Geointelligence September October 2013

Page 1

rni NO. UPENG/2011/37063

deception

virus

identity analogue detection

jamming tracking warfare dataillegal

detection virus

identity

detection

theft

virus

network

attack

illegal

warfare

identity detection

terrorism

groups

analogue theft data

secure

computer

wireless

network

network

terrorism signals attack groups theft crime fibre groups virus crime threat virus

network

detection

virus

network

theft

crime command detection virus

computer

warfare

secure

encryption

intruder identity

computer

secure

warfare

crime

data

coding

crime attack

information

network

intruder

theft

secure fibre

bandwidth

illegal

network

computer

hacker warfare jamming crime

crime

analogue

attack wireless virus

coding

threat

groups

crime

virus

warfare

virus

theft

network

firewall

warfare

crime

crime

identity

computer

intruder

warfare

frequency

detection groups crime terrorism theft

network

sEpt – oct 2013

computer

crime

warfare virus

bandwidth

coding computer

network

warfare

groups

Issue 5

`100 US$ 10

coding

virus

decryption

wireless

theft network warfare virus groups network

Vol. 3

encryption

information

cryptosecurity media

ISSN 2277 – 3126


actfast

Smarter Decisions for Disaster Management In a disaster, fast and accurate information is critical. Save lives, time, and resources using Intergraph® ERDAS IMAGINE® 2013. ERDAS IMAGINE gives you the power to turn data into confident, informed decisions. After all, this is when it counts. geospatial.intergraph.com/imagine

© 2013 Intergraph Corporation. All rights reserved. Intergraph is part of Hexagon. Intergraph and the Intergraph logo are registered trademarks of Intergraph Corporation or its subsidiaries in the United States and in other countries. Image Copyright: Pammy1140 - Fotolia.com


Publisher Sanjay Kumar Managing Editor Lt Gen (Dr) AKS Chandele (Retd) Executive Editor Bhanu Rekha Product Manager Harsha Vardhan Madiraju Assistant Editor Aditi Bhan Designed by Debjyoti Mukherjee Circulation Manager Amit Shahi Circulation Executive Vijay Kumar Singh Owner, Publisher & Printer Sanjay Kumar Printed at M. P. Printers, B - 220, Phase-II, Noida - 201 301, Gautam Budh Nagar (UP) India Publication Address A - 92, Sector - 52, Gautam Budh Nagar, Noida, India Editor Sanjay Kumar Price `100, US$ 10 Geospatial Media and Communications Pvt. Ltd. A - 145, Sector - 63, Noida, India Tel + 91 120 4612500 Fax + 91 120 4612555/666

Secure Communications

Bridging the Gap

Invisible Battlefront

The Future of Radios

24

Cognitive Radio for military communications has been an intensive topic of research in recent years. Its main applications range from the utilisation of TV white spaces to interoperability among large communication systems in all layers.

Interview

28

ARTICLE: Preparedness is the key

32

The State of Uttarakhand witnessed a severe disaster due to heavy rainfall and landslides on 16-17 June 2013. Given this background, GeoIntelligence takes a look at how geospatial technology could help in mitigating and minimising the impact of unavoidable natural hazards the region is prone to and the lessons learnt from the disaster INTERVIEW: Lt Gen Anil Chait

40

REGULAR SECTIONS Editorial................................................ 05

expressed in the publication. All views expressed

due to the information provided.

20

Security of defence communication is a challenge for any armed force. In this article, the author talks about the importance of cloaking data transmissions in today’s electronic battlefield

Ltd. does not necessarily subscribe to the views

publication is not responsible for any loss to anyone

16

Communications is quintessential requirement for the armed forces to realise their dream of becoming a netcentric force. A number of initiatives have been taken up by the forces in this regard. However, there is a need to speed up the process so that the gap between the strategic and the tactical level is bridged at the earliest

Geospatial Media and Communications Pvt.

in this issue are those of the contributors. The

Spotlight: Uttarakhand

Guest Articles

News..................................................... 06

Inderjit Sial

President & Managing Director, Textron India

Events................................................... 41 Image Intelligence .......................... 42

Geointelligence sept - oct 2013

Inside Chairman MP Narayanan

Theme

3


Your Personal Invitation To Join The Defence and Intelligence Community DGI 2014 Will Give You Even More: More international: 50+ countries in attendance More networking: new structured networking opportunities to meet the people who matter to you Involvement from the USA, NATO and the EU: more briefs with programmes and requirements More end-users: 100+ technology users attending the exhibition

Strategies for Data, GeoInt and Cyber Security in Defence & Intelligence Hear And Learn From The Thought-Leaders In The Community: General Richard Barrons, CBE, Commander, Joint Forces Command, UK MOD Colonel R Thurlow, GBR Army, Section Head (Intel & Environmental Disciplines), JISR Branch, C2, Deployablity & Sustainability, NATO Captain RN Martin Jones, Head, Joint Geospatial Intelligence Branch, UK MOD Jim R. Hill Director, Geospatial Intelligence Directorate, Marine Corps Intelligence Activity, USA Col. Mark Burrows Commander, JAGO UK MOD

Vice Admiral Robert B. Murrett (retired), Deputy Director, Institute for National Security and Counterterrorism (INSCT) Professor, Public Administration and International Affairs, Maxwell School of Citizenship and Public Affairs Syracuse University Major General J.M.C. Rousseau, Chief Defence Intelligence, Canadian Forces Captain RN Steve Malcolm, Hydrographer of the Navy, Director, UK Hydrographic Office Grp Capt John Rolf, Director, Defence Geospatial Intelligence Fusion Centre (DGIFC), UK MOD Air Commodore Sean Corbett, Deputy UK Military, Representative, Chief of Staff of the UK Delegation, NATO

PLUS: NGA has confirmed participation at DGI 2014! Dr. (Lt Col) Michael L. Thomas, C4ISR Systems Engineer, Communications and Networks Division, Naval Space and Warfare Center (SPAWAR) Charleston AVM Jon Rigby CBE, Director Cyber, Intelligence and Information Integration, UK MOD Maria Fernandez, Director, Australia GeospatialIntelligence Organisation Peter Loukes, Director, Intelligence Support, Netherlands MOD

Register before September 13th. Save up to ÂŁ1,300. Go today to www.dgieurope.com to find out how the DGI conference can benefit you.


Editorial

Communication Security is a Battle-winning Factor

C

ommunication is the lifeblood of any organisation, civil or military, and to a large extent, the efficiency of an organisation depends on the quality of its communication system.

A communication system essentially comprises a data source, a transmitter, a medium (can be terrestrial, radio or satellite), a receiver and a destination. The requirements of a good communication system are reliability, efficieny (use of bandwidth) and security. Comprehensive security has to be end-to end security of data, networks and applications. To provide redundancy, a combination of media should be used. Optical fibre is the most secure medium for carrying data since it does not radiate electromagnetic energy and cannot be intercepted unless physically tapped. Fibre can carry large bandwidth over long distances and therefore is very suitable for the ‘backbone’ in any network, but it cannot be used everywhere, particularly in mobile applications. Wireless communications are generally preferred because of their flexibility, the devices are not hampered by wires and can be moved from place to place easily. Modern technology has made available to the user a host of handheld devices such as PDAs, smartphones, tablets etc., which can synchronise data between each other and also utilise network services. However, since they use Radio Frequencies (RF), they are considerably more risk prone and vulnerable to attack than wired networks. Intruders are constantly on the prowl looking for vulnerabilities to gain access into the communication systems, and once they have, there is no limit to the damage they can cause. They can both eavesdrop on classified information as well as disrupt communications by launch of denial of service attacks, blocking bandwidth and inserting virus and malicious code.

