14 avril 2020 | International, Naval

US Navy should turn to unmanned systems to track and destroy submarines

By: Bryan Clark

Anti-submarine warfare, or ASW, is one of a navy's most difficult missions. Sonars detect submarines with only a fraction of the range and precision possible using radars or visual sensors against ships above the water. Submarines can carry missiles able to hit targets hundreds of miles away, requiring searches to cover potentially vast areas. And the torpedoes that aircraft and surface ships use to sink submarines need to be dropped right on the submarine to have any chance of sinking it.

These challenges led the Cold War-era U.S. Navy to rely on a sequential approach for tracking enemy submarines. Electronic or visual intelligence sources would report when an opposing sub was leaving port, and it would hopefully get picked up by sound surveillance, or SOSUS — sonar arrays on the sea floor — as it entered chokepoints, like that between Iceland and the United Kingdom.

Patrol aircraft would then attempt to track the submarine using sonar-equipped buoys, or sonobuoys, and eventually turn it over to a U.S. nuclear attack submarine, or SSN, for long-term trail.

The U.S. ASW model broke down, however, in the decades following the Cold War as U.S. submarine and patrol aircraft fleets shrank, the Chinese submarine fleet grew, and Russian submarines became quieter. Today, the U.S. Navy devotes enormous effort to tracking each modern Russian submarine in the western Atlantic.

During the 2000s, the strategy of full-spectrum ASW started an essential shift in goals, from being able to sink submarines when needed to being able to defeat submarines by preventing them from accomplishing their mission.

Full-spectrum ASW and other current concepts, however, still rely on aircraft, ships and submarines for sensing, tracking and attacking enemy submarines to bottle them up near their own coasts or sink them in the open ocean. Although SOSUS has improved since the Cold War and is joined by a family of new deployable seabed arrays, the next link in the U.S. ASW chain is still a P-8A Poseidon patrol aircraft, an Arleigh Burke-class guided-missile destroyer, or a U.S. SSN. These platforms are in short supply around the world, cost hundreds of millions to billions of dollars to buy and cost hundreds of thousands of dollars a day to operate.

With defense budgets flattening and likely to decrease in a post-COVID-19 environment, the U.S. Navy cannot afford to continue playing “little kid soccer” in ASW, with multiple aircraft or ships converging to track and destroy submarines before they can get within missile range of targets like aircraft carriers or bases ashore.

The Navy should instead increase the use of unmanned systems in ASW across the board, which cost a fraction to buy and operate compared to their manned counterparts. Unmanned aircraft could deploy sonobuoys or stationary sonar arrays, and unmanned undersea or surface vehicles could tow passive sonar arrays. Unmanned surface vehicles could also deploy low-frequency active sonars like those carried by U.S. undersea surveillance ships that can detect or drive off submarines from dozens of miles away.

Although autonomous platforms will not have the onboard operators of a destroyer or patrol aircraft, improved processing is enabling small autonomous sensors to rapidly identify contacts of interest. Line-of-sight or satellite communications can connect unmanned vehicles and sensors with operators ashore or on manned ASW platforms.

A significant shortfall of today's ASW concepts is “closing the kill chain” by attacking enemy submarines. Air- or surface-launched weapons have short ranges and small warheads that reduce their ability to sink a submarine, but their cost and size prevents them from being purchased and fielded in large numbers.

Unmanned systems could address this shortfall in concert with a new approach to ASW that suppresses enemy submarines rather than destroying them. During World War II and the Cold War, allied navies largely kept submarines at bay through aggressive tracking and harassing attacks, or by forcing opposing SSNs to protect ballistic missile submarines.

The modern version of submarine suppression would include overt sensing operations combined with frequent torpedo or depth-bomb attacks. Although unmanned vehicles frequently launch lethal weapons today under human supervision, the small weapons that would be most useful for submarine suppression could be carried in operationally relevant numbers by medium-altitude, long-endurance UAVs or medium unmanned surface vessels. Moreover, the large number and long endurance of unmanned vehicles would enable the tracking and suppressing of many submarines over a wide area at lower risk than using patrol aircraft or destroyers.

Today the U.S. Navy uses unmanned systems in ASW primarily to detect submarines. To affordably conduct peacetime surveillance and effectively defeat submarines in wartime, the Navy should increase the role of unmanned systems. Using manned platforms to conduct command and control, and unmanned vehicles to track, deter and engage submarines, could significantly reduce the costs of ASW operations and enable the Navy to scale its ASW efforts to match the growing threat posed by submarine fleets.

