Monitoring of Underwater Critical Infrastructures: the Nord Stream and Other Recent Case Studies

Page created by Monica Pearson
 
CONTINUE READING
Monitoring of Underwater Critical Infrastructures: the Nord Stream and Other Recent Case Studies
1

                                             Monitoring of Underwater Critical Infrastructures:
                                             the Nord Stream and Other Recent Case Studies
                                                  Giovanni Soldi, Domenico Gaglione, Simone Raponi, Nicola Forti, Enrica d’Afflisio, Paweł Kowalski,
                                                   Leonardo M. Millefiori, Dimitris Zissis, Paolo Braca, Peter Willett, Alain Maguer, Sandro Carniel,
                                                                             Giovanni Sembenini, and Catherine Warner

                                             Abstract—The explosions on September 26th, 2022, which
                                          damaged the gas pipelines of Nord Stream 1 and Nord Stream 2,
arXiv:2302.01817v1 [eess.SP] 3 Feb 2023

                                          have highlighted the need and urgency of improving the resilience
                                          of Underwater Critical Infrastructures (UCIs). Comprising gas
                                          pipelines and power and communication cables, these connect
                                          countries worldwide and are critical for the global economy and
                                          stability. An attack targeting multiple of such infrastructures
                                          simultaneously could potentially cause significant damage and
                                          greatly affect various aspects of daily life. Due to the increasing
                                          number and continuous deployment of UCIs, existing underwater
                                          surveillance solutions, such as Autonomous Underwater Vehicles
                                          (AUVs) or Remotely Operated Vehicles (ROVs), are not adequate
                                          enough to ensure thorough monitoring.
                                             We show that the combination of information from both un-
                                          derwater and above-water surveillance sensors enables achieving
                                          Seabed-to-Space Situational Awareness (S3A), mainly thanks to
                                          Artificial Intelligence (AI) and Information Fusion (IF) method-
                                          ologies. These are designed to process immense volumes of infor-
                                          mation, fused from a variety of sources and generated from mon-
                                          itoring a very large number of assets on a daily basis. The learned
                                          knowledge can be used to anticipate future behaviors, identify
                                          threats, and determine critical situations concerning UCIs.
                                             To illustrate the capabilities and importance of S3A, we con-
                                          sider three events that occurred in the second half of 2022: the
                                          aforementioned Nord Stream explosions, the cutoff of the under-                   Fig. 1. Nord Stream leak as captured by Pléiades Neo (ESA © Pléiades Neo).
                                          water communication cable SHEFA-2 connecting the Shetland                         The diameter of the leak is estimated in 0.5–0.7 km [2].
                                          Islands and the UK mainland, and the suspicious activity of a
                                          large vessel in the Adriatic Sea. Specifically, we provide analy-
                                          ses of the available data, from Automatic Identification System
                                                                                                                            an image of the methane leak acquired by the satellite con-
                                          (AIS) and satellite data, integrated with possible contextual in-
                                          formation, e.g., bathymetry, Patterns Of Life (POLs), weather                     stellation Pléiades Neo, made available by ESA.
                                          conditions, and human intelligence (HUMINT).                                         Despite suspicions of sabotage from certain authorities and
                                                                                                                            organizations, particularly given the current political climate
                                                                                                                            in Eastern Europe, there is currently no concrete evidence to
                                                                     I. I NTRODUCTION                                       indicate how and by whom the explosions were caused. At
                                             On September 26th, 2022, Danish and Swedish seismome-                          the same time, these events have also put the whole climate
                                          ters detected [1] a series of explosions on the Nord Stream 1                     community on alert, due to the much more powerful green-
                                          and Nord Stream 2 underwater gas pipelines. These explo-                          house effect (approximately 30 times) of methane compared
                                          sions, besides causing severe damage to the pipes, led to three                   to carbon dioxide, especially in the short term. It has been
                                          underwater gas leaks, with the subsequent release of an enor-                     estimated that more than 220,000 tonnes of methane, compa-
                                          mous amount of methane into the atmosphere. Figure 1 shows                        rable to the annual anthropogenic methane emissions in Aus-
                                                                                                                            tria, had probably been released in the atmosphere during the
                                             G. Soldi, D. Gaglione, S. Raponi, N. Forti, E. d’Afflisio, P. Kowalski, L.     Nord Stream leakage [2]. While the accident per se is not sig-
                                          M. Millefiori, P. Braca, A. Maguer, S. Carniel, G. Sembenini, and C. Warner
                                          are with the NATO STO Centre for Maritime Research and Experimentation
                                                                                                                            nificantly changing the figures of greenhouse gas emissions
                                          (CMRE), La Spezia, Italy (e-mail: {name.surname}@cmre.nato.int)                   leading to global warming and climate change, it neverthe-
                                             D. Zissis is with the University of the Aegean, 84100 Syros, Greece (e-mail:   less represents an unprecedented case of interlink between cli-
                                          dzissis@aegean.gr).
                                             P. Willett is with the University of Connecticut, Storrs, CT 06269, USA
                                                                                                                            mate change and security aspects, that needs to be properly
                                          (e-mail: peter.willett@uconn.edu).                                                accounted for by governments.
                                             Financial support from the Office of the NATO Chief Scientist and the             The Nord Stream incident has brought attention to the vul-
                                          NATO Allied Command Transformation (ACT) is greatly acknowledged.
                                             The views expressed in this research paper are the responsibility of the       nerability of Underwater Critical Infrastructures (UCIs) such
                                          authors and do not necessarily reflect the opinions of the NATO.                  as gas pipelines and underwater cables. This has led to in-
Monitoring of Underwater Critical Infrastructures: the Nord Stream and Other Recent Case Studies
2

Fig. 2. Conceptual illustration of the monitoring of an UCI. Depending on the location of the UCI and weather conditions, an above-water sabotage might be
potentially conducted by a specialized diver supported by a surface vessel; a remotely operated vehicle (ROV) may also be employed in some circumstances.
Above-water systems and sensors, such as the Automatic Identification System (AIS) and Synthetic Aperture Radar (SAR), may provide large-scale monitoring
capabilities. These may be complemented by underwater assets, such as Distributed Acoustic Sensing (DAS), to ensure a comprehensive maritime surveillance.

creased focus from both the public and policymakers on im-                    matic Identification System (AIS), satellite sensors [4], and
proving the resilience of these vital assets, as there is grow-               terrestrial radars, may have a crucial role to provide a seam-
ing concern that similar malicious operations will occur in                   less large-scale Maritime Surveillance (MS), even in remote
the future. Indeed, recently, on December 22nd, 2022, Italian                 areas of the world. In the latter case, underwater sensors (such
newspapers reported [3] the suspicious activity of a large ves-               as active/passive sonars and cameras) installed on the UCIs [5],
sel in close proximity to the Trans Adriatic Pipeline (TAP) in                or equipped on Unmanned Underwater Vehicles (UUVs) [6],
the Adriatic Sea. Therefore, the protection and surveillance of               would complement MS by providing undersea monitoring ca-
UCIs are crucial elements that will be included in any future                 pabilities. Besides sensory data, the analysis of contextual in-
maritime strategy.                                                            formation, such as bathymetry, weather data, human intelli-
                                                                              gence (HUMINT), and open source intelligence (OSINT), is
   Sabotage of UCIs can occur through the use of surface as-                  of paramount importance. More in general, the joint use of
sets such as warships or commercial vessels, or by underwa-                   underwater and above-water heterogeneous sensors, together
ter assets, as shown in Fig. 2. In the former case, multiple                  with contextual and intelligence information is a key con-
above-water heterogeneous systems and sensors, e.g., Auto-
Monitoring of Underwater Critical Infrastructures: the Nord Stream and Other Recent Case Studies
3