Lt Gen (Dr) AKS Chandele PVSM, AVSM (Retd) Managing Editor

ajay@geospatialmedia.net

Despite best efforts, it is not always possible to prevent communications from being intercepted, therefore the need to employ cryptology to protect data, so that even if intercepted, the adversary cannot make sense of it. Here again no system of encryption/ decryption is perfect, it is a technological battle and the code will be cracked sooner or later. A military operation may last for a few hours, a few days or more, but the battle for communication security — thus information superiority — is a continuous one. While for a commercial organisation, poor communication security may result in financial loss, for the armed forces, it will spell the difference between success and failure.

Geointelligence Sept - oct 2013

Satellites are increasingly being used for communications, both commercial and defence. However, they are vulnerable to interference and jamming and should not be the primary mode, except where other media are not suitable, such as for communicating with mobile entities or for remote areas and inhospitable terrain. India has planned to have dedicated communication satellites for the armed forces, with GSAT-7 having recently been launched for the Navy.

5


high-resolution imagery collected daily by satellites for current intelligence on points of interest. •  GeoWeb 3D for native 3D GIS fusion without pre-processing

India Launches First ‘Military’ Satellite

Geointelligence sept - oct 2013

NVIDIA Introduces GeoInt Accelerator

6

NVIDIA recently launched what it claims as world’s first Graphics Processing Unit (GPU) accelerated geospatial intelligence platform, NVIDIA GeoInt Accelerator. The platform offers tools that enable faster processing of high-resolution satellite imagery, facial recognition in surveillance video, combat mission planning using GIS data, and object recognition in video collected by drones. NVIDIA GeoInt Accelerator platform will include key applications such as: •  DigitalGlobe for processing more than 3 million square kilometer of

•  IntuVision Panoptes for object detection and event-driven alerts by processing multiple real-time HD video streams

Courtesy: nvidianews.nvidia.com

India recently successfully launched GSAT-7 (reported to be the country’s first 'military' satellite) into the geosynchronous transfer orbit. It is believed that with this launch, Indian Navy will no longer depend on foreign satellites like Inmarsat for its communications. The satellite, which is equipped with communication transponders in Ultra High Frequency (UHF), S, C and Ku bands, is likely to improve the maritime communications among the Navy's warships.

•  Imagus for real-time facial recognition from video surveillance

and in clear weather only. But with the launch of KOMPSAT 5, the country now has the capability of imaging at night and in all weather conditions. Its synthetic aperture radar can scan the Earth's surface with a resolution of 1 metre.

Advanced SPEED Software Released by US Marine Corps

•  LuciadLightspeed for situational awareness for mission planning by overlaying image, radar, sensor data for line-of-sight analysis •  NerVve Technologies for detecting objects in images and video streams

South Korea Launches SAR Satellite South Korea recently launched its first radar imaging satellite KOMPSAT 5, according to reports. So far, the country had two EO satellites. These satellites with optical cameras are capable of seeing the ground during daytime

The US Marine Corps has released a new, advanced version of software developed by Northrop Grumman Corporation for electromagnetic spectrum situational awareness and operations. Using the Systems Planning, Engineering and Evaluation Device (SPEED), communications planners can plan, model and analyse radio and jammer effects in a defined electromagnetic spectrum environment to better understand where communications degradation or interoperability issues may occur. Version 11.1.1 adds 3D mapping and mission planning capabilities, including frequency-dependent rejection interference analysis, enhanced jammer modelling and effectiveness prediction.


Contract to Support NETCENTS-2 Application Services Raytheon Company was recently awarded a 7-year indefinite delivery/ indefinite quantity (IDIQ) contract from the US Air Force for NetworkCentric Solutions-2 (NETCENTS-2) Application Services. Raytheon is one of six awardees under the IDIQ that has a total combined ceiling for all awarded contracts of USD 960 million. Under the IDIQ contract, the company will compete for a wide range of information technology services, including sustainment, migration, integration, training, help desk support, testing and operational support for the Air Force. Other services include, but are not limited to, data processing, web-services support and service-oriented architecture constructs. The NETCENTS-2 Application Services contract will be managed through the Raytheon IDIQ Service Center, ensuring efficiency and contract

optimisation by the entire company and its teammates.

Harris Corporation to Upgrade First Responder Communications The United States Marine Corps has awarded Harris Corporation a contract to replace its existing radio systems throughout eastern region US Marine Corps bases and other locations. Harris received an initial USD 6 million order in the third quarter of the company's fiscal year 2013 to design and deploy radio systems at four bases in North Carolina and Georgia. The full contract has a potential value of more than USD 16 million and includes system design and deployment, equipment, managed services, maintenance and other options. The new Harris system will leverage the latest standards-based digital technology and allow first responders to communicate and coordinate efforts more easily with neighbouring civilian agencies than the existing analogue-based solution. The new radio system is based upon Project 25 technology standards and Harris' VIDA network, which delivers powerful network management tools using a modern IP (Internet Protocol) architecture.

Logistics Contract for LITENING Targeting System Sustainment Northrop Grumman Corporation has been awarded USD 173 million

performance-based logistics contract to provide support and sustainment services for the LITENING advanced targeting system. Under the five-year agreement, Northrop Grumman will provide logistics support, technical support to the field, aircrew and maintenance training, depot repairs and other associated services. It will support the LITENING targeting systems operated by the Air Combat Command, Air Force Reserves, Air National Guard, Marine Corps and Marine Corps Reserves. It will also provide support services to the Italian and Spanish navies. LITENING's forward-looking infrared, charged-coupled device, laser imaging sensors, advanced image processing and digital video output provide superior imagery, allowing aircrew to identify and engage targets under a wide range of battlefield conditions, said the company.

Raytheon Demonstrates 3DELRR Prototype Raytheon Company successfully completed a customer demonstration of a new US Air Force expeditionary ground-based prototype radar. Designed to replace the decades old TPS-75 radar system, the Three-Dimensional Expeditionary Long-Range Radar (3DELRR) will help defend warfighters against emerging threats by detecting, identifying and tracking fixed- and rotary-wing

Geointelligence sept - oct 2013

Developed for the Marine Corps, SPEED is used by other services within the US Department of Defense and joint operations and other US federal agencies. SPEED has also been provided to a select few foreign nations through the Foreign Military Sales programme. It is a government off-the-shelf product available to US government agencies. Northrop Grumman also has a commercial variant of these capabilities available for licensed sale.

7


n e ws aircraft, missiles and unmanned aircraft, said the company. The 3DELRR solution is a C-band Gallium Nitride (GaN)-based radar, and is able to ‘plug in’ to both the Air Force's current and future Command and Control node.

Falcon III Radio Certified by Joint Tactical Networking Center

Geointelligence sept - oct 2013

Harris Corporation's Falcon III AN/ PRC-152A multiband handheld radio has received Joint Tactical Radio System (JTRS) Certification from the Joint Tactical Networking Center. It is the second Harris Falcon III wideband radio to receive this important designation, following the AN/PRC-117G multiband manpack, said the company.

