Foreign Spies Target Underwater Drone Fleet, Military Spooks Say

PHOTO: Autonomous Underwater Vehicles, seen aboard a High Speed Vessel are being tested by the US Military.

When foreign spies set their sights on America's secrets, many times they're not looking underground for secret bunkers or in the sky for massive spy blimps, but under the sea at the nation's low-profile underwater drone fleet.

According to some of the military's top counterintelligence analysts, in recent years there has been a significant increase in both old school spying and cyber operations, especially by unnamed East Asian nations, directed at gaining classified information on America's autonomous underwater vehicles (AUVs) in hopes of undercutting the U.S.'s "underseas battlespace dominance."

"The technology base of the United States is under constant attack," a new report by the Counterintelligence Directorate of the Pentagon's Defense Security Service says. "This pervasive and enduring threat is like the weather: ever-present, yet ever changing."

The maritime drones, which have been stalking the world's oceans for more than a decade for the U.S. Navy, are capable of a variety of missions including enemy craft and port surveillance, anti-mine operations and even "payload delivery", according to the Navy.

The DSS report is compiled annually based on incident reports by private U.S. contractors who say they've had suspicious contact with a foreign entity that expressed interest in classified technology. The report covers several popular targets for espionage -- from U.S. information systems to space technology -- but singled out the underwater drones this year as a "special focus area" because it has shown to be a "growing collection area".

The DSS predicts foreign production of AUVs to swiftly increase and, along with it, interest in stealing related U.S. technology.

READ: Defense Security Service Report on Targeting U.S. Technologies (PDF)

Follow BrianRoss on Twitter

How They Spy: From Long-Term Plots and Cyber Ops to Just Asking

Regardless of the target, the DSS reported a "stunning increase" of 140 percent in "suspicious contact reports determined to be of intelligence value" from last year alone. As to how the foreign entities try to get the information on any target from contractors, the DSS report describes much less Mission Impossible-esque sneaking through air ducts and a lot more flat out asking for it.

The DSS said that by far the most popular way to gain access to classified data is for foreign agents to directly request it "under the guise of price quote or purchase request, marketing surveys, or other direct and indirect efforts." Often, it's foreign companies that request the information, but the DSS suspects the technology would quickly be turned over to the host government and "would probably find its way to military applications."

That's not to say that other nations are not playing a longer game, however. The DSS notes that some plots from all corners of the globe involve agents attempting to land a job in the target contractor's organization so they can eventually leak information first hand.

Click Here to Sign Up for Breaking News and Investigation Alerts From The Brian Ross Investigative Unit

There has also been a significant increase in aggressive cyber operations around the world, especially in the East Asia region. There, suspicious cyber activity made up more than 25 percent of all reported incidents in FY 2010, up from 11 percent in 2009.

"This region [East Asia] has a bold and aggressive agenda and conducts multifaceted, pervasive, and innovative collection efforts," the report says.

Page
  • 1
  • |
  • 2
Join the Discussion
You are using an outdated version of Internet Explorer. Please click here to upgrade your browser in order to comment.
blog comments powered by Disqus
 
You Might Also Like...
See It, Share It
PHOTO: Left, Sabrina Allen, 4, is shown in this photo provided by the National Center for Missing and Exploited Children; right, Sabrina Allen, 17, is seen in this undated handout photo.
National Center for Missing and Exploited Children|Courtesy of PI Phillip Klein
Kelly Ripa
Seth Poppel/Yearbook Library
PHOTO: Earths moon is pictured as observed in visible light, left, topography, center, and the GRAIL gravity gradients, right.
NASA/GSFC/JPL/Colorado School of Mines/MIT