2021-07-28

US DoD Launched a Major Transformation of their Doctrine - from Joint Warfighting to Expanded Manoeuvre

 SITUATION

A brutal loss in a secret wargaming exercise October 2020 convinced the Vice Chairman of the Joint Chiefs Gen. John Hyten to scrap the Joint Warfighting concept that had guided U.S. military operations for decades. It seemed that there were at least the following weaknesses in projecting the power:

  1. Massing the force before deployment makes it vulnerable to far reaching and hypersonic missiles
  2. Dependability of centralized connectivity and computing for information services handicaps the force if they lose the network
  3. Transmitting in-the-air all time makes units detectable and identifiable through Electromagnetic surveillance measures
  4. Long distances require over-air or over-seas transportation, which means that supply chains are vulnerable for asymmetric impacts
  5. Massing of troops globally takes time and effort. US is operating along exterior lines compared to their competitors who have the interior advantage (Jomini).

“We always aggregate to fight, and aggregate to survive. But in today’s world, with hypersonic missiles, with significant long-range fires coming at us from all domains, if you're aggregated and everybody knows where you are, you're vulnerable,” Hyten said.

Source: https://twitter.com/warkin/status/1216778424552951808

REMEDY

In response, the Joint Chiefs have since October been shifting the U.S. military to a new concept of warfighting operations they call “Expanded Maneuver.” Hyten wants the U.S. military to be ready to fight under the new operating concept by 2030, using many of today’s weapons, aircraft, and ships.

Source: The U.S. Army in Multi-Domain Operations 2028

Earlier July 2021, Hyten released four directives to the services: one each for contested logistics; joint fires; Joint All-Domain Command and Control, or JADC2; and information advantage. On Monday, he revealed new details about these “functional battles”:

1. Contested logistics. Creating new ways to deliver fuel and supplies to front lines. U.S. Transportation Command and the Air Force are working on using rockets and a space trajectory to get large cargo spaceships into and out of battlefields. 

  • AFRL will look at whether reusable commercial rockets that can carry up to 100 tons of cargo could be used to deliver gear to a conflict in an hour or less. The Air Force is also considering using the rockets for humanitarian missions and disaster relief.
  • AFRL will not develop its own rocket but use commercial rockets already in production. It will work with the Air Force’s Space and Missile Systems Center to determine how to configure and load shipping containers qualified for space flight.
  • The program would initially focus on port-to-port transfers of cargo but could one day include manned missions that rapidly inject troops into a battlespace, depending on what the commercial sector can create.


Source: Modern War Institute – System logistics in contested environment 2021

2. Joint fires through all domains: “You have to aggregate to mass fires, but it doesn't have to be a physical aggregation,” Hyten said. “It could be a virtual aggregation for multiple domains; acting at the same time under a single command structure allows the fires to come in on anybody. It allows you to disaggregate to survive.” Hyten said the joint fires concept “is aspirational. It is unbelievably difficult to do.” And the military will have to figure out what part will be affordable and practical, he said. 

 

Source: Army Multi-Domain Operations Concept, December 2018.

  • The concept will call for every service to conduct long-range strikes. “In the future, there will be no lines on the battlefield. ... An Army capability can have on its own platform the ability to defend itself or the ability to strike deep into an adversary area of operations. A naval force can defend itself or strike deep. An air force can defend itself or strike deep. The Marines can defend itself or strike deep. ... Everybody.”
  • The concept will seamlessly integrate “fires from all domains, including space and cyber,” to overwhelm an enemy.
  • The concept might endorse the Army’s plan to buy 1,000-mile-plus, surface-to-surface missiles that cost millions of dollars each. Doing so would ignore analyses that have determined using large numbers of these weapons would be far more expensive than employing bombers that can strike any target on the planet for a fraction of the cost, then regenerate and fly more sorties.

3. Joint All-Domain Command and Control (JADC2): The Pentagon’s push to connect everything demands always-on, hackerproof networks, Hyten said. “The goal is to be fully connected to a combat cloud that has all information that you can access at anytime, anyplace,” so that, like with joint fires, the data doesn’t get exposed or hacked because it’s housed in one centralized location, he said. 

  • The Defense Department is in the final stages of work on its strategy to connect sensors from each military service under a unified network, according to the top project official on the Joint Chiefs of Staff.
  • Over the next calendar year DoD will begin experimenting and demonstrating capabilities for JADC2 as well as work on making the Pentagon a data-centric organization.
  • Tactical data fabric called “Rainmaker” is focused on the Army’s tactical information environment, with imminent collaborations across the services in support of Combined Joint All-Domain Command and Control. “It leverages a re-usable set of data management capabilities to provide the right data, in the right format, to the right user, and at the right time. It simplifies and integrates data management across cloud and on premises to accelerate digital transformation.”
  • Near term the military needs its data fabric to understand data in the current languages those systems speak at the current interfaces the systems support, move that data around the mission space, and present it in formats other systems understand. Longer term, the military needs to update and develop systems as open as possible using modernized data sharing methods.
  • Seemingly, the challenged JEDI private cloud acquisition has been replaced by JADC2 programme.

Source: Contested Electromagnetic Environment in Modern Battlefield, Joint Air Power Competency Center, 2018

4. Information advantage: This element is the sum of the first three, Hyten said: “If we can do the things, I just described, the United States and our allies will have an information advantage over anybody that we could possibly face.”