8

JTRS Certification means that the Falcon III AN/PRC-152A is approved and ready to operate as part of a DoD architecture for battlefield networking. JTRS Certification fosters development of tactical networking radios that are low-risk, secure and interoperable. To become JTRS certified, a tactical device must fulfill seven separate requirements. The radio was certified operating Soldier Radio Waveform software version 1.01.1C. Harris has shipped more than 40,000 Falcon III AN/PRC-117G and AN/PRC-152A wideband networking radios to the United States military and more than 15 allied nations. The radios provide

enhanced situational awareness of the battlefield by connecting warfighters to the tactical Internet enabling applications such as streaming video, simultaneous voice and data feeds, collaborative chat, and connectivity to secure networks, said the company.

DigitalGlobe Adds ‘Daily Take’ to My DigitalGlobe DigitalGlobe recently announced that users supported by the National Geospatial Intelligence Agency (NGA) can have immediate access to its current, high-resolution commercial satellite imagery. The access is granted through NGA’s EnhancedView programme, My DigitalGlobe, at no cost to the organisation. My DigitalGlobe gives access to 200 million square kilometres of DigitalGlobe’s satellite imagery. It supports most of the daily collections, known as the ‘daily take’ from its satellite imagery constellations. The ‘daily take’ will add about 1.5 million square kilometres of new earth imagery every day. Those supporting US government missions can use the My DigitalGlobe platform to quickly navigate their areas of responsibility, review available imagery for that location and integrate it into their workflow using tools like Google Earth and ArcGIS, said the company. The simple and intuitive user-interface allows end users to access and manage the information they need when and where they need it most, it added.

Micro-LTE UHF RFID Module From Trimble Trimble recently announced the addition of the Micro-LTE to its ThingMagic Mercury 6e Series of embedded UHF RFID modules. The Micro-LTE joins the ThingMagic Micro to create a family of the smallest, 2-port, high-performance RFID modules in the market, said

the company. The Micro is designed for applications with medium to large tag populations, while the new Micro-LTE is optimised for small tag populations. The Micro-LTE includes features like high data acquisition rates with every tag read and rapid adaptation to changing tag populations. Coupling these capabilities with read performance optimised for small tag populations makes the Micro-LTE ideal for use cases that require reading small numbers of tags rapidly and accurately, such as access control, consumables authentication, process control, and race timing, according to the company. The low power consumption of the Micro-LTE fits battery operated applications and wide RF output range (-5 dBm to +30 dBm) are key requirements for RFID enabled printers, tag commissioning stations, and pointof-sales readers. The RF transmit levels and receive sensitivity of the Micro and MicroLTE deliver competitive advantages, including the ability to read RFID tags at over twice the distance of alternative solutions, the ability to read smaller tags without forfeiting read distance, and the option for OEMs to incorporate smaller antennas into their products without sacrificing tag read performance. In addition, adjustable duty cycle settings of the Micro and Micro-LTE provide product-specific advantages such as extended battery life of handheld readers and other mobile devices.

NC4 Announces Release of NC4 Street Smart 2.0 NC4 has announced the release of NC4 Street Smart 2.0. The company hopes that the product will become a daily use, crime-fighting application which will arm police officers with critical, real-time crime data while patrolling the streets. NC4 Street Smart uses the


Securing Your Communication People looking for privacy can now communicate securely using their mobile phone without being bothered about it getting hacked, intercepted, or having their metadata tracked. Secure Phone Online (SPO) recently announced low cost privacy for voice, text messaging, e-mail, and attachments using smart phones and PCs. In addition to voice and data encryption, SPO implements a revolutionary server-less connection between phones removing traditional servers where voice and data can be tapped or captured by hackers, claims the company. Another capability of SPO is no call record (metadata) with the cellular provider of phone calls being made or received between devices. Using SPO, you are ‘invisible’ on the cellular network, it adds. According to the company, with SPO's secure conference calling, secure team command and control using smartphones is now possible. As there are no servers that store text messages, e-mails, and attachments, the sender and the receiver have the only copies of the data. Brad Hutson, Inventor of SPO stated "This is a product and service that offers security for metadata and content. In addition, any attempt to tap the voice conversation or tap the exchange of data will immediately terminate the conversation or data exchange thereby rendering voice/ data capture impossible." SPO also works on PCs using a secure web browser providing PCs the same secure capabilities as mobile phones for voice and data. This allows clients to use a PC on WiFi or LAN connections to communicate securely with other PCs and mobile phones. The product and service works on all cellular carriers and ISPs (Internet Service Providers) worldwide.

Microsoft's platform allows NC4 Street Smart to quickly and easily surface historical crime data alongside real-time intelligence allowing crimes to be solved faster., said the company, adding that the visual tools, including mapping, enable officers to see in real-time, a breakdown of crimes and their locations as they are happening via a live operational map. The new features of NC4 Street

Smart 2.0 include the following: •  Introduction of NC4's Crime Connector – it collects data about people, places, activities and assets and puts it in one place and gives that data to the end user. It identifies information in real-time that is relevant to solving cases. •  Full API allows partners to extend the solution to other platforms – NC4 Street Smart 2.0 was built using standard web technologies such as JSON while being integrated with SharePoint. As per the company, this allows its partners to extend the application without requiring them to learn a new technology platform.

Raytheon's INTEROP-7000 Suite Links Land Mobile Radios to FirstNet Raytheon Company demonstrated the integration of commercial smartphones and tablets with the INTEROP-7000 Suite at APCO International 2013 in Anaheim, California, recently. Developed using open standards, INTEROP-7000 enables police, fire and rescue professionals to use commercial smartphones and tablets integrated with existing communications equipment, such as land mobile radios, said the company.

•  NC4 Street Smart 2.0 is designed to allow its partners to add data from a myriad of sources.

Raytheon's INTEROP-7000 also positions public safety to become part of the First Responder Network Authority (FirstNet). FirstNet will provide the nationwide public safety broadband network.

•  Localisation by international partners — the interface is configurable which allows it to be readily usable for a wide range

According to the company, Twisted Pair Solutions' WAVE Mobile Communicator app — which turns any Android, Apple iOS,

Geointelligence sept - oct 2013

technologies of Microsoft (Microsoft SharePoint 2013) and Esri. Leveraging SharePoint's collaboration capabilities, NC4 Street Smart creates the ability to quickly share crime-related information by visualising data points on maps, and aggregating and sharing relevant information through situation-based bulletins and secure blogs. Esri is providing the underlying mapping technology that allows for the easy display of all the crime data in intuitive mapbased views.

9


n ew s BlackBerry and Windows Mobile smartphone into a multi-channel land mobile radio handset for secure, on-demand push to talk communication — has been integrated into the INTEROP-7000. This provides public safety with an additional method of secure communication that goes beyond the boundaries of its current land mobile radio network, it added.

ZNYX Networks Introduces the 40G Ethernet ZX2040 ATCA Hub Switch

Geointelligence sept - oct 2013

ZNYX Networks announced the ZNYX ZX2040 AdvancedTCA (ATCA) hub switch with integrated shelf manager using the 8 core Intel Atom processor C2000. The ZNYX Ultra5 ZX2000 5U ATCA blade server platform now provides up to 480G on the backplane to fulfill the most demanding data plane applications. With the ZX2040 switch, the ZX2000 platform can be upgraded quickly and easily from a 10G fabric connection to a 40G solution.