cept for the transition towards a Seabed-to-Space Situational      public concern about the resilience of these important infras-
Awareness (S3A). Given the scale of the problem and the large      tructures. Similarly, the submarine cable network, with more
amount of data to be processed, achieving S3A related to the       than 400 active cables spanning at least 1.3 million kilome-
monitoring of UCIs can be done by using advanced Artifi-           ters globally, is a vital asset composed of optical fibers and
cial Intelligence (AI) and Information Fusion (IF) techniques.     energy cables laid on the ocean floor. They constitute the most
These techniques allow for the integration of vast amounts of      efficient and cost-effective solution to sending digital informa-
information from various sources and monitoring a large num-       tion across the globe. This network digitally connects countries
ber of assets on a daily basis. Examples of such techniques in-    worldwide, with more than 10 trillion USD dollars in financial
clude Bayesian Multi-Target Tracking (MTT) techniques [7]–         transactions exchanged every day, and represents the backbone
[9], multi-reasoning systems based on the Dempster-Shafer          for internet communications globally.
theory [10], and anomaly detection techniques. These enable           Compared to underwater energy pipelines, underwater ca-
the fusion of diverse information at multiple levels. The knowl-   bles are more vulnerable, since they are more flexible and
edge gained from these techniques, once extracted and made         fragile. The major causes of damage are represented by hu-
easily understandable, can provide end-users such as govern-       man errors and negligence. To make an example, 40% of the
ment authorities, defense forces, coast guards, and police, not    incidents occur due to trawling activities by fishing boats,
only with a better understanding of the entities and actors        while another 15% is caused by anchoring accidents, such
involved in a specific event, such as the Nord Stream inci-        as improperly stored anchors, anchoring outside approved ar-
dent, their relations, and the potential consequences of these     eas, anchoring mispositioning due to weather conditions, and
relations, but also with an effective tool to anticipate future    emergency dropping of an anchor. Other human-driven be-
threats to UCIs and other critical assets. We anticipate that      nign causes of incidents include oil and gas development, off-
these techniques will provide the ability to prevent potential     shore wind and energy constructions, hydro-energy projects,
future attacks on UCIs and will become of increasing interest      and deep-sea mining operations. Intentional sabotage opera-
to national and international institutions and agencies, as well   tions to underwater cables classified as hybrid warfare op-
as the maritime industry.                                          erations have not yet been officially documented. However,
   The remainder of this paper is organized as follows: Sec-       different Russian submarine activities in the proximity of un-
tion II provides an overview of UCIs and describes impor-          derwater cables have been publicly reported since 2015, rais-
tant aspects related to their resilience. Section III provides     ing concern among NATO officials, as the Russian navy has
a description of sensor technologies that could effectively        clearly demonstrated an unprecedented interest in undersea ca-
be used for monitoring UCIs, and details useful contextual         bles [13]. In February 2022, Russia has conducted a naval
information. Section IV provides an overview of S3A and,           exercise just outside Ireland’s exclusive economic zone, very
in particular, it describes state-of-the-art information fusion,   close to several submarine cables connecting France, the UK,
anomaly detection, and automated reasoning techniques. Sec-        and the USA. According to an Irish military source, the scope
tion V presents analyses on the Nord Stream explosions, the        of this operation was a demonstration of capability to sabotage
cutoff of the underwater cable SHEFA-2 connecting the Shet-        underwater cables [14].
land Islands and the UK mainland [11], and the anomalous              The highest risk associated with underwater cables is rep-
behaviour of a large vessel in the Adriatic Sea. Concluding        resented by high-density maritime bottlenecks. For instance,
remarks are provided in Section VI.                                seven intercontinental cables pass through the Strait of Gibral-
                                                                   tar, between Morocco and the Iberian Peninsula, connecting
                                                                   the Mediterranean Sea with the Atlantic Ocean. Another crit-
      II. U NDERWATER C RITICAL I NFRASTRUCTURE
                                                                   ical point is the passage through the Red Sea between the
   Nowadays, submarine pipelines and cables represent a vital      Mediterranean Sea and the Indian Ocean, with sixteen un-
infrastructure for global finance, economy, maritime security,     derwater cables passing through the Egyptian mainland [12].
and everyday life. Due to their undersea concealment, con-         Even though most countries could cope with a significant de-
cern about UCIs is usually risen to the public and institutional   crease in bandwidth in case of simultaneous damage to multi-
attention only after a major accident occurs, a phenomenon         ple underwater cables, island states and oversea territories, not
referred to in [12] as “collective sea blindness”. Despite their   boasting the same redundancy, are the most vulnerable ones.
importance and influence on many aspects of our societies,         A recent example is the interruption of communications with
UCIs have only recently seen increasing political and schol-       the Shetland Islands and the Faroe Islands, after the commu-
arly attention, mostly sparked by military concerns and recent     nication cable SHEFA-2 was severely damaged in two distinct
accidents involving underwater gas pipes and cables. Subma-        points, most likely by trawling fishing boats.
rine pipelines are the backbone for energy transportation to the      The aforementioned critical aspects of the underwater ca-
market, e.g., oil and gas, as they connect increasingly com-       ble networks are analyzed in terms of graph robustness and
plex structures, such as offshore rigs, floating storage, and      resilience in the next subsection.
floating processing units, that directly feed ashore. The pipes
themselves are of steel, and concrete is used to prevent im-
pacts and damage from ships’ anchors. But these resources are      A. Robustness and resilience
nonetheless vulnerable and thence of concern, witness the re-        UCIs are increasingly interconnected and interdependent,
cent explosion of the Nord Stream pipeline and its effect on       thus providing valuable benefits in terms of efficiency, quality
Monitoring of Underwater Critical Infrastructures: the Nord Stream and Other Recent Case Studies
4

