Combat Cloud
Introducing modern computing and communications technology for
the multi-domain fighting edge
"The western Armed Forces are at the centre of an "information in war" revolution, where the speed of information and advance of technology and organisational design are merging to change the execution of military operations. The 21st century demands a new, more agile, and integrated operational framework for the employment of allied military power, and to shift away from the structure of segregated land, air, and sea warfare."
Definitions
- Treats every platform as a sensor and an "effector," and require a C2 paradigm that enables automatic linking, seamless data transfer capabilities, while being reliable, secure, and jam-proof.
- Inverts the paradigm of combined arms warfare— making information the focal point, not operational domains.
- Represents an evolution where individually networked platforms—in any domain—transform into a "system of systems" enterprise, integrated by domain and mission-agnostic linkages.
New technology enables improved tactical effects
Evolution of commercial technology
- First smartphones integrated mobile phone and more computing performance. They were able to run applications on the phone and present information on-screen like calendar, notes, games, email, fax reader, etc. as in 1995 Nokia Communicator 9000 . These phones downloaded ringtones over a slow data connection.
- With better data transfer capabilities, smartphones were connected to the Internet with a higher speed network on 2.5 G mobile communications . This opened the mobile Internet and lead to specific smartphone applications to browse and utilise Internet services. Around 2000, the first sensor – camera – was integrated into a smartphone which made more than a terminal.
- Around 2007, the iPhone debuted and provided downloadable music services. Application store enabled users to download a wider variety of applications to their smartphones. Cloud-based social media applications like Facebook (2004), Twitter (2006) emerged and accelerated social content sharing.
- Introduction of 4G mobile network, integration of sensors in smartphone (proximity, gravity, gyro, compass, barometer, fingerprint, camera, posture, etc.), more sophisticated cloud-based services and improved computer performance in smartphones have brought us to a realm where you go to a foreign country, speak to the phone your order, application in phone uses a cloud-based translator to convey your speech into the required language. Audio generator in phone speaks out your order in the local language.
- Introduction of smart (home, car, city) with 4G connectivity enables collecting a broad spectrum of sensor data fused with information from cloud databases. Your references by Facebook provide your phone screen or AR goggles a 3D presentation of information.
- Introduction of Internet of Things, Remote controlled devices, Autonomous devices, and 5G connectivity enable machines to exchange data, influence each other, learn from each other's (machine learning) and conduct complex functions semi-autonomic manner. All Things on Internet have sensors collecting information from their environment, 5G connectivity transfers the data with less than 50 ms delay, edge computers fuse and process data and feed it back to effector interfaces, AR/VR interfaces present events to human decision-makers within conceivable context, machine effectors take a predefined action.
Evolution of tactical military communications and computing
- US faces challenges in changing their existing TDL baseline quickly (challenges in JTRS program, freezing MADL). Thus, they adopt a strategy first to host many existing datalinks and their waveforms on the same HW platforms and achieve complex but sufficient interoperability. It may be the unmanned vehicles that have more flexible IP network applications over high-speed Mobile Access Networks.
- Since Link 22 is compatible with L11 versions, it may become a parallel link. Still, it may be possible that the unmanned vessels and Intranet of Military Things will accelerate new IP MANET networks to bypass both (L11 and L22) old fashioned, TDMA based systems.
- Seemingly US prefers the L16 based interoperability higher than other, more capacity providing TDL formats. They might have MIDS JTRS onboarded gradually delivering more waveforms in constrained space available in aircraft. New aircraft F-35 etc. may also open some existing constraints, but tactical interoperability may be preferred more than technical advantage. This may change only if RUS or CHI releases their ability to suppress L16 waveform and encryption.
- However, an L16 network remains very complex to plan for each engagement and requires meticulous management by the Joint Data Link Management Cell. It is therefore not a Mobile Ad Hoc Network like our telephone networks, for example. Its bandwidth is also minimal and its latency high. The exchange capacities offered by these TDL messaging systems are also limited.
- Land forces have their WIN-T base station network in place. Next, they are planning to constellate LEO communications satellites to support the ground connectivity and connect soldiers to that trunk network with Handheld, Manpack and Small form fit (HMS) radios of JTRS family.
- Modern US military networks and datalinks are an excellent example of sub-optimised systems designed for a particular task within a specific weapon system. Not a generic databus between a variety of sensor and shooter platforms. These stand-alone links include Link-16, Intra-Flight Data Link (IFDL), Tactical Targeting Network Technology (TTNT), Multifunction Advanced Data Link (MADL), and the Joint Aerial Layer Network (JALN) concept.
- From a technical viewpoint, TCP is not applicable in distorted channels of communications. Thus, a middleware-based Data Distribution Service may be discovered as a solution for future control and data transfer applications. Furthermore, the data fusion requirements of fifth-generation aircraft (fusion warfare being the hallmark of the F-35) or the architectures being implemented step by step as of today by the US Navy (Cooperative Engagement Capability, then Naval Fire Control - Counter Air, then its extension to other missions) may accelerate the migration.
