New ship design for drone-based mine countermeasures

Only a ship specially designed for drone-based mine countermeasures missions will be capable of deploying the wide range of systems required while delivering the necessary naval and military performances. Based on this observation, we have specially developed a new platform with specific and unique shipboard handling systems offering the flexibility and versatility needed to ensure the success of mine countermeasures operations.

A new type of vessel dedicated to mine warfare
The mother ship has been purpose-designed to perfectly meet mine warfare missions requirements. This platform has the capacity to carry simultaneously all unmanned MCM systems required. His design provides an uniquely flexible architecture that will accommodate future developments throughout its service lifetime.

Engine and propulsion technology optimised for mine warfare
The ship’s engine architecture offers all the benefits of redundancy and high availability combined with ease of operation and maintenance. In particular, the technologies adopted for the engine and propulsion systems were chosen to offer excellent manoeuvrability and seakeeping while optimising the vessel’s environmental footprint.

Safe handling of the MCM toolbox
Safe handling of all the various systems that make up the MCM toolbox is one of the most critical aspects of the interface management with the mother ship. Anticipating this difficulty, over a number of years, Sea Naval Solutions has developed several dedicated systems to perform these functions effectively and safely, including a patented launch and recovery system that can handle a broad range of diversified payloads, manned and unmanned, surface or underwater vehicles (USV, RHIB, etc. up to 20 tonnes) in rough sea states. Dedicated shipboard mission payload handling solutions have also been developed to simplify operations at sea with optimum safety and reduced crewing requirements.

Cybersecured solution by design
Cybersecurity was built into the overall system architecture from the outset: segregation of data with different levels of classification, centralised access and permissions management, enhanced network and system resilience, and robust data verification and breach detection functionality.