Sie sind auf Seite 1von 26

RESTRICTED

INTEGRATION BETWEEN AUTOMATIC MESSAGING SWITCHING SYSTEM


(AMSS) AND COMMAND, CONTROL, COMMUNICATION AND INTELLIGENCE
(C3 I) IN FUTURE MALAYSIAN ARMED FORCES

INTRODUCTION

1. In Malaysian Armed Forces (MAF), the system plays an important role in order
to support the operational of the organization. So that, the system have make the work
easier then before. There is many system that have been developed by our Subject
Matter Expert (SME) and being outsources from the outside for our organizational use.
In aspect of security, the system must be secured in order to prevent the information is
being leakage to the outsider especially from adversary. In this paperwork, we are
more focused on secure system that is commonly used which is Automated Messaging
Switching System (AMSS) and Command, Control, Communication and Intelligence
(C3I).

2. The idea of integration for both of the system is started from our Chief Defense
Forces (CDF), which he want the research is to be done to see whether it is good for
the MAF and our government especially in term of integration, financial and security.
From that our Assistant Chief Of Staff Defense Communication and Electronic Division
also have been being task to do a research for the better communication for the next
MAF generation. The idea of converging the network also being discuss in MAF ICT
Council Meeting serial 1/2017 dated 15th Jan 16 decided that the network of the system
have been integrate by using same IP VPN which can save the money without
additional cost. Now the overall system is being converged by using NWC but there is
some of the placement is still in standalone. The expansion of AMSS and C3I also have
been determine and include in Malaysia 2015 until 2017 budget which is focused on the
development and integration of the system1. Beside that, Information Technology
Strategic Planning MinDef 2016 - 2020 also focused on the integration of the system in
future MAF.2

1
https://www.treasury.gov.my/pdf/bajet/maklumat_bajet_kerajaan/2017/b60.pdf
2
Information Technology Strategic Planning 2016 – 2020.
1

RESTRICTED
RESTRICTED

OBJECTIVES

3. In order to fulfill the requirement for this topic of Commandant Research Paper,
several objectives have been outlined which are:

a. To do a research about the overall of both system - AMSS and C3I.


b. To know the implication if both of the system is integrate.
c. To know the advantage and disadvantage of the integration and
countermeasure if the system is integrate.

SCOPES

4. The scopes of this Commandant Research Paper are:

a. The general overview of the system.


b. The history and roles of AMSS and C3I in MAF.
c. The characteristic between both of the system.
d. Requirement for integration.
e. Different between the system.
f. Recommendation.
g. Conclusion.

PROBLEM STATEMENT

5. The problem statement of this paper is as followed:

a. The integration is related between two different communication system.


b. There is no AMSS system in naval ship that is now operate.
c. Preparation cost and high maintenance.
d. C3I operational system that is not fully utilize.
e. Maybe both of the system can be integrate.
2

RESTRICTED
RESTRICTED

THE HISTORY AND ROLES OF AMSS AND C3 I

6. History of Automatic Message Switching System (AMSS). The history of AMSS


Cell is started ad-hoc in 1 Mei 1995. The establishment of the project team had been
approved on 15 Jan 1996. It is start fully used in MAF on January 1999 (In minimum)
replace the analog legacy system that is point to point teleprinter. In 15 Dis 2005 the cell
have been transfer to KOMLEK. The organization of AMSS Cell is shown in Appendix
A. The roles and task of the cell is as followed:

a. Manage the operational of AMSS.


b. Manage the maintenance of IP VPN AMSS.
c. Manage the one - off project and planning for AMSS.
d. Planning the development of AMSS.
e. Ensure the security of AMSS which is crypto and smart card.
f. Organize and monitor the course and seminar for AMSS.

