June 25, 2020 · Cyber Analysis DMO

Analysis: Cyber in the Undersea

michael-dziedzic-aQYgUYwnCsM-unsplash-2

As we inch ever closer to realizing an Internet of Underwater Things (IoUT), the need for a complete understanding of the cyber threats and opportunities posed by unmanned undersea systems is urgently needed.

Two years ago I penned a FICINT vignette demonstrating the potential for microsubmarines to engage in cyber operations. The vignette focused on a two-part operation, Nøkken (named for shapeshifting creatures featured in Scandinavian folklore), and involved a Strikepod using an advanced IW payload - a Clandestine Access and Emission Module (CLAXEM) - to generate a decoy submarine signature using acoustic and magnetic emissions, and also to penetrate a Russian undersea network. Since then, there have been continued advancements in underwater communication technologies, as well as increasing deployment of underwater wireless sensor networks (UWSNs), which should cause us to seriously consider the cyber threats and opportunities that loom in the undersea.

In order to properly contextualize the cyber implications of unmanned undersea systems, I will first provide an overview of recent Blue and Red system developments, an overview of select Blue and Red concepts of operations (CONOPS), and a discussion of the technological challenges faced by actors seeking to operate in the undersea.

BLUE DEVELOPMENT CONTINUES APACE

The United States and its allies continue on course to fielding a range of advanced undersea systems (vehicles, sensors, and related communication, energy, processing devices and infrastructure) intended to increase undersea situational awareness, counter undersea threats, and enable freedom of maritime maneuver in all theaters of operations.

          manta-1
          Manta concept by Msubs. | Source: Msubs.com

          ROKN_ASWUUV
          Source: NavalNews.com

          MUM
          Source: thyssenkrupp

RED DEVELOPMENT IS ACCELERATING

Adversaries are expanding their footprint in the undersea, fielding new systems and capabilities at an accelerating rate.

          Screen-Shot-2020-06-25-at-5.04.33-PM
          Vityaz-D seabed station (L) and UUV (R).

          poseidon-1
          Poseidon with host platform Belgorod.

          haiyi-2

           hsu-001-1

          iran_uuv-2

          zawahri_uuv
          Source: Jerusalem Center for Public Affairs

          Amethyst_AUV_P3_4_19-1
          Source: Beobachtung

          Amethyst_sensor_mounts-1

OPERATIONAL CHALLENGES REMAIN (FOR NOW)

Unmanned undersea operations continue to be limited by the complex, dynamic conditions of the ocean environment and the unique operational constraints they engender. Three critical capabilities - communication, energy, and autonomy - will drive future developments in this domain.

Communication
Without access to the RF spectrum, undersea systems rely principally upon acoustic or optical (laser) technologies for submerged communication, both of which come with significant tradeoffs in terms of range, bandwidth, and clandestinity.

          teledyne_modem-1
          Teledyne Benthos Compact Modem

          BlueComm200886x581
          Sonardyne BlueComm 200

Until recently, there was was no common standard to facilitate undersea communications, with each modem manufacturer utilizing their own proprietary system. Over a period of several years, NATO's Center for Maritime Research and Experimentation (CMRE) developed JANUS, a communications protocol for undersea vehicles, which became a NATO standard in 2017. Like Bluetooth or Wi-Fi for the undersea, JANUS enables interoperability between military, scientific and industry systems.

Energy
In order to provide persistent coverage, particularly in contested or denied areas, unmanned undersea systems require access to a high-density power source, either onboard or via recharging stations deployed in situ. Gliders are the most energy efficient UUVs by far, able to operate for weeks or months at a time on a single charge, but are limited in terms of payload and operational capabilities. Small or medium UUVs utilize standard lithium-ion batteries which provide anywhere from 24 to 72 hours of charge, depending on mission, and require several hours to recharge. Large and extra large UUVs will house more robust power systems, enabling longer range and endurance, and may incorporate fuel cells, or AIP - Air-Independent Power (also called Air Independent Propulsion). The Boeing Orca is powered by a conventional diesel-electric system, similar to conventionally powered manned submarines, and will provide an operating range of 6500 miles. While progress continues to be made in this space, unless the demand for power is adequately met, energy density will be a limiting factor in unmanned undersea operations.

