Beruflich Dokumente
Kultur Dokumente
Special
451964-2009
SP GUIDE PUBLICATIONS
WIDENING
H O R I Z O N S . . .
S U P P L E M E N T T O C 4 I 2 SUMMIT 2009
THIS IS THE COMPUTER
that alerted the aircraft
about the tank crew trapped
next to the target in an
FM dead zone.
C o n t e n t Special
AN SP GUIDE PUBLICATION
S U P P L E M E N T T O C 4 I 2 SUMMIT 2009
14
2 Word from the Editor PUBLISHER AND EDITOR-IN-CHIEF © SP Guide Publications, 2009
Jayant Baranwal
4 Industry Digest DESIGN & LAYOUT
9 Army
SENIOR MANAGING EDITOR
Air Marshal (Retd) V.K. Bhatia
ASSOCIATE ART DIRECTOR: Ratan Sonal
LAYOUT DESIGNERS: Raj Kumar Sharma,
CIDSS
Vimlesh Kumar Yadav
Essential RMA Enablers ASSISTANT EDITOR
SP'S
I
nformation technology can really synergise and optimise With homeland security of prime importance, it is only apt to
the combat power, simultaneously making the decision showcase the vital role played by C4I2 in ensuring alertness
making process easier and sensor-to-shooter time shorter. to danger 24x7. All in all, there’s no denying that service-
In concept, Command, Control, Communications, Computers, based C4I2 solutions can improve operational capabilities for
Information and Intelligence (C4I2) is simple. Airborne, space- net-centric defence strategy.
based, underwater and surface-based sensors provide Acknowledgements are due to the entire editorial and layout
information through surveillance and reconnaissance. This design team of SP’s, under the guidance and stewardship
information is then converted into intelligence which is used of Senior Managing Editor Air Marshal (Retd) V.K. Bhatia, for
for faster decision making, enabling effective command and burning the midnight oil to ensure the supplement captures
control. Computers provide automation, rapid collation of every single nuance of the subject under discussion.
information and converting it into intelligence resulting in Congratulations to the organisers Network18 for providing
faster and accurate decision making. Reliable and secure this excellent platform for industry pundits, scientific
communications is the backbone of C4I2. minds, military top brass, OEMs and distinguished academic
In practical terms, the establishment of such a network personalities to interact and exchange valuable information
presents daunting challenges. Deliberating on such a micro- on this critical facet of modern warfare. We hope readers
niche subject demands a thorough understanding of the key will synergise the articles in the supplement and the
parameters, structural framework and operational criteria—a presentations at the summit to derive full benefit.
kaleidoscopic tapestry that could be exhaustive in scope yet
invariably engrossing in content. SP’s Special Supplement for
this unique and quite unprecedented C4I2 Summit covers all
facets of this very important war fighting tool. A treatise on
TAC-C3I brings out the broad Indian perspective and outlines
the future for Indian war fighters.
Even as the focus is firmly on the technology shift of C4I2
product lines from ‘Hardware Centric’ to ‘Software Centric’ to
‘System Centric’ to ‘Network, cyber security is extensively
discussed, with the stress being on preparedness and
vigilance. Yet another key equipment in E-vigilance and
situational awareness are sensors that, with extensive data
links, can operate effectively in intense electronic traffic.
In the Indian context, the Indian Air Force (IAF) has deployed
legacy radar systems like Indra, ST 68 and P-18. The IAF has
also started deploying EL/M -2083 tethered Aerostat Radar
Systems ex Israel. The much awaited Airborne Warning and
Control Systems aircraft finally arrived from Israel in May and Jayant Baranwal
will provide a quantum leap in the quality of air surveillance. Publisher & Editor-in-Chief
SP'S
MISSION-CRITICAL ADVANTAGES
WHATEVER THE MISSION
For more than 40 years, some 300 Bombardier special mission aircraft have been selected by countries
around the globe to fulfill a wide spectrum of missions ranging from government VIP transportation,
through search and rescue, to C4ISR. Today, we continue to meet the critical needs of governments,
armed forces and commercial operators with high performance Global, Challenger and Learjet series
jets and Dash-8/Q-series turboprops. We meet your needs. We deliver.
growth potential. Gyrocam is unmanned aircraft including the Hunter unmanned aircraft. gateway. The contract provides
a privately-owned company US Navy Broad Area Maritime Raytheon $24.4 million for one
with 160 employees that makes Surveillance Unmanned Aircraft Defence Agency awards year. Options would extend the
gyro-stabilised optical surveil- System, the German Luft- Raytheon contract to contract to 2012 and bring the
lance systems that combine waffe Euro Hawk (r), the NATO develop an Interoperable potential value to $155 million.
infrared, high-definition, night Alliance Ground Surveillance un- Network Gateway The Mobile Ad-Hoc Interoper-
vision and laser range-finding manned airborne segment, MQ- Raytheon Company has been ability GATEway, or MAINGATE,
imaging capabilities for ground 8B Fire Scout vertical take-off awarded a contract by the De- will integrate any combination of
vehicles and stand-alone plat- and landing unmanned aircraft, fence Advanced Research Proj- heterogeneous military, civil or
G
SP'S
coalition radios into a single net- covers the conversion of paper naissance System (TRS) has a contract by the US Air Force
work to facilitate communication fingerprint, palm print and been subject to an upgrade Research Laboratory to study
among disparate systems. photo records into high-quality programme to become NATO and demonstrate improved
electronic records for the FBI. STANAG compliant. L-3 Com- situational awareness, vi-
Lockheed Martin to continue Records processed through munication Systems-East’s sualisation, and automated
development of secure this programme are submitted S/TARTM RM-4000T Solid State course-of-action processing
information sharing by state, local, and federal law Recorders was selected for its for network environments
system for US Navy enforcement agencies and used commonality with the US ANG during cyber attack. Boeing
The US Navy has awarded to populate the Integrated Auto- F-16 TARS programme and its will analyse network opera-
Lockheed Martin an indefinite- mated Fingerprint Identification compliance to STANAG 4575. tions, develop procedures and
delivery indefinite quantity) System database, a national Terma was responsible for the processes, and apply tools that
contract to continue the devel- fingerprint and criminal history integration of the new recorder will enhance network com-
opment of Radiant Mercury, a system maintained by the FBI into the TRS pod and for all mand and control capabilities.
secure Multi-National Informa- CJIS Division. ground testing. The successful
tion Sharing system used by the flight testing was performed by Northrop Grumman’s second
DoD. Considered to be one of Boeing awarded production the RDAF in cooperation with E-2D Advanced Hawkeye
the premier cross-domain solu- contract for US Air Force Terma. The Danish Defence enters next phase of testing
tions, Radiant Mercury is a criti- AWACS Block 40/45 upgrade Acquisition and Logistics Northrop Grumman Corpora-
cal component of many security The Boeing Company has an- Organisation reported they are tion’s second E-2D Advanced
domains used by DoD, national nounced that it has received pleased with the rapid instal- Hawkeye, known as Delta Two,
intelligence agencies, as well a Low-Rate Initial Production lation performed by Terma in has transitioned to Naval Air
as US coalition partners. The contract for the Block 40/45 cooperation with L-3 Communi- Station Patuxent River carrier
contract entails field support for upgrade of the US Air Force cation Systems-East. suitability phase of testing.