Source: Information Advantage Framework by Ritika Sehgal 2019

Links to Additional Information:

https://www.defenseone.com/policy/2021/07/it-failed-miserably-after-wargaming-loss-joint-chiefs-are-overhauling-how-us-military-will-fight/184050/

https://www.encyclopedia.com/history/encyclopedias-almanacs-transcripts-and-maps/interior-lines

https://mwi.usma.edu/four-logistics-dilemmas-awaiting-army-modern-battlefield/

https://www.defensenews.com/opinion/commentary/2020/09/22/a-consensus-driven-joint-concept-for-all-domain-warfare-will-fall-short/

https://www.defensenews.com/opinion/commentary/2020/08/21/the-dod-needs-to-rethink-long-range-strike-in-its-joint-war-fighting-concept/

https://www.defenseone.com/policy/2021/04/jadc2-strategy-nearing-completion-official-says/173558/

https://www.defenseone.com/technology/2021/06/pentagons-accelerating-connect-everything-effort-hinges-uncertain-cloud-program/174528/

https://crsreports.congress.gov/product/pdf/IF/IF11493

https://www.japcc.org/electronic-warfare-the-forgotten-discipline/

https://www.linkedin.com/pulse/information-management-framework-gain-advantage-ritika-sehgal/


2021-02-06

Internationalization Strategy - Case Study UAE - Finland

 Case Study of Internationalization Strategy

Model to analyse internationalization intents both from National and Company viewpoint


1. Introducing the business environment of the United Arab Emirates

A Strategy for the UAE 2031 to become a knowledge-based economy

The UAE vision for 2031 aims to build up a remarkable knowledge-based economy to replace the diminishing oil-based wealth creation. The vision focuses upon improvisation in the fields of a cohesive society and preserved identity, competitive knowledge economy, world-class healthcare, first-rate education system, sustainable environment and infrastructure, safe public, and fair judiciary. (Saleh, et al., 2017)

Currently, the strategic journey from oil-based to a knowledge-based economy is measured with the Global Innovation Index (GII), which is an annual metrics assessing national investments and benefits in innovation since 2007 (Bayona & Wunsch-Vincent, 2020). The index combines measures in several areas like institutions, human capital and research, infrastructure, market sophistication, business sophistication, knowledge and technology outputs and creative outputs. The UAE has been the highest innovating Arabic nation holding position 36 in 2019 index report. (Dutta, et al., 2019)

The GII is focusing on innovation as a central driver for economic growth. It may be useful metrics for the previously established economies since the ten best have been there for a long time. Switzerland is at the top, Nordic countries, Netherlands, UK, Germany, and the USA persisting. Singapore is the only Asian country. Israel has made it to 10th position. The question is: does it provide efficient metrics to make the UAE a potential landing zone for international business and direct finance?

Current business environment and ongoing effort to build a knowledge-based economy in the UAE

Statistics published in 2016 show that the fundamental business and socio-economic growth of the Dubai is contemplated via technological start-ups and SMEs representing 95% of the business sector, accounting for 86% of the workforce and contributing around 60% to the non-oil GDP. All this is driven successfully by the combined efforts of the government and the private players. Whereby technology-based SMEs and start-ups are expected to play a significant role in developing innovation and strengthening the economy of the UAE.
A large number of initiatives have been adopted in this respect, mainly in Dubai and Abu Dhabi, namely through research centres such as Khalifa Innovation Centre established by Khalifa University of Science & Technology (KUSTAR) and the UAEU Science & Innovation Park established by the United Arab Emirates University.

There are several corporate incubators established which provide physical environments and infrastructure for the establishment of companies in UAE free zone with 100% ownership rights including Dubai Science Park, Dubai Techno Park, Dubai Silicon Oasis, D3, Masdar City, Dubai Internet City, Dubai Biotechnology & Research Park (DuBiotech), to name a few.

Argument and overview of the ongoing disruption

Currently, the digitalization or digital transformation is considered the disruptor of business and significant leverage for economics as evidenced in the analysis (Anthony, et al., 2018) of the S&P 500 list:
  • The 33-year average tenure of companies on the S&P 500 in 1964 narrowed to 24 years by 2016 and is forecast to shrink to just 12 years by 2027.
  • Record private equity activity, a robust M&A market, and the growth of start-ups with billion-dollar valuations are leading indicators of future turbulence.
  • At the current churn rate, about half of the S&P 500 companies will be replaced over the next ten years.
  • Retailers were especially struck by creative destruction, and there are vital signs of restructuring in financial services, healthcare, energy, travel, and real estate.
  • The turbulence points to the need for companies to embrace a dual transformation, to focus on changing customer needs, and other strategic interventions.
On the other hand, McKinsey (Benson-Armer, et al., 2015) forecasts the 2030 change of consumer landscape based on five trends as follows:
  1. Changing the face of the consumer – Globally, middle-class spending will almost triple by 2030, and the growth comes from the southern hemisphere.
  2. Evolving geopolitical dynamics – China’s real GDP exceeds the US by 2025
  3. New patterns of personal consumption – Size of the sharing economy could exceed $300 billion by 2025
  4. Technological advancements – by 2030, three out of four people will own a connected mobile device.
  5. Structural industry shifts – Over 300 companies faced activists demands in 2014 alone.
Assuming that current linear evolution and the above mentioned disrupting changes take place, then measuring the national strategy using metrics (GII) where previously established countries are dominant may not be the wisest approach. What if one reviews the nation’s strategy with an international business model and defines landing zone preferences for foreign business and investments?

