2014-03-11

Developing Tactical Communications for Renewed Land Fighting


1. Introduction


This paper describes shortly, how land forces tactical communication systems were developed between 2006 – 2012 in Finland in order to support land forces renewed fighting. The approach is to introduce lessons especially from program and risk management point of view as perceived by author. This is a story of traditional attempts, normal failures and gradually improved risk management, which aligned with DOTMLPFII development enabled major improvement steps in force integration and fighting capabilities. Study is based on writer’s personal observations along life cycle of land forces communications development and maintenance program.



2. A short history of land forces tactical communications before 2006



A Quantum leap from II WW -time communications to first digitized communications



During 1980’s Land Forces communications system was changed in a way that enabled totally new ways to command and control. Before introduction of messaging system voice was main means of communications from company to brigade and beyond as utilized by Gen. Guderian  in Fall Weiss -operation in Poland 1939. Nokia Special Electronics produced Messaging system (Sanomalaite m83), that enabled encrypted short messaging on both radio- (AN/PRC-77) and field telephone (LB-field telephone m70) communications. Messaging system provided new age of both man-to-man (free format) and later man-to-machine (variable format) communications and accelerated surveillance, reconnaissance, indirect fires processes together with anti-aircraft artillery fires processes. It also enabled joint fires and joint fight with Army, Navy and Air Forces land based components. 

Late 1980’s saw first digital field communication system to replace mainly Local Battery field telephone connections within brigade and above. Brigade’s digital field communication system (YVI 1) speeded voice connections and increased their survivability but also created first messaging nodes within forces and flattened traditional hierarchical communications to more process and area of effect driven. This was the first time when communication lines weren’t following line of command anymore in Finnish Land Forces. Both combat and combat support functions within brigade were streamlined with these new means of communication. First computers were used in command posts to enhance staff work. This signals digitalization with other improvements in mobility, air defence and surveillance created new capability that was called Brigade m90, a very agile combined arms force with digitally automated communication system. Whole transformation of a brigade structure was successful because of holistic transformation program that was headed by process owners (Inspectors of Arms) and Chief of Army.


Meagre update with best systems out of military shelves


Land Forces started their next modernization in late 1990’s with Brigade 2005 program. This program introduced new field network system (YVI 2) with further distributed switching topology and increased bandwidth for both voice and message communications. Legacy combat network radios were replaced by digital radios equipped with crypto and ECCM functions (LV 241 –family). Messaging system was updated (m90) and Brigade command posts were equipped with automated Command and Control systems (JOTI –family). Signals updated systems were more survivable in battle space under heavy fire and jamming. Messaging system was integrated with C2-systems, which speeded up combat processes especially in intelligence, artillery, air defence and logistics. But like in earlier modernization focus of improvements were majorly at Brigade staff and combat support level, whereas battalion and lower levels remain almost intact. Later C2-systems requirement for better local data connections was fulfilled with ATM-switches that provided field Ethernet-services within command posts. Systems were up-to-date from military shelves (MOTS), but battle processes and tactics remained mostly traditional although automated information management increased some main support processes together with command and control. Fielding of command and control systems succeeded in artillery, intelligence and air defence, but failed in other command posts mainly because focus was more system development than C2-process transformation. Brigade 2005 program was also divided into three courses of action and drivers were mainly the three parent brigades of Kainuu (Northern terrain), Karelian (Eastern terrain) and Pori (Western terrain). This ended up with three different outcomes of combined arms battle systems with different processes and levels of maturity.  See fig. 1 for Signals evolution from M80 to M05.



Figure 1: Evolution of Land Forces Communications from M80 to M05



3. First attempts to define something that enables advantage



Separate strengths become weaknesses when combined


Land forces communications development within two previous decades provided outcome with three different field communications systems (m80, m90 and m05), that were each best at their category but not interoperable with each other. When utilized together in evolving missions and demanding area of operation, each of their weaknesses were summed up and produced major points of failure. The interoperability level of three different systems was degrading all achieved counter-counter measures; data management advantage was inclined with a mixture of automated and manual processes; and mobility and survivability was taken away with adversary’s advances in signal intelligence, jamming and artillery fires.


Is there anything new available in military markets?


Early 2000 military markets were full of systems that were even better than five years before, but markets projected the late cold war thinking of combat systems and there was no real solutions for data communications, better bandwidth with ECCM capabilities nor were there anything in command and control that really promised changes for infantry combat. U.S. Army had their Force XIX, IDF was digitalizing their brigades, but everybody else were more keen on theatre level capabilities amazed by II Gulf War operations than any tactical level improvements. Titaan in Netherlands 2002 and TOC  in Finland 2001 were showing next generation solutions in C2-structure for mission level. TETRA-system implementation in Kosovo 2003 within Deployable COTS Network concept from Finland was changing peacekeeping operations communications, but there was no real advantage gained in actual combat conditions. Combat radio network vendors were focused on improving their Low Probability of Interception (LPI), Communications Security (COMSEC) and other electronic counter-countermeasures (ECCM) but better bandwidth with packet switching was too advantage.


Can we utilize anything developed in civil industry?


Meanwhile wireless technology had leaped in civilian markets producing different (WLAN, WIMAX, 2G, 3G, Flash-OFDM) waveforms. Many parallel waveforms brought up the need to integrate them in one transceiver thus software defined radio (SDR) concept was created. In Finland Defence Forces started investing in SDR development 2001 onwards. Commercial satellite communications advances provided better services (Mobile phone, narrowband IP-connection) than legacy military communications satellites which suffered lack of investments and performance. Packet switching technology had survived after Telco driven ATM-hype and stabilized both IETF-driven MPLS- and Metro Ethernet –switching markets. Voice circuit switching had been replaced with Voice-over-IP –services with struggle between Telco and IETF standards. Open source programs introduced new ways to develop military specific systems utilizing civilian basic functions. Linux-operation system introduced new possibilities to utilize same platform, but tailored for different purposes. Every military force was experimenting with COTS-technology and some traditional Defence Communications vendors were threatened by civilian solution providers. Only salvation to traditional Defence industry seemed to be interoperability and COMSEC requirements that military society was not able to change in the pace of technology evolution.


What are we actually doing?


As mobile communications, personal digital assistants and advanced information management tools were accelerating the productivity of private sector, military was also after new capabilities. Concepts of Effect Based Operations were learned from Kosovo operation 1998 and tested in Iraq operation 2003 and further in war between Israel and Lebanon 2006. All lessons indicated the need of more agile force, better effect at tactical level and more understanding for strategic corporal. 

Future Soldier programs were drafted as infantry was keen on getting cool looking gadgets from digitalization programs and new cyber competence recruits had adapted from Internet war games. Wildest industry dreams included Head Up Displays (HUD) within helmet and extended reality environment to each soldier. Fortunately some field studies ended these visions, finding again that sight is not best way to communicate with human being in stressful situation but hearing and feeling.

To make sense of all ongoing things and future requirements in Finland, studies of future battle was conducted first at literature level, then capturing lessons from military history, further defining alternative concepts of combat, and finally having war games assisted with operational analysis tools. While this was ongoing, something was required to do in able to prepare Signals for the next leap of communications and information systems in battlefield.



4. Three parallel courses of action


Since end state for land forces fighting concept was still under development, no definite requirements for Signals capabilities was given. Although it was clear that communications together with data management technology would be the major enabler for future forces integration. Thus it was imperative for Signals to proceed with tactical communications, three parallel courses of action was adapted: (1) Commercial technology utilization, (2) Open Source based tailored system approach and (3) military-of-the-shelf -solution. These parallel projects were implemented simultaneously in quest of capturing wider understanding and different initiatives. COTS application presented widest ground for crowd sourced development since Cisco routers and switches were widely used in fixed networks of Finnish Defence Forces. Ascom access network system was chosen for open source course, because it was widely used in Navy and Joint access networks and provided good bases for development with agility of a small Finnish vendor. Material Command was given the task to seek any applicable military solutions from MOTS –markets and Signal School heads up to survey other forces in international exercises. 


Figure 2: Three parallel courses of action to seek possibilities for tactical communications improvement


Commercial of the Shelf (COTS) IP solution with Cisco routers


As Cisco routers and switches were widely in use around Defence Forces and first field trials were done as early as mid-1990’s, they were natural source for troop initiatives in tactical land IP-network experimentation. Tuning IP-packets to fit into narrow 16-32 kbps circuits optimized for voice connection was challenging. Especially when quality of connection was mostly below 10 -6 BER. Routing was another problem. Connecting together larger networks created too heavy routing traffic for narrow bandwidth. Familiar OSPF was either too slow or too heavy for tactical routing. Management of Cisco routers was either Cisco Works type or relied on SNMP-protocol, both quite unsuitable for narrow band connections and conscript training. Basic pessimists were arguing that taking COTS-devices to field conditions is not a solution and they do not last long dust, moisture, cold and heat. In real world surprisingly few COTS -devices were damaged by environment causes. It appeared that physical interfaces wore out because of repeating cable connecting and disconnecting during training. 