Autonomy
Without reliable, high-bandwidth communication enabling ongoing, real-time communication with operators, unmanned undersea systems will rely heavily on autonomy and artificial intelligence, and as operations increase in sophistication, intensity and complexity, the greater will be the need for trustworthy systems that can "OODA" in a dynamic and challenging environment. The U.S. Navy is developing the Unmanned Maritime Autonomy Architecture, a set of common interface controls and core software technologies for autonomous maritime systems, while CMRE is developing an open architecture for the development of task algorithms in networked UUVs. Many questions and uncertainties surround the deployment of artificial intelligence, particularly in the service of military operations. Even the very definition of autonomy/AI is the subject of some debate.

BLUE CONOPS ARE MANIFOLD

The range of Blue concepts and ideas is quite extensive, and will continue to evolve. What follows are the best representations of what the future holds.

Submarine Launch and Recovery
UUVs are launched and recovered via torpedo tube, the Virginia Payload Module or an SSGN missile tube using the Universal Launch and Recovery Module (ULRM). The current RFP for a consolidated (Kingfish and Razorback) MUUV calls for two variants, an expeditionary MCM variant, and one for submarine launch and recovery, ostensibly for ISR or ASW (or, eventually, CUUV and Strike) and deployed in a manner envisioned by DARPA's Mobile Offboard Clandestine Communications & Approach. The ULRM may also be used to deploy XLUUVs in accordance with the Advanced Undersea Warfare System (see below).

“Moor-Pedos”
In the December, 2019 issue of USNI Proceedings, retired USN Commander Brian Dulla outlined the concept of a "Moor-Pedo," essentially a dormant autonomous mine that is moored to the seabed in international waters and activated upon receiving a signal via surface buoy. The U.S. Navy is currently developing a moored torpedo system called Hammerhead, which borrows heavily from the Mark 60 CAPTOR mine, utilizing an encapsulated Mk 54 torpedo integrated with advanced sensors and signal processing. The line between torpedo, mine, and unmanned vehicle will continue to blur until the three converge into a single platform.

Undersea Swarms
Aerial drone swarms are widely expected to transform warfare, and will soon be fully operationalized. Undersea swarms, while possible, will be limited by environmental conditions and technological capability, as swarming requires ongoing, real-time communication. SwarmDiver is a collaborative USV/UUV platform developed by Australian company Aquabotix, which demonstrates the viability swarming in a maritime environment.

Strikepods
Envisioned by Strikepod Systems, a Strikepod is a distributed network of UUVs (Atom-class microsubmarines) programmed to execute missions of varying scale and complexity, and can be comprised of any number of vehicles depending on the nature of the mission at hand. A Strikepod is similar to a swarm in that the vehicles are working together to accomplish a common mission, but different in that there is a hierarchical relationship between the component vehicles. There are three variants or "modes" of the Atom-class:

Each vessel is mode-configured prior to deployment, but is capable of dynamically reconfiguring on the fly, providing adaptability, redundancy, and expendability. Working within a broader grid of ships, manned/unmanned submersibles, seabed sensors, Strikepods would provide near-complete undersea situational awareness, persistent access to denied areas, and wide operating coverage. A Strikepod represents the convergence of several missions under one platform - ISR, ASW, MCM, offensive mining, and undersea strike.

Hydra
DARPA's Hydra is an umbrella "concept of concepts" that envisions using large or extra-large vehicles to transport and deploy a range of undersea payloads such as small UUVs, seabed sensors, mines, Forward Deployed Energy and Communications Outposts (FDECOs), or Upward Falling Payloads (UFPs).

Transformational Reliable Acoustic Path System (TRAPS)
Developed under DARPA's Distributed Agile Submarine Hunting (DASH) initiative, TRAPS is a network of fixed, deep ocean sensor nodes, acting as "subullites" (ocean satellites) providing large fields of view to detect and localize submarines operating overhead. To complement this effort, DARPA has also developed a mobile platform, the Submarine Hold-at-Risk (SHARK) UUV. TRAPS would complement the numerous seabed sensor systems already in place through the IUSS, including the Fixed Distributed System (FDS) and SURTASS.

Advanced Undersea Weapons System (AUWS)
At least ten years in the making, AUWS is a unified vision of the U.S. Navy's thinking with regard to unmanned undersea systems, and is indicative of the renaissance happening in mine warfare. The concept envisions a flexible, scalable, integrated network of sensors, communications, vehicles, and effectors that can be deployed anywhere, anytime, via an XLUUV "truck" deployed from an SSGN Universal Launch and Recovery Module, or a Virginia Payload Module. An NPS report can be found here.

auws

Forward Deployed Energy and Communications Outpost (FDECO)
A FDECO is a network of undersea communications, recharging, and data transfer infrastructure enabling persistent coverage in a forward area where the deployment and recovery of UUVs could be hazardous to manned platforms.

