GeoIntelligence Jul-Aug 2014

Page 1

ISSN 2277 – 3126

rni NO. UPENG/2011/37063

Vol. 4

Issue 4

`100 US$ 10

JUly – August 2014

Weapons of

Terror


Streamline your intelligence planning from beginning to end with unparalleled search functionality, exploitation capabilities, and product creation for the GEOINT community. Discover your data and reference materials with GXP Xplorer® . Search multiple data stores across the enterprise with a single query to locate imagery, terrain, text documents, and video. View data in any format in a Web browser with GXP WebView. Exploit data with SOCET GXP®to create geospatial intelligence products for planning, analysis, and publication using advanced feature extraction tools, annotations, and 3-D visualization. Deliver actionable intelligence when it counts with the GXP enterprise solution.

THE GXP ENTERPRISE SOLUTION.

MAXIMIZE YOUR PRODUCTIVITY – FROM DISCOVERY, TO EXPLOITATION, TO PRODUCT GENERATION.

Imagery courtesy of DigitalGlobe

www.baesystems.com/gxp


Inside

Theme

WEAPONS OF TERROR GUEST ARTICLES

ARTICLES

Weapons of Terror

Counter RCIED Systems

Gp Capt JV Singh (Retd) Terrorism is a major threat facing the world today and the possibility of Weapons of Mass Destruction falling into the hands of terrorists is a grave concern for security agencies. The article talks about various such weapons and explores the possibility of their use by terrorists

Lt Gen (Dr) AKS Chandele The technological sophistication of present day RCIEDs render their detection an extremely difficult proposition, thus making them a lucrative weapon for terrorists, and a nightmare for security agencies

Pg 20

Pg 16 Currency of Terror

INTERVIEW

Lt Gen PC Katoch (Retd)

Publisher Sanjay Kumar Managing Editor Lt Gen (Dr) AKS Chandele (Retd) Executive Editor Bhanu Rekha Product Manager Harsha Vardhan Madiraju Product Manager (Geointelligence) Aditi Bhan Sub Editor Trainee Sanskriti Shukla Senior Designer Debjyoti Mukherjee Circulation Executive Vijay Kumar Singh Owner, Publisher & Printer Sanjay Kumar Printed at M. P. Printers, B - 220, Phase-II, Noida - 201 301, Gautam Budh Nagar (UP) India Publication Address A - 92, Sector - 52, Gautam Budh Nagar, Noida, India Editor Sanjay Kumar

Pg 25 Space Based Systems and Their Threat Matrix Maj Nikhil Kapoor

ASAT weapons are being developed to destroy hostile satellites and ensure that a country’s own satellites are able to function without any interference. This trend is likely to pose a threat to any country, in hour of crisis

Pg 30

A - 145, Sector - 63, Noida, India Tel + 91 120 4612500 Fax + 91 120 4612555/666 Geospatial Media and Communications Pvt. Ltd. does not necessarily subscribe to the views expressed in the publication. All views expressed in this issue are those of the contributors. The publication is not responsible for any loss to anyone due to the information provided.

EVENT REPORTS ITEC 2014

The three-day conference is dedicated to military training, education and simulation

Pg 36 GeoIntelligence India 2014

The eighth edition of conference was held at New Delhi recently

Price `100, US$ 10 Geospatial Media and Communications Pvt. Ltd.

Bob Braham, CMO, SGI Pg 28

REGULAR SECTIONS Editorial........................................05 News..............................................06 Events............................................35 Image Intelligence .....................42

Pg 38

3 | Geointelligence JULY - AUGUST 2014

Chairman MP Narayanan

With asymmetric warfare becoming a potent weapon for countries to use against its adversaries, chances of terrorists using hi-tech weapons have increased manifold. Terrorism thus has become the currency of power


Want to update your communication details? Reach us at info@ geospatialworld. net to continue receiving the magazines regularly

Great Subscription Offer

600*

FOR 1 Year

Other Exciting Offers

No. of Issues

You Pay

2 Years

12

1200

3 Years

18

1800

5 Years

30

3000

Subscribe Online at www.geospatialworld.net 


T

he last few decades have witnessed an increase in incidents of terrorism, which is now a global phenomenon. According to statistics for 2013 available in public domain, there were 9,707 terrorist attacks resulting in the death of 17,800 people and injury to another 35,200. In addition, 2,990 people were kidnapped or taken hostage. Some countries are more adversely affected. There is hardly any country which has not suffered, and rarely a day passes when an incident is not reported from some part of the world or the other. The Afghanistan-Pakistan region, a hotbed of terrorism and jehadi fundamentalism, accounts for more than half of these terrorist attacks. India has been a victim of attacks by state-sponsored terrorists, fundamentalists and Left wing extremists. While most attacks are in the form of bombs being exploded in public places, buses, trains and airplanes, some attacks have specifically targeted security forces and even individuals such as attacks on former Prime Minister Rajiv Gandhi and Chief Minister Beant Singh. Terrorists employ a variety of weapons to kill or inflict physical injury and, more importantly, to instill fear in the minds of the target population. These range from crude bombs to small arms, rocket launchers and mortars, vehicle and aircraft attacks, chemical and biological weapons. Some terrorist groups claim to have control over nuclear weapons also. Improvised Explosive Devices (IEDs) and Remotely Controlled IEDs (RCIEDs) in particular, are by far the weapon of choice of terrorists, because of the relative ease of fabrication, operation and ability to avoid detection. The IED is an indiscriminate killer and the person who plants it can never be sure as to who and how many will be his victims. All advantages are stacked in his favour, the choice of time, place, target, type of explosive and delivery mechanism. IEDs are no longer mere crude bombs, but are very sophisticated devices designed by experts, who ensure that they cause maximum damage, can easily be concealed and detonated using a variety of means. The detonation can be triggered either by a timer mechanism set to explode the device at a predetermined time or pressure actuated by a person or a vehicle passing over it. It can also be triggered remotely using an electric connection, a radio or a mobile phone.

Lt Gen (Dr) AKS Chandele PVSM, AVSM (Retd) Managing Editor

ajay@geospatialmedia.net

Governments spend considerable time, effort and resources on counter terrorism, a task for which they seek cooperation of all nations in the region. As IEDs become more sophisticated, it is a challenge to devise methods to detect and neutralise them. Security agencies must ensure that they remain technologically abreast and are able to effectively counter the terrorists. Detection is a combination of human and technological methods including physical body search, use of sniffer dogs, detectors and scanners. Defusing an IED is a specialist activity undertaken by trained experts of bomb disposal squads. Creating awareness among the public is essential to assist in foiling IED attacks. They must inform security agencies on the slightest suspicion of a threat — better to be safe than sorry. What can be more dangerous than an explosive in the hands of a fanatic suicide bomber?

5 | Geointelligence JULY - AUGUST 2014

Editorial

RCIED: TERRORISTS’ WEAPON OF CHOICE


news

to purchase the M-TADS/PNVS system. Fielded in 2005, M-TADS/PNVS provides Apache pilots with long-range, precision engagement and pilotage capabilities for safe flight during day, night and adverse weather missions.

6 | Geointelligence JULY - AUGUST 2014

US DoD Announces New Director of NGA The Department of Defense, US, has named Robert Cardillo as the next director of the National Geospatial-Intelligence Agency (NGA). The current director, Letitia A Long has announced her decision to retire later this year after four years at the helm of the agency and more than 35 years of government service. Under her leadership, the agency shifted from providing static products, such as maps, to providing geospatial intelligence services that enable users to access information which has time and place context in a variety of formats, in real-time. The agency developed ‘Map of the World’ which for the first time presented an integrated view of collection assets from across the intelligence community (IC); mapping information for military operations; geospatial intelligence observations; and NGA analytic products, data and models.

Lockheed Martin Bags Contract for US Sensor Systems The US Army has awarded Lockheed Martin a USD 80.6 million production contract for the Modernised Target Acquisition Designation Sight/Pilot Night Vision Sensor (M-TADS/PNVS) on the AH-64 Apache helicopter. The contract includes production of eight targeting and pilotage systems and spares for the US Army and nine systems for the Indonesian Army. Indonesia is the 13th international customer

Salient Awarded Prime Training ID/IQ Contract Salient Federal Solutions has received an award of a prime ID/IQ contract by the Space and Naval Warfare Systems Center Pacific (SSC Pacific) Training Development Support Center (TDSC). The contract supports the technical training development and instruction on US Navy C4ISR networks and systems. The indefinite-delivery/indefinite-quantity (ID/IQ), cost-plus-fixed-fee (CPFF), multiple-award contract has a potential contract value of USD 34 million. Salient is one of four awardees that will compete for task orders under the contract. SSC Pacific is the Navy’s premier research, development, test, and evaluation (RDT&E) laboratory supporting C4ISR. Under this contract, Salient will provide interactive course development, training plans and documentation, and curriculum development and instruction for the SSC Pacific’s network systems and products.

Yamaha Motors, Northrop Grumman Join Hands Northrop Grumman Corporation and Yamaha Motor Corporation, US, are

collaborating to develop and market an innovative small, unmanned autonomous helicopter system. Called the Rotary Bat (R-Bat), the new system merges a proven airframe produced by Yamaha, with the latest autonomous control and intelligence-gathering technologies for use in urban environments for applications such as search and rescue, power line inspection and forest fire observation. The R-Bat has joined the existing Bat family of unmanned aircraft systems used for tactical intelligence, surveillance and reconnaissance missions, according to George Vardoulakis, Vice President for medium range tactical systems, Northrop Grumman. The R-Bat is based on the Yamaha Motor RMAX remotely-piloted unmanned helicopter that is currently used for industrial and farming applications.

Lockheed Martin Unveils Vector Hawk SUAS

Credit: Lockheed Martin

Lockheed Martin has unveiled Vector Hawk SUAS which it says addresses a broad set of unique missions and operating needs within a single system. With a gross takeoff weight of only four pounds and a vertical profile of only four inches, Vector Hawk boasts best-in-class payload capacity, speed and endurance, as per the company. According to Kevin Westfall, Director of Unmanned Solutions at Lockheed Martin’s Mission Systems and Training business, “The Vector Hawk can be field reconfigured to multiple missions including fixed-wing, vertical takeoff and


NEWS Exelis Unveils New Wide Area Airborne Surveillance System Exelis has unveiled a wide area airborne surveillance system called CorvusEye 1500 that can capture colour video from multiple views over a large area. The persistent surveillance system was developed primarily to support the needs of law enforcement, defence and military, but could also be used in other areas, such as land management or the protection of wildlife and critical infrastructure. The CorvusEye system can track movement that may be connected to potentially hazardous or illicit activity, as well as other trends like migratory or invasive wildlife behaviour. The CorvusEye system includes a colour electro-optical sensor that can monitor day or night over 3 kilometers in circumference. It also enables rapid decision-making using an embedded analytical framework developed by Exelis called CogniSense, which processes data from multiple sensors and provides information to users in real-time. CorvusEye and CogniSense are examples of products that Exelis offers as part of its strategic focus on intelligence, surveillance, reconnaissance and analytics. A single CorvusEye sensor can serve up to 10 different area

views simultaneously providing closeup details with streaming footage. The system can also quickly gather critical intelligence in support of investigations using archived footage. As an end-toend system, CorvusEye can be used on manned and unmanned platforms and offers ground station software for live data streaming to mobile devices.

Long Endurance UAVs: JUMP-25, CAT-25 Arcturus UAV recently disclosed development efforts on their JUMP-25 and CAT-25 long endurance UAVs. The JUMP-25 will have a larger fuselage and wingspan and more powerful VTOL and tractor motors than JUMP-15 and JUMP-20 models, said the company. The CAT-25 will be a larger version of the company’s T-20 catapult launched UAV. JUMP-25 and CAT-25 UAVs will integrate Cloud Cap Technology’s new TASE500. The TASE500 is believed to exceed the capabilities of the venerable L3 Wescam MX10. It is a 10 inch, 27 lb. imaging payload that provides an All-HD, fully integrated solution utilising ViewPoint Tactical PED software with market leading SWaP. In addition to the TASE500, the new air vehicles will be capable of simultaneously carrying other payloads such as the WGS Europa SIGINT package and the Artemis SlimSAR. Arcturus will use Cloud Cap technology’s new Piccolo III autopilot with triple redundant IMU and auxiliary mission payload processor. The new JUMP and CAT air vehicles will be integrated with Arcturus’s compact, portable ground control station which allows control of any of the company’s air vehicles. Endurance on a fully loaded CAT-25 is estimated at 14 hours. With a light payload, endurance will stretch to 20 hours. JUMP-25 carrying the TASE500

has a planned endurance of 12 hours. Arcturus JUMP air vehicles take off and land vertically with quad rotors mounted to the wings. JUMP air vehicles require no runway or launcher for operation.

Exelis to Provide CWI Subsystems for F-16 Aircraft Exelis has received a follow-on contract valued at USD 8.4 million from Lockheed Martin Aeronautics Company, to supply Continuous Wave Illuminator (CWI) subsystems for F-16 Fighting Falcon aircraft. The Exelis CWI subsystem is a special-purpose transmitter that works with the F-16’s fire control radar and mission computer to provide guidance for semi-active missiles. Using radio frequency energy, the system illuminates airborne targets to increase accuracy and ensure the missile finds its intended target. The Exelis CWI subsystem uses the latest technology for its high-voltage power supply, digital control, microwave signal generation and power amplifier circuits; it is substantially smaller and lighter than

Credit: Wikipedia

similar legacy subsystems used on older F-16s and other fighter aircraft. The CWI system is one of several Exelis protection suites developed to enable domestic and international customers to perform their critical missions.

WavePoint to Offer Secure Wireless M2M Platform FreeWave Technologies has unveiled its

7 | Geointelligence JULY - AUGUST 2014

landing (VTOL), and tilt-rotor enabling VTOL with transition to fixed wing flight.” Vector Hawk features fully autonomous flight, landing and fail-safes. It is inaudible at operational slant ranges. The data link features a high bandwidth software defined radio, mesh networking (including 3G, 4G, and LTE cellular), over-the-air reconfiguration, and is capable of employing a variety of waveforms. With an open architecture, reconfigurable variants, adaptable data link, and scalable payload, Vector Hawk is engineered for unmatched capability.


8 | Geointelligence JULY - AUGUST 2014

news new WavePoint family of solutions for government and defence applications. It offers high-speed connectivity to support bandwidth-hungry applications. It is flexible enough to adapt to changing tactical needs, and also provides military-grade security capabilities. The new wireless M2M communications architecture from FreeWave delivers secure, end-to-end, broadband wireless communications and comprises the multi-channel WavePoint 10e platform and several single channel WavePoint 20e modules being released throughout the remainder of 2014. As per the company, the comprehensive product suite supports command and control of unmanned systems, nuclear, biological and chemical remote sensing, dismounted soldier and vehicle tracking, unattended ground sensors, remote military infrastructure monitoring, guided parachutes for supply drops, perime ter security, remote target acquisition and more.

and battle management, and even as a backup in GPS-denied environments, keeping soldiers safe and out of harm’s way wherever they travel.”

KVH to Supply TACNAV Systems

of USD 11.6 million, calls for Elbit Systems of America to provide helmet display tracker system (HDTS) kits on the aircraft. The HDTS significantly improves flight safety by providing crew members greater situational awareness with enhanced night vision, weapons sighting, and weapons control capabilities, said the company. Additional HDTS capabilities include improved safety in degraded visual environments, such as brown out, fog or weather-related conditions. Using 3D symbology and geological digital terrain information, HDTS provides pilots visual approach and drift cues so they know where they are in relation to the ground and obstacles. The contract will be completed in about two years. The second contract, in the amount of USD 2.5 million, will add tactical video data link (TVDL) technology to the helicopters. TVDL provides aircrew information needed to detect, identify and quickly respond to threats. The information can be received via onboard sensors or from external sources such as ground troops or other aircraft. Additionally, the information can be communicated back and forth, so all forces in a given area, on the ground or in the air, will have the same intelligence data when making mission-critical tactical decisions. The contract will be performed over a 15-month period.