The fact, that Cisco IOS was educated in most technical schools and conscripts were familiar with using IP-connections at home, created advantageous conditions for accelerated conscript training and provided faster adaptation than military specific system interface. New technology required more from instructors than from their disciples and it took some time for instructors to change first their attitude and then their competence.

Tailored solution based on the family of open source access systems


Since Navy and Joint access networks had implemented tailored open source solution for their usage, this option was decided to be starting point of exploiting new possibilities. Access router did already have WLAN, RJ-45 and fiber optic interfaces attached to Linux platform with open source routing, encryption and VOIP packages. Routing was not applicable as is, system management was web based, VOIP -service was for access point use only and cabinet was not ruggedized enough, but structure promised good options for further development with reasonable price. Routing optimization was on way to more field friendly protocol, adaptors with legacy field systems were under design, open source encryption package enabled tailored configuration and even with VOIP –services vendor had a plan to build more distributed design. Implementing IP –packet transfer in narrowband (1024 kbps) and disrupted (BER < 10 -6) channel remained only real technical challenge. Thus testing and experimenting was focused on finding solutions for this.

In the midst of development process owners of this small agile company sold their shares to Ascom and international enterprise with different working culture was not able to keep original development team aboard. This resulted a chain of changes in development team, loss of communication with customer and in the end loss of the trust of customer. Unfortunately people at customer’s side changed also. New stake holders did not study original plans but created their own, some points of connection were too busy to pay enough attention on what was going on, project managers changed from iterative development to waterfall development with different priorities and strategic level forget to give direction and communicate totally. 
All this resulted a situation, where vendor was not able to meet environment tests and had difficulties to provide tactical EUROCOM -interface. Secondary requirements for end state point of view, but become acute and with high priority in procurement process. Short term failures ended up with contract dispute and withdrawal of both sides. 

Military of the Shelf, (MOTS) solution


Defence communications providers had either products that were based on digital ISDN –exchanges or they were promising to deliver All-IP functions in their next versions. ISDN and voice circuit was there because NATO’s inability to follow development from circuit switching to packet switching technology. NATO legacy was too extensive to make swift changes. New members like Poland adopted different bath and designed field systems with domestic providers that had only outer interface with NATO ISDN. Thales had SOTAS -family of field devices, but their features were immature at that time. Kongsberg had new IP-switch only as a prototype. General Dynamics had something under development but no products. There was plethora of small and agile companies that had ideas but lacked founding. Bigger Telco vendors like Cisco, LME or Alcatel did have ruggedized products, but their features did not differ majorly from their COTS –products and they had closed programs with big price tags for tailored development.

When asked information on estimated prices and maintenance costs, traditional defence vendors gave price tag that were either defined for smaller forces or too long life cycles. They overprized themselves in competitive market where smaller open source companies or COTS products were infiltrating.


5. After successes, failures and sense making, a road map appears


Crowd sourcing may bring up solutions and they are quickly adapted whilst promoted by peers


While misfortune in two courses of action, there was welcomed initiative coming within Signal troops. As team of officers and engineers were experimenting with Cisco-routers and YVI 2 –channels they found out that several 16/32 kbps channels was possible to trunk together and provide more bandwidth to data connection. Four trunked channels provided 128 kbps gross bandwidth for IP –transfer and still enough channels was left for voice circuits. Team was further encouraged to design whole IP-network for brigade and come up with prototype construction. This happened in one annual C4IS -integration and demonstration exercises, where team showed the design and configuration to other units around nation. This accelerated Tactical IP -transformation (TACTIP) adaptation in other units since it was advised by peers, recognized in shared occasion and implementation did not require huge effort.  

MOTS and COTS procurement differ and need special competence


Buying COTS devices via military equipment procurement process appeared to be difficult since Material Command did not have competence in COTS maintenance procedures with annual updates and clauses in warranty conditions. They were also having difficulties of not following waterfall procurement approach, when they were asked not to arrange competition between products but possible vendors of field proven product. Because procurement decision was not based on lowest item prize but total cost of life cycle of whole fleet of capability, which was mainly service, they were uncertain with comparison criteria. This unfamiliarity of COTS-procurement delayed the delivery of routers to units already in waiting in a degree, that a bypass was needed to get initial devices fielded. Procurement bypass was provided by Defence Forces C4 Centre with better competence of similar COTS systems utilization.

Complex system of systems, as field communication system is, needs reference environment to manage changes, configuration and problems together with improved communication between people

As brigade base network was updated with COTS routers mainly installed by units themselves, the Material Command expressed their concern on configuration management and safety of operation. This created a window for opportunity to create a reference environment in order to manage coming tactical communications systems transformation. Material Command, Signal School, Maintenance Facility and main vendors were asked to join in this quest of managing changes and being able to solve together 2-3 level problems of complex communication system. Reference environment also provided tangible “small world” for all engineers and officers to come together with their requirements, problems and possible solutions, thus the time from problem detection to implementable solution shortened drastically. 

Within 5 years period any development program faces changes, new possibilities and problems


As other courses of action slowly withered or were doomed with problems, COTS line was successful. Technology was not the best for task, but required competence was easily achieved by conscripts and devices were expendable because of low unit price.

Signals tactical and technical training was started ahead of supported units. Instructors and leaders training was scheduled ahead of troop training. Since time table and requirements changed, two parallel baths was defined for Signals as presented in following figure 3: 
  1. Model 12 that was constructed from updated legacy communication systems and provided new services by COTS –devices. 
  2. Model 18 that would follow m12 starting from 2018 with totally new technology, but matured tactics and processes matured while training and exercising with m12. 
A spiral development approach was adopted for m18 with test, reference and pilot environments and equivalent feedback loops to achieve required DOTMLPFII -maturity before fielding. 

New technical possibilities appeared while building m12 capabilities. After various experiments with COTS-devices and their vendors, a new domestic producer appeared. A Finnish company with mainstream in mobile communications and special systems was able to pilot Software Defined Radio platform that included major features of the failed Ascom access node. 


Figure 3: Two lines of development for new tactical communications capabilities of renewed fighting

This was a result of Nokia driven development started early 2000 within one of the best technology hubs of Finland, where University research, Nokia vision and resources, SME agility and Government funding was integrated. Lessons in Software Radio development were adapted from civilian mainstream and shared with international military SDR development forum. Lessons from Ascom node was shared with company and their military counterparts for not to repeat past failures. A small steps approach was adopted with renewed procurement processes in Material Command to mitigate risks that always follow introducing of new technology.

Signal School’s development and education co-operation with Aalto University was able to produce a prototype for new field messaging software. Field message solution was simpler to use but much more efficient than existing Nokia based messaging system. It included tailored encryption and promised to be able to maintain the main capability of combined and joint collaboration between men, machines and organizations. All these new possibilities were able to be included into m18 plans, because m12 was taking timetable pressures out and providing sufficient services for tactics and processes to mature. 

Signals needs requirements and drivers from other arms to be able to multiply their combined effect


As m12 services were trained, land forces renewed fighting concept matured in war games and first field tests started to give better understanding of new requirements for Signals. Operational level requested better understanding of situation and foresight in possible scenarios. Tactical level required swarming tactics with platoons and patrols to be more agile when facing adversary. Combat technical level required more efficient processes for combined arm effects. Combat support services required on-time control of support network with client driven processes as depicted in following figure 4. 


Figure 4: An example of four levels that were matured within renewing Land Forces fighting

6. Intermediate solution Model 2012


System of systems calls for integration and optimization both horizontally and vertically


As TACIP solution with COTS –routers provided new services, other parts of m12 land communication system of systems was defined and new concept was designed through extensive integration testing and experimenting with different solutions. After trials a compromise configuration was found for both YVI and router structure, which provided near null-configuration even when connections and topology were changed. 

To get other parts of technical capability up to date with TACIP services, last midlife update for Nokia message system was executed. This improved geographical information interoperability with some encryption features and extended systems lifecycle to meet m12 requirements. IP connectivity provided more bandwidth to messaging with better routing to survive changes and kinetic effects in area of operation. It also solved message network routing problems with more effective IP-routing.

Since legacy Combat Radio Network was not able to handle IP-packages, messaging remained as an important connectivity and encryption layer for m12 communications. All Army command, control and information systems were able to communicate via messaging system so troop leader were able to order support from all arms within the brigade. Old messaging terminals were substituted with field computers that included messaging application together with Battle Management System applications.

Because field radios in Combat Radio Network (CRN) –system were old, their producer did not provide any maintenance services or spare parts for them. It required a special arrangement to extend life cycle of whole fleet of radios to meet m12 requirements. Distributed maintenance and storage was discontinued and centralized maintenance unit was founded with responsibility of whole radio fleet and its lifecycle. Some radio units were assigned for spare parts (cannibalization) and life cycle readiness requirements were set to drive sustenance for remaining life of devices. 

