Police Magazine Logo
MenuMENU
SearchSEARCH

JW Fishers’ ROVs Used by Public Safety, Other Professions

JW Fishers' SeaOtter and SeaLion ROV systems are often used to locate drowning victims with attached sonar systems to search for ships lost at sea; or to conduct inspections on submerged tanks, dams, and water intake pipes. JW Fishers has been providing operators with top of the line ROV systems for more than 30 years.

April 29, 2020
JW Fishers’ ROVs Used by Public Safety, Other Professions

A water intake inspection crew prepares their JW Fishers' ROV for an operation. (Photo: JW Fishers)

3 min to read


Since the late 1980s, JW Fishers’ Remote Operated Vehicles (ROVs) have been critical tools used around the globe for various missions from the routine to the extraordinary.

JW Fishers' SeaOtter and SeaLion ROV systems are often used to locate drowning victims with attached sonar systems to search for ships lost at sea; or to conduct inspections on submerged tanks, dams, and water intake pipes. JW Fishers has been providing operators with top of the line ROV systems for more than 30 years.

Ad Loading...

The SeaLion-2 is JW Fishers’ most popular ROV. The system comes standard with four high-performance motors, a 1,000-foot (300 meters) depth rated housing, front and rear facing camera both with pan and tilt functionality, and an on-Screen display (OSD) of basic time, date, and GPS coordinates. Illumination is provided by 4,400-lumen LEDs, and a 15-inch ultra-bright LCD monitor is mounted in the system’s splash-proof Pelican case. More thrust is available with a “power boost” feature that provides the ROV with an extra burst of speed for a few seconds when it encounters heavier than normal currents. The additional payload allows the SeaLion-2 to be fitted with various options such as a SCAN650 sector scanning sonar system, a manipulator arm, scientific research equipment, or an RMD-1 remote metal detector.

The SeaOtter-2 comes with the same features as the SeaLion-2, but is rated to withstand depths up to 500 feet (150 meters). The “power boost” feature is also not available for the SeaOtter-2. Ideally, the SeaOtter-2 is suited for low current applications, including piling inspections, lake searches, tank inspections, dam inspections, and water intake inspections. When in its element, the SeaOtter-2 is an incredibly powerful tool for any operator needing reliability and efficiency in their underwater search, JW Fishers says.

One company purchased a SeaOtter-2 in 2019 for a very particular task. The engineering technician says, “we are using the SeaOtter-2 to perform a thorough visual inspection of our lake water intake piping at our pump station. We have two 48-inch lake water intakes that are approximately 975-feet long that have two cribs each. We needed an ROV that was highly maneuverable, and the SeaOtter-2 fits that bill.”

They add, “By having an in-house ROV, it enables us to perform several inspections per year to monitor debris, pipe condition, and more importantly, zebra mussel infestation—as we have gone away from chlorine for zebra mussel control. Contract inspections can be quite costly, so we acquire quite a savings from owning this piece of equipment.”

The water intake inspection crew put their JW Fishers ROV straight to work. “We performed our test voyage on our SeaOtter-2 today and it performed better than expected. The maneuverability is incredible. The forward video was clear and impressive as can be seen by the shot of some original markings on the inside of an intake pipe. The clear consensus is the vehicle is an invaluable tool and we are happy to have it. I look forward to continued use learning more of the capabilities,” the crew leader wrote.

Ad Loading...

More Technology

Fans cheer at Saban Field at Bryant-Denny Stadium during a football game at The University of Alabama.
TechnologyApril 23, 2026

The University of Alabama Rolls Out Couter-Drone Technology

The University of Alabama is using D-Fend Solutions as a counter-drone technology supplier for campus and game-day airspace security. The University integrates D-Fend’s EnforceAir into its Emergency Operations Center (EOC), utilizing a unified command framework to collaborate with local, state, and federal partners during major events.

Read More →
Man working in front of multiple computer screens.
TechnologyApril 22, 2026

Motorola Solutions Now Part of the Cyber Threat Alliance

Motorola Solutions is now part of the Cyber Threat Alliance, the first formally organized nonprofit group of cybersecurity practitioners that work together in good faith to share threat information and improve global defenses against advanced cyber adversaries.

Read More →
Bar chart showing what police departments spend budget on for security.
TechnologyApril 22, 2026

Genetec 2026 State of Physical Security Report Reveals Public Safety Priorities & Challenges

Survey results from Genetec’s 2026 State of Physical Security Report highlight the demand for integrated systems that improve response times and reduce investigative workload. Nearly nine in 10 respondents said they use security data to help keep officers safe.

Read More →
Ad Loading...
Tinted blue background image of traffic with inset images for an ALPR camera, a police dispatcher, and a logo for Flock Safety.
TechnologyApril 16, 2026

Flock Safety Introduces Audit Assistance, Its Latest Trust & Compliance Tool

Audit Assistance is the latest tool in the Flock Trust & Compliance suite, a first-of-its-kind set of products and services that provides communities with guardrails and customization for accountability, transparency, and responsible use of the Flock platform.

Read More →
image of one closed laptop and one open laptop with Toughbook logo on screen, all against a blue gradient background
TechnologyApril 16, 2026

Panasonic Connect Launches the Toughbook 56

The Toughbook 56, the latest rugged laptop from Panasonic Connect, delivers enhanced performance, refined design, new levels of security, and power-efficient workflows in demanding environments.

Read More →
Collection of traffic control signs against a city backdrop and logos for Radarsign and Sourcewell.
TechnologyApril 16, 2026

Radarsign Awarded Sourcewell Contract Expanding Access to Traffic Safety Solutions

Radarsign’s traffic safety portfolio, including radar speed signs, flashing beacon systems, and more, are now available through Sourcewell purchasing contracts.

Read More →
Ad Loading...
Rooftop view off a drone detection devise with two small rubber antennas with an view overlooking a large domed event venue.
TechnologyApril 9, 2026

D-Fend Solutions’ EnforceAir C-UAS System Secures Key Event with RF-Cyber Counter-Drone Technology

D-Fend Solutions deployed its EnforceAir C-UAS system in support of local police to help secure a 19,000-attendee event, leveraging its non-jamming approach to keep communications and authorized drones operational while safeguarding against rogue drone threats.

Read More →
Graphic showing four priorities for secure enterprise cloud adoption and a logo for Genetec.
TechnologyApril 2, 2026

Genetec Highlights Why Governance Defines Secure Cloud Adoption in Enterprise Physical Security

With World Cloud Security Day on April 3, Genetec outlines how enterprises can strengthen resilience as they modernize physical security in the cloud.

Read More →
police car geotab thumbnail for services whitepaper
SponsoredApril 1, 2026

Police Fleet Management: Boost Performance & Savings

Today’s police departments face rising fleet costs and must stay ready to respond, no matter the call. In this eBook, get powerful insights to enhance your police fleet’s cost-efficiency, reliability and performance through data-driven tactics.

Read More →
Ad Loading...
An automated license plate reader mounted on rear trunk of a car.
TechnologyMarch 26, 2026

Public Safety Surveillance Technology: Built on Compliance and Trust

ALPR solutions provider Leonardo explains why leveraging technology for safety must never come at the expense of constitutional rights or community trust. Every action within an ALPR system should be logged in a tamper-proof audit trail with query records of who accessed what data, when, and for what purpose.

Read More →