2. Creating a model for an optimal landing zone for an international company

Introduction of the internationalization model from a landing zone viewpoint

Approaching the landing zone from a country competitiveness viewpoint (Schwab, 2019), one asks how a country affects a multinational enterprise selection of its global operations location, industry selection, capability building and global strategic opportunities. (Shenkar, et al., 2015) In a simplified model for international business, a country may be a sourcing, hub or market zone for a multinational enterprise in the next Figure.


Also, the multinational enterprise decision making will assess the strengths and development of international networks or platforms for supply chains, delivery chains, finance, and communications.

Defining an optimum landing zone features for a multinational enterprise

A simplified model to assess the feasibility of a country for a multinational enterprise may look like the following:

 

Source

Hub

Market

Socio-political

Political stability

Cultural barriers

Local business practices

Government efficiency and corruption

Attitudes towards foreign business

Community characters

Sustainable development

Regulatory

Industrial policies

FDI policies

Availability of special zones

Stability of local market regulation

Cost/Tax

Transportation

Wage rate

Land & construction costs

Accessibility of raw materials, resources, and services

Availability of finance and financial infra

Tax rates

Investment incentives

Profit repatriation

Transportation

Tax rates

Profit repatriation

Strategic

Infrastructure

Manufacturing concentration

Industrial linkages

Workforce productivity

Inbound & Outbound logistics

Infrastructure

Inbound logistics

Demand

 

Potentially reachable market and its growth

Market size and growth

Customer presence

Demography

Development of potential customer segments

Local competition



3. Testing the model with a case study and conclusions

The test case and outcome

The UAE is known besides its oil and gas resources also a regional hub for commerce, finance, tourism, and logistics. The UAE aims to improve its competitiveness, especially in innovation, knowledge-based economy, and foreign direct investments. (Finland, 2019) Furthermore, the Middle-East relies heavily on mobile infrastructure with further investing in 4G and quick roll-out of 5G networks. (De Rosbo, 2020) Therefore, the UAE should emerge as a potential market or hub for a Finnish digital economy enterprise (European Commission, 2020) to land on and expand the rest of MENA onwards. Significantly, the areas of the Internet of Things, additive manufacturing, Artificial Intelligence and Blockchain may emerge profitable over the wideband mobile infrastructure and disrupt regional markets. (World Trade Organisation, 2018) Based on the Finnish advantages in cybersecurity and independent enterprises, the Finnish cybersecurity service may appear valuable in the regional markets. Therefore, the study focuses on the UAE strengths as a cybersecurity market and later as a hub to extend to other GCC countries in the following table.

UAE as a landing zone for a Finnish cybersecurity enterprise

Hub to reach the MENA region with over 500 M people (-85 M Iran) (Statista, 2018)

Market of 10 M residents of which only 1 M citizens

Socio-political:

·        Political stability

·        Cultural barriers

·        Local business practices

·        Government efficiency and corruption

·        Attitudes towards foreign business

·        Community characters

·       Sustainable development

 

Political stability concerning the legislation of Internet, enterprise computing and privacy is most stable in the region.

Cultural behaviour differs from Europe, but once relationships are established locally, it is easier to extend in the region.

Recently opened possibility for 100% foreign ownership outside the free zones enables FDI’s optimized along with the global strategy.

Attitude towards foreign business is the best in the region. The community provides one of the most internationalized population and mixture of cultures.

Regulatory

·        Stability of local market regulation

·        Industrial policies

·        FDI policies

·       Availability of special zones

Industrial policies are supporting SME’s, but local funding and financial regulation differ from Europe.

FDI policies have been opened lately.

Many specialized free zones available to reach out to other markets

Stable local markets with legislation for privacy, customer protection, labour, and health services.

Telecommunications regulated and protected (duopoly). (Gulf Talent, 2020)

Cost/Tax

·        Transportation

·        Wage rate

·        Land & construction costs

·        Accessibility of raw materials, resources, and services

·        Availability of finance and financial infra

·        Tax rates

·        Investment incentives

·       Profit repatriation

Air and sea transportation connections run regularly and frequently

Wages vary per profession. Division of wealth is unequal.

Land ownership constrained, but construction costs are cheap. Living costs are high.

Local finance is hard to access, but local FINTECH operates at European standards.

Government supports FDI’s but local financial responsibility legislation differs from European.

5% Value added taxation since 2018

Profit repatriation granted

Strategic

·        Infrastructure

·        Manufacturing concentration

·        Industrial linkages

·        Workforce productivity

·       Inbound & Outbound logistics

Digital infrastructure with satellite and ground-based connections reliable. Hundreds of small data centres and MS, HP cloud entities. (Data Center Catalog, 2020)

Several digital industries hubs both in free zones and inland.

Workforce productivity low.

Two primary 4G service providers with full coverage over the inhabited areas. Both have optimistic plans for 5G migration. (Wikipedia, 2020)

Demand

·        Market size and growth

·        Customer presence

·        Demography

·        Development of potential customer segments

·       Local competition

In Saudi-Arabia over 53 M mobile accesses in not yet saturated market among young population.

Low level of education, Arabic language.