Capability is not only material items but all DOTMLPFII components functioning together 


Signals new capability included changes also in other parts of DOTMLPFII structure as explained in figure 5, thus Signal School arranged several Signals tactics and doctrine workshops to create and deliver required understanding. This was aligned parallel with land forces fighting doctrine development in many computer assisted war games and live exercises. With this design process other arms, especially infantry, artillery and sappers, did set their requirements to Signals support and in the end state combined effort created more capability than merely their sum would be able to project.

Organization was changed to support better online network operations and maintenance. Most challenging was to transform deep functional organization with sub optimized procedures to service provider’s value chain that is driven by client’s needs. Also distributed way to employ troops but with coordinated way to effect to adversary, was requiring a lot from leaders, communications and logistics.

Training was scheduled within Signal School, Reserve Officers School and other Signals units before user training commenced.  This provided readiness of service that Signals needed, when troop leaders and platoons training began. Material and software updates were provided always through reference environment, where it was tested together with all stake holders of Signals capability, harnessed, integrated and delivered to operational system of systems with balanced performance. 

Both platoon leader’s, forward observer’s and signal officer’s leadership skills needed to be transformed. First two leaders were trained to act even more as a team and utilize combined arms effect in fighting. Signals officers were trained to be more supportive towards fighting and same time more capable to manage distributed and independent patrols. 

Maintenance personnel was appointed to take care sustenance of programmable electronics. Long leap was taken, when repair shops specialized to analogue technology, warehouses with optimized off-line device management and ICT-support units with device focused procedures were transformed to support on-line warehousing with configuration management and disposable devices. 

New facilities were built to support both training and maintenance of new systems. Intensive training required new base stations and connection points within garrisons and exercise areas. On-line warehousing, in which all communication units were stored on line with power switched on, required new cabling on shelves.

New information sources like weather forecasts for artillery, digitalized RAOP –data for air defence, Blue Force Tracking data from other components and Joint level operational picture data was directed to support units situational awareness. Additional information exchange gateways was build and information flows was directed to support all fighters. Focus of information management shifted from command posts to units and domain boundaries were pierced by flows of new information. This really transformed both information management and combined fighting for new possibilities. Legacy processes were questioned by new possibilities appearing with new information.


Figure 5: An example of DOTMLPFII capability components and coordination of their development

Interoperability within technical system both horizontal and vertical dimension was guaranteed both with reference environment and with annual integration and interfacing exercises. Interoperability through whole DOTMLPFII -structure was assured in pilot environment, where all bigger changes were tested, practiced and mapped before fielding into operation. Eventually change management was following three different flows of weekly, quarterly and bi-annual delivery. Weekly updates included smaller patches, configuration corrections and information assurance remedies. Quarterly changes included larger updates of operation systems and applications. Bi-annual changes introduced new features and services, which were required by units in field.

Doctrine includes management that starts with capability life cycle planning, which in one hand takes care of smooth transformation, but in other hand strives for strategic advantage over adversary’s capabilities in probable area of operation. It goes through program and portfolio management and is not afraid to give freedom to Corps initiatives when opportunities appear. It creates collaboration between various stake holders to keep everyone within same understanding and level of communication. It ends up with stabilized structure and processes to deliver quality services and continuously improve their effectivity and utilization.

7. Stabilizing the maintenance, development and risk management of communication system of systems 


Between developed technology and service requirements from units, Signals needs to follow continuous development principle


Signals transformation was not only introducing COTS –technology to gain quick wins, restructuring organization and implementing new procedures, but also creating long term procedures and culture for continuous improvement and change management.  Doctrine, organization and tactics were studied and developed in Signals annual tactical seminar, where previous years performance metrics was analysed and new possibilities were introduced. Education, training and learning were improved via Signals annual training seminar, where metrics of previous year was studied and new measures for education was introduced. As continuous system change was either pushed by provider’s technical updates or pulled by client’s functional requirements, annual technical interoperability exercise brought Signal troops together to implement new devices and services, test their interoperability, fix their service processes and learn from each other.

Bi-annual field exercises for conscript troops


Since conscript troops are produced bi-annually in Finland, there is a series of unit exercises at the end of each training period. These exercises train and test combined arms co-operation within battalion task force with live fire. This provides ultimate peace time framework for Signals troops quality and effectiveness measurement. Each signal patrol, each level of technical system and whole task force C4I –system is measured against value they are providing to other combined arms in fire effect, agility in movement and survivability in hard conditions. These measures together with commander’s judgment gives basis for estimation capability sustenance of signal units in reserve. Measures give also tangible drivers for Signals to improve their services without continuous operations in warlike environment. This is captured as goals for following year’s plans and orders for each training and service providing unit in Signals. Without these national defence exercises, Signals may be tempted to follow only lessons identified in peacekeeping operations and that would not prepare forces for next war. 

Life-cycle management of Signals C4I –system of systems


New, legacy, extended life-cycle and COTS devices are integrated to a C4I -system of systems. This technical complexity together with Signals personnel and procedures are enabling combined arms tactics, functions and procedures. This intertwined structure creates a new kind of capability life cycle management challenge, which is introduced in figure 6. This pace of change is confronted with lessons identified from current operations in Iraq and Afghanistan, where adversary is able to learn and change their fighting technics within 24 hours by utilizing differently COTS –technology, facilities and terrain familiar to them.


Figure 6: Some examples of Signals system of systems change cycles 

System of systems changes should be done by value chain in continuous flow mode driven by performance that is a balanced between client needs and system vulnerability. No C4I -system of systems is isolated any more from surrounding structure, information flows and many processes passes over organizational boundaries. Every chain is as strong as the weakest link. Technology, competence and procedures must be updated aligned to keep the chain equal strong. There are some general update times for C4I –system of systems presented in previous picture to give example of required pace of change in networked force.

Signals needs value driven procedures that provides a service flow to supported combined arms forces


Signals assets creates intertwined system of technical systems with both horizontal topology and vertical layers. This is integrated with people and processes to create holistic C4I -service provider system of systems, which by itself is of no value. It is only one part of value chain of combined arms forces and has many interfaces both with fighting components and supporting components. Signals is the glue that keeps distributed combined arms together as a force and multiplies their effort by providing tools for improved information utilization.

This complex, intertwined and continuously changing system of systems requires the  life-cycle management of programmable and trainable capabilities as depicted in figure 7. A continuous flow of services is being provided to clients at same time as both continuous and disruptive development occurs. It is like driving a car on a highway while it is being serviced and gradually changed part by part. Service performance is optimized to meet combined arms tactical needs.  Units’ requirements of improvement are fulfilled with fast solution finding by stake holders working together around reference environment. If needed, defined solutions are further tested in pilot environment, before launching them to operation. Same iterative cycle is followed with each update and patch that is provided by subsystem vendors. 


Figure 7: An example of signals capabilities life cycle management

Both legacy and new services are being planned as capabilities and not just new systems that replace older systems. This create value driven logic for new investments, which are first modelled and simulated in virtual world in order to make sense of all possible changes required in existing system of systems. Technical solutions for modelled services may be experimented in both experimental and reference environment, where both existing providers and new vendors share awareness of future needs and possibilities. 

Procurement is then given a task for iterative development with bi-annual delivery goals that are coordinated with cooperation in reference environment. After technical integration in system of systems reference environment, change items are further tested in pilot environment to integrate them through all DOTMLPFII dimensions. Eventually change items are ready to be delivered into operation in one of the update windows or suitable rotation of troops. Every change is prepared and followed with guides, training and feedback gathering.

8. A road to next generation solution


Utilizing the lessons identified in developing Model 12, it was less risky to plan a holistic DOTMLPFII capability road map for next generation Model 18 development. Road map was constructed from sequential loops called spirals, where advance is achieved by small iteration that are being tested and fielded while learning all the way. The best feedback was provided from m12 training and exercises, where other arms and services were improving and learning renewed fighting. As new requirements was captured from process development, several possibilities were experimented in technology line of operation. Suitable technical increments were forwarded to integration testing and further to pilot testing. This provided agile method to advance at the pace of combat development and not be driven too much by fanciest technology.

Spiral development with continuous cycles through laboratory, reference and pilot environment 


Laboratory and reference environments were created side by side to provide the best possible understanding and collaboration framework to all vendors and stakeholders. Pilot environment was appointed to a whole brigade, where all arms were combined for testing and training of renewed tactics. Reference environment supported pilot by delivery testing, problem management and spare parts. If technical problem was faced in the pilot environment, the root cause was analysed and solution found in reference environment. Spiral development is described in figure 8.


Figure 8: An example of spiral development in software defined C4ISR system of systems

Since process and application development was based on semantic knowledge model and communications systems were mainly software defined, it was possible to utilize independent spiral cycles for each layer of applications and communications. Main version (vX) spiral was annual, but sub spirals (vX.y) were spinning quarterly. Application layer and information model was developed with quarterly scrum sprints and iterations were introduced over communications structure first time in laboratory environment. After first spiral feedback both application and communications were adjusted to second laboratory test cycle. After second successful tests, system was duplicated to reference and pilot environments. Pilot brigade started conscript training, whereas engineers continued to finalize configurations in reference environment. Simultaneously second main spiral started with process iteration and knowledge model workshops in order to create new capability iterations for future sub spirals.