of service, performance, and cost reduction. However, these         dency is a bidirectional relationship between two infrastruc-
interdependencies increase the vulnerability of UCIs to acci-       tures through which the state of each infrastructure influences
dental and malicious threats, as well as the risk of a domino       or is correlated to the state of the other. Types of interdepen-
effect on the whole networked infrastructure. Consequently,         dencies include the following [21].
the impact of infrastructure components’ failures can be ag-           • Physical interdependencies, which arise from physical
gravated and more difficult to predict, compared to failures             links or connections among elements of the network. In
confined to a single infrastructure. As an example, blackouts            this context, disruptions and perturbations in one compo-
can be caused by the outage of a single transmission element             nent can propagate to other elements.
not properly managed by automatic control actions or operator          • Cyber interdependencies, which occur when the state of a
intervention, gradually leading to cascading outages and even-           component depends on data transmitted through the infor-
tually to the collapse of the entire network. Examples of cas-           mation infrastructure. Such interdependencies result from
cading effects due to infrastructure interdependencies leading           the increased use of computer-based information systems
to catastrophic events across multiple infrastructures spanning          for monitoring and management activities (e.g., SCADA).
wide geographical areas are documented in [15].                        • Geographic interdependencies, which exist between two
   UCIs such as pipelines, internet lines, and power cables are          infrastructures when a local environmental event can pro-
part of a complex network of critical infrastructure elements            voke changes in both of them. This generally occurs when
on the bottom of the seas. A complex system can be analyzed              the components are in close spatial proximity, e.g., infras-
by understanding how its components interact with each other             tructures that cross borders or that provide cross-border
by using network science [16]. A network representation offers           services, thus impacting the interests of different nations.
a common language to study different types of UCIs through             • Finally, logical interdependencies, which gather all inter-
graph theory, where a network is described by the system’s               dependencies that are not physical, cyber or geographic,
components called nodes or vertices, and the direct interac-             caused by, e.g., regulatory, legal, or policy constraints.
tions between them, called links or edges. The structure and
topology of such a complex network plays an essential role in
                                                                    B. Legal aspects
a system’s ability to survive random failures or deliberate at-
tacks. In a network context, the system’s ability to carry out         The legal status of underwater pipes and cables varies based
its basic functions even when some of its nodes and links may       on the legal zone in which they are located, as determined by
be missing is referred to as robustness. Additionally, a system     the United Nations Convention of the Law Of the Sea (UNC-
is resilient if it can adapt to component failures by changing      LOS). Within a country’s territorial waters, which extend up
its mode of operation, without losing its ability to function.      to 12 nautical miles from the coastline, the country has full
In order to improve resilience, it is important to identify the     jurisdiction over the pipe/cable. In the contiguous zone, which
most critical nodes of networked UCIs that are most likely          extends from 12 to 24 nautical miles from the coastline, states
to be failure points or vulnerable to attacks, and assess the       have specific law enforcement duties and obligations. Outside
consequences. Recent research on robustness and resilience          of these zones, particularly in the high seas (areas outside
of complex networks to failures and attacks include, respec-        of national jurisdiction) as well as in the exclusive economic
tively, [17] and [18]. Moreover, different models (e.g., [19],      zones of states (i.e., up to 200 nautical miles from a nation’s
[20]) have been proposed to capture the dynamics of cascading       coastline), the legal status of pipes/cables and responsibility
failures in systems characterized by some flow (e.g., informa-      for their protection is currently defined as “unclear” and “am-
tion, natural gas, electric current) over a network. This allows    biguous” [12], [22]. Furthermore, underwater pipes may also
us to understand the fraction of nodes that can be removed be-      be subject to additional regulations and laws depending on the
fore global connectivity of the network is lost, how to stop a      activities they are associated with and their specific use. To
cascading failure, and how to enhance a system’s dynamical          make an example, oil and gas underwater pipes may be sub-
robustness. As already anticipated in Section II, considering       ject to additional environmental protection and safety-related
the underwater cable infrastructure, maritime choke points can      regulations, while underwater pipes crossing national borders
be identified as critical points due to their high density of ca-   (or used for international trade) may be subject to additional
bles and maritime traffic. According to a recent analysis on        international laws and agreements.
security threats and consequences for the EU [12], two key
maritime bottlenecks are the Strait of Gibraltar and the pas-            III. S ENSORS AND C ONTEXTUAL I NFORMATION
sage between the Indian Ocean and the Mediterranean Sea via            In this section, we describe different types of sensors and
the Red Sea, respectively. The former, connecting the Mediter-      technologies that are available and can be exploited for UCIs
ranean Sea and the Atlantic Ocean, is a dense area used for         surveillance.
various maritime activities including submarine activities, with
seven intercontinental cables passing through the strait. The
latter represents the core connectivity to Asia where intercon-     A. Coastal radars and AIS
tinental cables pass through the Egyptian mainland adjacent to         Among the surveillance sensors commonly used for MS, S-
the Suez Canal to enhance the system’s dynamical robustness.        band or X-band pulse radar sensors installed along the coast-
   Understanding and analyzing the interaction and interde-         line represent a relevant and consistent source of informa-
pendencies among UCIs is of utmost importance. Interdepen-          tion [23]. However, their coverage area and maximum range
Monitoring of Underwater Critical Infrastructures: the Nord Stream and Other Recent Case Studies
5

might be limited by line-of-sight propagation. This limita-           cal geo- and time-referenced images provided by space-based
tion can be overcome by the installation and employment               sensors, e.g., SAR, multi-spectral (MSP), and hyper-spectral
of long-range sensors such as High-Frequency Surface-Wave             (HSP) sensors.
(HFSW) radars which have been considered for ship local-
ization and tracking [24]–[28]. Initially introduced for ocean        B. Satellite sensors: SAR, MSP and HSP
remote sensing, HFSW radars could dramatically increase MS               SAR is a high-resolution imaging system typically em-
coverage by their ability to detect targets at Over-The-Horizon       ployed on board satellites (or aircrafts) that has become es-
(OTH) distances. In particular, multiple HFSW radars [26]–            sential for wide-area monitoring to detect and track vessels at
[28], combined with other data sources such as AIS, satel-            sea independently of their compliance with the SOLAS con-
lite images, and contextual information, have the potential to        vention. It is an active remote sensing technology based on
provide continuous-time coverage of large sea areas at OTH            the transmission of an electromagnetic (EM) microwave sig-
distances [8], [9].                                                   nal toward the Earth, and the reception and processing of the
    Besides conventional and OTH coastal radars, AIS — an             signals scattered by any natural or artificial features on the
anti-collision broadcast system of transponders automatically         surface. The use of EM microwave signals — that undergo a
exchanging ship traffic information for maritime safety — def-        weak scattering and absorption from the atmosphere — makes
initely represents the major source of information by volume          the monitoring capability of SAR systems independent of sun-
and granularity on surface vessel traffic. According to the           light illumination, thus allowing an effective sensing regard-
International Association of Marine Aids to Navigation and            less of the weather conditions. SAR systems typically oper-
Lighthouse Authorities (IALA), the scope of AIS is “to im-            ate in a monostatic geometry, where the receiving antenna
prove the maritime safety and efficiency of navigation, safety        is co-located with the transmitting one. In this configuration,
of life at sea and the protection of the marine environment”          only the energy reflected in the backscattering direction is col-
[29]. In 2002, the International Maritime Organization (IMO)          lected by the system. The received signals are then properly
Safety of Life at Sea (SOLAS) convention [30] included a              processed to form a 2-dimensional (2D) image of the scene
mandate that requested many commercial vessels to fit on-             reflectivity in slant-range/azimuth coordinates. The features of
board AIS. Specifically, IMO requires ships over 300 Gross            the obtained image largely depend on both surface parameters,
Tonnage (GT), cargo vessels over 500 GT, all passenger ships,         e.g., material composition, small- and large-scale roughness,
and all fishing vessels over 45 meters (in EU countries over          and sensor parameters, e.g., viewing angle, frequency, polar-
15 meters [31]) to be equipped with an AIS transponder on-            ization, and spatial resolution.
board. AIS messages can be exchanged through both satellite              While active microwave remote sensing systems, such as
and terrestrial receivers [4] and convey information about ship       SAR, offer a key support for gathering rather coarse informa-
identifier, i.e., the Maritime Mobile Service Identity (MMSI),        tion at multiple frequencies, polarizations, and viewing angles,
route (position, speed, course, and true heading), and other          MSP and HSP optical sensors can be exploited fruitfully to in-
ship and voyage information, including ship and cargo type,           fer more accurate details in the spatial and spectral domains.
size, destination, and estimated time of arrival.                     MSP and HSP sensors cover the entire optical region — be-
    The analysis of AIS trajectories is used, among others, to        tween microwaves and X-rays — which refers to wavelengths
pinpoint potentially illegal or illicit activity performed by ves-    ranging from 0.3 µm to 15 µm. Space-based MSP missions
sels in specific areas of interest (see, e.g., [32], [33]). A first   allow to collect imagery easy to interpret at a usually higher
filtering of AIS trajectories could be performed according to         spatial resolution than SAR systems; however, MSP sensors
some selection criteria. In particular, considering a bounding        are sensitive to cloud and sunlight conditions, and they usually
area of Dmax kilometers around an UCI or a point of interest,         cover limited areas during each acquisition. On the other side,
e.g., Nord Stream explosion point, one could select all the AIS       HSP satellite images are characterized by very high-spectral
trajectories that have spent at least a given period of time Tmin     resolution and are suited to accurate classification, but they
inside the area. A further filtering to spot stationary or drifting   have low spatial resolution, require a large computational bur-
ships could be achieved by selecting those trajectories whose         den, and are as well sensitive to cloud and sunlight conditions.
average speed is lower than a maximum speed Smax , or whose           For the interested reader, a comprehensive review of satellite
average rate of manoeuvres per minute is higher than a pre-           sensors can be found in [4].
defined threshold. Non-kinematic information may be useful
as well for AIS-based filtering. For example, a non-kinematic-        C. UUVs equipped with acoustic sensors
based selection criteria may consist of excluding vessels whose          Unmanned Underwater Vehicles (UUVs) equipped with
small size would not allow them to represent a possible threat        acoustic sensors are rapidly becoming the predominant plat-
to underwater pipes (e.g., fishing vessels in very deep waters).      forms for undersea observation and monitoring. UUVs can be
A combination of kinematic-based and non-kinematic-based              generally classified into Remotely Operated Vehicles (ROVs)
selection criteria can also be taken into account.                    and Autonomous Underwater Vehicles (AUVs) [34]. The for-
    In reality, AIS messages can be counterfeited and AIS             mer ones are tethered to ships or marine platforms and oper-
transponders can be easily switched off, or vessels could nav-        ated from above the water’s surface. The tether allows opera-
igate outside the coverage of coastal/satellite AIS receivers.        tors to receive sensor data, e.g., sea-bottom images from cam-
For these and other reasons, AIS data is often complemented           eras, and, if needed, guide remotely the ROVs almost in real-
with data from other sensors or sources; for instance, histori-       time; however, the operation range is limited by the tether’s
Monitoring of Underwater Critical Infrastructures: the Nord Stream and Other Recent Case Studies
6

