What's new

A Rare Look into US Submarine Surveillance

SvenSvensonov

PROFESSIONAL
Joined
Oct 15, 2014
Messages
1,617
Reaction score
207
Country
United States
Location
Sweden
yrwibqwglktehib6cmis.png


Everyone saw the USS Annapolis come home last year. It returned, poignantly, on Sept. 11, and there was a seriousness amid the usual dockside fanfare—sailors meeting newborn children for the first time, a school band playing "Anchors Aweigh." But there was no mention of the boat's secret missions.

From March to September 2014, the U.S. submarine's 152-man crew cruised the deeps of the Mediterranean, Red Sea and Arabian Gulf, earning a earning a coveted Battle "E" for their efficiency in doing all the fleet had asked of them. Which involved ... what, exactly? They covered 34,000 nautical miles, participated in one multinational exercise, and made port calls in Portugal, Spain, Bahrain, and Gibraltar, according to official Navy reports.

There was something else, according to the sub's captain, Commander Chester T. Parks."During this time," he told reporters, "Annapolis completed four missions vital to national security."

Technically, his boat is a fast-attack submarine, responsible for tracking and killing enemy subs and surface ships when shit goes down. But the Annapolis was equipped for a very special top secret task, one that didn't involve its Mark 48 ADCAP torpedoes—or any shooting weapons at all. It was a mission that wasn't yet accomplished as the boat ported and the crew embraced their families on the dock at Submarine Base New London, Conn.

First, Parks and his team would have to brief some high-level NSA and CIA officials.

This jewel of the silent service, it turns out, is a very good listener.

Deep in the trove of National Security Agency documents leaked by Edward Snowden is a classified Powerpoint training presentation for workers at the Naval Information Operations Command Maryland—the Navy component of the NSA. The presentation explains the ins and outs of computer network exploitation (CNE) "to change or collect information residing on or transiting computer networks." To spy, that is, on any computer network anywhere—and not just to listen, but to manipulate and even shut it down.

The heavily redacted presentation includes an example of a "tailored access operations" target for these military hackers: an unidentified nation's president, Parliament, and military leaders:

bdrm3r5nrtcdij3gfdsw.png


CNE operators can do much more than that. It's part of a larger effort by the U.S. to "use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money," Der Spiegel wrote earlier this year.

The mainstream media has written extensively about Chinese and Russian government exploits in cyber-warfare, as well as the activities of renegade "hacktivists." But it is still the United States that rules supreme in the new battlespace, and the NSA is but one small slice of its digital offensive. It's actually the domain of the newly created U.S. Cyber Command. And while NSA conducts"global access operations" to penetrate non-military targets, the CIA also fields its own covert cyber operations for the most sensitive of national targets.

So how does this spying actually happen? How does the U.S. really get into position to exploit a sensitive computer network? The keyboards, codes and operations behind the U.S. cyber offensive dwarf the efforts of any other country, but it is America's vast physical spying infrastructure that gives it a key advantage.

In the Snowden briefing, one diagram shows how the network works, from antenna to collection platform to satellite transmission to analysis and final exploitation. Targeted signals are captured by antennas, run through an NSA software program known as "BLINDDATE," and sent off to the analysts.

At the center of that flowchart from the Snowden trove is a single ship—the conduit for all this clandestine activity, and the home base for those antennas and the computer that runs BLINDDATE. That ship is the USS Annapolis.

ptcbryrggxogzvlyo7db.png


Despite its Hollywood reputation as a fleet of steely killers crammed with cantankerous men, the United States' submarine force has always prided itself on quiet professionalism. Very quiet. The boats' low acoustic signatures enable them not only to close with and kill enemy vessels, but to maneuver undetected into littoral areas, close to shore—sometimes to deliver special forces, sometimes to eavesdrop on so-called "signals of interest."

"To control the electromagnetic spectrum, you have to be able to put whatever your device is that controls that spectrum in the place where you need it," Vice Adm. Mike Connor, commander of the U.S.'s Atlantic sub force, explained last month. "We have a remarkable ability to take the sensors that we have... and put them in the place they are most relevant, because we can get closer."

