Risk
4/5/2011
05:07 PM
Connect Directly
RSS
E-Mail
50%
50%

DARPA Asks Gamers To Test Submarine-Tracking Simulator

The Navy will eventually use the software, but its available now in the Dangerous Waters computer game as well as a free online download.


Slideshow: Next Generation Defense Technologies
(click for larger image and for full slideshow)
The Department of Defense (DOD) has developed simulation technology to help the Navy track enemy submarines that it's testing through integration into commercial computer-gaming software.

The Defense Advanced Research Project Arm's Anti-Submarine Warfare (ASW) Continuous Trail Unmanned Vessel (ACTUV) software simulates evasive maneuvers by submarines and challenges players to successfully track them. It's been developed by the agency as a precursor to actually adding autonomous software for tracking submarines to the ACTUV program's computers, according to the agency.

To reach a broad number of users for the test, DARPA has integrated it into the Dangerous Waters computer game by Sonalysts Combat Simulations. The ACTUV Tactics Simulator also is available online as a free download.

More and more DARPA is seeking input from the public on the technology it's developing. Last month, the agency crowdsourced the design of next-generation combat vehicles through a project called the eXperimental Crowd-derived Combat-support Vehicle (XC2V) Design Challenge.

In fact, for more than a year now, DARPA has been experimenting with the Web, social networking, and online competitions as a part of its approach to R&D. One of the earliest moves of this effort was the DARPA Network Challenge in December 2009, which the agency used to explore how people can use social networking and the Internet to solve broad, time-critical challenges.

DARPA has designed the ACTUV software to put players into situations that are as similar as possible to real warfare, it said. They control a tracking vessel that must share the sea with commercial shipping traffic as it attempts to track a submarine practicing realistic evasive maneuvers.

Players can earn points by achieving mission objectives, and DARPA is keeping track of the competition on a website showing game leaders. People also can share experiences and advice about the simulator with other players on the site.

Once sufficiently tested, the Navy eventually plans to add the new software to its ASW toolkit, according to DARPA.

The U.S. military is increasingly exploring its options to use advanced technologies like computer simulation and 3-D to improve both its warfare tactics and peacekeeping operations.

DARPA recently unveiled 3-D holographic technology to assist military leaders in battle planning and design that Army and Air Force research centers will be testing.

The five-year Urban Phototonic Sandtable Display (UPSD) program created a real-time, 360-degree, 3-D holographic display to help military commanders and mission planners better visualize and plan battles.

In addition to work being done at DARPA, the Army is developing an entire Second Life-like virtual world to simulate some of its peacekeeping operations and act as a training ground for soldiers. The complex architecture is meant to support thousands of avatars and Internet connections at once.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4725
Published: 2014-07-27
The MailPoet Newsletters (wysija-newsletters) plugin before 2.6.7 for WordPress allows remote attackers to bypass authentication and execute arbitrary PHP code by uploading a crafted theme using wp-admin/admin-post.php and accessing the theme in wp-content/uploads/wysija/themes/mailp/.

CVE-2014-4726
Published: 2014-07-27
Unspecified vulnerability in the MailPoet Newsletters (wysija-newsletters) plugin before 2.6.8 for WordPress has unspecified impact and attack vectors.

CVE-2014-2363
Published: 2014-07-26
Morpho Itemiser 3 8.17 has hardcoded administrative credentials, which makes it easier for remote attackers to obtain access via a login request.

CVE-2014-2625
Published: 2014-07-26
Directory traversal vulnerability in the storedNtxFile function in HP Network Virtualization 8.6 (aka Shunra Network Virtualization) allows remote attackers to read arbitrary files via crafted input, aka ZDI-CAN-2023.

CVE-2014-2626
Published: 2014-07-26
Directory traversal vulnerability in the toServerObject function in HP Network Virtualization 8.6 (aka Shunra Network Virtualization) allows remote attackers to create files, and consequently execute arbitrary code, via crafted input, aka ZDI-CAN-2024.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.