Risk
9/2/2008
05:16 PM
Connect Directly
RSS
E-Mail
50%
50%

U.S. Army Expanding PackBot Contract With iRobot

iRobot has expanded its catalog of military and security robots in recent months, including very small LANdroids used by soldiers in urban settings.

The expanding applications of ground tactical robots manufactured by iRobot has resulted in the Army awarding a contract to the company valued at up to $200 million for equipment and service over the next five years.

According to an announcement from iRobot on Tuesday, the contract from the United States Army's program executive office for simulation, training, and instrumentation replaces an earlier contract that had been solely for purchases of iRobot PackBot robots.

The company, which makes robots for both military and commercial markets, noted that it has delivered more than 1,700 PackBot robots to date.

"As the Army continues to utilize ground tactical robots with greater frequency, new applications for these robots are being identified," said Joe Dyer, president of iRobot government and industrial robots, in a statement. "We are pleased that this contract will allow iRobot to expand our product offering as the Army sees fit, as each of our robots possesses specific capabilities that allow troops to complete a wide range of missions."

Earlier this summer, the Army awarded $17.5 million to iRobot to deliver 220 PackBots. The company has developed additional military and security robots in recent months, including very small devices called LANdroids that are so small that a single dismounted soldier can carry multiple versions of the robots to be thrown about in urban settings; the robots then communicate via mesh network, self-configuring even when some have been blown up or otherwise disabled.

Last month, iRobot unveiled a low-cost tactical robot for public safety organizations that can climb stairs, test for dangerous chemicals, and alert public safety officials of the results. Called the Negotiator, the small robot is slated for delivery by the end of the year.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0619
Published: 2014-10-23
Untrusted search path vulnerability in Hamster Free ZIP Archiver 2.0.1.7 allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the current working directory.

CVE-2014-2230
Published: 2014-10-23
Open redirect vulnerability in the header function in adclick.php in OpenX 2.8.10 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) dest parameter to adclick.php or (2) _maxdest parameter to ck.php.

CVE-2014-7281
Published: 2014-10-23
Cross-site request forgery (CSRF) vulnerability in Shenzhen Tenda Technology Tenda A32 Router with firmware 5.07.53_CN allows remote attackers to hijack the authentication of administrators for requests that reboot the device via a request to goform/SysToolReboot.

CVE-2014-7292
Published: 2014-10-23
Open redirect vulnerability in the Click-Through feature in Newtelligence dasBlog 2.1 (2.1.8102.813), 2.2 (2.2.8279.16125), and 2.3 (2.3.9074.18820) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter to ct.ashx.

CVE-2014-8071
Published: 2014-10-23
Multiple cross-site scripting (XSS) vulnerabilities in OpenMRS 2.1 Standalone Edition allow remote attackers to inject arbitrary web script or HTML via the (1) givenName, (2) familyName, (3) address1, or (4) address2 parameter to registrationapp/registerPatient.page; the (5) comment parameter to all...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.