483 Radiant Mercury systems AWACS fleet. Boeing will Designed and built for the US
worldwide, as well as continued provide shipset hardware, spare IAI Heron UAS demonstrates Navy, the E-2D will utilise its
enhancement to the system’s parts, ground systems instal- advanced capabilities newly developed AN/APY-9
capabilities. lation, and delivery and logistic Electronic Scan Array radar,
support for the first aircraft to Cooperative Engagement
Northrop Grumman’s Global undergo the upgrade. The Block Capability system, Electronic
Hawk crosses 31,000 40/45 upgrade will dramatically Support Measures , and off-
cumulative flight hours enhance the system’s potential board sensors, in concert with
for using network-enabled op- surface combatants equipped
erations and increase AWACS with the Aegis combat system
mission execution capability. to detect, track, and defeat
Israel Aerospace Industries (IAI) cruise missile threats at ex-
SELEX Galileo introduces an and a Spanish company have tended ranges.
easily deployable integrated held a joint demonstration of
RQ-4 Global Hawk UAS, built by surveillance system IAI MALAT Division’s maritime Northrop Grumman
Northrop Grumman Corpora- SELEX Galileo of Finmeccanica Heron UAS. The demonstration completes first flight of
tion, continues to prove its has recently presented to the portrayed the Heron’s abilities land-based MQ-8B Fire Scout
mettle by exceeding more than Italian Navy and to a delegation to successfully patrol, detect, A Northrop Grumman Corpora-
31,000 cumulative flight hours of the Italian Army the new TPS classify and identify maritime tion’s MQ-8B Fire Scout Vertical
for the US Air Force and US - 730 radar integrated with the targets of all types. The Heron Unmanned Aircraft System
Navy. More than 76 per cent of electro-optic turret NEMO at UAS was operated by teams (VUAS), designated P7, has suc-
these flight hours were flown the UTT Nettuno Range. SELEX from IAI, while the command cessfully completed first flight
in support of overseas contin- Galileo has developed the TPS and control system was oper- operations. Unlike current navy
gency operations efforts. - 730 radar integrating it in an ated by the Spanish company. configured Fire Scouts, P7 was
“all in one” shelter, including a The early detection of boats built in an operational land-
FBI awards Lockheed Martin telescopic pole for the Antenna and vessels, some of them based configuration. It is the
biometric card scanning and the NEMO electro-optics. very small, carrying smuggled first MQ-8B to fly without flight
service contract This system can be easily goods or illegal immigrants, is test instrumentation normally in-
FBI has awarded Lockheed transported and deployed in an important need for European stalled for developmental flights.
Martin a five-year; $47 million Homeland Security and Protec- Union countries.
contract to continue manag- tion scenarios. Rockwell Collins selected to
ing the FBI Criminal Justice Boeing bags USAF contract to provide ad hoc networking
Information Services (CJIS) Terma integrates Danish Air demonstrate Cyber Command for Canadian Navy
Division’s Card Scanning Ser- Force upgraded TRS program & Control solutions The Canadian Department of
vice programme. The contract The RDAF’s Tactical Recon- Boeing was recently awarded National Defence has selected
SP'S
Rockwell Collins to provide the ultimate solution for ground (DCGS) Integration Backbone, ial systems to the Department
Sub-Net Relay Controllers, High applications such as site con- or DIB, team has completed of Defense (DoD) and other po-
Speed Modems and Very High trol, border security, and coastal a rigorous, multiple-day test tential US government custom-
Speed Modems for the Sub-Net surveillance, as well as for naval of its new DIB version 1.3, ers through programmes such
Relay (SNR) programme. The platforms and aerostats that de- representing an important step as the recently announced US
contract is valued at $7 million. mand cost effective long range toward delivering new intel- Marine Corps’ Small Tactical
The SNR technology makes it object engagement. ligence-sharing technology to Unmanned Aircraft System
possible to establish ad hoc, users worldwide. DIB software /Tier II programme.
Internet-Protocol networks used General Dynamics form JV to is installed in more than 100
for tactical data exchanges, provide Tactical UAVs to US systems around the world. Finmeccanica part of pact
enhanced situational awareness Elbit Systems Ltd has an- for Eurofighter Typhoons
and collaborative planning by nounced that its subsidiary, EADS Defence & Security Finmeccanica has announced
the Canadian Navy and coalition Elbit Systems of America, LLC highlights advanced UAV that NETMA (NATO Eurofighter
navies. Features of the SNR and General Dynamics Arma- and Tornado Management
programme include built-in text ment and Technical Products Agency), Eurofighter GmbH
chat, comprehensive signal have formed a new joint and EUROJET Turbo GmbH
display and a remote control venture named UAS Dynamics, have signed a further produc-
graphic user interface. LLC, to provide UAS to the De- tion contract for the Eurofighter
partment of Defense and other Typhoon aircraft. The contract,
SELEX Galileo wins contracts potential US government cus- worth a total of € 9 billion, re-
for the Italian-French FREMM tomers. The new platforms will lates to a third tranche produc-
programme fill current and future operation- At the Paris Air Show 2009, tion for 112 aircraft. €3 billion
SELEX Galileo was awarded al gaps allowing intelligence, EADS Defence & Security (DS) of the contract value pertains
orders for its sensors solutions surveillance and reconnais- presented the mock-up of their to Finmeccanica and includes
for the FREMM frigates of the sance capabilities that range in latest UAS (called Talarion), a the industrial activities such as
Italian Navy, the Marina Militare. size and scope from hand-held joint programme of France, defining, designing, developing
The total participation of SELEX and tactical level systems to Germany and Spain which is and producing the aerostruc-
Galileo, Finmeccanica group, in medium altitude, long-endur- a fully autonomous system ture, systems integration and
the programme is now valued ance level systems. for Intelligence, surveillance, avionics for the aircraft.
at more than €42 million, with target acquisition and recon-
the initial contracts dating back Northrop Grumman naissance missions. Telespazio (Finmeccanica/
to 2007. delivers second Thales) and Turkish Defence
demonstration satellite DRS Technologies receives Ministry ink contract to build
IAI’s POP-300LR Observer Northrop Grumman Corpora- US Army order for Infrared Göktürk satellite system
for European Coastal tion has completed delivery Sighting Systems Telespazio, a company owned
Surveillance Programme of both Space Tracking and DRS Technologies, Inc. has by Finmeccanica and Thales,
Surveillance System (STSS) announced that it has received and Undersecretariat for De-
demonstration satellites. Using a follow-on order for Second fence Industries (SSM-Turkish
onboard sensors capable of Generation Forward Looking Defence Ministry), have signed
detecting infrared and visible Infrared sighting systems and a contract in Ankara for the con-
light, STSS will become part of components from the Raythe- struction of the Göktürk satellite
land, sea, air and space based on Company’s Network Centric system. The agreement covers
sensors for the nation’s Ballistic Systems. The systems are to the supply of an earth observa-
Missile Defence System. Once be fitted onus Army tanks and tion satellite equipped with a
operational, STSS will dem- combat vehicles. high-resolution optical sensor,
onstrate the key functions of a an integration and test centre
The Plug-in Optronic Payload space-based sensor, passing Elbit Systems US subsidiary, for satellites to be built in Turkey,
300-Long Range (POP-300LR missile tracking data to mis- General Dynamics form joint and the entire ground segment
Observer), produced by Israel sile defence interceptors with venture to supply tactical of the system, which will carry
WWW.SPGUIDEPUBLICATIONS.COM
Aerospace Industries, has been the accuracy and timeliness UAVs to US out in-orbit operation, data ac-
selected by a European custom- necessary to enable successful Elbit Systems Ltd has an- quisition and processing.