                                60 ◦N

                                                                                                                                 60 ◦N
                             59 ◦N

                                                                                                                              59 ◦N
                  egrees]

                                                                                                                   egrees]
                            58 ◦N

                                                                                                                             58 ◦N
       Latitude [d

                                                                                                        Latitude [d
                        57 ◦N

                                                                                                                         57 ◦N
                     56 ◦N

                                                                                                                      56 ◦N
                  55 ◦N

                                                                                                                   55 ◦N
               54 ◦N

                                                                                                                54 ◦N
                                                          0             200              500 km                                                            0             200              500 km

                             14 ◦    E   16◦E
                                                                                                   ◦E
                                                                                                  28                          14 ◦    E   16◦E                                                     28◦ E
                                                18◦ E         20◦ E   22◦ E   24◦ E   26◦ E                                                      18◦ E         20◦ E   22◦ E   24◦ E   26◦ E

                                                        Longitude [degrees]                                                                              Longitude [degrees]
                 (a) Density map of the entire maritime traffic of the Baltic Sea.                                            (b) Density map of the stationary areas of the Baltic Sea.
Fig. 3. Density maps of the maritime traffic in the Baltic Sea built using AIS data from September 1st to September 15th, 2022. A higher brightness
corresponds to a higher traffic density. Green and red dotted lines show the Nord Stream 1 and 2 gas pipelines, respectively.

length. On the other side, AUVs are untethered and computer-                                              analysis of seismic waves on the ocean bottom and for subma-
controlled, with little or no operator interaction while perform-                                         rine structural characterization [38], [39]. It is enabled by fiber
ing their pre-programmed subsea mission; multiple AUVs can                                                optic installed along underwater infrastructures, that continu-
also cooperatively form an intelligent sensing network for the                                            ously allows the monitoring in real time of underwater assets.
monitoring of large regions of interest [35], [36]. Even though                                           While traditional monitoring systems rely on discrete sensors
AUVs can be programmed to survey larger areas than ROVs,                                                  measuring at pre-fixed points, the fiber optic cable enables a
their operating range is dependent on the duration of their bat-                                          continuous monitoring along a very long portion of the un-
teries. Furthermore, underwater communications, commonly                                                  derwater infrastructure. Even though current commercial DAS
exploiting the sound channel, are unreliable and character-                                               systems allow a thorough monitoring along a maximum dis-
ized by limited bandwidth and range, thus limiting the ability                                            tance of 50 kilometers, recent studies have shown that per-
of AUVs to effectively share sensor information in real time.                                             sistent monitoring could be enabled up to a hundred kilome-
Therefore, the choice among ROVs and AUVs is dependent                                                    ters. The most common DAS technologies are based on phase
on the mission requirements as well as on maximum range,                                                  sensitive Optical Time Domain Reflectometer (φ-OTDR) and
operating depth, time to cover a required distance, and type                                              coherent OTDR (C-OTDR) [40]. A DAS interrogator unit gen-
and size of sensors they could bring on board, e.g., acoustic,                                            erates a series of laser pulses, sends them through the optical
magnetic, optical, and oceanographic.                                                                     fiber cable, and collects the backscattering of the light along
   Since optical and magnetic waves do not propagate well in                                              the length of the fiber. The analysis of the backscattered sig-
seawater, acoustic sonars, which employ sound waves to de-                                                nal by means of classification algorithms allows to detect and
tect and consecutively localize underwater objects, are nowa-                                             locate events such as leaks, intrusion activities, cable faults,
days the most common technology for undersea surveillance.                                                or other anomalous events.
Passive sonars rely on the reception and processing of acous-
tic information that is radiated by underwater noise sources                                              E. Contextual Information
e.g., the noise produced by ships or submarines propellers;                                                  Contextual information is generally intended as information
active sonars, instead, send an acoustic waveform and process                                             that does not directly refer to the assets under surveillance,
the signals reflected by underwater objects. Synthetic aper-                                              but to their surroundings. Contextual information adds to the
ture sonars (SAS) [37] represent an established technology to                                             operational picture the clarity that is needed to drive the ac-
collect high-resolution images of the seabed and underwater                                               tions to be taken. As such, contextual information is seldom
infrastructures. Similarly to SAR, a SAS continously transmits                                            conveyed by a single piece of information alone, but is rather
acoustic signals and combines successive received pulses re-                                              derived from a mixture of experience, domain knowledge, and
flected by an object or a surface along a known track to create                                           data artifacts. In the MS setting, examples of contextual infor-
a 2D image of the illuminated area.                                                                       mation include geographic databases, such as the bathymetry
                                                                                                          and the displacement of critical infrastructures; geospatial in-
                                                                                                          formation, such as meteorology and oceanography; intelli-
D. Distributed acoustic sensing
                                                                                                          gence reports, comprising human intelligence–HUMINT–and
  Distributed Acoustic Sensing (DAS) is an emerging tech-                                                 open-source intelligence–OSINT; reports on business owner-
nology which is commonly employed for the detection and                                                   ship structures, sanctions, and criminal behavior of ship own-
7

