Back to news

July 14, 2020 | Local, Aerospace

Canada’s Secret Cold War Submarine Drone Is Still Relevant Today

Extra-large autonomous submarines may revolutionize intelligence gathering and espionage under the sea. One of these ground breaking projects is the U.S. Navy's Boeing Orca extra-large uncrewed underwater vehicle (XLUUV). It is much larger than any other underwater drone currently in the water. But there is a historical precursor that, despite its epic Cold War story, is not widely known. And its mission, to lay covert sensor networks in the arctic, may be as relevant today as it was then.

During the Cold War, NATO believed that Russian submarines were using the ice cap in the Canadian Arctic as cover to covertly move between the Atlantic and Pacific. So the U.S. and Canada placed a special sonar network there, deep under the ice. Canadian engineers had to build the world's largest autonomous underwater vehicle (AUV), Theseus, to lay a cable where ships could not reach.

The project started in the 1980s, at a time when Russian submarines were getting much quieter. To listen for them, a joint U.S. and Canadian sonar array was to be placed several hundred miles north of the remote Canadian base at CFS Alert. The array was codenamed Spinnaker, in honor of the bar where scientists made many of the unclassified decisions in the project. This was similar to the now-famous SOSUS (Sound Surveillance System), but used classified technology to match its operational circumstances. In fact it must have been much more advanced than the original SOSUS.

Connecting the sonar array to the base would require laying a fiber-optic cable for hundreds of miles under permanent ice cap. The solution was to build the world's largest autonomous underwater vehicle. The uncrewed submarine would swim from an ice hole nearer to the base all the way to the Spinnaker array. As it went the cable would unreel out of the back. Thus ‘Theseus' got its name from the mythical hero of Ancient Greece who trailed thread behind him when he ventured into the labyrinth to fight the Minotaur.

When we think of advanced Canadian military projects which were ahead of their time, the Avro Canada CF-105 Arrow springs to mind. That delta-winged Mach-2 fighter flew in the 1950s and was cutting edge technology at the time, one of the all-time great aircraft. But it was cancelled abruptly in 1959 before it could enter service. The Theseus AUV is up there with the Avro Arrow, but less well recognized. And unlike the Arrow, it was used operationally, in one of the boldest projects started during the Cold War.

The project had many secret aspects. Years later much of what we know about the project comes from Bruce Butler, one of the core team involved. Bulter has written a book, Into the Labyrinth (on Amazon), and recently talked to the Underwater Technology Podcast about the project.

Theseus was 35 feet long and about 4 feet across. In AUV terms this is large, even today. In modern naval terminology it would be categorized as a large-displacement uncrewed underwater vehicle (LDUUV).

The Spinnaker sonar system was placed on the sea floor right on the edge of the arctic shelf. It was about 84 degrees north, up in the top right-hand corner of Canada, near to Greenland. Such an advanced project took years to realize, so it was not until spring 1996 when Theseus could go to work laying the cable. The whole operation was pushing the boundaries of uncrewed underwater vehicles at the time. Despite some close calls along the way, Theseus was able to navigate to the Spinnaker, letting out the vital thread as it went.

Many details of the project and technology involved are still classified. And we may never know whether Spinnaker ever picked up any Russian submarines. By the time it had been laid the Russian Navy was in steep decline following the end of the Cold War.

But with a resurgent Russian Navy today, the relevance of systems like Spinnaker may be greater than ever. And one of the roles which large submarine drones like the Orca might do is lay cables on the sea floor, unseen from above. Historical precedents like Theseaus can help us understand the way that these might be employed, and the challenges that they will face.

https://www.forbes.com/sites/hisutton/2020/07/12/canada-secret-cold-war-drone-submarine-is-still-relevant-today/#121a2da51e96