10

ZNYX adopted Intel processors to take advantage of its available virtualisation technologies. The multi-core Intel Atom processor C2000 provides both management functionality for the switch silicon and additional virtual machine support for hosting chassis management and middleware functionality. The ZX2040 achieves an unprecedented level of platform integration empowering customers to run their applications directly on the ATCA switch. This new level

of density moves management software from line cards to the hub slot, freeing valuable resources for revenue producing operations. Based on the Ultra5 ZX2000 blade server platform, the ZX2040 features four QSFP 40G ports for external connections to the system, 8GB DDR3 ECC memory, onboard mSATA, Broadcom Trident Plus 480G switch fabric, Pigeon Point ShMM 700 for shelf management, and supports the Intel Atom processor C2000 with up to 8 cores at 2.4GHz and Intel QuickAssist Technology.

General Dynamics to Increase Security of .gov Networks General Dynamics Information Technology, a business unit of General Dynamics, is one of 17 companies selected to provide cyber security services to the US Department of Homeland Security (DHS) and other government agencies, including state and local entities as well as the defence industrial base sector, through a blanket purchase agreement issued by the General Services Administration (GSA). The fiveyear Continuous Diagnostics and Mitigation (CDM) agreement has a potential value of USD 6 billion to all awardees if all options are exercised. General Dynamics will provide DHS, federal, state, local and tribal governments with continuous monitoring tools, diagnosis and mitigation activities to strengthen the security of .gov networks, assess and combat cyber risks in real-time and support the launch of DHS’ CDM programme. Under it, DHS will centrally oversee the procurement of solutions to quickly identify and prioritise security issues, as well as empower technical managers to prioritise and mitigate risks.

GPS ‘Spoof’ Could Let Terrorists Hijack Ships A radio navigation research team

from The University of Texas at Austin recently set out to discover whether they could subtly coerce a 213-foot yacht off its course, using a custom-made GPS device. Led by assistant professor Todd Humphreys of the Department of Aerospace Engineering and Engineering Mechanics at the Cockrell School of Engineering, the team was able to successfully spoof a USD 80 million private yacht using the world’s first openly acknowledged GPS spoofing device. Spoofing is a technique that creates false civil GPS signals to gain control of a vessel’s GPS receivers. The purpose of the experiment was to measure the difficulty of carrying out a spoofing attack at sea and to determine how easily sensors in the ship’s command room could identify the threat. The researchers hope their demonstration will shed light on the perils of navigation attacks, serving as evidence that spoofing is a serious threat to marine vessels and other forms of transportation.

Saab Receives Order for Multispectral Camouflage Systems Saab has been awarded a contract for Multispectral Static Camouflage Nets from Canadian Department of National Defence (DND). Saab Barracuda’s advanced Camouflage technology products have been exported to more than 50 countries. The company claims that it offers a unique package of camouflage systems and force protection solutions with the purpose to decrease the enemy’s ability to detect and engage. These solutions protect camps, vehicles and personnel against hostile sensors and enemy target acquisition.

Next-gen CodeSEAL Protects Critical Algorithms Microsemi Corporation has released a new version of its CodeSEAL defence-grade software protection platform, providing significant enhancements to the performance,


GPS Source Awarded Contract for DAGR D3

According to the company, GLI-FLO is a DAGR D3 that can replace the Position, Navigation and Timing (PNT) role currently required of the DAGR or other GBGRAM devices inside a fixed vehicle platform. Designed as a single, secure access point to multiple devices requiring PNT data on a fixed vehicle platform, it saves space, weight and power (SWaP).

security, and ease of tamperprevention and reverse-engineering protection development. According to the company, with the help of CodeSEAL, critical software algorithms can be protected against the most sophisticated attackers, significantly faster and more securely than previous generation solutions. CodeSEAL enhancements include: •  New software protection mechanisms to detect and react to the latest dynamic attacks; •  Enhanced issue/ error system providing immediate feedback for developers actively changing their unprotected software while developing a protection using the CodeSEAL protection development environment; •  Workflow enhancements to simplify protections for complex software with many source/ object files; •  Significantly decreased protection build times with enhancements to the protection insertion engine; •  Ease-of-use enhancements to the disassembly and source views. CodeSEAL consists of a library of software protection mechanisms that can be inserted into desktop and embedded software applications using a sophisticated code insertion

engine. Through a simple, drag-anddrop interface, its users can quickly augment insecure applications with protection mechanisms that fortify deployed applications against software reverse engineering vulnerabilities, debugging, tampering and code-lifting attacks, said the company. Each CodeSEAL protection mechanism can be configured to address applicationspecific performance and security requirements.

ARES Security Acquires Majority Ownership of The Mariner Group ARES Security Corporation and The Mariner Group recently announced that ARES Security has acquired a majority ownership interest in The Mariner Group, LLC. ARES Security will incorporate Mariner's CommandBridge platform into its suite of risk management solutions to provide sensor integration and real-time command and control capabilities. The company will now offer its AVERT and BluTrain products, to identify and quantify threats for the purpose of building and training response plans as well as provide CommandBridge to integrate information from varied sensors into one common operating system for situational awareness and response management. As a subsidiary of ARES Security,

Mariner will operate as a separate division under the Mariner name and will continue to deliver the situational awareness and response management solutions that are the hallmark of the company.

Technology to Enable Next-Generation JTAC Capabilities Rockwell Collins has been selected by Raytheon to integrate a suite of advanced technologies for the Defense Advanced Research Projects Agency’s (DARPA) Persistent Close Air Support (PCAS) programme. As a teammate to Raytheon for the design and development phase of the programme, Rockwell Collins seeks to streamline CAS workflows and Joint Terminal Attack Controller (JTAC) human-machine interfaces,

Geointelligence sept - oct 2013

Courtesy: prnewswire.com

GPS Source recently announced that it has received an indefinite-delivery/ indefinite-quantity, firm-fixed-price contract with a maximum value of USD 16,613,430 for the procurement of defence advanced GPS receiver distributed devices (D3). The Army Contracting Command, Aberdeen Proving Ground, Maryland, was the contracting activity (W15P7T-13-D-C116).

11


Providing Accurate Location of Long-Range Targets BAE Systems will lead the development of an advanced technology that seeks to detect and identify targets at tactically significant ranges, providing accurate location of long-range targets for weapons engagement. This technology is intended to enable US ground forces to execute air-ground missions close to friendly forces, more quickly and accurately. Courtesy:BAE Systems The new Integrated Targeting Device (ITD) will be designed as a lightweight, handheld day-and-night system that will support the Persistent Close Air Support (PCAS) programme. It will allow Joint Tactical Air Controllers (JTACs) on the ground to simultaneously visualise, select and employ weapons against multiple moving targets in a specified area, said the company. At the same time, the JTACs will be able to digitally task close air support assets to engage with enemy targets. The device will provide either GPS coordinates or laser guidance for targeting to enable faster mission implementation by the US ground forces, while reducing collateral damage and potential fratricide, added BAE Systems.

provide high bandwidth QNT radios, and integrate dismounted, next-generation head up displays, helmet mounted cueing systems, and advanced targeting and visualisation tools. DARPA’s PCAS programme aims to enable ground forces and combat aircrews to jointly select and employ precision-guided weapons from a diverse set of airborne platforms. The programme seeks to leverage advances in computing and communications technologies to fundamentally increase CAS effectiveness, as well as improve the speed and survivability of ground forces engaged with enemy forces.