7. The digital technology is now have been replace the analog system. Before that
the system is used by every COMCEN and now the system is already used by every
unit. They are used DEMS PKI software to send a message followed procedure that is
set by Allied Communication Publication (ACP 123). The message can be send based
on priority and security classification. The enstablishment of AMSS is as followed:

a. Phase 1 - Improve and increase the placement of AMSS with the total
of 185 placement in year 2004 - 2005.
b. Phase 2 and 3 - Improve and increase 302 placement in year 2009 -
2010.
c. Additional placement - In year 2011 - 2017 there is increase to 34
placement.
d. Total placement is consist of 521 placement with 900 terminal
(Consist of Supervisor Terminal (ST), Message Terminal (MT) and Crypto
Terminal (CT).
3

RESTRICTED
RESTRICTED

8. 91 RSR. The unit which support the operational of AMSS is 91 RSR. It is started
operate in year 1999 consist of 32 Officers and 972 other ranks. The organization is
shown in Appendix B. The roles and task of 91 RSR are as followed:

a. Provide sending news and parcel delivery services.


b. Increase the level of news and packaging operations in tandem with the
development of up-to-date information technology.
c. Train members to be self-employed in the handling and maintenance of all
trunk communication systems, which is AMSS system. The 1kW duplicate
system and the Service Delivery Service are more professional.
d. Improve the quality of leadership, management, personal and spiritual
values to form disciplined, honest, loyal and responsible military personnel in all
circumstances.

9. History of Command, Control, Communication and Intelligent (C3I). The C3I ATM
system was first developed by GEC Marconi Company in 1990 and handed over to the
ATM in 1996. In the beginning of 1997, the improvement initiative was taken with the
appointment of System Consultancy Services (SCS) Sdn Bhd to implement
maintenance on the system. Due to the rapid increase in technological factors and the
increasing need, the C3I MAF system requires changes and improvements. This
involves changes to organizations and functions, dubious system security issues,
hardware and software interrupts caused by Y2K and software structures that have
limitations to changes. Therefore, the action taken by taking a cost effective approach
for the long term is by developing the software in total and replacing the existing
hardware. The PX2000 software was later developed by the cooperation of SCS Sdn
Bhd and the ATM before the system evolved into the NC2 System as it applies today.
Connection contract extension was implemented in 2001 until now.

10. C4ISR Cell and RPS. The organization of C4ISR Cell (KOMLEK) is shown in
Appendix C. The RPS which is a unit that support C3I operation is operated in 1997

RESTRICTED
RESTRICTED

with the strength 88 officers and 850 other ranks. The organization is shown in
Appendix D. The roles of RPS are as followed:

a. Provides C3I System services to all C3I ATM Users.


b. Provides the highest network of ATM Governance Communications and
Co-Communications.
c. Provides Mobile Strategic Extension to C3I Systems.
d. Providing Trunking Radio communication and Satellite Communication for
MAFHQ and Joint Forces HQ.
e. Provide training in the management, operation and maintenance of C3I
Systems.
f. Provide team administration and logistic requirements.

BASIC CONCEPT AND UNDERSTANDING THE SYSTEM IN MAF

OVERVIEW

11. AMSS. AMSS also known as Automatic Messaging Services System is a system
that provide the communication for messaging using Allied Communication Publication
procedure (ACP 123). The message that is sent are based on security classification and
priority of the message. This system have two encryption way which is encryption using
message encryption and secure network. The system also include with security which
have biometric device and smart card for multi authentication.

RESTRICTED
RESTRICTED

Figure 1 – AMSS Interface

12. C3I. C3I also known as Command, Control, Communication and Intelligence is a
system which provide the secret information to the commander in order to do a
decision. It also provide command and control among the commander and COPS
through the network. This system is now used in a formation in order to provide
command, control and act as decision maker from an appointment military commander.
It is developed by using Local Area Network (LAN) concept and Wide Area Network
(WAN). This system is integrate with all three services including Joint Services. Now
there is about 103 C3I placement in Malaysia. This system also provide Strategic
Communication Network, ADP, Communication System and Video Conference.

13. This system using distributed database and update by the local user from time to
time. Although the system is integrate with all services but the database is used by own
services. The system can support for Joined Forces, Military Operation Other Than War
(MOOTW), Human Assistant Disaster Relief (HADR) and public operation. This system
is also design to allow the user to get the data based on user access control (user role).
RPS is responsible to maintain and technical advisor to all C3I placement. If the system
is failure, user can submit the report through Help Desk Online System that’s operate
for 24 hours.
6

RESTRICTED
RESTRICTED

14. The integration of the database is happen for MAF which is located at Defense
Operating Room (DOR). Joint C3I can get the data from 3 database by services and
own database. The use of this system is able to provide and disseminate accurate
information thoroughly using a secure system. It also helps the government to give
direction and control in war, threats, riots and natural disasters based on existing
information. Since the C3I system is capable of supporting current and future operating
needs, the system's capabilities need to be enhanced to meet the need to support the
Network Centric Operation (NCO) system during 2015 - 2020.

