The Army has just finished its second Network Integration Evaluation (NIE).  This large exercise appears to have accomplished its primary goals of accelerating the notoriously slow acquisition process, field-testing entire networks, and gathering valuable end-user feedback. Sometime massive bureaucratic efforts do work.

Although complete tactical communication systems were tested, the smartphones were the center of attention.  Some results are already filtering out. Read more

Recently the ARMY announced the cancellation of its current contract for the Joint Tactical Radio System (JTRS) Ground Mobile Radio System.  Did its highly publicized plans for a battlefield smartphone have something to it?

An uniformed person might think, “Sure, what does the ARMY need JTRS for, when they’re going for a smartphone?” Actually, the smartphone’s success depends on JTRS.

While security is usually described as the Number 1 concern for the battlefield phone, the lack of cellular service in potential combat zones has emerged as a major obstacle (Razorianfly).  Almost all the proposed solutions for dealing with connectivity are partial. Some of the more innovative solutions include installing cellular equipment on blimps, UAVs, and aerostats.  There’s even talk of a “cell tower in a suitcase.” Read more

futureRecently, some clients asked AMREL to build an Operator Control Unit (OCU) for their Unmanned Ground Vehicle.  No surprise there; we dominate that particular application.  What was noteworthy was the specific form factor that they requested.  They wanted it to be a wearable computer, worn on the wrist.

We ran a simple experiment with the clients.  We strapped a small computer to their wrist and had them run some typical UGV commands.  Soon, they discovered that their arms grew tired supporting the computer.  The clients agreed to have their OCU installed in the traditional, if less exotic, form factor of a handheld.

Notice that the wrist-mounted form factor wasn’t discarded for technological reasons. AMREL has become quite adept at developing small, powerful, ATOM-based computer platforms, which would be perfect for wearable solutions. Rather, this innovative approach was discarded, because the wrist form factor proved impractical for this particular use. Read more

uscgMaritime conditions are especially difficult for communications, and nowhere are they more important. Corrosive salt air, rough storms, and “dead areas” in the belly of a ship all conspire to damage critical equipment and sabotage the transmission of life-saving information. In the August issue of U.S. Coast Guard Forum, Roger that! reviews a variety of solutions for extending connectivity to all personnel, whether they are in the air, sea, or onboard a vessel. On page 26 of the article, AMREL’s Vice President of Strategic Business Development, Richard Lane, is interviewed about the adaption of innovative technologies for the needs of Coast Guard communications. Check it out!

featured image alt text

The Department of Defense is determined to field mobile devices that connect soldiers to networks for the rapid transmission of data. A number of forces have inspired this initiative:

  • Younger soldiers, by their own volition, are using their own smartphones and tablets whenever possible.
  •  The doctrine of network-centric warfare has upended the traditional paradigm of sending ISR to the rear echelons and is instead emphasizing delivering real-time info to the front lines.
  • Enemy forces have successfully used cell phones to relay information in their own networks. Read more

Watch Ted Ventresca of www.fedmil.com interview Ron McMahan, VP Engineering Solutions at AMREL, about the ROCKY DB6, the world’s smallest rugged handheld that runs Windows 7/Linux.

What is the optimal screen size for a mobile device used by a warfighter?  Is it the 7″ to 12″ display of the tablet?  The 3″ to 5″ of the smartphone?  Something in-between?

With the exception of security issues, the folks at the Pentagon and other real-echelon postings do not work in situations that much different than their civilian counterparts.   For its stateside personnel, the Army can probably fulfill its ambitious smartphone program with whatever Commercial Off the Shelf (COTS) products it chooses.

However, warfighters operate in much more demanding environment. Small differences can have huge consequences. Read more

The modern battlefield is full of robots all talking at once. Unmanned systems consume significant amounts of communications bandwidth because they require transmission of control signals and large amounts of sensor data. Line-of-sight (LOS) limitations often obstruct high frequency digital radio communications. In addition, encryption, which is necessary for security, can decrease operational distance.

Besides compromising range, radio noise may also affect how the robots respond toinstructions, even instigating false commands. Another consideration is the additional power consumption necessary to burst through interference.

Different types of unmanned systems have specific radio communication challenges….

Click here to read the rest of the article.

If you’re like me, you may have thought that the US Military adopted network-centric warfare in the current conflicts, so it could leverage its technological advantage.  This widespread application of information technology as a unifying doctrine for warfighting was the culmination of a debate that began in January 1998, when the journal Proceedings published “Network-Centric Warfare: Its Origin and Future” by Vice Admiral Arthur K. Cebrowski and John J. Garstka.

If the only thing you ever read was General McChrystal’s It Takes a Network, published in Foreign Policy, you might think that the commanders in theater adopted network-centric warfare—not because of years-long deliberation within the DoD— but because al-Qaeda, adopted it first.

General McChrystal describes the enemy as being able to “… leverage sophisticated technology that connects remote valleys and severe mountains instantaneously — and allows them to project their message worldwide, unhindered by time or filters. They are both deeply embedded in Afghanistan’s complex society and impressively agile. And just like their allies in al Qaeda, this new Taliban is more network than army, more a community of interest than a corporate structure.”

Early in his command in Iraq, McChrystal drew a diagram illustrating the bottleneck that prevented the free flow of data among the highly compartmentalized structures of U.S. forces.  This bottleneck contrasted greatly with the al Qaeda’s easy exchange of information, which enabled it to maintain a lateral structure, quick adoption of successful tactics, and independent operations.

