12th NMIOTC Annual Conference Speakers’ Inputs

The 12th Annual NMIOTC Conference «Opportunities and threats from Innovative and Disruptive technologies: Shaping the future of Security in the Maritime Domain» was held on June 1-2, 2021 at the NMIOTC in Souda Bay, Crete, Greece. In the beginning Commodore Charalampos THYMIS, the NMIOTC Commandant, welcomed the attendees. This year was another unique experience because COVID kept many of the speakers and participants from attending physically the conference. However, the conference that was conducted in blended mode, with in-person and virtual participation, still presented speakers that delivered valuable knowledge and information about emerging disruptive technology that is necessary for maritime security challenges. Wendi O. Brown, Lieutenant Colonel U.S. Army Reserve, provided this report. (email: [email protected]).

MARITIME SECURITY June 1, 2021 –Keynote Speeches Effective military capabilities can take decades to re- search, develop, procure, field and integrate. But new Keynote Speaker: Rear Admiral Rene TAS threats can emerge with little warning. To address this im- ACOS Capabilities in Headquarters SACT Norfolk balance, European militaries, and the European Defense Agency (EDA) must plan ahead to anticipate future capa- We are leaving in a very transformational time and the bilities needs and adapt to the fast pace of change in the speed of the change has been increasing in the last de- technology and threat environments. cades with big impact in our profession as war fighters. This is especially true in the maritime domain, where in- U.S. Government Accountability Office states four broad novative technology, such as Artificial Intelligence and categories for emerging threats: unmanned systems, are pushing us to re-evaluate and • Adversaries Political and Military Advancements rethink doctrines and strategies that have been in place - Chinese Global Expansion, Russian Global Expansion, since the advent of the modern naval warfare. It is very Iranian Political and Military Developments, North Korean important for NATO to be at the forefront of this path. Military Developments NATO has many future programs in place that will enable - Foreign Government Capacity and Stability the Alliance to stay one step ahead in the coming years. - Terrorism One example is the Dynamic Messenger exercise that is - New Alliances and Adversaries an unmanned system exercise planned for 2022 that will • Dual-Use Technologies be a large-scale test to demonstrate unmanned systems - Artificial Technologies capabilities in the maritime domain and in operational en- - Quantum Information Science vironment. NATO must be prepared for the involvement of - Internet of Things new technologies in warfare, including in congested water - Autonomous and Unmanned Systems environment. Our adversaries are planning to challenge - Biotechnology us in all domains and we must be prepared to fight in such - Other Emerging Technologies multidomain scenario. As we deepen the discussion of • Weapons this topic, everyone will be mindful on how much new and - Weapons of Mass Destruction disruptive technology will impact our work in the maritime - Electronic Warfare, Hypersonic Weapons, Counter- domain now and in the years to come and also on how we, space Weapons, Undersea Weapons, Cyber Weapons as the Leadership of the NATO maritime enterprise, are - Missiles entrusted by all nations to ensure the Alliance remains the - Intelligence, Surveillance, and Reconnaissance Plat- global leader in innovation. By doing so we will continue to forms provide free and safe use of the seas to all our nations, so - Aircraft that prosperity can be maintained and achieved as it has • Event and Demographic Changes been since the founding of the Alliance over 70 years ago. - Infectious Diseases - Climate Change Keynote Speaker: Vice Admiral Manuel Martinez, - Internal and International Migration Director for Engineer and Naval Shipbuilding at Divi- From Spain’s Navy sion de Planes del Estado Mayor de la Armada • Several Enabling Technologies: Title: New Challenges and Technologies for current - Artificial Intelligence, Quantum Computing, Nano Tech- and future Spain Navy Warships nology - Cloud Computing

30 - Unmanned Vehicles, Robotics • New Battlefield Spain Navy Project 4E - Cyber Space 4E is envisioned as block of “technological projects” to

- Cognitive Space (IW) develop capabilities to be included in a number of differ- MARITIME SECURITY - Legitimate Battlefield ent future European combat escorts which will be built by - Public Opinion Battle Space European Industry. • New Weapons - Hypersonic Weapons The three technological projects are: - New Generation of Submarines • AAW Destroyer 7000T - UXVs • ASW Frigate 6000T - Cyber Attacks • Multipurpose Frigate 4000T • New Framework – New Scenarios - No declared enemies Keynote Speaker: Brigadier General Davide Re - No governance Italian Air Force, NATO Strategic Direction – South - Open to (NSD-S) HUB Director - A variety of missions Title: Opportunities and threats from innovative and - Very Different Stakeholders disruptive technologies: Shaping the future of secu- - Disruptive Tech rity in the Maritime domain - Open information NSD-S Hub Mission - Technology is available to everyone Be a Virtual Docking Station that shares comprehensive - Reduction of development cycle information sharing, anticipates threats and challenges (Horizon Scanning), and identifies opportunities in the as- signed area of interest with a wide variety of International/ Regional actors. NSD-S Hub Vision A focal point for NATO to interact and cooperate with rel- evant Actors, integrate the regional perspective into NATO mindset, and assist Partners to contribute to projecting se- curity and stability. Innovative technologies are necessary, because of the complexity of modern society fast evolving dynamics among which the growing dependence on technology and “internet of things”. Just as a mere reference and example, 97% of internet traffic and $10 trillion in daily financial transactions pass through 1.2 million km under-sea cables: this means that everyone of us may be affected and victim of potential cyber-crimes, also in remote locations. How innovative disruptive technologies impact Africa and the Middle East • Technological change has been even more transforma- tive and disruptive for the global South than for Europe and North America. • Waterways in the Middle East could easily become chokepoints and secure maritime domain maximizes the gains for Africa. • Understanding technological innovation is necessary to secure the maritime environment.