Value driven perfection by client and not by providers or contracts


The quick pace and small iteration steps made it possible to adjust any feature separately in application and communications layers according to tactical and combat technical maturity or phase of training. Development listened very carefully comments coming from pilot brigade. Because pilot brigade had best understanding of holistic DOTMLPFII development situation, they were delegated the decision of proceeding pace within the year. The entire development chain was adjusted to bi-annual decision points including contracts with vendors. This ensured that technical development was supporting other capability components in combined balance and whole value adding chain was following user’s feedback to achieve best usability. Laboratory environment was utilized as technical development buffer, where more advanced or accelerated features were tested but then downgraded to enter to reference environment. Twice a year pilot and reference environment was updated with new capabilities whereas patching and configuration changes were made weekly or quarterly.

Program office was controlling development at annual level agreeing on annual goals with all stakeholders and issuing resources to achieve them. Risk management was additionally managed with several parallel options:
  • Annually major problems at technical development were mitigated either by using latest functional system version in training or substituting missing feature with nearest COTS-capability.
  • Where ever technical development was proceeding faster, it was allowed until laboratory testing, but downgrading to balance other features was insisted from reference environment onwards.
  • Each annually agreed delivery was required within that year and within agreed price. Within year variation was allowed, if it was kept within training schedule of the pilot brigade.
This produced one time a situation where pilot troops were using four versions older BMS over two versions older messaging system that was using one version old routing program but one channel was substituted with nearest equivalent COTS -communications system. Complexity of this kind was possible because of strict integration testing with heavily adhered testing routines and good communication between developers and testers.

9. Summary


Developers have same weaknesses as any humans. They tend to forget information that does not support the adopted line of their thinking. They tend to narrow their path as time goes and problems occur. They tend to be the only ones that understand how things should be done and they tend to become blind to any evidence that contradicts their profound believes. If Signals is given freedom to develop their capability independently, they most probably will come out with best technology but not that good services the other arms are needing. It is imperative to deliver intent of whole program as understandable as possible through all stake holders to align all efforts towards same capability goal.

Large enterprises and alliances tend to stick with systems, standards and procedures that are good for interoperability but may kill any strategic advantage in long run. New solutions are often found outside the legacy stake holders and utilized only by those that have vision and will at right moment. This calls transformational leadership whereas more transactional management tends to prefer familiar solutions.
If development is divided to narrow functions with independent decision making, one often end up with sub-optimized solutions that might nullify all good features when integrated together. Portfolio management requires tangible values that every project is following with agility because real life seldom follows theoretical plans.

Portfolio management should consider parallel courses of action, when either end state or path is uncertain. Sometimes best initiatives may come also from field units and not necessary from procurement engineers or defence vendors. In information and communications technology currently defence initiatives are rare, whereas mainstream of development is in commercial services. On the other hand open source components are providing fruitful possibilities to both defence vendors but also to their new challengers. Military capability developer may collect some good initiatives if they explain their problem clearly in Request For Information and publish it wider than only to legacy defence industry. 

Procurement procedures needs to be changed if military, government and commercial technology is mixed. Waterfall development method proved to be unsuitable for any system of systems development but stands on it’s ground in small subsystem development.  Spiral development has proven to be best method for managing iterative changes in complex C4I -system of systems. Any project will face probable failure if communication between people and organizations is not functioning. Even organization cultural differences may produce difficulties between points of contact.

One has to follow and understand technology and markets, since it is not always the best technical solution that champions in markets. It is sometimes the brand, package or channel that decides who wins in current markets. C4I –services life in markets is shorter than any time before. It is seldom that modern IC-technology can endure 20 – 30 years in service as sometimes expected in military.
With C4I -system of systems the interrelationship with all other systems makes it almost impossible to change anything independently. Even standards are short lived, when default agreements rule. There is always next version in coming, which is always better than any previous product or service. Only system in training and full operation is capability.

Technology itself is not force multiplier but when machines, men and procedures are trained as integrated system and supported with better information, then force effect may be multiplied. One should consider always other parts of DOTMLPFII –capability structure when pursuing to develop integrated military force.
Networked technology requires maintenance and updates delivered at same pace as other nodes in value chain. If one part of that technology chain is outdated or noncompliant, that node becomes the weakest link of the whole value chain. This requirement extends over organization borders to all networked stake holders. Unified and agreed security and maintenance policy should be implemented though network with transparent audit track.

It is mistake to think that within 5 years long development program there will not be any changes, problems or new solutions. As in any military planning, one should keep close eye on assumptions of the plan that is under execution. In development programs stubbornness is not necessary the way to success. But it is sadly the only way, if there is no risk or agile program management aboard.

One might utilize the newest technology as a first adaptor, but implementation needs more time, development steps should be careful and one should have alternative solutions if one part of complex structure fails. After all there is a possibility to gain strategic advantage with early adaption of latest technology. In the end of the day it might not be the newest technology implemented, but development and maintenance process that has been adopted with technology that provides unrepeatable asset at strategic level.

If one does not have enough investments to replace all sub systems within short time and possibility to train all forces at once, one should be prepared to extend the life cycle of legacy systems as a part of new system of systems capability.

If one focuses only developing capability with investments, one might not achieve advantages of continuous development, which may be even better. Competent and motivated personnel can develop capabilities faster through small changes than force is able to adapt with waterfall development. This is case at least in conscript and reserve force since there are so many different professionals coming together to defend their country. With continuous development one must identify the value, measure it and publish results through to the whole force projection chain to enable learning and improving.

It might need to establish on-line warehouses to maintain programmable electronics at up-to-date level and configuration ready for operation on demand. This calls for new competence, skills and procedures from existing support, repair, storage and maintenance personnel.

C4I system of systems development and maintenance is too complex process to have long lines of communication and deep hierarchical command structure. Flatter the organization and shorter the lines of collaboration, the better understanding between stake holders and lesser risks. One cannot buy system of systems of the shelf, thus integrated project team is imperative.

Next generation technology promises major advantages, but requires more maturity from all stake holders of development and maintenance network. As always technology can provide short strategic advantage, but in the end it is more of organizations capability to continuously improve their capability, than long, risky technology leaps that may crash land. It is coming rare that one man can understand or one vendor can provide all that integrated military force is requiring for next generation capabilities.

2014-03-10

Basics of Information Operations 4/4

This is the part 4/4 of full paper! Based on this part there is also a paper with name: "Protecting national assets against Information Operations in Post-modern world" which was published in 2nd BCS International IT Conference 2014.

4. NATIONAL DEFENCE AGAINST INFORMATION OPERATIONS


4.1 Analyses of adversary’s possibilities and force projection logic


Next picture is showing some principles of aggressor decision making process when estimating profitability of information operation. Aggressor analyses level of operational executionability with accessibility and vulnerability. When this function is having a driver of motivation and it is balanced below line with profits gained from this operation, it is surely considered by aggressor’s decision makers.


Picture 27: Aggressors equation for information force projection

Information Operations execution needs longer time to build up capabilities but with globally connected vulnerable information systems and at least western population’s sensitivity to propaganda makes IO tools easy to utilize and they have good penetration ability through media and network of devices. Effect on target may not be as clear, but information criminal operations are giving good reference on taking advantage of vulnerabilities both at human and technology.

Adversary is analysing opponent as a system of systems network with nodes, their interrelations and components depicted in next picture. There is always five components that can be affected in a node of network: human being, information, processing, shelter and environment. Between nodes there are interactions that can be affected like communications links between processing, data transaction between information storages, social interaction between people and shelter dependence of its environment. Adversary is analysing what tools they can utilize with minimum unwanted collateral effects and how good their accessibility is through defence. They assess what effects may be caused and how they may be further proliferated within system of systems network. 


Picture 28: Example of IO targeting against inter-relations of and human-technology system of systems

Adversary is optimizing their tools to meet maximum effect, thus the interrelation topology is important for their intelligence and targeting analyses. Next series of topology pictures shows, how adversary is optimizing effect when disintegrating opponents network.


Picture 29: Example of how adversary might optimize effect with topological analyses of interconnections in system of systems structure

If interrelations topology is hierarchical, it might become more cost-effective to eliminate upper level nodes or links (leaders, command posts, information hubs or communications hubs) than mid- or low level nodes to disintegrate target structure to separate components. Human interrelations require trust to act fluently. If adversary ruins trust between co-operating parties or leaders self-assurance, he has hit most vulnerable and hardest mended asset in a social network. Chia Lin  defines quite extensively the measures that can be utilized against human social network as follows:
  • "Entice away the enemy's best and wisest men, so that he may be left without counsellors”.
  • Introduce traitors into his country so that the government policy may be rendered futile. 
  • Foment intrigue and deceit, and thus sow dissension between the ruler and his ministers. 
  • By means of every artful contrivance, cause deterioration amongst his men and waste of his treasure. 
  • Corrupt his morals by insidious gifts leading him into excess. 
  • Disturb and unsettle his mind by presenting him with lovely women." 
As defined in picture 28, human being still is one of the most vulnerable component in system of systems thus information operation in the end tries to effect on human attitude and behaviour. Or as Kevin Mitnick says, the most vulnerable piece of any information system is one credulous human being.  