“The sketch from that evening — early in a war against an enemy that would only grow more complex, capable, and vicious — was the first step in what became one of the central missions in our effort: building the network. What was hazy then soon became our mantra: It takes a network to defeat a network.”

This is an inspiring story, depicting the flexibility and ingenuity of our military determined to complete its mission under difficult circumstances. McChrystal’s article is well-written and I strongly recommend it.

However, it is not correct to say the U.S. network-centric warfare efforts began with McChrystal’s diagram.   Award-wining Noah Shachtman writing in “How Technology Almost Lost the War: In Iraq, the Critical Networks Are Social — Not Electronic” for Wired.com, reports that the principles of network-centric warfare were adopted and applied as early as the 2003 invasion of Iraq.  In fact, they worked pretty well —during the invasion.  The problems occurred during the occupation and rebuilding.

Shachtman writes “… Cebrowski and Garstka weren’t really writing about network-centric warfare at all. They were writing about a single, network-enabled process: killing.”  In counter-insurgency, killing is not the same thing as warfare.  So, the DoD’s application of network-enabled killing was great for using Special Operation teams to target and eventually destroy SCUD missiles. Not so great for nation building.

Under McChrystal and Petraeus’ leadership, the U.S. led forces in Iraq and Afghanistan altered their internal social culture about intelligence distribution as well as built social networks with the locals. Shachtman is persuasive that the social networks with the inhabitants are more significant than electronic. Even Garstka admitted to Shachtman, “You have your social networks and technological networks. You need to have both.”

Just as McChrystal did, we need to change our attitudes in order to properly exploit the advantages of networks. This applies not only to the military, but to the community supplying them.  Contractors and sub-contractors need to overcome their traditional hostility with competitors and network with each other in order provide the best-possible solutions. Nowhere is this more apparent than in the issue of interoperability, which is essential for true network-centric warfare.

In a recent posting (Network-centric Warfare: Dead or Alive ?), I wrote about the debate concerning network-centric warfare.  In the wake of the “reorganization” and outright elimination of high-profile initiatives and programs associated with network-centric warfare, Defense vendors are anxiously wondering if it LTM 1will persist as a central doctrine for transforming the military.

Clearly, the military’s obsession with connectivity is far from over.  DARPA is actively working to overcome the military’s traditional anxiety about the security of distributed servers (Pentagon Looks to Militarize the Cloud).  The Army is running a contest for mobile applications and talking about issuing smartphones to every soldier (A Smart Phone for Every Soldier?). Solutions are being displayed for sticking 3G cellular pods on a variety of vehicles, including UAVs (Forward Airborne Secure Transmissions and Communications). 

So the forces that spawned network-centric warfare are still active, but as I concluded in the above-referenced blog post, so are the problems that have frustrated its implementation. Here’s a partial list of obstacles

  1. Money
  2. Lack of interoperability
  3. Money
  4. Development and acquisition pipeline logjam
  5. Money

According to at least one analysis, the current cost-climate climate means “… that the personnel and procurement budgets will be reduced to pay for O&M costs…” (Defense Industry Daily). As the demand for novel technology grows, acquisition budgets shrink.  Defense wants the latest and greatest solutions, they want them now, and they want them to have a TRL level of 9 before they even see them. Government paying for research, testing, validation and verification?  That’s so 20th century.

      Using mature systems to develop advanced, useful solutions for today’s challenges is not impossible.  Working with strategic partners, AMREL has developed System One, a Last Tactical Mile solution, a system composed of entirely battle-proven technology.

      “The Last Tactical Mile” is a classic problem of network-centric warfare. Front-line troops are demanding real-time information. The days are over when data for C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance) only went to the “back-end” (headquarters located away from the front).  However, getting this information into hands of the warfighter is a tremendous problem.

      To appreciate the complexities of “The Last Tactical Mile,” imagine a team of Marines attacking a high value target in littoral waters. They might be deployed on an amphibious assault vehicle (whatever replaces the now-canceled Expeditionary Fighting Vehicle).  In theory, this scenario could require connectivity among a UAV, external ship sensors, satellite networks, the amphibious assault vehicle, mother ship personnel, and the strike team deployed.  Space is limited aboard the ships and all equipment must be ruggedized in order to withstand the harsh maritime and combat environments.

      System One leverages AMREL’s broad range of from-factors for mature computing platforms, which are more than rugged enough to withstand the brutal vibrations of the high-speed landing craft,  the corrosive conditions of the sea, as well as the violent realities of warfighting.  AMREL’s durable, battle-tested PDAs are ideal for the Marine strike team.  AMREL’s portable, rugged tablets could maintain communication with the amphibious assault vehicle’s coxswain as well as the mother ship’s onboard crew. Our fully functional 19/2® servers are1/4 the size of normal rack-mounted units, so they’re perfect for the cramped quarters of the assault vehicle. Designed to be flexible and to maximize connectivity, AMREL’s computers would have no problem tying the whole thing together with a MESH network.

      System One has already successfully demonstrated the connectivity and reliability required for such a scenario. It can be installed on any vehicle, land or sea. It would function perfectly in the high-speed Stiletto boat and is small enough to fit in even the most crowded MRAP vehicle. In fact, it’s so compact, it is even man-portable.

      An example of an advanced solution using mature, field-tested components, System One demonstrates that with careful strategic teaming and a bit of imagination, diminished government resources for research and testing can be leveraged into an opportunity.

      For a more detailed discussion of “The Last Tactical Mile” and System One, please see IDGA’s interview with Luke McKinney, an expert in military intelligence operations and joint mission analysis.