er for use in a costal surveillance intercept missile targets. nounced that its subsidiary,
programme. The POP-300LR Elbit Systems of America, LLC ITT announces image
will be integrated with radar and Raytheon completes ac- and General Dynamics Arma- processing product for GIS
will provide the customer with ceptance testing for Intelli- ment and Technical Products professionals
24/7, all weather long range gence-Sharing Backbone have formed a new joint ITT Corporation, the developers
observation and surveillance Raytheon Company’s Distrib- venture named UAS Dynamics, of ENVI image processing and
capabilities. The POP-300LR is uted Common Ground System LLC, to provide unmanned aer- analysis software, and ESRI,
G
SP'S
the leading provider of GIS soft- controlled the KillerBee aircraft Russia buys Israeli UAVs to Italy Defence Minister prom-
ware, ArcGIS, have announced while simultaneously provid- study capabilities ises more UAVs, helicopters
a strategic partnership to inte- ing manned, anti-tank guided In a rare case of buying foreign Ignazio La Russa, Italy’s Minister
grate their respective software weapon target information from defence items for its military, of Defence, has promised Italian
technologies. This integration the aircraft which significantly Russia has acquired 12 UAVs soldiers in Afghanistan more
delivers advanced, high-per- shortens the kill chain. from Israel for $53 million. The UAVs and suggested that more
formance image processing main goal of the purchase was helicopters also could be on
and analysis capabilities to the Germany paves way for to study Israeli technology in their way. La Russa said in Herat
ArcGIS platform and expands Afghan AWACS deployment order to build drones in Russia. on July 21 he would send more
the distribution of these new However this approach has unarmed Predator UAVs for sur-
technologies globally. irked Israeli defence officials veillance missions. Italy already
who told Israel’s Jerusalem has acquired two upgraded
ThalesRaytheonSystems Post newspaper in comments Predator As to join the four it
receives approval for replica- published June 23 that Israel has in service, and is purchasing
tion of NATO Air Command and would not sell Russia its most four unarmed Predator Bs.
Control System Level of Op- advanced drones.
erational Capability program European Defence Agency
Currently deployed at five sites German politicians are back- BAE Systems delivers mulls biological protection
in Belgium, France, Germany, ing deployment of the NATO 100,000th uncooled infrared The defence ministries of the
Italy and the Netherlands, ACCS AWACS for missions over thermal imager EDA member countries have
LOC 1 will replace NATO’s exist- Afghanistan. NATO has an- BAE Systems recently delivered approved a €100 million ($135
ing air command and control nounced its decision to deploy its 100,000th MicroIR uncooled million) demonstrator project for
systems in Europe and set new the aircraft during a meeting in thermal imager, which will force protection against biologi-
standards of interoperability Brussels on June 12. The crew be installed in the US Army’s cal agents, called the Biological
for air operations with a single, of each NATO E-3A AWACS Common Remotely Operated Detection Identification Monitor-
integrated approach to plan- can include up to one-third Weapon Station (CROWS II). ing Equipment Development
ning, tasking, monitoring and German personnel but the final The thermal imagers detect and Enhancement Programme.
mission execution. ACCS LOC decision has to be taken by the heat from people, vehicles, So far five countries - the Czech
1, NATO’s largest-ever software German Bundestag. The Ger- and other sources enabling Republic, France, Germany,
system, uses open-system ar- man government has agreed in soldiers to identify targets while Netherlands and Spain - are due
chitecture to adapt to changing principle to send an additional remaining protected inside their to contribute €20 million each.
operational requirements, such 300 personnel to support the vehicles. The MicroIR devices
as theatre missile defence and AWACS deployment. work in darkness and in smoke, Raytheon, NGA improve flow
network-centric warfare. When fog, and other visibility-obscur- of commercial imagery to
fully deployed, NATO member Successful first campaign of ing conditions. Unlike other warfighters and analysts
countries will be able to share flight tests for Patroller infrared sensors that require Raytheon Company and the
operational data over a high- surveillance UAV cryogenic cooling, the MicroIR National Geospatial-Intelligence
speed communication system. Sagem (Safran group) and devices require no cooling and Agency (NGA) marked the tran-
Stemme have successfully therefore are smaller, lighter, sition of an improved capabil-
Raytheon adapts Common carried out the first campaign and use less power. ity that will rapidly ingest and
Ground System to of flight tests for the Patroller disseminate imagery from US
KillerBee UAS long-endurance surveillance New unmanned baby sub to commercial satellite companies
Raytheon Company has UAV system, scheduled to be protect coastal waters to warfighters and intelligence
tested a proven, open-software qualified in 2010. The campaign In a move to help combat the analysts worldwide. The effort
architecture unmanned ground was carried successfully over 8 growing threat of explosive was related to the agency’s
system that enables one ground flights, including a flight lasting mines hidden in shallow coastal NextView programme, in which
station to control multiple more than 10 hours. Patroller waters such as ports and NGA receives imagery from US
KillerBee UAS. “We have taken can fly 30 hours in autono- harbours and to increase the commercial satellite companies.
a ground system, which is a mous mode at an operational protection available to world With the new dissemination ca-
WWW.SPGUIDEPUBLICATIONS.COM
variant of the US Navy’s Tactical altitude of 25,000ft and with a shipping, BAE Systems has pability, NGA systems can now
Control System and adapted it maximum speed of 300 km/h. launched its first unmanned au- ingest and disseminate greater
to a Linux operating system to Patroller has an image chain tonomous submarine to detect amounts of commercial satellite
make it hardware independent based on Sagem’s Euroflir 410 and deal with this newfound imagery daily, providing it to us-
and fully scalable,” said Mark gyrostabilised optronic obser- threat. The 50 kg vessel, called ers more quickly. NGA has also
Bigham, Raytheon Intelligence vation system and a Synthetic Talisman L, uses high-definition tasked Raytheon to provide the
and Information Systems busi- Aperture Radar pod from OHB. forward and sideways looking next generation of services to
ness development director. In a Down the line it will be able to sonars, as well as a host of disseminate data from multiple
recent demonstration, Raytheon carry other payloads. multi-view cameras. sources to its users. n
G
SP'S
SP'S
• Rapid transfer of information between units for effective displaying operational, intelligence and logistics informa-
command and reporting. tion to the commanders to enable them to take appropriate
and timely decisions.
COMPONENTS OF TAC-C3I • Presenting decision options to commanders and support-
A typical TAC-C3I is a system made up of people, procedures, ing dissemination of decisions, plans, tasking and opera-
equipment and information systems as depicted below: tional orders.
Typically C3I systems are viewed only as the equipment part
(shown in dotted circle) and ignore the other two components, CIDSS SUB-SYSTEMS
thus resulting in partial effectiveness of the TAC-C3I system. The CIDSS System comprises of four subsystems which are
G
SP'S
based on similarity of functions of a field force as shown in dia- measures of merit to quantify performance and effectiveness,
gram below: and conduct tests and analyses to explain the results must be
CIDSS was conceived as an umbrella structure to optimise de- understood and applied.
cision-making and is expected to network all other automated sys- The intrinsic characteristics of a TAC-C3I system are as
tems. Currently, TAC-C3I projects are in various stages of develop- follows:
ment and fielding. These projects were developed independently • The unique requirements of the C3I system users will keep
by different PMO. Subsequently, the requirements of intra-service evolving. Hence, there will always be significant amount of
interoperability were realised. Based on the TAC-C3I vision; at- proliferation in the applications that are going to be de-
tempts are being veloped. This ne-
made to achieve fair cessitates the need
degree of interoper- for a mechanism to
ability by 2012. Ver- integrate new ap-
tical integration with Battlefield plications into the
Surveillance
various sub-systems Air Defence
TAC-C3I system
and development of Control & Reporting System under
development Electronic
configuration as it
System (ADC&RS)
standard protocols Warfare System matures. Develop-
(EWS)
to facilitate integra- System
ment plateform be
tion is also under System to be
developed
Ready based on Open sys-
process and will be CIDSS-SAMVAHAK tems.
put in place soon. System
Ready
• The development
Integrated together Air Space Artillery Combat time and costs for
Management System to be Command Control
with requisite com- System (ASMS) developed System (ACCCS) C3I systems are high
System to be
munications, these developed because of the sheer
systems will provide size of the system.
near real time ‘Sen- Air Support So these need to
System (ASS)
sor-to-Shooter’ links be reduced by usng
to make army a net- commercial off-the-
work-centric force. shelf components
and technologies to
MODELING & PER- evolve cost effective
������������
FORMANCE EVALU- solutions.
