10/30/2011

Underwater Drones Planned By US Military


Autonomous Underwater Vehicles, AUV's, seen aboard a High Speed Vessel are being tested by the US Military. 
By LEE FERRAN
Oct. 27, 2011

When foreign spies set their sights on America's secrets, many times they're not looking underground for secret bunkers or in the sky formassive spy blimps, but under the sea at the nation's low-profileunderwater drone fleet.
According to some of the military's top counterintelligence analysts, in recent years there has been a significant increase in both old school spying and cyber operations, especially by unnamed East Asian nations, directed at gaining classified information on America's autonomous underwater vehicles (AUVs) in hopes of undercutting the U.S.'s "underseas battlespace dominance."
"The technology base of the United States is under constant attack," a new report by the Counterintelligence Directorate of the Pentagon's Defense Security Service says. "This pervasive and enduring threat is like the weather: ever-present, yet ever changing."
The maritime drones, which have been stalking the world's oceans for more than a decade for the U.S. Navy, are capable of a variety of missions including enemy craft and port surveillance, anti-mine operations and even "payload delivery", according to the Navy.

The DSS report is compiled annually based on incident reports by private U.S. contractors who say they've had suspicious contact with a foreign entity that expressed interest in classified technology. The report covers several popular targets for espionage -- from U.S. information systems to space technology -- but singled out the underwater drones this year as a "special focus area" because it has shown to be a "growing collection area".
The DSS predicts foreign production of AUVs to swiftly increase and, along with it, interest in stealing related U.S. technology.
READ: Defense Security Service Report on Targeting U.S. Technologies (PDF)

How They Spy: From Long-Term Plots and Cyber Ops to Just Asking:
Regardless of the target, the DSS reported a "stunning increase" of 140 percent in "suspicious contact reports determined to be of intelligence value" from last year alone. As to how the foreign entities try to get the information on any target from contractors, the DSS report describes much less Mission Impossible-esque sneaking through air ducts and a lot more flat out asking for it.
The DSS said that by far the most popular way to gain access to classified data is for foreign agents to directly request it "under the guise of price quote or purchase request, marketing surveys, or other direct and indirect efforts." Often, it's foreign companies that request the information, but the DSS suspects the technology would quickly be turned over to the host government and "would probably find its way to military applications."
That's not to say that other nations are not playing a longer game, however. The DSS notes that some plots from all corners of the globe involve agents attempting to land a job in the target contractor's organization so they can eventually leak information first hand.
There has also been a significant increase in aggressive cyber operations around the world, especially in the East Asia region. There, suspicious cyber activity made up more than 25 percent of all reported incidents in FY 2010, up from 11 percent in 2009.

No comments:

Post a Comment