On the same subject

  • Les militaires du monde s’intéressent aux recherches sur le givre de l’UQAC

    February 12, 2018 | Local, Aerospace, Naval, Land, C4ISR

    Les militaires du monde s’intéressent aux recherches sur le givre de l’UQAC

    Vingt-deux conseillers militaires de dix-neuf pays sont dans la région ces jours-ci pour visiter le Laboratoire international des matériaux antigivre (LIMA) de l'UQAC, le seul laboratoire au monde qui se spécialise sur la question. Car le givre est un ennemi contre lequel bombes, obus, balles et autres projectiles sont généralement inefficaces, alors que sa présence peut constituer une sérieuse menace. « On a beaucoup de conseillers militaires étrangers qui sont des pilotes, ou qui sont rattachés d'une façon comme d'une autre à l'aviation », précise le capitaine Christian Courtemanche, officier de liaison diplomatique au sein des Forces canadiennes. « Le dégivrage d'avion, et le dégivrage d'ailleurs de vaisseaux maritimes et tout, c'est quelque chose qui intéresse tous les pays, surtout avec les changements climatiques des dernières décennies. » Et contrairement à ce qu'on pourrait croire, le givre n'est pas un problème limité aux pays froids. « Le problème de givrage en aviation ce n'est pas seulement pour les pays nordiques parce que ça se passe à haute altitude », ajoute le lieutenant-colonel Marc Ferron, directeur de liaison avec l'étranger. « Donc ça affecte pas mal toutes les forces armées représentées ici. » L'intérêt que portent les militaires aux travaux du LIMA réjouit le directeur du laboratoire. "Ils voient ce qu'on est en mesure de faire ou de proposer. Donc je pense que ça peut dans le futur, amener à certaines collaborations." Christophe Volat, directeur du LIMA C'est ce que croit aussi le lieutenant-colonel Ferron. « Les attachés militaires sont très impressionnés par ce qu'ils ont vu », assure-t-il, soulignant que son rôle est justement de favoriser ce genre d'échanges. http://ici.radio-canada.ca/nouvelle/1083357/givre-uqac-armee

  • All-volunteer cyber civil defence brigade assembles to fight COVID-19 hackers

    March 26, 2020 | Local, C4ISR, Security

    All-volunteer cyber civil defence brigade assembles to fight COVID-19 hackers

    Number of online attacks on health care institutions jumped 475 per cent in one month, says one report Murray Brewster Civil defence used to involve air raid wardens, ambulance drivers and rescue teams. That was at the height of the Cold War, and the hot wars of the 20th century that preceded it. These days, it means taking the fight online — against hackers and cyber criminals looking to take down or ransom critical infrastructure, such as hospitals. The COVID-19 crisis has prompted Canadian IT professionals to form an all-volunteer cyber defence team to protect Canada's hospitals, health-care providers, municipalities and critical infrastructure from online attacks during the COVID-19 crisis. The SecDev Group, which has pioneered advanced analytics and cyber safety, has been spearheading the recruitment effort and has asked information technology professionals to step up and provide preventative measures and remedial services. 'Preying on fear' "Hackers are targeting hospitals and health care providers, preying on their distraction, fear and anxiety and their hope for a cure," said Rafal Rohozinski, principal and CEO of the SecDev Group "Posing as public health officials from the World Health Organization, [the] Centers for Disease Control and UNICEF, cyber criminals are flooding hospitals, medical laboratories, vaccine testing facilities, municipalities and critical service providers with phishing emails, forcing some to shut down." Trudeau leaves door open to using smartphone data to track Canadians' compliance with pandemic rules Twelve companies and associations have signed on to the initiative. Together, they plan to set up a secure online exchange to match high-tech professionals — who will volunteer their services free of charge — with agencies and institutions that need help to shore up their cyber protection, or to deal with an intrusion. "It's both a patriotic and public service reflex," said Rohozinski. "If the internet goes down, and in particular if critical institutions that we count on — like hospitals, like cities, like utilities — start to be ransomed or start to go down because of cyber malfeasance, we're all in a lot of trouble." The exchange website is still in the process of being built, but Rohozinski said it will launch within days. Online attacks exploded since pandemic began Across the globe, the number of coronavirus-related attacks on health-care institutions has increased by 475 per cent in just the past month, according to a SecDev Group assessment. At the moment, no Canadian hospitals or institutions have reported being attacked. Rohozinski said there have been signs of trolling by both cyber criminals and so-called "state actors" — including some of the Russian groups identified by U.S. intelligence as being behind the tampering in the 2016 presidential election. The Communications Security Establishment (CSE), Canada's electronic intelligence service, has said it has taken down some fake websites that were posing as government departments and institutions and trying to scam people. The U.S. Health and Human Services Department was recently targeted and the FBI has warned that hospitals in the states with the highest rates of infection — California, New York and Washington — should be on the alert for attacks from foreign actors. Hammersmith Medicines Research, a British company that is on standby to perform medical trials on any potential COVID-19 vaccine, was hit with an online attack last week, according to published reports. Over the last few days, according to a Bloomberg news report, hackers targeted hospitals in Paris with a major cyberattack. A hospital in the Czech Republic was also hit last week in what is thought to have been a ransomware attack, which forced administrators to take the network offline. Forbes Magazine reported late last week that the cybercrime groups behind the DoppelPaymer and Maze ransomware threats had promised not to target health care organizations during the COVID-19 crisis — but at least one of the groups was reportedly linked to a recent attack. Remote work networks are vulnerable An executive at one of the companies now volunteering for the cyber civil defence initiative said one area where institutions likely need help is in protecting the virtual private networks (VPNs) of employees who've been forced to work from home because of the crisis. Robert Mazzolin, the chief cyber security strategist at the RHEA Group, said the VPN systems used by most hospitals, power plants and other utilities were never designed to support so many secure connections outside the workplace. "The world is fundamentally different than it was a week ago and I don't think any large corporation or institution realistically would have been prepared to see virtually its entire workforce be working from home via remote connections," said Mazzolin, a former brigadier-general who was responsible for cyber operations in the Canadian military. Canada's cyber spies taking down sites as battle against COVID-19 fraud begins Canada's health sector at risk of cyberattacks as COVID-19 fear spreads: CSE "That places a large stress on an institution's communications workforce. The threats out there, including ransomware — it's important to be able to defend VPNs that are stretched well beyond their normal capacity and limits." He said his company and staff, who regularly work for the European Space Agency, will be able to provide insight and capability that will complement existing networks. The mandate of CSE is to protect the federal government's electronic network and — through its cyber security centre — to provide advice and guidance to people and businesses looking for cyber security information. Rohozinski said there's a difference between providing advice and actively helping in the defence and the initiative has CSE's support. https://www.cbc.ca/news/politics/covid19-cyber-companies-1.5508570