�����
ATION • Project Samva-
The Indian Army hak focuses mainly
had fielded the CI- on the equipment
DSS (Samvahak) in aspect, hence it is
Exercise Parikshan, not a panacea to
Exercise Akrosh and ������� the desired state
Exercise Vajra Shak- ����� required to be
ti for Indian army achieved as far as
commanders. The an effective deci-
army has also test- sion support system
ed Sanjay situation ��������� ����������� is concerned. There
assessment tool as ����� ����� is an urgent need to
part of BSS. It has integrate this with
been claimed that the other aspects
both Samvahak and as shown in the
Sanjay have robust above diagram. Full
information security realisation of any
features. such revolution is possible only with technological devel-
The functions of any element of a complex system must be opment, organisational adaptation, and most importantly a
understood, modelled and quantitatively evaluated to deter- strong defence and national will.
mine the contribution that it provides to the effectiveness of the
C3I system. This process of quantitative assessment is often DIGITISATION ASSESSMENT
applied to the elements of TAC-C3I systems to determine the There is a need to monitor battlefield digitisation efforts until the
contribution it provides to the military effectiveness of those digitisation hypothesis has been demonstrated and core func-
systems.These assessments are required to answer important tionality achieved. Core functionality is the minimum set of capa-
system-level issues that are frequently raised to satisfy the us- bilities that permit the user to effectively accomplish his mission
ers at all levels. The methods to model C3I systems, define in the expected operational environment. Further, core function-
SP'S
ality should include sufficient levels of interoperability, logistics vantage of the new found friendship with the US and the western
supportability, life-cycle support, survivability, and training ad- world to acquire hardware and technologies from abroad if the
equacy, such that the user would be satisfied if no additional country’s scientists cannot develop them.
capability were ever delivered.
Despite the significant improvements observed, the current state STRENGTHS & CHALLENGES
of digitisation capabilities is not sufficient, with a number of critical Despite having so many advantages and potentials, the TAC-C3I
enhancements necessary to achieve an effective and suitable capa- system is not free from problems. C3I is mainly a computer-based
bility. These include a robust speedier network and its management network; therefore, it has several difficulties such as inherited
capability to monitor the network’s health and respond to identified problems of the network, content retrieval, data mining, context
problems, improved interoperability within and across the Army. awareness, tactical manifestation as ‘information overload’, pos-
sibilities of excessive accumulation of irrelevant information and
ROAD AHEAD key information loss.
Not only must we continue to support current initiatives on prior- The system cannot decipher relationships between informa-
ity, but we must also plan for the road ahead. It is important to tion and may hence prove incapable of flashing the key informa-
realise that ‘Information Assurance’ requires a holistic approach tion within the sensor-to-shooter loop. Whatever be the short-
with continuous training and maintenance. We must continue comings, the fact remains that C3I is possible and achievable
to develop the synergy between the policies, personnel, proce- with cutting edge technologies, and to act as a force multiplier.
dures, and tools in the future. To maintain information superiority, digitised systems must
A road map has been formulated by which we can progress keep pace with technology. There is a need to be able to insert
modern technology into
existing systems rap-
idly. With Moore’s Law
accurately predicting a
doubling of processing
To maintain information superiority, digitised power every 18 months,
this demands a revision
systems must keep pace with technology. of our acquisition meth-
ods. The development
There is a need to be able to insert modern cycle itself must be in
short spirals with ‘Beta’
technology into existing systems rapidly. releases of software for
user assessments in op-
erational environments
before full system ma-
turity is reached.
steadily towards being a potent IT force. Development of C3I sys- IT will enable the armed forces to dominate future battle-
tems has been identified as a major thrust area for modernisation fields. But this technology is also vulnerable to attack and ex-
of army. Development and fielding of automated operational and ploitation. Consequently, we must build and sustain a robust
information systems for various levels of operations from Army information assurance programme to provide defence-in-depth.
Headquarters to Battalion Headquarters to individual soldiers Both China’s and Pakistan’s anti-technology designs are height-
are in progress. There is enough importance and urgency from ening the concerns of the world. China recognises that to be a
the end users but procedural delays are happening beyond their great power, it has to dominate all areas including ICT and NCW.
control. There is a need to give priority to the First Digitized Divi- Consequently, Beijing has created and deployed very potent cy-
sion and First Digitized Corps where tactical C3I systems have ber warfare units. The Chinese have launched cyber attacks on
been fielded. official sites of tech savvy and developed countries like the US,
India needs to integrate new technologies as warfighting sys- France, Germany and England. Recently, they tried a similar tac-
tems for which the requirement is to simultaneously evolve a new tic on India also, highlighting the need to develop techniques to
joint warfighting doctrine and concepts of joint warfighting and fight NCW effectively
then decide upon the weapons and other systems to suit the The adoption of a powerful concept, process, method, and/or
WWW.SPGUIDEPUBLICATIONS.COM
former, integrated as part of the TAC-C3I system. tool often holds promise of dramatic benefit to an organisation.
Employment of joint/integrated task forces in the future would However, efforts to realise these benefits often result in frustra-
require, introduction of three critical technologies as under: tion and resistance from those who should receive the benefits.
• Long Range Precision Firepower supported with requisite Previous problems with adoption have convinced many to take a
terminal guidance very conservative ‘wait and see’ attitude about new technology.
• Integrative Technologies (like, C3I and C4I2), and Such conservative strategies may reduce the downside, but in
• Intelligence, Surveillance and Reconnaissance today’s hyper-competitive world, they may also make it impos-
The progress made for acquiring the above systems and sible to survive. Mastering the adoption of new technology may
technologies has been extremely slow. India needs to take ad- indeed separate the winners from the losers. n
G
SP'S
DOMINATOR®
Integrated Infantry
Combat System
Act
on the
Intent
The possibility of cyber warfare should be treated
asseriously as the threat of a missile strike. The
answer lies in preparedness and vigilance.
and air conventional and nuclear military attacks. E-governance and countries to evolve their war fighting doctrines to include cyber
E-commerce sectors, as well as the individuals who use computers space as a viable domain at par with the domains of land, sea,
and mobiles, are also concerned about cyber crimes and how it air and space. Cyber offence is a thousand times easier than de-
affects them. The question, therefore, arises as to what is the role, fence—thus, breaches are most certainly occurring in all countries,
if any, of the corporate sector or common ‘Netizens’ in ensuring virtually all the time. Nothing should surprise us.
‘National Cyber Security’.