ers; and derived information from past/historical data, such as      or a false alarm. In a Bayesian formulation, the MTT method
maritime Patterns-Of-Life (POLs). To make a practical exam-          amounts to estimating at each time (approximations of) the
ple, a vessel’s trajectory could raise major concern if the vessel   marginal posterior distributions of the detected targets’ states,
was previously involved in criminal activities, if only opaque       using all the measurements available up to the current time.
ownership-related information of the vessel is available, or if      MTT methods have to deal with various challenges, for exam-
there is evidence of the vessel deploying specialized equipment      ple, the heterogeneity of the different information sources [8],
in proximity of sensitive infrastructures. Moreover, taking into     [9], asynchronicity, out-of-sequence measurements [41], la-
account bathymetry is crucial, since the difficulty and risk in      tency, and the measurement-origin uncertainty (MOU) [42],
performing sabotage operations are directly proportional to the      i.e., the fact that it is unknown which target (if any) generated
sea depth. Furthermore, POLs can be considered as particu-           which measurement. Existing MTT algorithms can be broadly
lar sets of behaviors and movements, e.g., waiting, navigating,      classified as vector-type algorithms, such as the joint proba-
or drifting, associated with specific entities, e.g., fishing ves-   bilistic data association filter [43] and the multiple hypothesis
sels, cargo vessels, and oil tankers, over a defined period of       tracker [44], [45], and set-type algorithms, such as the (car-
time. In this context, density maps, built using historical AIS      dinalized) probability hypothesis density filter [46], [47] and
data in a given time interval and area, provide a preliminary        multi-Bernoulli filters [48]. Vector-type algorithms represent
insight on the most common POLs. This crucial information            the multitarget states and measurements by random vectors,
can be used for a preliminary classification of AIS trajecto-        whereas set-type algorithms represent them by random finite
ries. In fact, a selected AIS trajectory can be considered more      sets. Algorithms of both types have been developed and eval-
or less suspect depending on whether its behavior seems com-         uated, and several limitations have been noted [9]. First, the
patible with the detected POLs in the given period of time           fusion of heterogeneous information sources is not straightfor-
and area. Figure 3a shows a density map of the entire mar-           ward. Second, they do not adapt to time-varying model param-
itime traffic in the Baltic Sea, built using AIS data collected      eters. And third, their complexity usually does not scale well
from September 1st to September 15th, 2022. Purple patterns          in relevant system parameters, e.g., the number of sensors.
highlight the most common maritime routes in the considered             An emerging approach to MTT and IF — one with flexi-
region. The same data have been used to derive a density map         bility, low complexity, and useful scalability — is based on a
of the stationary areas as shown in Fig. 3b.                         factor graph and the sum-product algorithm (SPA) [42]. First,
                                                                     a factor graph representing the statistical model of the MTT
IV. S EABED - TO -S PACE S ITUATIONAL AWARENESS (S3A)                problem is derived; then, the SPA is used to solve efficiently
   The major challenge that operators and analysts face is iden-     the MOU problem and obtain a principled and intuitive ap-
tifying patterns emerging within very large datasets, e.g., AIS,     proximation of the Bayesian inference needed for target detec-
SAR, optical, and multispectral data, when the goal is to an-        tion and estimation. A major advantage of the SPA is its abil-
ticipate possible future behaviors of suspicious assets and the      ity to exploit conditional independence properties of random
related threats. In this context, information undoubtedly plays      variables for a drastic reduction of complexity; thereby, SPA-
a crucial role, and artificial intelligence (AI) opens up unprece-   based MTT algorithms can achieve an attractive performance–
dented possibilities for surveillance systems to improve MS,         complexity compromise, making them suitable for large-scale
and in particular the resilience of UCIs. AI and Information         tracking scenarios involving a large number of targets, sen-
Fusion (IF) can easily process immense volumes of informa-           sors, and measurements, and allowing their use on resource-
tion, fused from a variety of sources and generated from a           limited devices. Generally, the complexity of an SPA-based
very large number of monitoring assets on a day-to-day ba-           MTT algorithm scales quadratically in the number of targets,
sis, thus enabling a potential future transition to an holistic      linearly in the number of sensors, and linearly in the number
perspective of S3A. The learned knowledge therefrom can be           of measurements per sensor, and outperforms previously pro-
used as a valuable support to the cognitive processes (percep-       posed methods in terms of accuracy (see [42] and references
tion, comprehension, and projection) of analysts and opera-          therein).
tors to anticipate future behaviors and/or identify threats and         SPA-based MTT algorithms can be easily extended to auto-
critical situations that might endanger UCIs. In the follow-         matically estimate unknown and time-varying parameters [49],
ing, we will provide an overview of state-of-the-art Bayesian        such as detection probabilities of sensors, incorporate multiple
IF and Multi-Target Tracking (MTT), anomaly detection, and           dynamic models, and in particular fuse heterogeneous data [8],
automatic reasoning techniques, that might enable S3A and            e.g., from terrestrial radars, SAR, optical sensors, and AIS. In
improve the monitoring of UCIs.                                      the context of S3A and in particular UCIs monitoring, the fu-
                                                                     sion of satellite data, e.g., SAR, with AIS potentially allows the
                                                                     identification of ships, which switch off the AIS during anoma-
A. Bayesian IF and MTT                                               lous activities or sabotage operations. The fusion of this infor-
   The main objective of a multisensor MTT method is to se-          mation is often difficult due to the asynchronicity and sparsity
quentially estimate the number of targets together with their        of AIS messages, and the non-trivial association between mes-
states, e.g., position, velocity, course, and heading, in a par-     sages and targets. Indeed, although each AIS message usually
ticular maritime area, by fusing measurements from multiple          includes a unique identifier–the MMSI–, this may be absent,
heterogeneous sensors. Each measurement is either a noisy            incorrectly received, or observed for the first time, in which
observation of a target’s kinematics, shapes, or other features,     case no prior information is available on the target–message
8

association. The SPA-based MTT method can be efficiently             anomaly detection fit a statistical model representing normal
extended to fuse AIS messages and measurements obtained              vessel behavior to the given historical vessel movement data,
from SAR, optical images, or other sensors, and to identify          and then apply a statistical inference test to determine whether
(or label) each detected ship by means of the MMSI.                  a new vessel observation belongs to this model or not. Obser-
                                                                     vations that have a low probability of being generated from
B. Anomaly detection                                                 the learned model, based on the applied test statistic, are de-
   Increasing automation through a large number of advanced          clared as anomalous behaviors. Bayesian networks, Gaussian
data-driven methods and techniques for maritime anomaly de-          processes, and the Gaussian mixture model represent the ma-
tection has enabled the system and the operator to spot com-         jor methods within the stochastic approach.
plex situations by correlating various events from all surveil-         Current research on maritime anomaly detection considers
lance sensors and classify them into important incidents [50]–       the aforementioned types of anomalies. The deviation from a
[52]. An anomaly in the maritime domain can be described             standard route is the most prominent anomaly type that re-
as a behavior that is not “normal” or, more specifically, not        search addresses by extracting frequently traveled sea routes
expected to occur during regular operations [50], and it can         from historical AIS data, e.g., via clustering. Unknown AIS
refer to a sudden change in vessel kinematic behavior (such as       tracks can then be compared in order to investigate whether
unusual speed or location), deviation from standard sea lanes,       they are similar enough to the extracted routes, or in the case
unexpected AIS activity, unexpected port arrivals, close ap-         of clustering, belong to one of the identified route clusters.
proach, and zone entry [53]. In particular, zone entry anoma-        These approaches work very well in areas where many ships
lies involve ships entering in protect environmental areas, or       take similar routes [56]–[58]. A different approach [32], [59]
approaching military installations or UCIs.                          faces the same anomaly within a stochastic framework by com-
   Most anomaly detectors require learning an underlying             bining the available context data with a parametric model of
model representing the normal behavior by using the available        the vessel’s kinematic behavior and running a hypothesis test-
historical data. Based on the learned normalcy model, detec-         ing procedure to make decisions on the existence of anoma-
tors can decide whether new data can be classified as normal or      lous deviations relying upon the available measurements (e.g.,
anomalous behavior. According to the available proposals and         AIS, radar, SAR). Further stochastic strategies address the joint
studies [51], [54], the data-driven methodologies for maritime       problem of sequential anomaly detection and tracking of a tar-
anomaly detection can be divided into machine learning and           get subject to switching anomalous deviations in a Bayesian
stochastic approaches. Machine learning techniques are able          framework [60]–[62]. Other approaches particularly consider
to identify patterns emerging within huge amounts of maritime        deviations from standard routes in the presence of unexpected
data, fused from various uncertain sources and generated from        AIS activity. Indeed, AIS tracks of ships are often character-
monitoring thousands of vessels a day, so as to act proactively      ized by large blind spots, and this may be due to uninten-
and minimize the impact of possible threats. The general aim         tional technical problems, radio interference, attenuation, or
of such an approach includes frequent pattern discovery, trajec-     actual equipment manipulation, such as intentionally turning
tory pattern clustering in a multidimensional feature space, tra-    off AIS transceivers [32], [63], [64]. Moreover, AIS signals
jectory classification, forecasting, and anomalies/outliers de-      can be easily spoofed by external attackers or the crew itself
tection. The machine learning framework mainly comprises             willing to obscure their locations [33], [65]. The AIS inten-
the following unsupervised and supervised methodologies. i)          tional interruption or spoofing could indicate a will to hide
Distance-based clustering methods are mainly based on the            some illegal activities, such as smuggling on coast or with
nearest neighbor algorithm and implement a well-defined dis-         other ships, or entry in unauthorized areas. Zone entry as an
tance metric; the greater the distance of the object to its neigh-   anomaly type is considered only marginally [53], [66]. Re-
bor, the more likely it is to be an outlier. ii) Density-based       stricted zones with entry ban are learned implicitly as part
clustering methods identify distinctive groups/clusters in the       of the general shipping routes and trajectories [66], whereas
data based on the idea that a cluster in a data space is a con-      more elaborate methods such as predicting whether a zone en-
tiguous region of high point density, separated from other such      try is likely to occur soon are proposed in [53]. Anomalous
clusters by contiguous regions of low point density. In particu-     port arrival is taken into account in [67] looking at ferries that
lar, the Density-Based Spatial Clustering of Applications with       run regular routes according to a fixed schedule, while close
Noise (DBSCAN) algorithm and its variations have become              approach anomalies are investigated in [53], [68], [69].
very popular for their convenient properties: these methods do
not require specifying the number of clusters and have the
ability to derive arbitrarily shaped clusters and identify out-      C. Reasoning for situation awareness
liers [55]. iii) Classification methods require the construction        Besides the data-driven approaches described earlier, there
of a classifier, that is, a function that assigns a class label to   exist situations where higher-level reasoning needs to be con-
instances described by a set of attributes. Using supervised         sidered. This can be useful for aligning highly heterogeneous
learning approaches, trajectories or segments of a trajectory        information sources, which range from HUMINT and OSINT
can be classified into some categories, which can be motions,        descriptions of the vessels’ current and projected behavior,
human activities, or transportation modes. The main classifi-        through contextual information to MTT tracks and anomaly
cation methods include neural networks, support vector ma-           reports. This is in line with the Activity-Based Intelligence
chines, and decision trees. Stochastic approaches to maritime        (ABI) [70], [71] paradigm that has been in use since the war
9