KVH Industries has received a new order for its TACNAV tactical navigation systems for use by an international military customer in an armoured vehicle application. The order is valued at more than USD 5.2 million. Shipments for this order are expected to begin in the next six weeks, with all services being completed by the end of September 2014. Programme management, engineering services, and installation support will be provided as part of this order. TACNAV military vehicle navigation systems provide unjammable precision navigation, heading, and pointing data for vehicle drivers, crews, and commanders. It can also serve as a heading and position source for situational awareness. As per the company, TACNAV Light and TACNAV TLS systems feature compact design, continuous heading and pointing data output, and flexible architecture, while also providing extremely accurate dead reckoning navigation regardless of GPS availability. According to Dan Conway, Executive Vice President of KVH’s Guidance and Stabilisation group, “TACNAV navigation solution is an important tool for US and allied warfighters, providing precision navigation as well as coordination of vehicles in critical situations. The system serves as a crucial resource for navigation

Elbit Systems to Upgrade AH-1W Attack Helicopters Elbit Systems of America, has been awarded two contracts, totalling USD 14.1 million, supporting the US Marine Corps’ upgrade of their Bell AH-1W attack helicopter fleet. One contract, in the amount

Credit: www.superbwallpapers.com

CACI Wins Task Order Contract to Support Data Networks CACI has been awarded USD 21 million task order contract to provide business, logistics, and engineering services for US Army Product Director (PD) Initialisation (formerly Product Director Tactical Network Initialisation). The contract is for one base year and one option year. PD Initialisation provides data products in support of network operations and connectivity for the Army Battle Command System, which is a digital C4I system that includes a mix of fixed, semi-fixed, and mobile networks and is designed for interoperability with US and coalition C4I systems. CACI’s services will help advance the integration of systems and tools for PD Initialisation and migrate them to a more fully automated environment, said the company. This will allow Army units to take full advantage of the capabilities provided by their battlefield communications networks throughout all echelons, from battalion through theater commands, it added.

Leidos Awarded Three Competitive Task Orders Leidos has been awarded three competitive task orders by the Space and Naval Warfare Systems Center (SSC) Atlantic to provide engineering, integration and training services. The cost-plus-fixedfee task orders have a one-year base period of performance, two one-year options and together a total value of approximately USD 54 million, if all options are exercised. The task orders were awarded under the Battlespace Awareness IDIQ (indefinite delivery/indefinite quantity) Contract Number N65236-13-D-4861. SSC Atlantic is a Department of the Navy organisation that works to meet the nation’s demands for uninterrupted vigilance, fail-safe cyber security, adaptive response and engineering excellence by delivering secure, integrated and innovative solutions to many naval, joint and national agencies. Under the task orders, Leidos will provide services to SSC Atlantic in support of the DCGS-N programme, including engineering and integration, information assurance, training, configuration management, logistics, help desk support and site support of the Joint Concentrator Architecture (JCA).


Lockheed Martin has received a USD 69 million contract to support the United States Coast Guard’s efforts to enforce maritime sovereignty and address atsea threats. Through this contract, the company will provide the C4ISR system for the United States Coast Guard’s seventh National Security Cutter (NSC), the future USCGC Kimball. Lockheed Martin’s C4ISR system offers comprehensive, real-time situational awareness, commonality and interoperability, which enables a greater collection and sharing of maritime data. It allows the crew to see vessels in distress or targets of interest; collaborate with other Coast Guard air, sea and land assets; and act on the most current information available.

Offshore Floating LiDAR AXYS Technologies has completed pre-commissioning of a WindSentinel platform for the United States Navy project to validate an offshore floating LiDAR wind resource assessment system. AXYS teamed up with Sound & Sea Technology (SST) as well as DNV GL to secure the US Navy contract and supply the system. The LiDAR underwent an initial six month side by side testing process overseen by DNV GL in 2013. Upon passing this test, the LiDAR was integrated onto the WindSentinel platform. AXYS supplied the WindSentinel floating LiDAR system, which accurately measures offshore wind speed and direction up to the blade-tip heights of 200m. The WindSentinel has recorded a number of world firsts, including the first commercial deployment and the most remote LiDAR offshore wind resource assessment ever conducted, 36 miles offshore, said

the company. SST will provide overall management of the programme, coordination with the Navy, ocean engineering expertise, environmental planning and installation support. DNV GL will provide an independent evaluation of the validity of the floating LiDAR system by identifying measurement requirements and metrics to qualify the system for use in wind power development. These metrics will be adapted from DNV GL’s recommended practice for validating LIDAR measurements, ‘DNV Sodar and Lidar Guidelines.’

Intergraph Awards Honour Leaders At HxGN LIVE Intergraph Security, Government and Infrastructure’s (SG&I) 2014 Icon Award winners were announced at HxGN LIVE held recently in Las Vegas. The 2014 Icon Awards recognised three SG&I customers for their innovative application of technology using Intergraph software. This year’s winners are Bavarian Police, CET and Office of Unified Communications PSCC. With more than 29,000 employees, Bavarian State Police is one of the largest police forces in Germany. An Intergraph customer for more than 11 years, Bavarian State Police implemented Intergraph’s I/CAD solution across nine unified command centres to ensure emergency services all across Bavaria can access information. The agency also implemented GeoMedia Smart Client, Intergraph’s spatial data platform, which allows them to integrate spatial data into their command and control system. CET is the traffic engineering company for the City of Sao Paulo, Brasil, the largest city in the Americas. Working with Sisgraph, they implemented a computer-aided dispatch system from Intergraph to coordinate field personnel and improve incident response times. CET is now handling 13,000 events every day through their CAD system. The Office of Unified Communications PSCC serves to protect not only the citizens of Washington, D.C., but also thousands of federal government employees and millions of visitors. A long-time Intergraph CAD customer, the OUC also utilises Intergraph’s Incident Analyst to analyse significant past events and make decisions going forward on ways to improve response.

Mutualink to Boost Soldier Communications Credit: AXYS Technologies

Mutualink has developed a new data gateway to enable US and allied soldiers with

disparate communication networks and messaging formats to securely exchange arbitrary data in real-time. The technology provides soldiers with increased operational speed and agility to selectively exchange critical data within complex joint, coalition and other government agency partner environments, while boosting situational awareness among forces and reducing friendly-fire incidents. Specifically, the technology is capable of bi-directionally exchanging messages between the NATO Standard Agreement (STANAG) 4677 joint dismounted-soldier system (JDSS) XML format and the joint variable-message format (JVMF), among others. In addition, the Mutualink data gateway provides selective and secure sharing of Transmission Control Protocol (TCP) connections and User Datagram Protocol (UDP) messages across an established network.

Lockheed Martin Wins Space Fence Deal The US Air Force has awarded Lockheed Martin USD 914 million contract to improve the way objects are tracked in space and increase our ability to prevent space-based collisions. Lockheed Martin’s Space Fence solution, an advanced ground-based radar system, will enhance the way the US detects, catalogues and measures more than 200,000 orbiting objects, said the company. With better timeliness and improved surveillance coverage, the system will protect space assets against potential crashes that can intensify the debris problem in space. The company will deliver up to two advanced S-Band phased array radars for the Space Fence programme. The system is expected to greatly improve Space Situational Awareness of the existing Space Surveillance Network. Construction of the new Space Fence system on Kwajalein Atoll in the Marshall Islands is slated to begin in the early 2015 to meet the programme’s 2018 initial operational capability goal. The total contract value is estimated to be around USD 1.5 billion over an eight-year period of performance.

Raytheon Awarded Contract for FAB-T Programme Raytheon Company has been awarded USD 298,000,044 firm-fixed-price and cost-plus-fixed-fee modification for the Family of Advanced Beyond Line of Sight Terminals (FAB-T) Command Post

9 | Geointelligence JULY - AUGUST 2014

C4ISR Systems for US Coast Guard


news Terminals (CPT) Production programme. As a result of this down-select decision, low rate initial production, full rate production and interim contractor support contract options may be exercised to deliver FAB-T CPT-Only Terminals. The Phase 2 production contract options for LRIP, FRP, and ICS may be exercised after completion of Milestone C. Work will be performed in Marlborough, Massachusetts and Largo, Florida. Fiscal 2013 through 2019 aircraft and other procurement funds are programmed for this effort, with USD 31,274 being obligated at the time of award. Two bids were solicited and two received. Air Force Life Cycle Management Center/HNSK, Hanscom Air Force Base, Massachusetts, is the contracting activity.

Lockheed Martin to Acquire Astrotech Space Operations Lockheed Martin has entered into a definitive agreement to acquire the assets of the Astrotech Space Operations business of Astrotech Corporation. Astrotech Space Operations is known for satellite launch preparation services, from final testing and fuelling to encapsulation and day-of launch operations. The terms of the agreement are not material to Lockheed Martin. Subject to the satisfaction of customary closing conditions, including approval by the Astrotech Corporation shareholders, the transaction is expected to close in the third quarter of 2014. Upon closing, Astrotech Space Operations will be operated as a wholly-owned subsidiary of Lockheed Martin and managed by the corporation’s Space Systems business area.

10 | Geointelligence JULY - AUGUST 2014

ONR Awards Contract for Modular Radar System Raytheon Company has been awarded a USD 6 million study and demonstration contract by the Office of Naval Research (ONR) to further develop an Enterprise Air Surveillance Radar (EASR). The EASR concept leverages proven Radar Modular Assembly (RMA) architecture matured on Air and Missile Defense Radar (AMDR). EASR’s flexible approach meets the performance needs of different candidate ship classes for ship self-defence, situational awareness, air traffic control, and weather monitoring. The Radar Modular Assembly (RMA) affords EASR the scalability to be used on a variety of ship sizes across a diverse set of mission requirements ultimately offering reduced total ownership cost across all the

EASR equipped platforms. The RMA has been designed and tested to prove that it operates successfully in the stressing EASR naval marine environments.

Northrop Grumman to Develop Miniaturised INS For DARPA Northrop Grumman Corporation has been awarded a contract from the US Army Aviation and Missile Research Development and Engineering Center to develop a miniaturised navigation grade inertial system for the Defense Advanced Research Projects Agency (DARPA). DARPA’s Chip-Scale Combinatorial Atomic Navigator (C-SCAN) programme aims to integrate Micro-Electro-Mechanical System (MEMS) and atomic inertial guidance technologies into a single inertial measurement unit, providing stable longterm performance with fast start-up time. The integrated navigation system seeks to combine inertial sensors with dissimilar but complementary physics properties, providing an affordable solution in GPS-challenged environments. Under the cost-plus-fixed-fee contract with an initial value of USD 648,000, Northrop Grumman will develop a miniaturised inertial measurement unit for the C-SCAN programme by combining bulk acoustic wave MEMS gyro and Nuclear Magnetic Resonance (NMR) gyro technologies. This includes maturing the NMR gyro, shrinking the package’s current size and developing a new precision optical accelerometer. The contract has a potential value of USD 13.4 million with multiple options after the initial 12‑month base contract. DARPA’s Microsystems Technology Office, which administers the C-SCAN effort, promotes beyond-state-of-the-art technology in the component and microsystems areas. The C-SCAN effort is part of the Micro-Technology for Positioning, Navigation and Timing programme that aims to develop micro-technology for self-contained, chip-scale inertial navigation and precision guidance, eliminating dependence on GPS. Potential applications for these advanced navigation sensor chips include targeting, positioning, guidance, navigation and smart weapons.

Information Teleportation Network System Unveiled US Army Research Laboratory (ARL) scientists have successfully demonstrat-

ed information teleportation using a new quantum-information processing technology. The prototype information teleportation network system includes an information teleportation exfiltration testbed and approach, which securely moves quantum images when secure network communications are increasingly vulnerable to eavesdropping and hacking. The prototype was developed as part of the testbed to quantify the teleportation of information using eye-safe entangled photons, in a bid to demonstrate the potential for secure teleportation over optical fibre or through free-space. In entangled photon-based teleportation, a photon carrying potentially several bits of information interacts with an entangled pair of photons, enabling the data to

Credit: US Army Research Laboratory

be teleported to the other distant entangled photon and read by the recipient.

Spynel-X Maritime Surveillance System Introduced HGH Infrared Systems has unveiled a set of new wide-area surveillance turrets targeted at naval vessels, including what it claims to be the world’s highest resolution rotary thermal panoramic camera, the Spynel-X 8000. The system is believed to be able to detect a human in the water at up to 8 km, a rigid-hull inflatable boat (RHIB) at up to 15 km, and a ship at up to 30 km. Also updated is the system’s higher image resolution capability from 60 to 120 mega pixels. The Spynel-X series is based on the company’s Spynel family of mid-wave infrared (MWIR) surveillance systems that provides early warning for vessels against conventional maritime and asymmetrical threats. The system consists of an IR camera mounted on a high-speed rotating turret. The Spynel systems are currently in use with the French Navy’s La


Northrop Grumman to Provide EW Systems for US Northrop Grumman Corporation has received funding to produce pre-production units of the APR-39D(V)2 radar warning receiver (RWR)/electronic warfare management system (EWMS). Under terms of the joint services contract with the US Army and US Navy, the company will produce 18 APR-39D(V)2 units. Delivery is anticipated in late 2014 for hardware-software, and platform integration testing in 2015. APR-39D(V)2 RWR/ EWMS is designed to maximise survivability by improving aircrew situational awareness via interactive management of all onboard sensors and countermeasures. The system provides 360-degree coverage to automatically detect and identify threat type, bearing and lethality, said the company. The system features the latest technology in a small, lightweight configuration that protects a wide variety of fixed-, rotary- and tilt-wing aircraft. More than 7,000 APR-39 systems have been installed to date on both domestic and international AH-1W/Z, UH-1N/Y, MV-22B, KC-130T, UH-60, OH-58D, CH-53, CH-46, AH-64A/D and CH-47 aircraft.

Exelis Acquires Celestech for Data Sharing Capability Exelis has completed the acquisition of Celestech. The latter develops tailored technical solutions for government and commercial customers, with specific expertise in advanced signal processing and communications systems. It provides engineering services and product development for next generation satellite and terrestrial wireless

solutions. Celestech’s expertise in the realm of data analytics also supports the Exelis intelligence, surveillance, reconnaissance and analytics strategic growth platform, said the company. The acquisition paves the way for Celestech’s integration into the Electronic Systems division within Exelis.

Tern: Joint DARPA/Navy Research Programme DARPA and the Office of Naval Research (ONR) recently signed a Memorandum of Agreement (MOA) on a joint DARPA/Navy research and development programme called ‘Tern’. This joint effort builds upon the existing work of DARPA’s Tactically Exploited Reconnaissance Node programme, or Tern, which has been exploring concepts for a long-endurance and long-range aircraft that would operate from a variety of Navy ships. Modern warfare requires the ability to conduct airborne ISR and strike mobile targets anywhere and at any time. Current technologies in these areas, however, have their limitations. Helicopters are relatively limited in their distance and flight time, and long-distance fixedwing manned and unmanned aircraft require either aircraft carriers or large, fixed land bases for takeoff and landing. To help overcome these challenges, the Tern programme envisions using smaller ships as mobile launch and recovery sites for medium-altitude, long-endurance unmanned aerial systems (UAS). The goal is to provide long-range ISR and other capabilities from the decks of forward-deployed small ships. The programme aims to advance technology to enable a full-scale, at-sea demonstration of an R&D prototype UAS from a vessel with the same deck size as an Arleigh Burke-class destroyer. Five vendors are under contract for the first phase of the programme, and one or more could be chosen for Phase 2. Both of those phases focus on preliminary design and risk reduction. One vendor will be selected for Phase 3. The third phase will involve building a full-scale prototype for ground and at-sea demonstrations of launch and recovery.

CPI Provides Airborne Data Links for Global Hawk The Malibu Division of Communications & Power Industries LLC (CPI) has been

selected by an international defence technologies company to provide airborne data links for the RQ-4 Global Hawk unmanned aircraft system (UAS). CPI Malibu Division is providing dual-axis Ku-band high-gain airborne data links for the NATO Alliance Ground Surveillance (AGS) version of the Global Hawk. Intended to operate autonomously, the high-altitude, long-endurance Global Hawk uses a satellite data link to transmit data and images between the UAS and the ground-based mission control, enabling military commanders to gather near real-time ISR information. CPI Malibu Division’s advanced data link antennas are an integral part of Global Hawk’s ISR systems, supporting situational awareness in a network-centric battle-space. The company currently provides both single and dual-axis airborne, high-precision auto-tracking ground data terminals

Credit: Wikipedia

and satellite/line-of-sight (LOS) shipboard communications systems operating at Ku-band to support a number of UAS platforms.

xG Technology to Provide Networking Services to US Army xG Technology has been selected as a subcontractor to provide communications and network services to the US Army’s Communications-Electronics Research, Development and Engineering Center (CERDEC) Space and Terrestrial Communications Directorate (S&TCD). xG Technology teamed with prime contractor Science Applications International Corporation on this five-year period of performance (a 36 month base and two twelve month options) multiple-award indefinite delivery/indefinite quantity (IDIQ) contract. The contract has a ceiling value of USD 497 million. CERDEC develops and integrates C4ISR technologies that enable informa-

11 | Geointelligence JULY - AUGUST 2014

Fayette-class guided missile frigates. The company also introduced Spynel-X 3500 and Spynel-X 6000 with image resolutions of 30 mega pixels and 60 mega pixels, respectively. The lower end Spynel-X 3500 can detect a human at up to 3.5 km, a RHIB at up to 7 km, and a ship at up to 21 km. The mid-range Spynel-X 6000 can detect a human at up to 6 km, a RHIB at up to 12 km, and a ship at up to 25 km. All three systems in the family are fitted with gyro-stabilisation features to ensure steady image capture, and can be integrated with the company’s Cyclope software for target designation, tracking, and forensic capabilities such as image storage and playback.


news tion dominance and decisive lethality for the networked troops. S&TCD provides secure wireless military communications and networking technologies by assuring connectivity over longer ranges and diverse terrain while in motion, boosting capacity to meet the increasing demands to the tactical edge and ensuring cyber security across the enterprise. Under the terms of the subcontract, xG Technology will provide research, development and evaluation in support of communications and networks systems under the five S&TCD Division technology areas including antennas, system engineering, satellite communication, cybersecurity, and communications networks.