Compared to any assessable dimension, the parameters of cy- RESPONSE TO CYBER THREATS
ber space is somewhat different. While it has no boundaries, it also The cyber security shield put in place by the US, a nation highly
means that beyond the cyber space of every individual, exists an in- dependent on automated and inter-connected national infra-
G
SP'S
SP'S
can act as a coordinating agency for national cyber intelligence and IPR claims to shield their source codes and prevent the user from
integrate the activities of cyber crime policing in different states. It making a proper security assessment. Thus, there is a total lack of
can also enter into cyber crime prevention treaties with other coun- co-ordination among various agencies.
tries to ensure international cooperation against cyber terror. Instituting an apex body at the national level would ensure better
More importantly, when attacks originate from a remote server, co-ordination and concerted action in cyber defence mechanism.
following the principle of ‘hot pursuit’, the rogue servers can be iden- Any policy arrived at would require a clear logic relating perceived
tified and disabled with a counter cyber attack. As a counter intel- states of vulnerability to the desired aim of those defensive policies.
ligence strategy, it can counter hack, plant its own intelligence gath- Such logic will require the agency proposed to identify those sys-
ering mechanisms and defend the country
against external aggression through cyber
space. Some similar roles and tasks as as-
signed to the US Department of Homeland
Security could be examined in the Indian
context and can be overseen by the pro-
Instituting an apex body at the national
posed set-up at the national level. level would ensure better co-ordination
FIRST STEP FORWARD and concerted action in cyber defence
The government has already set-up the
Indian Computer Emergency Response
mechanism
Team (CERT-In) for promoting cyber se-
curity and helping organisations recover
from computer security incidents. CERT-
In has also circulated security guidelines to all government organi- tems and infrastructures critical to the survival of the country and to
sations and has posted them on its website. The organisation also its social and economic well being.
conducts regular security workshops for system and network ad-
ministrators from government, defence, public sector and private PLAN AHEAD & FAST
sector organisations. In India, efforts to establish a national cyber security strategy have
With the passage of Information ITA 2008, CERT-In shall serve so far been vague. The National Informatics Centre, which has
as the national agency for performing the following functions of cy- been involved in many E-governance projects and should be a
ber security: natural choice for ensuring cyber security, does not seem to have
• Collection, analysis and dissemination of information on cy- made much progress. The Centre for Development of Advanced
ber incidents Computing has been involved in certain research projects, but is
• Forecast and alerts of cyber security incidents not in the forefront of strategising a national cyber security plan.
• Emergency measures for handling cyber security incidents Private sector is concerned mainly with ISO certification. NASS-
• Coordination of cyber incidents response activities, and COM is focusing on building a security organisation for BPOs
• Issue guidelines, advisories, vulnerability notes and white pa- which is in the early stages of planning.
pers relating to information security practices, procedures, A serious attempt to develop a national cyber security agen-
prevention, response and reporting of cyber incidents cy was made five years back when Dr Abdul Kalam, before being
elected President of India, initiated the formation of the Society for
LACKLUSTRE LAW ENFORCEMENT Electronic Transaction Security which later faded into oblivion. A
Noted cyber law expert Pawan Duggal says for every 500 cyber serious adverse consequence of the inadequate state response to
crimes, only 50 are reported and just one is registered with the po- perceived national security threat is the emergence of private tech
lice. A cyber criminal, he adds, is rarely caught. In the few cases savvy individual hacker groups who try to counter-hack foreign
where cyber crime cases have been initiated, lack of coordination websites known to be inimical to national interests. In the overall
between different police authorities has frustrated the investigation. national security interest, the setting up of an apex body at the high-
In some cases, when the inquiry trail goes abroad, it is reliably learnt est level needs to be pursued by the government in power.
that the CBI is not forthcoming with support and investigations The possibility of cyber warfare should be treated as seriously
reach a dead end. When cyber crimes are committed with mobile as the threat of a missile strike; the prospect of a full-blown Internet
network, it is often difficult to convince mobile service providers of war cannot be dismissed as science fiction any more. Increased
WWW.SPGUIDEPUBLICATIONS.COM
their responsibility to assist police in the investigation. reliance on computers and management makes any nation vulner-
In the private sector, whenever crimes are reported, most com- able to cyber attacks. The only answer to the burgeoning problem
panies invariably get more concerned about their own reputation lies in preparedness and vigilance. Priorities in the protection of cy-
than public good, and more often than not do everything in their ber space must be clearly defined to ensure proper coordination
power not to register a complaint nor enable a proper investigation. of work assigned to various organisations engaged in this vital as-
Worse, often softwares are riddled with bugs that ought to have pect of national security. Urgent strategic planning and institutional
been removed by developers before introducing the system in the mechanism on a national scale is required to pre-empt any major
cyber space instead of depending on security patches to plug the setback in the war to secure cyber space—assuming that has not
loopholes in the future. Some software developers take refuge in already occurred. n
G
SP'S
SP'S
• Jamming Antenna Unit: performs emitters interception and jam- and SSAPA to ensure:
ming signal transmission. • high ERP without duty-cycle limitation;
• Monopulse Receiver: performs threat signal search and D/F pro- • low power Rx/Tx modules
cessing • high radiated power against pulse and CW threats
• Jamming Source Unit: contains DRFM and Processor and is the • high sensitivity and emitter fine DF using narrowscanning beam;
ECM system core unit. • coherent jamming
JSU and the Monopulse Receiver are tasked with the search • multi-threat capability
and detailed analysis of the received signals, and generate com- • emitter-acquisition on the basis of ESM-designated param-
plete and effective jamming techniques/programs tailored to the eters using narrow scanning beam n
G
SP'S
PARADIGM Shifts
The shift from ‘Industry Supplied Complete C4ISR System Procurement’
to a ‘Design having an industrial build’ introduces fresh complexities
in product development and lifecycle support
The C4ISR product line has Further, there are new challenges
evolved over the past three decades as Captain (Retd)
By for embedded systems, such as
a prominent force multiplier. The speed time-to-market, cost, code size,
of developments in the related technol- T.N. Pranesha, Bangalore weight, power, and real-time be-
ogy domains render very high rate of havior. The shift in paradigm from
obsolescence and also extreme difficul- ‘Industry Supplied Complete
ties in coping up with life cycle support C4ISR System Procurement’ to a
associated with the deployed products. Qualitatively, the technology ‘Design having an industrial build’ introduces fresh complexities in
focus in these product lines has undergone shifts from ‘Hardware product development and lifecycle support.
Centric’ to ‘Software Centric’ to ‘System Centric’ to ‘Network Cen- A proper architectural design that embodies the concerns from
tric’ paradigms over a period. diverse domains and assure paths to address the issues and prob-
Invariably, doctrines drive the available technology at any lems in a flexible way over the lifecycle of the product would be an
given juncture to create war assets. Technology provides means essential and inescapable prerequisite in this context. The primary
for development/acquisition of war assets that provide specific objective of this paper is to give a glimpse of multiple technology
capabilities to a force to achieve the goals of perceived threat areas that have bearing on the C4ISR product architecture that
neutralisation through the use of ‘doctrines’ and plans. Although, forms the backbone of NCW capability. An approach for moving
the military enterprises are built with the basic assumption that forward in transformation of forces with transition strategies, in
‘the doctrines drive the technology’ there are several instances this context is also suggested.
in the history where specific sets of innovations in technology
creates profound impact on the doctrines resulting in an inescap- EMERGING DIGITAL BATTLEFIELD
able need for rapid re-evaluation and redefinition of doctrines. Battle command hasn’t changed over a period. Commanders and
These are known as disruptive technologies that create paradigm leaders are still:
shifts in the way the business of conduct of warfare is done. Ad- • Seeking Information
vent of steam engines, nuclear weapons, aircraft and so on are • Making Plans
examples of such paradigm shifts in the past. The Network Cen- • Executing Decisions
tric Warfare (NCW) technology is one such disruptive technology • Communicating
that calls for significant levels of adaptations and re-adjustments • Assessing Operations
to the war enterprise. • Changing Plans
The core technological backdrop for Network Centric warfare What has changed is:
systems is an offshoot of the grand convergence among the com- • Applying Technology
puters, communication and control engineering disciplines, gener- • Executing Activities with technology
ally known as ‘3C’ convergence. This convergence has resulted in • Collaborating
demand for high performance embedded computing and increase • Training
in order of complexity of embedded software, which in turn, re- The capabilities that make up Battle Command have endured
quire leveraging diverse developments in related technology fields. the test of time. The characteristics of a Net-Centric Information
At functional level, application-specific solutions are needed in Space are:
embedded areas, such as sensor specific signal/data process- • Content is:
ing, Mission/operator related asynchronous event handling, dis- – Persistent
tributed support for ‘Peeking’ and ‘Poking’ the contextual sensor – Visible
data at decision making levels-add on to the system complexity. – Authoritative
SP'S
SP'S
flanks of vulnerabilities in the form of tactical C2W (Command and ‘Combat System Specifications’ and approaches for
tControl Warfare). The strategy to build infrastructure and systems bridging the gap between the two are important for the
in this context is to integrate information systems and devices into system acceptance and success in this context.
