INEC - 2018 - Paper 035
INEC - 2018 - Paper 035
INEC - 2018 - Paper 035
Synopsis
In recent decades the UK has made significant advances in its approach to, and its results from, the
management of naval platform vulnerability. This paper explores the history, guiding principles and
assessment techniques of successful vulnerability management.
World War II lessons learned are reviewed and shown to be still relevant today. These include structural and
systems design features for the management of blast and fragmentation.
Requirements must be set which are realistic and contractual. Through the design of several classes of ship
using current vulnerability management principles it is now clear what can be achieved. Therefore realistic
requirements can be effectively set.
Quantitative vulnerability assessment is a key part of the design process, from the earliest concept to build
and beyond. It is never too early to consider vulnerability, as the biggest gains can be made for the least cost
during the early concept phases. However, early promise can be compromised by careless addition of
supporting systems and services, so continuous monitoring is required.
In order for vulnerability assessments to keep pace with and guide the direction of the developing design,
efficient assessment tools are needed. If the model takes too long to build, the tool offers purely an audit
function, rather than being a design aid. Such a tool is also an important input to Operational Analysis of the
in-service fleet. As such, very large parameter spaces of results are needed, for the full threat spectrum
against the whole fleet in a range of scenarios.
SCL has developed the Purple Fire tool to facilitate the sorts of assessment required for modern platform
designs, weapon programmes and operational analysis in support of the fleet. It provides the analyst with the
ability to construct platform representations very quickly, meaning less model build time and more analysis
time. It automates the consideration of large parameter spaces allowing in-depth assessments to be conducted
quicker than ever.
Keywords: Vulnerability, historical lessons, requirements specification, vulnerability assessment, Purple Fire.
had previously been implemented and proven. The vulnerability of vital cables or pipe runs was such a feature of
early action damage reports that in the first year of WWII a study of the characteristic of shells and bombs was
made. It was quickly realised that shell fragments inside a ship were restricted to a cone with the apex at the
point of burst and the trajectory generally at less than 30 degrees to the horizontal. This meant that if two
redundant cables ran along opposite sides of the hull on the same deck the one nearest to the point of burst would
have a high degree of immunity from damage, as illustrated on the left of Figure 1 which recreates the WWII
analysis. Bombs usually detonated within 30 degrees of the vertical and produced a side spray of fragments. For
duplicated cables, both would now be at risk, but immunity of one could be restored by separating the cables by
a deck. This is shown on the right of Figure 1 where both cables A and B are in the swept region but their
alternatives of D and C are not. The swept areas illustrated are clipped by ricochet limits. Modern sea skimming
anti-ship missiles approaching other than orthogonal to the ship produce a similar pattern of fragments to the
bombs, but arrive horizontally.
Figure 1: Transverse and vertical cable separation as considered in WWII vs. shells (left) and bombs (right)
Fragment protection of the whole ship was a feature of WWII lessons, both to prevent fragments entering
from external detonations and prevent longitudinal spread from internal detonations. Modern vulnerability
reduction has seen some fragment protection of key spaces, but not as a matter of course for the whole-ship.
Conversely little in the way of blast protection was seen in WWII lessons but modern build techniques have
allowed much improved performance.
The WWII shock program was targeted at finding fixes to problems revealed by action damage. This test-
and-adjust approach has become problematic in a world of contractual relationships between owners, primes and
sub-contractors. That the old approach worked in keeping a ship fighting is evident from the historical record.
What is needed now are modern processes and methods to ensure the same outcome in current procurements.
There is a tendency for modern warship designs to concentrate on peacetime performance, be it economy,
maintainability or comfort. Whilst these are important to ensure the ship numbers and availability needed for
operations in times of tight budgets, we should be designing for war, then adapt for peace, not the other way
round.
2. Vulnerability Requirements
Requirements must be set which are realistic and contractual. Through the design of several classes of ship
using current vulnerability management principles it is now clear what can be achieved. Therefore realistic
requirements can be effectively set.
made for the least cost by considering vulnerability in the earliest structural layouts. The later vulnerability is
considered, the more limited the scope for design change and the greater the cost of the more limited changes
available. The cost attributed to vulnerability management should be judged against the potential cost of doing
nothing – which is the unnecessary loss of ships and ship’s company.
A vulnerability assessment requires representations of the platform under consideration, the threats which it
is designed to withstand and the scenarios in which the two interact.
4. Purple Fire
4.1. Overview
Under development since 2013, SCL’s Purple Fire tool facilitates the sorts of assessment required for modern
platform designs, weapon programmes and operational analysis in support of the fleet. Its formal benchmarking
against the UK’s extant assessment tool in 2017 marked its maturity, whilst the tool proved itself efficient and
capable.
It represents the distillation of SCL staff’s combined nine decades of experience in naval vulnerability &
lethality assessment into a single comprehensive modelling environment. It simulates both target platforms and
threat weapons together with a diverse range of potential scenarios for their interaction. A platform target model
contains all of the required aspects, a case study of which is presented later.
A full range of threats can be modelled including their payload, fusing and kinetic characteristics, penetration
performance and fragment distributions.