US Navy Awards Contract for Advanced Hawkeye Aircraft The US Navy has awarded Northrop Grumman Corporation USD 3.6 billion fixed price, incentive fee multi-year contract to deliver 25 new E-2D Advanced Hawkeye aircraft, bringing the total number of aircraft on contract to 50. According to the company, E-2D

Advanced Hawkeye is the world’s only aircraft specifically designed as a carrier-based airborne early warning and control (AEW&C) system. With its structurally distinctive design — a rotating rotodome and four vertical stabiliser tail configuration — the E-2D Advanced Hawkeye provides unprecedented, 360-degree surveillance to the warfighter. As the only DOD designed, tested and in-production AEW&C platform, the E-2D Advanced Hawkeye has undergone a significant transformation from previous E-2 models, resulting in revolutionary capabilities, the company adds. This includes the new, more powerful AN/APY-9 radar system, exclusive to the E-2D Advanced Hawkeye, which represents a two-generational leap in radar technology and allows the warfighter to see a greater number of targets at much greater distances — as well as new avionics and a glass cockpit.

Sikorsky to Develop New Combat Rescue Helicopters Sikorsky Aircraft has been awarded a US Air Force contract to develop new

12 | Geointelligence JULY - AUGUST 2014

Cloud Initiative for US Air Force A hybrid cloud developed by the Global Combat Support System-Air Force (GCSSAF) programme and Lockheed Martin will provide a secure, hosting capability, that when used with other existing services, will lower costs, increase agility and improve service for 800,000 Air Force users. By migrating mission applications coupled with self-service capabilities, service requests can be fulfilled on-demand within minutes compared to existing processes that take weeks. The cloud environment also provides inherent capabilities that lower costs, increase availability and provide operational redundancy resulting in an architecture that meets the evolving Air Force needs to support strategic initiatives such as Joint Information Environment (JIE). As the premier web gateway to the Air Force enterprise, the Air Force Portal hosted on the GCSS-AF infrastructure provides more than 800,000 worldwide users with a single point of entry and instant, secure access to the information they need -- from the status of mission critical parts to the most recent USAF benefits information. Since Full Operational Capability (FOC) was declared in 2009, the programme has increased the number of supported mission applications to over 200. GCSS-AF also recently launched a mobile capability to Credit: Lockheed Martin provide portal and application data to warfighters on their mobile devices, enabling higher productivity and flexibility. The next evolution of this endeavor brings the Air Force Portal to the cloud in a production state and paves the way for mission application hosting and migrations, said the company.

combat search and rescue helicopters. Sikorsky will develop a derivative of the UH-60M BLACK HAWK model for the Air Force’s rescue mission. The award of an estimated USD 1.28 billion Engineering & Manufacturing Development (EMD) contract includes development and integration of the rescue mission systems; delivery of four combat rescue helicopters; as well as seven aircrew and maintainer training systems. Initial training of Air Force aircrew and maintainers and five combat rescue helicopters are also expected to be delivered by 2020, once additional aircraft and training options are exercised. This contract is the first step in the eventual production and fielding of up to 112 aircraft with a potential value of approximately USD 7.9 billion. Eventual production quantities would be determined year-by-year over the life of the programme, based on funding allocations set by the Congress and the US Department of Defense acquisition priorities.

Thales IESI System to Modernise Helicopter Fleet Thales has been selected to provide its Integrated Electronic Stand-by Instrument (IESI) to modernise Brazilian Army Esquilo/Fennec helicopter fleet. The Thales IESI performs three essential back-up functions: artificial horizon, altimeter and airspeed indicator, all in a single Line Replaceable Unit (LRU). Already flying onboard Sikorsky S-76D, the Thales IESI has also been selected by Airbus Helicopters for its range of light and medium-lift helicopters including the Ecureuil family, the EC135, EC145, EC155, EC175 and their military versions, like the modernised AS 365 K2 Super Pantera. According to the company, IESI is perfectly suited for helicopter missions and performs well at low speed, low altitude and high turn rates. Resistance to High Intensity Radio Frequencies (HIRF), durability in humid, saline and high-vibration environments has been pushed to levels not previously reached by this kind of equipment, it added. Together, these innovations ensure optimal operation in all types of circumstances and, in turn, the highest level of flight safety, reliability and low direct maintenance cost. Thales’s IESI is also able to receive and control other functions such as Automatic Flight


New App Warns Israeli Citizens of Missile Strikes Two Israeli men, Ari Sprung and Kobi Snir, have developed an app which provides real-time alerts when rockets are launched toward Israel. Called Red Alert, the app provides constant code red alerts from different towns across the country. It also has a social media element which allows users to share information and write comments about each new round of rocket fire. So far, more than a half million people have downloaded this app on their smartphones.

Harris to Provide ITACS in Central Asia Harris Corporation has received a USD 78 million order from a nation in Central Asia for the next phase of an integrated tactical communications system that provides armed forces with enhanced command and control capabilities. The nation is expanding its Harris Integrated Tactical Area Communications System (ITACS), which delivers a fully integrated tactical Internet to the mission area. The system provides a range of advanced tactical communication services, including Voice over Internet Protocol (VoIP), teleconferencing, messaging and email, as well as battlefield management and common operational picture applications. ITACS includes a private tactical cellular service provided by Harris Fusion 4G LTE (long-term evolution) base stations and ruggedised subscriber terminals. The Fusion system enables users to make mobile calls and access data services securely. ITACS also includes the RF7800W High-Capacity Line-of-Sight Radio, a quick-to-deploy solution for long-range data communications, and the RF-7800M Multiband Networking Radio, which provides soldier- and vehicle-based mobile ad hoc wideband networking. Both the RF-7800W and RF-7800M are part of the combat-proven Falcon III family of radios.

India Raises Military Spending for 2014-2015 India recently announced allocation of Rs 2.29 lakh crore (USD 38.35 billion) for 2014-15 for the defence ministry, thus marking an increase of around 12.5 per cent from the last fiscal. In the budget presented by the new Union Defence Minister, Arun Jaitley, the government also fulfilled the long pending demand of the industry. The FDI limit in the defence sector has been raised to 49 per cent from the earlier 26 per cent. The government also earmarked Rs 1,000 crore (USD 16.6 billion) for modernisation of border infrastructure.

Russia Test-fires Iskander-M Missile Russia recently test-fired Iskander-M long-range missiles during its tactical exercises. The exercises were meant to train soldiers to engage critical targets with high-precision missiles, and also evaluate the readiness of the force’s control systems for electronic warfare. Iskander-M is said to be an upgraded version of the Russian Army’s 9K720 Iskander mobile-theatre ballistic missile system. The missile, also known as SS-26 Stone, has an operational range of 400km and features inertial and optical-guidance systems and an electro-optical (EO) seeker for self-homing capabilities.

Credit: Wikipedia

cording to reports, there is a small chance of the radar’s discovery and destruction by anti-radar missiles. Ghadir is said to be using 3D technology to detect targets and can pick up even the tiniest of birds.

ASIA PACIFIC

Philippines to Buy Israeli Radars The Philippine Department of National Defence is likely to acquire three Israeli-made surveillance radars which will be used to monitor disputed areas in the West Philippine Sea. The three radars, which would be acquired through government-to-government transaction, is expected to boost the country’s capability to detect aerial intrusions.

Malaysia and South Africa Join Hands The South African Council for Scientific and Industrial Research (CSIR) and the National Defence University of Malaysia (NDUM) recently signed an agreement to work together in the area of research and development (R&D) of advanced radar and sensor technologies, and electronic and network-centric warfare systems. The contract paves the way for an establishment of a joint Centre of Excellence for Advanced Defence Technologies in Malaysia. The Centre would specialise in radar and sensor technologies.

Elbit to Upgrade Philippine Army’s APCs

Iran Unveils New Long-Range Radar Iran’s Khatam ol-Anbiya Air Defence Command recently unveiled its new longrange surveillance radar, Ghadir, which it claims is less vulnerable to jamming and anti-radiation missiles. The radar is said to be capable of detecting hostile flying objects up to an altitude of 300 km. Ac-

Elbit Systems has been awarded a multi-million dollar contract for the supply of upgraded armoured personnel carriers (APCs) to the Philippine Armed Forces (PAF). The upgrade will include 25 mm unmanned turrets, 12.7 mm remote controlled weapon stations (RCWS) and fire control systems (FCS) for 90 mm turrets. The APCs will be supplied over a one-year period. Under the contract, Elbit and C4I will upgrade a total of 28 Philippine Army M113A2s, 14 of which are expected to be equipped with the turrets of the retired Scorpion armoured reconnaissance vehicles (ARVs).

13 | Geointelligence JULY - AUGUST 2014

Control System (AFCS) back up, Radio Management System (RMS) back up, depending on customer requirements.


news

ATK to Supply Aircraft Survivability Equipment to South Korea ATK has received a contract from the Republic of Korea Army for purchase, installation and integration of its AAR-47 Missile Warning System with Hostile Fire Indication (HFI and Laser Warning) onto AH-1S helicopters. The upgrade will also include the installation of the AN/ALE-47 countermeasure dispensing system. AAR-47 Missile Warning System is a combat-proven electronic warfare system designed to protect helicopters and fixedwing aircraft from surface-to-air threats. It integrates missile, laser and hostile fire threat warning into a single system. With ATK’s unique HFI capability added to the AAR-47, military aircrews flying helicopters and fixed-wing aircraft can detect a wider range of threats to their aircraft, including smaller-caliber weapon fire and rocket propelled grenades, and quickly respond with countermeasures, said the company.

14 | Geointelligence JULY - AUGUST 2014

Northrop Grumman Delivers Mode S Upgrade for AWACS Northrop Grumman Corporation has designed, developed, integrated and fielded a Mode S upgrade to the Identification Friend or Foe (IFF) interrogator for the Sentry E-3D Airborne Warning and Control System (AWACS) fleet based at Royal Air Force Waddington. The IFF interrogator is a sophisticated airborne defence system that provides a long-range, rapid early warning and detection capability, allowing discrimination between friendly and hostile aircraft. The Mode S system enables the aircraft to be used in controlled airspace. The work was performed at Royal Air Force Waddington under Northrop Grumman’s existing Sentry E-3D Whole Life Support Programme (WLSP), and is said to be the most complex of a series of modifications the company has carried out to date for the Sentry aircraft fleet. The innovative system upgrade has eliminated the need for complete mission computer replacement, thereby providing the Min-

Credit: Northrop Grumman

istry of Defence with a comprehensive, affordable solution to the Civil Aviation Authority’s upgrade requirement. The new, open architecture system also provides a foundation for future incremental hardware and software upgrades to support sustainment of the Sentry E-3D, according to John Parker, Director, Weapon System Sustainment and Modernisation, Northrop Grumman Technical Services. The combined effort delivered a cost effective Mode S solution that has achieved full operational capability across the UK Sentry E-3D fleet, according to Group Capt Adam Northcote-Wright, Air ISTAR delivery Manager, Defence Equipment and Support.

Marshall ADG Delivers Geoint Shelters to UK Army Marshall Aerospace and Defence Group (ADG) has won a contract modification for the delivery of additional shelters for the UK Army’s geoint systems. Awarded by Lockheed Martin UK, the agreement provides additional Field-Deployable Geoint (FDG) systems, such as a forward map distribution point (FMDP), tactical map distribution points (TMDP) and tactical information and geospatial analysis system (TIGAS). Lockheed Martin UK leads the Team Socrates, which is under contract to supply geoint systems to the UK Ministry of

Defence (MoD). The FDG system is designed to provide UK soldiers with field deployable geoint exploitation and map production capabilities, which support strategic to tactical level missions. The system, which has been developed for the UK’s Joint Force Intelligence Group (JFIG), enables commanders to dynamically and quickly brief and equip their frontline troops for operations through an up-to-date, customised and digital GEOINT.

Selex Develops TacSat Antenna Selex ES has launched the TacSat Razor Antenna, an innovative solution to the need to provide front-line forces with robust, lightweight, on-the-move, high performance tactical satellite communications to optimise communications. Weighing around 1kg, the TacSat Razor Antenna uses patented product design to offer a rapid deployment antenna, with a maximum 20W power output in the UHF tacsat band. It is designed specifically for physically demanding battlefield conditions, whilst addressing the relevant radiation hazard standards. Innovative and patented construction and deployment technologies make it easy and quick to deploy; and able to be operated in a hands free mode, keeping troops both ready for action and fully informed, the company said. TacSat Razor Antenna can simply be attached to the side of a standard military rucksack. Alternatively, it can be mounted on a standard tripod or camera spike or on a vehicle using a magnetic mount. Users simply pull a strap to launch the antenna from its housing. The antenna is withdrawn back into the container by pulling the same strap in the other direction. The TacSat Razor Antenna reduces time to deploy and snagging; and eliminates the soldier down time incurred by less effective ergonomic designs, according to the company. It is environmentally qualified to Mil Std 810-G and is IP68 rated for water immersion.

SWORD: An Automated Wargame Solution

Credit: Marshall ADG

Training solutions have traditionally focused upon tactical scenarios, neglecting logistics command posts requirements. Recognising this need, MASA Group (MASA) developed advanced logistics models for its flagship product; and the


Elbit to Supply Hermes 900 HFE to Switzerland Elbit Systems will supply its Hermes 900 HFE to the Swiss Armed Forces, under its UAS 15 reconnaissance drone programme. The 250 million Swiss Franc programme is likely to be submitted for approval to Parliament with the 2015 armaments programme. The Swiss Armed Forces is expected to replace its ADS 95 Ranger reconnaissance by 2020. The Ranger UAVs have been in

Credit: Wikipedia

operation since 2001 and are reaching the end of their life cycle. Hermes 900 HFE system is an all-weather unarmed reconnaissance drone system that is more flexible, has longer endurance in the air and a wider operational range than the system currently in use, said the company.

BAE Systems and Airbus Partner to Sell GEOINT Products BAE Systems has partnered with Airbus Defence and Security to produce, market, and sell innovative geospatial intelligence

(GEOINT) products and solutions using state-of-the-art satellite data collected exclusively by Airbus Defense and Space’s TerraSAR-X and TanDEM-X radar satellites. Under the terms of the partnership,

MEA

Credit: Space news

Sagem to Provide Thermal Imagers to South Africa

the two will jointly develop a new line of global Synthetic Aperture Radar (SAR) products that, the company says, are unrivalled in terms of accuracy, resolution and quality. These jointly developed products will be exclusively marketed to the US government, commercial, and select international customers. The precision and richness of Airbus’s radar data products, combined with the rigor of BAE Systems’ GEOINT exploitation and analysis expertise, will drive the development of advanced geospatial products that will benefit both the public and private sectors, said the company.

Saab Partners with Nexter for Roquette NG Programme Saab has recently signed a co-operation agreement with Nexter Munitions for the supply of the AT4 Disposable Shoulder-Launched Weapon System to the future French Roquette NG programme. “By teaming up with Nexter Munition, we get access to a company in France, with the expertise needed to support us with the Roquette NG programme, throughout both tender and execution”, said Görgen Johansson, Senior Vice President and Head of Business Area Dynamics. According to the company, AT4 is one of the most successful anti-armour weapons ever developed, battle proven in some of the most challenging of today’s warfare environments. It is a lightweight, man-portable, fully disposable weapon system. The weapon is as effective against landing craft, aircraft and helicopters as it is against land-based vehicles, added the company. It can also be employed to protect fixed-defence installations, supply points and other vital assets.