Geointelligence sept - oct 2013

GPS III and OCX Satellite Early Orbit Operations Successfully Demonstrated

12

Lockheed Martin and Raytheon Company successfully completed the third of five planned launch and early orbit exercises to demonstrate the launch readiness of the world's most powerful and accurate Global Positioning System (GPS), the US Air Force's next generation GPS III satellite and Operational Control System (OCX). Successful completion of Exercise

3, on August 1, was a key milestone demonstrating Raytheon's OCX software meets mission requirements and is on track to support the launch of the first GPS III satellite, currently being produced by Lockheed Martin. Two additional readiness exercises and six 24/7 launch rehearsals are planned prior to launch of the first GPS III satellite in 2015. The Lockheed Martin-developed GPS III satellites and Raytheon's OCX are critical elements of the US Air Force's effort to modernise the GPS enterprise more affordably while improving capabilities to meet the evolving demands of military, commercial and civilian users worldwide.

SAIC to Provide Deep Ocean Acoustic Detection for TRAPS Science Applications International Corporation (SAIC) recently announced that it was awarded a prime contract by the Defense Advanced Research Projects Agency (DARPA) to provide deep ocean acoustic detection for Transformational Reliable Acoustic Path Systems (TRAPS). The singleaward cost-plus fixed-fee contract

has a 14-month base period of performance, one six-month option, and a total contract value of approximately USD 10 million if the option is exercised. TRAPS is a fixed passive sonar node designed to achieve large-area coverage by exploiting advantages of operating from the deep seafloor. Under a previous contract, SAIC completed the initial TRAPS prototype design under the Deep Sea Operations Programme Phase 1B, part of the Distributed Agile Submarine Hunting programme, and continued validation of the underlying scientific approach through the further analysis of available Navy datasets. In Phase 2, SAIC completed a highly successful deep ocean acoustic data collection using the primary sensor intended for the TRAPS prototype that validated key foundational hypothesis for this approach, said the company. Under Phase 3 of the contract, SAIC will expand the number of prototype nodes to demonstrate a scalable distributed system prototype system to detect quiet submarines. According to the company, it will supply DARPA with a capability to use systems of configurable technology to achieve anti-submarine warfare surveillance.


Indonesian Army to work with Geospatial Information Agency The Indonesian Army is reported to have joined hands with the Geospatial Information Agency (Badan Informasi Geospatial) for promoting the use of GIS and geospatial intelligence in the defence forces. The step is likely to help support and improve the defence force’s decision making capabilities. Badan Informasi Geospatial will organise capacity building workshops for the army to improve its capability to respond in three key areas – border protection, disaster risk reduction and conflict resolution.

Northrop Grumman Australia Agrees to Acquire QDS Northrop Grumman Australia Pty Limited, a subsidiary of Northrop Grumman Corporation, recently announced that it has signed a definitive agreement with Qantas Airways Limited to acquire Australia-based Qantas Defence Services Pty Limited (QDS). QDS provides integrated logistics, sustainment and modernisation support to Australian government and military customers. The acquisition is subject to various conditions and is expected to close in 2014. Terms of the transactions were not disclosed. "QDS complements our current integrated logistics and modernisation efforts and advances our international strategy. We expect QDS will

GPS-based Radio Systems in all Firefighting Vehicles The Victorian State Government in Australia has decided to install GPS-based radio systems in all its firefighting vehicles, aircraft, incident contro centres, fire towers and work centres, according to reports. The government hopes to complete the project by 2014-15. Department of Environment and Primary Industries (DEPI) has been given the responsibility to lead the project. The new information and communication systems are going to be compatible with existing systems of Country Fire Authority (CFA), Victoria State Emergency Services (SES) and other neighbouring states. DEPI is expected to replace 2,000 systems in the first phase, and the remaining 4,000 systems are likely to be replaced before the next fire season. The project is expected to cost USD 22.4 million.

Next-gen IED Detection and Confirmation Technology Launched Raytheon UK has launched its vehicle mounted system — a new Stand-Off Improvised Explosive Device (IED) Detection and Confirmation Technology, known as Soteria. The underlying technology has been developed in the UK alongside Laser Optical Engineering Ltd, a spin out company of Loughborough University.

According to the company, Soteria utilises innovative optical processing technology that gives the user an extremely high definition IED detection, confirmation and diagnosing capability, while exhibiting an extremely low false alarm rate. It, from a significant stand-off distance, determines the shape, size, orientation and exact location of hidden IEDs and associated components. In the manned vehicle configuration, Soteria can confirm and diagnose threats from a safe distance to ensure maximum protection of troops and vehicles, the company adds.

BAE Systems and Bayshore Networks Expand Strategic Partnership BAE Systems and Bayshore Networks,Inc., announced an expansion of their partnership to provide cybersecurity solutions to defence, intelligence and critical infrastructure customers facing increasingly sophisticated adversaries and Advanced Persistent Threats (APT). Under the agreement, BAE Systems will resell and distribute Bayshore’s SingleKey next-generation firewall for large enterprise and government defence networks, Bayshore SCADA Firewall for critical infrastructure environments, and Bayshore’s SingleView platform for real-time threat analytics and situational awareness. The agreement also enables customers to utilise BAE Systems’ 24X7 technical support infrastructure and to potentially leverage its intellectual property to reduce the risk of introducing APT malware into their networks.

Astrium-Thales Alenia Win Spy-satellite Contract Astrium Satellites and Thales Alenia Space of France are reported to have received a contract from the United Arab Emirates Armed Forces for twosatellite Falcon Eye high-resolution

Geointelligence sept - oct 2013

ASIA PACIFIC

provide an important platform for international growth in our key focus areas of unmanned, C4ISR, cyber, logistics and modernisation," said Wes Bush, Northrop Grumman chairman, CEO and President.

13


n e ws

Lightweight Electronic Warfare Manpack System Launched Chemring Technology Solutions (CTS) has expanded its awardwinning RESOLVE Electronic Warfare (EW) range with a lightweight version of the RESOLVE manpack, EW system designed specifically for on-the-march missions. Weighing just 10 kilograms (22 pounds), RESOLVE lightweight manpack system fits into a standard daysack, delivering dismounted soldiers more flexible EW capabilities to exploit multiple communications systems.

Geointelligence sept - oct 2013

According to the company, despite a significant reduction in size and weight, RESOLVE's domain leading EW capabilities have not been compromised, as it delivers immediate threat warning, electronic overwatch and single sensor location for up to eight hours from a single battery. The simple interface provides instant access to key functions to deliver immediate support in a variety of operational environments, including close-quarter, longrange patrol or stand-off missions. The lightweight system can be networked to other static or mobile systems.

14

Advanced Identification Systems From Cassidian Cassidian has implemented a new capability of battlefield identification which allows combat aircraft and helicopters to reliably identify friendly forces in a pre-defined area before the use of weapons and thus avoiding casualties from friendly fire.

The company recently said that it has successfully tested the enhancement of equipment used in military missions to distinguish friendly forces from hostile, the so-called Identification Friendor-Foe (IFF). This enhancement, called Reverse IFF (RIFF), allows an aircraft to locate friendly forces in a pre-defined ground area by emitting interrogation signals. Previously, aircraft only responded to enquiries sent from groundbased interrogators but had no technical means themselves to identify ground forces, said the company. "Our Reverse IFF solution is based on the latest NATO IFF standard, Mode 5, which cannot be intercepted by hostile forces due to our sophisticated encryption techniques linked to it," said Elmar Compans, Head of Cassidian Sensors and Electronic Warfare. Mode 5 RIFF enables aircraft and helicopters to use Cassidian transponders for air-ground interrogations in addition to their current function responding to interrogations from ground stations. This way, airborne platforms receive a valuable new capability without substantial modifications in aircraft equipment, the company said.

