Government Technology

Wi-Fi Could Help Combat Pirates Terrorizing The High Seas


Navy Seal Night Ops
Navy Seal Night Ops

April 20, 2009 By

As efforts to protect ships from pirate attacks are stepped up internationally, the question of a long-term solution is now receiving attention. Piracy on the high-seas has actually been escalating for years, a fact detail in recent books such Dangerous Waters: Modern Piracy and Terror on the High Seas by John S. Burnett. The International Maritime Bureau's piracy reporting center reports seventy-seven pirate attacks this year, with sixteen of those vessels and 285 crew members still in bandits' hands.

Some experts have suggested that the only way to effectively combat piracy is use the same tactics that were used to virtually eliminate the pirates of old: track them back to their land bases and go after them there.

However, in age when technology allows instantaneous global communications, much could be done to make ships safer. This is especially true where the center of the world's current fight against piracy is focused in one of the world's busiest and most important shipping lanes used by twenty thousand ships each year -- the Gulf of Aden that links the Suez Canal and the Red Sea to the Indian Ocean.

One solution being proposed would use high-speed Wi-Fi wireless communications -- what has been called a Floating Area Network (FAN) -- and security buoys to create a universal maritime security net.

"These technologies eliminate awkward satellite delay, aid communication between crews and rescue teams, and provide live, real-time video logs of events as they occur on board ships, which can prove to be invaluable training aids for future missions," says Dr. Nelson Ludlow, CEO of Intellicheck Mobilisa, Inc., one company developing and marketing wireless and identity systems for maritime communications and security.

"This system would allow for the on-board placement of covert devices-such as motion detectors, cameras, and infrared night sensors-that the military typically use, but requires high bandwidth to enable communications," added Dr. Ludlow in a news statement. "The buoy would provide high bandwidth and communications link directly to the pirated ship, with all communications controlled by the rescue ship."

Recently Intellicheck Mobilisa began pilot testing a multi-purpose security buoy project with the U.S. Department of Defense, and the University of Washington Applied Physics Lab. These buoys provide real-time queuing of potential waterborne threats.

The company's Wireless Over Water (WOW) technologies allow Wi-Fi to work in-motion over water and over great distances. The company provided the Washington State and British Columbia Ferry systems with a continuous Internet connection while customers traveled on board those vessels. Similarly, the company's Floating Area Network (FAN) technology allows ships within line of sight to communicate with each other wirelessly at speeds faster than current-and overtaxed-satellite communications. The U.S. Navy's SPARTAN unmanned surface vehicles, for example, use this WOW technology to transmit high-speed video in real time over several miles.

This type of advanced communications, according to Dr. Ludlow, would allow for direct audio and video feed from the Navy or rescue ship to the boarding team without satellite delays. And linguists could use the technology to translate commands and orders given to the crew from the boarding party to facilitate in safety and conduct security operations.

 


| More

Comments

Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
Cybersecurity in an "All-IP World" Are You Prepared?
In a recent survey conducted by Public CIO, over 125 respondents shared how they protect their environments from cyber threats and the challenges they see in an all-IP world. Read how your cybersecurity strategies and attitudes compare with your peers.
Maintain Your IT Budget with Consistent Compliance Practices
Between the demands of meeting federal IT compliance mandates, increasing cybersecurity threats, and ever-shrinking budgets, it’s not uncommon for routine maintenance tasks to slip among state and local government IT departments. If it’s been months, or even only days, since you have maintained your systems, your agency may not be prepared for a compliance audit—and that could have severe financial consequences. Regardless of your mission, consistent systems keep your data secure, your age
Best Practice Guide for Cloud and As-A-Service Procurements
While technology service options for government continue to evolve, procurement processes and policies have remained firmly rooted in practices that are no longer effective. This guide, built upon the collaborative work of state and local government and industry executives, outlines and explains the changes needed for more flexible and agile procurement processes.
View All

Featured Papers