Some content constraints due to Islamic culture.

Over 17 M mobile accesses with saturated use, but a rotation of users as foreign workers change around 2 M per year.

Low level of education, Arabic language.

Some content constraints due to Islamic culture.


Potential for a Finnish cybersecurity company is found in the UAE and the region. The significant challenges are located in the areas of language, culture, education, and access to local finance. The opportunities are opening mainly through reliable and extended mobile networks, young population, and well-functioning infrastructure.

A possible scenario for an entry may be a Joint Venture with a local company employing foreign-educated operators as a front office for Arabic client services and 24/7 monitoring and a Finnish back office with high-end experts solving problems and developing new services.

Conclusion

Seemingly, the experimentation did not answer the initial question of the feasibility of GII metrics in a quest to develop a national competitive strategy. Still, the case study showed a different way to a state to analyze its competitiveness in the eyes of a multinational enterprise.


References

Anthony, S. D., Vigurie, S., Swartz, E. I. & Van Landeghem, J., 2018. 2018 corporate longevity forecast: Creative destruction is accelerating. [Online] 
Available at: https://www.innosight.com/insight/creative-destruction/
Bayona, P. & Wunsch-Vincent, S., 2020. About the global innovation index. [Online] 
Available at: https://www.globalinnovationindex.org/about-gii#history
Benson-Armer, R., Noble, S. & Thiel, A., 2015. The consumer sector in 2030: Trends and questions to consider. [Online] 
Available at: https://www.mckinsey.com/industries/consumer-packaged-goods/our-insights/the-consumer-sector-in-2030-trends-and-questions-to-consider
Data Center Catalog, 2020. The UAE data centers. [Online] 
Available at: https://datacentercatalog.com/united-arab-emirates
De Rosbo, S., 2020. Middle-East - Mobile infrastructure and mobile broadband. [Online] 
Available at: https://www.budde.com.au/Research/Middle-East-Mobile-Infrastructure-and-Mobile-Broadband?r=51
Dutta, S., Lanvin, B. & Wunch-Vincent, S., 2019. Global innovation index 2019. [Online] 
Available at: https://www.globalinnovationindex.org/gii-2019-report
European Commission, 2020. The digital economy and society index. [Online] 
Available at: https://ec.europa.eu/digital-single-market/en/desi
Finland, T., 2019. Country Outlook - the UAE, Helsinki: Ministry of Foreing Affairs Finland.
Gulf Talent, 2020. Top telecoms companies in UAE. [Online] 
Available at: https://www.gulftalent.com/telecom-companies-in-uae/2
Saleh, A., Aldel, D. & Alsamid, S., 2017. R&D and Innovations in the GCC Countries: Recent Updates. [Online] 
Available at: https://www.tamimi.com/law-update-articles/rd-and-innovations-in-the-gcc-countries-recent-updates/
Schwab, K., 2019. The Global competitiveness report 2019, Geneva: World Economic Forum.
Shenkar, O., Luo, Y. & Chi, T., 2015. International business. Third toim. New York: Routledge.
Statista, 2018. MENA region - total population 2018, by country. [Online] 
Available at: https://www.statista.com/statistics/804633/total-population-of-the-mena-countries/
Wikipedia, 2020. Telecommunications in the United Arab Emirates. [Online] 
Available at: https://en.wikipedia.org/wiki/Telecommunications_in_the_United_Arab_Emirates
World Trade Organisation, 2018. World trade report 2018, Geneva: Wold Trade Organisation.

2021-01-22

Combat Cloud

 Combat Cloud 

Introducing modern computing and communications technology for 

the multi-domain fighting edge


"The western Armed Forces are at the centre of an "information in war" revolution, where the speed of information and advance of technology and organisational design are merging to change the execution of military operations. The 21st century demands a new, more agile, and integrated operational framework for the employment of allied military power, and to shift away from the structure of segregated land, air, and sea warfare." 


Definitions

Original concept created by David A. Deptula (ret Gen USAF) defines combat cloud  as an operating paradigm where information, data management, connectivity, and command and control (C2) are core mission priorities. According to Deptula, Combat cloud:
  • Treats every platform as a sensor and an "effector," and require a C2 paradigm that enables automatic linking, seamless data transfer capabilities, while being reliable, secure, and jam-proof. 
  • Inverts the paradigm of combined arms warfare— making information the focal point, not operational domains. 
  • Represents an evolution where individually networked platforms—in any domain—transform into a "system of systems" enterprise, integrated by domain and mission-agnostic linkages.
USDOD 2016 approach is to extend their Joint Information Environment (JIE) to tactical edge and platforms with combat cloud which is "an overarching meshed network for data distribution and information sharing within a battlespace, where each authorised user, platform or node transparently contributes and receives essential information and can utilise it across the full range of military operations." 

European Future Combat Air System (FCAS) concept seeks information control in theatres of operations.  It "requires a significant transformation of our operational architectures to place data at the heart of the future combat cloud. Expertise in the end-to-end architectures of functional chains should ensure interoperability, resilience and digital security of all systems and the sharing of information between all military personnel." 

Cloud computing "is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e. g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction." 

Fog/Edge computing "is a horizontal, physical or virtual resource paradigm that resides between smart end-devices and traditional Cloud or data centres. This paradigm supports vertically-isolated, latency-sensitive applications by providing ubiquitous, scalable, layered, federated, and distributed computing, storage, and network connectivity." 