Dynamics of the Horn of Africa (HoA) • HoA hosts 1/3 of African population and attracts many Global Powers striving to control its natural resources and trade routes (10% of world global trades). • International disputes, instability areas, unemployment and marginalization as promoters of VEOs and foreign ter-

31 rorist networks. Summary of CIAT & GIOS Results • Maritime security and thorough understanding of main drivers of instability is key to protect the routes crossing the Gulf of Aden and the Red Sea. • International cooperation and dialogue to ensure Free- dom of Navigation from Bab al Mandab to the Suez Canal.

Energy Security Recent history has shown how fundamental is the protec- tion of Critical National Infrastructures in a wide array of evolving challenges and threats (e.g., weaponized drones, cyber-attacks, malwares, etc.) • Attacks on Infrastructures & Routes: - Chokepoints (supply disruption) MARITIME SECURITY - Kinetic Attack (vulnerable targets) - Cyber Attack (increasing digitalization) • Deniability Strategy: - Use of non-State Actors/Proxies - Cyber Domain Anonymity Lecture: EU Coordinated Maritime Presences: Where do we stand and what’s next NSD-S Conclusion: (Navy) Stathis KYRIAKIDIS (EL N), Head of Foster HUB network to better understand potential risks Division OPS Coordination, European Union Military and possible opportunities with selected International/Re- Staff, Deputy Director of the EU Maritime Area of gional Actors through mutual respect and with an African Interest Coordination Cell (MAICC) and Middle-Eastern point of view. Focal point for NATO on different Areas of cooperation to EU Coordinated Maritime Presences Concept: enable support to Partners and to Non-NATO Partners in • It is complementary to the EU Maritime Security Opera- projecting security and stability. tions Only a joint coordinated effort is key to enhance under- • It creates new opportunities to enhance EU presence standing of EDTs capabilities, while exploring viable so- beyond the ongoing CSDP operations lutions, possible applications and trustful cooperation to • It maximum benefits from the EU M-S’ naval presences tackle together today and tomorrow’s threats and chal- around the globe lenges. • It does not affect the EU’s ability to launch a CSDP Op- eration Keynote Speaker: Rear Admiral Jean-Michel Martinet, • The military assets remain under national OPCON Deputy Operation Commander of EUNAVFOR MED Operation “IRINI” The role of the EU CMP Maritime Area of Interest Coordi- Title: European Naval Forces in the Mediterranean - nation Cell (MAICC): Operation IRINI • It collects situational awareness information based –

mainly - on the parent OHQs’ reports and open sources Core Task: Countering Illicit Arms Trafficking (CIAT) • It analyses and disseminates strategic assessments, UN Security Council Resolutions: within the EU M-S • UNSCR 1970 (2011) – Establishing the Arms embargo • It establishes relations with maritime partners • UNSCR 2292 (2016) – Authorizing boardings and diver- • It is not a Maritime Operations Centre (no shift rotation) sions • UNSCR 2578 (2021) – Extending UNSCR 2292 man- Lecture: Dilemmas of Deterrence in an Era of Emerg- date up to 3 June 2022 ing Destructive Technologies Secondary Tasks: Professor James Henry Bergeron, Political Advisor • Gathering Information Oil Smuggling: UNSCR 2146 to the Commander Allied Maritime Command (2014), UNSCR 2362 (2017), UNSCR 2509 (2020), UN- SCR 2571 (2021), Does Emerging Destructive Technologies undermine or • Contribution to the Human Smugglers Business Model stabilize our ability of deterrence? Some scholars see disruption Emerging Destructive Technologies as stabilizing while • Training and Monitoring LCG & N others view it as destabilizing.

32 Three things to consider when using deterrence: Despite the negative applications that may disrupt sea- • Mutual sphere of activity ward trade, innovative technologies are a must for the, • Requires knowledge of adversary capabilities environmentally friendly, development of the supply chain.

• Requires specific parameters of time MARITIME SECURITY Lecture: Commercial and military use of unmanned/ Lecture: Innovation technologies in the Italian Navy autonomous vehicles in the light of hybrid threat – the future combat naval system in the 2035 multi- Commander Georgios Giannoulis, Hybrid Center of domain operation Excellence Captain Marco Casapieri, Chief of Space Section of the Italian Navy General Staff There are 4 degrees of autonomy • with automated processes and decision support. Starting from 2020, ITN created the Technological Innova- • Manned but remotely controlled ships. tion Network, led by the General Staff, which connects all • Unmanned and remotely controlled ships. the Technical Centers of the Navy and oversees the ITN • Fully autonomous ships. main technological areas of interest in which it is strategi- cal to achieve/maintain a competitive advantage (under- Advantages of Unmanned/ Autonomous Marine Vehicles water, AI, Quantum, Robotics, Autonomy, sensors and • Operating for prolonged period of time without burdening weapons against the hyper-sonic threat, air-independent and endangering crew personnel. energy sources and technologies related to space do- • Can support various missions, ranging from recreational main). and commercial uses to those of militaries The Future Combat Naval System 2035 project is based • Minimize operational costs for shipping companies (in- on macro capabilities drawn from these technological creased cargo capacity due to absence of accommoda- areas of interest, encompassed in a specific operational tion spaces, decrease of fuel consumption by incorporat- framework. ing green power, savings from crew salaries) The FCNS35 macro capabilities are declined by the op- • Military applications erational environments (Surface, Underwater, Air, Litto- - minimize the casualties in case of war conflict ral, Space) or identified by their transversal effects (Un- - Force multiplier in the battlefield, manned Systems, Multi Domain C2, Enhanced Maritime - Perform different types of operations (ISR, AAW, ASW, Situational Awareness, Harbour and critical infrastructure ASuW), protection, Key Enablers). - Operate without any limitations in NBC environment. - Offer high level of stealth characteristics and difficulties in attribution, key ingredient for hybrid campaign - Are ideal for a hybrid actor in controlling the escalation level in low-intense conflicts