Another very cost-efficient way to disintegrate system of systems is to attack on human trust on information integrity or service availability. Sun Tzu says that “all warfare is based on deception” and information is essential for leaders “Thus, what enables the wise sovereign and the good general to strike and conquer, and achieve things beyond the reach of ordinary men, is FOREKNOWLEDGE”.  If leader will lose trust on available information as a basis of one’s understanding and foresight, adversary has gained major advantage. Information may be attacked by deception or more cost-effectively various man-in-the-middle measures. Striking to opponent’s resource management information storage would disable their force building and rearranging both material and people. It may also hamper their ability to manage supply chain. If people and their leaders have not trained and practiced with their information systems, they tend to abandon their widgets in stressful situations if their availability lowers even temporarily. Thus denial of service attacks or using malevolent software attacks are fruitful in collapsing human trust to technical systems.


4.2 Nature of information confrontation


In basic confrontation model of two entities blue and red, Clausewitz  has defined three bases of ability: population of society, power of governance of society and force that society is able to harness to defend against adversary’s force projection. Each base is constructed of volume of personnel and matter and quality of their competence and will. This three node network is projecting force via multiple channels to create either kinetic or non-kinetic effects in adversary’s information, networks, understanding and will that is connected with military, social, economic and political structure around them.


Picture 30: Basic setting of confrontation and conflict where Information Operations are waged

If nation’s vital systems, information content and spirit are vulnerable to information operations, adversary will have temptations to attack in periods of interstate tension. Not only to affect nation’s capabilities, but just demonstrate to “audience” and other stake holders, that they have capability to do so. Information operations “playground” include also other entities and venues that can be used as “hired”, 3rd party or “neutral” forces. States may deny attacking with cyber means, but blame private hactivists for launching attacks like in situation of Bronze soldier between Russia and Estonia . Media can publish biased information like in situation, when Al Jazeera published old video footage as live on Egypt situation during summer 2013. National organizations may establish their computer network operations capabilities distributed all over Internet thus achieving force projection capability screened with anonymity like alleged North-Korean computer operations against USA infrastructure. 

Information operation can affect material assets as alleged STUX malevolent software attack against Iranian plutonium production program. Information may change the will of population in home front, have secondary effect on political decision making, which again effects military arms utilization in conventional area of operation. This happened in Vietnam War, where Vietcong Tet-operation was military failure, but originated a video footage, which was published in US television channels and changed U.S.A public opinion about Vietnam War and later affected political decision making. Similar thing happened in USSR where mothers of sons killed in Afghanistan together with economic situation aroused public opinion against the rule of communist party. Arab Spring movement was triggered by tragic news of young merchant driven to suicide together with stories of ruler’s luxurious lifestyle. The revolutionary spirit was carried on by social media and mobile phone messaging through North-African Arabic speaking nations.

As with conventional weapons Information Operation offensive forces may not be not cost-effectively disabled by pre-emptive attack since computer network tools might be already injected to target systems and are only triggered in action when needed. Information Operation Defence is the main strategy against information operation attacks unless there is capabilities of countering attack with some other arms. This is case in Russian doctrine referred in picture 3, where information attack may be countered with nuclear retaliation. This kind of extreme doctrine may be resulted of weak defence measures or it may tempt opponent to “call the bluff”. There are two main methods to prepare Information Operation Defence: Protection by Isolation or Habituate defined in next picture. Then there is U.S. Military way because they think that they cannot protect vast private sector function utilizing Internet and focus on building international structure of connection and content surveillance structure parallel with major and possibly pre-emptive computer network attack capabilities.   Similar but asymmetric is Russian strategy declaring that any defined Information Attack will be countered by nuclear strike.


Picture 31: Example of Information Operations strategies for national defence

China has been using Isolation strategy. Chinese government is protecting their information assets and citizens from attacks and international information sources by creating the “Great Fire Wall” to filter all connections and content over national boundaries and establishing national social media services, mobile access, etc. They state that: “within Chinese territory the Internet is under the jurisdiction of Chinese sovereignty. The Internet sovereignty of China should be respected and protected.” With this government has good control over malevolent content like pornography, viruses, spam and other unwanted online action. It is alleged that government is also filtering other content in the fields of political and social life. It has been also doubted that Chinese officials have hired a vast number of “online commenters” to promote “official” content and the Communist Party. This outer perimeter defence often leaves inner structure weaker but China as a big unified information and online market has also been able to get rights to produce their national version of Microsoft Operation System and Cisco IP-routers IOS-program thus being able to safeguard their basic Internet-structure inside as well as outside.

Iranian government is also utilizing Isolation strategy by building a “Halal internet”. Iranian YouTube equivalent Mehr was launched on December 2012 with government-approved videos. It is believed that national “Halal internet” grows gradually as more content and services from global Internet is being blocked. Together with shared language this approach will provide good border control over cyber and propaganda attacks from outside against Iran and Iranian people. There is no information on, how well Iranian network operators, broadcasters and citizens are protected against malevolent information and attacks launched within the nation. 

Sweden as a small nation is utilizing the Habituate strategy. While being 2nd in International Human Rights Rank Indicator , Sweden has strong screening of all Internet and telephone content going through their borders (executed by Forsvarets Radio Anstalt from 2008 ), but government do not isolate their citizens, ISP’s or private sector any other way. With exposure to ongoing Internet malevolence they harden their information sources and users; build culture for citizens to recognize misinformation by exposing them to all types; utilize all modern methods of cloud computing, information assurance and mobile access; empower public and private partnership networks to counter existing malevolent features in Internet. This can be seen in Global virus Map where Sweden is one of least infected but most networked nation in Europe. 
Information Operations present a wide field of asymmetric tactics that is utilized along all lines of operation (political, economic, social and military) without conventional arms restriction agreements, Geneva Conventions, international war legislation or other restrictions. Computer Network Operations and Electronic Countermeasures are still used quite straight forward and managed by conventional arms decision making. Operations that try to effect public opinion of target society or neutral parties are far complicated thus requiring understanding of complex social interrelation network flavoured with cultural priorities. This is main reason, why current U.S. officer training is changed to instruct more how to think than what to think in modern full spectrum operations.  


4.3 Possibilities for national defence against Information Operation attacks


Defending national cyber services and digital information assets is in most cases Joint effort with both public and private sector organizations utilizing together multi-layered security since many of the computer related services, mobile phone access and social media are provided by private companies. Defence measures include protecting national core Internet with name domain and lower level network services. User end should be maintained at high level in Information Assurance since eGovernance services are increasingly important for providing citizen’s basic wellbeing and information. Essential structures like energy production and delivery, finance, retail, health care and logistics are more information based and Just-On-Time functioning thus availability of information services is absolute to maintain citizen’s trust and society’s functionality. 


4.3.1 Defensive measures of Information Core

Defending national core Internet Service Providers (ISP) is a private and public partnership co-operation. Legislation should provide operators both right and responsibility to screen data flows that their core switches and routers transfer. They should be authorized to detect any malevolent software or attack pattern defined by governmental authority and to capture all those packets into cyber oblivion or quarantine. They should be authorized also to disconnect all “polluted” terminals in their network to stop BOTNET  activity and users should be liable to protect and clean their devices. All ISP’s operating within nation should be oblique to participate Computer Emergency Response Team (CERT) action. Government should define policies and architecture at Border Gateways within nation’s networks to balance vulnerabilities of different switching and routing operating systems. Core switches and routers should be managed out-of-band only. To make these measures more effective a regional coalition is the best solution. For example European wide co-operation provides best defence against man-in-the-middle and outside attacks for European Union.


4.3.2 Defensive measures of Information and application services

eGovernance services should be governed by computer architecture for all public sector organizations. All essential services should be distributed to parallelly available computer clouds of both private and public. National information should have preserving policy governing data storages maintained and provided from distributed sites. Information content should be checked with continuous process to prevent any one man manipulation against its integrity. All public and main private information providers should be using strong identity in provision points. All eGovernance services should require strong authentication from their users (something what they are, know and possess). Critical publication points should be distributed extending to different ISP’s and Domain Name Servers (DNS).

Defending national information driven infrastructure should include energy providers, finance organizations, logistics service providers and retail chains. Legislation and government co-operation should provide similar basis of security measures to all stake holders.  These measures should be audited by 3rd parties and neglect of remedy should be sanctioned.

Regular exercise of national public-private partnership computer defence should be arranged annually to hone co-operation skills and widen the understanding of possible scenarios and their effect. Government should also screen organizations providing critical services for their ownership, management, economic situation and long term investment to foresee any structural unbalance. 


