Team Magneto

H4D

Georgetown University

 

Side Stepping Physics to Identify Electromagnetic Spectrum Jamming Threats

 
Magneto Pitch Deck Final Cover.jpg
 

The Team

Screen Shot 2020-08-04 at 10.38.39 AM.png

Cindy Martinez

• Former Policy Analyst at the Department of Homeland Security, advising senior government officials on military cyber operations and space security issues
• BA in Cybersecurity and Marketing from California State University, San Bernardino
• MA Candidate for Security Studies from Georgetown University

Screen+Shot+2020-08-04+at+10.38.51+AM.jpg

Mack von Mehren

• Associate at Pallas Advisors, advising cutting-edge tech companies on navigating the national security ecosystem
• Former Marine Corps Infantry Officer
• BA in History and Leadership Studies from Williams College
• MA Candidate for Security Studies from Georgetown University

noun_User_23409 (1).png

Nick Edwards

• Active Duty Army Officer with 10 years experience
• Deployed to Iraq in 2011 and Afghanistan in 2012
• BA in Political Science from Penn State University
• MS in Foreign Service from Georgetown University

 

Problem Sponsor

Electromagnetic Spectrum Operations Cross Functional Team, OSD

Original Problem Statement

Infantry units and radio operators need a way to practice identifying and responding to electromagnetic spectrum jamming in order to remain effective in communication-compromised environments.

Beneficiary Discovery Interviews

61

 

The Innovation

Initially, Team Magneto viewed this issue as a policy problem and sought to create a more efficient approval process for jamming training. The team believed that by reducing this lengthy process, there would be more opportunities for more jamming training to occur within the Electromagnetic Spectrum Operations Cross Functional Team.

However, the team soon realized that the bureaucracy was too dense to focus their efforts on solving that issue. One beneficiary stated: “It would take an act of God to do what you’re asking.” Informed by the course’s basis in the Lean LaunchPad methodology, the group decided to pivot. 

Screen Shot 2020-08-03 at 3.28.36 PM.png

After going back to the drawing board to find a solution, the team had a breakthrough: they realized that training could continue if they are able to simulate jamming, rather than actually jamming equipment. With this pivot, they are able to entirely sidestep the lengthy approval process for jamming and could provide Soldiers and Marines with exposure to jamming through training. 

With this new direction, the team produced the “In-Line Jamming Simulator” which completely removed the EMS physics within typical jamming training. The problem sponsors and beneficiaries are eager about this innovation, with one beneficiary stating: “I want it, when can I get it?”

With the strong interest in their solution, the team will continue to work on this project beyond the end of the semester and are currently working to create 10 - 20 prototypes of the In-Line Jamming Simulator to get the product in the hands of end-users for further feedback. Team Magneto is a Common Mission Project Impact Fund recipient, which will support their work in developing a prototype. Additionally, they are pursuing several other funding opportunities to continue to develop their product.

 
 

Presentation

 

Team Magneto’s
Hacking for Defense Experience

 

Team Magneto’s Mack Von Mehren heard about Hacking for Defense long before logging into his course registration portal at Georgetown University. During his 2017-2018 deployment to Korea with his Marine Battalion he was asked to identify problems he was facing in the field that could be addressed by undergraduate and graduate Hacking for Defense students.

After identifying the problems within his own unit to be solved by university students, when he became a graduate student himself, he was enthusiastic about taking the course himself and to work toward solving problems faced by soldiers in the field. 

Mack Von Mehren emphasized the course’s value for both problem sponsors and for students taking the course, which allows them to “Be a ‘do-er’ before (they) have actually graduated.”

Nick Edwards, MSFS graduate stated this course “was the most rewarding class I took at Georgetown.” The entire team stated the course was an incredibly challenging and rewarding experience. They look forward to pursuing their solution beyond the course.

 
Previous
Previous

Team Post-Quantum Cryptography

Next
Next

Team GroundWatch