Sagem (Safran) was awarded a major contract by Denel Land Systems to supply thermal imagers for South Africa’s Badger Infantry fighting vehicles. Sagem will supply three types of MATIS infrared imagers to equip different versions of the Badger Infantry vehicles. MATIS is easy to integrate in turret-mounted weapon systems and has high performance proven during field testing, according to the company. Production will be carried out at Sagem’s facility in Poitiers, France, while the delivery schedule remains undisclosed. As part of the industrial participation programme in South Africa, Sagem has collaborated with local company Afrimeasure, which will handle part of the final imager integration, along with testing and through-life maintenance. Around 238 Badger IFVs are being manufactured by Denel under a contract awarded by the Armaments Corporation of South Africa (Armscor) in October 2013.

Drones to Monitor Abu Dhabi Port

Credit: Wikipedia

In order to improve security measures at its port facilities, Abu Dhabi Ports Company has started using drones. The two flying cameras are meant to monitor specific areas at Khalifa Port, Zayed Port, the Free Port, and the New Free Port. The initiative will strengthen the maritime security of international ships at the port as the drones will also provide comprehensive monitoring of locations which are difficult to access, thus offering a higher level of reassurance to ships with high value or sensitive cargos. The move is also expected to help minimise staff or contractors’ exposure to high risk situations.

15 | Geointelligence JULY - AUGUST 2014

developments are integrated in the latest release of SWORD. The company claims that SWORD is the first solution to provide state-of-the-art simulation capabilities to train logistics command staff. SWORD is a high-level constructive simulation using artificial intelligence algorithms and previously validated doctrine models to enable autonomous behaviours. Such capabilities, the company says, allow commanders and their staff to be trained in a more efficient manner through highly realistic Computer Aided eXercises (CAX). SWORD offers a wide variety of use cases: it can be deployed via a stand-alone workstation for self-training, in a networked environment for command staff training, or integrated with a Battle Management System (BMS) as a decision support tool or for mission rehearsal training.


Lead story

Weapons of Terror

Terrorism is a major threat facing the world today and the possibility of Weapons of Mass Destruction falling into the hands of terrorists is a grave concern for security agencies. The article talks about various such weapons and explores the possibility of their use by terrorists

16 | Geointelligence JULY - AUGUST 2014

T

he word terrorism is politically loaded and emotionally charged. A common definition of terrorism is the systematic use or threatened use of violence to intimidate a population or government and thereby effect political, religious or ideological change. Common definitions of terrorism refer only to those violent acts that are intended to create fear; are perpetrated for a religious, political or ideological goal; and deliberately target or disregard the safety of non-combatants. Terrorism has been practiced by political parties, nationalistic groups, religious groups, revolutionaries and ruling governments to further their objectives. Terrorists normally use conventional weapons — bombs and guns are their favourites. Among the former, car- and truck-bombs have become very powerful weapons, especially for suicide attacks. Terrorists use both explosive bombings and incendiary bombings. They also make use of letter and parcel bombs. Terrorists use guns, pistols, revolvers, rifles and semi-automatic weapons in assassinations, sniping, armed attacks and massacres. Grenades, from hand grenades to rocket-propelled, are also part of the terrorist arsenal. The use of missiles is rare but a few groups are known to be in possession of surfaceto-air shoulder-fired missiles.

Terrorism and Weapons of Mass Destruction (WMD) WMD are used to kill a large number of people, destroy properties, achieve

political goals, and create terror, chaos and social disruption. WMD include biologic or chemical agents, nuclear weapons, conventional bombs contaminated with radioactive materials, large conventional or ‘truck’ bombs, and surprising items such as hijacked airplanes. Any terrorist attack using WMD will result in substantial psychological trauma and stress. Significant psychological and behavioural reactions to such an attack are predictable. Primary care and emergency clinics are likely to see many patients who have stress-related emotional or physical symptoms. For example, after the Tokyo sarin attack, 5,510 people sought medical at-

tention at more than 200 hospitals and clinics in the city within several hours of the incident.

Terrorist Weapons Terrorists use both manufactured and improvised firearms. The term manufactured indicates those arms made professionally by arms factories, while improvised describes those manufactured by

non-professional arms manufacturers, or by illicit workshops. Firearms are sometimes referred to as ‘bored weapons’, indicating the barrel from which the bullet or projectile is fired, or the tube from which the projectile is launched. These are divided into sub-categories:   Small Arms: Most firearms under the category of medium machine guns, or as a loose rule, belt-fed machine guns. They include pistols (which are now all semi-automatic or self re-loading), revolvers, rifles, submachine guns and light machine


Most bombs assembled by terrorists are improvised. The raw material required for explosives is stolen or made from fertiliser and other readily available household ingredients be approximately 500 metres when used against a fixed target, and about 300 metres when fired at a moving target. RPG-7 is being used extensively by terrorist organisations in the Middle East and Latin America and is believed to be in the inventory of many insurgent groups. It is available in illegal international arms markets, particularly in Eastern Europe and the Middle East.  Stinger (FIM92A): The US-made Stinger is a man-portable infrared guided shoulder-launched SurfaceTo-Air Missile (SAM). It proved to be highly effective in the hands of Afghan Mujahedeen guerrillas during the insurgency against the Soviet intervention. Its maximum effective range is approximately 5,500 metres, and maximum effective altitude is about 5,250 metres. It has been used to target high-speed jets, helicopters and commercial airliners.  SA-7 (Grail): Sold in thousands after the collapse of the Soviet Union, SA-7 uses an optical sight and tracking device with an infrared seeking mechanism to strike flying targets with great force. Its maximum effective range is approximately 6,125 metres and maximum effective altitude is about 4,300 metres. It is known to be in the stockpiles of several terrorist and guerrilla groups.

Bombs and Other Explosives A few military bombs other than those dropped by aircraft are currently being manufactured on the scale and with the diversity encountered in the Second World War. The exception to this generalisation is the mines — both the anti-personnel and anti-tank mines.

Most bombs assembled by terrorists are improvised. The raw material required for explosives is stolen or misappropriated from military or commercial blasting supplies, or made from fertilizer and other readily available household ingredients. Such assembled bombs are known as Improvised Explosive Devices (IEDs). Examples of IEDs  Pipe Bomb: This is the most common type of terrorist bomb and usually consists of low-velocity explosives inside a tightly capped piece of pipe. Pipe bombs are very easily made using gunpowder, iron, steel, aluminum or copper pipes. They are sometimes wrapped with nails to cause even more harm.  Molotov Cocktail: This improvised weapon first used by Russians against Germans in the Second World War, is now used by terrorists worldwide. Molotov cocktails are extremely simple to make and can cause considerable damage. They are usually made from materials like gasoline, diesel fuel, kerosene, ethyl or methyl alcohol, lighter fluid and turpentine, all of which are easily obtained.  Fertiliser Truck Bomb: Fertiliser truck bombs consist of ammonium nitrate. Hundreds of kilograms may be required to cause major damage. The Irish Republican Army, Tamil Tigers and some Middle Eastern groups are believed to have been using the ammonium nitrate bomb.  Barometric Bomb: This is one of the more advanced weapons in the terrorist’s arsenal. The detonator of the bomb is linked to an altitude meter, causing the explosion to occur

17 | Geointelligence JULY - AUGUST 2014

guns. Small arms also include so-called assault rifles, which have either submachine gun mechanisms or mechanisms providing the same firing facilities in the body, stock or woodwork of a short rifle or carbine. The hand-guns, pistols and revolvers are sometimes known as side arms.  Improvised Firearms: These weapons include any of the above which are made outside professional and legal arms factories. Not all types of the above weapons have been privately manufactured or improvised, but weapons such as the AK-47 Kalashnikov assault rifle or the M-60 heavy machine gun are within the manufacturing capabilities of local arms artificers on the north-west frontier of the Indian subcontinent. Primitive mortars and rocket launchers are also sometimes manufactured by different entities. Most small arms are designed for military use, but hunting weapons and occasionally full-bore target-shooting weapons are also utilised. Considerable quantities of commercial shotguns are diverted into illicit black markets due to a large number of commercial manufacturers. The most common weapons manufactured are:  AK-47 (Soviet Rifle): The AK-47 was accepted as a standard rifle for the Soviet Army in 1949 and retained that status until it was succeeded by the AKM. During the Cold War, the USSR supplied arms to anti-Western insurgent terrorists. The AK-47 became a symbol of left-wing revolution; about 30-50 million copies and variations of AK-47 have been produced globally, making it the most widely used rifle in the world.  RPG-7 (Rocket Propelled Grenade): Employed by forces of the former USSR, the Chinese military and North Korea, RPG-7 was also used in many countries receiving weapons and training from the Warsaw Pact members. RPG-7 proved to be a very simple and functional weapon, effective against fixed emplacements and playing an anti-vehicle/ anti-armour role. Its effective range is thought to


Credit: www.militaryphotos.net

Lead story

RPG 7V2 Grenade Launcher

Challenges in mid-air.

Use of Nuclear and Radiological Weapons

18 | Geointelligence JULY - AUGUST 2014

involves the application of all elements of national power and influence. Not only it employs military power, but also diplomatic, financial, intelligence and law enforcement activities to protect internal security, extend defences, disrupt terrorist operations, and deprive enemies of what they need to operate and survive. In this war of nerves, terrorists have adjusted, and the State therefore needs to refine its strategy to meet the evolving threat. Today, we face a global terrorist movement and must confront the radical ideology that justifies the use of violence against innocents in the name of religion.

Fortunately, there have not been any acts of nuclear or radiological terrorism so far. But the attack with the chemical warfare agent Sarin in Tokyo (1995), the anthrax cases in the USA (2001) and the smuggling of radioactive material are causing concern. Furthermore, the 9/11 attacks in US clearly showed that there are groups with considerable financial and human resources as well as the will to inflict the highest possible damage. There are in principle no insurmountable obstacles to the acquisition and use of radiological weapons by a well organised terrorist group, even though such an action remains hightech and thus very difficult. Nuclear Weapons: There are two imaginable ways for terrorists to get nuclear explosives. They could try to build a so-called Improvised Nuclear Device (IND) or they could steal or buy a nuclear weapon. Before discussing these two cases, we would like to give some information on the working principle of the simplest nuclear weapons. To make a working IND, an accurate blueprint is required. Experts seem to agree that the most difficult challenge for a terrorist organisation wanting to construct an IND is to obtain the necessary fissile material. Nuclear weapons are

located at well protected and guarded weapons emplacements or in nuclear weapons storage facilities. A theft would involve many risks and great efforts in terms of personnel, finances and organisation. Without the support of insiders and local knowledge, such a theft is inconceivable. Radiological Weapons: A radiological weapon or radiological dispersion device (RDD) is a device that is designed to spread radioactive material into the environment, either to kill, or to deny the use of an area. Sometimes, when high explosives are used to build a radiological weapon, terrorists would need to have access to a sufficient quantity of radioactive material. Radioactive sources are used in medical, industrial, agricultural and research applications. They can be found in hospitals, medical and industrial irradiation facilities, universities and even homes. However, not all of these sources would be suitable for use in an RDD. Most are far too weak to cause extensive damage. Furthermore, many radioactive sources are in metallic form and would not be dispersed very effectively by high explosives.

National Strategy for Combating Terrorism War on Terror is a different kind of war. From the beginning, it has been both a battle of arms and a battle of ideas. The paradigm for combating terrorism now

•  Terrorist networks today are more dispersed and less centralised •  Terrorists have struck in many places throughout the world •  They have declared their intention to acquire and use WMD to inflict even more catastrophic attacks around the world •  Some states continue to harbour terrorists at home and sponsor terrorist activity abroad •  Increasingly sophisticated use of the Internet and media has enabled terrorists to communicate, recruit, train, rally support, proselytize and spread their propaganda without risking personal contact From the beginning, the War on Terror has been both a battle of arms and a battle of ideas, a fight against the terrorists and their murderous ideology. In the short run, the fight involves the application of all instruments of national power and influence to kill or capture terrorists; deny them safe haven and control of any nation; prevent them from gaining access to WMD; render potential terrorist targets less attractive by strengthening security; and cut off their sources of funding and other resources they need to operate and survive. A government has no higher obligation than to protect the lives and livelihoods of its citizens. The hard core among our terrorist enemies cannot be reformed or deterred; they need to be


Indian Strategy to Fight Terrorism Long Term Strategy From the above understanding of the nature of international terrorism that faces us today, it is clear that a long-term strategy is required to counter terrorism. It has to be comprehensively addressed on all fronts, political, economic, social and military. This strategy needs to be evolved from our national aims and objectives to protect ‘core values’. These core values are: •  Consolidate as a secular, federal democratic state with freedom of speech, equality and justice •  Protect sovereignty and territorial integrity •  Promote socio-economic growth and development We must learn from the experience of other nations. However, at the same time, we need to realise clearly that our situation is peculiar to us and there are no direct lessons to learn except a re-evaluation of our own experience. Our strategy must be realistic and cannot be similar to the US model of worldwide capability or the Israeli strategy of reliance on massive and immediate retaliation, as the respective environment and capabilities are different. While, we can take some useful

lessons from the British dealings with the IRA or even the Egyptian policy on eliminating the Jehadis, one principle is clear that whatever responses we adopt, they must not be ‘knee-jerk’ reactions or evolved in an ad-hoc manner. International terrorism cannot effectively be fought alone, as has been our experience so far. The UN Security Council Regulation 1373 must not remain on paper but must be applied and the defaulting nations punished. Pakistan-sponsored ‘proxy’ war must be exposed and international pressure applied. We must highlight more aggressively, the justness of our cause and the support to terrorism by Pakistan, both through state and non-state players, as well as strive to isolate Pakistan in the international community. A strong message needs to be conveyed to Pakistan, that we mean business, demonstrated by deeds/actions. All steps to convey this must be implemented such as diplomacy, trade, sports and military. Internal Strategy Our policy of meeting political and economic aspirations has succeeded in many cases through the creation of new states and autonomous councils with limited military containment. However, it has not succeeded where ‘internal support’ has been potent. We, therefore, need to move from a policy of appeasement and accommodation to firm action, before the problem spreads and must: •  Adopt proactive policies to confront the terrorists militarily, and at the roots of terrorist ideology — fundamentalists, social evils and sources of terrorism, for example, narcotics/ drug trade •  Enact effective anti-terrorist laws and legal framework •  Modernise and enlarge intelligence networks •  Modernise state police and paramilitary forces in training, equipment and ethos

rationally to the emerging challenges. Collective Action to fight by international cooperation is a must, as the economic costs of combating terrorism by a single nation are colossal. Collective action is not confined to active combat alone. Simultaneously, foreign sponsors of international terrorism have to be identified and tamed. A democratic polity and a diverse society such as India do not support stringent measures and anti-terrorist legislation, even when necessary. Thus, at present, the security forces have to function in an environment of lack of total physical and legal support. Therefore, legal reforms and stringent anti-terrorist legislation have to be enacted. As an example, the media that has a great reach today should be used as a force multiplier to shape public opinion and to counter false propaganda. The media must be taken along as a weapon of the state and not of the terrorists. Technology enhancement, NBC, cyber-terrorism have given terrorists unlimited powers and to counter these, we must not lose any time to modernise our security apparatus. The citizens of the country also have to be energised to feel responsible for the well-being of the nation and state apparatus alone will not suffice. Simultaneously, we have to deploy Special Forces for specific tasks and they have to be trained accordingly. There is also a need to evolve a policy framework on internal security by the Home Ministry. In summary, we have to put in a sustained effort to initiate, plan for and implement such efforts seriously, and tackle the menace of terrorism and weapons of terror proactively and head on.

Conclusion There is a need to evolve a consistent and comprehensive policy at the national level. The core of the issue is that we need to respond efficiently and

Gp Capt JV Singh (Retd) singh_jitendravikram@yahoo.com

19 | Geointelligence JULY - AUGUST 2014

tracked down, captured or killed. They should be cut off from the network of individuals, institutions, and other resources they depend on for support and which facilitates their activities. The network, in turn, will be deterred, disrupted and disabled. The strategy has to selectively target and neutralise the leaders, the foot soldiers, which include the operatives, facilitators, and trainers in a terrorist network and the weapons including through state sponsors, theft or capture, and black market purchases. The greatest and gravest concern, however, is WMD in the hands of terrorists. Preventing their acquisition and use has to be a key priority of this strategy. There is also a need for effective disruption of funding sources, target their communication nodes and propaganda operations.