4.3.3 Defending public competence in cyber environment

Defending national interests and creating better understanding against Information attacks requires participation of wider range of professional organizations. There should be academic level network for vulnerability studies; operational network with information security service providers; national CERT network providing information and education to citizens and users of digital services; education to information assurance professionals to be able to maintain their competence in changing environment; education started from elementary school to open adult courses on information assurance measures as a part of post-modern citizenship.

When information and communications technology is changing rapidly, there is continuous need to support citizens with multilevel support concerning information assurance issues. This is accomplished best at peer level support, where citizens can access to support provided by people of same age, culture and language from organizations in both private, public and voluntary sector. 

4.3.4 Defending public opinion and citizens spirit

Public opinion is widely distributed and volatile in post-modern western societies. Human perception is based on attitudes created in history and categorising first impresses to these “boxes of presumption”. Education should be focused more on how to think than what to think and to critical thinking capabilities in order to have competent citizens that understand disinformation both in crises and normal situations. Governmental and critical service provider’s public relations functions should be exercised to be fast and accurate in their communication. If adversary has opportunity to deliver disinformation first, it will be the base for first impression. Citizens will categorize first incoming information and there is major amount of additional communication and persuasion needed to have that first impression changed.
All information, which government and national critical organizations are communicating, should be as precise, fast and true as possible to maintain trust of citizens and stay as main information source for their needs. In the future this might need a strong identification of all users in social media and other discussion forums. After all, real world requires also personal identity when one is transacting officially.

4.3.5 Defending national political decision making capability

Political decision making is dependent on competency of politicians, quality of information they are supported with, co-operation of their subject matter support teams, durability of diplomatic relations and direct channels to their voters. All these links and abilities should be secured from both man-in-the-middle and outside attacks. There is no way for any politician to possess required thoughtfulness, insight and foresight to make decisions in crises situations, if it is not being exercised. Scenario analyses with war and role games should be normal routine for key politicians to practise decision making and co-operation between different shareholders both in home and abroad. 
Government should be able to gather information continuously from different sources and fuse it for better current situational picture. There should be collaboration services available and in use between politicians, public agencies and private organizations to create teams for analyses and planning on demand. There should be officials able to manage complex sense-making and planning projects. There should be body of officials to perceive, analyse and define future scenarios for both normal and crises situations. These scenarios should be planned further to detail and possible measures that can be executed on demand. As strategic surprise is most wanted situation for adversary, all leaders should be practising political-strategic level decision making to counter this possibility.


4.3.6 Defending national electromagnetic space and usage of frequencies

Defending national electromagnetic space requires national competency of electromagnetic authorities, co-operation with other countries in the area, capability to detect and locate intrusive transmissions both outside and inside nation’s borders and military measures to put out any transceiver within area of effect. Since private and other governmental functions have developed dependence on electromagnetic frequencies, adversary with some artificial intelligent transmitters or vast number of simple transmitters can interfere majorly all critical functions. Military is continuously training in interfered electromagnetic environment thus they master measures to counter effects. This is something that other agencies and private sector do not. There should be possibility to utilize several parallel channels for mobile access like 3G, 4G, WIFI, SATCOM, etc. for ensuring critical access. This roaming should be defined as base requirement for all mobile services utilized for critical functions. Thus single channel failure should not end up with entire service break down.


5. CONCLUSION


Information Operations have extended in post-modern world mainly because of pervasive information technology and information services both citizens, governments and private companies are dependent of.  But also because individuals and societies are more connected to each other and dependent on continuous flow of information. Since trust is imperative between both in men-to-men and men-to-machine relationships, it is possible target to both inborn and out-born effects projected by possible adversary. Cyber space has introduced totally new way to project effects on information and cognitive levels and as Internet of devices extends it will open channel to affect physical level as well. 

Nation can defend their freedom of Information and availability of Information and Communications Technology Services by either Isolation or Habituation, which are both applicable but require totally different structures, political culture and governance. Information Operations are not only state level measures, but can be utilized at very low levels and by small entities. Single terrorist cell can project its threat against whole nation by publishing videos of small scale physical violence, but effecting vast public attitude amplified by Internet. One man can reveal secrets of decades of work in building clandestine intelligence capabilities. One disconnected application service provider can take down major parts of Internet core switches capabilities with Denial of Service attacks. it requires multilevel preparations of defence executed together in public-private-voluntary sector alliance extending over national borders. Unlike conventional operations information operations are ongoing at strategic, operational and tactical levels even in peace time. If nation is not countering and preparing for these operations, it is an easy target in area of global confrontations and crises.

2014-03-07

A Story of ICT management situation from 1997

By Juha Mattila, Col (ret), studying in Aalto University, Finland 7.3.2014


Contents

- Description of situation in the beginning
- Situation in Application development department
- Three possible courses of action was defined to overcome above mentioned challenges
    1. Isolate application developers from clients, apply more control but simultaneously   
        increase agility to be able to answer client’s requirements
    2. Let situation be as it is but gradually build better readiness to do firefighting
    3. To utilize strict line organization with more midlevel managers and specialized developers
- Summary



Description of situation in the beginning

In 1997 I was one member of the management team for newly assembled Centre of Information and Communications Technology of Finnish Defence Forces (CIS Centre of FinDef). It was the first time when FinDef tried to integrate telecommunications with information technology and to create common architecture with centralized development. There were four main departments in the 1997 started ICT-Centre: R&D, Applications, Infrastructure and Network Operations Centre. These departments were supported by small administrative unit of HR, Procurement, Security and Supplies functions. This paper is based on my subjective perceptions of that time and events as one department head. Thus this paper is not a study but might be used as a source of examples.

It was the time when FinDef Intranets were updated to IP-technology, Data connections reached n x 2 Mbps throughput, all garrisons were provided with Local Area Network, Applications were implemented each in their own server and different security domains were isolated with Virtual Private Network connections and physically separate servers, LAN connections and workstations. Almost all administrative departments/functions in FinDEf were either developing or using their own IT-systems like VAX/VMS/Oracle based application for material registry, MS SQL based application for enlisted HR, VAX/VMS/Oracle based application for reservist HR, UNIX/Oracle based application for C2 and NT/Lotus Notes based application for office automation. Additionally Centre was able to support VAX/VMS based subscriber database system for PABX-system, maintained two major PABX-systems (LME MD and ISDX) and vast network of PDH and SDH technology using both cables and microwave links. All this was managed from one network operation centre that controlled several CIS -units in provinces.

The original management group of CIS-Centre was trying to integrate the development and maintenance of Information and Communications Technology as much as possible, save man hours and introduce first centralized services to all users in Defence Forces. Before establishing the Centre management spend many hours in workshops trying to define main processes for centre to improve its productivity. It was recognized that one of the many problems was legacy attitude for client relations. Application development teams were functioning in isolated pipes with good relation with clients, but with no cooperation over team boundaries. This culture lost all synergy possibilities of utilizing same technology albeit in separate servers. Communications developers had more like command relationship to operator organizations in each military province. All development came from top to bottom and no-one was listening user needs nor their opinions of malfunctioning telephone services. Network operation centre was using very primitive Telecommunications Management Network -based processes but they were not extended to province centres, which were doing all configuration management.

Situation in Application development department

1. Functionally structured department

Application development department was a unit of about 50 experts in application development. They were structured in teams that were very close to process owning department like HR, Materiel, Finance, Readiness, Operations, etc. Together 8-10 teams were dedicated each to development of their process domain. It was almost impossible to rotate experts from one team to another when major implementation phase was done. Starting of a new project required always recruiting. At same time there was a trend, in which every department in Defence was trying to improve their functions by developing at least one information system of their own. This tendency was threatening to multiply the number of developers without clear business case or the return of investment calculations for each application initiative. Every system was developed around individual datamodel, so there was no way to automate datatransfer between systems cost-efficiently. End users were frustrated to retype simple information via each different interface and gradually databases were suppressed by many human based errors. Organization is depicted in following figure 1.



Figure 1: Status of organization in the beginning

Since most of work was done in projects, vendors were also utilized in stove pipe way. Cohesion of each project was good, but process owners were paying similar functions multiple times to same vendor. Information exchange between projects was rare and sometime even denied because of fabricated “confidentiality”. Vendors were more than eager to enforce this kind of ignorance within client organization, but were first to share information at key client relations management level.


2. No architecture or any other framework to guide development

Clients were developing their functions and processes without any framework that could have integrated either processes, functions or their supportive applications. Ideas poured and projects were started almost continuously. New tasks were mixed with existing tasks and often prioritized ahead. One implementation led often further development so small initiative might become a major program. In-house programming was gradually substituted by outsourced programming or tailored commercial of the shelf applications. 