Plenty of stories have detailed the signals-collections exploits of aerial drones or special operators who actually go into a Pakistan or Mexico to be the human antenna, but the Navy's plum role in carrying out computer network exploitation is virtually unknown. In a typical week, according to NIOC-Maryland's 2013 briefing, the U.S. ran about 2,600 network exploitations. The Navy ran nearly 700, or 26 percent, of those ops—almost as many as the other military services combined.

hlpbayufyxne03wy6vll.png


The nuclear-powered Annapolis, in fact, is the crown jewel of this effort, a spying specialist assigned to Submarine Development Squadron 12, a test group of specially configured subs that experiment with new fleet capabilities—particularly in intelligence and special operations.

Annapolis and its sisters are the infiltrators of the new new of cyber warfare, getting close to whatever enemy—inside their defensive zones—to jam and emit and spoof and hack. They do this through mast-mounted antennas and collection systems atop the conning tower, some of them one-of-a-kind devices made for hard to reach or specific targets, all of them black boxes of future war.

Closer and passive, that is—for once the submarine reveals itself by emitting a signal, an enemy can find it. So a key to what the Navy sometimes calls electromagnetic maneuver warfare is in sniffing out the unsecured networks or receiving tip-offs of juicy targets from others. Gawker has learned that USS Annapolis was the first submarine to receive the mysterious RADIANT GEMSTONE system almost a decade ago. "RADIANT" is a Navy-unique codename applied to these specialized black boxes of "tactical-national integration": satellites and stealth drones and other secret operators all sharing sensitive data with each other. Other RADIANT programs—RADIANT ACHILLES, RADIANT ALLOY, and RADIANT LAVA—forge links with ocean surveillance and photo-reconnaissance satellites. John Pike's Global Security lists more than two dozen old RADIANT programs.

The above "top secret" special-access program onboard the Annapolis allows it to coordinate data from the submarine and high-above surveillance satellites so that it can penetrate into everything from radio to cellphone to internet traffic, receiving cues or sending tip-offs.

Before Annapolis left on its 2014 voyage, the boat was fitted with a wholly new screen layout and user interface to accommodate its digital native crew. In addition to its RADIANT suite of connectors and sensors, Annapolis's BLINDDATE system is thought to be able to penetrate local area networks, such as those created by home wireless routers. But its full capabilities—particularly when targeting nations like Iran—aren't publicly known.

Annapolis's parent unit, Submarine Development Squadron 12, brokers all of this special equipment for the Navy's submarines, setting up relations with the CIA and NSA, as well as the National Reconnaissance Office, which operates the spy satellites and stealthy communications links. And there are a set of silent partners in industry and academia who also ply their trade in this secret submarine world.

One such player is the Applied Research Laboratory of Pennsylvania State University. As a Pentagon-designated university-affiliated research center, Penn State's ARL "maintains a special long-term strategic relationship with DoD," the lab brags in an online presentation. That relationship accounts for nearly half the university's research budget—and it includes work on Annapolis's RADIANT GEMSTONE, the only public mention of this highly secretive program:

fcqmvtqoqwbidqerlecr.png


How excited is the Navy about this new mission? Imagine being the only kid on the block with a shiny new red wagon. The service's admiral in charge of cryptology says the Navy is anxiously crafting "an ordered, sustainable maritime means of realizing military power in cyberspace."

Still: What does that mean? When you can spy on anyone, anywhere, anytime—not just heads of state, but anyone on a cell or a WiFi connection—what do you actually do? More to the point: Who was the Annapolis spying on last year?

We know roughly where it traveled through the "European and Central Command areas of responsibility"—near Iran, Israel, perhaps even Yemen. We know that its crew briefed those NSA and CIA officials. We know that Parks, his mission accomplished, recently stepped asideand handed command of Annapolis to a "tactical analysis" expert from Submarine Development Squadron 12. And we know that its sailors were happy to see home:

euykysk56ktf0ulikmhr.jpg
 
View attachment 214424

Everyone saw the USS Annapolis come home last year. It returned, poignantly, on Sept. 11, and there was a seriousness amid the usual dockside fanfare—sailors meeting newborn children for the first time, a school band playing "Anchors Aweigh." But there was no mention of the boat's secret missions.

From March to September 2014, the U.S. submarine's 152-man crew cruised the deeps of the Mediterranean, Red Sea and Arabian Gulf, earning a earning a coveted Battle "E" for their efficiency in doing all the fleet had asked of them. Which involved ... what, exactly? They covered 34,000 nautical miles, participated in one multinational exercise, and made port calls in Portugal, Spain, Bahrain, and Gibraltar, according to official Navy reports.