New technology enables improved tactical effects

Evolution of commercial technology

Evolution of smartphone-based digital services, shortly:
  1. First smartphones integrated mobile phone and more computing performance. They were able to run applications on the phone and present information on-screen like calendar, notes, games, email, fax reader, etc. as in 1995 Nokia Communicator 9000 . These phones downloaded ringtones over a slow data connection.
  2. With better data transfer capabilities, smartphones were connected to the Internet with a higher speed network on 2.5 G mobile communications . This opened the mobile Internet and lead to specific smartphone applications to browse and utilise Internet services. Around 2000, the first sensor – camera – was integrated into a smartphone which made more than a terminal.
  3. Around 2007, the iPhone debuted and provided downloadable music services. Application store enabled users to download a wider variety of applications to their smartphones. Cloud-based social media applications like Facebook (2004), Twitter (2006) emerged and accelerated social content sharing.  
  4. Introduction of 4G mobile network, integration of sensors in smartphone (proximity, gravity, gyro, compass, barometer, fingerprint, camera, posture, etc.), more sophisticated cloud-based services and improved computer performance in smartphones have brought us to a realm where you go to a foreign country, speak to the phone your order, application in phone uses a cloud-based translator to convey your speech into the required language. Audio generator in phone speaks out your order in the local language.
  5. Introduction of smart (home, car, city) with 4G connectivity enables collecting a broad spectrum of sensor data fused with information from cloud databases. Your references by Facebook provide your phone screen or AR goggles a 3D presentation of information.
  6. Introduction of Internet of Things, Remote controlled devices, Autonomous devices, and 5G connectivity enable machines to exchange data, influence each other, learn from each other's (machine learning) and conduct complex functions semi-autonomic manner. All Things on Internet have sensors collecting information from their environment, 5G connectivity transfers the data with less than 50 ms delay, edge computers fuse and process data and feed it back to effector interfaces, AR/VR interfaces present events to human decision-makers within conceivable context, machine effectors take a predefined action.

In summary, advanced computer performance, robust and fast network connections, standard protocols, and interfaces, learning machines, and better user interfaces for humans promote new man-machine cooperation for private and public life. Military do adopt these technologies but with slower pace. The legacy Tactical Datalink (TDL 11, 16, or 22) anchors tactical communications at the level of first generation of smart phones enabling man-to-man communications over voice and message. With more remote and automated platforms, the battlefield needs advanced means for communications and computing.

Evolution of tactical military communications and computing

When studying the evolution of US DoD tactical data communications (TADIL), one can conclude that they have had challenges to migrate to newer technologies once the common interface has been established. For example, their intent to update or replace the legacy TADILs (L11 and L16) may look like the illustration in Figure:
  • US faces challenges in changing their existing TDL baseline quickly (challenges in JTRS program, freezing MADL). Thus, they adopt a strategy first to host many existing datalinks and their waveforms on the same HW platforms and achieve complex but sufficient interoperability. It may be the unmanned vehicles that have more flexible IP network applications over high-speed Mobile Access Networks.
  • Since Link 22 is compatible with L11 versions, it may become a parallel link. Still, it may be possible that the unmanned vessels and Intranet of Military Things will accelerate new IP MANET networks to bypass both (L11 and L22) old fashioned, TDMA based systems.
  • Seemingly US prefers the L16 based interoperability higher than other, more capacity providing TDL formats. They might have MIDS JTRS onboarded gradually delivering more waveforms in constrained space available in aircraft. New aircraft F-35 etc. may also open some existing constraints, but tactical interoperability may be preferred more than technical advantage. This may change only if RUS or CHI releases their ability to suppress L16 waveform and encryption.
  • However, an L16 network remains very complex to plan for each engagement and requires meticulous management by the Joint Data Link Management Cell. It is therefore not a Mobile Ad Hoc Network like our telephone networks, for example. Its bandwidth is also minimal and its latency high. The exchange capacities offered by these TDL messaging systems are also limited.  
  • Land forces have their WIN-T base station network in place. Next, they are planning to constellate LEO communications satellites to support the ground connectivity and connect soldiers to that trunk network with Handheld, Manpack and Small form fit (HMS) radios of JTRS family.
  • Modern US military networks and datalinks are an excellent example of sub-optimised systems designed for a particular task within a specific weapon system. Not a generic databus between a variety of sensor and shooter platforms. These stand-alone links include Link-16, Intra-Flight Data Link (IFDL), Tactical Targeting Network Technology (TTNT), Multifunction Advanced Data Link (MADL), and the Joint Aerial Layer Network (JALN) concept.  
  • From a technical viewpoint, TCP is not applicable in distorted channels of communications. Thus, a middleware-based Data Distribution Service may be discovered as a solution for future control and data transfer applications.  Furthermore, the data fusion requirements of fifth-generation aircraft (fusion warfare being the hallmark of the F-35) or the architectures being implemented step by step as of today by the US Navy (Cooperative Engagement Capability, then Naval Fire Control - Counter Air, then its extension to other missions) may accelerate the migration.  
Figure: One approach to US TADIL evolution

The Combat Cloud initiative and FCAS programme both provide strong need to lay off the constrained legacy connectivity and seek more man-machine teaming networks provided on ground, air, and space-based communications nodes.