BAE Systems Introduces Small Multispectral Sensors for UAVs BAE Systems has introduced one of the smallest multispectral sensors available for unmanned systems — an innovation that it claims will help improve soldier situational awareness by reducing the time required to identify targets. On battlefield, soldiers need the ability to process, understand, and engage with their environment at any time, under any condition or circumstance. The company’s Digitally Fused Sensor System (DFSS) offers a combination of multiple capabilities in a single sensor so that soldiers can intuitively assess a scene using an unmanned vehicle in time-critical situations.

“With sensor fusion, soldiers don’t need to switch back and forth between the daytime camera and the infrared camera, then try to compare those images in their heads as they do with existing systems,” said Eric Hansen, Business Development Manager for ISR Solutions at BAE Systems. “Our new technology allows warfighters to quickly determine whether people or vehicles are hiding and if they present a threat.”

Courtesy: BAE Systems

optical reconnaissance system. The contract is said to be valued at about USD 1.1 billion, and includes construction of two satellites, their separate launches in 2017 and 2018, two ground facilities for satellite control and image reception, and training of personnel.

The DFSS system allows soldiers to see laser designator spots even in darkness, making it easier to coordinate and confirm target marking with UAVs. The shading and high-definition imagery provide depth to the scene, and rapid target acquisition is enabled when the system cues the operator to potential problem areas. According to the company, by blending low-light and infrared images in a single display, fighting forces get a broad range of imaging options, including full daylight, deep shadows, dawn and dusk, illuminated night operations, and darkness. The unmanned aerial, ground, or underwater vehicle provides the picture via a sensor mounted to the vehicle. The system adjusts its own settings to each mission’s environmental conditions so operating forces don’t need to choose between an electro-optical or an infrared sensor before launching the unmanned vehicle. This is especially important as mission durations are becoming longer and new tactics and techniques of surveillance are being explored, said the company.



secure communications

Bridging the Gap << Communications is quintessential requirement for the armed forces to realise their dream of becoming a net-centric force. A number of initiatives have been taken up by the forces in this regard. However, there is a need to speed up the process so that the gap between the strategic and the tactical level is bridged at the earliest >>

Geointelligence sept - oct 2013

T

16

he Indian Armed forces have declared on several occasions their intent to become a net-centric force in the foreseeable future. The intent is undeniably laudable, but its implementation would imply navigating through many an impediment. To have an effective net-centric force, it is necessary for the armed forces to buttress their information infrastructure both at the strategic and the tactical level. These levels are by no means disparate or exclusive, but cater for seamless information exchange.

A large number of endeavours are presently underway to build capability in this regard. Some of the projects that have been initiated are the Network for Spectrum (NFS); the Defence Communication Network (DCN); the Air Force Network (AFNET); the Army Switched Communication Network Phase 4 (ASCON Phase 4); the Tactical Communication System (TCS); the Battlefield Management System (BMS); and the Fighting Infantry Soldier As a System (FINSAS). AFNET has already been fielded by the Air Force. The others

are in different stages of a longwinded procurement process.

Strategic Communication Strategic communication, even today, is reasonably well developed being sustained by the ASCON for the Army, the AFNET for the Air Force and terrestrial communication over hired media for the Navy. Some part of this information infrastructure has been augmented incrementally through projects funded out of revenue grants. To give a further fillip to the existing strategic


The Network for Spectrum NFS was obtained by the defence services after protracted deliberations. The Network to be laid out by the Department of Telecommunication (DoT) was in lieu of some spectrum spared by the defence in accordance with the guidelines given out in the National Frequency Allocation Plan (NFAP), in the 1800 MHz band. A total of 25 MHz in 3G band and 20 MHz in 2G band was spared and, as a compensation of sorts, it was decided that the defence department would get a pan India dedicated network consisting of approximately 60,000 km of optical cable with geo-redundant data centers and communication nodes to cater for the needs of all three services. This was to be executed by BSNL under the aegis of DoT. The network would be fully secured with indigenous encryption equipment. Though the project was to commence in August 2010 (in fact the first OFC tender was issued in April 2010), there have been inordinate delays due to perceptional differences between Ministry of Defence (MoD) and Ministry of Communications and IT (MOCIT) and cost over-runs. An amount in excess of Rs 10,000 crore has been sanctioned by the Cabinet Committee on Infrastructure for the purpose. A fresh tender for OFC was issued in November 2012. Once in place, the network is expected to significantly improve strategic communication of the three services.

Defence Communication Network AT present, the three services operate over exclusive networks. Interoperability is achieved to a very limited extent through ad hoc measures, an arrangement far from satisfactory. While there has been perennial clamour by all the three services for inter-service synergy, the very fundamental aspect of providing

the basic wherewithal in terms of interoperable communication has often been glossed over. It would be a great fallacy to assume achievement of synergy if commanders at functional levels cannot even talk to each other and exchange requisite data required by the other service. It was with the intent of providing this basic framework that DCN was conceived over a decade ago. The DCN is to be a tri-service strategic network, initially on a hired bandwidth, and migrated to the OFC being laid out as part of the NFS at a later stage. There would be a satellite overlay to cater for redundancy/ remote area locations and disaster recovery sites. It is to provide for voice, data and video services over IP to strategic elements of Army, Navy, Air Force, Headquarters (HQ) Integrated Defence Staff (IDS) and Interim National Command Post (INCP). There would be over 100 entities to cater for the requirement of the three services (Army, down to Corps Headquarters; Naval stations; Air bases; HQ IDS; INCP and Andaman Nicobar Command). An organisation called Defense Communication Agency, to be staffed by all the three services, has been created under Directorate General of Signals to oversee the implementation of the project. The tri-service applications are to be developed by HQ IDS. The contract has, after prolonged delays, been awarded to HCL Info Systems, the agency involved in executing AFNET. It is expected that this network will help break free of the shackles of service-specific ownership communication networks as well as information. It will enable, inter-alia, uninterrupted and seamless flow of imagery and airborne, ground-based and ship-based sensor information to enable decision makers of the three services to take holistic, informationbased strategic decisions. It is for this reason that the development of applications assumes utmost importance at this stage.

<< At present, the three services operate over exclusive networks. Interoperability is achieved to a very limited extent through ad hoc measures. This arrangement is far from satisfactory >> Tactical Communication Tactical Communications for the Army is a cause for utmost concern. The problem, as it manifests today, can be attributed to several factors:»  The gaping chasm between the strategic infrastructural development, which has proceeded at a fast pace absorbing commercial technologies and those existing at the tactical level. »  The geographical realities of deployment of our forces in extremely inhospitable terrain. »  The sheer number of troops deployed along the International Border, Line of Control, Line of Actual Control or for counter insurgency/ counter terrorist operations at any point of time. »  A near absence of R&D activities for tactical communication systems, being content with minor enhancements in the Army Radio Engineered Network (AREN), improvisation and minimal upgradation of VPS, Stars V and HB/ HX sets, which constitute the current radio inventory of the Indian Army. This is compounded by ambiguous and subjective references to Transfer of Technology (ToT) in the DPP. »  The need to conform to particular form factors. For example, in the context of our troops

Geointelligence sept - oct 2013

infrastructure, two major projects are in the pipeline.

