Feeds

Tornado-chasing stealth Batmobile set to invade killer vortices

The Iowa Storm Chasing Network's 'Dorothy' seeks twisters, data, and adrenaline

Bridging the IT gap between rising business demands and ageing tools

A pair of intrepid 20-year-old Iowans have constructed a tornado-chasing vehicle that looks for all the world like a cross between a Stryker M1126 ICV, F-117 Nightwhawk, and a Ford E-350 van.

Iowa Storm Chasing Network's 'Dorothy' tornado-chasing vehicle

Armored, equipped, aerodynamically and aesthetically enhanced – Dorothy awaits her first twister

The similarity to that last one may seem a bit tenuous, but that is the actual vehicle that Brennan Jontz and Dan Auel converted into the tornado-chaser that they've named – what else? – Dorothy.

The dynamic duo took the 12-passenger van, which is equipped with a 255 horsepower 5.4L V8, chopped its top, covered it with steel plates, and coated those plates with an eighth-inch-thick coating of Line-X, a rubberized coating that will "stop a 9mm bullet," said Jontz.

That precaution seems a wise one, seeing is how their goal is to drive Dorothy into a tornado – a violent storm that, as Iowans, they may very well have the share of opportunities to visit soon.

As pointed out in a newscast about the vehicle by Des Moines, Iowa's KCCI, it's now spring, and with the change in seasons comes the onset of tornado season.

Dorothy was built for the Iowa Storm Chasing Network, a group of guys – why is it always guys? – who attempt to get as close as they can to tornadoes to gather data on them. And, we can only assume, to get a bit of an adrenaline rush, as well.

Iowa Storm Chasing Network's 'Dorothy' tornado-chasing vehicle and friend

In which of these two Iowa Storm Chasing Network vehicles would you prefer to face an EF5 tornado?

"Once you get in a tornado, all you see is debris flying around so the main goal is to get close, get slow motion video of the tornado, slow it down and analyze the data," Dorothy's navigator, meteorology student Zach Sharpe, told KCCI.

One of the more interesting aspects of Dorothy – in addition to its steel armor, half-inch military-grade polycarbonate windows, and live-streaming cameras – is that some of the steel plates lower to the ground to protect tires and, more importantly, prevent her from being flipped into the air by the tornado's vicious, swirling winds.

At least that's what Jontz, Auel, and Sharpe hope – Dorothy has yet to be tested in meteorological combat. "At first, there would be some nerves going close to the storm, but I think we'd be all right," said Sharpe.

We shall see. Although according to NOAA, last year was a rather quiet one for Iowan tornadoes, as every investor knows – including those who invest in futuristic tornado-chasing vehicles – past performance is no guarantee of future results. ®

Mobile application security vulnerability report

More from The Register

next story
Bad back? Show some spine and stop popping paracetamol
Study finds common pain-killer doesn't reduce pain or shorten recovery
Malaysian Airlines flight MH17 claimed lives of HIV/AIDS cure scientists
Researchers, advocates, health workers among those on shot-down plane
Mwa-ha-ha-ha! Eccentric billionaire Musk gets his PRIVATE SPACEPORT
In the Lone Star State, perhaps appropriately enough
SMELL YOU LATER, LOSERS – Dumbo tells rats, dogs... humans
Junk in the trunk? That's what people have
All those new '5G standards'? Here's the science they rely on
Radio professor tells us how wireless will get faster in the real world
The Sun took a day off last week and made NO sunspots
Someone needs to get that lazy star cooking again before things get cold around here
Boffins discuss AI space program at hush-hush IARPA confab
IBM, MIT, plenty of others invited to fill Uncle Sam's spy toolchest, but where's Google?
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.