Challenges of Unmanned/ Autonomous Marine Vehicles • Outdated or missing regulatory framework • Possible absence of human decision-making process • Vulnerable to cyber attacks • Congested information to be processed from multiple sensors can lead to serious failure

Lecture: Modern technological threats from a - owner’s perspective Lecture: Windward’s Predictive Intelligence Plat- Dr. George Pateras, Hellenic Shipping Chamber form. A maritime AI platform to manage all maritime domain awareness and intelligence needs. Technological challenges in the maritime industry Mr. Dror Salzman, Windward Intelligence Research • Communication/”Big Data Transfer”. Developing the ef- Manager fective means to pass info to the end user. • Detection of GPS navigation system jamming attempts. Deceptive Shipping Practices: • Creating backups for cyber attack cases. • AIS Handshake • Variations on how necessary autonomous ships are and • Global Navigation System Manipulation whether they are worth the risks. • Insurance exclusions for computer viruses. Windward supports operational missions and intelligence analysis with Maritime AI to critical organizations.

33 • Maritime Intelligence to-staff exchanges were the main mechanism in the ad- • Law Enforcement vancement of EU-NATO relations, albeit relevant structur- • Defense al initiatives such as the establishment of the CoE Hybrid. Informal, ad hoc, and sectoral initiatives are positive, yet Lecture: EU-NATO Cooperation in Maritime Situ- they should be regarded as steps towards a structured ational Awareness: Advancements and Limitations and comprehensive relation, where informality and ad hoc Mr. Joao Almeida Silveira, Independent Policy Ana- solution plays a role, but not a central one. Thereby, the lyst, Research at Portuguese Institute of International full potential of EU-NATO cooperation remains to be un- Relations (IPRI) leashed.

Maritime Situational Awareness (MSA) is an essential Lecture: A Simulation of Training Platform for Un- maritime security task. The task has become more chal- manned Surface Vehicles lenging in the last decades because of the global prolifera- Dr. Chrissavgi Dre, Deputy Director New Technolo- tion and intensification of activities, actors, and interests gies, Intracom Defence MARITIME SECURITY at sea. Dr. Ioannis Dagres, Senior Engineer, Intracom De- Aware of the challenge, the EU and NATO have been de- fence veloping efforts in streamlining institutional responses, as well as in improving doctrines and instruments to enhance Intracom Defence Situational Awareness MSA. The efforts included autonomous actions, as well • Unmanned Surface Vehicles (USVs) will be a key com- as activities within the framework of their strategic part- ponent of naval operations in the future, especially for nership, particularly after the Warsaw Summit of 2016. countries like Greece. At Warsaw, within a broader movement to deepen their • Modern USVs demonstrate high performance, autonomy, strategic partnership, the EU and NATO committed to the robustness, reliability, data/communications, interoper- improvement of interinstitutional cooperation in several ar- ability, mission versatility. Furthermore, they are designed eas linked with MSA, including in coordination, information for safety, easy deployment, operation and maintenance. sharing, and lessons learned6. • Simulation and training platforms can play a key role in MSA is a process that blends civilian and military as well the design of robust sea vehicles as they reduce time and as public and private inputs to achieve an accurate picture cost for design testing and sea-trials. of the maritime domain. • A novel simulation and training platform for the design of As a process MSA involves four main interconnected and Unmanned Surface Vehicles is presented. indissociable elements: Products Surveillance and Data Collection • Communication Systems • Maritime Surveillance • Missile Applications • Data Collection • Security Solutions • Regulatory Initiatives • Unmanned Systems • Hybrid Power Systems Data Fusion and Knowledge Development System Components • Data Fusion & Data Sharing • Autonomous Driving Stack Development Environment • Analysis & Knowledge development • Remote Control Workstation • Scenario Generator and Analysis Coordination and Knowledge Dissemination • 3D-6DOF Sim: Simulator Environment • Information sharing & Communication Systems • Command & Control

Management and Improvement of MSA Structures • Technology Development • Education & Training • Lessons Learned • Capacity Building

The empirical evidence contained in the MSA literature indicate that after the Warsaw Summit, the cooperation between the EU and NATO advanced mostly through ad hoc and sectoral activities. Informal, but sanctioned, staff-

34 • The underwater threat collides with the net and becomes Future Plans entangled. • Explore various open-source stacks (e.g. MOOS IvP, • The captured threat is towed out of harm’s way.