There was something else, according to the sub's captain, Commander Chester T. Parks."During this time," he told reporters, "Annapolis completed four missions vital to national security."

Technically, his boat is a fast-attack submarine, responsible for tracking and killing enemy subs and surface ships when shit goes down. But the Annapolis was equipped for a very special top secret task, one that didn't involve its Mark 48 ADCAP torpedoes—or any shooting weapons at all. It was a mission that wasn't yet accomplished as the boat ported and the crew embraced their families on the dock at Submarine Base New London, Conn.

First, Parks and his team would have to brief some high-level NSA and CIA officials.

This jewel of the silent service, it turns out, is a very good listener.

Deep in the trove of National Security Agency documents leaked by Edward Snowden is a classified Powerpoint training presentation for workers at the Naval Information Operations Command Maryland—the Navy component of the NSA. The presentation explains the ins and outs of computer network exploitation (CNE) "to change or collect information residing on or transiting computer networks." To spy, that is, on any computer network anywhere—and not just to listen, but to manipulate and even shut it down.

The heavily redacted presentation includes an example of a "tailored access operations" target for these military hackers: an unidentified nation's president, Parliament, and military leaders:

View attachment 214425

CNE operators can do much more than that. It's part of a larger effort by the U.S. to "use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money," Der Spiegel wrote earlier this year.

The mainstream media has written extensively about Chinese and Russian government exploits in cyber-warfare, as well as the activities of renegade "hacktivists." But it is still the United States that rules supreme in the new battlespace, and the NSA is but one small slice of its digital offensive. It's actually the domain of the newly created U.S. Cyber Command. And while NSA conducts"global access operations" to penetrate non-military targets, the CIA also fields its own covert cyber operations for the most sensitive of national targets.

So how does this spying actually happen? How does the U.S. really get into position to exploit a sensitive computer network? The keyboards, codes and operations behind the U.S. cyber offensive dwarf the efforts of any other country, but it is America's vast physical spying infrastructure that gives it a key advantage.

In the Snowden briefing, one diagram shows how the network works, from antenna to collection platform to satellite transmission to analysis and final exploitation. Targeted signals are captured by antennas, run through an NSA software program known as "BLINDDATE," and sent off to the analysts.

At the center of that flowchart from the Snowden trove is a single ship—the conduit for all this clandestine activity, and the home base for those antennas and the computer that runs BLINDDATE. That ship is the USS Annapolis.

View attachment 214426

Despite its Hollywood reputation as a fleet of steely killers crammed with cantankerous men, the United States' submarine force has always prided itself on quiet professionalism. Very quiet. The boats' low acoustic signatures enable them not only to close with and kill enemy vessels, but to maneuver undetected into littoral areas, close to shore—sometimes to deliver special forces, sometimes to eavesdrop on so-called "signals of interest."

"To control the electromagnetic spectrum, you have to be able to put whatever your device is that controls that spectrum in the place where you need it," Vice Adm. Mike Connor, commander of the U.S.'s Atlantic sub force, explained last month. "We have a remarkable ability to take the sensors that we have... and put them in the place they are most relevant, because we can get closer."

Plenty of stories have detailed the signals-collections exploits of aerial drones or special operators who actually go into a Pakistan or Mexico to be the human antenna, but the Navy's plum role in carrying out computer network exploitation is virtually unknown. In a typical week, according to NIOC-Maryland's 2013 briefing, the U.S. ran about 2,600 network exploitations. The Navy ran nearly 700, or 26 percent, of those ops—almost as many as the other military services combined.

View attachment 214427

The nuclear-powered Annapolis, in fact, is the crown jewel of this effort, a spying specialist assigned to Submarine Development Squadron 12, a test group of specially configured subs that experiment with new fleet capabilities—particularly in intelligence and special operations.

Annapolis and its sisters are the infiltrators of the new new of cyber warfare, getting close to whatever enemy—inside their defensive zones—to jam and emit and spoof and hack. They do this through mast-mounted antennas and collection systems atop the conning tower, some of them one-of-a-kind devices made for hard to reach or specific targets, all of them black boxes of future war.

