Risk
4/5/2011
05:07 PM
50%
50%

DARPA Asks Gamers To Test Submarine-Tracking Simulator

The Navy will eventually use the software, but its available now in the Dangerous Waters computer game as well as a free online download.


Slideshow: Next Generation Defense Technologies
(click for larger image and for full slideshow)
The Department of Defense (DOD) has developed simulation technology to help the Navy track enemy submarines that it's testing through integration into commercial computer-gaming software.

The Defense Advanced Research Project Arm's Anti-Submarine Warfare (ASW) Continuous Trail Unmanned Vessel (ACTUV) software simulates evasive maneuvers by submarines and challenges players to successfully track them. It's been developed by the agency as a precursor to actually adding autonomous software for tracking submarines to the ACTUV program's computers, according to the agency.

To reach a broad number of users for the test, DARPA has integrated it into the Dangerous Waters computer game by Sonalysts Combat Simulations. The ACTUV Tactics Simulator also is available online as a free download.

More and more DARPA is seeking input from the public on the technology it's developing. Last month, the agency crowdsourced the design of next-generation combat vehicles through a project called the eXperimental Crowd-derived Combat-support Vehicle (XC2V) Design Challenge.

In fact, for more than a year now, DARPA has been experimenting with the Web, social networking, and online competitions as a part of its approach to R&D. One of the earliest moves of this effort was the DARPA Network Challenge in December 2009, which the agency used to explore how people can use social networking and the Internet to solve broad, time-critical challenges.

DARPA has designed the ACTUV software to put players into situations that are as similar as possible to real warfare, it said. They control a tracking vessel that must share the sea with commercial shipping traffic as it attempts to track a submarine practicing realistic evasive maneuvers.

Players can earn points by achieving mission objectives, and DARPA is keeping track of the competition on a website showing game leaders. People also can share experiences and advice about the simulator with other players on the site.

Once sufficiently tested, the Navy eventually plans to add the new software to its ASW toolkit, according to DARPA.

The U.S. military is increasingly exploring its options to use advanced technologies like computer simulation and 3-D to improve both its warfare tactics and peacekeeping operations.

DARPA recently unveiled 3-D holographic technology to assist military leaders in battle planning and design that Army and Air Force research centers will be testing.

The five-year Urban Phototonic Sandtable Display (UPSD) program created a real-time, 360-degree, 3-D holographic display to help military commanders and mission planners better visualize and plan battles.

In addition to work being done at DARPA, the Army is developing an entire Second Life-like virtual world to simulate some of its peacekeeping operations and act as a training ground for soldiers. The complex architecture is meant to support thousands of avatars and Internet connections at once.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0999
Published: 2015-06-02
Sendio before 7.2.4 includes the session identifier in URLs in emails, which allows remote attackers to obtain sensitive information and hijack sessions by reading the jsessionid parameter in the Referrer HTTP header.

CVE-2014-8391
Published: 2015-06-02
The Web interface in Sendio before 7.2.4 does not properly handle sessions, which allows remote authenticated users to obtain sensitive information from other users' sessions via a large number of request.

CVE-2015-0759
Published: 2015-06-02
Cross-site request forgery (CSRF) vulnerability in Cisco Headend Digital Broadband Delivery System allows remote attackers to hijack the authentication of arbitrary users.

CVE-2015-0850
Published: 2015-06-02
The Git plugin for FusionForge before 6.0rc4 allows remote attackers to execute arbitrary code via an unspecified parameter when creating a secondary Git repository.

CVE-2015-1945
Published: 2015-06-02
Unspecified vulnerability in the Reference Data Management component in IBM InfoSphere Master Data Management 10.1, 11.0, 11.3 before FP3, and 11.4 allows remote authenticated users to gain privileges via unknown vectors.

Dark Reading Radio
Archived Dark Reading Radio
From Target to Sony to Anthem, they are happening all around you: the “big” data breaches that compromise critical data and threaten the welfare of the corporate brand. Is your organization ready to respond?