Screen-Shot-2020-06-17-at-8.47.44-AM

Mine Countermeasures/Disposal
A mission rather than a concept of operation, MCM has received perhaps the most attention over the past five years, as this is an area where unmanned systems could provide the most immediate and tangible payoff by removing sailors from the minefield, greatly reducing the risk to both man and machine. CONOPS involve the standoff launch and recovery of UUVs or ROVs via manned surface platforms, or completely unmanned USV/UUV integrations that provide mine detection, localization, and neutralization.

The Raytheon Barracuda mine neutralization system.

RED CONOPS ARE ELUSIVE

While little has been expressly written regarding concepts for deployment and operation of unmanned undersea systems, a review of open source materials reveals that our adversaries are considering similar designs for the undersea domain.

China: "The Underwater Great Wall"

The "Underwater Great Wall" was proposed by China State Shipbuilding Corporation as an effective means to realize China's A2AD aspirations for the South China Sea - essentially an integrated barrier of UUVs, seabed sensor arrays, energy stations, and data processing nodes, networked together to provide real-time data and intelligence to surface and land-based commanders. Not surprisingly, the Underwater Great Wall borrows heavily from U.S. CONOPS, specifically FDECO, but it is reasonable to assume that the network will incorporate gliders and HSU-001 as well. It is also reasonable to assume that the PLAN will continue to borrow heavily from USN concepts, and thus we may look to our own technologies and concepts as a way to forecast what the PLAN may roll out in the future.

underwater_wall-1
The Underwater Great Wall.

China: The Blue Ocean Information Network"
China has established a network of fixed and floating outposts in the region between Hainan Island and the Paracels. While the stated purpose is environmental monitoring, the military implications are clear. Only surface structures are visible (referred to as "Ocean E-Stations," "integrated information platforms," and "island reef-based integrated information systems"), but a paper published in the Chinese Academy of Science's Journal of Automation suggests that the Network will eventually be comprised of sensory arrays, UUVs, USV, and associated energy/data/communications systems and infrastructure. See the CSIS/AMTI full report here.

Russia: Multipurpose Oceanic System
Much attention has been given to Poseidon, variously described as an autonomous, intercontinental, nuclear-powered, nuclear-armed UUV/torpedo. Poseidon is part of Russia's somewhat (perhaps deliberately) ambiguous "Multipurpose Oceanic System," which appears to refer primarily to the Poseidon-Khabarovsk and Skif (a seabed variant of Poseidon) platforms. Russia is also aggressively developing a range of small and medium UUVs intended for ISR, ASW, MCM, and even attack/strike, as well as a SOSUS-like Arctic sensor array codenamed Harmony. It would seem that Russia's vision for the undersea is, like the United States and China, an integrated network of manned submarines/submersibles, UUVs, and seabed infrastructure.

VARIATIONS ON A THEME: A UWSN

Whether of Blue or Red origin, each undersea CONOPS is a form of underwater wireless sensor network, or UWSN, the framework for a broader Internet of Underwater Things (IoUT). Much as the Internet of Things (IoT) will connect objects of everyday living, and the Internet of Battlefield Things (IoBT) will improve Army situational awareness by connecting an array of sensors and analytic devices, the IoUT will connect a network of vehicles, sensors, energy depots, data processing centers, communications nodes, and related infrastructure in order to gather and transmit information through the water column.

roundtable_presentation-2
An Underwater Wireless Sensor Network

Much as RF wireless sensor networks have enlarged the attack surface for malicious actors, the deployment of UWSNs and their integration into the broader undersea warfare framework will significantly expand the maritime attack surface for Blue and Red alike. This has particular implications for the U.S. Navy as it moves toward operationalizing Distributed Maritime Operations (DMO).

NETWORK THREATS WILL ABOUND

Like any wireless network, a UWSN presents numerous points of entry for malicious actors to exploit. Given increasing communications and data transmissions, shared protocols, open network architectures, and an opaque operating environment, there will be numerous attack vectors available to both Blue and Red in the undersea domain. While there is some overlap, these operations break down roughly into three categories: physical/kinetic, intrusion, and deception.

Physical/Kinetic
While not expressly a cyber operation, a kinetic attack on cyber infrastructure could be just as damaging if not more so, as the physical destruction could greatly prolong the recovery process.