Different approaches to combat cloud
Network Centric Warfare (NCW) or Network Enabled Capabilities (NEC)
- A robustly networked force improves information sharing.
- Information sharing enhances the quality of information and shared situational awareness.
- Shared situational awareness enables collaboration and self-synchronisation and enhances sustainability and speed of command.
- Speed of command, in turn, dramatically increases mission effectiveness.
- Global Information Grid (GIG) from the mid-1990's providing connectivity and computing for strategic and operational levels,
- 2014's Joint Information Environment was trying to introduce a single source of truth and present it on a standard pane of glass to all users:
- a 'single' or joint environment to all support operations.- to utilise modern cloud technologies- supporting concepts of mobility (access anywhere, any place, any device).
- 2020's JEDI initiative which seeks to consolidate all DoD computing on private Cloud and extend its services to soldiers from home garrison to abroad areas of operation, and
- 2030's Combat Cloud will connect combined sensors, effectors and decision-makers at a tactical edge with remarkably more computing power to make sense of the information flow.
US DoD Combat Cloud
- 2014 Gen(ret) David A Deptula's Combat Cloud "would integrate both manned and unmanned systems and utilise advances in stealth, precision weapons, and advanced command and control tools, ensuring that no single point of attack would cripple US combat operations. Such an effort would also present an opportunity to create modular, scalable combat capabilities, rather than force individual aircraft or other assets to take on more and more tasks."
- In 2016 the USAF published its vision for a future network of data distribution and information sharing known as the combat cloud. It defined it as "an overarching meshed network for data distribution and information sharing within a battlespace, where each authorised user, platform or node transparently contributes and receives essential information and can utilise it across the full range of military operations." It should also be noted that recent news articles indicate that USAF is planning to increase funding for their Combat Cloud in FY 2021.
- Rockwell Collins has developed the Ground Early Warning and Control System (GEWaCS) utilising and modifying proven C2 systems. The GEWaCS is comprised of hundreds of data processing engines connected by a virtualised network. The engines are hosted on Virtual Machines (VM) and are used to process, distribute, correlate, and store a cloud of a sensor, radar, and datalink tracks. Recently video tagging data has become available to the data link, enabling the display of sensor coverage in Link-16. Reaction times of days and hours are no longer viable – and this system allows for a commander to assign assets to a mission in real-time.
Other NATO countries
- NATO Supreme Allied Commander for Transformation: "It is a C4ISR [system] with the cloud ID and platforms that are either piloted or unpiloted…This is what we have to be able to build for the future, but we have to start it now."
- The Future Combat Air System (FCAS) is the critical project for French, German and Spanish air combat power from the 2040s onwards. In FCAS, the keyword is a 'system'. Because it will not be a manned aircraft or a drone, but a system of systems integrating, within a real cloud, sensors and effectors of various types and different generations."
- Various applications designed for its different operational functions.
- Automated analysis tools, possibly shared with other systems, implemented through its applications.
- Common services also shared with other systems, operating transparently for the pilot.
- Storage of large amounts of data.
- Connection to the communication network with other platforms and units, a "self-forming & self-healing" MANET network.
France
- introduction of a higher-speed communication system and additional connectivity ramifications, including munitions
- "detect enemy air defence systems with greater precision."
- "collaboratively adapt the trajectories and manoeuvres" of effectors and their munitions, in a degraded positioning, navigation and timing (PNT) environment.
Requirements for the connectivity of multi-domain combined weapons effect and joint tactical engagement
Sensors and Target Acquisition
- Platforms that have longer-ranged weapons than their onboard sensors can acquire targets need hard quality target data from other platforms
- The future battlefield is multi-domain and requires multi-sensor integration. Strategic fires require multi-sensor, stealthy, long-endurance aircraft, "redundant and resilient" information networks, and "self-learning, self-protection capabilities."
- New platforms like the F-22 and F-35 are information machines far above and beyond being killing assets.
- Multi-function assets and aircraft, capable of performing a strike, ISR, and other tasks, will steadily replace mission-specific assets. Target engagement based around the need to "destroy" a given aim point will give way to effects-focused engagement, driven by improving capabilities such as cyber warfare tools.
- As sensor fusion has evolved through artificial intelligence (AI) and other technologies, it has become possible to fuse what appears to be seemingly disparate data. These advanced fusion engines need data - which may be stove-piped in 5th generation fighter aircraft, advanced electronic warfare systems, or within video streaming systems. Benefitting from this information requires combining sensor data and creating IDs, intent, and patterns of attack.
Command and Control
- In an A2/AD warfare, a decision-maker can be in more places than before. The Recognised Operational Picture is available to everybody, enabling distributions of legacy command posts and cooperation beyond current line organisations. "We must prepare for an era of warfare requiring new levels of cross-domain collaboration, operational level command and control, and the dynamic integration of national, theatre, and tactical capabilities across the full range of military operations,"
- Data, information, and ISR gathering and analysis will evolve as knowledge management becomes even more critical, as will predictive instead of reactive analysis.
Fires
- Individual precision weapons will give way to "volumetric weapons," such as directed energy.