                                                                                                                                                                                                                          AIS Interpolated Trajectory

                                     56.1◦ N
                                                                                                                                                                                                                          SAR Detection y
                                      56.0◦ N
                                     55.9◦ N                                                                                                                                                                              Nord Stream Leakage
                                    55.8◦ N
        Latitude [degrees]

                                                                                                                  Panel (b)
                                                                                                                                                                                                                                  1
                                                                                                                                                                                                                             am
                                                                                                                                                                                                                         tr e
                                    55.7◦ N

                                                                                                                                                                                                                   r   dS
                                                                                                                                                                                                                 No                   2
                                                                                                                                                                                                                               am
                                                                                                                                                                                                                           tr e
                                                                                                                                                                                                                     r   dS
                                   55.6◦ N

                                                                                                                                                                                                                   No
                                  55.5◦ N
                                  55.4◦ N

                                                                                                                                                                          Panel (c)
                                 55.3◦ N

                                                                                                                          0                                         20                            50 km
                                 55.2◦ N

                                                 14.4◦ E    14.6◦ E          14.8◦ E     15.0◦ E   15.2◦ E      15.4◦ E       15.6◦ E                        15.8◦ E      16.0◦ E        16.2◦ E       16.4◦ E          16.6◦ E           16.8◦ E    17.0◦ E

                                                                                                                              Longitude [degrees]
                                                                                                   (a) Full Sentinel-1 SAR image over the Baltic Sea.
                                      56.76◦ N

                                                                Trajectory
                                                                                                                                                               56.50◦ N

                                                                                                                                                                                    Trajectory
                                                                AIS Reported Positiony                                                                                              AIS Reported Position
                                                                SAR Detection
                                      55.74◦ N

                                                                                                                                                                                    SAR Detectiony
                                                                Interpolated Position                                                                                               Interpolated Position
                                                                                                                                                               55.48◦ N
            Latitude [degrees]

                                                                                                                                        Latitude [degrees]
                                      55.72◦ N

                                                                                                                                                               55.46◦ N
                                      55.70◦ N

                                                                                                                                                               55.44◦ N
                                      55.68◦ N

                                                                                                                                                               55.42◦ N

                                                      0             2                   5 km                                                                              0              2                  5 km

                                                     15.40◦ E           15.44◦ E        15.48◦ E     15.52◦ E         15.56◦ E                                                15.98◦ E           16.02◦ E          16.06◦ E               16.10◦ E       16.14◦ E

                                                                                Longitude [degrees]                                                                                                 Longitude [degrees]
                        (b) Detail of the SAR image showing three associated detections.                                                      (c) Detail of the SAR image showing one not-associated detection.
Fig. 4. Nord Stream use case. Sentinel-1 SAR image acquired over the Baltic Sea some days before the explosions. Colored solid lines are vessels’ trajectories
obtained by interpolating the AIS positions provided by the vessels themselves. Circles are ships as detected within the SAR image: the color of the circle
identifies the detection as coming from a vessel whose AIS trajectory has the same color; a white circle indicates that the detection is not associated with
any AIS trajectory. Panels (b) and (c) present two details of the full SAR image showing examples of associated detections and not-associated detections,
respectively. Here, the crosses depict AIS reported positions, and the stars are the interpolated positions of the vessels at the time of the image acquisition.

in Afghanistan and has brought a new vision of intelligence                                                                                 count for its reliability and possibly contextual information.
pushing forward the development of multi-intelligence (multi-                                                                               In cases where different sources provide reports on the same
INT) capabilities, which aim at considering in an exhaustive                                                                                target property, these reports can be aligned in accordance to
way all sources of information. In order to make sense of                                                                                   an appropriate correction model; if the reports refer to differ-
this kind of data, each source needs to be corrected to ac-                                                                                 ent properties, instead, they are used as inputs to a reasoning
10

                                            0     1       2         3       4      5        6         7      8       9         10        11     12      13 kn

                                  56.4◦ N
                                                                                                                 0         10                    25                 50 km
                                  56.0◦ N
        Latitude [degrees]
                                55.6◦ N
                              55.2◦ N

                                                                                                                                                                    Trajectory
                             54.8◦ N

                                                                                                                                                                    Nord Stream 1y
                                                                                                                                                                    Nord Stream 2y
                                                                                                                                                                    Nord Stream Leakage
                                                          0    20           50              100 km

                             14.0◦ E            14.5◦ E   15.0◦ E       15.5◦ E   16.0◦ E       16.5◦ E   17.0◦ E    17.5◦ E        18.0◦ E   18.5◦ E     19.0◦ E

                                                                                    Longitude [degrees]

Fig. 5. Nord Stream use case. Full trajectory of the vessel of interest a few days before the explosions. The trajectory spans several days and its color (cyan
to magenta) is related to the vessel’s speed (slower to faster); grey arrows indicate the direction of the vessel at the beginning and at the end of the trajectory.
The locations of the gas leakage are marked by yellow diamonds.

