Many people regard “end-user input” as something that happens at the end of a development process. However, the role of social media in the recent unrest in Middle East reminds us that end-users can be used for more than just “tweaking” solutions prepared by professionals.  Faced with government cut-off of networking services, organizers are finding ingenious ways of using communication platforms. More and more, “ordinary people” are demonstrating creativity in all stages of the solution-development process.

Numerous examples of end-user resourcefulness are detailed in the Economist’s “Not just talk.” In developing countries, a cell-phone may be the only available computer, so people make the most of it.  Farmers look for the best market prices, consumers track fake drugs, students take English lessons, and the unemployed look for work.

Cell-phones, especially smart phones, have also attracted the attention of the Defense establishment. While there has been formal research of smart phone applications, (The War App: Smart Phones Could Control Drone Camera discusses one of many efforts), the Defense community is also turning to end-users as a source of development.

As reported in by IStrategyLabs in “Apps for the Army Winners – Doubling Our Expectations,” a contest open to soldiers and civilians employed by the US Army resulted in many useful mobile and web applications.  The success of this competition defied skepticism that said:

“ · The Army is too big and slow to do something like this

· Soldiers don’t know how to code

· Soldiers don’t know anything about security

· The apps will be low quality – leave the development to the pros

· The process will kill any excitement in the program”

In fact, “This program has taken the software development life-cycle down from an average of more than 1 year to roughly 90 days.  Soldiers are now empowered and incentivized to build solutions to their own problems rather than rely on outside actors to big them the tools they need.”

The imagination of soldiers extends beyond communication solutions. Reputedly, the first armed robot used in theater was an ordinary IED-hunting Unmanned Ground Vehicle that had been jerry-rigged with weaponry by forward-placed soldiers. In NDIA’s  ‘Robot Army’ in Afghanistan Surges Past 2,000 Units,  Marine Corps Lt. Col. Dave Thompson, Project Manager for the Joint Project Office for Robotics systems (JPRO), indicated that soldiers are maintaining their inventiveness, “They are using them in ways we never expected.”

Early input by end-users accelerates the development process and improves the quality for the delivered solution. AMREL is in the solutions business, so we constantly seek early input from end-users at the Robotics Rodeo, Tactical Network Topology (TNT) field experiments and other events.

One of General Stanley McChrystal’s accomplishments as coalition commander in Afghanistan was the genesis of the Afghan Mission Network (AMN),a meshing of the communication links and data feeds used by International Security Assistance Force (ISAF).  The numbers are daunting. 50,000 users from 40 countries of the ISF use something like 30 separate networks, including United Kingdom’s Overtask, Canada’s Land Command Support System, and the American Secret Internet Protocol Router Network (SIPRNET). At least 165 applications (including 13 from NATO) and the data that populated those applications were moved from national networks to the shared one.

However, as Wired reported, McChrystal thinks the technical problems of net-centric warfare are relatively minor compared to the human factors. In a speech to the Network-Centric Warfare conference, McChrystal said that “by far the hardest part” was creating the appropriate “culture.”

The failure to alter our “culture” about intelligence and communications has led not only to dangerous situations, but absurd ones as well. By law, SIPRNET is only available to US armed forces. As a result, two-star British general Nick Carter, commander of Regional Command–South was unable to access information that was available to thousands of the American troops under his authority.  Even McChrystal had trouble getting critical data from intelligence agencies.

SIPRNET will not be replaced by AMN. Instead, AMN will create a Common Operational Picture (COP) for joint warfighting missions such as battlespace management, fires, ISR, counter-IED and force protection.  NATO C3 Agency project manager Wilco Dissevelt told Digital-Battlespace  “…NATO will use one tool and the US will use another tool, but they will be able to see the same information on both. Our job is to ensure that the green dot means the same thing on both systems.”

The COP approach begs the question: what kind of change is the AMN? Is it an automobile or a computer?  When cars first replaced horses, designers were reluctant to give up centuries old customs.  As a result, some early cars reputedly had holders for buggy whips. On the other hand, computers were supposed to usher in the age of the “paperless” office, a phenomenon that is still rare, if not totally non-existent.  If the AMN presents an identical COP as SIPRNET, wouldn’t that make SIPRNET as anachronistic as buggy whips? If SIPRNET still has unique applications and information, is the Common Operating Picture truly all that common?  Maybe, even with a true COP, SIPRNET will still have uses, as paper still does in a modern office.

The cultural issues surrounding AMN highlight not only the human factors, but the importance of the humans themselves.  Personnel who collect intelligence and relay communications can no longer be considered secondary actors in this conflict.  Their actions have profound effects at virtually every strategic and tactical level. As Brig. Gen. Brian Donahue, director of command, control, computers and communications systems at the Army’s Central Command told Signal magazine, “If you think a signal commander or signal officer is not a warfighter, you’ve never been to Afghanistan.”

One of the big challenges facing the International Security Assistance Force (ISAF) in Afghanistan is that radio systems from different countries don’t communicate with each another. Coordinating disparate radio systems in joint international operations will be a major focus of the Tactical Communications Conference, which will take place in April in London.

Defense IQ.com has a brief interview with one of the conference’s featured speakers, Dr. Vigneron, who is the Canadian Representative to the VHF/UHF Waveform Standardization Group at NATO.  The interview gives us a brief taste of his presentation.

Anyone familiar with this field knows that one of biggest headaches is integration of old legacy systems. Dr. Vigneron reports that there will be a “long transition period,” since many of the older systems are broadcast-oriented and not true networks. Dr. Vigneron specifically cites slow switching as a characteristic problem.

Then there’s the sensitive question of national sovereignty versus international needs. Dr. Vigneron estimates that any given national system will be using multinational waveforms 10-20% of the time.  Of course, individual countries have the option of adopting the multinational standard, which most European nations have done for air-to-air and air-to-ground systems.

From Dr. Vigneron’s interview, one gathers many of the problems will be institutional rather than technical.  NATO will set the multinational standards for its members, but how will compliance be enforced?  Which legacy systems will be retrofitted and which will be replaced?  How will crypto functions be shared among sovereign nations? Will the richer countries’ desire to upgrade standards be hampered by the poorer nations’ lack of resources?

Hear Dr. Vigneron opinions on the challenges of integrating tactical communication systems across national borders by clicking here.

Some computer manufacturers are eliminating IEEE 802.11b protocols, claiming that it will improve 802.11g.  Since 802.11n is the fastest WLAN standard, why have any legacy Wi-Fi at all?

You need a, b, and g, because not all hot spots are running n. For example, if you’re operating an MQ-1 Predator by a wireless control system, while sipping a Frappuccino at Starbuck’s (you have your fantasies; I have mine), your computer better accommodate legacy Wi-Fi networks.  If you know that your computer will be solely dedicated to a network that only supports 802.11n, then you don’t need connectivity for the older standards.

By the way, when you use your computer to conduct major combat operations from the local coffee house, be careful where you sit; data throughput dramatically decreases the further away you sit from an access point.