20 | Geointelligence JULY - AUGUST 2014

IED

Counter A RCIED Systems The technological sophistication of present day RCIEDs render their detection an extremely difficult proposition, thus making them a lucrative weapon for terrorists, and a nightmare for security agencies

n Improvised Explosive Device (IED) is a bomb fabricated in an improvised manner incorporating destructive, lethal, noxious, pyrotechnic or incendiary chemicals and designed to destroy or incapacitate personnel or vehicles. IEDs may be used in terrorist actions or in unconventional asymmetrical warfare by guerrillas or commando forces in a theatre of operations. They are triggered by various methods, including remote control, infra-red or magnetic triggers, pressure-sensitive bars or trip wires. In some cases, multiple IEDs are wired together in a daisy-chain, to attack a convoy of vehicles spread out along a road. Latest IEDs are no longer made by inexperienced designers or with sub-standard materials. They have developed into sophisticated devices


Classification of IEDs The IEDs can be broadly classified based on: Type of IED Delivery System: IEDs are classified based on the containers in which they are kept: •  Vehicle Borne (VBIED) •  Person Borne (PVIED) •  Passive — land mine types •  Directional — projected devices, missiles, rockets •  Placed Type of IED Initiation Mode: These are determined by the technique used for initiation. While all other types of IEDs have to be countered by means of physical probing to detect, the remotely initiated type, commonly termed as Radio/ Remote Controlled IED (RCIED), can be countered using electronic equipment that has the capability to either jam, neutralise or pre-initiate them without the need of detecting their location. The IEDs based on mode of initiation could be classified as under: •  Timed •  Chemical Delay •  Timers •  Light Actuated •  Command Initiated • Suicide •  Command Wired •  Passive/ Active Infra Red(IR) •  Projectile Controlled (PCIED) • RCIED •  Victim Operated (VOIED) •  Booby Traps •  Pressure Pads/ Pull Switches

Over the last decade, IED attacks have been on the rise globally. Casualties due to these attacks accounted for 53 per cent during the period February-July 2013 RCIEDs Techniques RCIEDs are an effective strategy when facing a superior or technologically advanced military force. Since RCIED is relatively simple to make, easily hidden and very destructive, it has become a preferred weapon of insurgents, guerrilla fighters, rebels and terrorists in Iraq, Afghanistan, North Ireland, Vietnam, Chechnya, India, Libya and Syria. Most common RCIED techniques used around the world are:•  Two Way Radios/ Personal Mobile Radios (PMRs): Two-way radios are a common method of command initiation incorporated in IEDs utilising unsecured/ uncontrolled radios in citizen band. •  Long Range Cordless Telephones: ANEs use the handset or base station of cordless telephones and long

range cordless telephones as an IED switch near the main charge. •  Mobile/ Cell Phones: Due to the presence of developed cell phone structures around the world, cell phone- initiated IEDs have become ideal to be used by ANEs; and as the cell phone network expands, so will the use of this type of initiator. •  ANEs are also utilising the following electronic systems because of the ease with which these can be purchased and modified to suit their requirements:•  Wireless Doorbells •  Keyless Entry Systems •  Car Alarms •  Radio Controlled Toys

Global IED Threats Over the last decade, IED attacks have been on the rise globally. Casualties due to these attacks accounted for 53 per cent during the period February-July 2013. More than 53,000 civilians were killed or injured by IEDs between 2 011 and 2013. The epicentres of IED attacks have primarily been in Afghanistan, Iraq, Syria, Pakistan and India, with some sporadic incidents in Africa and USA. IED attacks in Iraq alone resulted in deaths of over 1,600 coalition personnel. Some of the recent IED incidents that occurred around the globe are: •  Two killed and 19 injured by IED blast near an Assam Rifles camp in Imphal, India, on May 30, 2014 •  One Indian army soldier killed and two injured by an explosion in Akhnoor area of Jammu district in India on May 19, 2014 •  A suicide car bomber killed 10 and injured 25 in Shite town of Hermel in Lebanon on February 21, 2014

21 | Geointelligence JULY - AUGUST 2014

that are constructed with components scavenged from conventional munitions and standard consumer electronic components such as mobile phones, washing machine timers, pagers or garage door openers. Anti National Elements (ANEs) have surely but steadily graduated from a disorganised group of dissidents employing primitive and crude weapons of destruction to a more organised group using highly sophisticated and lethal IEDs. The levels of technological sophistication of present day IEDs render their detection, let alone their neutralising and/or pre-detonation, an extremely difficult proposition.


IED

Bombing Trends World Wide

Credit: National Security Guard-The Bombshell

The most common RCIED used by ANEs is a transmitter and a receiver combination, operating in Citizen Band

in Nawa district, Afghanistan on October 2, 2013 •  One Afghan Army soldier and two civilians were wounded in an IED attack in western province of Herat, Afghanistan on October 1, 2013 •  A Maj Gen and a Lt Col were killed by a remote-controlled IED planted along the road at Pak-Afghan border on September 15, 2013 •  Eight people were killed and 13 injured in a powerful IED blast in Imphal, India on September 14, 2013 •  In marathon attack at Boston, US, three people were killed and 176 injured when a pressure cooker bomb exploded on April 15, 2013

Commercial Off-The-Shelf (COTS) Counter IED Equipments To counter the IED threat, a vast array of counter IED equipments is available commercially. Summary of COTS Counter RCIED equipments are as under:•  Equipment available commercially Credit: Wikipedia

22 | Geointelligence JULY - AUGUST 2014

•  Serial blasts of six IEDs killed five and injured many in Patna, India, using a Delay Timer Circuit on October 27, 2013 •  Explosion in Baluchistan’s Awaran district on October 2, 2013, led to the death of two soldiers, and injured four •  Four Afghan National Army soldiers killed by an IED explosion

are primarily jammers •  Types vary from man-portable to vehicle based counter IED systems •  Covers entire frequency spectrum of 20 MHz to 3000 MHz, thereby incorporating citizen band frequencies and the entire spectrum of mobile phones •  Smart jamming options of barrage jamming or selective jamming (spot/ responsive) •  Interoperability possible so as to build a security umbrella •  Ranges vary, depending on output wattage and employment conditions, although no manufacturer has defined any range Inferences: Inferences that are drawn on analysing the global threat of IEDs and commercially available equipments are: •  IED remains the most potent weapon for an asymmetrically operating enemy •  There is a gradual spread of IED incidents across the globe. Person borne (SPIED)/ Vehicle borne, suicide type initiated IEDs remain


IED Threat: J&K, India In J&K, ANEs began using IEDs in late 1980s when insurgency was at its peak. IEDs remain the most potent weapon, which are inexpensive, easy to build using commercial technology, easy to replace with components readily available, without the need for lengthy procurement process, yet being precise and lethal with little risk. The insurgents could attain success by inflicting heavy casualties, demoralise local population and create an unstable security situation in the state. The initial IEDs were primarily employing mechanical/ electrical techniques to initiate the blast and subsequently graduating to designs employing timer delays and light actuated circuits. Early 2000 saw more complex although commercially available RCIED circuits to initiate the explosive and attack the target. The Remote Circuits were initially two-digit RC initiated circuits, which were subsequently upgraded to three digit resettable type of RCIEDs. There have also been reported incidents of cell phone-initiated IEDs. The army bus blast at Khanabal in 2006 was the first time when a mobile initiated blast was noticed.

RCIED: J&K The block scheme of a typical RCIED will consist of a handheld, commercially available transmitter, a matching receiver usually buried/concealed and an explosive pack which is electrically wired to the receiver. The receiver is a hardwired electronic device operating in the frequency range of handheld transmitters. J&K Typical RCIED Setup The most common RCIED used by ANEs, typical to J&K, is a transmitter and a receiver combination, operating in Citizen Band. These RCIEDs are characterised by three unknown (to the victim) factors viz frequency of operation, Dual Tone Multi Frequency (DTMF) codes and its exact location. Any receiver can be tuned within a bandwidth of 10 KHz, hence there can be as many as 4,000 frequencies which are possible in the bandwidth of 135 to 175 MHz. Considering two-digit DTMF codes, a combination of 72 possible codes can be used. Similarly, 504 such codes are possible for a three digit RCIED.

Countering RCIEDs Counter RCIED equipment must have the following essential features for it to be effective:•  Must have sufficient radius of influence. This feature will ensure that knowledge of exact location of the IED is no longer important. •  The equipment must be capable of generating all frequencies in the citizen band. •  For jamming of RCIED, sufficient high radiated power is desired so as to create a ‘barrage’ effect. •  For pre-detonation or neutralisation of the RCIED, the counter IED equipment must be capable of generating all possible DTMF codes and super-impose these codes on all possible transmitted frequencies. The above actions must be accomplished in a minimum possible time so as to make the counter RCIED tactically viable. Types of Counter RCIED System: The three major categories are:-

  Jammers: If the frequency of threat signal is known, then it can be jammed with spot frequency. Less barrage jamming, that is, generating high power signal across entire range of frequencies will be resorted to. This necessitates very high power transmission {for example, to jam a citizen band of 40 MHz, (that is, from 135 to 175 MHz) with a step of 10KHz, number of emissions will be 4000. Power of 5W per transmission thus will demand 5W x 4000 channels = 20,000 W = 20 KW}. This kind of power is very difficult to generate. Hence, sweep noise generation technique is adapted.   Neutralisers: Used primarily to disable the IEDs so as to avoid collateral damage in populated areas, moving convoys, etc. They quickly transmit a set of codes required to reset the IEDs in shortest possible time (typically 2-3 seconds).   Pre-initiators: These equipments transmit all possible random DTMF codes in the entire frequency spectrum so as to pre-initiate the IEDs at the time of our choosing. They are of two types:•  Static Long Range Pre-initiators: They are based on multiple radios transmitting the complete spectrum and DTMF codes over a long range (typically 16-20 km). Being line-ofsight equipment, they require the dead zones to be covered by other mobile counter RCIED systems. Further, they have long scan time of around 3 to 4 hours. •  Mobile Short Range Pre-Initiators: They cover the small stretch-

Credit: Northrop Gruman

23 | Geointelligence JULY - AUGUST 2014

a preferred mode of attack since they are more difficult to detect and counter •  While IED designers have shifted to retrograde techniques employing manual/ electrical or timer-based IEDs due to its difficulty in countering incidents, remote controlled based IEDs are still prevalent •  With a vast array of availability of electronic components and advancement in the field of communications, the remotely initiated IEDs can be countered by jamming only. Therefore, manufacturers across the global are designing jammers with smart options •  India ranks fourth among the most IED attacked nations in the world and sixth in terms of deaths caused by IEDs (NCTC, USA report on terrorism 2011)


IED

recovery of IED material indicate that this threat is still prevalent.

24 | Geointelligence JULY - AUGUST 2014

Conclusion

es of dead zones, especially in mountainous terrain. They have a range of 1-2 km and use software and hardware for generation of frequency, using high power amplifier and antenna. Generally, the cycle time of these equipments is around 30-40 minutes.   Deployment Grid: The deployment grid of counter RCIED equipment is based on area mapping by identifying dead grounds and blind spots on the area where security umbrella has to be established. •  Long Range Pre-Initiator (LRPI): These are long range static pre-initiators, deployed on dominating heights to cover larger area where RCIED sanitisation is required. Effective range varies depending on limiting factors like condition of equipment, availability of line of sight transmission and various factors affecting diffraction, reflection, absorption, etc. •  Medium Range Pre-initiation/ Neutraliser/ Jammer: These are vehicle based/ static medium range pre-initiatiors/ neutralisers/ jammers with typical range of 1-2 kms so as to cover the dead ground and blind spots, that remain uncovered by the LRPI. •  Convoy Protection/ Counter Insurgency (CI)/ Counter Terrorism (CT) Operations: During convoy movement, road opening

or conduct of CI/ CT operations, counter RCIED equipment used are vehicle based/ man portable pre-initiator/ neutraliser/ jammers. Inferences: Following inferences can be drawn on the evolution of IED attacks over the last two decades: •  A sine curve in the methodology and technology employed in initiating the IEDs. •  Initial period, that is, late 1999 saw IEDs employing rudimentary techniques of mechanical/ electrical initiation •  In mid 2000, technology of IED designs became complex, based on the increased availability of alternate means of commercially available circuits, thereby graduating to two/ three digit RCIEDs and mobile initiated IEDs •  In late 2000, there was a dip in utilisation of remote controlled IEDs primarily due to influx in counter RCIED equipment •  At present, there is a likelihood of ANEs shifting their attack methodology back to either rudimentary methods, viz mechanical/ electrical initiated IED, suicide attack or developing IED technology exploiting frequency in 3G, 4G, WiFi, WiMax for which detection and counter are very difficult •  Recent sporadic IED incidents and

IEDs have emerged as the threat weapon of choice and are one of the greatest challenges armed forces are facing in the current theatres of operation. The ubiquitous nature and lethal effect of IEDs used by insurgents directly threaten deployed forces’ freedom of manoeuvre and the ability of governments to provide for the safety and security of their people. These cost-effective, adaptive weapons and the violent extremist organisations that use them are sure to evolve over time. There is no single solution to defeat the IED because there is no single enemy IED network. A wide range of efforts to neutralise threat networks and devices are required. The IED threat must be met with a coherent and focussed approach that collaboratively and continually seeks effective solutions. It is the synergy of rapid acquisition and fielding, operations and intelligence fusion and analy¬sis, training, weapons technical intelligence, and a whole-of-government approach that is coupled with a single focus on the IED threat, which will ensure our ability to meet the operational requirements. To defeat the threat, we must continually identify the likely capability gaps and focus our supporting communities of interest to develop solutions. Leveraging the research and development community in this endeavour ensures innovation that addresses these future challenges and provides a venue to discover and develop counter IED related technology.

Lt Gen (Dr) AKS Chandele Managing Editor GeoIntelligence ajay@geospatialmedia.net


Proxy wars

currency Of

T

he potential of irregular forces became clear by the defeat of the US in Vietnam, erstwhile Soviet Union in Afghanistan and once again of the US in Afghanistan. The last war fought by two conventional armies was in 2005, between Russia and Georgia. In recent years, we have witnessed even the US and NATO battling irregular forces. 9/11 may have changed perceptions about terrorism but then proxies are not a new phenomenon. For example, the Taliban were created by Pakistan with the assistance of both the US and China. What has been witnessed in recent years is that irregular forces have demonstrated greater strategic value over conventional and even nuclear forces. A major change has also occurred — while irregular forces and proxy wars were being waged by nations conventionally weaker than their adversaries, today even powerful nations are using proxies. This change has occurred because of multiple reasons. The lethality and accuracy of weapon systems have increased the costs of war, for example, all direct spending by the US from FY 2001 to 2013 on the war in Afghanistan has totalled up to an incredible amount of USD 641.7 billion. Then, there is a question of human lives; body bags moulding public opinion. The human toll in Afghanistan included some 5,000 US-led coalition killed, and over 34,000 Americans wounded.

The above case has led to a new foreign doctrine of the US, in which the latter doesn’t take primary responsibility for events. Also, it allows regional crises to play out until a new regional balance is reached. More importantly, the US replaced its ‘boots on ground’ by ‘proxy boots on ground’. The US has been using proxies in Iraq and Syria. China has been using Pakistan’s proxies against India, and is presently arming and supporting Indian Maoists and northeast insurgents like ULFA and PLAM (Peoples Liberation Army of Manipur). China has created its most deadly proxy in Myanmar in the USWA (United State Wa Army), headquartered in Shan State controlling the ‘golden triangle’. China has armed the USWA with not only machine guns, rocket launchers, shoulder fired air defence weapons and armoured troop carrying vehicles but also missile fitted helicopters. Two years back, Chinese nationals with fake Indian documents on a mission to meet Naga insurgents were caught in Indian territory; and today, Paresh Barua and his ULFA cronies have been traced to Ruli in China. Pakistan is using Indian Mujahideen (IM), Popular Front of India (PFI) and Lashkar-e-Taiba (LeT) to attack India.

Conventional Capabilities Some terrorist organisations which are state supported, acquire weapons

and capabilities close to those of conventional forces. The erstwhile LTTE and present day USWA are potent examples. Taliban, which ousted the Soviets and ruled Afghanistan for a decade, had tanks, artillery and air support of Pakistan military. In recent years, Pakistan Taliban had been conducting cross-border raids into Afghanistan supported by Pakistani artillery and helicopters. The juggernaut of the Islamic State of Iraq and Levant (ISIS) advancing on Baghdad is perhaps the most powerful terrorist organisation in the Middle East which has also become the richest terrorist organisation having looted the banks after capturing Mosul. In a single week, more than 90,000 Iraqi soldiers have deserted the place rather than fighting the advancing ISIS. Modern arms, including hand-held precision-guided munitions could be used against civilian and/or military aircraft, and automatic weapons that facilitate a wide array of terrorist operations, communications, GPS equipment etc.

