Pentagon Testing Small Robot To Hunt Naval Mines

Types of naval mines: A-underwater, B-bottom, SS-submarine. 1-drifting mine, 2-drifting mine, 3-moored mine, 4-moored mine (short wire), 5-bottom mines, 

The US military has been looking for an underwater bomb disposal robot for years. It finally has one. 

Most of the machines developed to help navies hunt the stealthy underwater predators called mines require a big crew and a ship or helicopter, which is why the US military is excited about a two-person underwater robot that weighs less than 200 pounds.

The Saab Waterborne Anti-IED Security Platform, or SEA WASP, is a small remote-operated drone outfitted with an electric arm, sonar, and radar to collect information on where it is and what’s around it. A mine-hunting drone may not sound that advanced compared to space planes and autonomous swarming vessels, but it actually represents a real technological feat. The WASP weighs just 90 kilos, light enough to be carried to by two people. It’s hard to get a machine that light to stay in one place to probe for mines against underwater currents.

“One of the reasons we selected Saab,” said Ed Bundy, who works for the of Pentagon’s Combating Terrorism Technical Support Office, or CTTSO. “They were the only company that actually told us this was a really hard problem.”

The Navy’s explosive ordnance disposal, or EOD, community is particularly interested, said Bundy. “Low visibility is a problem wherever the Navy EOD guys work,” he said at the Navy League’s Sea Air Space conference.

SAAB began marketing the machine just after Christmas and so far has sold three to various government bodies in the United States but has seen “huge interest worldwide” according to Bert Johansson, Saab’s director of unmanned underwater vehicle systems.

Mines are a devilishly hard problem to solve. A 2002 study from the University of California, Berkeley, found that just a few mines could be an enormous problem for the United States, potentially bringing shipping to a halt and costing tens of billions in lost revenue. And of the 19 US warships heavily damaged or sunk by enemies since World War II, 15 were the victims of mines.

DefenseOne: http://http://bit.ly/1sIgEqa

« Edward Snowden JoinsWith Jean Michel Jarre To Make Music About Cybersecurity
Iraq Shuts Internet During School Hours »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ReadWrite

ReadWrite

ReadWrite is a leading media platform dedicated to IoT and the Connected World.

Emerson Electric Co

Emerson Electric Co

Emerson provides industrial automation systems and associated cybersecurity solutions to protect critical process control systems from cyber attack.

TruSTAR Technology

TruSTAR Technology

TruSTAR is a threat intelligence exchange platform built to protect and incentivize information sharing.

DMARC360

DMARC360

DMARC360 analyzes your email traffic patterns and sources, rapidly deploys email authentication protocols and monitors your email domains with automated recommendations and incident response.

SecondWrite

SecondWrite

SecondWrite’s next-generation malware detection engine delivers a combination of automatic deep code inspection and accurate scoring of zero-day malware.

SecureWorx

SecureWorx

SecureWorx are a secure multi-cloud MSP, a provider of advanced IT security services and an independent cyber security advisory.

Carson McDowell

Carson McDowell

Carson McDowell are one of Northern Ireland's leading law firms. We are the law firm of choice for many of Northern Ireland's Top 100 companies as well as international companies doing business here.

Stairwell

Stairwell

Stairwell is building a new approach to cybersecurity around a vision that all security teams should be able to determine what’s good, what’s bad, and why.

CyberPeace Foundation

CyberPeace Foundation

CPF is a think tank of cybersecurity and policy experts with the vision of pioneering Cyber Peace Initiatives to build collective resiliency against CyberCrimes and global threats of cyber warfare.

GitProtect.io

GitProtect.io

​GitProtect is a fully manageable, professional GitHub and Bitbucket backup and recovery software that protects repositories and metadata from any event of failure.

IGI Cybersecurity

IGI Cybersecurity

IGI Cybersecurity delivers people-driven cybersecurity for personalized, resilient cyber defense focused on individualized strategy and unshakeable partnership.

Cranium

Cranium

AI is being implemented into every business process, but nobody knows whether their AI is secure. Our mission is to deliver security and trust to the AI revolution.

Global Resilience Federation (GRF)

Global Resilience Federation (GRF)

GRF builds, develops and connects security information sharing communities for mutual defense.

BJSS

BJSS

BJSS is an award-winning technology and engineering consultancy for business.

Relyance AI

Relyance AI

Relyance AI - One unified platform for privacy, security, & governance.

St Fox

St Fox

St. Fox is a leading consultancy helping enterprises secure their Cloud, Data, endpoints, and applications.