Apollo, Autodrive) and build a complete USV AD stack MARITIME SECURITY • Extend the Scenario Generator with C2 functionalities Lecture: Unmanned Aerial System for Maritime • Extend the LGSVL to support high fidelity (near real- Domain Awareness (MDA) – A Ship Captain’s Per- time) communication links and jammers spective • Explore the adoption of HLA to be able to join Federate Mr. Mark A. Russell, Director, International Business Distributed Simulations Development of Martin UAV

Lecture: Arming Autonomous Vessels Maritime Domain Awareness is the effective understand- Mr. Matthew Searle, CTO Maritime Arresting Tech- ing of anything associated with the maritime domain that nologies could impact the security, safety, economy, or environ- ment. The maritime domain is defined as all areas and Choice of Weapons: things related to the sea, ocean, or other waterways, in- • Kinetic cluding all maritime-related activities, infrastructure, peo- - Surface: Direct fire, small missiles, kamikaze UXVs ple, cargo, ships, and other vehicles. - Sub-surface: Energetic, Super cav. , armed UUVs / tor- pedoes. What information can UAS give the captain, today? • Non-Kinetic (Non-Lethal) weapons • Cameras - Dazzling lasers - EO “Super Zoom”, EO/IR, Laser Marker/Pointer - 95Ghz microwaves - Laser Target Designator, AI, Processing, HD Imagery - Pulsed energy • AIS (Automatic Identification System) - Plasma balls - UAS extend AIS 200-300km+ - Drogue lines • Wide Area Surveillance “ViDAR” - Nets - Helicopter – using EO/IR, needed 30 mins to locate man - MVSOT occlusion technologies in water (sea state 2), in 4km x 4 km area. - Kestrel – only 90 secs Politics and Ethics: Any use of kinetic weapons in for- • Synthetic Aperture Radar (SAR) eign or domestics port will have political consequences. - All Weather Radar, Day/Night, Maritime & Land If used against misidentified innocent victims will cause • Communications & Video Relay significant moral and ethical issues. - Extended Range, MANET, VOIP/ROIP, Video, C2

Arming AXVs with non-kinetic effectors allows instant re- The VBAT is a VTOL system designed specifically for sponse maritime (small ships) and does not have a launcher or • Electric power allows instant launch recovery unit. No equipment on the deck. It can deliver • No need for crew to scramble the MDA capabilities and take off/land in a 3m x 3m space • Small size and low cost allow multiple units to be fielded on the ship, operating out to 150km from the ship, day and • Use of non-lethal / non-kinetic effectors allows low level night. This capability was not possible 2 years ago. The launch authorization VBAT is operational now with US and Allied forces.

Non-lethal weapons add capability to the kill chain Lecture: A review on current Maritime Threats Scen- • Non-kinetic effectors act like a spider’s web ery and operational challenges outlining needs and • Buys time for manned units to arrive cost-effective solutions of technology • Captured target allows more time for kinetic response if Mr. Alexandros Lyginos, CEO of Interarma Ltd needed For the past 3 years, we observe a slight fluctuation in the Stingray Interceptor C-UUV Net total number of incidents occurred worldwide, whilst • The fully automated Stingray interceptor net is a non- almost half of them are reported in West Africa waters. kinetic system that can be deployed against any potential This fact shows the instability in Political, Social and Eco- threat without risk to persons or property. nomic Environment remains within the subject regions. • The Stingray net is deployed across the path of the in- coming underwater threat at up to 20 knots, taking less Piracy Per Year than 10 seconds to set. • 2018: 201 • Forms an invisible barrier from sea surface to seabed. • 2019: 162

35 • 2020: 195 way to better understanding how those existing techno- logical achievements may be utilized in a principal way of advancement in different military domains.

Keynote Speaker: Rear Admiral Mihai Panait Chief of the Romanian Naval Forces Title: Emergent, Innovative and Disruptive Technolo- gies – Opportunity or Threat?

Future Emergent and Disruptive Technologies • Big Data and Advanced Analytics • Artificial Intelligence • Autonomy Materials New Technologies Preventing Piracy • Space MARITIME SECURITY • Artificial Intelligence (AI) has made headway to enhance • Hypersonic maritime safety, optimize business operations and pro- cesses, and aid in voyage planning and vessel mainte- Maritime Implementation of Emergent and Disruptive nance. Technologies I • The use of AI-based systems to create fully automated • Artificial Intelligence – drones communicate with each piracy alerts can allow seafarers a few moments to react, other to work as a group using AI operators can control the potentially saving lives. entire swarm at once • In cracking down on maritime piracy, one must first un- • Opportunity – cheap or less expensive drones derstand how pirates operate and make their advances. • Threats – swarms of drones for anti-ship warfare Behavioral analytics, a new holistic interpretation of raw launched by commercial vessels, give the adversary the empirical data, can dramatically enhance the crew’s situ- benefit of plausible deniability used for ISR missions or as ational awareness by monitoring data and motion within loitering munitions the vicinity of a vessel in detail. • This information includes identifying the number of boats Maritime Implementation of Emergent and Disruptive and other neighboring ships within the same waters, the Technologies II routes and speeds it crosses paths to determine distinct • Big Data Advanced Analytics (BDAA) patterns, unknown correlation and provide clarity to am- - OSINT enthusiasts routinely post pictures on social me- biguities. dia covering naval vessels positions and activities - Source of pictures is free or inexpensive imagery from commercial satellites June 2, 2021 – NMIOTC Keynote Speeches - Huge amount of data available and info on maritime assets Keynote Speaker: Rear Admiral Kiril Mihaylov • Opportunity – can augment own maritime domain aware- Commander of the Bulgarian Navy ness Title: Implications of Disruptive Technologies for • Threat – can have an impact on operations states with Smaller Navies underdeveloped ISR assets or non-state actors could po- tentially pay for such pictures in an effort to plan an attack Identifying disruptive technologies and their use in the military domain early is vital to achieving superiority on Maritime Implementation of Emergent and Disruptive the battlefield. Countries with small navies are not usually Technologies III expected to lead the way to technological breakthroughs • Novel materials and manufacturing and innovations, since this endeavor involves a lot of re- • Opportunity – Increased performance (speed, distance, sources and financial commitments. But making sure to effects etc.) observe closely the trends in the naval community and • Threat – Arms race and losing technological advantage implementing such innovations would yield surprising re- sults. Synergizing the military and civil industries can lead Keynote Speaker: Major General Alaa Abdulla Sey- to a fundamental change in operational technologies and adee strategies and only through working together can we ex- Commandeer of Bahrain Coast Guard ploit the opportunities that disruptive technologies provide. Title: Maritime Domain – An Approach to Information Furthermore cooperation and collaboration between enti- Sharing and Management ties, such as NATO and EU for example, would pave the