A vast range of possible threat-target interaction scenarios can then be simulated giving the analyst complete
freedom to specify attack locations, salvos, targeting biasing, etc... Each encounter is simulated to assess the
impact of all the relevant damage mechanisms: external / internal blast, fragmentation, shock, whipping and
bubble jetting as well as secondary effects like fire and flooding.
Such simulations generate a wealth of output data for analysis including equipment & system vulnerabilities
and crew casualties in both statistical and graphical forms, supporting the analyst to rapidly determine problems
and suggest their mitigation.
Built from the outset to handle vast data sets, it is ideally suited to running complex optimisation studies
involving multiple target threat combinations over diverse scenarios. Moreover, Purple Fire’s capabilities
differentiate it from other available tools in a number of areas. Many of these relate to specific details of great
importance to the user but not the wider stakeholder community. However, a number of substantial features are
worthy of expansion here.
4.2. Efficiency
The main strength lies in the efficiency of platform model building, parameter space definition, simulation
and analysis, which take significantly less user and processor time than predecessor codes. All of these aspects
are facilitated by the fact that the tool stores all input and output data in spread sheets manipulated by an Excel
add-in. Experience showed that given a bespoke tool, analysts tend to end up writing pre- and post-processors
and manipulating inputs and outputs in Excel anyway. This should not give the impression that Purple Fire is
“just a spreadsheet tool”, far from it. Rather it should show that the tool has a very efficient method for data
entry and analysis, built on a standard application used by all engineers.
The functionality built into the platform model can be efficiently displayed in the form of Block Diagrams
representing the possible ways of performing a given function. For example, there may be redundancy of power
supply to a given user, with power taken from one of two switchboards, each of which is supplied from a
different diesel generator. This is represented by a diagram of series and parallel legs, where if a route can be
traced from top to bottom without passing through an undamaged item the function is deemed to be available.
The functions can very quickly become extremely complicated – imagine the diagram for a Destroyer’s ability to
provide AAW – but by breaking this up into small chunks and providing robust visualisation the tool helps the
analyst understand the functions. An example of a real function, expanded to a limited degree but illustrating the
convenient viewing of a high level of complexity, is shown in Figure 3 (where it is not expected that the text be
readable at the scale of this document).
Figure 3: Example Functional Block Diagram (text not expected to be readable at this scale)
The essential limitation of equipment criticality is evident from Figure 4 as the colouring of items doesn’t
identify which pairs or triplets are grouped together. Consequently, while critical items coloured red means that
disabling any of these items kills the parent function, in contrast, we cannot tell which of the redundant items
coloured yellow need to be killed to kill the parent function. All that can be said is that two of these redundant
items must be disabled.
More useful for vulnerability/lethality estimates is the generalisation of criticality to compartments. In this
case each compartment’s criticality to the function is determined primarily by its own contents but also regard to
the contents of adjacent compartments. A pair of compartments whose kill will disable the function is coloured
yellow, but if these compartments are neighbours then the kill may be easier, so they are upgraded to orange.
This generalisation is useful since it can identify regions to target to kill the ship’s function (provided that the
weapon is big enough to cause damage). The generic example of this is shown in Figure 5.
From Figure 5, a number of key effects are shown which are typical of criticality analysis. This includes:
1. The missile silo as a whole is critical even though the individual cells are not;
2. The same observation applies for the funnel;
3. The aft and forward machinery spaces are redundant and both must be killed to disable the system;
4. Both gearboxes (also both shafts) are in the same compartment making it critical;
5. Both switchboards must be killed to disable the electrical system.
Note that, again, Figure 5 alone cannot identify which yellow compartments must be killed together without
further knowledge on the system. However, just as compartment criticality can reveal which pairs of equipment
must be killed, compartment pairs can be identified by extending criticality to the zone level.
The benefit of criticality assessment is that it can rapidly identify:
1. A general level of robustness of the target before even assessing vulnerability;
2. Optimisation of weapon targeting in lethality assessments.
mEX represents multi-compartment geometry of the vessel and the spaces within which the agents can move
as a mesh of nodes linked by a system of arcs. Each node represents a region of space typically occupied by a
single agent.
The node network can be quite complex given the geometry of a ship, as can be seen in Figure 6. This also
shows the outline of the hull and other obstacles which provides the physical interpretation of the node network.
A complete ship model can be built from multiple deck geometries linked by user-definable ladders or stairwells.
Life Saving Apparatus Boundary Node
Agent (crew) Inaccessible Space
Chair Node
The now-recognised benefit of this approach over legacy hydraulic tools is that human abandonments are
subject to uncertainty and cannot be realistically described deterministically.