Figure 2 - C3I Interface

NETWORK

15. The network diagram of the system is different each other depend on the need
for basis. The AMSS diagram is can be refer in Figure 3. The diagram below also show
the conceptual and the link towards each node. The way it connect each other are
directly using secured IP VPN.
7

RESTRICTED
RESTRICTED

Figure 3 - AMSS Diagram

16. The C3I diagram before it is converged with AMSS system are as followed:

Figure 4 - C3I Network

17. From the diagram, we can summarize that the flow of the network started from IP
VPN, CE router, IP Encryption (Only allow the registered IP to go through the network),
riverbed (Act as Quality of Services (QOS)) and distribute from the switch to the
application.
8

RESTRICTED
RESTRICTED

18. The C3I diagram after it is converged is as followed:

Figure 5 - C3I with NWC

NODE AND LOCATION

19. AMSS. Node and location of the system is different but some of the line is
converged together and standalone. The AMSS have 8 nodes and consist of about 521
location. There is about 901 terminal and 75 supervisor terminal are being issued for the
system. The terminal for sending message the terminal UU consist of about 685 and for
Terminal HH is 141 terminal.

a. Network Control Centre (NCC) is consist of two which is:

(1) Main Node - KUL.


(2) Regional Node – BTW, LUM, KLB, KTN, TDK, KKU and KCH.

RESTRICTED
RESTRICTED

b. The main node and regional node is as followed:

SER NODE LOCATION/PLACEMENT

1. KUL KUL 1 - KUL 5.

2. BTW BTW 1 - BTW 5.

3. LUM LUM 1 - LUM 6.

4. KLB KLB 1 - KLB 3.

5. KTN KTN 1 - KTN 6.

6. TDK TDK 1 - TDK 6.

7. KKU KKU 1 - KKU 2.

8. KCH KCH 1 - KCH 2.

Table 1 – The Location/Placement of The Node (AMSS)

Figure 6 – AMSS Location of Node

10

RESTRICTED
RESTRICTED

20. The detail location can be summarize as table below:

SER SPEED TOTAL LOCATION


NWC
1. 40 Mbps
2. 30 Mbps
3. 20 Mbps Total detail of location is not shown because
4. 16 Mbps of confidentiality
5. 12 Mbps
6. 10 Mbps
7. 6 Mbps
8. 4 Mbps
TOTAL 45
STANDALONE
1. 4 Mbps
2. 2 Mbps Total detail of location is not shown because
3. 1 Mbps of confidentiality
4. 512 kbps
5. 256 Kbps
TOTAL 156

Table 2 – AMSS Location

21. C3I. The C3I system have about 103 location consist of 69 static location and 34
mobile location. The terminal that have being issued is about 1160 terminal.

Figure 7 – C3I Location/Placement

11

RESTRICTED
RESTRICTED

CRYPTO SYSTEM

22. The crypto system also have different for each of the system. The crypto is act as
to secure data in appropriate way to unable the adversary or outsider to read the
message. The different are as followed:

AMSS C3I
Method Message encryption - The message Network encryption - Will allow
is encrypted. registered IP to enter the
Using secure network which is IP network using crypto. Using
VPN. secure network which is IP VPN.
Equipment Different model and requirement
Company Different company
Sites Different sites

Table 3 - Crypto System


ACCESS LEVEL

23. Access level is the level of capability and the system which is located. It can be
conclude that the AMSS and C3I facilities are different for each level. It is also based on
each services. The access level are as followed:

AMSS C3I
Army ➢ Every level until unit in field ➢ DOR
➢ DOR, MK Formation, Div Inf, ➢ Army Field Command West, Army Field
Bde Inf and unit Command East,
➢ Placement of static and mobile ➢ Div Inf Fmn and Bde Formation
(Planning to buy for this year) ➢ Placement of static and mobile
Navy ➢ DOR until ship (Basement) ➢ DOR until ship (Basement and operation)
➢ C4 I Tacx (Medium X-Band)
Air force ➢ DOR until squadron ➢ DOR until squadron