36 Strategic Approach Emerging Disruptive technologies, ranging from Artificial Bahrain costal surveillance system was designed and Intelligence (AI) and quantum technologies to hypersonic installed of multiple integrated coastal surveillance sen- weapons and new space technologies have a serious po- sors to provide the Coast Guard with a comprehensive tential to revolutionize our military capabilities, strategies MARITIME SECURITY maritime situational awareness and Command and Con- and operations. The EU has a strong potential in EDTs, trol capability. Includes establishing maritime surveillance indicated by a vibrant industry and start-up landscape in sensor sites and a state-of-the-art Regional Command fields such as AI and robotics, but for sure, more effort is Center. Fused sensors include X and S-Band surface needed to match the level of development in this field of search radar, Infrared Electro-Optical long-range cameras our partners and competitors. and AIS base stations. In November 2020, as a kick-off for the work on the Stra- Strategic Approach Phases tegic Compass (SC), the EU has originated its first intel- • Phase 1 = Technology & Partner Evaluation ligence based comprehensive, 360-degree analysis of the • Phase 2 = System planning and product selection full range of threats and challenges the EU currently faces • Phase 3 = Base Line AIS system or might face in the near future. In the analysis, the risk for • Phase 4 = System Enhancements the EU not being prepared to react to the new threats and Vessel Identification Transceivers challenges was mentioned. Building on the threat analy- Customized transceivers issued and securely installed on sis and other possible thematic input, the EU will define every vessel. Full vessel and operator details captured policy orientations and specific goals and objectives in electronically at point of installation. four baskets: • Crisis Management Command and Control • Resilience National maritime data center. Ergonomic command and • Capability development control center with state-of-the-art visualization technolo- • Partnerships gies and automatic data analysis and incident manage- ment. Lecture: Maritime security and smart technologies: Turning the attention to Africa Data Utilization and Information Sharing Professor Francois Vrey, PhD Research Coordinator Real time coverage across entire gulf. A total of 50 million Security Institute for Governance and Leadership in position reports every week processed and correlated in Africa- SIGLA real time. Captain Mark Blaine, Stellenbosch University, South Africa The Future • Integrate new sensor systems Maritime security and smart technologies: Turning the at- • Enhance data analytics tention to Africa • Refine command and control The information below is directly from https://howafrica.com/the-top-10-most-powerful-navy-in- Keynote Speaker: Brigadier General Bart Laurent africa/ : Director of the Operations of the European Union Military Staff “A ‘Blue Water Navy’ is a navy that has the ability to per- Title: Future of Security in the Maritime Security form all aspect of naval operations. They can travel, navi- gate, and support naval operations deep in the ocean. A The key elements to develop the EU future strategies, es- navy with Blue Water capabilities has the support systems pecially in the global maritime environment are resilience and infrastructure to travel unhindered to a part of the and capabilities development along with emerging disrup- world’s waters. tive technologies. • Examples of Blue Water Navy in Africa: - Resilience to adapt our structures, processes, our hard- - Algerian National Navy and software is needed, as ‘events’ may dictate and fore- - sight should indicate. The use of, and protection against, remotely operated vehicles of different sorts is just one A Navy can be called ‘Green Water Navy’, if it has the abil- of the ‘events’ that show how relatively small technologi- ity to project its naval operations far beyond it shores but cal developments may bring about big changes in military is still limited in its deep ocean operations. A Green Water actions. Navy can travel and navigate long distance but can only do so in a limited time due to its lack of deep water opera-