Bryan Clark is a senior fellow at the Hudson Institute. He is an expert in naval operations, electronic warfare, autonomous systems, military competitions and war gaming.

https://www.defensenews.com/opinion/commentary/2020/04/13/us-navy-should-turn-to-unmanned-systems-to-track-and-destroy-submarines/

Sur le même sujet

  • The Air Force sends good guys in to hack its cloud

    8 août 2019 | International, Sécurité

    The Air Force sends good guys in to hack its cloud

    By: Andrew Eversden The Air Force invited ethical hackers into its IT networks again this spring, allowing good guys the chance to infiltrate its enterprise-wide Air Force Common Computing Environment in search of vulnerabilities, the white hat hacking company Bugcrowd announced Aug. 6. The bug bounty program, done in a partnership with Bugcrowd and the Air Force's CCE program office, found 54 vulnerabilities. Bug bounties work under the assumption that the customer, in this case the Air Force, will now close the loopholes the hackers found, making the system more secure. The CCE cloud uses Amazon Web Services and Microsoft's Azure commercial cloud. The service plans to migrate more than 100 applications to that cloud environment, Bugcrowd executives said. The largest payout from the bug bounty totaled $20,000. The event ran from March 18 to June 21 at Hanscom Air Force Base in Massachusetts. Casey Ellis, Bugcrowd founder and CTO, said it was the first time Bugcrowd has worked with the Air Force. The Air Force has completed several other white hat hacking events with the firm HackerOne. Ellis said that moving to the cloud from on-premise environment represents a “paradigm shift” for many organizations. Penetration testing is an important part of keeping that environment secure, he said. Bugcrowd conducted such tests in six phases: source code analysis, AWS environment testing, Azure environment testing, black box network authentication assessment, social engineering engagement and Air Force portal testing. Bugcrowd declined to discuss how many vulnerabilities were found throughout each stage of the process. According to a news release from the Air Force from April, the CCE currently houses 21 Air Force applications and "has room for countess more.” The computing environment allows the Air Force to have a cloud to host its applications that reside on its Global Combat Support System, which is a centralized, cohesive enterprise resource planning system. The Air Force said in the April release that each migration costs $446,000 and that the service has spent more than $136 million on the program since 2016. https://www.fifthdomain.com/dod/air-force/2019/08/06/the-air-force-sends-good-guys-in-to-hack-its-cloud/

  • French Navy bets on electronic warfare to counter anti-ship threats

    5 octobre 2022 | International, Naval

    French Navy bets on electronic warfare to counter anti-ship threats

    Industry is responding with technology meant to cover the entire spectrum of electronic-based ship protection, including measures of last resort.

  • US Army’s tactical network team looks to satellites for next iteration of tools

    4 septembre 2020 | International, C4ISR

    US Army’s tactical network team looks to satellites for next iteration of tools

    Andrew Eversden WASHINGTON — The U.S. Army's tactical network modernization team is considering using satellite communications as a service capability for the next iteration of new network tools set for delivery in fiscal 2023. The Army's Network Cross-Functional Team as well as Program Executive Office Command, Control, Communications-Tactical held a technical exchange meeting Sept. 2 to discuss with industry focus areas and goals for Capability Set '23, the next round of new network tools the Army plans to deliver to soldiers every two years. Col. Shane Taylor, program manager for the tactical network at PEO C3T, outlined several priority areas for his program office, including a satellite-as-a-service need that he said provides a “wide gamut of opportunity.” “The opportunity there is it could be anywhere from just leasing terminals to a cradle to [a] grave solution where we just say: 'All right, industry, if I need this capability in this location, what would that look like?' And so the challenge really in the near term is it's such a wide opportunity,” Taylor said. “There's a lot of work that you'll see us ask for some assistance going forward on that.” While Capability Set '21 centered on delivering technology to soldiers to address immediate network gaps, Capability Set '23 is working to increase capacity, bandwidth and resiliency of the Army's tactical network. Satellite communications is critical to that effort, Taylor said. “I'll keep hearkening back to resiliency, thickening, multi-path. SATCOM as a service also has a huge play in that role, and what I mean by that is it gives us just another opportunity to provide capability to the war fighter,” Taylor said. Brig. Gen. Rob Collins, head of PEO C3T, said at the meeting that satellites will be a major focus for cooperative research and development agreements with Combat Capabilities Development Command's C5ISR Center — or Command, Control, Communication, Computers, Cyber, Intelligence, Surveillance, and Reconnaissance Center. The Army is interested in the networking capabilities that satellites can provide. Collins said in August that the service expects low- and medium-Earth orbit satellites to reach technical maturity in 2025 or 2027. While the Army's tactical network team is exploring LEO and MEO capabilities, Taylor assured industry that traditional geosynchronous systems will still have a role to play. “I think they all have a role,” Taylor said. “But where we need industry's help is getting after the ability to leverage each of those capabilities without having to leverage three different types of systems.” Preliminary design review for Capability Set '23 is scheduled for April next year, with critical design review one year after that. Taylor said his team is also focusing on scalable and multi-band antennas so soldiers don't have to change out “feed horns” to change bands. The team also wants to automate the primary, alternate, contingency and emergency, or PACE, decision-making process based on network quality, metrics and availability, Taylor said. Project Manager Tactical Network is focusing on next-generation line-of-sight and beyond-line-of-sight communications capabilities as part of a pushing by PEO C3T is to improve low-probability intercept/low-probability detect for Capability Set '23. Additionally, Taylor said his team will “always” be looking for industry's help reducing cost, size, weight and power for the baseband. Taylor's program is also looking for solutions to system provisioning for the next iteration of network tools. “The initialization of the routers and switch[ing] the firewall [configurations] and then how we automate that process and move that out across the network continues to be a challenge.” https://www.c4isrnet.com/battlefield-tech/it-networks/2020/09/03/us-armys-tactical-network-team-looks-to-satellites-for-next-iteration-of-tools/

Toutes les nouvelles