Table 4 – Access Level

12

RESTRICTED
RESTRICTED

STRATEGIC PARTNER

24. The strategic partner is a part of the development of the system. It is backbone to
the whole system. The two strategic partner for each system is as followed:

SER AMSS C3I


1. Telekom Malaysia – Main contractor Telekom Malaysia – Provide line and
provide line and maintenance (NWC). maintenance (NWC).
2. Wadah Sejati – Aircond, power supply System Consultancy Services –
and electric work. Provide and maintenance all
requirement for operating the P4 system.
(System, Generator, network utilities).
3. Siaga Lab – software for operating
system.
4. Mesin Niaga – Hardware that is related to
the system.
5. Wira Muhibbah – Paper and toner.

Table 5 - Strategic Partner


COST

25. AMSS. The cost of the operational for 1997 until 2020 is over RM 60 million. The
spending of renting of NWC have save over RM 1,200,000 per year. Line capacity of
AMSS stand-alone that provide by Telekom Malaysia (TM) are as followed:

SER BANDWIDTH TOTAL TOTAL LOCATION AND REMARK


LOCATION RENT RATE (RM)
1. 4 Mbps
2. 2 Mbps Total rent in detail is not shown because of
3. 1 Mbps confidentiality
4. 512 Kbps
5. 256 Kbps
TOTAL 156 8,000,000 ++

Table 6 – Line capacity of AMSS standalone

13

RESTRICTED
RESTRICTED

26. C3I. The history of procurement is as followed. Fixed line capacity that is provide
by Telekom Malaysia for the C3I are as followed:

TOTAL RENT IN A YEAR (RM)


SER BANDWIDTH 1 MONTH 1 YEAR REMARK
1. 40 Mbps
2. 30 Mbps
3. 20 Mbps
4. 16 Mbps Total detail rent is not shown because of
5. 10 Mbps confidentiality
6. 8 Mbps
7. 6 Mbps
8. 4 Mbps
9. 1 Mbps
10. 512 Mbps
11. 256 Mbps
TOTAL 200,000++ 2,000,000 ++

Table 7 – Fixed Line Capacity

TECHNOLOGY AND SOFTWARE

27. AMSS. The evolution of AMSS is as followed:

a. Before 1997 which is using point to point teleprinter - analog.


b. 1997/1998 - Sending message by using computer through TM fixed line.
c. 2000 - 2005 - The system is improvised from analog line to digital and
400 based messaging.
d. 2006 - 2008 (DEMS Phase 1) - AMSS System improvised more by using
ACP 123 and Directory Services.
e. 2008 - 2011 (DEMS Phase 2 and 3) - Migration network to IP VPN with
increases of bandwidth.
f. 2015 - Implementation appendices file system (Attachment file).

14

RESTRICTED
RESTRICTED

28. C3I. The C3I software evolution is as followed:

ST ND RD TH
1 2 3 4
GENERATION GENERATION GENERATION GENERATION
System
Command GEC Marconi Redeveloped With integration With integration
and Control OEM version. Software. to tactical units to tactical units
Software Further - current (ships), GIS, (ships), GIS,
Ops requirement SFS. SFS.
Platform Unix Windows Windows, Open Windows, Open
Source, Java, Source, Java,
C++ C++
User TOTE, text- With multimedia, With multimedia, With multimedia,
Interface based, limited GIS video, GIS video, GIS
map
Application Without With 3 exercise Enhanced MAB, NC2, Tac-X,
modules Exercise, JIC, environment, JIC, Tactical Ship- UAV Feed
JTF MAB Shore, UAV feed
Security User Access 50 Security Dalil, VPN, IDS, File VPN (Ciku), IDS,
Control only 7 layer embedded Change Detect, File Change
security SANs compliance Detect, SANs
compliance
Map `Tellus MapInfo MapInfo ESRI
OA Uniplex Microsoft Office Microsoft Office Microsoft Office
(OWA)
E-Mail Uniplex Microsoft Microsoft Zimbra
Exchange Exchange
OS HP-UX Windows NT Windows Windows 7
2000/XP
Database Ingress MS SQL MS SQL MS SQL / ESRI
Geodatabase
Application Client- Server Client - Server Hybrid Web-Based
Database Centralised Distributed Centralized Centralized
Portal No Portal HTML HTML Sharepoint
Development Ingress - 4GL VB VB/ASP/C++ Silverlight/C++/T
elerik
Login No Standard Military number Military number Appointment
Admin Tools HP-UX Utilities PXM PXM AdminUtil
Database 1 Database – 3 Databases – 3 Databases – 1 Database –
Ops Ops/Trg1/Trg2 Ops/Trg1/Trg2 Ops/Trg1/Trg2
Deployment Server and Server and Server and Server
Workstation Workstation Workstation

