Pentagon Testing Small Robot To Hunt Naval Mines

Types of naval mines: A-underwater, B-bottom, SS-submarine. 1-drifting mine, 2-drifting mine, 3-moored mine, 4-moored mine (short wire), 5-bottom mines, 

The US military has been looking for an underwater bomb disposal robot for years. It finally has one. 

Most of the machines developed to help navies hunt the stealthy underwater predators called mines require a big crew and a ship or helicopter, which is why the US military is excited about a two-person underwater robot that weighs less than 200 pounds.

The Saab Waterborne Anti-IED Security Platform, or SEA WASP, is a small remote-operated drone outfitted with an electric arm, sonar, and radar to collect information on where it is and what’s around it. A mine-hunting drone may not sound that advanced compared to space planes and autonomous swarming vessels, but it actually represents a real technological feat. The WASP weighs just 90 kilos, light enough to be carried to by two people. It’s hard to get a machine that light to stay in one place to probe for mines against underwater currents.

“One of the reasons we selected Saab,” said Ed Bundy, who works for the of Pentagon’s Combating Terrorism Technical Support Office, or CTTSO. “They were the only company that actually told us this was a really hard problem.”

The Navy’s explosive ordnance disposal, or EOD, community is particularly interested, said Bundy. “Low visibility is a problem wherever the Navy EOD guys work,” he said at the Navy League’s Sea Air Space conference.

SAAB began marketing the machine just after Christmas and so far has sold three to various government bodies in the United States but has seen “huge interest worldwide” according to Bert Johansson, Saab’s director of unmanned underwater vehicle systems.

Mines are a devilishly hard problem to solve. A 2002 study from the University of California, Berkeley, found that just a few mines could be an enormous problem for the United States, potentially bringing shipping to a halt and costing tens of billions in lost revenue. And of the 19 US warships heavily damaged or sunk by enemies since World War II, 15 were the victims of mines.

DefenseOne: http://http://bit.ly/1sIgEqa

« Edward Snowden JoinsWith Jean Michel Jarre To Make Music About Cybersecurity
Iraq Shuts Internet During School Hours »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

HANDD Business Solutions

HANDD Business Solutions

HANDD are independent specialists in data protection with expertise at every stage of the Protect, Detect and Respond cycle, from consultancy and design, right through to installation.

Advenica

Advenica

Advenica develops, manufactures and sells innovative cybersecurity solutions for encryption and secure information exchange.

Korea Internet & Security Agency (KISA)

Korea Internet & Security Agency (KISA)

KISA is committed to improving the competitiveness, reliability and security of Internet information and knowledge in Korea.

Smarttech247

Smarttech247

Smarttech247 deliver a range of cyber security solutions, including cognitive security services using IBM Watson for Cybersecurity, SIEM, Compliance & Governance, and Penetration Testing.

ACM-CCAS

ACM-CCAS

ACM is a UKAS-accredited certification body helping businesses around the world perform to a higher standard. Our certifications include ISO 27001 and ISO 22301.

Estio Training

Estio Training

Estio Training is a specialist digital and IT apprenticeships provider, dedicated to introducing new skills and developing existing talent in businesses across the UK.

YesWeHack

YesWeHack

YesWeHack offers companies an innovative approach to cybersecurity with Bug Bounty (pay-per-vulnerability discovered) to identify and report vulnerabilities in their systems.

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance is a global, non-profit industry association which is working to enable a secure connected future.

Adarma Security

Adarma Security

Adarma are specialists in threat management including SOC design, build & operation.

Artifice Security

Artifice Security

Artifice Security will demonstrate real-world attacks on your network, web applications, infrastructure, and personnel to expose your hidden security risks.

Incyber

Incyber

Incyber is a fully integrated network and cybersecurity solutions provider contracted to safeguard public and private enterprise, high value data and sensitive industries.

DataStealth

DataStealth

DataStealth is a data protection platform that allows organizations to discover, classify, and protect their most sensitive data and documents.

ABPSecurite

ABPSecurite

ABPSecurite is a leading value-added distributor and a network performance solutions provider.

RST Cloud

RST Cloud

RST Cloud is a cutting-edge technology company that specialises in threat intelligence solutions for businesses of all sizes.

Anagram

Anagram

Anagram is the world’s first human-driven security awareness training platform that delivers real results.

Koop

Koop

Koop’s trust management platform helps navigate the complexities of regulatory compliance, security reviews, and liability insurance in a single place.