Closer and passive, that is—for once the submarine reveals itself by emitting a signal, an enemy can find it. So a key to what the Navy sometimes calls electromagnetic maneuver warfare is in sniffing out the unsecured networks or receiving tip-offs of juicy targets from others. Gawker has learned that USS Annapolis was the first submarine to receive the mysterious RADIANT GEMSTONE system almost a decade ago. "RADIANT" is a Navy-unique codename applied to these specialized black boxes of "tactical-national integration": satellites and stealth drones and other secret operators all sharing sensitive data with each other. Other RADIANT programs—RADIANT ACHILLES, RADIANT ALLOY, and RADIANT LAVA—forge links with ocean surveillance and photo-reconnaissance satellites. John Pike's Global Security lists more than two dozen old RADIANT programs.

The above "top secret" special-access program onboard the Annapolis allows it to coordinate data from the submarine and high-above surveillance satellites so that it can penetrate into everything from radio to cellphone to internet traffic, receiving cues or sending tip-offs.

Before Annapolis left on its 2014 voyage, the boat was fitted with a wholly new screen layout and user interface to accommodate its digital native crew. In addition to its RADIANT suite of connectors and sensors, Annapolis's BLINDDATE system is thought to be able to penetrate local area networks, such as those created by home wireless routers. But its full capabilities—particularly when targeting nations like Iran—aren't publicly known.

Annapolis's parent unit, Submarine Development Squadron 12, brokers all of this special equipment for the Navy's submarines, setting up relations with the CIA and NSA, as well as the National Reconnaissance Office, which operates the spy satellites and stealthy communications links. And there are a set of silent partners in industry and academia who also ply their trade in this secret submarine world.

One such player is the Applied Research Laboratory of Pennsylvania State University. As a Pentagon-designated university-affiliated research center, Penn State's ARL "maintains a special long-term strategic relationship with DoD," the lab brags in an online presentation. That relationship accounts for nearly half the university's research budget—and it includes work on Annapolis's RADIANT GEMSTONE, the only public mention of this highly secretive program:

View attachment 214428

How excited is the Navy about this new mission? Imagine being the only kid on the block with a shiny new red wagon. The service's admiral in charge of cryptology says the Navy is anxiously crafting "an ordered, sustainable maritime means of realizing military power in cyberspace."

Still: What does that mean? When you can spy on anyone, anywhere, anytime—not just heads of state, but anyone on a cell or a WiFi connection—what do you actually do? More to the point: Who was the Annapolis spying on last year?

We know roughly where it traveled through the "European and Central Command areas of responsibility"—near Iran, Israel, perhaps even Yemen. We know that its crew briefed those NSA and CIA officials. We know that Parks, his mission accomplished, recently stepped aside and handed command of Annapolis to a "tactical analysis" expert from Submarine Development Squadron 12. And we know that its sailors were happy to see home:

View attachment 214429

:lol:

I always get a good laugh at these "disclosures". They're so heavily redacted and edited, not to mention at least 5 years old, that they really serve no purpose other than as an object of history - to say want we have done, not what we are doing or can do.

As bad as the NSA disclosures were for US politics, they've had little impact on US intelligence since most of the slides date back to 2008-2010 and the programs they represent either altered, terminated or supplanted as newer technologies make them less efficient.

Still, this is a very interesting look into some of the more shadowy operations conducted by US subs. And since these slides are a few years old, at least 5, who knows the capabilities of our subs now.

*Most of the NSA disclosures, including the slides represented in the OP are a few years old, however this does not mean that the operations stated in the OP - as conducted by US submarines, are. Please make the distinction between the two.

:usflag:
 
Last edited:
Classified ? :whistle:

No.

Knowing the project exists doesn't tell you how it's done or what is accomplished. Nothing of value has been released, beyond the confirmation that the program exists.
 
If its on PDF there is no reason to be Classified :D
after all we don't want NSA to shut down our beloved Pakistan Defense Forum :pdf:

I'll say this: I'm active duty US Navy, I know what is and what is not fit for consumption by the general population, even though I don't handle classified information of this nature. However @SvenSvensonov did, and submarine deployments where part of his service requirements. He takes his commitment to US security very serious and wouldn't offer any classified information. Ever.

after all we dont want NSA to shut down our beloved Pakistan Defense Forum :pdf:


They have better things to do with their time. And for clarification, the FBI is responsible for downing websites that violate US laws or host sensitive materials.
 
I'll say this: I'm active duty US Navy, I know what is and what is not fit for consumption by the general population, even though I don't handle classified information of this nature. However @SvenSvensonov did, and submarine deployments where part of his service requirements. He takes his commitment to US security very serious and wouldn't offer any classified information. Ever.




