Risk
4/5/2011
05:07 PM
50%
50%

DARPA Asks Gamers To Test Submarine-Tracking Simulator

The Navy will eventually use the software, but its available now in the Dangerous Waters computer game as well as a free online download.


Slideshow: Next Generation Defense Technologies
(click for larger image and for full slideshow)
The Department of Defense (DOD) has developed simulation technology to help the Navy track enemy submarines that it's testing through integration into commercial computer-gaming software.

The Defense Advanced Research Project Arm's Anti-Submarine Warfare (ASW) Continuous Trail Unmanned Vessel (ACTUV) software simulates evasive maneuvers by submarines and challenges players to successfully track them. It's been developed by the agency as a precursor to actually adding autonomous software for tracking submarines to the ACTUV program's computers, according to the agency.

To reach a broad number of users for the test, DARPA has integrated it into the Dangerous Waters computer game by Sonalysts Combat Simulations. The ACTUV Tactics Simulator also is available online as a free download.

More and more DARPA is seeking input from the public on the technology it's developing. Last month, the agency crowdsourced the design of next-generation combat vehicles through a project called the eXperimental Crowd-derived Combat-support Vehicle (XC2V) Design Challenge.

In fact, for more than a year now, DARPA has been experimenting with the Web, social networking, and online competitions as a part of its approach to R&D. One of the earliest moves of this effort was the DARPA Network Challenge in December 2009, which the agency used to explore how people can use social networking and the Internet to solve broad, time-critical challenges.

DARPA has designed the ACTUV software to put players into situations that are as similar as possible to real warfare, it said. They control a tracking vessel that must share the sea with commercial shipping traffic as it attempts to track a submarine practicing realistic evasive maneuvers.

Players can earn points by achieving mission objectives, and DARPA is keeping track of the competition on a website showing game leaders. People also can share experiences and advice about the simulator with other players on the site.

Once sufficiently tested, the Navy eventually plans to add the new software to its ASW toolkit, according to DARPA.

The U.S. military is increasingly exploring its options to use advanced technologies like computer simulation and 3-D to improve both its warfare tactics and peacekeeping operations.

DARPA recently unveiled 3-D holographic technology to assist military leaders in battle planning and design that Army and Air Force research centers will be testing.

The five-year Urban Phototonic Sandtable Display (UPSD) program created a real-time, 360-degree, 3-D holographic display to help military commanders and mission planners better visualize and plan battles.

In addition to work being done at DARPA, the Army is developing an entire Second Life-like virtual world to simulate some of its peacekeeping operations and act as a training ground for soldiers. The complex architecture is meant to support thousands of avatars and Internet connections at once.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6090
Published: 2015-04-27
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) DataMappingEditorCommands, (2) DatastoreEditorCommands, and (3) IEGEditorCommands servlets in IBM Curam Social Program Management (SPM) 5.2 SP6 before EP6, 6.0 SP2 before EP26, 6.0.3 before 6.0.3.0 iFix8, 6.0.4 before 6.0.4.5 iFix...

CVE-2014-6092
Published: 2015-04-27
IBM Curam Social Program Management (SPM) 5.2 before SP6 EP6, 6.0 SP2 before EP26, 6.0.4 before 6.0.4.6, and 6.0.5 before 6.0.5.6 requires failed-login handling for web-service accounts to have the same lockout policy as for standard user accounts, which makes it easier for remote attackers to cause...

CVE-2015-0113
Published: 2015-04-27
The Jazz help system in IBM Rational Collaborative Lifecycle Management 4.0 through 5.0.2, Rational Quality Manager 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Team Concert 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Requirements Composer 4.0 through 4.0.7, Rational DOORS Next Generation...

CVE-2015-0176
Published: 2015-04-27
Cross-site scripting (XSS) vulnerability in MQ XR WebSockets Listener in WMQ Telemetry in IBM WebSphere MQ 8.0 before 8.0.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted URI that is included in an error response.

CVE-2015-1886
Published: 2015-04-27
The Remote Document Conversion Service (DCS) in IBM WebSphere Portal 6.1.0 through 6.1.0.6 CF27, 6.1.5 through 6.1.5.3 CF27, 7.0.0 through 7.0.0.2 CF29, 8.0.0 before 8.0.0.1 CF16, and 8.5.0 through CF05 allows remote attackers to cause a denial of service (memory consumption) via crafted requests.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.