Terror Weapons A perfect example of using what is available everywhere was the 9/11 attack using US commercial aircraft targeting the US itself. The incident stunned everyone, including the superpower US. Since then, plane hijacks for similar purposes have been

25 | Geointelligence JULY - AUGUST 2014

With asymmetric warfare becoming a potent weapon for countries to use against its adversaries, chances of terrorists using hi-tech weapons have increased manifold. Terrorism thus has become the currency of power


Proxy wars

attempted several times, for example, the recent terrorist attack at Karachi airport in which no aircraft was damaged. Commercially available fertiliser, chemicals and gasoline are being used to manufacture IEDs and car bombs, and are extensively used with deadly effect including in India. India was ranked third in World’s ‘most dangerous places’ list of 2013. Data from National Bomb Data Centre (NBDC) for 2013 shows India suffered 212 bomb blasts last year, more than double of what Afghanistan (with 108 blasts) suffered. Maoists in India have easy access to explosives and detonators from mining activities in areas of their influence. The recent recovery of 145 kg of ammonium nitrate from a car in Varanasi, Uttar Pradesh (UP), may be a pointer to advent of car bombs in India, especially with an Al Qaeda video now calling for open jihad in Kashmir. Fertiliser and chemical plants plus oil refineries can be used by terrorists to cause widespread disturbances.

Internet and Social Media

26 | Geointelligence JULY - AUGUST 2014

The Internet and social media have become boon for radicalisation, messaging and coordinating terrorist actions. Increase in networks implies rise of ‘net war’ with power transferred

to terrorists. The social media was actively used to scare the northeast residents out of Bangalore city in Karnataka, and surrounding areas, by posting false photographs and messages of their native homes and families attacked and destroyed. More recently, videos uploaded on social media added to inflame communal discord during the Muzaffarnagar riots in UP.

Cyber Terrorism The 9/11 terrorist attack also knocked out critical financial transaction networks and caused an overload of the telecommunications grid. Cybersecurity expert Dan Verton said in 2002, “While Osama bin Laden may have his finger on the trigger, his grandson may have his finger on the mouse.” Cyber terrorism is not new. The first major attack caused the Siberian pipeline explosion in 1982. Over the years, dams, communications and power at airports, pipelines, sewage system, nuclear monitoring systems, train signalling system, automobile plants, hospital systems, all have been attacked and remain vulnerable in future. Many Indian websites are attacked periodically, including government, defence, intelligence, nuclear installations and organisations. A Syrian terrorist group called

Syrian Revolution Soldiers (SRS) recently hacked 27 Maldivian government websites posting a message that this was done because of “silence of the world to resolve the Syrian conflict, which has lasted nearly three years”.

Bomb Implants and Body Cavity Bomb (BCB) In August 2009, Al Qaeda terrorist Abdullah-al-Asin, tried to assassinate a Saudi prince with bomb inserted in his rectum but the prince suffered minor injuries. The fact that bomb implants may be a reality soon was brought home in a fictional article on Mail Online by Michael Burleigh; a man carrying a diabetic kit with the syringe injects ‘insulin’ (actually chemical explosive Triacetone Triperoxide) into his stomach during flight, the liquid combined with explosives implanted inside him blowing up. Last year, Asadullah Khalid, head of Afghan intelligence, was targeted by a human bomber. Khalid survived with severe injuries but it remains unclear where the bomb was concealed. British nationals killed and wounded in the 7/7 London Tube bombings in 2005 had bone shrapnel injuries, including one man blinded by a bone fragment from the bomber himself. US intelligence believes Al Qaeda has devised a


3D Weapon Printing Texas firm, Solid Concepts, has made the first metal gun using a 3D printer. 50 bullets were fired from this gun. Earlier, The Mail had printed the first plastic gun in UK, capable of firing a live round, using a 3D printer costing GBP 1,700 and then took it onboard a fully packed Eurostar train in May 2013 without being stopped by security. Blueprints of the weapon, Liberator were reportedly downloaded more than 100,000 times before it could be removed from the web. Liberator costs just USD 25 if you have a 3D printer.

Explosives Explosives like Semtex, liquids and non-detectable type developed by Al Qaeda are on the scene. In February 2012, media reported a new type of explosive which a man on a motorbike attached to the car of an Israeli diplomat in New Delhi, but then limpet mines attached to metal have been in existence for decades. Terrorists generally rely on explosive material (chemicals, fertilisers) available in open market. A report in Mail Online dated 15 June 2014, says that Al Qaeda has developed liquid explosives which blow up when dry, prompting US’

CBRN WMD has two connotations; Weapons of Mass Destruction and Weapons of Mass Disturbance. Just like Sarin gas attacks in Syria shook the world, the Aum Shinrikyo cult also used Sarin gas for multiple bombings of Tokyo Subway in 1995 killing 13, injuring 50 and causing temporary loss of vision to 1000. The Cult actually had enough Sarin gas to kill 1 million people. Terrorists today are developing NBC capabilities, assisted by fissile material available in the black market. Toxic radioactive agents can be paired with conventional explosives and turned into a radiological weapon. The recent theft of a truck full of Cobalt-69 in Mexico is an example of the inherent dangers. Recovery of a 1.5 kg Uranium mine by the Army in Assam during January 2013 is significant since intakes of uranium can lead to cancer risk, liver and kidney damage, and cause widespread public panic. The US was subjected to Anthrax attacks in 2001. India experienced the Cobalt-60 leak in Mayapuri in New Delhi during 2011 and in the same year 15 x Uranium sticks went missing from Steel Authority of India which are yet to be traced. Incidentally, as per Russian intelligence, Britain Defence (a top mercenary outfit of UK) had provided a chemical bomb to Syrian rebels, as proposed by Qatar and approved by Washington, which perhaps was used for the first Sarin gas attack on hapless civilians during 2013.

trolled helicopters but luckily, both of them crashed during trials. Had they used aerial spraying, the damage would have been catastrophic. LTTE had its owned aircraft, 9/11 terrorists commandeered US commercial aircraft, and the USWA has its own helicopters. The threat from air has multiplied greatly with proliferation of UAVs. Now, we have drones being used extensively. Besides, if www.amazon.com can use autonomous winged robots to deliver orders on your doorstep, so can terrorists deliver bombs, using drones even for CBRN attacks.

India and Terrorism The strategic aims of China and Pakistan at the sub-conventional level are threefold: One, create a Compact Revolutionary Zone (CRZ) combining all insurgent/ terrorist outfits within India and increase their combat potential; two, involve the Indian Military, particularly the Army, into the Maoist insurgency; and three, reduce India to fighting its own people, degrading its external combat potential and keep India’s economy and regional/ global aspirations in check. India must be prepared for attacks in which terrorists will use latest technology, weapons and innovations. It needs to renew efforts in order to enhance surveillance and monitoring; and synergise national efforts to beat the terrorists at their game. The bottomline is that India should be able to prevent terrorist attacks and react swiftly in case of an attack. Technology plays an important role in all this and one must capitalise on it.

Aerial Delivery The Tokyo Subway bombing of 1995 which was carried out by the Aum Shinrikyo cult had two remote con-

Lt Gen PC Katoch (Retd) prakashkatoch7@gmail.com

27 | Geointelligence JULY - AUGUST 2014

way to conceal explosives inside a body that can avoid detection by sophisticated scanners. They also claim Al Qaeda has developed an undetectable liquid explosive that can be soaked into clothing and ignited when dry.

evacuation of Yemen. Earlier in 2008, US intelligence intercepted an Al Qaeda underwear bomb using new type of explosive not seen earlier, which used two redundant initiators filled with liquid explosives to detonate a larger liquid explosive charge in men’s briefs. The largely undetectable device could be intercepted because of an intelligence operation that stole the design and a copy of the prototype.

Credit: Wikipedia

Commercially available fertiliser and chemicals are being used to manufacture IEDs and car bombs


Interview

28 | Geointelligence JULY - AUGUST 2014

Delivering actionable intelligence in real-time from the Big Data is a major challenge before defence agencies today. In an interview to GeoIntelligence, Bob Braham, CMO, SGI, tells us how his company is addressing this critical need of the defence Can you tell us about your offerings for Big Data Analytics? SGI offers a range of big data solutions designed to fit the needs of customers working at a variety of stages in their big data deployment process. Its three main big data systems are the SGI InfiniteData cluster, SGI DataRaptor, and SGI UV family. SGI’s InfiniteData is a cluster computing platform which brings exceptional scale-out performance to a highly flexible storage system for big data insights. The InfiniteData Clusters can adapt to the data demands of its users, growing to encompass multiple racks with thousands of nodes and linear scalability. The clusters are factory integrated with the Cloudera Hadoop system and run on a Linux OS to offer a highly versatile system that can tackle a range of big data problems. InfiniteData Cluster delivers 40 2U cluster nodes and 1.9PB in a single rack, enabling companies to scale-out to meet massive data demands with ease. The SGI DataRaptor with MarkLogic Database for NoSQL data analysis offers companies a turnkey operational database solution that comes pre-configured to allow companies to quickly deploy a scalable big data system. The system starts at five nodes with 80 cores, but can expand further to meet a company’s big data needs. The SGI UV system is a highly scalable in-memory system designed to over-

come exceptionally large data-intensive applications and quickly provide insights to its users. Offering up to 64 terabytes of memory, the UV system is one of the largest in-memory systems available and can scale a Single System Image (SSI) to a maximum of 2,048 cores (4,096 threads) because of its innovative NUMAlink® interconnect. The UV system’s huge capacity makes it ideal for data-intensive workloads and is designed to lower IT burden per compute core by consolidating complete workflows in a single system. The UV system also supports GPU-accelerated technology allowing for massively scalable parallel processing systems. We are now talking about real-time intelligence. Delivering actionable insights in real-time from the massive amounts of structured and unstructured data. What are the challenges involved in this and how do you overcome this? Real-time insights require specialised hardware that are not typically delivered by the commodity hardware in use today. The typical cluster has too much latency because of a less capable interconnect to provide a rapid stepthrough of lots of data. An answer that is too late, is just no longer of value. Fortunately, SGI provides hardware that is specialised in that — it can store massive amounts of data in RAM memory (up to 64 TB) in a low-latency flat memory address space (on an average a hundred times faster than even flash memory) but at the same time, it is


based around commodity components such as the Linux operating system and x86 instruction set processors. This is what is in use by INSCOM today. Can you explain in detail how SGI supports Activity-based Intelligence (ABI)? ABI is a broad category of work which SGI does for geospatial intelligence. There is a real-time component to it, which is addressed by our in-memory platform, and a software layer provided by our software partner. There is also a non real-time component to it and this is addressed by Hadoop on top of our Rackable and InfiniteData Cluster platform with customer-created applications (not third party like the above). And then there is a virtualisation component. This gives the government flexibility to build a software layer that is extensible (that is, you can change the software or hardware layer independently). This is our Rackable hardware with various virtualisation offerings both open source and proprietary.

Last but not the least is a storage component. This is addressed by our data management solutions such as InfiniteStorage hardware and DMF software. You have recently partnered with GIS Federal and NVIDIA for a project of United States Army Intelligence and Security Command? Can you tell us about it? The SGI/GIS Federal searchable geospatial database system runs on a 10 terabyte (TB) SGI UV 2000 system, incorporating 16 NVIDIA Tesla K20x GPUS for GPU-accelerated parallel computing. The deployment runs a GAIA distributed database, used by the Army INSCOM, to rapidly render complicated geospatial features and heat maps to more accurately pinpoint potentially dangerous activity at a given point. The SGI UV highly scalable shared-memory architecture allows GAIA to analyse and render a high volume of data streams at a lightning fast pace to provide insights in a matter of

seconds. The INSCOM GAIA system is the only system with 16 GPUs in such a large single-system image. What, according to you, are the potential geographies/ markets for SGI in defence sector? SGI sells to US, and our allies in Europe, Asian, and Australia. What are the key trends as far as Big Data is concerned? The adoption of in-memory technologies has been a leading trend in the Big Data market as organisations continue to accumulate massive stores of data that need to be accessed quickly to provide insight. In-memory systems enable fast access to information, allowing businesses to pull real-time insights that can be applied to real world situations. We are also seeing a more general trend of organisations realising the value of big data systems, adopting technology that was traditionally used solely for high performance computing workloads.

www.geointworld.net A Resource Portal for the Global Geoint Community

29 | Geointelligence JULY - AUGUST 2014

now Online!


Weaponisation of Space

SPACE BASED SYSTEMS AND

30 | Geointelligence JULY - AUGUST 2014

ASAT weapons are being developed to destroy hostile satellites function without any interference. This trend is likely to pose

S

pace has been used for both civil and military purposes ever since the launch of the first satellite ‘Sputnik’ by the erstwhile Soviet Union way back in 1957. Since then exploitation of the sector has been dominated by military considerations as control of space is perceived to be the essence of ultimate command of Planet Earth. This is substantiated by the fact that the very first military satellite was launched in 1958, and in less than a year, the tests of anti-satellite (ASAT) weapons began. Thus from ‘militarisation’, by placing satellites in space to enhance terrestrial systems, we are

seeing a graduation to ‘weaponisation’ of space with the development and deployment of ASAT weapons. Space-based assets are ‘force multipliers’, allowing traditional military missions to be conducted more efficiently. As the technology advanced, these assets became ‘force enablers’, opening up new mission possibilities. This perhaps is the irony dictating the development of both defensive and offensive weapon systems. Not surprisingly, the advances in space technology have introduced a potential battleground that did not exist earlier. Space technology is entering a phase where systems are becoming

complex and multipurpose, while the distinction between offensive and defensive is becoming extremely thin. In today’s world, with so many nuclear weapons dependant on satellites for their efficient use, any damage or disruption caused to the latter might lead to hostility between states and endanger international security. Also, space-based systems are now being used to give early warning of missile launches or for target tracking, damage assessment and communications. The concern here is the ease with which satellites may be degraded and thus any threat to these systems will accelerate the arms race between nations.


THEIR THREAT MATRIX

Space-Based Systems Control of space is not only important to ensure access to satellites but also to support military operations on the earth. Any disruptions in these assets are likely to cause an imbalance in the strategic stability. The various systems orbiting the earth along with their applications are discussed in the subsequent paragraphs.

Reconnaissance Satellites Reconnaissance craft are probably the most important type of military satellites since they are not only used for verifying certain arms control agreements but also are primarily

used for pinpointing or acquiring military targets. These satellites can be divided into four kinds: photographic, electronic, ocean surveillance and early warning satellites.   Photographic Reconnaissance Satellites: These detect, identify and pinpoint military targets. Sensors on board such satellites include television cameras, multi-spectral scanners and microwave radars. Most satellites broadcast a very wide signal which can be picked up in areas hundred of miles wide, but military satellites need to broadcast a narrow beam (as well as use encryption

and frequency hopping).   Electronic Reconnaissance Satellites: These are the ‘ears’ in space. They carry equipment designed to detect and monitor radio signals generated by activities on ground. Signals originating from military communications among bases, from early warning radars, air-defence and missile-defence radars or those used for missile control can be picked up by them. Not only do they locate systems producing electronic signals but also measure the characteristics of the signals so as to be able to plan penetration of defences.

31 | Geointelligence JULY - AUGUST 2014

and ensure that a country’s own satellites are able to a threat to any country, in hour of crisis


Weaponisation of Space

Communications Satellites Space-based sensors for surveillance of the earth, together with land-based surveillance systems, generate a considerable amount of data. The transmission of this and other data for military purposes need reliable and secure communication systems. Space is an area of vital interest as about 80 per cent of military communications are carried out using artificial earth satellites. Satellites also play a vital role in the command and control functions for the military forces of the big powers. Even communications between mobile forces such as aircraft, naval ships and soldiers on foot and their commanders is being conducted via satellites.

Navigation Satellites

32 | Geointelligence JULY - AUGUST 2014

For many weapon systems, it is important to know the exact posi-

tion and speed of a weapon. This is particularly so for missiles launched from sea-based platforms. Satellites are beginning to fulfil these requirements. Naval surface ships as well as submarines, aircraft and missiles determine their positions and velocities using signals emitted continuously by satellites. One of the more well-known programmes, the Global Positioning System (GPS), guides precision weapons such as joint direct attack munitions, conventional air-launched cruise missiles and Tomahawk land-attack missiles launched from aircraft and ships. GPS accuracy aids search and rescue, air refuelling, mapping, geodetic surveys, ground troop movements and other missions.

Meteorological Satellites While the knowledge of cloud formation and movements is of importance in the photography of targets of military interest by reconnaissance satellites and in planning bombing missions, the amount of data collected is considerably more than this. These satellites have sensors which measure oxygen and nitrogen density of thermosphere, and which determine the temperature and water vapours at various altitudes. An immediate application of such data is for improving the accuracies of missiles.