- Massed, non-stealthy strike packages of manned aircraft will evolve into more distributed force packages, with greater low observable (LO) characteristics, and more use of automated systems.
Concept of operations for combat cloud in a generic Armed Forces
Nature of the conflict
- Information operation trying to divide people from government officials, the cyber operation to shut down all government and local authorities web services, and electronic jamming to interfere TV and radio broadcastings.
- The cyber-electronic operation aims to suppress authorities' decision-making and transactions of key financial institutes by launching earlier injected malicious software attacks within the systems and assassinating VIP authorities.
- Kinetic amphibious attack to gain bridgeheads and foothold strategic targets like governmental offices, broadcasting stations, main transportation hubs, etc. The strike may include:
- Ballistic missile strikes against main command posts and government installations- Suppression of coastal and air sensor systems by missiles or special forces- Mining the flanks of the sea avenues for the incoming forces- Blocking the junctions leading out from the garrisons and central depots
- Besides the above, the adversary has infiltrated unidentified troops within the nation in preparation. The distributed cells aim to create chaos and terror as much as possible to overwhelm the authority's decision making and create confusion among the population.
Requirements for cooperation
- As fixed sensor stations will be mostly destroyed, there is a need to use fused sensor information from space, air, mobile ground, and navy platforms to understand the main launch and bridgehead areas better.
- Getting and sustaining a situational awareness among the chaotic situation requires a fusion of event data simultaneously from the information/cognitive, electromagnetic, cyber environment, space, air, maritime and land domains.
- The fused situational picture needs to be shared between all important tactical and operational decision-makers allowing the decision cooperation between different speciality agencies of each dimension.
- Target acquisition becomes essential, for example, for Air Force assets which are the fastest deployable assets. The available sensors need to cooperate in creating targeting information for the incoming fighter-attackers.
- As the theatre becomes rich in small tactical targets, the effect prioritisation becomes essential to focus on the most impacting adversary assets. Otherwise, the enemy tactics will quickly consume the operational ammunition and air assets dry up too fast.
- Cost-efficient and continuous impact with combined weapons is essential in a distributed target scenario. Therefore, the defence needs to assign fire missions to best suitable arms without friction caused by organisational boundaries.
- As tactical-level command and control are occupied in countering the ongoing attack, the operational level C2 should be seeing further and above the current situation. This requires cooperation over all the national defence actors in making sense of the enemy intent and their incoming second wave efforts.
- Collect all event data from available sensors and sources
- Store it (so we can see the short and long term trends)
- Make sense of it (with the help of analytics/machine learning/AI)
- Pass it directly back to the decision-makers / soldiers who need the information.
- Further analyse the data at the operational level, make sense of an operational situation, and prepare for the next phases.
Concept of technology for combat cloud
Technical characters
Communications
- Integrate with space and surface layers
- Increase communications access for the joint force at all levels
- Enable on-the-move (OTM) and over-the-horizon (OTH) / beyond line of sight (BLOS) communications
- Provide modular, scalable, and flexible operational capabilities
- Provide "mission persistent" connectivity as specified by the commander
Computing
- With doubling the computing performance every 18 months, the standard processor becomes exponentially better but chip design and production more complicated. Specialised processors become rarer as the performance of standard processors improves much faster. The features become more software-defined than before, even within sophisticated platforms like fighter-attacker. Countries with processor design and manufacturing abilities will constraint their distribution during crises.
- Software-defined functions and features become more relevant, which means that systems are updated more frequently without changing the hardware. The whole length of the software supply chain will become a primary target for an attacker.
- Platform computing - autonomy will increase the volume of computing required onboard. Embedded sensors and weapons on each platform will increase. Swarming tactics with fleets of platforms will improve the firepower. Civilian terminology calls this edge computing or embedded computing. Maintenance and configuration of these computerised systems require different competencies from support personnel. Example: F-35
- Unit-based computing – all vehicles and platforms in a unit will onboard processors for their use and the use of the system. The system computing enhances information between the computing nodes and provides information services to soldiers and other machines. Civilian terminology refers to fog computing. For example, an infantry company becomes a cloud by itself and in connection to mission cloud. The company's computing nodes provide data storage and processing power to fuse sensor information and provide expert support for decision-makers even if it loses connections to mission cloud. Example: Finnish infantry company
- Mission computing – computing network for a mission is based on fixed military data centres within national borders and deployed nodes in the area of operation. This private military Cloud is the backbone for data management in all military operational actions. Example: NATO Federated Mission Network
- Hybrid computing – a computing network that combines onsite military data centres and public, global cloud service providers' infrastructure to a hybrid cloud infrastructure where military applications can support both military entities and their partners and vendors. Examples: US DoD JEDI hosting both NIPRNET and SIPRNET
Security and survivability
- Why is Data Link layer security not enough? The reason is that Data Link encryption will change hop-by-hop in the network. Each layer three device adds their own layer two header to the data packets when transferring them to the other hop. Therefore, sole encryption on the Data Link layer would not be a safe solution. To fill these security issues, we need to use different technologies like IP-Sec (at Network Layer) which dedicates a private tunnel between the sending and receiving machines.