Different approaches to combat cloud

Network Centric Warfare (NCW) or Network Enabled Capabilities (NEC)

Both US and NATO have been building network-centric or enabled warfare capabilities since the 1990s. The original idea was to break the platform centricity and connect sensors, decision-makers, and shooters to enable combined tactics. Therefore, the Combat Cloud concept reawakens the old principles but at a tactical level enabled with new technology.

The Network-Centric Warfare doctrine presented a fundamental shift in military culture, away from compartmentalised war machines and towards interconnected units operating cohesively. The tenets  of Network Centric Warfare were: 
  • A robustly networked force improves information sharing.
  • Information sharing enhances the quality of information and shared situational awareness.
  • Shared situational awareness enables collaboration and self-synchronisation and enhances sustainability and speed of command.
  • Speed of command, in turn, dramatically increases mission effectiveness.
The vision is much the same, and is an evolution of networking in US Armed Forces:
  • Global Information Grid (GIG) from the mid-1990's providing connectivity and computing for strategic and operational levels, 
  • 2014's Joint Information Environment was trying to introduce a single source of truth and present it on a standard pane of glass to all users:
- a 'single' or joint environment to all support operations. 
- to utilise modern cloud technologies
- supporting concepts of mobility (access anywhere, any place, any device).
  • 2020's JEDI initiative which seeks to consolidate all DoD computing on private Cloud and extend its services to soldiers from home garrison to abroad areas of operation, and 
  • 2030's Combat Cloud will connect combined sensors, effectors and decision-makers at a tactical edge with remarkably more computing power to make sense of the information flow.  

US DoD Combat Cloud

  • 2014 Gen(ret) David A Deptula's Combat Cloud "would integrate both manned and unmanned systems and utilise advances in stealth, precision weapons, and advanced command and control tools, ensuring that no single point of attack would cripple US combat operations. Such an effort would also present an opportunity to create modular, scalable combat capabilities, rather than force individual aircraft or other assets to take on more and more tasks." 
  • In 2016 the USAF published its vision for a future network of data distribution and information sharing known as the combat cloud. It defined it as "an overarching meshed network for data distribution and information sharing within a battlespace, where each authorised user, platform or node transparently contributes and receives essential information and can utilise it across the full range of military operations."   It should also be noted that recent news articles indicate that USAF is planning to increase funding for their Combat Cloud in FY 2021.
  • Rockwell Collins has developed the Ground Early Warning and Control System (GEWaCS)  utilising and modifying proven C2 systems.   The GEWaCS is comprised of hundreds of data processing engines connected by a virtualised network. The engines are hosted on Virtual Machines (VM) and are used to process, distribute, correlate, and store a cloud of a sensor, radar, and datalink tracks. Recently video tagging data has become available to the data link, enabling the display of sensor coverage in Link-16. Reaction times of days and hours are no longer viable – and this system allows for a commander to assign assets to a mission in real-time.

Other NATO countries

NATO's cloud-based operational network is called the Federated Mission Network (FMN) since 2015. The FMN is an evolution of the Afghanistan Mission Network. Furthermore, the European side of NATO is aiming to transform as follows:
  • NATO Supreme Allied Commander for Transformation: "It is a C4ISR [system] with the cloud ID and platforms that are either piloted or unpiloted…This is what we have to be able to build for the future, but we have to start it now." 
  • The Future Combat Air System (FCAS) is the critical project for French, German and Spanish air combat power from the 2040s onwards. In FCAS, the keyword is a 'system'. Because it will not be a manned aircraft or a drone, but a system of systems integrating, within a real cloud, sensors and effectors of various types and different generations."  
A NGF, future FCAS combat aircraft, a node of the Cloud at the extreme tactical edge, would thus comprise:  
  • Various applications designed for its different operational functions.
  • Automated analysis tools, possibly shared with other systems, implemented through its applications.
  • Common services also shared with other systems, operating transparently for the pilot.
  • Storage of large amounts of data.
  • Connection to the communication network with other platforms and units, a "self-forming & self-healing" MANET network.
Following the award of the Phase 1A Demonstrators contract for the Future Combat Air System (FCAS) earlier in the month, Airbus and Thales announced on 20 February that the two companies have agreed on co-development of the Air Combat Cloud (ACC) – a key enabler for the FCAS system of systems. 

France

Information control in theatres of operations requires "a significant transformation of our operational architectures to place data at the heart of the future combat cloud. Expertise in the end-to-end architectures of functional chains should ensure interoperability, resilience and digital security (cybersecurity) of all systems and the sharing of information between all military personnel."  The vision is illustrated in Figure.

Figure: View of combat air system by the French Air Force

General Breton, who heads the FCAS programme, explains that "an important aspect of innovation in FCAS will be networking: currently on the Rafale [in its present configuration] the pilot mainly uses own sensors and some information provided by the network". Thus, much of the data obtained by the aircraft is not shared, such as data from the Spectra system or the optronics sensor.  On FCAS [...] the transfer of data will be performed independently of the pilot, who will see the fused data. Nevertheless, he supervises the overall process. 

The French Air Force has also adopted an incremental approach to developing this Cloud, with milestones in 2025 and 2030, designed to prepare for the arrival of FCAS. This is the Connect@aero programme that goes hand in hand with the deployment of the F4 standard on the Rafale:
  • introduction of a higher-speed communication system and additional connectivity ramifications, including munitions
  • "detect enemy air defence systems with greater precision."
  • "collaboratively adapt the trajectories and manoeuvres" of effectors and their munitions, in a degraded positioning, navigation and timing (PNT) environment. 
France aims to implement a "global air combat system" within the next decade.  

