Feeds

TERRORISTS IN SUBMARINES menace the Free World!

Pale, smelly peril of underwater cocaine 'Love Boat'

SANS - Survey on application security programs

We know this because of the case of the French ex-spy and his speedboat-submarine factory in Dubai

A good indication of the best possible performance in this kind of tonnage range is offered by the specifications of the "Proteus" submarine speedboat formerly offered (and in one case built) by the now defunct company Exomos of Dubai. The Proteus, designed by former French naval officer, engineer (and reportedly ex-DGSE secret agent) Herve Jaubert2, used diesel-electric propulsion. Like the other Exomos subs a Proteus could manage five knots tops while submerged and travel as much as 50 miles at slower speeds of just a few knots before conking out.

Exterior shot of the drug smuggling sub at Ecuadorean jungle 'shipyard'. Credit: DEA

Crazy old-school WWII style camouflage. Or possibly a case of designers sampling the product.

That's probably the upper performance limit for small submarines using today's technology: the Ecuadorean narco-sub is unlikely to be even that capable. The narco-boat would be able to move at a crawl fully submerged, and perhaps travel as far as 20 or 30 miles like that - but in fact this capability would be mainly for escaping from or eluding the notice of patrol boats and ordinary search aircraft, not for travelling. Almost all the distance covered on a mission would be done on diesels - as has always been the case with naval diesel-electric subs, in fact.

Interestingly, the Chronicle reports that the sub's structure is of wood and its hull of fibreglass. It's thus almost certain that it isn't a true pressure hull, but instead functions like a diving bell: compressed air is released into the interior as it descends, matching the increasing pressure outside and keeping the water out.

Such a vessel is much easier to build and much lighter than a proper pressure hull, though it means that the crew must observe the same precautions against decompression sickness ("the bends") as divers going to the same depth would. Buildup of exhaled CO2 while submerged could be handled by simply flushing through periodically with more bottled air (at the cost of some telltale bubbles rising to the surface) or the use of sodalime scrubbers - easily available nowadays as part of the rebreather apparatus popular with some sports divers, or commercially supplied for use in hyperbaric chambers3.

We also learn that the narco-sub is at least as uncomfortable for her crew as naval diesel-electric boats were/are: the periscope would have offered the only view out, and the vessel is furnished with a single toilet of unspecified type. "No apparent sleeping area or galley, but there is room to lie down", says the Chronicle. It would appear that the possible narco-smuggler or terrorist submariners of today and tomorrow are likely to be every bit as pale and unhygienic as their naval brethren.

So, would this sort of sub be useful to terrorists?

Theoretically yes. You could use it to sneak people in and out of target countries, for instance, or to deliver weapons or explosives, or to mount attacks on oil rigs or stationary ships (it would not be much use against ones underway, being too slow to intercept or keep up with them even on diesels).

But the DEA reckon it probably cost $5m to build. The narcotics cartels can find that sort of money, but they'd expect to make it back again - and more than back again. The little sub could carry cocaine that would be worth $100m at US retail prices, but of course its operators couldn't expect to get anything like that for a bulk delivery (most likely in Central America or Mexico rather than the States). It might well have required several voyages to pay for itself.

Terrorists with $5m to spend (especially with no real prospect of any financial return) seem to be extremely rare birds, and if they exist there would seem to be better things to spend the money on (it's a lot easier to attack a ship or oil rig using a helicopter than a submarine). But sure, if there are some wealthy and determined terrorists out there this is a potentially quite effective route to go down. You could easily blow up cruise liners, tankers, oil rigs, pipelines; you could mount Mumbai-style sub-borne commando raids in the heart of London or whatever - various Bond-villain style plots.

Top three mobile application threats

More from The Register

next story
Red-faced LOHAN team 'fesses up in blown SPEARS fuse fiasco
Standing in the corner, big pointy 'D' hats
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
New FEMTO-MOON sighted BIRTHING from Saturn's RING
Icy 'Peggy' looks to be leaving the outer rings
Melting permafrost switches to nasty, high-gear methane release
Result? 'Way more carbon being released into the atmosphere as methane'
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.