Intrusion
An intrusion attacker seeks access to a network with the intent to eavesdrop, access data, or otherwise destabilize the network through the introduction of worms, trojans, spyware, or a flood of traffic. Some ways a UWSN could be compromised by intrusion include:

Deception
"All warfare is based on deception." In the coming era of information dominance, autonomous systems, and artificial intelligence, Sun Tzu's words will perhaps come to resonate more than ever. In the challenging undersea domain, the need to leverage, and counter, deception and manipulation will be enhanced by the tools and techniques of cyber warfare, including:

STRATEGIC IMPLICATIONS

Manned submarines will be increasingly vulnerable to cyber operations as unmanned vehicles and seabed infrastructure become fully integrated into undersea warfare operations via UWSNs.

Due to infrequent and short-burst communications, submarines have historically been less vulnerable to cyber threats, with their main risk exposure coming from manufacturers and contractors. (But they are sometimes mistakenly believed to be air gapped, and therefore largely immune.) As submarines increasingly deploy and recover UUVs and seabed infrastructure via torpedo tube, DDS, or the Virginia Payload Module (VPM), and communicate and share data via acoustic transmissions, the cyber vulnerability of manned platforms will increase dramatically.

Through targeted cyber operations, an adversary could employ UUVs to deceive a host UWSN into falsely sensing the presence of an SSN or SSBN, thereby eliciting a strategic reaction on the part of the host.

Submarine intrusions have historically been used for strategic signalling or to influence national political opinion. The Soviets (in the 1980s) and Russia (in 2014) invaded Swedish waters. Periscopes (presumably Russian) have been sighted by fisherman off the coast of Scotland, not far from Faslane. In 2006, and during a visit to China by then-Pacific Fleet Commander and future CNO Gary Roughead, a Chinese Song-class submarine surfaced just five miles from the USS Kitty Hawk. While these intrusions have (mostly) been observable, it could be possible to use unmanned systems acting covertly to emulate the presence of manned submarines either through intrusion (malware) attacks, or through a hybrid EW-cyber decoy operation. Thus, it could be possible, for example, for a Russian UUV to deploy in Chinese territorial waters to emulate the signature of a Virginia-class submarine to foment a crisis. Or for a U.S. UUV to deploy in Russian territorial waters to emulate the signature of a Chinese Yuan-class submarine to drive a wedge between Russia and China.

Red's expanding undersea presence combined with the development and proliferation of increasingly sophisticated underwater technologies will foster gray zone operations in the undersea domain.

With its trademark deniability and non-attribution, the gray zone utility of cyber operations is well known, and it will continue into the undersea domain. But given the vast, opaque, and largely unmonitored nature of the undersea, cyber operations conducted there may enjoy a kind of "double cover" in that the adversary will enjoy a freedom to exploit both virtual and physical attack vectors while benefitting from anonymity. For example, a state-sponsored actor could use a COTS ROV to attack a seabed server container, resulting in data and equipment destruction, market turmoil, and political-economic uncertainty. Russia could insert a malicious node (UUV) into a Dynamic Mongoose exercise and execute a Man-in-the-Middle attack to gather SIGINT related to NATO undersea communications. The undersea environment would render these attacks, and their resulting cyber effects, largely untraceable.

UWSNs will give rise to a host of new vulnerabilities and threats, greatly expanding the U.S. Navy's attack surface, and introducing an array of new attack vectors.

Unmanned undersea operations will effectively open a new front in cyber operations. This has particular implications for DMO - a system of systems / network of networks, with a high degree of integration between systems, forces, domains. Moreover, while perhaps the stuff of science fiction, it is not beyond the realm of reality to envision a single artificial intelligence that is distributed across platforms and domains to integrate operations within a single command and control entity. In my Admiral Lacy oral history series, there is an AI, "Falken," that oversees the integrated autonomous operations of unmanned surface and unmanned undersea vehicles (Part II, Part III). An overarching Chinese AI, dubbed "Laoshi," was featured in a recent RAND wargame to test assumptions regarding the use of artificial intelligence in conflict. Thus, while the "mainstream" cyber implications of DMO generally may be quite evident, the enlarged attack surface engendered by unmanned undersea operations, as well as the integrated AI that they could inspire, may not.

CONCLUSION

The proliferation of underwater wireless sensor networks and the coming Internet of Underwater Things will give rise to new cyber threats, vulnerabilities, and opportunities, exposing new virtual and physical attack vectors in an environment that offers both anonymity and deniability. Although significant technological barriers to entry will persist in the short term, they will continue to erode as market forces and security considerations drive innovation forward. It is critical to anticipate and understand how cyber operations will unfold in this unique and challenging environment, as well as the broader strategic challenges they will present.

alt

  • LinkedIn
  • Tumblr
  • Reddit
  • Google+
  • Pinterest
  • Pocket