Requirements for the connectivity of multi-domain combined weapons effect and joint tactical engagement

The communications and computing infrastructure for multi-domain combined weapons effect shall treat every platform as a sensor, as well as an "effector." It will require a C2 paradigm that enables automatic linking and seamless data transfer capabilities while being reliable, secure, and jam-proof. The new infrastructure shall destroy the boundaries of current domains and make promoting information on the focal point.  The following tactical requirements need to be addressed.

Sensors and Target Acquisition

  • Platforms that have longer-ranged weapons than their onboard sensors can acquire targets need hard quality target data from other platforms  
  • The future battlefield is multi-domain and requires multi-sensor integration. Strategic fires require multi-sensor, stealthy, long-endurance aircraft, "redundant and resilient" information networks, and "self-learning, self-protection capabilities."
  • New platforms like the F-22 and F-35 are information machines far above and beyond being killing assets.  
  • Multi-function assets and aircraft, capable of performing a strike, ISR, and other tasks, will steadily replace mission-specific assets. Target engagement based around the need to "destroy" a given aim point will give way to effects-focused engagement, driven by improving capabilities such as cyber warfare tools.   
  • As sensor fusion has evolved through artificial intelligence (AI) and other technologies, it has become possible to fuse what appears to be seemingly disparate data. These advanced fusion engines need data - which may be stove-piped in 5th generation fighter aircraft, advanced electronic warfare systems, or within video streaming systems. Benefitting from this information requires combining sensor data and creating IDs, intent, and patterns of attack. 

Command and Control

  • In an A2/AD warfare, a decision-maker can be in more places than before. The Recognised Operational Picture is available to everybody, enabling distributions of legacy command posts and cooperation beyond current line organisations. "We must prepare for an era of warfare requiring new levels of cross-domain collaboration, operational level command and control, and the dynamic integration of national, theatre, and tactical capabilities across the full range of military operations," 
  • Data, information, and ISR gathering and analysis will evolve as knowledge management becomes even more critical, as will predictive instead of reactive analysis.

Fires

  • Individual precision weapons will give way to "volumetric weapons," such as directed energy. 
  • Massed, non-stealthy strike packages of manned aircraft will evolve into more distributed force packages, with greater low observable (LO) characteristics, and more use of automated systems.   

Concept of operations for combat cloud in a generic Armed Forces

In a scenario where the adversary is launching a full force amphibious attack to the shores of a nation, Armed Forces, together with other national security agencies, must have the seamless use of information as illustrated in Figure. 

Nature of the conflict

The attack takes place in all dimensions parallelly and aims to utilise the strategic surprise as long as possible. The strike may include, for example:
  • Information operation trying to divide people from government officials, the cyber operation to shut down all government and local authorities web services, and electronic jamming to interfere TV and radio broadcastings.
  • The cyber-electronic operation aims to suppress authorities' decision-making and transactions of key financial institutes by launching earlier injected malicious software attacks within the systems and assassinating VIP authorities.
  • Kinetic amphibious attack to gain bridgeheads and foothold strategic targets like governmental offices, broadcasting stations, main transportation hubs, etc. The strike may include:
- Ballistic missile strikes against main command posts and government installations
- Suppression of coastal and air sensor systems by missiles or special forces
- Mining the flanks of the sea avenues for the incoming forces
- Blocking the junctions leading out from the garrisons and central depots
  • Besides the above, the adversary has infiltrated unidentified troops within the nation in preparation. The distributed cells aim to create chaos and terror as much as possible to overwhelm the authority's decision making and create confusion among the population.

Requirements for cooperation

  • As fixed sensor stations will be mostly destroyed, there is a need to use fused sensor information from space, air, mobile ground, and navy platforms to understand the main launch and bridgehead areas better.
  • Getting and sustaining a situational awareness among the chaotic situation requires a fusion of event data simultaneously from the information/cognitive, electromagnetic, cyber environment, space, air, maritime and land domains. 
  • The fused situational picture needs to be shared between all important tactical and operational decision-makers allowing the decision cooperation between different speciality agencies of each dimension.
  • Target acquisition becomes essential, for example, for Air Force assets which are the fastest deployable assets. The available sensors need to cooperate in creating targeting information for the incoming fighter-attackers.
  • As the theatre becomes rich in small tactical targets, the effect prioritisation becomes essential to focus on the most impacting adversary assets. Otherwise, the enemy tactics will quickly consume the operational ammunition and air assets dry up too fast.
  • Cost-efficient and continuous impact with combined weapons is essential in a distributed target scenario. Therefore, the defence needs to assign fire missions to best suitable arms without friction caused by organisational boundaries.
  • As tactical-level command and control are occupied in countering the ongoing attack, the operational level C2 should be seeing further and above the current situation. This requires cooperation over all the national defence actors in making sense of the enemy intent and their incoming second wave efforts.
Figure: A scenario of amphibious attack