37 tions support infrastructures and platform There is a concern with regard to the use of technology in • Examples of Green Water Navy in Africa: Africa from a HUMAN RIGHTS perspective. Science and - its offspring technology have been used in this century as - Moroccan Navy brutal instruments of oppression. - Tunisian Navy African Maritime Legal Framework - Equatorial Guinea Navy • Domestic Law • United Nations Convention on the Law of the Sea (UN- The Brown Water Navy is a navy primarily focused on lit- CLOS) toral warfare. They usually excel in ‘swarm attacks’ using • Co-operation agreements numerous small boats to overwhelm an opponent. The • 2050 Africa’s Integrated Maritime Strategy major type of ships Brown Water Navies possesses are • International humanitarian law mainly small gunboats and patrol ships. • International human rights law The primary role includes maritime patrol, combating sea criminals, coasts guard duties, harassing enemy forces, Lecture: Beyond the Responsibility Gaps in the Use MARITIME SECURITY and mine sweeping and clearing. of Autonomous Weapons • Examples of Brown Water Navy in Africa: Mr. George Kiourktsoglou, Greenwich University - Angolan Navy The use of autonomous weapons can be dangerous and - Tanzania Navy hinder government relations globally. This statement - Sudanese Navy leads to ethics being major factor when discussing the use - Ghanaian Navy of autonomous weapons. - Kenyan Navy - Namibia Navy A New Ethical Framework within a Democratic Political - Cameroonian Navy Context The following issues must be addressed when discussing A Constabulary Corp possess no credible deterrence plat- the ETHICs of the use of autonomous weapons forms neither do they have any warfighting capabilities or • No Human Agency skills. Its main role is to safeguard the seaports and har- • Νo Vectoral (causal) Attribution bors from criminals and other vices. • No Universal Legal Uniformity • Examples of Constabulary Corp • Split between high- and low-tech militaries - - Togolese Navy Lecture: 3D Printing Security Issues - Senegal Navy Dr. Nikitas Nikitakos, Professor, Dept. of Shipping - Mauritius Navy Trade and Transport, University of the Aegean - Eritrea Navy - Gabon Navy Additive Manufacturing is the process of joining materials to make objects from 3D model data, usually layer upon There are many African countries that are landlocked that layer, as opposed to subtractive manufacturing method- do not own or operate a navy.” ologies. On an Additive Manufacturing printer, costs are roughly the same for producing complex objects and sim- The Way Forward for Maritime Security Capacity Building ple ones. Fabricating an ornate and complicated shape • Material does not require more time, skill, or cost than printing a - Equipment and Infrastructure simple block, once the digital design is completed. The • Human Capacity Building industry will undoubtedly continue to develop worldwide - Training Courses & Education over the next few decades, and the abilities of the printers - Mentoring will be vastly different than they are today in ways that are - Workshops & Tabletop Exercises not completely predictable. • Institutional - Strengthening organizational structures The Additive Manufacturing Framework - Law Making Capital versus scale: Considerations of minimum efficient scale can shape supply chains. AM has the potential to re- Lecture: Maritime security, smart technologies and duce the capital required to reach minimum efficient scale the law: An African perspective for production thus lowering the manufacturing barriers to Dr, Michelle NEL, Facility of Military Science, Stellen- entry for a given location. bosch University, South Africa Capital versus scope: Economies of scope influence how

38 and what products can be made. The flexibility of AM facil- distributed, and digital. itates an increase in the variety of products a unit of capital These technology trends will drive four key military capa- can produce, which can reduce the costs associated with bility trends: production changeovers and customization and, thus, the • Ubiquitous Sensors and Autonomous Systems MARITIME SECURITY overall amount of required capital. • Increased importance of Battle Networks • Expanding Operational Domains Additive Manufacturing and Future Security Threats • Increased reliance on Precision Warfare • Weapons Proliferation - VEOs (Violent Extremist Organizations) represent some Maritime Domain Awareness of today’s greatest security threats, and they are only go- • Space technologies are vital to Maritime Domain Aware- ing to be even more dangerous with the proliferation of ness because of: AM. - The expeditionary requirements of naval operations - Homemade weapons - Global maritime security architectures - Advanced technology weapons - Ability to track and identify vessels of interest - Chemical, Βiological, Radiological, Nuclear, and Explo- • Sensors sive (CBRNE) - Quantum sensors • Drugs - Unprecedented detection • Miniature explosive drones - Smaller vessels • Nano Satellites - Expand area coverage - Cost effective - Reduce revisit times and data downlink latency

• Synergies - Combination of space technologies and new analytical methods - Increase speed and efficiency of analysis

Position, Navigation and Timing • Global Navigation Satellite Systems (GNSS) support: - Electronic Chart Display and Information System

- Automatic Identification System - Automatic Track Control • Part of weapons systems • Quantum - Precise gravity gradient measures - Mobile platforms • Artificial Intelligence - Detection of spoofed signals - Integration of multiple sensor modalities

Networks are the physical foundation of the information battlespace. In MIW, SATCOM plays an integral part in delivering net- worked capabilities. • SATCOM is limited: Additive Manufacturing is occurring but we need to con- - Cost of launching satellites sider government policy, law, and ethics. - Stabilizers needed for on-board antennas - Relatively low bandwidth incapable of supporting ap- Lecture: The Role of Emerging and Disruptive Space plications requiring high data rates Technologies in Maritime Information Warfare • High-throughput Satellites Ms. Lucy Lim, NATO Office of the Chief Scientist, - Take advantage of frequency reuse NATO Science & Technology Organization - Support high bandwidth applications • Artificial Intelligence Emerging and Disruptive Technologies - Space-Air-Ground integration The EDTs will be increasingly intelligent, interconnected, - Interference management

39 - Beam Hopping • Quantum Comms - Info transmission across ‘turbulent’ water - Secure comms