17


in mountainous areas, it is important to have light-weight, manpack or hand-held radio sets in abundant numbers. »  Inadequate thrust on satellite communication largely due to insufficient transponder space on our indigenous satellites. »  Multiplicity of directorates involved in decision making. »  An over-cautious establishment in the wake of allegations of malpractices. »  And inevitably, the long-winded procurement procedure. This has far greater impact on technological procurements with a high rate of obsolescence (if it takes five years on an average, an optimistic assessment, to procure a system; it would be obsolete by the time it is introduced into service). There is a dire need to bridge this gap between the strategic and the tactical at the earliest. This can be achieved through the following:»  Replacement of AREN with TCS at the earliest and expeditious progress on BMS and FINSAS.

Geointelligence sept - oct 2013

»  A relook at the entire radio philosophy for the Indian Army with an eye on contemporary/ futuristic technologies like Software Defined Radios, Mobile Ad-hoc Networks, broadband radio relays and so on.

18

»  The entire radio philosophy needs to be formulated by DG Sigs with inputs from other Arms & Services. For example, for communication for FINSAS, inputs from DG Infantry would be required. Similarly for FICV, inputs from DG Mechanised Forces. This is extremely important to ensure interoperability and smooth flow of information across all echelons. »  Considering our geographical

realities, a positive thrust for acquisition of handheld, manpack satellite terminals and lightweight Satellite Terminals on the Move (SOTM) is a must. This is especially so for troops deployed in the mountainous terrains where line of sight problems exist. For achieving this, it is important to prioritise the availability of sufficient transponder space in requisite S, Ku and Ka bands on our indigenous satellites (this has suffered a setback in the wake of the Devas/ ISRO episode).

Project TCS It needs to be stated upfront that Project TCS is not a panacea for all deficits in tactical communications. With a view to explain TCS, an examination of the topology of Army Radio Engineered Network (AREN) in brief would be in order. AREN was primarily meant for strike formations in plains as an area grid communication system with switches at nodes called Communication Centres (Comcens) interconnected through Radio Relay (Microwave) links forming a communication grid. The Formation HQ (called Entity) drew their connectivity to the grid, using radio relay, by ‘hooking’ on to one/ two of these maze of inter-connected Comcens. Normally, 17 Comcens were considered adequate to cater for requirements of a Strike Corps and approximately six for a Pivot Corps. The area coverage in terms of real estate was approximately 100X100 km. The number of entities corresponded to the number of Formation HQ to be connected. Limited number of entity status also existed to cater for unique requirements like an ad hoc Formation HQ or units on special missions. Each Formation HQ was able to obtain 24/12/6 analogue channels for outward connectivity. There were some radio trunking systems similar to the concept of mobile cellular technology of today (a

pioneering effort of those times). The communication was over secure media using indigenous encryption. The plan AREN was conceived in early sixties and was fielded in late eighties. The AREN served the formations for over two decades. Due to the inability of the AREN system to support contemporary demands, Signals is increasingly resorting to improvisation to give the desired level of user satisfaction in terms of bandwidth requirements for passage of large amount of data. It is felt that the AREN system is not suitable in its present form to support field formations. TCS was conceived in the early ‘90s to replace the existing Plan AREN System and is intended for utilisation in Strike/Pivot Corps from Corps HQ to Battalion HQ, while AREN was intended to provide communications down to Brigade HQ level only. It is larger in scope and aims at absorption of contemporary technology. The proposal for TCS, steered by the Corps of Signals, was the subject of considerable iteration between the MoD and the Service HQ. Eventually, it was decided in 2008 to progress the project as a ‘Make’ programme. An Integrated Project Management Team (IPMT) was constituted by the DG Acquisition and a feasibility study was ordered. The Defence Acquisition Council gave the go ahead in 2009. After obtaining the recommendations of the IPMT and the process of short-listing, the following agencies were selected — Bharat Electronics Limited (BEL); and a consortium of L&T, HCL Infosystems and Tata Power SED. The general topology of AREN has been given out earlier with a view to acquaint the reader with a similar philosophy of deployment of TCS. In case of TCS, there would be Network Communication Nodes (NCN), Network Nodes (NN), and Network Sectorial Nodes (NSN). These nodes will be connected through highcapacity backhaul radio relay. The


»  A state-of-the-art meshed network consisting of mobile communication nodes to form a grid »  Plug and operate capability; integration with strategic networks

IPMT and promulgation of GSQRs. (ongoing) »  Assessment of capability of developing agencies and shortlisting of minimum two production agencies. (completed) »  Preparation of a Detailed Project Report (DPR) by the two nominated agencies. »  CFA approval.

»  Point to multi-point wireless access to users through field wireless systems

»  Design and development of the prototype.

»  Quick deployment and tear down capability

»  User trials and evaluation of the prototype.

»  Converged services of voice, video, data over Internet Protocol (IP)

»  Solicitation of commercial offers.

»  Bandwidth to meet all operational requirements »  Resilient, self- organising and adaptive network »  Efficient and robust network management system »  ECCM capability and network security »  Be able to support all tactical C3I elements in the tactical battle area. We have seen that it has taken over two decades from the conceptualisation of the project to its present stage in our convoluted procurement procedure. There are yet a large number of stages to be crossed before the project manifests on ground. Each of these stages have some bit of ambiguity which would become more pronounced as we go along, especially as TCS is one of the first ‘Make’ programmes. Successive stages can be briefly enumerated as follows:»  Formulation of a Project Definition Document (PDD) by the

»  Contract negotiation. »  Award of contract. »  Project monitoring and review. Although the steps enunciated are given in the DPP, a reiteration of the same has been felt necessary to gauge the dimensions of difficulties the project could encounter. Some of these, inter-alia, could be:»  Assessment of capability in a complex system consisting of a large inventory of equipment, systems and sub-systems. »  In case the evaluation is based on each individual component of the prototype, would the RFP for commercial offers be given to both the production agencies? This would throw up issues related to integration.

states this to be ‘normally’ in the ratio of 80/20 per cent. »  As this programme has started with only two production agencies being shortlisted, a resultant single vendor situation cannot be ruled out. In such a case, there is likely to be escalation in cost. »  As such a complex system would depend largely on Transfer of Technology (ToT), ambiguities in the DPP with regard to ToT and proprietary issues need to be resolved. These problems are by no means insurmountable. It is for the DG Acquisition and the IPMT to be able to forecast impediments likely to be encountered and plan out strategy to overcome these.

Conclusion In this era of transformation to a lean, mission oriented force, the power of networks has to be exploited to the maximum. It is for this reason that communications in both the strategic and the tactical domain have to progress with utmost urgency. While NFS and DCN would bolster strategic capabilities and inter-service synergy, there is a dire need to give an impetus especially to tactical communications for reducing the widening gap and empowering the cutting edge units and sub-units in the field.

»  Size of the prototype. This is important as the funding for development by the MoD would be contingent on its size. »  Aspect of sharing of development cost between the MoD and the development agencies, though it is unlikely to be a serious contentious issue as the DPP

Lt Gen P Mohapatra (Retd) mohapatra_51@yahoo.co.in

Geointelligence sept -oct 2013

NSNs would go down to the level of battalion HQ. The salient features of TCS architecture would be:-

19


Secure Communications

Geointelligence sept - oct 2013

I

20

n the world of science fiction, cloaking devices are used to conceal warships and weapons from enemy detection. In modern day electronic battlefield, information is the strategic asset concealed by cloaking technologies. Throughout history — demonstrated vividly in the global war on terrorism — information transmitted between locations could expose vulnerabilities. With transmissions going on continuously, it is a struggle without beginning or an end. Hence, information security is a core function of communication

products, from digital multi-mode radios to mobile ad-hoc networks.

