Pentagon Testing Small Robot To Hunt Naval Mines

Types of naval mines: A-underwater, B-bottom, SS-submarine. 1-drifting mine, 2-drifting mine, 3-moored mine, 4-moored mine (short wire), 5-bottom mines, 

The US military has been looking for an underwater bomb disposal robot for years. It finally has one. 

Most of the machines developed to help navies hunt the stealthy underwater predators called mines require a big crew and a ship or helicopter, which is why the US military is excited about a two-person underwater robot that weighs less than 200 pounds.

The Saab Waterborne Anti-IED Security Platform, or SEA WASP, is a small remote-operated drone outfitted with an electric arm, sonar, and radar to collect information on where it is and what’s around it. A mine-hunting drone may not sound that advanced compared to space planes and autonomous swarming vessels, but it actually represents a real technological feat. The WASP weighs just 90 kilos, light enough to be carried to by two people. It’s hard to get a machine that light to stay in one place to probe for mines against underwater currents.

“One of the reasons we selected Saab,” said Ed Bundy, who works for the of Pentagon’s Combating Terrorism Technical Support Office, or CTTSO. “They were the only company that actually told us this was a really hard problem.”

The Navy’s explosive ordnance disposal, or EOD, community is particularly interested, said Bundy. “Low visibility is a problem wherever the Navy EOD guys work,” he said at the Navy League’s Sea Air Space conference.

SAAB began marketing the machine just after Christmas and so far has sold three to various government bodies in the United States but has seen “huge interest worldwide” according to Bert Johansson, Saab’s director of unmanned underwater vehicle systems.

Mines are a devilishly hard problem to solve. A 2002 study from the University of California, Berkeley, found that just a few mines could be an enormous problem for the United States, potentially bringing shipping to a halt and costing tens of billions in lost revenue. And of the 19 US warships heavily damaged or sunk by enemies since World War II, 15 were the victims of mines.

DefenseOne: http://http://bit.ly/1sIgEqa

« Edward Snowden JoinsWith Jean Michel Jarre To Make Music About Cybersecurity
Iraq Shuts Internet During School Hours »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Fortinet

Fortinet

Fortinet is a provider of network security systems. Our products provide protection against dynamic security threats while simplifying the IT security infrastructure.

Global Station for Big Data & Cybersecurity (GSB)

Global Station for Big Data & Cybersecurity (GSB)

GSB is an interdisciplinary research hub to cover big data, information networks, and cybersecurity.

FedRAMP

FedRAMP

FedRAMP, is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.

Stealthbits Technologies

Stealthbits Technologies

Stealthbits Technologies is a cybersecurity software company focused on protecting an organization's sensitive data and the credentials attackers use to steal that data.

CyberGuarded

CyberGuarded

CyberGuarded are an accredited vendor independent information security testing and auditing company.

Repulsa

Repulsa

Repulsa provides state-of-the-art, patented, fast filtering with over 700 million malicious IP addresses and over 30 million categorized site listings updated daily.

Smart Protection

Smart Protection

Smart Protection are experts in brand and trademark protection - we fight against counterfeits and unauthorized usages of brands with machine learning technology.

ShorePoint

ShorePoint

ShorePoint is an elite cybersecurity firm dedicated to improving the cyber resilience of Federal agencies and their missions.

Spamhaus

Spamhaus

Spamhaus is the world leader in supplying realtime highly accurate threat intelligence to the Internet's major networks.

Control System Cyber Security Association International (CS2AI)

Control System Cyber Security Association International (CS2AI)

CS2AI is the premier global not for profit workforce development organization supporting professionals of all levels charged with securing control systems.

Trava Security

Trava Security

Trava simplifies cyber risk management for business owners and IT professionals. Automated assessments, mitigation advising, and data-driven cyber insurance.

Asimily

Asimily

Asimily’s IoMT risk remediation platform holistically secures the mission-critical healthcare devices that deliver safe and reliable care.

Clarabot Nano

Clarabot Nano

Nano is the secure file sharing tool to improve content search, data access and collaboration between multiple parties.

Tidelift

Tidelift

Tidelift provides the tools, data, and strategies that help organizations assess risk and improve the health, security, and resilience of the open source used in their applications.

Smartcomply

Smartcomply

Smartcomply is an automated and AI-powered cybersecurity and compliance platform that aids businesses in reducing the time and money spent on cybersecurity and compliance.

XY Cyber

XY Cyber

XY Cyber enable Generative AI for Cyber Operations. We simplify the complex world of cyber threats into actionable strategies, empowering your defense with AI-powered solutions.