Conclusion Space technologies will play a central role in warfare de- fined by achieving narrative dominance. The latest innova- tions in space-based capabilities will be essential aspect of future Maritime Information Warfare systems. Scenar- io-based testing will further enhance NATO’s understand- ing of the value of space technologies and intersections with Emerging Disruptive Technology’s in operations. Representative use cases for the application of Artificial Intelligence solutions in Border Management. MARITIME SECURITY Lecture: Emerging and Disruptive Technologies: • Automated Border Control EDA efforts in the field • Surveillance Towers Dr. Georgi Georgiev, Project Officer Maritime Capa- • UAS bilities Support, CAP, EDA • Maritime Domain Awareness • Object Recognition EU Global Strategy is vital for European security. Active • Robotic Systems work on EDT essential for European strategy autonomy • Machine Learning Optimalization • Predictive Asset Maintenance European Defense Agency (EDA) efforts are based on • Geospatial data Analytics three different perspectives • Technological Expected future Artificial Intelligence Maritime Domain • Operational Awareness Capabilities • Industrial • Main operational response trigger • Identify and assess abnormal behavior EDA efforts for research, technology, and innovation • Identify new threats • Post-quantum cryptographic algorithms • Integration of ad-hoc data sources • AI C2 Systems for cyber • Disruptive fuel: Hydrogen technologies for military opera- Lecture: ARSx2: A marine area surveillance system tions using UAS, assisting anti-privacy measures and • Energy storage for high energy demand applications contributing to hostages and/or vessels recovery • AI based technologies combined with big data Mr. Evan Christodoulou, CEO of A. S. Prote Maritime • Quantum information networks • Internet of things for defence A. S. Prote Maritime Ltd was founded in 2013 in Cyprus • Muscular, brain and cognitive UI (MUSCIUS) with the sole purpose of providing armed and unarmed • Hybrid multifunctional metamaterials security services to merchant ships, against piracy. • EMRG and hypervelocity projectile From 2017 our activities have expanded to the use of new • AI based multi-sensor seeker head digital technologies in merchant shipping, the maritime en- • Swarms, swarming and multi-robot cooperative systems vironment and relevant market.

Lecture: AI opportunities, requirements, and barriers Reasoning of using UAVs against piracy for adoption of AI in maritime use cases i) The need to improve existing measures to encounter Mr. Darek Saunders, Head of Border Security Re- piracy and provide other non-military options. search Observatory AI Research and Innovation Unit ii) Almost all previous attempts to assist in the fight against Capacity Building Division piracy by using UAVs: • remained only at a theoretical level and never developed • were of a purely military nature • were completely failed private efforts, poorly organized and staffed with inappropriate personnel, based on the na- ïve idea that “anyone can fly a UAV

The Project ARSx2

40 The innovative project ARSx2 deals with the development Lecture: Security Challenges in 2030: The Challenge of a maritime surveillance system, consisting of two UAVs, of Reality vs Unreality for the prevention of piracy or other illegal activities, as Mr. Christopher Kremidas-Courtney, Senior Fellow, well as the monitoring of pirate incidents in progress, and Friends of Europe; Lecturer Institute for Security MARITIME SECURITY cases at sea. Governance (ISG); Lecturer, Geneva Center for Secu- • Phorcys rity Policy - The first UAV, called “Phorcys”, is a small and flexible VTOL hexacopter on a Y6 configuration. Its compact and The World by 2030 stocky structure enables it to operate in tropical weather • Democracy versus Authoritarianism environments. Equipped with a powerful hybrid EO/IR sta- • Women will own 55% of the world’s wealth bilized camera with object tracking capabilities, humans, • Over 7.5 billion internet users by 2030 and items such as guns, canisters, etc. can be identified • Cybercrime will be $10.5 Trillion by 2025 from a safe distance. Phorcys will act as the “long arm” • Next Industrial revolution: Sub-Saharan Africa of the private guards and/or the crew aboard merchant • Most populous country: India, Largest economy: China ships. • India’s economy larger than Germany or Japan • Ceto • Increasing impact of climate change - The second, easy to use by non-specialists fixed-wing • Major economic shifts as a result of all above UAV, called “Ceto”, is used in emergency cases as a “res- • Reality versus Unreality: by choice (recreation) and due cue beacon”. It is deployed when a vessel is already or to disinformation will be occupied by pirates, while real-time position, im- - Augmented Reality (AR) is a live direct or indirect view ages or video are transmitted to the patrolling authorities of a physical, real-world environment whose elements and rescue organizations. Its purpose is, either to follow are augmented by computer-generated sensory. i.e. Aug- the vessel captured by the pirates or the ship of the pirates mented Reality Glasses with hostages, during ongoing piracy action by transmit- - Emergence of improved affordable wearable devices ting at appropriate frequencies emergency signals as well such as as critical information, such as images etc. AR glasses in 2023 - will begin to replace mobile phones - Virtual Reality (VR) is a simulated experience that be ARSx2 System Advantages similar to the real world. • Increased maritime surveillance ability - Numerous positive applications for military training, men- • Early warning of potential pirate threats tal health, recreation, enabling handicapped and elderly, • Capture, process and analysis of data travel business, education, medical, communications • Real-time high precision intelligence to control stations - VR enables an immersive experience – future develop- and rescue authorities ments include the ability to plug directly into human ner- • Remote operation with mission management and au- vous system tonomous commands - AR and VR Implications for Security • Reliable network protocols for fast, safe and robust data • Espionage: recruiting of sources & subsequent activi- transmission ties in VR metaverse • Assistance to search and rescue operations • Hacking of AR systems to spoof navigational use by • Monitoring of a pirate attack or hostage situation public and private actors • Recognition and monitoring of marine hazards • Disinformation: More precise and potent delivery means • Alleviation of risk of injury or death of humans during or via AR and VR and AI-enabled bots after a pirate attack • Deeper societal divisions due to an emerging split • Reduced insurance costs for crews, ships, and freights based on competing forms of reality • Reduced economic loss of countries adjacent to high- - Disinformation-Driven Violence 2020-21 risk areas • Attacks on 5G towers – over 200 in Europe alone • Optimization of ship routes • Various Qanon attacks to include train derailments, at- • Fuel saving tack on Canadian PM residence, etc • Ship rental time saving • Attacks on vaccine centers • Security of the movement of humans and goods • August 2020 attempted storming of Bundestag (Ger- man Federal Parliament) • January 6, 2021 attack on U.S. Capitol - How to be prepared for AR/VR? • Regulate and build safeguard into security of AR and VR