Table 8 – The C3I Software Revolution

15

RESTRICTED
RESTRICTED

SERVICE PROVIDER

29. AMSS. AMSS system is using Local Area Network (LAN) and Wide Area
Network (WAN) allow the user to send and receive message using ACP 123 standard. It
can send the message to the specific address and now using commonly in
administration of the unit. For message that is classified as secret, the message will be
sending using crypto. There is also certain procedure in order to send corrected
message, cancellation of message, request message that is receiving, readdress and
related procedure to ensure the message can be corrected, readdress and receive to
the user.

30. C3I. The C3I system is using Local Area Network (LAN) and Wide Area Network
(WAN). It is distribute information using secure system. It is to support the commander
in order to do a decision guided by Common Operating Picture (COP). In the C3I
system, there is many functionalities such as e-mail, Geographic Information System
Mapping (GIS), Asset Management, Microsoft Sharepoint, Chatting, Document
Management and report in order to support the operational, administration and logistic
support. It will provide the data from the responsible unit to the appointment military
commander in order to do a good planning and decision.

31. The service provider by both of a system can be summarize as followed:

AMSS C3I
Service Sending mail and military letter
Data
Provider as an online. Situation awareness, Common Operation
File attachment. Picture System (COPS), Map, Document
- Text - doc, xls, ppt and pdf).
Sharing, E-mail and Image.
- Graphic - jpeg and bitmap. Telephone/Fax
- Text and graphic send/receive
IP Telephone, Analog Telephone, Faxmile
40 MB maximum and Hotlines.
Video Conference
Less used Video, image and audio (Limited Comms Strategic Extension (Fixed Sites
by user Bandwidth). and Transportable)

Table 9 - Service provider


16

RESTRICTED
RESTRICTED

FINDING AND DISCUSSION

WEAKNESS

32. The weakness both of the system can be summarized as follow:

AMSS C3I

There is an equipment that is still used more There is an equipment that is used more
then 10 years (Ageing). The equipment is then 10 years (Ageing). The equipment is
ageing due to contract that is aggreed by ageing due to contract that is aggreed by
both of the govt and company. both of the govt and company.
There is no backup line/system. The line that There is no backup line. The line that is used
is used by the system by using one line and by the system is using one line and there is a
there is no backup system once the system Disaster Recovery Centre (DRC) that is
or server have a problem. stated and act for the system.
Many unit that is include. The AMSS can be Access until Bde Formation only. The system
used for many of the unit. is now more focus on Bde formation only. It
is usually used by Bde staff in order to
provide information and command and
control for the commander.
No backup for storage. The AMSS system is
also no included backup storage once the
system is down.
Contract less comprehensive. The contract is
sub to many of the company and not
comprehensive.
Less bandwidth (Stand - alone). The system
is used by the application doesn’t need a lot
of data.