3. Increased interrelated complexity and pace of changes within lifecycle created additional problems

Getting everything together for needs of 120 garrisons became harder each day, when more elements was introduced within same structure. When changes were introduced, the whole structure was in brink to come apart. Operating system update required always testing and usually either porting or reprogramming of the applications. Development of GUI and presenting new information required changes in database and datamodel. Changed components were integrated directly in operation without any order or serious system pretesting. This produced a lot of re-engineering, root cause analysis and reprogramming. 

4. No information sharing across team boundaries

Teams did not know what others were doing. There was no possibilities to learn from others since people socialized only within their domain. Working culture was competitive and team leaders urged their team members for better achievements compared to other teams. Problems reoccurred and feeling of unjust was easily expressed. Some individuals were irreplaceable for specific clients. One programmer did code the whole application and without proper documentation had an opportunity to “blackmail” both client and department head.

5. No unit spirit or identity as a Centre

R&D department tried to produce standards and “best practices” for development and programming but either people were too busy to really adapt them or were too “experts” to utilize anything but their own procedures. Process workshops presented hundreds of specific processes that were almost individual in nature. There was no unanimity over main processes since every team was praising their speciality and superiority over other teams. Overall the centre was a collection of very different and geographically isolated units, that had no feeling of creating anything together.

Three possible courses of action was defined to overcome above mentioned challenges



1. Isolate application developers from clients, apply more control but simultaneously increase agility to be able to answer client’s requirements


Basic concept was to put some distance in client-provider relation, increase common testing and prototyping, centralize vendor management and shorten the duration of delivery tasks. Main changes are presented in next figure 2.



Figure 2: Productivity by isolation and agility


1A. Build isolation between client and developer team without losing good relations

First challenge was how to loosen the relationship between IT-development project and process owner without creating too much friction to otherwise warm relations. A role of process/domain analyst was created to provide process owner more services and holistic information of possible solutions than single team was able to do. Since dedicated team was also restricted to few systems and few technical solutions, process owners soon noticed how much better service they were getting from more experienced and initiative analysts. 
Analysts introduced other developer teams and their products to client, which in the end served better client, but also shared work over developer team boundaries. Both productivity and effectivity of IT-development department improved with this change.

The change required that best people was appointed to analyst roles and they were involved in all solution and technology improvement processes. Also their understanding of processes was improved with training and visits to client’s exercises and facilities. In the end it came down to personal relationship between client representative, analyst and leader of legacy team. If there was misunderstanding, power struggle or otherwise wrong attitude, the relationship was neither productive nor effective. In order to settle these wrinkles, department head had bi-annual client meetings, where all issues were tackled.

1B. Add control but utilize shorted iterative periods to deliver

Second challenge of long projects and inflexibility was resolved by introducing shorter periods to produce a required service. Annual projects were gradually divided into smaller windows: half a year – quarterly – monthly. This enabled department to utilize resources more flexible, because development teams were able to execute other tasks while their primary client was busy elsewhere. Some idle team members were also “rented” temporarily to other teams that had periodical pressures. This enhanced load balancing and in longer term helped to lower some boundaries between legacy teams.

Prototyping and modelling was also introduced in application development to improve understanding of requirements in one hand and to produce possible solutions on other hand. This procedure created the first iterative approaches that were well received by clients especially in user interface development.

Some teams were unable to adapt to shorter “sprints” and they went behind their process owner to get support to their special and untouchable status. This was mitigated by long discussions with client and increasing transparency of team’s work.


1C. Intensify shared testing, prototyping and integration

Since infrastructure and middleware development was outsourced to another department, there was a big change in testing and integration procedures. Infrastructure department provided an updated platform with connectivity, operating systems, database applications and necessary middleware like session encryption. Today this is called platform as a service (PaaS), but in those days it was just rationalizing technical maintenance and development by dividing responsibility where it was reasonable. Infrastructure department hosted laboratories where application department went to execute integration tests and functional tests. Late 1990’s interdependence started to affect in IC-technology and gradually system of system testing was mandatory to sustain availability of integrated ICT-systems.

Sometimes vendors were invited to demonstrate their new technology and solutions side by side with existing technology, so experts were able to capture direct information on new developments. Later this was extended to wider demonstration exercises with multiple vendors on site same time.

Infrastructure department was forced to establish fixed delivery timings for changes in operational systems, which introduced natural change and release management. This was good also to application development teams since they had series of change windows to integrate, to get approved and to have released their new versions.

Some application teams were unable to utilize common platform. They were saying that their system is too tailored to run over standard and security hardened platform or that their system is so confidential that no one else should have any information of their configuration. All this was mainly signs of misunderstanding or unwillingness to adapt new procedures. Some unprofessionalism and quality failures also surfaced during these testing sessions. 


1D. Have common control over vendor utilization

A separate acquisition department was created to take care of all procurements and purchases. Fortunately this department included also best overall understanding of markets and different services vendors were providing. This enabled close cooperation between development department and acquisition department without normal friction caused by power struggle, unclear process or different language. 

Procurement process was improved both in speed and quality. Individual licences were bundled together and new enterprise license agreements were negotiated.  Mass products like desktop applications were standardised, all units under ministry of defence was taken under the same license agreement, which brought both agility in application usage and savings in total costs of desktop applications.

Some teams were too close with their “royal” provider to be able to utilize improved vendor management. They were saying that only current vendor was able to provide their “special” needs. This is normal to human societies as social relations are sometimes stronger than logical realism.


1E. Stick change with new measures

There is always human behaviour behind all processes and procedures. A manager with strong will and authority may be able to sustain new processes but if they are not adapted as every day behaviour, old habits will return when authority vanishes. New behaviour has to be rewarded and old behaviour has to be sanctioned in visible ways or else old habits will emerge again. 

Annual service contracts between development department and process owners was introduced to give both short and long term goals to everyday work. Annual team member award was given to experts that had been both socially and professionally productive members of their basic team but also in supporting other teams.

Best way to stick change is to utilize continuous improvement measures (LEAN management), where both individual, team and unit situation is displayed to all stake holders. This transparent measurement should not be used only to drive throughput, but more to drive initiatives to improve processes and methods of work.

After transformational leader was rotated to another positions some of the teams returned to their old habits, because no one was requiring any more new procedures. A mere transactional manager is not enough to stick changes if they have not been adapted as part of normal behaviour.


2. Let situation be as it is but gradually build better readiness to do firefighting


This course of action is not after major changes but rather supporting continuous development and evolutionary approach to allow people, organizations and processes to gradually improve their productivity. This approach may be utilized when people and culture of organization are not ripe for major changes. The structure of this kind of organization is depicted in following figure 3.




Figure 3: Productivity by enabling gradual improvement

If there is no way to prevent adhoc tasks coming from process owners directly to developers, one might be able to improve teams “fire fighting” capabilities. On the other hand major projects should be also executed, so agility is needed to get both adhoc and long term tasks done. Sometimes organization culture is unable to change because of deep habits of functional silos or earlier attempts of change have created spirit of failure and fear. These situations needs very small steps, that people do not see them fearful or unsecure and series of visible quick wins to build courage for advance.


2A. Backoffice support to gain from centre of excellence effects

If teams are too deep in their “fox holes” to change, it might be possible to create small backoffice team of several experts to support others. This backoffice team may be only a pool of high skilled resources that are employed to support other teams when load is overbearing. Better situation would be that backoffice is a real team, that can outperform the legacy teams and show to individual workers an example of new behaviour. Recognized teamwork may tempt frustrated but good workers to join and gradually culture starts to change. If backoffice workers are best experts, they will also gradually start cooperation over team boundaries by spreading ideas with peer-to-peer relations. Some legacy team leaders may recognize from this, that with sharing and cooperating they gain better results. Some legacy leaders will perceive this hostile action and initiate some countermeasures to sustain their power.


2B. Add cooperation by utilizing infrastructure department and their integration environment

Bringing experts together to solve their shared problems also enables transformation of siloed culture. In this case infrastructure department build and maintained laboratories for full ICT-structure and all application were forced to be tested before delivery to operation. In controlled testing environment teams were forced to co-work with infrastructure teams and gradually with their “competitive” application development teams. If testing was not controlled, there was possibility to create more confusion and frustration than productive cooperation. This required expertize from line managers and maturity from their development change management process.

Keeping development team responsible through the whole fielding time of their products integration and quality, helped teams and their members to understand their liability and learn to improve their programming and testing processes.


2C. To enable agile teaming with added situational awareness by task boards and change metrics for rewarding people

To tackle the lack of awareness, a task board was introduced. This tasks board was structured to present ongoing development tasks and their status. Teams were responsible, in Kanban style, to update board and task proceedings each day. In the end of each week team heads and department management gathered around boards to review situation. These sessions included minimizing Work-In-Process (WIP) by allocating backoffice resources and by redirecting tasks over domain barriers. Gradually this increased awareness within the whole department, introduced skilled people over team boundaries and created more spirit as a development unit.

Within teams this enabled change of responsibility from individuals to teams, when all members saw situation and workload. There was no need to ask or require help, since everyone available saw who is needing help at time. Human Resources key performance indicator were also changed to focus more on team outcome than individual results. When helping others improved everyone’s performance appraisal, team work seemed more fruitful even to most competitive programmers.


