Technology Development Projects

Electromagnetic Shield from Handheld Flashlight-sized Device

This technology pertains to an electromagnetic shield that emits a force field in front of a police officer or military officer from a flashlight-sized handheld device. It works by altering the electromagnetic field in front of the officer, so that bullets and other metallic objects bounce off it in the opposite direction. This could be made by the use of anti-matter or dark matter emissions technology, that alters the electromagnetic field emitted from the flashlight-sized device.

Weapons Systems Biometrics and Safety Controls

This technology pertains to the implementation of biometric security and safety controls on weapons, such as guns, rocket launchers, etc. where there could be a system that emits an electrical shock to anyone that tries to use the weapons system without being authorized by the biometric control systems. This would prevent a police officer’s weapon being taken by a criminal and being used against them. The same would be true on the battlefield, where weapons could be programmed to only operate for friendly forces, so there would be an authorization system that all of the weapons would use to authorize legitimate users of those weapons, and it would be capable of operating in an electronic denial area, such as where there are electronics that block the wireless signals of all electronics. The systems would also be protected from EMP damage, so that if an EMP shockwave was emitted, the weapons systems would still operate.

Government Vehicle Biometric Control Systems

This technology pertains to a system that would be implemented in military equipment, which would require strict methods of biometric authorization to command any use of heavy equipment, such as rocket launchers, tanks, hum-vees, artillery, and other types of heavy vehicles or weapons systems. This system was developed due to the Islamic State (ISIS) taking former U.S. military equipment from the Iraqi government after the U.S. mostly left the region. This system would require that the systems be authorized to specific users, and that a chain of command would need to be initialized to switch drivers and operators of the equipment, such as from the Pentagon using encrypted satellites. The systems would be incorporated into the entire computer systems of the devices, so that it would be impossible for anyone to use the systems without specific authorization. The systems could also limit the use of the systems technology, such as limiting the capability to fire weapons, or to drive at certain times of the day or night. The mechanical devices would not be able to work without the computer systems, thus rendering the vehicle or weapons system unusable without the proper authorization, which is so complicated that it can’t be hacked. There would essentially be no way to rig the systems to operate without specific authorization from the host government. There could even be failsafe systems that require on-going authorization delegation from the original host country, such as from the U.S., and that to the present host country, be it Iraq, so that even if the country was overthrown, the technology could not be used without specific authorization from the original host country. The authorization systems could also be used to operate the equipment remotely, such as driving and targeting from a remote location. Artillery systems would be able to be moved by the host nation, and reload automatically using a loading vehicle. The system would also have short-range weapons systems that can be controlled remotely, such that the systems could be controlled by the U.S. even if the soldiers inside the vehicle or near the weapons system were injured – so that the systems would be able to protect them from enemy fire.

Battlefield Human Asset Sensor

This invention concept pertains to the use of multiple types of sensors, like a wristwatch device, or technology that is integrated in the clothing that a human asset wears on the battlefield, that monitors vitals and determines based on biometric signatures whether the human asset is the same human asset that was identified and customized for the clothing and/or wristwatch device. The technology does this because it needs to be able to identify if an enemy combatant has killed a friendly human asset and taken its clothing or wristwatch device to attempt to cover incoming fire from our multiple types of battlefield targeting systems – such as by air, by sea, and by ground. These sensors would also allow friendly human assets to be protected by the targeting systems, which would be able to identify enemy combatants versus friendly human assets, and eliminate the enemy combatants in various modes of firing, such as automatic targeting, enemy fires first, or even protect a foreign asset, such as when a high-value target is identified on the battlefield and must be captured. The automatic targeting systems could for an example be set only to wound, not to kill enemy combatants, or the targeting could be based on what types of weapons they are using, or how close they are to friendly human assets, or any number of other variables. The key is that the battlefield human asset sensor is secure, in the sense that it cannot be used by an enemy, or taken under duress, to give the enemy an advantage on the digital battlefield, which may be accompanied by robotics, aeronautics, and submersibles or other sea-based vehicles or weapons systems. The identification of friendly assets allows the digital battlefield and its devices to maintain security over its friendly forces, and the systems should be protected from a high degree of signals interference, as would be expected on a highly contested digital battlefield.

Third Offset Strategy

  • Autonomous “deep learning” machines and systems

    • Systems to categorize and track all personnel and assets, foreign and domestic, on a battlefield.

    • Artificial intelligence to run communications including artificial telepathy, and command & control.

  • Human-machine collaboration

    • BCIs

    • Artificial Telepathy

  • Assisted-human operations, or ways machines can make the human operate more effectively

    • Exo-skeleton systems

  • Advanced human-machine teaming, where a human is working with an unmanned system and semi-autonomous weapons that are hardened to operate in an electronic warfare environment.

    • Weapons that automatically select targets based on attributes identified in the battlefield, such as clothing, facial recognition, information pertaining to what the potential threat has with them

© Copyright MCE123 (SM) 1999-2018, All Rights Reserved.

Privacy Policy | Contact Us Protection Status