Geodetic Satellites The knowledge of geophysics is continually being refined and increased. An important aspect of geophysics is geodesy, which includes determina-

Credit: Wikipedia

Satellites are also good surveillance devices and are involved in electronic countermeasures such as jamming an enemy’s signal, or revealing his activities which are intended to be undetectable.   Ocean Surveillance and Oceanographic Satellites: These detect and track naval ships and determine sea conditions, which help in forecasting the weather. They can also detect submarines with equal ease.   Early Warning Satellites: These give warning of a surprise attack by ballistic missiles. While the radars used earlier provided about 15 minutes of warning, the satellites have extended this warning time to 30 minutes.

tion of size and shape of the Earth, its gravitational field, detail maps and location of cities, towns and villages as well as the precise positions of military targets on the globe. This brief review of the space assets having military use indicates that the military satellites of the major powers are increasingly becoming part of the worldwide nuclear and conventional weapon systems that threaten the Earth’s future. Hence, space based systems could become targets in any major future conflict.

Reviewing the Threat Matrix It is an established fact that the bulk of satellites, spaceships, stations and probes launched so far have performed military functions such as intelligence gathering, communication and navigation. Hence, it is too late to prevent militarisation of space. Also, the extensive use of spacecraft for auxiliary military purposes makes them tempting targets for attack. Weapons are bound to be developed to hit targets in space and from space, counter systems would be built against such weapons. Then, anti-counter systems would be devised to neutralise the latter, and so on. This is possible as space offers ample room for military rivalry. To be able to draw significance of the space strike weapons, it needs to be understood that these are global in range and scope and virtually instantaneous in effect. These can also be employed to hit ground, air and sea targets making them extremely versatile weapons. An important aspect of the threat to the space- based system emerges from the fact that these follow largely predictable orbits — sometimes for years — and are relatively fragile objects. The threat emerges from the complex systems deployed and employed on land, sea, air, and of course, space. These are currently confined to the fields of:  ASAT Weapons   Kinetic energy weapons   Directed energy weapons like lasers and particle beam weapons


ASAT Weapons The ASAT weapon systems are being developed to destroy space-based systems which may pose a threat to any country in hours of crisis. The purpose of these weapons will be twofold: first, to destroy hostile satellites in space and second, to ensure that a country’s own satellites are able to function without any interference. Some of the systems employ nuclear-tipped missiles wherein the nuclear explosion affects the electronic and semi-conductor components of the system. Further, these weapons are not the only means of carrying out ASAT activities. The ground receiving stations linked to communications satellites and the space surveillance network are also vulnerable to attack. Thus, in any discussions involving ASAT systems, weapons capable of destroying such ground data-receiving stations and ground-based satellite command and control systems would also be considered. There are considerable similarities between the basic technologies used in ASAT and Ballistic Missile Defence (BMD) weapons. Hence, work on one can boost developments in the other area. Since 1989, the US has been developing a programme featuring a hit-to-kill warhead, called the Kinetic Energy Anti-satellite (KEASAT) weapon, similar to that being developed for BMD. KEASAT uses a visible light optical seeker to find and track the target while a small computer-operated rocket motor guides the vehicle onto a collision course. It also has a shroud for the purpose of containing all the debris so as not to create space junk that would jeopardise US spacecraft. Electronic signal manipulation forms another major class of ASAT weapons. The signal to the satellite can be disrupted with a very loud, electronic, competing signal. It is thus

jammed. The signal to the satellite can be changed with incorrect information replacing the correct information. This is called spoofing.

Kinetic Energy Weapons Kinetic energy or impact weapons can be propelled either by chemical rockets or by electromagnetic forces. These normally employ rocket interceptors or rail guns, both using a Miniaturised Homing Vehicle (MHV) that homes in on the target and destroys it by direct impact. For rail guns, the homing vehicle is called a ‘guided projectile’. The corresponding device for interceptors is the Space-Based Kinetic Kill Vehicle (SBKKV). The rail gun’s guided projectile is launched alongwith a rail with tremendous acceleration by an electromagnetically generated force that acts on the projectile. According to current designs, this projectile would also have propulsion for guidance. The interceptor’s rocket is designed to accelerate its payload to maximum velocity in space, where it would be terminally guided. Limits on the velocity of space-based rocket interceptors do pose a few problems. Interceptor rockets have an advantage. They can be fired in a salvo, that is, launched together to attack many targets at the same time. Thus, if they are within the range of a large number of space-based systems, they could destroy most of them simultaneously. On the other hand, rail guns do not have this advantage as their projectiles are fired sequentially. Despite producing higher velocities, they use energy less efficiently. This would imply that a defence constellation of rail guns would require a smaller number of battle stations, as the coverage varies inversely to the square of projectile velocity. The rate-of-fire limitations rule out the possibility of all projectiles being launched immediately. Given these limitations, if the Inter-Continental Ballistic Missiles (ICBMs) are launched simultaneously, it may not be possible for a single gun to attack all the ICBMs launched in the vicinity of the battle stations before the boost phase is completed.

Space-based systems are now being used to give early warning of missile launches or for target tracking, damage assessment and communications Kinetic energy weapons are, however, well suited for attack during the post-boost and midcourse phases due to the advantage of lethality. As long as a direct hit is obtained, the target will be killed, since it is impossible to harden a booster, a bus, or a RV against kinetic energy weapons.

Directed Energy Weapons Lasers: It is an acronym for ‘light amplification by simulated emission of radiation’. It is a device that produces an intense, narrow beam of electromagnetic radiation which is capable of destroying a missile by damaging the skin or outer casing of the missile. The feature that makes a laser particularly attractive for destruction of space systems is its potential to deliver a narrow beam at a great distance at the speed of light. This makes it faster than any kinetic energy weapon, by over a thousand times. From early 1990s, lasers have demonstrated the capability to be developed as potential weapons against space based assets. High-energy lasers based either in space or on the ground with relay mirrors could be very potent weapons when used against a relatively soft target such as satellites, boosters or a bus. The problem is that lasers can only kill boosters at a certain rate. The laser beam must ‘dwell’ on the target for a certain length of time before the

33 | Geointelligence JULY - AUGUST 2014

Apart from satellites, space stations and space shuttles can be used as platforms for these weapons. The succeeding paragraphs will trace the complexities of the threat matrix emerging out of the numerous systems that have thus far been employed.


Weaponisation of Space

  Free electron lasers   X-ray lasers

Credit: www.g23pax.com

Particle Beam Weapons

34 | Geointelligence JULY - AUGUST 2014

Particle Beamer

laser spot will burn through the skin of the booster and destroy it. This ‘dwell time’ is directly proportional to the laser spot area and the target hardness, and inversely proportional to the average power of the laser. The US is developing an Airborne Laser (ABL) programme, which is designed to acquire, track and destroy theatre ballistic missiles. This may be the first step towards building a spacebased laser weapon system. In addition to the ABL, another programme is underway to demonstrate the feasibility of a high-energy laser weapon in space. The underlying assumption is that the entire weapon platform must be deployed in space as this is the most technologically feasible and cost-effective approach. An alternative architecture involves placing the laser device on the ground and employing optical systems, which are basically large mirrors, to relay the laser beam to the target. While another option entails using a combination of space-based lasers and optical relay mirrors in order to reduce the number of costly laser platforms. With its tremendous speed, lack of recoil and extremely long range, laser offers the potential to destroy missiles and other space based systems. The four major types of high energy laser systems that are being considered for space-based and ground-based laser weapons are:  Chemical lasers powered by a reaction between hydrogen and fluorine, oxygen and iodine, and deuterium and fluoride   Excimer lasers using krypton fluoride

These fall into two categories, neutral and charged particle beams. All particle beams start out as charged beams, accelerated up to speed and steered by magnetic or electric fields. To create a neutral beam, the charge is then removed by stripping one of the electrons from each particle. These do get absorbed by the atmosphere and can be used up to about 600 kilometres.

Threat from Emerging Technologies The use of orbiting rods of depleted uranium equipped with small boost rockets and GPS guidance electronics could be ordered by ground controllers to plunge from orbit, travelling at hypersonic velocity as they neared Earth. They could penetrate hundreds of feet into the earth, overcoming all attempts to harden underground command bunkers. They might even be effective against high-value airborne targets, such as Airborne Warning and Control System aircraft. Electromagnetic radiation weapons might be another technology that is close to coming into its own. Development of large thin-film antennas could enable spacecraft to project narrow beams of Radio Frequency (RF) energy over long distances to either space or ground targets. There are some rendezvous space weapons, for instance small satellites that gradually edge closer to target space assets. They might quietly spray paint onto an adversary’s sensors or solar panels or nudge the craft gently to send it out of orbit. Rendezvous weapon’s effects might be difficult to distinguish from simple malfunctions. Some of the weapons that could be used against satellites, such as aircraft-launched kinetic anti-satellite interceptors are relatively inexpensive compared with the cost of the satellites themselves. Decoys might be one defensive solution. Lightweight fake satellites attached to the real thing with long tethers might be able to deceive some

anti-satellite weapons. Furthermore, development of space ‘mines’ may soon be within the reach of a number of nations. Mines are quite awkward to negate, as it is not clear if they would be detectable from the ground. The next step up the escalator is likely to be the electronic jamming of an adversary’s space assets. The act of ‘uplink jamming’— or interfering with satellites themselves via brute-force noise or other selected wavelength interference — is an attractive option but requires large amounts of electric power. That means uplink jamming systems are likely to be large and complex. Downlink jamming — blocking ground-system reception of space transmissions — might be a simpler technological task. The dedicated jamming aircraft and helicopters now used to perform conventional airborne jamming missions could be modified for use in this role. Finally, the world needs to consider how to clear space debris. Such an activity might be analogous to clearing sea lanes of mines or dangerous flotsam. Today, Earth is orbited by more than 150,000 pieces of debris which are large enough to damage or destroy any space system. The amount of such debris is likely to mushroom in years to come, when there will be hundreds or even thousands of small to medium-size satellites in orbit. The security of assets in space is critical to confidence in strategic planning. If strategies in this environment are to include possible conventional war and limited nuclear conflicts, the utility of space assets rises dramatically.

Maj Nikhil Kapoor nkapoor11.nk@gmail.com


events

JULY

OCTOBER

DECEMBER

MVEC 2014

Euronaval 2014

Exponaval

http://www.militaryvehiclesexpo.com/

www.euronaval.fr

http://www.exponaval.cl

UCAV 2014

July 30-31, 2014 London, UK

http://www.ucavconference.com/

SEPTEMBER XXII International Defence Industry Exhibition

October 27-31, 2014 Paris Le Bourget, France

9th AIRTEC 2014 October 28-30, 2014 Frankfurt/Main Germany

http://www.airtec.aero/index.php?id=1&L=1

Expodefensa 2014 October 29-31 Bogota, Columbia

December 2-5, 2014 ValparaĂ­so, Chile

FEBRUARY Avalon 2015

February 27- March 1 2015 Geelong, Victoria Australia

http://www.airshow.com.au/airshow2015/index. html

www.expodefensa.com.co

MARCH

http://www.targikielce.pl/pl/mspo.htm

NOVEMBER

GeoIntelligence Asia 2015

GPEC

Indo Defence 2014

September 1-4, 2014 Poland, Europe

September 9-11, 2014 Leipzig, Germany

March 17-18, 2015 Kuala Lumpur, Malaysia

www.gpec.de

November 5-8, 2014 Kemayoran , Jakarta-Indonesia

Africa Aerospace and Defence

Airshow China 2014

LAAD Defence & Security 2015

www.chinaexhibition.com

http://www.laadexpo.com.br/?lang=en

September 17-21, 2014 AFB Waterkloof , Centurion, South Africa www.aadexpo.co.za

www.indodefence.com

November 11-16, 2014 Zhuhai, Guangdong, China

http://geointworld.net/

APRIL

April 14-17, 2015 Rio de Janeiro, Brazil

Land Forces 2014

GeoIntelligence Brasil 2014

Counter Terror Expo 2015

www.landforces.com.au/exposition/index.asp

geointworld.net/Brasil

http://www.counterterrorexpo.com/

September 22-25, 2014 Brisbane, Australia

November 13-14, 2014 Rio de Janeiro , Brasil

April 21-22, 2015 Olympia, London

35 | Geointelligence JULY - AUGUST 2014

July 29, 2014 Detroit, Michigan


36 | Geointelligence JULY - AUGUST 2014

Report

A three-day exhibition and conference, ITEC, dedicated to military training, education and simulation concluded in Germany recently

A

round 90 per cent of battles are believed to be fought between state and non-state actors in the next 10 years. How does one train forces for that, given the complexity of warfare? How does

simulation industry respond to this new challenge? These were some questions debated by the military, academia and industry from the simulation world, who had all gathered in Germany to be a part of the three-day exhibition and conference, ITEC. Organised by Clarion Defence

& Security Ltd, the theme of this year’s conference was From Engagement to Preparedness: Implications for Military Simulation, Training and Education. Experts identified capability, scalability, agility, complexity and uncertainty as the five major challenges faced by the armed forces. That is, forces should be trained in such a way that they are capable of operating successfully and quickly (agility) in all circumstances. While scalability can be ensured with a range of tools which the military should possess, complexity involves preparations for different and uncertain environment in which the forces operate. Even as military wanted industry to deliver on these lines, they also made it clear that they do not have adequate budget for the same. “Simulation is a necessity. We don’t have a choice,” said Maj Gen Richard Longo, Deputy Commanding General, US Army Europe and Commander, US Army NATO, adding, “Simulation, amongst other advantages also helps us save money.” The event saw experts debate over a number of issues — from innovative learning technologies to cyber security; from emergency services to medical training, from virtual reality to virtual augmented reality. While some talked about the importance of good Digital Elevation Models (DEMs), others focussed on the challenges of interoperability and standards. According to Jean-Paul Dichter, Manager System Development, e.sigma Systems, augmented reality will find its way into the training business. That is the future — virtual combined with augmented reality.

Military Simulation and Training (MS&T) & NATO The expected decline in NATO’s operational tempo following the change of ISAF mission in Afghanistan scheduled for the end of this year, is set to deliver a renewed emphasis on MS&T capacity as alliance partners shift from deployment to preparing for new challenges, said NATO officials who had gathered in large numbers at the event. “Direct interaction between customers and


Medical Simulation The Global Military Simulation and Virtual Training Market 2014–2024 forecasts market growth at a CAGR of

Attendees at the ITEC Conference and Exhibition

3.48 per cent (as per study conducted by RnRMarketResearch.com). Also, as per marketsandmarkets.com, the global healthcare/medical simulation market, which was valued at USD 790.1 million in 2012, is poised to grow at a CAGR of 19.6 per cent in the forecast period to reach USD 1930.5 million by 2017. Little wonder then that medical simulation was one of the major attractions at the conference. Representatives from NATO shared their experiences with people, and explained how the training has helped the forces in saving lives of their colleagues operating in warzone.

Exhibition The exhibition arena witnessed hectic activities all days. Exhibitors

like Bohemia carried out live demos of its simulation capabilities before the people. Similarly, CAE together with Rolands & Associates (R&A) demonstrated a ‘comprehensive constructive simulation solution’ for joint training and wargaming. MASA, known for developing Artificial Intelligence-based Modeling & Simulation (M&S) software for defence community, showcased latest versions of its two flagship products: MASA SWORD and MASA LIFE. Nearly 110 exhibiting organisations from 16 countries displayed their products at the event, which was held in May (20-22). The next edition of the conference, ITEC 2015, will be held from 28-30 April 2015 in Prague, Czech Republic.

37 | Geointelligence JULY - AUGUST 2014

suppliers is crucial if we are to deliver an efficient military simulation and training market within the alliance’s borders,” said Wayne Buck, Modelling & Simulation Analyst with Allied Command Transformation at NATO. NATO had a series of sessions at the event where the participants discussed about their challenges, requirements and also demonstrated the technology available with them. In one such session, ‘The Connected Forces Initiative in Nations,’ the force provided an update on how nations are implementing the Connected Forces Initiative — a policy designed to maintain NATO’s combat effectiveness via expanded education and training through improved technology use. Similarly, in session, ‘2020 Technology Vision’, Brigadier General Gerd Bischof, Director Academic Planning at the NATO Defence College, spoke about the inevitable integration of Information Technology (IT) into the learning process, the limits of IT as a teaching tool and the economic case for its incorporation into modern systems.


Report

GeoInt is About

Outthinking

The Opponent

The eighth edition of GeoIntelligence India was held in New Delhi recently What is GeoInt?

