military operations. Some of these effects include:
1 | Cybersickness. Cognitive exploits can lead to cybersickness, a condition akin to motion sickness, which can incapacitate military personnel operating MR systems.
2 | Emotional Manipulation. Manipulating the virtual environment can induce emotional responses, which may not be conducive to effective decision-making in critical situations.
3 | Anxiety. Cognitive exploits can create anxiety among users, leading to a less stable and effective working environment.
4 | Reduced Trust in MR Platforms. When cognitive exploits are successful, military personnel may begin to doubt the reliability of MR platforms, which can have a cascading effect on their ability to execute tasks.
Intrinsic Cognitive Security (ICS) Program: A Solution
Recognizing the critical need to address cognitive exploits, DARPA initiated the Intrinsic Cognitive Security (ICS) program. This program aims to research and test mathematical approaches, often referred to as “formal methods,” to produce solutions that can secure MR system designs against cognitive attacks.
The primary goals of the ICS program are to:
1 | Mitigate Potential Threats. ICS seeks to identify and mitigate potential threats to military personnel operating in the virtual domain.
2 | Research Formal Methods. The program explores the use of formal methods, which rely on rigorous mathematical development practices, to enhance the security of MR systems.
3 | Smooth Operation. By improving the security of MR systems, ICS ensures that these technologies operate smoothly and effectively in military missions.
Dr. Matthew Wilding, the ICS Program Manager at DARPA, highlights the importance of this initiative.
“We need to develop methods to protect mixed reality systems before systems lacking protections are pervasive,” Dr. Wilding explained. “This program will show how to protect personnel using rigorous, math-based development practices that enable MR adoption plans in [Department of Defense] organizations.”
Studying User Behaviors for Greater Understanding
To create effective security solutions, the ICS program will study user behaviors within the immersive MR setup and will contribute to formalizing data on how people behave in such environments.
By understanding user behaviors, the program can develop security measures tailored to military personnel’s needs and vulnerabilities.
Dr. Wilding emphasizes that ICS is not limited to a single MR system.
Instead, proposers will work with various commercial technologies that perform different MR-related tasks, ensuring the program’s findings and solutions are applied across a wide spectrum of MR applications.
The Two-Phase Approach
The ICS program will run for three years and consists of two phases:
Phase 1 | Proven Solutions and Supporting Models
In the initial phase, the program will focus on fabricating proven solutions and developing models that further our understanding of desirable properties for MR systems.
This phase sets the foundation for creating effective security measures.
Phase 2 | Prototype Development
The second phase builds on the results from the first phase. It aims to validate the utility of these solutions in MR systems. Developers will have to create prototypes using commercially available hardware and software to test the effectiveness of these solutions in reducing vulnerabilities to cognitive exploits.
~
DARPA’s Intrinsic Cognitive Security (ICS) program represents a significant step in enhancing the security of military mixed reality (MR) solutions. By addressing the threats posed by cognitive exploits, this program ensures the safety and effectiveness of military personnel operating in the virtual domain.
As technology continues to play a pivotal role in military operations, initiatives like ICS become paramount to national security. They allow the military to leverage MR capabilities with confidence and resilience against digital threats.
As someone who’s seen what happens when the truth is distorted, I know how unfair it feels when those who’ve sacrificed the most lose their voice. At SOFREP, our veteran journalists, who once fought for freedom, now fight to bring you unfiltered, real-world intel. But without your support, we risk losing this vital source of truth. By subscribing, you’re not just leveling the playing field—you’re standing with those who’ve already given so much, ensuring they continue to serve by delivering stories that matter. Every subscription means we can hire more veterans and keep their hard-earned knowledge in the fight. Don’t let their voices be silenced. Please consider subscribing now.
One team, one fight,
Brandon Webb former Navy SEAL, Bestselling Author and Editor-in-Chief
Barrett is the world leader in long-range, large-caliber, precision rifle design and manufacturing. Barrett products are used by civilians, sport shooters, law enforcement agencies, the United States military, and more than 75 State Department-approved countries around the world.
PO Box 1077 MURFREESBORO, Tennessee 37133 United States
Scrubba Wash Bag
Our ultra-portable washing machine makes your journey easier. This convenient, pocket-sized travel companion allows you to travel lighter while helping you save money, time and water.
Our roots in shooting sports started off back in 1996 with our founder and CEO, Josh Ungier. His love of airguns took hold of our company from day one and we became the first e-commerce retailer dedicated to airguns, optics, ammo, and accessories. Over the next 25 years, customers turned to us for our unmatched product selection, great advice, education, and continued support of the sport and airgun industry.
COMMENTS
There are
on this article.
You must become a subscriber or login to view or post comments on this article.