recommended reading

Wireless Robots to Comb Illicit Tucson Tunnels for Drugs

U.S. Border Patrol has discovered tunnels such as this 36-foot smuggling tunnel near Tucson.

U.S. Border Patrol has discovered tunnels such as this 36-foot smuggling tunnel near Tucson. // AP file photo

The Homeland Security Department is ordering wireless robots to probe underground passageways along the Southwest border for drug trafficking activity, according to contracting documents.

The Defense Department for several years has sent robots in place of troops to identify land mines throughout Middle East battle zones, but the technology is relatively new for DHS.

“A robotic solution is always being looked at to replace a Border Patrol agent from having to make initial entry into an illicit tunnel," stated an Aug. 7 report justifying the need for a specific automaton brand, the Pointman. "This has always been a challenge since there is not one single robot solution for various types of illicit tunnels discovered.” 

Operators will be able to remotely shrink the rovers to a height of less than 7 inches tall for scouring beneath vehicles and entering confined spaces, such as under beds, according to contract requirements published Aug. 15. The bots also have an “arm” for climbing stairs, they added.  

Measuring at most 18 inches tall and 15 inches long, the discreet system will only roam about three miles per hour. It is designed to travel without human intervention for about 200 meters.  

Officials claim the Pointman Robot is the only commercial, wireless robot capable of investigating and clearing illegal underground tunnels in Arizona. The “Pointman Robot significantly outperforms all wireless robots evaluated and tested” in the Tucson, Ariz., region, while all the other systems assessed could travel no more than 15 feet before losing control, the justification stated.

Operators can remotely upright a disabled bot “to make corrections after a fall or tip over,” according to the contract requirements.

For trekking along challenging terrain, cluttered with, for example, “clothing, debris/rubble, household items, rocks, stairs, sidewalk curbs, etc.,” the robots can deploy a “traversing” capability, DHS officials said. On flat surfaces, the robots will switch to a wheel mode.

Some passageways are seemingly engineered to block authorities. In 2012, U.S. officials discovered a 755-foot channel descending 57 feet, and located under a 2,000-gallon water tank, according to the Los Angeles Times. It could be moved only by a forklift. 

A yet-to-be hired contractor will be responsible for assembling the 17.5 pound autonomous creatures from various commercial parts, including the Pointman and a mini DVR.

Local police in Oklahoma City and Austin have relied on Pointman bots for situations such as standoffs, according to Applied Research Associates, the robot manufacturer.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.