  • Canadians won't be allowed to work on portions of new Canadian spy planes because of U.S. security regulations

    December 26, 2019 | Local, Aerospace

    Canadians won't be allowed to work on portions of new Canadian spy planes because of U.S. security regulations

    DAVID PUGLIESE, OTTAWA CITIZEN Canadians won't be allowed to work on parts of the country's new surveillance aircraft because they contain sensitive American-made equipment that can only be handled by U.S. citizens. Maintenance of the equipment, installed in new planes that will be operated by Canadian special forces, will be off-limits both to Canadian military personnel and Canadian aerospace workers. Instead, the gear or the aircraft will have to be sent to the U.S. for maintenance or U.S. government staff will have to travel to Canada to work on the planes. The equipment is subject to strict U.S. security regulations. Canadian special forces are to receive three surveillance aircraft from the U.S. government. The planes are expected to arrive in spring 2022. The Beechcraft King Air planes, to be based at CFB Trenton, will be outfitted with sensors and equipment to intercept cellphone and other electronic transmissions, and track individuals and vehicles on the ground. Canadian special forces and, potentially, other federal government departments and the RCMP will use the aircraft for missions overseas and in Canada. Canada is paying the U.S. government $188 million for the aircraft. The overall value of the project is estimated to be $247 million. The funding includes the acquisition of the aircraft and prime mission equipment from the U.S., and an initial portion of the associated in-service support of the planes. The main contractor is Beechcraft in Wichita, Kan. The maintenance plan for the sensitive equipment that only Americans can work on has yet to be put in place, but the Canadian military is hoping it won't disrupt aircraft operations too much. “Arrangements for the maintenance of certain specialized equipment are not yet in-place; therefore, details and costs are not known at this time,” Public Services and Procurement Canada spokeswoman Stéfanie Hamel noted in an email. “However, Canada will ensure the sustainment strategy supports continued operations while maintenance is underway.” The government has not provided details on what parts of the aircraft are covered by the U.S. security regulations. Another in-service support contract, for the aircraft themselves and related mechanical equipment, will also be put in place. Canadians will be able to do that work. A request for proposals from Canadian firms for that work is expected to be issued in January or February. The contract would cover maintenance and support over a 20-year period. Canadian aerospace firms had originally wanted to provide the aircraft and on-board equipment, and in 2013 a number of companies responded when the federal government initially outlined its need for such planes. But the Canadian military decided it needed the planes more quickly than they believed Canadian companies could deliver. The military was also concerned there could be delays if the on-board sensor equipment used was subject to U.S. security regulations. The Canadian companies, however, felt they could meet the military's needs with Canadian-made equipment that wouldn't be covered by U.S. regulations, allowing Canada more flexibility. But the Canadian government instead opted for the American-made solution, which had also been used by Canadian special forces in Afghanistan. The agreement for the aircraft was finalized on April 26, 2019 with the U.S. government. Canadian special forces personnel recently trained with similar surveillance aircraft operated by the U.S. In mid-November members of 427 Special Operations Aviation Squadron and the Canadian Special Operations Regiment, both based in Petawawa, conducted an exercise supported by one of the American aircraft. The U.S. plane operated from the Ottawa airport, and flights occurred between Petawawa and Mansfield-et-Pontefract, Que., according to Canadian special forces. “The intent was to conduct a training and needs assessment to ensure the appropriate personnel are trained and equipped to support the arrival of three Beechcraft King Air 350ER as part of the command's Manned Airborne Intelligence, Surveillance and Reconnaissance project,” Maj. Amber Bineau, spokesperson for Canadian Special Operations Forces Command, said in an email. https://ottawacitizen.com/news/national/defence-watch/canadians-wont-be-allowed-to-work-on-portions-of-new-canadian-spy-planes-because-of-u-s-security-regulations

All news