Feeds

US Navy plans self-building floating fortresses

Swimming, stacking ISO containers: Just add SEALs

Bridging the IT gap between rising business demands and ageing tools

But normal warships are ill-suited for such jobs, being designed for high-intensity warfare against high tech enemies. They can make a useful effort at disaster relief, and a less useful one against pirates or blockade-runners, but they are so expensive and thus so scarce it's difficult to get much done with them.

Thus TEMP, which seeks to deliver effective sea power using humble container vessels rather than hecamillion- or multibillion-dollar purpose-built warships.

Firstly, there will be a relatively normal effort to create a snap-together instant ISO-box kit which would turn the host ship into a useful platform.

The right mix of ISO-sized modules would then allow a conventional containership to be temporarily acquired and staffed for a useful military function which relieves the burden on conventional force structure. A certain set of modules would be required for any TEMP mission, such as military communications, command and control, expanded habitability functions, expanded power generation, damage control, and self-defense / force protection. Another set of modules would be mission specific, allowing the ship to be converted to a platform capable of accomplishing a specific mission, such as HA/DR or maritime domain awareness and interdiction operations.

This much has more or less already happened. The British fleet at least is already well accustomed to carrying out various military tasks using (often temporarily) modified merchant ships. Sometimes these ships are in regular Ministry of Defence service as Royal Fleet Auxiliary vessels, but sometimes they are just hastily converted merchantmen, as happened in many cases during the Falklands War.

But having a ready-made ISO container set all ready to go would be very handy. A set of modules could be kept parked up on road trailers, ready to be hauled out to a container port and swiftly put aboard ship for deployment. As DARPA points out, some would be standard for every job: comms shack, command cell, living quarters, power and so on. Others - perhaps pop-up weapons stations, UAV or aircraft hangar/pad units etc - would be added depending on the job.

A fleet of cheaply-chartered container ships kitted out with helicopter-pad and marine boarding team units would be able to fight the pirates of the Horn of Africa far more cheaply and effectively than frigates and destroyers can, for instance.

Mobile application security vulnerability report

More from The Register

next story
Bad back? Show some spine and stop popping paracetamol
Study finds common pain-killer doesn't reduce pain or shorten recovery
Malaysian Airlines flight MH17 claimed lives of HIV/AIDS cure scientists
Researchers, advocates, health workers among those on shot-down plane
World Solar Challenge contender claims new speed record
One charge sees Sunswift travel 500kms at over 100 km/h
Mwa-ha-ha-ha! Eccentric billionaire Musk gets his PRIVATE SPACEPORT
In the Lone Star State, perhaps appropriately enough
SMELL YOU LATER, LOSERS – Dumbo tells rats, dogs... humans
Junk in the trunk? That's what people have
All those new '5G standards'? Here's the science they rely on
Radio professor tells us how wireless will get faster in the real world
The Sun took a day off last week and made NO sunspots
Someone needs to get that lazy star cooking again before things get cold around here
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.