Table 10 – Weakness Of The System

17

RESTRICTED
RESTRICTED

DIFFERENT BETWEEN THE SYSTEM

33. The different between system is as followed:

SUBJECT AMSS C3I

Focus Daily GAQ. The system is used for Operational. The system used for
administration for daily used. It focus on command and control. It will
message to be sent to unit and required stored the data of every unit in a
action or info to the unit. server to convert into smart data
for the commander to do a
decision.
User Use by other rank (Clerk). Those who Use usually by an officer. Need to
have attend the course at 91 RSR for 1 attend the course at RPS.
until 2 weeks. The course is related
about procedure related for AMSS.
Bandwidth Does not need large bandwidth. It send Need large bandwidth. It also
only a message and image. consist of sending message,
image, audio, situational
awareness and video conference.
Tonner and Tonner and paper provide by supplier. Tonner is provide by supplier.
paper Many of the model use is Hewlett Many of the model used is Brother
Packard (HP) brand. brand.
Asset The terminal is for static place only. The The terminal is for static and
mobile terminal will be used in the mobile.
future.
Crypto / System crypto and software is different System crypto and software is
Software Using message encryption and IP VPN. different. Using IP crypto and IP
AMSS using software DEMS (PKI). VPN. C3I using PX 2000 and
using a browser as a platform.
Management Manage in regional. Manage by officer in each
of the system placement.

Table 11 – Different between the system

18

RESTRICTED
RESTRICTED

CONSTRAINTS

34. The constraint for integration is as followed:

a. There is 156x AMSS placement and 3x C3I line that is still standalone.
b. Many of AMSS line have maximum speed 512 and 256 Kbps.
c. The software of both system is different.
d. Will increase the initial cost for convergence system and rate of rent will
be increase.
e. Use 2 different equipment and crypto software.

REQUIREMENT FOR INTEGRATION

35. The integration of the system is become crucial to the highest commander. It is
also to ensure all the system is parallel and to ensure all the system integrate each
other. It can provide command and control to the organization. Now both system have
to integrate the line by using IP VPN. However certain location is integrate and certain
places is still standalone because some of the place does not have C3I.

36. In NCO there is an integration between all system. By using C3I as a backbone
and the other system to support the operation, It can provide all data in order to give to
the higher commander to do a decision. The system is still in different use because of
roles and task of the system is different each other.

37. By using X-Band, it can be an alternatives and platform to communicate between


each other. The presence of X-Band will help to communicate using satellite as a
platform. Although it is a strategic asset now it have been used until tactical level. It can
be shown when the procurement of the X-Band have been issued to the unit until
tactical level.

19

RESTRICTED
RESTRICTED

Figure 8 – Network Connectivity Architecture for NCO

Figure 9 – Current Networking NC2 Deployment State

20

RESTRICTED
RESTRICTED

Figure 10 – MAF Network

IMPLICATIONS – ADVANTAGES AND DISADVANTAGES

38. The advantages and disadvantages of integration is as followed:

ADVANTAGES DISADVANTAGES
Make the maintenance procedure is easier Make the one company monopoly to the
which is one company. The maintenance can contract.
be easier because the maintenance will be
centralize.
Using the same software and crypto system. There is no warranty if the system being hack
or down in security aspect.
Using one terminal for operation of both There is no backup for the system if there is a
system. problem in a formation/unit.
Larger bandwidth for all site. Line rent cost will be increases.
The system operational will be problem
especially in a unit – Combine both of the
system.
Procurement cost / new software and hardware
will become higher.

Table 12 - Implication - Advantages and Disadvantages


21

RESTRICTED
RESTRICTED

SECURITY

39. The security is a crucial part which is compulsory in every system. In AMSS and
C3I there is certain element of the security between them that should be considered.
The security element of the system must followed the principle below:

a. Confidentiality. Information and communication systems only can be


handle and reached by authorized persons only. It can be show that the
system have their own security for example biometric device, card and password.
We can combine it together to get the system more secure.
b. Integrity. Information and systems should always be accurate and correct.
c. Availability. Information, systems and hardware always accessible to
eligible users when required.
d. Non-Repudiation. Transaction of every information in a system is
recorded. Dispatches and receivers information in a system cannot deny the
transaction process that happens. 3

AMSS C3I
Authentication Multi authentication Authentication
- Using biometric card and - Using own username and
password. password.
Crypto (Both Encrypt message. The system Encrypt Network. It will encrypt
are mention in encrypt the message that is sent to the network and allow only
subtopic the user. registered IP to enter the
crypto) system.
Purpose Administration only. It is send daily Operational (GAQ). It is used
to send the message or info for for operational to ensure the
daily purposed used. command and control in a
formation.