architectural spaces, allowing users to interact with their surround- • A clear understanding and addressing of the ‘Functional
ings in an intuitive and role based manner. In light of this strategy (Desired)’ and the ‘Incidental (Undesired)’ performance is-
architectural space can be considered as an interface between sues assume key importance in achieving smooth system
people and digital information. This is essentially leading the induction
equipment and system design trends to the concepts of ‘Mission • Evolvable Solutions and Products that enable Transition
Centric Networks’, ‘Network Centric Combat Systems’, ‘COT’s and phased update of Technology and Functional Fea-
based Systems and Sub-systems’, ‘Middleware Centric System/ tures
Sub –system Integration’ and ‘Open Standards based Intra/Inter • Emphasis on reusable software and flexible, re-configu-
System Connectivity’ paradigms. The above brings in the follow- rable hardware platforms. Easy scalability of solutions
ing additional issues at C4ISR system design context: • Understanding and addressing of what is necessary to
• Need to determine the criteria for communication system generate demand for technologies that have the ‘poten-
automation that ensures communication system improve- tial to re-structure missions and warfare’ or for technolo-
ments in terms of: gies that meet inchoate needs and have potential to cre-
– Rapid, reliable, and re-configurable communication ate new missions and forms of warfare is essential in this
systems context.
– Transparency of Communications to the Battle staff • Development of diverse customised solutions using stan-
– Increased Communications capability with reduced op- dardised hardware, reusable middleware and Software
erator Manning building blocks resulting in ‘economy of scope’ rather
– Real time indication of Fault than ‘economy of scale’ as an index for technology and
– Provisions for graceful Communication system Degrada- market competitive advantage for the building blocks as
tion. well as end products.
• Seamless, reliable communication systems and services will • Further, the recent shift of focus in major research efforts
more effectively enhance and support Command and Control associated with the large high performance networking
(C2) requirements now and into the future. Superior commu- technology from traditional defence driven programmes
nications is achieved through the implementation of: to market driven programmes centered around academic
– Seamless connectivity among strategic and general institutions have rendered open access to the technology.
forces
– Integration of tactically significant information into APPROACH TO CHALLENGES
ashore, afloat, and in the air assets The transition requires creation of a suitable product architectural
– Identification of communication systems and functions framework based on a reference model for C4I2SR (Command,
that will benefit from automation Control, Communication and Computer systems for Information
– Ensure automated C2 Assistance for command Deci- and Intelligence Surveillance and Reconnaissance) and phased mi-
sion makers gration of the existing applications with essential technology up-
dates to the new architecture. The approach outlines the adaptation
C4ISR & NCW of a distributed objects technology-based middleware, like Real
With widespread availability of digital broad band access technolo- time CORBA and DDS (OMG standard for Data Distribution Service
gies at intra system interconnection and ship system infrastructure for Real Time Systems), as an application integration framework,
levels, coupled with robust digital communication links at ship-to- supported with IP Core network for transportation and a variety of
ship, ship-to-air and ship- to-shore levels the design choices at access networks that connect sensors and other resource clusters
product architectural level are very high. Further, the maturity and to the network.
availability of very high performance heterogeneous processing Support for several newer equipment/modules as functional
platforms (Multiple RISC + DSP + Network Processors on common building blocks of the system in the form of sensor specific raw
silicon substrate), integrated tool chains and development environ- data compression and decompression units, local data fusion
ments and third party resources for technology and application do- units (that fuses multi-sensor situational picture along with con-
main specific middleware for the selected platforms lead to further textual raw data for global delivery), global data fusion units with
level of choices in architectural design space. It is appreciated that decision support capability, node level security policy enforcement
the enormous market potential coupled with the diverse application modules and Tactical IW surveillance and attack systems as an
needs associated with networked distributed applications segment integral part of the futuristic C4ISR paves way for building a formi-
would bring in a paradigm shift in product development approach dable force multiplier to support future warfare.
for the next generation network centric products and systems like The key concept is to establish a path of evolutionary shift in
C4ISR.The main features of this shift are: the existing/evolving product that enables phased update of tech-
• Shift of product design focus from current hardware cen- nology features and the approach to the conduct of warfare with
tric/software centric approach to System Centric/Network short turn around times and with full protection on investments
Centric approach made on legacy systems, at each stage inclusive of the life cycle
• Differentiation between the ‘Combat Systems QR’ and support for C4ISR and NCW systems. n
SP'S
Conceptual
Underpinnings ILLUSTRATION: WWW.NAVY.MIL
SP'S
mation and knowledge embedded within the command vices for assessment and influence on other parties’ situation in-
and control system. Awareness lies in the cognitive do- formation and also for protection of the own situation information.
main that is at a level that is above the level of technical Command & Control involves services for decision support and
interoperability. order handling. Engagement systems and effectors are connect-
Efficient conduct of operations is enabled by the ability to share ed to the C4ISR environment and are involved in the information
data, information, knowledge and awareness. In other words, the flow and controlled by Engagement Support services. The Control
IT value chain accompanies the network-centric value chain. More Layer contains functionality and support services that are used to
importantly, this is reflected in improvements in command, control, give all the services mentioned above the required characteristics
communications, computers, information, surveillance and recon- and features such as security, mobility, and accessibility. The Con-
naissance (C4ISR) over the recent decades. C4ISR systems initially vergence Layer ensures that connectivity can be accomplished in
started as database centric and message driven solutions, only able a unified manner based on the Internet Protocol (IP) and different
to support Data Quality. To progress to the next level within the value types of fixed and wireless networks, belonging to the Connectiv-
chain, the idea of the Common Operational Picture (COP) was intro- ity Layer can be used.
duced, thereby adding context to the data. The COP, thus, improved
not only Data Quality, but also Information Quality. DISTRIBUTED SYSTEM-OF-SYSTEMS
Modelling and simulation abilities in a C4ISR system add The C4ISR system is to be regarded as a distributed system-of-sys-
procedural knowledge in the form of models. Such a system can tems with each system producing and/or consuming services. The
thus support the next level in the value chain, triggering further producers and consumers of various functions are separated. Thus,
improvements. Evolving further, the ability to use this information, services are not necessarily produced for a single particular pur-
as distinct from understanding it, is aided by the system’s ability pose and their production is independent of the consumers. These
to mine, analyse and present data for decision support and this is are available for any authorised consumer to use. This also means
pertinent in the Awareness Quality context. The underlying fact of that services and information reside in the system as a whole, inte-
course is that it is far more necessary to bridge the cultural gaps grated and aggregated, thereby creating services and information
rather than the technical gaps to make this vision become reality. with a higher value.
Interoperability aspects of networks come to fore, if robust de- Further, infrastructure and/or technical systems producing the
fences are to be built in. services need not be new and existing legacy systems can be in-
tegrated. Finally, systems are scalable and hence services and ca-
NetcentricValue Chain Layer C4ISR Solutions and Offerings pabilities can be further developed in an evolutionary fashion.
Data Data Base Centric, Message Driven
COMMUNICATION NETWORK
Information Common Operating Picture In keeping with the system-of-systems approach, the best, and of-
Knowledge Modelling and Simulation ten the most practical option, is a network-of-networks, utilising a
Awareness Analysis and Decision Support variety of communication technologies. These are also called het-
erogeneous communication networks. Communication networks
may have different origins: public, private, defence, governmental
In addition to Situation Adaptation, Interoperability and Open and so on, and may include tactical radio, broadband networks,
Standards, salient features and indeed principles of C4ISR Systems fixed telephony, and mobile networks. The trick is to use the IP as
in a network-centric environment are discussed in detail below. the common communication protocol.
