Pentagon Testing Small Robot To Hunt Naval Mines

Types of naval mines: A-underwater, B-bottom, SS-submarine. 1-drifting mine, 2-drifting mine, 3-moored mine, 4-moored mine (short wire), 5-bottom mines, 

The US military has been looking for an underwater bomb disposal robot for years. It finally has one. 

Most of the machines developed to help navies hunt the stealthy underwater predators called mines require a big crew and a ship or helicopter, which is why the US military is excited about a two-person underwater robot that weighs less than 200 pounds.

The Saab Waterborne Anti-IED Security Platform, or SEA WASP, is a small remote-operated drone outfitted with an electric arm, sonar, and radar to collect information on where it is and what’s around it. A mine-hunting drone may not sound that advanced compared to space planes and autonomous swarming vessels, but it actually represents a real technological feat. The WASP weighs just 90 kilos, light enough to be carried to by two people. It’s hard to get a machine that light to stay in one place to probe for mines against underwater currents.

“One of the reasons we selected Saab,” said Ed Bundy, who works for the of Pentagon’s Combating Terrorism Technical Support Office, or CTTSO. “They were the only company that actually told us this was a really hard problem.”

The Navy’s explosive ordnance disposal, or EOD, community is particularly interested, said Bundy. “Low visibility is a problem wherever the Navy EOD guys work,” he said at the Navy League’s Sea Air Space conference.

SAAB began marketing the machine just after Christmas and so far has sold three to various government bodies in the United States but has seen “huge interest worldwide” according to Bert Johansson, Saab’s director of unmanned underwater vehicle systems.

Mines are a devilishly hard problem to solve. A 2002 study from the University of California, Berkeley, found that just a few mines could be an enormous problem for the United States, potentially bringing shipping to a halt and costing tens of billions in lost revenue. And of the 19 US warships heavily damaged or sunk by enemies since World War II, 15 were the victims of mines.

DefenseOne: http://http://bit.ly/1sIgEqa

« Edward Snowden JoinsWith Jean Michel Jarre To Make Music About Cybersecurity
Iraq Shuts Internet During School Hours »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Redcentric

Redcentric

Redcentric is a leading UK IT managed services provider. We deliver managed IT, cloud computing, data backup, information security services and managed networks.

MaxMind

MaxMind

MaxMind is an industry-leading provider of IP intelligence and online fraud detection tools.

National Cyber Security Centre (NCSC) - Netherlands

National Cyber Security Centre (NCSC) - Netherlands

NCSC Netherlands coordinates enhancing the cyber resilience of the Netherlands in the digital domain.

CommuniTake

CommuniTake

CommuniTake builds security, enablement, and management solutions to provide people and organizations with better, and more secure mobile device use.

iONLINE

iONLINE

iONLINE delivers high quality IT services and solutions to businesses in Azerbaijan.

Hysolate

Hysolate

Hysolate has transformed the endpoint, making it the secure and productive environment it was meant to be.

Phosphorous Cybersecurity

Phosphorous Cybersecurity

Phosphorus has fully automated remediation of the two biggest IoT vulnerabilities, out of date firmware and default credentials.

Industrial Cybersecurity Center (CCI)

Industrial Cybersecurity Center (CCI)

CCI is the first center of its kind that comes from industry without subsidies, independent and non-profit, to promote and contribute to the improvement of Industrial Cybersecurity.

Elevate Security

Elevate Security

Elevate is the leading Security Behavior Platform, changing employee security habits while giving security teams unprecedented visibility.

NetApp Excellerator

NetApp Excellerator

NetApp Excellerator is NetApp’s global start-up program that aims to fuel innovation by partnering with deep-tech start-ups.

Hadrian

Hadrian

Hadrian is modernizing offensive security practices with automation, making them faster and more scalable. Equipped with the hacker’s perspective, companies can now know what their critical risks are.

CyberGate Technologies

CyberGate Technologies

CyberGate Technologies is a world-class, customer focus cyber security service and consultancy company operating the UK, Europe, Middle East, and Africa.

Chestnut Hill Technologies (CHT)

Chestnut Hill Technologies (CHT)

CHT provide Best Practices IT Cybersecurity and Technology Solutions and Consulting Support to the Mid Cap through Fortune 1000 Nationwide.

Infinavate

Infinavate

Infinavate Fort CyberVault offers end-to-end services that comprehensively responds to the organization’s information security and privacy needs.

Cyber Security Global

Cyber Security Global

Cyber Security Global is a leader in electronic security, consultancy, technology, cybersecurity solutions, training, and specialized products.

Vorlon

Vorlon

Vorlon's agentless patent-pending solution facilitates risk profiling of apps, and provides AI-driven behavioral analytics with response recommendations.