Table 13 – Security of the system

3
MD 3.2.2A TD Manual Keselamatan Komunikasi dan Elektronik

22

RESTRICTED
RESTRICTED

RECOMMENDATIONS

40. The both system is already established from 1990 and above. Then, what we
have must be improvise from time to time due to the technology changes and industry
revolution 4.0, so that we can have the better system for our future use. From my
analysis, the system can be integrate as we considered the subject is as followed:

a. Strength of the Unit and Different Roles and Task. Based on my research
the unit itself have different roles and task. Both system are act as strategic and
operational communication which AMSS is only for admin and daily messaging
while C3I is for operational that includes all requirement and needed for the
commander. For future, we can consider a few thing is as followed:

(1) Maintain what we have now and just more focus on technical and
development part which one system can be used both of the unit which is
91 RSR and RPS.
(2) The one of the responsible for the AMSS Cell can be detached
from 91 RSR to RPS but certain thing must be consider and the
paperwork should be done and must be coordinate properly.
(3) Management of the system can be centralize or execute by a team
member.

b. Increase Placement of Standalone to Convergence Network. In aspect of


the network the system is already be converged by both of the network. The
convergence also have save a budget without additional cost required. There is
45 placement that have been converged the network. However, there is 156
placement of AMSS that is not converged the network with the C3I. In future we
can do a research and focus more to the AMSS standalone for integration.
c. Enhance the Security of The System. In aspect of security we can do a
comparison for both of the system which they have their own crypto and different
in security aspect. We can be suggest the both system used the same crypto and
23

RESTRICTED
RESTRICTED

do some improvise by using both of the crypto which one is the best. To
authenticate we can used and increase the aspect of security system used by
both of the system such as card and biometric authentication.
d. Technology and Software Development. The technology and software
have been unchanged and ageing. In order to suit with the latest technology we
suggested that the system can be integrate but must be design it very well and
user friendly. In the next contract we can suggest the research can be include in
the contract so that the development of the system and module can be improvise
very well. To save the cost of budget, we also can suggest that to create a team
member to develop the software. The team member should be Subject Matter
Expert (SME) and go to the course that are related such as software engineering
and focus to the development of the system.
e. Improvise the Wi-fi Infrastructure Network For Every Placement. The
system is already allocate to every formation and unit. In a worldwide of digital
and internet of things we also must consider the used of wi-fi internet and internet
for workstation. The used of the internet can improve daily work and make all the
information is can be access worldwide. We can suggest that wi-fi infrastructure
can be include for the next contract. For the first time, it required a high cost but
in future when we have an infrastructure we just have to maintain it and allocate
for maintenance.
f. Allocate the AMSS at Royal Malaysian Navy (RMN) Ship and C3I
placement until Unit Level. Based on the research both of the system is allocate
at certain placement for used and focus on the usage and roles and task. What
we can suggest is the used of AMSS is suggested to be link to the RMN ship that
is now operating. It is to ensure the information and admin part can be easily be
send. In C3I we can upgrade the allocation until the unit so that the commander
in Bde and Div level can command and control the unit under command itself.

24

RESTRICTED
RESTRICTED

CONCLUSION

41. Based on the research, we can conclude that in MAF the system is now are
converged the line without converged the system. We can recommended that in the
future the system can be integrate each other but it will affect to an organization, role
and task, cost and related as stated in this paper. If the system is integrate, the things
that should be considered is the cost and the usage of the system. We must consider
the utilization of the system to prevent us from wasteful. This paper also tell us about
the both system in term of capability, what we do now and planning in the future MAF.
(5217 words)
Sep 2019

MOHAMAD NUR HIDAYAT BIN ZARKIA @ ZAKARIA


Kapten
Signal Regiment Officer Communication Course Serial SROCC 28/2019

25

RESTRICTED
RESTRICTED

BIBLIOGRAPHY

Dasar Keselamatan ICT 5.0 dated 1 Jan 17.

Information Technology Strategic Planning 2016 – 2020.

MP 3.3.1 A TD Prosedur PUSKOM, Penulisan Berita dan KHS (Sementara) 2010.

MD 3.2.2A TD Manual Keselamatan Komunikasi dan Elektronik.

MD 6.0A TD Semboyan.

https://www.treasury.gov.my/pdf/bajet/maklumat_bajet_kerajaan/2017/b60.pdf

26

RESTRICTED

Das könnte Ihnen auch gefallen