The modelling of agent behaviour in mEX is probabilistic and each individual simulation will result in
different predicted timings and outcomes based on the particular agent behaviour. This includes random door
opening times and stair traversal times (between the maximum and minimum allowed time) and probabilistic
behaviour in overtaking, congestion avoidance, etc. Consequently, simulations are run multiple times to ensure
the output variables have converged to stable values.
mEX can also account for the effects of static heel and trim on agent motion, timings to open doors and
transverse stairs etc.
mEX also has the ability to incorporate dynamic hazards to agents as the simulation progresses. This includes
pre-determined fire hazards such as heat, smoke and toxic products which are calculated from other software
tools. These act to modify the agent’s ability to move through the network. It can force the agents to crawl to get
under the smoke or divert to alternative routes if blocked by the hazard. Finally, agents are killed if their defined
thresholds are exceeded e.g. if they are overcome by smoke or toxic products.
The link is designed to automatically launch numerous mEX simulations automatically based on the details
of the target model and the damage experienced by the threat. The link allows the user to:
• Automate the creation of an undamaged baseline mEX model from the vulnerability model;
• Automate the creation of battle damaged mEX models and extract timings back into the
vulnerability assessment to create statistical E&E and recoverability metrics.
At 2200 tons standard displacement, 100m length overall and with a beam of 10.9m, HMS Cassandra was
small by current standards. Some would now argue that it would be too small to build in survivability features.
As an illustration to the contrary, the WWII analysis of the main steering system (on the lines of Figure 1) has
been revisited. Options were considered for upper and lower cable routes, with those on the starboard side
visible in Figure 8.
Helm
Steering Gear
Upper
Lower
Figure 8: Starboard cables from helm to steering gear upper and lower routes
With similar positioning of cables on the port side, a total of four routes were evaluated. The availability of
steering was considered assuming that either one of the routes was installed or a redundant pair of the routes was
installed.
Two grids of attack points were used from port and starboard sides, the first covering the profile starboard
side of the ship as shown in Figure 9 and the second being similar but set in the horizontal plane simulating
bombs dropping from above, passing from starboard to port landing from 35m short of the starboard side up to
the centreline.
The weapons used were an aircraft’s 20mm high explosive (HE) cannon shell, an externally detonating 250lb
HE bomb, a 5in delayed action HE shell and a small anti-ship missile from the post-war period. An individual
shot of the 20mm cannon shell in Figure 10 shows that the WWII predictions in Figure 1 underestimated the
angle of the initial fragmentation cone.
Detonation point
Approach direction
Similarly, the bomb fused off the water in Figure 11 shows how fragments can pass through to the far side of
the vessel as predicted in Figure 1.
Fragments from
starboard outboard
penetrate through to
port hull
Table 1 shows the percentage chance that the steering system is lost (i.e. its vulnerability) for the different
design variants. The bomb shows substantial benefit from duplicated cable runs as predicted in WWII, with the
change now shown to cut the steering vulnerability by a factor of four. Deeper analysis showed that a lower cable
on the side closest to the detonation is the most vulnerable because it is swept by the heaviest fragments and the
cables on the opposite side are less vulnerable as the internal equipment and structure soaks up the fragmentation.
Also as expected, it is the cables on the far side of the vessel that are more at risk from shells. These small
weapons give much lower vulnerability to single hits (although multiple hits can also be considered) but the
relative change is even greater than that for the bomb and up to a factor of ten for the 5” shell.
The anti-ship missile has a more extensive fragmentation pattern and internal blast than the bomb, therefore
shows less benefit from the duplication, but nevertheless there is still a useful gain to be had, up to a factor of two
between the diagonal pair and a single upper route.
Weapon Upper single Lower single Upper pair Lower pair Diagonal pair
Without the benefit of modern assessment tools, the EM Class was implementing lessons from damage
events to significantly reduce vulnerability for little cost.
5. Conclusions
Warship vulnerability reduction is not a new topic, having been undertaken since World War II. Historical
lessons can still be relevant to modern designs, which also benefit from robust policies and procedures for
requirements specification, vulnerability management and quantitative assessment. In recent years the required
vulnerability/lethality assessments for new designs (including option assessments) and in-service operational
analysis have required increasingly complex scenarios and parameter spaces. The Purple Fire tool has been built
for efficiency of model building, preparation, simulation and analysis of such assessments.
6. References
Director of Naval Construction, “Notes on damage caused by enemy action and lessons learned during the
first year of war Sept 3rd 1939-Sept 2nd 1940”, ADM 267/141, November 1940.
Director of Naval Construction, “Notes on damage caused by enemy action and lessons learned during the
second year of war Sept 3rd 1940-Sept 2nd 1941”, ADM 267/142, 1941.
Director of Naval Construction, “Notes on damage caused by enemy action and lessons learned during the
third year of war Sept 3rd 1941-Sept 2nd 1942”, ADM 267/143, 1942.
Director of Naval Construction, “Notes on damage caused by enemy action and lessons learned during the
fourth year of war Sept 3rd 1942-Sept 2nd 1943”, ADM 267/144, 1943.
Naval Construction Research Establishment, “Underwater Explosion Trials against HMS Jervis in Lock
Striven”, NCRE/R88, March 1949.
Naval Construction Research Establishment, “HMS Obdurate Report of Damage Sustained during NCRE
Investigation TF13 (Bulkhead Trial)”, DGShips/XCI/IOI/C33A, October 1964.