Marine  Magnet Dispatch Service Centre
  • Drone Fleet Readiness Office
  • Status Updates
  • Marine Corps Integration
  • Submit Comments
  • Download Reports
  • Building Drone Swarms

Top 10 Tech Priorities Provide Value/Function of Info Architectures Battlespace Logistics Operations Management

8/10/2020

0 Comments

 
Advanced Battle Management System is the leading candidate to be the backbone of a future Joint All-Domain Command & Control (JADC2) network-of-networks linking all the armed services for many types of missions, including logistics.

The ABMS will be critical to mobile logistics needs and must evolve quickly, not conform to industrial-age requirements and schedules.

AMBS needs to be a cutting-edge, constantly improving network of radars, observers, and battle management to allow position of limited resources for maximum effect, aimed at exploiting the power of networked information to enable a limited force to prevail.

Artificial intelligence could pull together data from multiple sensors, each seeing the same target in different wavelengths or from a different angle, to build a composite picture more precise than its parts.

“We’re moving past just simple concepts of sensors and shooters. How do we get multiple sensors and shooters integrated do we get more out of them than an individual item could provide?”

“It’s not a specific sensor to a specific shooter. On a future battlefield… just about everything is going to be a sensor. So how you do you store that data and how do you enable a smart distribution of data to the right shooter? Because we can’t build architectures that are relying upon huge pipes and just massive bandwidth to make it work."

“If we can bring them together, you can use a sensor the Army already developed, bought and fielded to spot targets for one weapon – say, the Q-53 artillery radar – to feed targeting data into a totally different type of weapon – say, a Patriot battery.

The Army wants to plug in its new anti-aircraft and missile defense systems to the Network, but those technologies are at a critical juncture in their own individual test programs.

Army is also running tests with systems including aerial scouts, long-range missile launchers and armored vehicles.

Army has to test a sensor-to-shooter link that feeds data from a wide range of sources – in space, in the air, and on the ground – to an Army howitzer unit.

However, the Army had also wanted to experiment with new headquarters and organizations to command and control ultra-long-range artillery.”

That makes the stakes even higher for Project Convergence. “You can call it an experiment, you can call it a demonstration. “Right now, the plan is we’re going to do this every year… every fall as we continue to mature… this architecture that brings the sensors to the right shooter and through the right headquarters.”

GAO was highly critical of the ABMS program for lacking defined requirements, a program schedule, cost estimate, or affordability analysis. On the surface, this is a damning evaluation, given the terminal fates of similarly criticized programs like Future Combat System and the Joint Tactical Radio System.

But GAO’s methods of evaluation have been said to be outdated in today’s information age. The Air Force’s approach to ABMS should continue to center around a defined operational concept, not locking in technological requirements today that will only ensure obsolescence.

ABMS is a forward-leaning set of technologies that must be fluid if they are to remain relevant. They should not be managed and evaluated with industrial-era processes that strictly follow the rules that require a predetermined technical solution. That will simply guarantee obsolescence and a process too rigid to adapt to a set of dynamic threats. Instead, rigor should focus upon the operational concepts that underpin the fundamental design of ABMS.

Air Force has articulated a decentralized vision for an ABMS that promotes networked connectivity across platforms, domains, and even services. However, the effectiveness of any tool comes down to how it is used and how well it serves that purpose.

Networking is a foundational technical capability for ABMS, but the ultimate vision cannot be realized by simply connecting sensors and moving data. In fact, it could make problems worse.

Absent a clear operational concept, the availability of information could result in extreme micromanagement, given the propensity for senior leaders to reach into the tactical realm. Alternately, warfighters could find themselves drowning in data, universal availability of data could resulting in operational paralysis or operational chaos.

So far, Air Force “experiments” have focused on connectivity across platforms, domains, and services. But these highly scripted and rigid kill chains simply move data; they are not exploring the stickier problems of actual battle management. Instead, what must be demonstrated is how these ABMS technologies support future operational concepts.

ABMS will be successful if completely aligned with the air defense concept of operation. It can’t just be a collection of sensors and networks randomly closing kill chains. Leaders need to understand the larger battlespace to prioritize the threats, manage available assets, and link capabilities as the battle unfolds. It is this broader functionality that will enable the services to maximize its limited assets to prevail.

The Air Force must prove the value and functionality of its technical priorities in today’s systems and against future operational concepts. Instead of requirements, schedules, and cost estimates, the Air Force should develop an exercise, experimentation, and migration plan.

This plan should shift from today’s air battle management systems, like JSTARS and AWACS, to the future ABMS. Battle management is too crucial a function to retire on the promise of PowerPoint; a bridge is needed to the future.

The first step of developing this plan is envisioning what that that future combat operational concept is, and then shaping battle management functions to that architecture.

Information architectures and battle management concepts must align to operational concepts to deliver the speed, accuracy, relevance, and advantage future conflict will demand.

This means modularly inserting technologies into current battle management platforms as these new capabilities mature to a minimum viable product. The Air Force cannot rely on numerous technological consecutive miracles falling into place all at once. A gradual transition is how a seemingly unwieldy program can yield value and reduce risk in ways that past efforts like FCS and JTRS did not.