system that verifies their consistency. For example, consider                                                                 Possible uses of such rule-based approaches range from triv-
source A which reports a particular vessel as a tanker, and a                                                              ial to significantly more complex ones. A trivial illustration
source B which reports it to be a cargo vessel. Given that the                                                             could be reasoning about a vessel’s inconsistent AIS status. For
reports are concerned with the same property with different                                                                example, a trajectory classifier can be considered one source,
degrees of semantic granularity, this information can be read-                                                             and the vessel’s AIS navigational status the other. If the navi-
ily aligned. On the other hand, a source may report on the                                                                 gational status is inconsistent with the type of trajectory pro-
vessel type, and the other on its speed. In this case, the prop-                                                           vided by the classifier, the AIS information reported by the
erties can be aligned using a reasoning system verifying the                                                               vessel can be considered inconsistent. This by itself is un-
consistency of the speed given the vessel type. This can high-                                                             likely to mean that the vessel is involved in illegal activity,
light conflict between the sources which can further lead to                                                               but it may be an indication of anomaly which should lead to
conclusions about spoofing or another anomaly, depending on                                                                further investigation. More complex evidential networks have
the exact scenario.                                                                                                        also been proposed in this context to assess the vessel’s in-
                                                                                                                           tent, likelihood of criminal activity, or the overall threat level
   Tackling hybrid threats is particularly challenging as it is                                                            posed. One particular strength of the belief-theoretic approach
necessary to predict an event, that, above all, is rare and can                                                            provided by the evidential networks is that the rules are con-
be essentially considered a black-swan event. As such, it is                                                               sidered to be partially uncertain, thus the reasoning can still
unlikely to provide an analysis based on data and machine                                                                  be performed with missing data. This can be leveraged to
learning only; in these cases it is possible to leverage ex-                                                               identify which sources of information should be queried in
pert information using rule-based systems. One such approach,                                                              order to improve the quality of the inference results. Finally,
which allows a degree of semi-causal reasoning, involves using                                                             the transparent-by-design property of expert systems facilitates
valuation-based systems with the Dempster-Shafer theory [72]                                                               the implementation of explanation abilities; these describe the
(also known as the theory of belief functions). Such systems                                                               relative contribution of each source to the decision made, the
are also known as evidential networks. The information pro-                                                                overall conflict and uncertainty in the answer obtained, as well
vided by the myriad of sources described earlier is corrected                                                              as the impact of various uncertainties in data [76].
and aligned with a common vocabulary using a mechanism
such as contextual belief correction [73], behavior-based cor-                                                                Furthermore, for a better understanding of overall situation
rection (BBC) [74], or its context-aware extension [10]. A set                                                             awareness which includes multiple entities interconnected by
of rules elicited from the experts is used to construct a valu-                                                            a set of relations, we can leverage conceptual graphs or knowl-
ation network which is defined by a set of variables (some of                                                              edge graphs. Recent work on these has explored embedding
which may be directly mapped to the observations provided by                                                               uncertainty in such graphs and establishing links with belief
the sources whereas the others are inferred) and the relations                                                             functions theory and evidential networks in order to allow un-
between them [75].                                                                                                         certain reasoning about multiple entities [77]. In the context
11

                                                                                                                                        13 kn                                                                                                                             13 kn

                             55.65◦ N
                                              Trajectory                                                                                                                                     Trajectory

                                                                                                                                                                     55.60◦ N
                                                                                                                                        12                                                                                                                                12
                                              Nord Stream Leakage                                                                                                                            Nord Stream Leakage                                              m   1
                                                                                                                                        11                                                                                                               Strea
                                              SAR Detection                                                                                                                                                                                         Nord                  11
                                                                                                                                                                                             SAR Detection
                                                                                                                                        10                                                                                                                                10
                             55.60◦ N

                                                                                                                                                                     55.55◦ N
                                                                                                                                        9                                                                                                                                 9
        Latitude [degrees]

                                                                                                                                                Latitude [degrees]
                                                                                                                                        8                                                                                                                                 8
                             55.55◦ N

                                                                                                                                        7                                                                                                                                 7

                                                                                                                                                                     55.50◦ N
                                                                                                                                        6                                                                                                                                 6
                                                                                                                                        5                                                                  2                                                              5
                                                                                                                                                                                                       m
                             55.50◦ N

                                                                                                                                                                                                    rea

                                                                                                                                                                     55.45◦ N
                                                                                                                                        4                                                        St                                                                       4
                                                                                                                                                                                            rd
                                                                                                                                                                                          No
                                                                                                                                        3                                                                                                                                 3
                                                                       1                      2
                                                                  am                      m
                                                                                       rea
                             55.45◦ N

                                                                re                                                                      2                                                                                                                                 2
                                                             St                     St

                                                                                                                                                                     55.40◦ N
                                                        rd                     rd
                                                      No                     No                   0    2        5            10 km      1                                                                                             0    2        5          10 km      1

                                                                                                                                        0                                                                                                                                 0
                             15.4◦ E              15.5◦ E              15.6◦ E             15.7◦ E              15.8◦ E                                                         15.6◦ E              15.7◦ E             15.8◦ E      15.9◦ E           16.0◦ E
                                  Longitude [degrees]                                                      Longitude [degrees]
       (a) Extract of the trajectory also reporting the vessel’s location as de-(b) Extract of the trajectory also reporting the vessel’s location as de-
       tected                                                                   tected
       in a SAR image acquired at time TA .                                     in a SAR image acquired at time TB .

                                                                                                                                        13 kn                                                                                                                             13 kn

                                                                                                                                                                     55.60◦ N
                                              Trajectory                                                                                                                                     Trajectory
                                                                                                                                        12                                                                                                                                12
                                              Nord Stream Leakage                                                                                                                            Nord Stream Leakage
                             55.60◦ N

                                                                                                                                        11                                                                                                                            1   11
                                                                                                                                                                                                                                                                  m
                                                                                                                                                                                                                                                             Strea
                                                                                                                                        10                                                                                                              Nord              10
                                                                                                                                                                     55.55◦ N

                                                                                                                              m     1
                                                                                                                         Strea
                                                                                                                    Nord                9                                                                                                                                 9
        Latitude [degrees]

                                                                                                                                                Latitude [degrees]
                             55.55◦ N

                                                                                                                                                                                                                                                                  m   2
                                                                                                                                        8                                                                                                                    Strea        8
                                                                                                                                                                                                                                                        Nord
                                                                                                                                                                     55.50◦ N

                                                                                                                              m2        7                                                                                                                                 7
                                                                                                                         Strea
                                                                                                                    Nord
                                                                                                                                        6                                                                                                                                 6
                             55.50◦ N

                                                                                                                                        5                                                                                                                                 5
                                                                                                                                                                     55.45◦ N

                                                                                                                                        4                                                                                                                                 4
                             55.45◦ N

                                                                                                                                        3                                                                                                                                 3
                                                                                                                                                                     55.40◦ N

                                                                                                                                        2                                                                                                                                 2

                                                                                                  0    2        5            10 km      1                                                                                             0    2        5          10 km      1

                                                                                                                                        0                                                                                                                                 0
                                        15.5◦ E             15.6◦ E              15.7◦ E              15.8◦ E             15.9◦ E                                                  15.5◦ E                     15.6◦ E      15.7◦ E       15.8◦ E           15.9◦ E
                                                                 Longitude [degrees]                                                                                                                               Longitude [degrees]
                                                             (c) Extract of the trajectory.                                                                                                                    (d) Extract of the trajectory.
Fig. 6. Nord Stream use case. Extracts of the full trajectory of the vessel of interest reported in Fig. 5. Each panel reports a portion of the full trajectory that
spans several hours. The colors (cyan to magenta) are related to the vessel’s speed (slower to faster); speeds below 3 knots are all reported in black. Grey
arrows indicate the direction of the vessel at the beginning and at the end of the trajectory, and yellow diamonds mark the locations of the gas leakage. A
red dot (in panels (a) and (b)) reports the location of the vessel as detected in a SAR image; additional details on the SAR detections are presented in Fig. 7.

