Feeds

The self-healing, self-hopping landmine

Welcome to Extreme Networking

  • alert
  • submit to reddit

SANS - Survey on application security programs

Only the well-funded geniuses at DARPA would describe their creation of hopping, networked explosives as "Self-Healing Mines."

No, the mines don't fit prosthetic limbs to maimed victims. So where does the Mine, Heal Thyself bit come from, then? It refers to the mines' "self-healing" ability to regroup by jumping up to 30m at a time and reform a solid wall after a tank, for example, has penetrated a minefield.

DARPA developed the mines for two reasons: first, the military needed a way for mines to react during enemy advances to stop troops from marching through a breach in a minefield; second, these anti-tank mines may eliminate the need for anti-personnel mines as they can move on their own.

Charities across the world are calling for the abolition of anti-personnel mines because of the havoc they wreak upon soldiers and civilians, often years after conflict has ended.

Anti-personnel explosives are designed to maim and disfigure anyone near them. According to The Vietnam Veterans of America Foundation (VVAF), 18,000 people are injured by mines each year.

The VVAF said moving away from anti-personnel mines is a good thing.

"The anti-tank mines are less of a concern," said Marissa Vitagliano, director of research at VVAF. "We would like there to be no victim activated weapons period, but we are in favor of any alternatives to anti-personnel and anti-tank mines, as long as they have a man in the loop and are under control."

It's unclear how under control DARPA's hopping mines are due to their ability to move about on their own accord.

Some designs have the mines connected via short-range radio networks with algorithms measuring out distances between each mine and planning the best way to reform as group. Other approaches have the mines connected via a wireless network. Some of the mines move using rocket thrusters, others use a hopping mechanism and hold enough fuel to make 100 leaps.

Early indications show the hopping mines will kill as no mines have killed before.

"Since the minefield is no longer a static obstacle, an open breach cannot be maintained," DARPA said. "The Self-Healing Minefield forces the enemy to attack the minefield and deplete the antitank mines surrounding the breaching lane by either repeated assaults or a wide area breach/clearance."

Which is not nice.

These mines can be passed only by an all out suicide march, and, if an opposing army turns away instead, civilians face an ever-changing, hopping aggressor engineered by the U.S's finest minds.

The animation provided by DARPA on the mines is a must see. The same brains that created the Internet have clearly mastered Flash as well. Watch it till to the end, as the Knight chess piece gives you a wink.

DARPA has already run tests with the hopping mines and wants to soon move the project along to the U.S. Army. ®

Related story

Robogrunt: the US military's plans for robot armies

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
IBM rides nightmarish hardware landscape on OpenPOWER Consortium raft
Google mulls 'third-generation of warehouse-scale computing' on Big Blue's open chips
It's GOOD to get RAIN on your upgrade parade: Crucial M550 1TB SSD
Performance tweaks and power savings – what's not to like?
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.