The Navy Just Turned Seawater Into Jet Fuel

A KC-10A tanker refuels one of the Navy's F/A 18 fighter jets

Researchers announce a major breakthrough, but don’t go filling your F-18 with ocean water just yet. By Patrick Tucker

Announcing a major breakthrough, Navy researchers for the first time have converted seawater into CO2 and hydrogen, which could be used to produce jet fuel within a decade.

In the next seven to ten years, the military will be able to run jets, ships, and other vehicles on a fuel derived from seawater, according to Heather Willauer, a research chemist with the Naval Research Laboratory or NRL.

“It has to meet military specifications to go into a jet,” Willauer said, at the annual Sea Air Space Expo near Washington, D.C., on Tuesday. “We haven’t actually made it to the specifications stage yet. But we know we’re in the hydro-carbon region and it shouldn’t be very difficult to meet that specification.”

The breakthrough, though impressive, does not mean that we will be filling jets and ships with seawater in the very near future. The fixed-bed catalysis process Willauer and her team used to recover the hydrogen and the CO2 from the seawater is highly energy-intensive, requiring almost twice as much electricity to convert the water into fuel components as the process yields in terms of power. Catalysis is a process that combines chemicals, energy and pressure to accelerate chemical reactions. At current energy pricing, the cost of the fuel is between $3 to $7 per gallon. Willauer says the numbers should get better in the years ahead.  

With a stable and, hopefully, clean electricity source, seawater-based fuel could reduce dependence on oil or other polluting fuel sources, first in the military and then elsewhere. “The idea is really from a logistics standpoint, you’re no longer dependent on foreign fossil fuel,” said Willauer. “You can make fuel where and when you need so you can stay on station, and it elevates that burden cost of fuel, of carrying it to different parts of the world.” 

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.