Dedicated non-IP networks may, however, be necessary in
SERVICE ORIENTED ARCHITECTURE situation and applications where real-time information is critical.
Increasingly, C4ISR solutions for network-oriented defence are The network-of-networks approach puts special requirements on
based on a Service-Oriented Architecture (SOA) where the function- infrastructure functionality, like routing, addressing, mobility, qual-
ality of a system is made available as services that can be accessed ity of service and security. These can be based on commercially
by any authorised user connected to the network, mobile or sta- available technologies with additional security, robustness, and
tionary. This makes it possible to avoid large “stovepipe” systems, flexibility requirements as deemed necessary; as they can be cost
designed only for a specific purpose, and instead make it possible efficient and make use of the most advanced components and
to combine individual systems into systems-of-systems. Even geo- technologies available. For example, GSM and CDMA based sys-
graphically distributed systems can then be used as modular build- tems can be used in many applications. The main advantages of
ing blocks that are interconnected and can be combined in different the network-of-networks approach are:
ways. The two key categories are Services and Infrastructure. Ser- • Improved efficiency and a reduction of equipment and op-
vices pertain to services for Communication and Collaboration, Sit- erational costs. Ability to dynamically compose networks
uation Information, Information Operations, Command and Control depending upon where network resources are needed for
and Engagement Support. Infrastructure includes a Control Layer, a the moment.
Convergence Layer and a Connectivity Layer. • Much higher redundancy since even if one equipment is
The Communication and Collaboration services provide func- damaged, others continue to operate and joint commu-
tionality for communication and information sharing. Situation nications are maintained using alternative paths. Even if
Information services involve gathering, processing and dissemi- all inter-network connections are lost, sub-networks are
nation of situation information. Information Operations include ser- formed that can later be reconnected.
SP'S
tially shared in near real time leading to an understanding of the ever it meets requirements. C4ISR solutions can be adapted
overall situation. This also enables access to key information to different situations, thus allowing units to operate across or-
for different types of actions, and improves generation of cor- ganisational as well as technological borders. Further, such so-
roborated information from complementary sensors—such as lutions lead to cost efficiency and allow distribution of desired
radar, electro-optics, and signal intelligence sensors—and other information and functionality to anyone authorised, anytime,
sources. Also, surveillance operations can be managed to con- anywhere in the network of networks.
tinually optimise sensor resources.
For instance, in a situation with a temporary threat or a The writer is a Research Fellow,
specific planned activity there may be a need to move mobile National Maritime Foundation.
G
SP'S
Fill in the
PHOTOGRAPHS: SP GUIDE PUBNS
GAPS
A networked AD environment would be rich in wireless signal traffic and thus
vulnerable to interference. So data links have to be robustly protected—both
against eavesdropping and jamming.
SP'S
AWACS: In May, the IAF received its first Airborne Warning and Con-
trol System (AWACS) aircraft from Israel. Built with Phalcon radar on
an IL-76 platform, it is said to be one of the world’s most advanced
systems. The phased array radar (which does away with the need for
a mechanically rotating antenna), can detect low flying aircraft, cruise
missiles and UAVs hundreds of kilometres away by day and night and
under all weather conditions. In addition to the radar, the aircraft also
carries a phased array IFF and a host of electronic and communica-
tions, support and intelligence equipment.
the total IAF requirement is said to be for 13 such systems. Elta During hostilities, the front tier of radars would still be necessary
Systems EL/M 2083 Aerostat Programmable Radar (APR) is de- to cater for non-availability of aerostat or AWACS coverage. Digi-
rived from the company’s L-band (1 to 2 GHz) EL/L-2080 ‘Green tisation of the IAF’s SAM-III systems ran into rough weather some
Pine’ ground-based, phased-array radar used in conjunction with years back. Whereas acquisition of some new systems appears to
the Arrow missile defence system. It is a 3-D sensor that can track be in the pipe line, wholesale replacement doesn’t appear feasible
and illuminate targets travelling at velocities in excess of 3,000 m/s. in the short term. Developing Interfaces for AD fighters of different
Therefore, in addition to aircraft, it can also track such targets as vintages and pedigrees to communicate with the network is also
cruise missiles, unmanned aerial vehicles (UAVs) and microlights. not likely to be easy. In a nutshell, our perfect networked future
may still be quite distant. n
G
SP'S
Information Integration
The ability to collect, process and disseminate flow of information, leading to
increased mission space awareness and subsequent dominance, constitutes the
essence of present day air operations
SP'S
DEVELOPMENT STRATEGY will spearhead the IAF’s network-centric operations around which
Crux of a system like the IACCS lies in creating a stable OSP from the other NCW elements will coalesce. Although some IAF elements
the inputs of varying quality and reliability received from a host of have operated under the AWACS environment in some of the recent-
sensors. The technique, called multi-sensor tracking (MST), re- ly conducted joint international air exercises, in the long run, the IAF
quires a multi-disciplinary design support of scientists and statisti- will have to devise its own AWACS strategies. Hopefully, the work
cians, backed by experts in real-time systems. The OSP has to be has already begun with the first AWACS at its home base in Agra.
available at all control nodes upward of the ADDC right up to the Creating and maturing operational capabilities with the AWACS in
National Command Post, albeit with more data getting included at the true sense of network-centric warfare will be the ultimate chal-
each higher rung. lenge for the IAF’s leadership. n
G
SP'S
SP'S
ALERT to danger
24x7
ILLUSTRATION: WWW.GIDITEK.COM
• Create ‘smart borders’ data received from state police, local security agencies and National
• Increase the security of international shipping containers Counter Terrorist Centre (which itself receives and integrates data
• Recapitalise the US Coast Guard from 16 intelligence communities). Some other aspects are:
• Track foreign terrorists and bring them to justice • The system must react like the military in terms of ab-
• Prevent terrorist use of nuclear weapons through better sorbing situational awareness, understanding the situa-
sensors and procedures tion and then acting rapidly.
• Detect chemical and biological materials and attacks • Coordination of even local agencies is difficult due to
• Improve chemical sensors and decontamination techniques overlapping responsibilities and jurisdiction. It becomes
• Develop systems for detecting hostile intent even more complex if national agencies are also involved
G
SP'S
due to separate SOP’s, equipment, interoperability prob- of information. The network should facilitate identification of friendly
lems and jurisdiction. elements and access to national grid. Network management should
• ISR part of the C4ISR collects, collates and analyses infor- be essentially built in, requiring little to no on-site support. The
mation about an incident. It then presents it as a common network should be self-configuring, allowing entities and nodes to
operating picture (COP) to the decision makers. Use of mul- enter and leave automatically without operator involvement. It will
tiple sensors and fusion of sensor data can alert various re- make maximum use of all available spectral bandwidth by dynami-
sponders. The challenge is to fuse the data in one common cally adapting to the operational situation and allow voice, data, and
picture but be cautious enough about information overlap. video. Network protocols will facilitate multiple levels of security and
• Some agencies in the US use the term Network Centric should be highly reliable and secure. Its hardware and protocols will
Warfare for the military and Network Centric Operations be commercially based to the maximum extent possible in order to
(NCO) for homeland security. One definition of NCO is, facilitate technology insertions as they evolve.