of hybrid threats, this is particularly relevant to synchronised                                                                                     ships, while solid lines represent vessels’ trajectories that cover
threats originating simultaneously from several vessels coor-                                                                                        a time interval from 10 minutes before to 10 minutes after the
dinating their activity.                                                                                                                             SAR image acquisition time. These trajectories are obtained
                                                                                                                                                     by interpolating the AIS positions reported by the ships them-
                                                       V. C ASE S TUDIES                                                                             selves, and filling gaps in the data of at most 6 hours. The
                                                                                                                                                     interpolation requires the availability of AIS positions both be-
   This section reports analyses on the Nord Stream and Shet-
                                                                                                                                                     fore and after the image acquisition time; when this informa-
land Islands accidents, as well as on the anomalous behavior
                                                                                                                                                     tion is not available, e.g., during (quasi) real-time operations,
of a large vessel in the Adriatic Sea, and how surveillance
                                                                                                                                                     the vessel’s position at the time of the image acquisition can
sensors data, in particular AIS reported information and SAR
                                                                                                                                                     be inferred from the available past data [78]. The combined
images, might be beneficial for UCIs monitoring.
                                                                                                                                                     use of AIS data and satellite images (SAR, optical, MSP, and
                                                                                                                                                     HPS) allows giving an identity to a picture of a vessel that
A. Nord Stream                                                                                                                                       could complement AIS for MS and that, otherwise, would re-
  Figure 4 reports a Sentinel-1 SAR image acquired over the                                                                                          main unknown. On the other hand, the unavailability of AIS
Baltic Sea some days before the explosions that affected the                                                                                         data for a detected ship within a satellite image can be caused
Nord Stream gas pipeline [1]. The circles indicate detected                                                                                          by incorrect or lost data, or might highlight an anomalous be-
12

                                                                                                                                  circle matches that of the AIS trajectory, obtained as the in-
                         55.534◦ N
                                            AIS Reported Position
                                            Interpolated Position at TA
                                                                                                                                  terpolation of the AIS reported positions represented by the
                                            Interpolated Trajectory                                                               crosses. The stars indicate the interpolated positions of the
                                                                                                                                  vessels at the time of the image acquisition; the offset be-
    Latitude [degrees]

                                                                                                                                  tween the shape of a vessel as detected by the SAR and its
                         55.530◦ N

                                                                            TA + 0.4 mins
                                                                                                                                  interpolated AIS position is due to the unknown Doppler fre-
                                                                                                                                  quency generated by the motion of the vessel itself, and it is
                                                                                                               TA − 25.3 mins     thus related to its velocity [79]. Figure 4c, instead, shows a
                                                             TA + 10.7 mins
                                                                                                                                  single detected ship — enclosed in the white circle — which
                         55.526◦ N

                                                                                                                                  is not associated with any AIS trajectory; the closest available
                                     0.1         0.2           0.5                      1 km                                      AIS interpolated position, indeed, is more than 3 km away.
                                                                                                                                  This AIS trajectory, however, presents a relevant characteris-
                                     15.465◦ E         15.470◦ E     15.475◦ E     15.480◦ E        15.485◦ E        15.490◦ E    tic, that is, a gap of several hours (yet less than 6 hours) in
                                                                     Longitude [degrees]                                          the AIS data before and after the acquisition of the SAR im-
                           (a) Detail of the Sentinel-1 SAR image acquired at time TA .                                           age. On one hand, this could suggest that the detected object
                                                                                                                                  and the AIS trajectory depicted in Fig. 4c do refer to the same
                                                                                                                                  vessel; on the other hand, the gap in the AIS data and the de-
                                            AIS Reported Position
                                                                                                                                  tection of the ship in a position that deviates from a linear
                         55.428◦ N

                                            Interpolated Position at TB
                                                                                               TB − 28.8 mins
                                            Interpolated Trajectory                                                               path, might be an indication of an anomalous behavior.
                                                                                                                                     From the analysis of the AIS data, the behavior of another
    Latitude [degrees]

                                                                                                                                  vessel appears significant. Figure 5 shows its full trajectory
                                                                                                                                  — over several days — before the Nord Stream accident. The
                         55.424◦ N

                                                            TB + 1.6 mins
                                                                                                                                  colors, from cyan to magenta, reflect the speed of the vessel.
                                                                                                                                  Extracts of the trajectory, each spanning several hours, are re-
                                                                                                                                  ported in Fig. 6. Speeds below 3 knots are reported in black
                                                                                                                                  because large vessels, such as the one considered, are hard to
                         55.420◦ N

                                                                        0.1       0.2              0.5                    1 km    be maneuvered at such low speeds and tend to drift. These
                                                       TB + 26.9 mins
                                                                                                                                  portions of the trajectory may suggest that the ship is follow-
                                      15.840◦ E         15.845◦ E     15.850◦ E     15.855◦ E            15.860◦ E    15.865◦ E   ing a search path, that is, it is maneuvering to approach the
                                                                     Longitude [degrees]                                          pipeline, and moving away from it while drifting. Note that
                           (b) Detail of the Sentinel-1 SAR image acquired at time TB .                                           such behavior might also be compatible with other scenarios
Fig. 7. Nord Stream use case. Details of two Sentinel-1 SAR images showing
                                                                                                                                  as, for example, loitering while waiting for orders. Neverthe-
the vessel of interest. Panel (a) shows the SAR image of the vessel located                                                       less, it is worth mentioning that the region where the Nord
as marked in Fig. 6a; likewise, panel (b) shows the SAR image of the vessel                                                       Stream accident occurred is not designed as a stationary area.
located as marked in Fig. 6b. TA and TB are the acquisition times of the
SAR images, respectively, in panel (a) and panel (b). Magenta dots represent
                                                                                                                                     The presence of the vessel in the area is corroborated by
the vessel’s locations as reported by the AIS, while the blue stars indicate the                                                  its detection in two Sentinel-1 SAR images; Figs. 6a and 6b
vessel’s interpolated locations at time TA and time TB . Dashed lines reproduce                                                   report the locations of the vessel as detected in the SAR im-
the vessel’s trajectories obtained by interpolating the AIS reported locations.
                                                                                                                                  ages, while Figs. 7a and 7b show details of the mentioned
                                                                                                                                  Sentinel-1 SAR images. Both the SAR images are acquired
                                                                                                                                  while the vessel is drifting: this is confirmed by the vessel’s
havior that requires further investigation.                                                                                       speeds reported in Figs. 6a and 6b at the time of the acqui-
   The association between AIS trajectories and SAR detec-                                                                        sition (below 3 knots) and by the orientation of the vessel as
tions in Fig. 4a is achieved by solving a specific assignment                                                                     reported in Fig. 7. Finally, note that the slight offset between
problem (clearly, other solutions are available in the MTT lit-                                                                   the vessel’s trajectory (dashed line) and the shape of the ship
erature, discussed in the previous section). The assignment                                                                       as acquired by the SAR, particularly evident in Fig. 7b, is
cost between any SAR detection–AIS trajectory pair is the                                                                         compatible with the vessel’s AIS reference point.
relative distance between the location of the SAR detection                                                                          Beyond the aforementioned kinematic characteristics, two
and the interpolated position of the vessel at the time of the                                                                    important remarks are useful to assess the potential implica-
image acquisition if such a distance is below 3 km, and it                                                                        tion of the vessel in the Nord Stream explosions. The former
is assumed infinite otherwise. The association is then repre-                                                                     is related to the vessel’s ownership risk assessment that is
sented by the color of the circle that matches the color of                                                                       considered very high, thus not facilitating the identification of
the AIS trajectory which it is associated with; white circles                                                                     beneficial owners. The second remark is related to the opera-
represent SAR detections that are not associated with any AIS                                                                     tions which can be conducted by the vessel: according to sev-
trajectory. We observe that the majority of the vessels detected                                                                  eral navy officers, consulted by the authors, the vessel would
in Fig. 4a are associated with an AIS trajectory. Figures 4b                                                                      have been perfectly able to support and coordinate a sabotage
and 4c present two examples of associated detections and not-                                                                     operation using specific instrumentation, such as a ROV.
associated detections, respectively. The first panel shows three                                                                     As discussed in the previous sections, all the aforementioned
detected ships, each within a colored circle. The color of the                                                                    information needs to be ingested and automatically processed
You can also read