They have better things to do with their time. And for clarification, the FBI is responsible for downing websites that violate US laws or host sensitive materials.

Its hard to differentiate between a Knowledgeable person and active Military Personnel ...
and yeah i do agree with that, normally people dont share such Classified Information in an open forum , which is easily traceable back to their IP's ..

oh I thoughts its NSA who did the dirty work :D
well FBI work is limited to within US or all over the world ??
 
well FBI work is limited to within US or all over the world ??


Following 9/11, the FBI has its legal operating authority expanded globally, though typically the FBI acts as the US domestic intelligence unit - it's not solely law enforce. It has powers of arrest worldwide, though typically it acts with the permission of a foreign entity and not unilaterally, due primarily to extradition treaties. It can act unilaterally if needed.

FBI

FBI — International Operations
 
Last edited:
Following 9/11, the FBI has its legal operating authority expanded globally, though typically the FBI acts are the US domestic intelligence unit - it's not law enforce. It has powers of arrest worldwide, though typically it acts with the permission of a foreign entity and not unilaterally, due primarily to extradition treaties. It can act unilaterally if needed.

FBI

FBI — International Operations

Thanks i will read it ..

i have this random Question , just like when we fly in an Plane , our body experience some G-force , is there some kind of force or reaction when someone traveling in a Submarine , hundreds of deeps inside the water ?
@SvenSvensonov ?
 
Last edited:
i have this random Question , just like when we fly in an Plane , our body experience some G-force , is there some kind of force or reaction when someone traveling in a Submarine , hundreds of deeps inside the water ?

I would expect there to be a reaction, but I've never been on a submarine so I have no point of reference. Ask @SvenSvensonov instead. He has first-hand experience with USN submarines.
 
I would expect there to be a reaction, but I've never been on a submarine so I have no point of reference. Ask @SvenSvensonov instead. He has first-hand experience with USN submarines.

my Question is not for some specific country's Subs , but Submarine as General ..but anyway i tag him so hopefully get the Answer :)
 
@SvenSvensonov @Víðarr spying on Pakistan - I am incensed at the invasion of my privacy ! :angry:

How could you do this to your own Pakistani brother ? :taz:

By the way your spying didn't give you any inside information about when the mega sale is going to happen at my local Nike store by any chance; I'd like a new pair of Mercurials for football ! :ashamed:

@SvenSvensonov did, and submarine deployments where part of his service requirements. He takes his commitment to US security very serious and wouldn't offer any classified information. Ever.

Are you sure that @SvenSvensonov wouldn't crack under this ? :sarcastic:

tickled-with-feather[1].jpg
 
my Question is not for some specific country's Subs , but Submarine as General ..but anyway i tag him so hopefully get the Answer :)

OK, I talked to Kai and this is how he told me to describe it:

Have you ever been on a roller-coaster? A roller-coaster travelling at 40 MPH, undergoing sharp lateral turns and rolls will make the occupants shift, rise or sink as gravitational force is imparted upon them - as per the direction they are travelling in space.

The forces imparted upon people on this, would be found on submarines too. Just not as violently.


Submarine crews undergo similar, but not identical, forces for lateral turns and rolls, though often at lower speeds since a high-speed maneuver will be noisy and can betray the submarines position. These turns and rolls will impact gravitational forces upon the submarines crew.

So yes, submarine crews do experience the same G-forces as a person flying.

Are you sure that @SvenSvensonov wouldn't crack under this ? :sarcastic:

View attachment 214437

He's not ticklish at all:angry:. Trust me, I've tried:taz:.

@SvenSvensonov @Víðarr spying on Pakistan - I am incensed at the invasion of my privacy ! :angry:

We know everything about you Armstrong. Every. Thing. About. You.

I believe the US submarine force adopted this motto last year:enjoy:.
54918952.jpg
 
Last edited:
Submarine crews undergo similar, but not identical, forces for lateral turns and rolls, though often at lower speeds since a high-speed maneuver will be noisy and can betray the submarines position. These turns and rolls will impact gravitational forces upon the submarines crew.

So yes, submarine crews do experience the same G-forces as a person flying.

I once sit on a small roller coaster , and than i am done there hahaha not again .. but yeah i do understand that feeling :)
 
Back
Top Bottom