The above scenario requires cooperation and therefore, interoperability between all domains and organisations. The basic idea for multi-domain collaboration is simple:
  • Collect all event data from available sensors and sources
  • Store it (so we can see the short and long term trends)
  • Make sense of it (with the help of analytics/machine learning/AI)
  • Pass it directly back to the decision-makers / soldiers who need the information.
  • Further analyse the data at the operational level, make sense of an operational situation, and prepare for the next phases.
The multi-domain interoperability requires data sharing, joint fusion, and sense-making at tactical and operational levels detailed in Table.
Table: Interoperability requirements in multi-domain operations

Concept of technology for combat cloud

Technical characters

The US DoD aspires that a distributed, self-forming, all-domain combat cloud that is self-healing and difficult to attack effectively significantly complicates an enemy's planning and will compel them to dedicate more resources toward defence and offence. In its ultimate manifestation, the combat cloud will be strategically dislocating to any military challenger. A mature combat cloud will provide superior conventional deterrence to a degree previously only achieved by nuclear deterrence and enable operational dominance in multiple domains. 
The above end state requires significant changes within the entire air defence systems and takes longer to transform. The human competencies will especially face significant transfer from current platform-based capabilities and behaviour towards more system-oriented qualifications that require different trust and cooperation between distributed actors. The following assessment does not address the human or organisational changes but explains the main technological features that enable the Combat Cloud capability in communications, computing and security.

Communications

Joint Aerial Layer Network (JALN) is augmentation and extension of tactical networks using a variety of communications capabilities that will support operations in challenging or degraded communications environments within a joint operations area (JOA). Its primary purpose is to connect/reconnect combatants, executing specific missions and tasks. 
The JALN will:
  • Integrate with space and surface layers
  • Increase communications access for the joint force at all levels
  • Enable on-the-move (OTM) and over-the-horizon (OTH) / beyond line of sight (BLOS) communications 
  • Provide modular, scalable, and flexible operational capabilities
  • Provide "mission persistent" connectivity as specified by the commander
 
Figure: Concept for Joint Aerial Layer Network

Computing

Computing is essential in processing big data within the digitalised air defence system. Computing is based on processors, storage, and software applications. They will have different life-cycles, which will challenge the current logistics and maintenance:
  • With doubling the computing performance every 18 months, the standard processor becomes exponentially better but chip design and production more complicated. Specialised processors become rarer as the performance of standard processors improves much faster. The features become more software-defined than before, even within sophisticated platforms like fighter-attacker. Countries with processor design and manufacturing abilities will constraint their distribution during crises.
  • Software-defined functions and features become more relevant, which means that systems are updated more frequently without changing the hardware. The whole length of the software supply chain will become a primary target for an attacker.  
Military computing may be distributed in the Joint Information Environment between platforms (fighter, sensor, soldier, tank) and global computing clouds: 
  1. Platform computing - autonomy will increase the volume of computing required onboard. Embedded sensors and weapons on each platform will increase. Swarming tactics with fleets of platforms will improve the firepower. Civilian terminology calls this edge computing or embedded computing. Maintenance and configuration of these computerised systems require different competencies from support personnel. Example: F-35
  2. Unit-based computing – all vehicles and platforms in a unit will onboard processors for their use and the use of the system. The system computing enhances information between the computing nodes and provides information services to soldiers and other machines. Civilian terminology refers to fog computing. For example, an infantry company becomes a cloud by itself and in connection to mission cloud. The company's computing nodes provide data storage and processing power to fuse sensor information and provide expert support for decision-makers even if it loses connections to mission cloud. Example: Finnish infantry company
  3. Mission computing – computing network for a mission is based on fixed military data centres within national borders and deployed nodes in the area of operation. This private military Cloud is the backbone for data management in all military operational actions. Example: NATO Federated Mission Network
  4. Hybrid computing – a computing network that combines onsite military data centres and public, global cloud service providers' infrastructure to a hybrid cloud infrastructure where military applications can support both military entities and their partners and vendors. Examples: US DoD JEDI hosting both NIPRNET and SIPRNET

Security and survivability

Communications security includes crypto security [i.e., encryption or decryption], transmission security, emission security [i.e., intercept and analysis of emanations from equipment], and physical security of COMSEC material.
Figure: Example of security applications on different OSI layers

The physical layer defines the physical connection between a computer and a network. Physical layer security is the cornerstone of all security controls. While security controls at other layers may fail without catastrophic results, the loss of physical security usually results in total exposure. In addition to physical security, transmission security is implemented on the physical layer. The physical layer implements, for example, frequency hopping (FH), spread Spectrum (SST), Automatic Power Control (APC)

The Datalink layer defines the protocol that computers must follow to access the network for transmitting and receiving messages.  The data link layer implements Authentication, Key management, Encryption.
  • Why is Data Link layer security not enough? The reason is that Data Link encryption will change hop-by-hop in the network. Each layer three device adds their own layer two header to the data packets when transferring them to the other hop. Therefore, sole encryption on the Data Link layer would not be a safe solution. To fill these security issues, we need to use different technologies like IP-Sec (at Network Layer) which dedicates a private tunnel between the sending and receiving machines.

The Network Layer defines how the small packets of data are routed and relayed between end systems on the same network or interconnected networks. At this layer, message routing, error detection, and control of node data traffic are managed. Network layer security controls have been used Frequently for securing communications, especially over shared networks such as the Internet because they can protect many applications at once without modifying them. The network layer implements confidentiality, authentication and data integrity, key management, encryption. IPsec is implemented at the network layer.