41 Lecture: SYNORIS – The “Chariot” of Modern Mari- Commercial Small Unmanned Aircraft System (sUAS) can time Warfare significantly help fight against malicious drone attacks. Mr. Evangelos Mantas, DevSecOps Engineer at Infili Technologies Drone Detection Technologies Radar technology can provide the effective detection of Why Use Unmanned Underwater Vehicles (UUV) drones within an area, even able to • UUVs are far less expensive to operate and maintain detect long range It can be successfully paired with other than manned platforms. technologies, such as RF or optic to • Enhanced payload is able to maintain constant aware- provide thorough coverage if desired ness and long-range coverage of the field. Extended • Pros surveillance periods and data collection, enables a better - Longer range and constant coverage. Provides multiple understanding of long-term behavior patterns and trends. drone detection and tracking • Improved range coverage, as they allow manned plat- • Cons forms to pursue tasks elsewhere. - It can be severely affected by nearby RF pollution Blind MARITIME SECURITY • UUVs keep human personnel and expensive equipment Sectors Requires authorizations from local authorities and away from danger. experiences difficulties in detecting small drones. No pilot localization Unmanned Underwater Vehicles are used for: • Marine Exploration Radio frequency analyses the RF spectrum within the • Wreckage Discovery protected area, searching for any form of communication • Research between the drone and its remote control RF can even • Search and Rescue identify the drone make and model • Technology advancement enable them to conduct au- • Pros tonomous and more complex mission scenarios - Features like drone and pilot localization as well as drone characterization It provides passive technology and The latest UUV capabilities include the detection of sub- multiple drone detection , such the Synoris UUV platform, providing an easily deployable solution to assist and enhance the situ- • Cons ational awareness of the underwater battlefield in littoral - It does not detect autonomous drones Likewise, local and open seas environments, using hydrophones as pas- RF pollution may also reduce effectiveness sive sonars to discover hostile vessels otherwise unde- tected by traditional detection equipment. The envisioned Optic cameras allow visual direction and identification of network of autonomous UUV can cover a greater area, approaching drones and their providing real and near-real time feed of the “underwater payloads Acting like a radar, optics may also be success- traffic”. fully combined with RF technology in providing thorough coverage Lecture: Threats and Operational Advantages of • Pros UAS in maritime and coastal environments - The visuals can be retained and used for forensic evi- Dr. Christos Skliros, Head of Engineering, Hellenic dence of drone intrusions It has passive technology Drones • Cons - Without the RF or radar back up, false alarm rates are Threats to the maritime and coastal environment often high Blind Sectors The performance is often impact- • Interference ed by light or weather conditions which usually results in • Intelligence, Surveillance, and Reconnaissance (ISR) difficulties detecting smaller drones nearby No pilot local- • Weaponization ization

Acoustic sensors are best in recognizing drone sounds from a database of drone acoustic Signatures • Pros - It can detect autonomous drones while providing azi- muthal information on incoming drone direction • Cons - The sound database must be updated in persistent to be effective Drones today are also becoming more and more

42 soundless as technology advances. Encounters difficul- to better fit profiles on your site? ties tracking modified drones. No pilot localization. • Upgrades –Is it a good long-term investment? Could it be easily updated to stay one step ahead of other drones’

Technologies for Drone Neutralization evolution without the risk of replacing everything? MARITIME SECURITY Jamming, allow safe return to home drone while safe- • Durability–Is the technology durable enough to outstand guarding the point of interest different weather situations? • Pros • Easy Installation and Integration –Is the technology easy - No collateral damages from intercepting drone (fall in to use and requires minimal training? Does it include an urban areas, crowded ports, refineries etc. easy-to-use interface? • Cons • Costs of Operation –How much is the cost to run the - It does not defeat autonomous drones with the exemp- technology? Will it consume a big amount of electricity? tion of systems with GPS jamming capacity. It can inter- Does it require dedicated staff to operate the system? fere the ambient communications Requires authorizations • Reactive/Accuracy –What is the technology’s way of de- from local authorities. tecting false alarm rates? How quickly can it detect drones within its area of coverage? Mitigation (wi fi spectrum restriction), allow safe return to • Pilot/Localization –Is the technology able to locate the home drone while pilot and the drone which in turn will give you the options safeguarding the point of interest to apprehend the person behind the intrusion? • Pros • Effectiveness (Even against multiple drones) –There are - No collateral damages from intercepting drone (fall in bigger security threats against drone swarms. urban areas, crowded ports, refineries etc. No authoriza- • Interference/Obstruction –Authorities may be extremely tions from local authorities. sensitive about the ‘frequency pollution’. Does the provid- • Cons er’s technology provide low interference or even passive? - It does not defeat autonomous drones It can interfere • Reasonable Price and High Quality –Protecting your air- the ambient communications space is considered as an investment but it doesn’t mean breaking your bank. Does your provider offer a fair cost to Selecting The Best C-UAS Solution quality ratio?

How to choose the best anti drone solution that provides CLOSING REMARKS the best optimal airspace security at the best cost and efficiency ratio while serving With eight keynote speakers and 24 powerful lectures you in the longest time from established maritime security experts and academic possible? professionals, this conference successfully addressed and discussed emerging disruptive technologies to signifi- Checklist: About the Technology cantly improve maritime security. • The ‘Modular’ –Is the technology scalable up and down

43