Finally, the Air Force should focus its experimentation on the fusion and decision functions of a battle management system. How does the system function with multiple targets and multiple assets with varying potential effects? What about the many support assets and actions? Experiments must also be tested with current platforms and tactics to be both backward- and forward-compatible.

If the Air Force’s ABMS program seems ambitious, it is. However, this is an endeavor driven by necessity. The realities of constrained budgets preclude the option of overwhelming combat power.

ABMS should not be assessed against traditional acquisition evaluation criteria that would ensure technological obsolescence. Instead, the Air Force must drive greater focus, vision, and alignment into its experimentation plan if it is to achieve anything close to a twenty-first century System.

And achieving that is not just ambitious; it is imperative.

The principal battlespace management commander first determines the mission and the specific tasks required to accomplish the mission. An example of a typical set of mission tasks might be planning, establishing a command post, securing routes, providing perimeter defense, and establishing locations for providing assistance.

Once you have identified your list of targeted resources to be profiled, you are ready to begin creating a profile for each one. The idea is for the resource owner to rate the resource's importance to the organisation from an information-security perspective and relative to all other assets in the organisation.

The profile tracks information at a business and function level and is not necessarily specific to implementation decisions. For example, if you are designing a new system, you should know what types of data will be processed and what the basic functions being performed will be before you decide on technologies or placement in the network.

When you are designing your profile questionnaire, it is important to note that not every question needs to be used in the calculation of the risk sensitivity. Some questions are meant to capture other pertinent information about the resource for reporting purposes and do not directly contribute to the risk-sensitivity score.

For example, you may ask a question about where the system is hosted. The answer to this question doesn't affect the sensitivity of the asset, but you may want to prioritise assessments of third-party hosted systems because of increased risk exposure, and the answer to this item will give you the desired information about which systems are hosted internally versus externally.

You may also want to ask a couple of high-level questions about whether basic security controls are in place for example, roles-based access, encryption, and audit logging. The answers to these questions may help you to focus your efforts on resources that don't meet the most basic security control requirements.

Similarly, you may want to ask if the system uses a common or central infrastructure for authentication and authorisation or logging to eliminate the need for assessing those areas any further. Systems using one-off solutions for these core security services may have more potential for risk exposure.

Factors do not change the sensitivity of the resource, but they can help with prioritisation. For example, whether or not a vulnerability test has been performed on the resource does not affect its sensitivity, but this knowledge is important for identifying resources that may have undiscovered vulnerabilities that are readily exploitable.

You will often find yourself trying to choose between several high-sensitivity resources to assess, and these other factors can help you decide which ones to focus on first.

The security risk profile questionnaire should include several questions about the resource to help determine the sensitivity and criticality of the application in comparison to others. It is essential to evaluate a resource's sensitivity on a relative scale.

Start by identifying the resource that is most crucial to the organisation, and use this as a reference point. This is important because the tendency is to rate resources too high. If you end up with all resources being rated as high sensitivity and none as moderate or low, then the scale becomes worthless.

You may not have defined the specifics of how the functions will be performed, but having business and functional requirements defined is enough to complete the security risk profile.

The best way to profile a resource is with a simple questionnaire. This questionnaire uses a series of targeted questions to measure the potential impact to the organisation of a generic security violation for the target resource.

1. Networking every shooter/sensor

Use artificial intelligence to ensure operational information is immediately sent across domains to any platform needing it.

2. Digital architecture, standards and concepts

Digital modeling/simulation technologies, trade studies and other standards development tools and processes to map out the entire architecture virtually and test how it would work in practice

3. Connectivity

Tools include line-of-sight and beyond line-of-sight communications networks

4. Sensor integration

Hardware/software allowing different equipment to share data reach compatibility and interoperability capabilities through use of open interfaces improved control of systems and data processing

5. Data

Libraries of meta tagged data points analyzed/fused using AI algorithms to inform decision makers.

6. Secure processing

Tech moving/sharing data across technologies with different security protection levels

7. Training

Deployment, training and support services for all devices and processing environments.

8. Platforms

Tech turning platform into a data node, reduce latency, provide improved anti-jamming capabilities improve the speed/breadth of communications gear.

9. Applications

Design and development of apps to process, fuse and help present data to different audiences across domains.

10. Effects integration:

These involve networked weapons integrated with existing platforms for greater combined effect include data relay functions




0 Comments



Leave a Reply.

    Site Visit Executive

    Provides Periodic Updates Operation Status

    Archives

    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    February 2016
    January 2016
    December 2015
    November 2015
    October 2015
    September 2015
    August 2015
    July 2015
    June 2015
    May 2015
    April 2015
    February 2015
    January 2015
    December 2014
    April 2014
    January 2014
    December 2013
    November 2013
    October 2013
    September 2013
    August 2013
    June 2013
    May 2013
    April 2013
    March 2013

    Categories

    All

    RSS Feed

Web Hosting by Dotster