Feeds

US Navy SEALs' new airlock minisub - made in Blighty

Brit knowhow cracks 'exploding iPod' battery-inferno snag

High performance access to file storage

A groundbreaking new miniature submarine in use by the US Navy's secretive, elite frogman-commando special operations force was actually designed and built in old Blighty, the Reg can reveal.

We reported first on the S301 mini-sub two weeks ago, noting from federal documents that the famous US Navy SEALs had leased a demonstration model for "doctrinal, operational, and organizational purposes". This was followed up last week by the Honolulu Advertiser, which had spoken to Submergence Group, the American firm listed by the US government as provider of the S301.

It emerged that the S301 - now in trials with the SEALs in Hawaii - had cost just $10m to develop, which contrasted especially well with the $885m+ spent on the ill-fated Advanced SEAL Delivery System (ASDS).

The S301 at its makers in Plymouth. Credit: MSubs

The stylish ride for today's more discerning frogman-commando. Needs to come in black, though.

The ASDS, from US defence behemoth Northrop Grumman, had been intended to supersede the SEALs' current Mark 8 Mod 1 minisubs, which are carried in a "Dry Deck Shelter" (DDS) airlock docking bay fitted to a full-sized US Navy nuclear submarine - either a normal attack boat or an Ohio-class dedicated Stingray-style special-ops mothership. The Ohios, nuclear missile subs retired from their old job under arms-reduction treaties, have space aboard for a large force of SEALs and pack a powerful armament of conventional-warhead cruise missiles for precision shore bombardment.

The trouble with the present Mark 8 minisubs is that their interiors are open to the sea and SEALs riding in them for long periods can be so chilled by the cold ocean as to be unable to carry out their mission once they are dropped off.

Hence the ASDS, a bigger battery sub with a dry interior, which was to replace the deck hangar and dock with the mother sub directly. It had its own airlock, and so would be able to carry a team of frogmen to work in comfort, locking them out into the sea once it was close to the target.

But the ASDS was dogged by technical snags and cost overruns: it tended to get damaged if the mothership sub went at all fast, and its battery system, we gather, was subject to "thermal runaway". The ASDS programme finally expired altogther when the prototype boat was gutted by fire while stored ashore in Hawaii.

High performance access to file storage

More from The Register

next story
IBM Hursley Park: Where Big Blue buries the past, polishes family jewels
How the internet of things has deep roots in the English countryside
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Honeybee boffin STINGS OWN WEDDING TACKLE... for SCIENCE
Not the worst place to be stung, says one man
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.