Gen Bikram Singh, Chief of Army Staff, Indian Army, delivered the inaugural address at the event

38 | Geointelligence JULY - AUGUST 2014

D

escribing geoint as a vital foundation for defence, Gen Bikram Singh, Chief of Army Staff, Indian Army, said that defence industry needs to come up with innovative and economical solutions which cater to the complexity of today’s warfare. He also highlighted the need to build interoperability among the three forces. Gen Singh was delivering the inaugural address at GeoIntelligence India 2014. The eighth edition of GeoIntelligence India, organised by Geospatial Media and Communications, took place at the JW Marriott, Aerocity, New Delhi, India, on 12-13 June 2014. The conference is renowned for its thought provoking sessions from eminent speakers from military, industry, academia and importantly, individuals at the policy formulation level. The theme of this year’s event was ‘GeoInt: Enhancing Combat Potential’. Speaking about the importance of technology, Lt Gen (Dr) Prakash Menon (Retd), Military Adviser, National Security Council Secretariat, said, “If In-

dia does not leverage the technical advancement, it will be left behind. India needs to establish a national capacity which will help build its technological capabilities. That requires a policy.” AG Apte, Chairman, NTRO, raised an interesting point when he said that ‘geoint itself can become a platform for data fusion and analysis.’ He then spoke about the challenge of ensuring security of this platform and stressed upon the need to build effective cyber defence capabilities. Raising the issue of private players in the Indian defence sector, JD Patil, Director, Heavy Engineering, Larsen & Toubro, said a relationship of trust between government and private industry is an absolute necessity if India is to reach self-sufficiency in indigenous defence manufacturing. Explaining how homeland security has assumed importance overtime, Atul D Tayal, Joint Managing Director & COO, Domestic Operations, Rolta, focussed his talk on the kind of solutions the company provides to armed forces and internal security.

Prof Todd Bacastow, Dutton eEducation Institute, Penn State University, who was the guest speaker at the event explained the importance of geoint in today’s warfare. “GeoInt is ultimately about outthinking an opponent. It provides the decision maker with the advantage of insights about the human’s use of geography. GeoInt methods are an integration of the intelligence tradecraft and geoinformatics,” he said.

Advancement of GeoInt The first plenary session with the theme ‘Surveillance in the Digital Battlefield’ was chaired by Lt Gen Anil Bhalla, DG DIA & DCIDS. Dr MR Bhutiyani, Director, Defence Terrain Research Laboratory (DTRL), talked about empowering the armed forces with advanced geospatial intelligence. He explained that this could be achieved through terrain analysis using remote sensing and GIS. He also spoke about the ongoing projects in the field of geointelligence like Terrain Assessment System for the Western Sector and System for Information Extraction of the Spatial Terrain Intelligence. “The commander and frontline soldier have specific information requirements and they must get the information they need but without overwhelming technology load and information over load,” said Brig Amul Asthana, 11 GR, Indian Army, who spoke about the industry-user synergy in surveillance. Kaushik Chakraborty, Vice President, Hexagon India, and his team spoke about


the importance of imagery intelligence, its interpretation and near real-time workflow for time critical applications. NS Narayana, Senior Director-Government Programmes, DigitalGlobe, explained to the audience about Worldview-3 satellite (claimed to be the most advanced highest resolution commercial remote sensing satellite by the company).

Lt Gen (Dr) Prakash Menon (Retd), Military Adviser, NSCS

AG Apte, Chairman, NTRO

Tracking Geographic Location “Ensuring national security is a complex challenge. Providing a common enterprise platform is helpful in this endeavour,” said John Day, Director, Global-Defence, Esri, as he shared his vision of empowering users by increasing collaboration, agility and responsiveness during the second plenary session, ‘Converting Geographic Coordinates to Navigation Coordinates.’ RAdm (Dr) S Kulshrestha explained the concept of Maritime Domain Awareness (MDA) and spoke about the importance of navigation. Brig Rahul Bhonsle (Retd), Director- Security Risks Asia, discussed the challenges of converting geographic coordinates into navigational coordinates. He pointed out that some of the ways to overcome these challenges are through open source, encryption and accuracy. The session was chaired by VAdm SK Jha, Chief Hydrographer, NHO.

Lt Gen Anil Bhalla, DG DIA & DCIDS

Dr MR Bhutiyani, Director, DTRL

Atul D Tayal, Joint Managing Director & COO, Domestic Operations, Rolta

John Day, Director, Global-Defence, Esri

Kaushik Chakraborty, Vice President, Hexagon India

Nikhil Kumar, Director-Technical Marketing, Trimble

NS Narayana, Senior DirectorGovernment Programmes, DigitalGlobe

Anand Santhanam, Director-APAC, BAE Systems

“Air threat is becoming more severe with the advancement of UAVs and UCAVs,” said Lt Gen VK Saxena, DG AAD, Indian Army, while chairing the session on ‘Target Acquisition and Weapon Guidance’. “Threat from UAVs is a reality. Carrier-based UAVs is a threat of future. In order to address air threat, studies needs to be carried out on regular basis,” said Brig KJ Singh, Indian Army. Stressing upon the importance of geotech, Col US Sengupta, MCEME, Indian Army, said, “The geospatial coordinates are difficult to tamper with. Because of their accuracy and integrity,

39 | Geointelligence JULY - AUGUST 2014

Target Acquisition and Weapon Guidance


Report

The commander and frontline soldier have specific info requirements and they need it without massive technology load the geographical and spatial knowledge being merged into the target acquisition and guidance algorithms is among the emerging concepts in this domain.” “Network enabled weapon platforms with seamless integration of sensor and information grids have improved the capability of Reconnaissance, Intelligence, Surveillance, Target Acquisition and Guidance Systems (RISTAG). GIS is the zero of RISTAG,” said Col Ramesh Shanmugam, 505, ABW, Indian Army. Representing industry, Brig SC Sharma (Retd), Axis Aerospace, focussed his talk on simulation and its importance for war-like air defence scenarios. Simulation also results in preservation of warlike equipments and reduces costs.

40 | Geointelligence JULY - AUGUST 2014

Improving Disaster Management Skills The Uttarakhand disaster that took place about a year ago is still fresh in people’s minds. This was evident in the session on ‘Disaster Management’ with almost all experts referring to the incident in order to explain why disaster preparedness is important for the country. “It is not that we do not have basic information for disaster reduction like technical studies, geographical data, etc. This information does exist, but is not readily available to local authorities and other stakeholders. In fact, the information is hardly available in a form that facilitates decision-making,” said Sreeja Nair, Assistant Prof, In-Charge, GIS,

IDRN, National Institute of Disaster Management. Col Nadeem Arshad, Joint Advisor (IT & Communication), NDMA, also raised a similar concern when he said, “Real-time dissemination of information to local authorities and threatened community is our main requirement.” He described interoperability as a mandatory requirement for effective disaster management. Interoperability issues were discussed in detail by Dr MK Munshi, Chair, OGC India Forum, during his presentation as well. He explained the vital role of open standards in ensuring seamless interoperability between systems deployed by multiple agencies, working on different OS and GIS platforms. “There is a need to leverage technology for disaster management,” said Col Rajiv Mehta, CO 5 Sikh, Indian Army, who was one of the first respondents in carrying out search and rescue operations during the Uttarakhand floods. His views were echoed by Lt Col Ashish Bhagawan Sutar, MCTE, Indian Army, who emphasised the role of security forces in disaster relief operations. While VV Ganesh from NRSC, provided technological insight into ISRO’s various satellites and highlighted the activities of the organisation, Sunil Dhar, Scientist F, DTRL, spoke about their facility, Automated and Real-time Monitoring of Landslide (ARMOL) which the organisation has developed for real-time monitoring of landslide. Indian Meteorological Department (IMD), which provides the weather forecast of the country, has taken a number of initiatives to ensure that the forecast reaches the common man in simple language. “In order to ensure that people get weather news easily, we have developed an app for mobile devices which provides three days weather forecast,” said Rahul Saxena, Scientist E, IMD. The industry perspective was provided by Richard Sundaram, Head–Defence and HLS, Esri India, and Vinaybabu Adimulam, Senior Manager, Industry Solutions, Hexagon India, who introduced audience to the latest technologies which are

available for effective disaster management.

The Need for Smarter Borders The technical session on border security brought together experts from different organisations under one roof. Maj Gen Sanjeev Loomba, (Retd), Divisional Director, Defence and Security, Rolta, discussed why the proper management of borders is vitally important for national security. Brett Dixon, Business Manager, Esri, informed the attendees about the applications of GIS in border security operations. “Actionable Intelligence should be provided to those who need it. The need for simple, effective and timely solutions is crucial,” he added. “Border security is a national priority. Satellite and aerial imagery can help maintain a constant vigil along the border,” said Rohit Bhanot, Sr DirectorSales (Defence & Intelligence), DigitalGlobe, India, who then explained how his company can help secure borders. The session was chaired by K Srinivasan, Ex IG, BSF & Ex IG (Consultant) Int, CRPF.

Enhancing Combat Potential The technical session on ‘Emerging trends’ took off with Lt Gen BS Pawar’s (Retd) presentation on ‘UAVs: Enhancing combat potential and emerging trends’. Pawar stressed on functions of UAVs and how UAVs are an ideal platform for collecting information. “UAVs are a key part of combat operations and they provide exclusive capabilities to the forces,” he said. “Collective information and mashing crowd sourcing with wearable technology can empower the future of defence,” said Anand Santhanam, Director- APAC, BAE Systems. Santhanam also spoke about how BAE Systems is using wearable technology like Google Glass to collect and share information through processes like facial recognition. Nikhil Kumar, Director-Technical Marketing, Trimble, shared his vision of taking mapping to a new level through UAS Aerial Imaging. “Trimble products


Maritime Security The session on ‘Coastal and Maritime Security’, began with a presentation by KR Suresh, DIG, Head – Operations and Coastal Security Directorate, CGHQ. “It is important to enhance the security at the sea ports. There is a need to set up a coastal radar chain and marine police,” he said. He also informed the gathering that Indian Coast Guard is now better prepared to meet challenges at the sea than they were a few years ago. Captain AM Surej, Directorate General of Lighthouses, talked about e-navigation and how it will harmonise and enhance navigation systems as well as have a significant impact on the future of marine navigation. Mihir Gupta from IIT Bombay, who along with his team have developed AUV Matsya, spoke about the functions of the product and explained how it could be used for mine identification and ship hull inspection.

A Grid of Intelligence Networks “Geospatial technology has to be at the base of Crime and Criminal Tracking Network and Systems (CCTNS), and a major tool in counter terrorism operations,” said Sanjay Sahay, AGDP, Police Computer Wing & Nodal Officer, CCTNS, Karnataka, while making his presentation on the topic, ‘Internal Security and Police Modernisation’. According to Sahay, the country needs to establish a city-based video surveillance system, which can be integrated to a national level network, to form a grid of intelligence networks. Major Poonam Sawaant Kar (Retd), Group Manager – Homeland Security, Defence and Security Division, Rolta India, said that CCTNS will operate through the creation of a nationwide networked infrastructure for evolution of IT-enabled tracking system around investigation of crime and detection of criminals. Discussing the bottlenecks in enabling a strong network of loca-

tion based technologies and a single emergency response number, Prakash Narayan, Technical Services Manager, Hexagon India, said “We need good map data. We need to collect geo-referenced data on roads without name and address information, improve coordination between first responders (police/ fire/ ambulance), find solution that facilitates call-transfer between jurisdiction in two different states, and mandate providers to share existing location data,” he said. Brig Sanjay Agarwal, Security Adviser (Naxal Management), Ministry of Home Affairs, outlined several challenges in countering the Naxal movement in India and also offered a few suggestions for the homeland security industry. “We want solutions and not products, which would enable us to analyse, extrapolate it to a paradigm, and then use it in decision making process.”

Visualising Spatial Data “There is need to reduce the time cycle period between each phase of operation right from observation to action,” said Lt Col S Mohan, Indian Army, during the session, “Remote sensing and image analysis’. He stressed that India needs to exploit remote sensing data more aggressively and intuitively for protecting the national security, and that digital elevation models, multi-spectral and hyperspectral imagery and Synthetic Aperture Radar (SAR) have opened up new avenues in the field of defence applications. Juxtaposing the current situation with the challenges faced by the image analysis in the past, Murali Mohan, Managing Director, Mobiterra Solutions, India, said, “In the past, image analysts were forced to accept solutions which were made with a ‘fits all’ menA session-in-progress

tality. Today, Just In Time image processing is done using workflow based systems which are tailored according to each user and are task-specific.” TS Rawat, Scientist- E, DTRL, discussed how remote sensing in thermal band for terrain intelligence holds the potential to detect changes due to heat disturbances or heat re-distribution on account of activity on the ground.

GIS Assisted Integrated Intelligent Logistics Lt Gen RC Chadha, DG OL&SM, who chaired the session on ‘Intelligent Logisctics,’ spoke about the importance of geotech in logistics. While Gp Capt JV Singh (Retd) advocated a dynamic new approach to logistics support for Revolution in Military Logistics to become a reality, Brig AS Nagra (Retd), Mahindra Defence Systems, spoke about the importance of logistics and how it is the key element of the war-fighting supply support. “GIS based Data Analytics can render vital metrics for determining the Residual Combat Potential of a Force in real-time,” said Brig Sanjeev Devasthali, Comdt, 509 ABW, Indian Army.

Valedictory Address The two-day event ended with a Valedictory address by KN Shrivastava, Member, NDMA, Government of India. Talking about the challenges before India’s security agencies, he said, “To strengthen our forces, it is important to modernise them and provide them with the best of weaponry. The fact that crores (billions) of rupees have been allocated by the government for modernisation of forces proves that the government is committed towards the same.”

41 | Geointelligence JULY - AUGUST 2014

can be used in various fields like border surveys, site planning, route planning and disaster analysis,” he said.


Image intelligence

The Israel-Gaza Conflict Escalates

I

Credit: www.telegraph.co.uk

42 | Geointelligence JULY - AUGUST 2014

srael occupied Gaza from Egypt (Egypt borders Gaza on the west) during the 1967 war between the two countries. The Gaza Strip is 146 square miles, and has a population of about 1.6 million, largely Palestinians. In the late 20th century, Israel withdrew from Gaza in accordance with the Oslo Accords which called for Palestinian administration of the Gaza strip. However, things took an ugly turn when Hamas won elections in 2006. Hamas is a militant group and doesn’t recognise Israel as a separate state. Since its inception in 1987, it has waged a war against Israel. The two share a deep distrust for each other. The ongoing Israel-Gaza war is a result of this mistrust between the two. Israel accuses Hamas of kidnapping and killing its three students in June this year, but Hamas has denied these accusations. However, since then, the two have resorted to airstrikes and artillery exchanges, which have resulted in the death of hundreds of civilians. Even though United Nations has called for a ceasefire, it appears unlikely as of now.


publiCations TM

our offerings for the defenCe and homeland seCurity Communties...

www.geointworld.net

ConferenCes

New Delhi

13-14 November 2014 Hotel Sheraton Av. Niemeyer Rio de Janeiro, Brasil

17-18 March 2015 Kuala Lumpur, Malaysia


SAVE THE DATE

13-14 November 2014

Hotel Sheraton Av. Niemeyer, Rio de Janeiro, Brasil

Brasil

THEME: Geospatial for Modern Warfare

Plenary SeSSionS

Technical SeSSionS

 Internal Security

 GeoIntelligence Enablers

 Maritime Security

 Image Interpretation and Terrain Modelling

 Geospatial Data Infrastructure

 Data Fusion and Sensor Web  UAVs, LiDAR, Cloud Computing  Data Infrastructure and Interoperability  Disaster and Risk Management  GNSS and Augumentation Systems

SPeakerS rear adm luiz correa

Div. gen orlando

MoD (Operational Intelligence) Brasil

MoD (Suport to Cartography Systems of the Logistics of the Mobilization), Brasil

Prof guy Thomas

Brig gen Silva neto

Chairman, Global Maritime Awareness Institute for Safety Security and Stewardship, USA

DSG, Geographic Board of the Army Brasil

Brig gen carlos roberto

SISFRON, Land Frontier System Brasil

luiz castro menezes

General Comander Military Police Rio de Janeiro

Brig gen Walter Stoffel ECEME Brasil

Div gen araujo*

EME, Staff of the Army Brasil

Dr edval novaes

Dr Fernando guevara

Subsecretary of Comand and Control, State of Rio Brasil

CEO, Visual Intelligence USA

air marshal carlos aquino*

Div gen carlos dos Santos*

CISCEA Brasil

Cybernetic Warfare Brasil

*Confirmation awaited

PlaTinum SPonSor

co-SPonSor

organiSer


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.