3. To utilize strict line organization with more midlevel managers and specialized developers


This course of action is relying on traditional line organization with functional units and authoritative managers. It will create control when situation is almost chaos like. It will also add administrative marginal and kill some initiative and responsibility at expert level. The structure of this organization is depicted in following figure 4.


Figure 4: Productivity by control, functional centralization and management

More authoritative approach is working in situations where people have lost trust to others, culture of the workplace is more like “kill or be killed” or personal approach is more like “I am great, but others are not”. In military environment especially this line organization approach is in very core of the culture and adapted behaviour. Biggest challenge is to choose leaders that really know what teams are doing and possess also some social intelligence to cope with different people. This is especially difficult in expert organization. For people this is the easiest and comfortable structure since they are not responsible but their own behaviour. Superior takes responsibility of tasks, processes, quality and outcome. 


3A. All tasks are controlled via line managers, no individual is allowed to receive tasks directly

Line managers took all responsibilities to communicate both with clients, vendors and other units. All tasks were given by managers and control was strict for both individual behaviour and contribution. This did stabilize situation and improved productivity of simple tasks. The negative side is that it also made individuals more passive and unable to execute complex tasks in adhoc situations without constant control by manager. So team silos were taken down but the spirit for teamwork was also lost. Some of the previous team leaders resigned because of lost status and authority. Experience and client relations was lost with them. Most negative situation was created if client hired former team leaders as their consultants since ex-leaders had either very negative approach to former department or had intentions to regain their team lead status as the project lead assigned by client. When handpicked initial line managers are being rotated, whole unit might fall into non-productive phase since drive was based on leaders personality and expertize.


3B. Everyone is reporting by hours, tasks and outcomes to management system

To improve managers control over tasks and individual contribution, a reporting systems was introduced where each worker noted their tasks, hours spent and output delivered. This enabled managers to get quantitative information and give both positive and negative feedback. Workers felt that this reporting was violating their earlier freedom and increasing unnecessary administration. A scoreboard of executed tasks was introduced to give direct feedback and enable social pressure. This improved competition amongst some workers, increased stress to some workers and was utilized untruthful way by some workers. Scoreboard did not have same effect as Kanban board nor was it a best base for Lean development but it initiated a controlled change of behaviour.


3C. With more specialized developers their throughput is increased thus productivity increased

Within bigger units some experts gained peer appreciation by executing more tasks with better quality. When managers were both recognizing their improvement and giving them more challenging tasks, their well-being within working society improved and they become new role models for other developers. As original Taylorism has proved, direct feedback to developer increased his productivity and specialization increased throughput. If rewarding was not positive and meeting individual expectations, a hard working developer become stressed, frustrated and was finally seeking other jobs. 
Through recognized individuals there was better situation to start building team work than when work society is in chaos and there is no trust between people. Team work beats individual based productivity especially in initiative intensive and agile working conditions.


3D. To utilize lean methods to increase productivity

Managers were trained to divide projects to smaller tasks and introduce them independently to developers. This increased integration problems which was managed by both adding overall integration team and by defining development tasks per singular tread of capability. Shorter task duration introduced new kind of flexibility, since line managers were able to reprioritize more frequently the resource utilization of their unit. It also helped to balance workload more evenly among developers although there was and remained to be different productivity levels within development teams. 
Since productivity remains to be both personal, social and expertize issue, a gradual key performance indicator structure was set to drive developers towards initiative and cost-effective solutions rather than continuous patching or reproduction of old code.

Summary


Since there is no one best practice to solve such large variety of challenges, we ended up to utilize all above explained courses of action tailored to each situation, unit and client. This was because teams were at different maturity level, there was no unified working culture and projects were in different phases of development. Neither was transformation planned but rather a series of trial, error and final success steps. Leaders were also different since others were more technical experts than leaders and some more transactional than transformational. With tight cooperation the management team was able to adjust transformation as it was implemented in parallel with balancing essential ongoing development work and building future capabilities.

Later all emerging capability was destroyed by more traditional military management which took over when transformational leaders were rotated to other tasks. They did not feel secure with ongoing transformation but implemented basic line organization supported by staff. They thought that a staff could manage all planning, client relations and vendor management with another feature of Taylorism – central planning. They killed all initiative from developer level and gathered responsibilities from lower level to unprofessional staff level. They withheld all decision at upper level and supressed middle level manager’s initiative and responsibility. In one year’s time the productivity of whole centre was down to half from previous year. Process owners were unsatisfied and starting their own application development projects leaning heavily on vendors capabilities. Garrisons were forced to increase their own IT personnel to fix availability and integration problems. Shareholders were starting to see Centre more as burden in budget rather than value adding organization. All this happened because new management was not educated enough to client – provider – subcontractor value chain management. They did not understand the difference or management between stable functional production and producing one time solutions in to complex systems environment with high expertise team work of both in-house and outhouse resources.


2014-01-13

Some thoughts on vulnerabilities of information and communication technology

Situation

As information technology has become more intelligent, Internet of Things is extending as we speak and major part of ICT-production has gone after cheap labour and vast investments in Asia, there is again hype to talk about hidden backdoors in foreign manufactured devices. USA government has criticized Huawei being too close to Government of China, Russian papers are telling tales of spying chips in Chinese made household devices, alleged backdoor has been found in U.S. manufactured router, Smart TV from South-Korea has been sending user information to Internet, U.S studies have proved that manipulation of IC-production can effect random generators quality. 

This reminds of times when everybody was worried when MS NT operating system was trying to contact Internet from closed network, everybody new that U.S. Military Foreign Sales devices included downgraded encryption and backdoors, there was story of backdoor in French missile that was utilized in first Gulf war. At that time military procurement was requiring to have source code of a product to check any malevolent behaviour. 

The fact remains that no single producer system is 100% proof against vulnerabilities, weaknesses or malfunctioning parts, whether they are intentional or happenstance. Only way to be more certain of integrity of systems is to do them oneself with huge risk of unintentional vulnerabilities or utilize open source code and hope that enough experts have been playing with code to find major problems. If this is not possible one can mix different products together to balance their individual weaknesses and require as open management, synchronizing or signalling interfaces as possible. For military user it is not problem if single device is malfunctioning but a catastrophe if whole fleet of devices is not available when needed. One should cut these single vendor chains if possible and sometimes do that even at cost of more arduous maintenance or operation.

What to do

There are some things one can do to help mitigate risks as follows:

Create reference environment, a small world of every device configuration found in actual operative system of systems. 
  • With this reference environment one can do number of tests to find out how each device is behaving in abnormal situations.
  • Every update or new product should undergo vigorous testing before they are delivered in to operative environment.
  • Some wireless devices should be tested in Faraday’s cache in case of unintentional transmissions and find any undefined transmissions in echoless room.

Conformance or type testing to find out any anomalies differing from specification:
  • Test linearity of device against some references. This is to find any anomalies between input and output compared to other similar devices.
  • Test with overload to find out behaviour in asymmetric circumstances
  • Test with changed inputs in all ports to find unspecified behaviour
  • Test with exposure to electromagnetic radiation to find level of immunity to outside fields
  • Test with High Powered Microwave to find out vulnerability to excess radiation
  • Protocol testing to find behaviour with other devices that are assumed to follow standard.

Mix system structures of different providers. Since no ICT –product or provider is 100% trusted through whole life cycle, it is advised to utilize devices of different vendors together:

  • At physical layer one can utilize different fibres, links or wires to balance any singular weakness
  • At link layer one should rely on open standards and mix different manufacturers devices if possible or utilize parallel mediums with different links together to provide maximum availability
  • At network layer mixture of routing or switching devices may be combined but problem may arise with end-to-end management or with proprietary functions
  • Cyber defence in depth requires always multiple structures at higher layers. These structures mix different operating systems, different databases, different middleware and even different programming together with domains of cyber defence. One should try to cut any session at least once.

Build integrity with encryption. Sometimes implementing encryption at special ways may nullify backdoors that try to gather information.

  • All media and links can be tapped so strong encryption is needed at bulk transfer level. It might be done at wavelength multiplexing level to enable high throughput or at link level to enable different manufacturers. 
  • Network level encryption will protect from lower layers sniffers.
  • Session level encryption is good when roaming among various access services. 
  • Content based encryption is best to protect information itself but it does not protect systems from insiders, man-in-the-middle or backdoors.

Take care of all auxiliaries as well as main system.

  • Management system is most obvious avenue for any logical attack so management systems should be checked and tested even better than actual nodes.
  • Electricity is a proponent avenue for many effects or information gathering. Any power supply should be tested thoroughly and inbound electric wiring analysed for excess modulations.
  • All wiring should be tested time to time for additional devices that have been installed during or after implementation of actual system.
  • All AC, water, piping or drainage systems may be used as platform for malevolently behaving functions.

These are just some examples that can be done in mitigating single manufacturer risks in military ICT -environment.