‘participating as a part of a continuously-evolving, com- Intelligence, Surveillance & Reconnaissance: Manned and un-
plex community of people, devices, information and ser- manned ground, air, and space systems will extend the horizon be-
vices interconnected by a communications network to yond the line of sight to provide continuous and omnipresent sur-
achieve optimal benefit of resources and better synchro- veillance of the environment through both passive and active RSTA.
nisation of events and their consequences’. It is, thus, The sensors should be able to operate in all types of environment
clear that there are very good civilian applications of NCO and weather conditions. They should be able to see through walls in
for homeland security. urban environment. The ISR system should provide means to detect
mines, booby traps, Improvised Explosive Devices, and remotely
C4ISR EXPLAINED detonated munitions. The system should be able to detect, locate,
The US office of Homeland Security has extensively studied various and identify hostile elements and systems through semi-automated
C4ISR models which could be used for homeland security. After means. Information collection, analysis and dissemination will be
an extensive study it was concluded that the network architecture distributed via the network to prevent single-point vulnerability. Sen-
methodology developed for the US Army’s Future Force could be sor data collected from both manned and unattended sensor net-
adapted to the requirements of Civil Support, Homeland Security/ works will be processed, networked and fused into an integrated
Homeland Defense. This architecture links the sensors, command COP for better situational awareness.
and control, and communications systems of local, state, regional, Threat analysis and threat priorities should be carried out auto-
national and DoD elements. The aim of the C4ISR is to, ‘see first’, matically or with the aid of software tools. Near-real-time friend or foe
‘understand first’, ‘act first’ and ‘ensure reliability’. should be available. System should be able to see through decoys,
Command & Control: Decision makers will have access to a COP deception, and disinformation. Robotic systems will be employed
with timely updates to ensure near-perfect situational awareness. for certain high-risk situations. Capability must exist to defeat hostile
Information will be automatically provided as well as taken from the ISR. The ISR system should also be able to manage the overall ap-
network. The system will use forward sensor fusion and omnipres- plication of integral sensor assets.
ent assured network communications to enable improved battle
management, command and control, and situational awareness. INDIAN PERSPECTIVE
Information will be fused at the cutting edge to avoid information India has been fighting terrorism for almost two decades but so far
overload. Automated event-tracking capability will alert concerned there has been no central organisation on the lines of homeland
agencies to various contingencies. Decision makers will be provid- defence of the US. India has had a fractured response to terrorism
ed state-of-the-art collaborative, distributed, real-time decision aids depending upon the situation. Most of the time the Indian Army has
to facilitate informed decisions. been involved in Jammu and Kashmir, and the North East. At times,
Computer Systems: Computer systems will be designed to enable local police is involved in the hinterland and in special situations
individuals to be recognised by any system and to be uniquely iden- such as Akshardham and Mumbai, SPG has been called. Some
tified with appropriate status, priority, and information needs. The form of manual C4ISR does exist with the defence forces and the
system will be integrated, interoperable, and interfaced with all con- central police organisations. Some form of electronic intelligence is
cerned agencies. The plans will be continuously updated with inputs also available through central organisations. After the Mumbai at-
from higher and lower echelons as events unfold. The command tack, coastal surveillance is being tightened but air surveillance on
post will be wherever the decision makers are located. Automated the peninsular India is sadly lacking. There is no central organisation
synchronisation of all actions and reconnaissance, surveillance, and to synergise all aspects of homeland security. India needs to study
target acquisition (RSTA) will be provided. Computer hardware will the various models of the Army, Navy, Air Force and the US model
be robust and rugged for operations in all types of environment. It to adapt a suitable one to meet its requirements.
will be modular for ease of repairs or for upgrades and will be pro- To ‘see first, understand first, act first, and finish decisively’ in
tected against hostile penetration with advanced firewalls and other support of homeland security operations, a seamless C4ISR system
security systems. Software applications will be robust and flexible. which is multi-functional, multi-mission and has a flexible architec-
Communications: The network will use ground, airborne, and space ture is required. Situational understanding, information management,
communication line-of-sight and non-line-of-sight links to achieve communications, detection and avoidance of hazardous areas, area
continuous, uninterrupted connectivity on the move with minimum denial, intelligence collection and dissemination are the important
risk of being picked up by the hostile elements. Entities will be pro- ingredients of an effective C4ISR system. The system should also be
vided where required and connected to the network for exchange fully networked to have timely response time. n
SP'S
‘Focus is on
PHOTOGRAPHS: SP GUIDE PUBNS
C4I2 SYSTEMS’
Lieutenant General P.C. Katoch
Director General, Information Systems
SP Guide Publications (SP’s): How is the IA visualising transformation to NCW? Management System are the major projects under development. Integrated to-
DGIS: The IA is in a phase of transition from conventional warfare to information-en- gether with requisite communications, these systems will provide near real time
abled warfare, that is, from platform centric to NCW. The full realisation of any such ‘sensor-to-shooter’ links to make the army a network centric force.
revolution is possible only with technological development, organisational adaptation
and, most importantly, a national will. An effective and technologically sound infor- SPG: What is the progress in NCW currently within the army and among the
mation technology (IT) force, along with robust communication networks, have been three services?
created to facilitate real-time sharing of information and quick decision making so DGIS: The hurdles in sharing of information among various agencies of the coun-
as to achieve information superiority. A road map has been formulated by which we try are not only because of lack of media or infrastructure to share the informa-
can progress steadily towards being a potent IT force. tion, but due to organisational and procedural hurdles. Warfighting is a continu-
Next, we have identified development of C4I2 systems as a major thrust ously evolving affair and a net centric enabled force is the requirement of the day.
area for modernisation of the army. Development and fielding of automated op- We are making headway towards achieving network centric force keeping the
erational information systems for various levels of operations from Army HQ to primary focus of protecting our borders and sovereignty. At present, we have a
Battalion HQ and down to individual soldiers is in progress. Command Information number of projects working towards obtaining NCW capabilities, which are fol-
Decision Support System, Artillery Combat Command Control System, Battlefield lowing a road map and are at different stages of development. Even the network-
Surveillance System, Air Defence Control and Reporting System and Battlefield ing at Tri Service level has been worked out and is being implemented.
‘Enhancing
communication a priority’
Lieutenant General P. Mohapatra
Signals Officer-in-Chief
SP Guide Publications (SP’s): How are you planning to meet the Network Cen- other mobile subscriber. The Corps of Signals were the pioneers in mobile commu-
tric Warfare (NCW) needs of the Indian Army (IA) with the anticipated delay in nications in both the civil and the defence arena with a mobile communication sub-
establishing the Tactical Communication System (TCS)? set in Army Radio Engineered Network. Today, we have assimilated the CDMA/GSM
SO-in-C: The vision of the Corps of Signals is to attain and maintain informatics technology. Technologies, like WiMax, are still in nascent stages of development and
ascendancy by developing infrastructure to cater for NCW in a digitised battle- will be absorbed to ensure high data rates as voice and data would both be important
field of tomorrow. The aim and objective of the Corps is to facilitate the IA’s constituents of communication for future wars.
march towards net-centricity. TCS, being a large and technologically intensive
project, will take some time to fructify. In the interim, adequate steps have been SP’s: How are you planning to provide connectivity for Command Information
WWW.SPGUIDEPUBLICATIONS.COM
taken to ensure that our objectives are met, albeit in a manner to conform to and decision Support System?
development of other systems and applications. SO-in-C: The domain of enhancing communication in the tactical battle area
and the facilitation of synergy of elements in tactical battle field is a priority
SP’s: Enumerate the mobile communication needs of the army. How are for the Corps. The Corps is fully equipped and capable of meeting the require-
these being met? ments of the various systems being fielded in the IA. The Corps has estab-
SO-in-C: Mobility is of essence, especially in the Tactical Battle Area. An infantry foot lished a reliable, responsive, robust, secure and consolidated infrastructure
soldier needs to communicate with his platoon/company commander and up the hier- which is capable of filling pre-TCS voids and meeting both present and future
archy; so does a tank or an Infantry combat vehicle, a commander on the move or any communication related requirements of the environment.
G
SP'S
SMALL “ITEMS”.