Risk
4/5/2011
05:07 PM
50%
50%

DARPA Asks Gamers To Test Submarine-Tracking Simulator

The Navy will eventually use the software, but its available now in the Dangerous Waters computer game as well as a free online download.


Slideshow: Next Generation Defense Technologies
(click for larger image and for full slideshow)
The Department of Defense (DOD) has developed simulation technology to help the Navy track enemy submarines that it's testing through integration into commercial computer-gaming software.

The Defense Advanced Research Project Arm's Anti-Submarine Warfare (ASW) Continuous Trail Unmanned Vessel (ACTUV) software simulates evasive maneuvers by submarines and challenges players to successfully track them. It's been developed by the agency as a precursor to actually adding autonomous software for tracking submarines to the ACTUV program's computers, according to the agency.

To reach a broad number of users for the test, DARPA has integrated it into the Dangerous Waters computer game by Sonalysts Combat Simulations. The ACTUV Tactics Simulator also is available online as a free download.

More and more DARPA is seeking input from the public on the technology it's developing. Last month, the agency crowdsourced the design of next-generation combat vehicles through a project called the eXperimental Crowd-derived Combat-support Vehicle (XC2V) Design Challenge.

In fact, for more than a year now, DARPA has been experimenting with the Web, social networking, and online competitions as a part of its approach to R&D. One of the earliest moves of this effort was the DARPA Network Challenge in December 2009, which the agency used to explore how people can use social networking and the Internet to solve broad, time-critical challenges.

DARPA has designed the ACTUV software to put players into situations that are as similar as possible to real warfare, it said. They control a tracking vessel that must share the sea with commercial shipping traffic as it attempts to track a submarine practicing realistic evasive maneuvers.

Players can earn points by achieving mission objectives, and DARPA is keeping track of the competition on a website showing game leaders. People also can share experiences and advice about the simulator with other players on the site.

Once sufficiently tested, the Navy eventually plans to add the new software to its ASW toolkit, according to DARPA.

The U.S. military is increasingly exploring its options to use advanced technologies like computer simulation and 3-D to improve both its warfare tactics and peacekeeping operations.

DARPA recently unveiled 3-D holographic technology to assist military leaders in battle planning and design that Army and Air Force research centers will be testing.

The five-year Urban Phototonic Sandtable Display (UPSD) program created a real-time, 360-degree, 3-D holographic display to help military commanders and mission planners better visualize and plan battles.

In addition to work being done at DARPA, the Army is developing an entire Second Life-like virtual world to simulate some of its peacekeeping operations and act as a training ground for soldiers. The complex architecture is meant to support thousands of avatars and Internet connections at once.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

CVE-2014-2716
Published: 2014-12-19
Ekahau B4 staff badge tag 5.7 with firmware 1.4.52, Real-Time Location System (RTLS) Controller 6.0.5-FINAL, and Activator 3 reuses the RC4 cipher stream, which makes it easier for remote attackers to obtain plaintext messages via an XOR operation on two ciphertexts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.