The Four Pillars of COMSEC COMSEC addresses four closely related, but distinctly different security areas. •  Crypto-security refers to cryptographic systems – the hardware and software used to encode and decode information. This generally consists of a set of algorithms and keys used to encode and/or decode information and the processing hardware to execute the algorithms.

•  Emissions security refers to measures taken to deny unauthorised interceptions and analysis of compromising emanations from cryptographic equipment. This is generally accomplished by minimising electromagnetic emissions from the equipment. •  Physical security refers to measures taken to deny access to the cryptographic equipment to unauthorised individuals and is ultimately controlled by the end user. •  Transmission Security (TRANSEC)


The many forms of encryption At the core of COMSEC is the concept of crypto security – the use of a cryptographic system consisting of hardware and software to encrypt data, thereby preventing adversary

from decrypting that data to the greatest extent possible. Encryption is the act of translating a plain text message that can be understood by anyone into a cipher text message that can only be understood by an individual who knows how to decrypt it. The basic steps in the encryption process are as follows: First, define an algorithm – a procedure or formula for translating plain text into cipher text. A simple example is a substitution algorithm, in which a different letter is substituted for each letter of a plain

text message to produce a cipher text. Here is a simple example of how it could work: UNENCRYPTED MESSAGE: My dog is brown SUBSTITUTION ALGORITHM: Replace each letter of the alphabet with the letter immediately following it. ENCRYPTED MESSAGE: Nz eph jt cspxo A similar simplistic approach can be used to transmit numeric messages, using a key. The algorithm is addition, and the numbers in the message are added to the numbers

Geointelligence sept - oct 2013

refers to measures taken to prevent an encoded message from being intercepted by an adversary. Even though the intercepted message would still be encoded, decoding the message would be virtually impossible for an adversary without an example of an encoded message.

21


in a key. In this case, the key is a repeating numerical sequence. It would look like this: UNENCRYPTED MESSAGE: 6 3 5 4 2 1 805 KEY: 1 2 3 1 2 3 1 2 3 ENCRYPTED MESSAGE: 928

758544

Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key. Less commonly, their keys are different but related in an easily communicated way. The key management necessary is the chief disadvantage of symmetric ciphers. Ideally, each pair of communicating parties would share a different key, so that if one key is compromised, only one communication path would be compromised rather than the entire network. The number of keys required in this type of scheme is equal to the square of the number of network members, and can easily become unmanageable.

Geointelligence sept - oct 2013

One common way to solve this problem is an approached-based asymmetric key encryption. The key used to encrypt is different from the key used to decrypt.

22

The approach hinges on the fact that it is ‘computationally unfeasible’ to derive the private-key from the public-key, even though they are mathematically related. The public key used for encryption may be shared publicly without compromising the private key used for decryption. A message encrypted with a public-key can only be decrypted with a private-key. Block ciphers such as the RSA Algorithm and the Advanced Encryption Standard (AES) took encryption in a new direction. Using a block of text and a key as inputs, they output a block of ciphertext of the same size.

<< At the core of COMSEC is the concept of crypto security – the use of a cryptographic system consisting of hardware and software to encrypt data, thereby preventing adversary from decrypting that data to the greatest extent possible >> Another approach is known as a stream cipher. Stream ciphers create an arbitrarily long stream of key material. It is combined with the plain text bit by bit or character by character, or using a hash function. The hash functions take a message of any length as input and ouput a short, fixed-length hash that can be used to create, for example, a digital signature. In developing one type of encryption, we use Internet Protocol Security (IPSEC) in tunnel mode to communicate to the ground. IPSEC uses the public-key infrastructure (digital certificate) to authenticate with the RSA+SHA-1 algorithm, which ensures that we are communicating with the correct (authenticated) peer. Further, we use encryption algorithms to encrypt every message that goes from onboard to ground, implementing part of a module that encrypts the Internet Protocol (ipv4) packets transmitted to ground. Even for adversary intercepts, during key exchange it will be computationally unfeasible to deduce the keys based on the messages. Once keys are exchanged, they will be used to do a symmetric encryption of the message using the AES 256 algorithm, after which it is computationally impossible to read the message even if it is intercepted.

In The Art of War, Sun Tzu said, “All warfare is based on deception.” That statement holds true for today’s electronic battlefield as well. One method we use to provide the element of deception is introducing proxy modules for filtering different protocols, which in turn protects the critical and safe area of the system. External unauthorised entities will have difficulty in identifying the critical and safe area. The critical and safe area is also protected by minimising the traffic from it to the outside world. A customised firewall allows only the required traffic to leave the system. For software-based systems running on a device without a network connection, unauthorised access may occur without physical access. To prevent these kinds of intrusions, we ensure a strong access control framework at multiple levels. The firewall is customised to provide access control at the network layer.

Three Basic TRANSEC Approaches TRANSEC refers to measures designed to protect transmissions from interception and exploitation by means other than cryptanalysis. While COMSEC usually provides end-to-end protection of a transmission, TRANSEC provides hop-by-hop link protection. The basic approaches to TRANSEC are three: low probability of detection (LPD), low probability of interception (LPI) and traffic flow security (TFS). LPD covers measures to hide or disguise electronic transmissions. A LPD signal could, for instance, be a low power encrypted signal transmitted on the same frequency as a high power unencrypted signal. To a typical listener, the encrypted signal would have the effect of reducing the desired signal-tonoise ratio of the unencrypted signal. While this may result in a degradation of signal quality,


unless the user knows that some of the additional ‘noise’ is actually a separate encoded signal, it may never be detected. While the LPD signal aims to avoid detection, the LPI signal is only intended to avoid interception. If a signal is transmitted at a single known frequency, it would be easy for an adversary to determine the frequency of transmission and intercept it. An adversary who wants to prevent the transmission from reaching its intended destination could simply transmit a higher power signal at the same frequency as the original transmission.

ECCM: How to Defeat a Jammer

Measures intended to defeat a jammer are termed anti-jam (AJ) measures or electronic counter counter measures (ECCM). The simplest narrowband AJ technique is frequency hopping – moving the frequency of transmissions quickly and randomly. In order to jam a broad range of frequencies, an adversary would have to transmit a large amount of energy over the entire band. The power required by a broadband jammer is often prohibitive, making narrowband jammers, which transmit over a smaller range of frequencies, the only practical approach. The adversary, not knowing the next transmission frequency, must listen to a broad range of frequencies to determine the frequency of transmission at any point in time. Then, the adversary must tune their narrow jammer to transmit on the same frequency. This process takes

time, allowing a small window of opportunity to transmit without the presence of noise. Jammers which use this approach are called follower jammers. Knowing the power level and response time of the jammer defines the amount of time a frequency hopping system may dwell on a single frequency. Frequency hopping rates are typically hundreds of hops per second for modern military systems. The random frequency hopping pattern can be controlled by an algorithm and key, as with crypto-security.

This approach also can serve to sustain a constant traffic flow so that there is no apparent change of activity on a circuit, making it impossible to determine when a circuit is in use and when it is not. A time-based algorithm is used to add fill bits to the data stream, a function sometimes referred to as a cover/ decover function. Rockwell Collins employs all of these approaches and many others in developing technologies to protect transmitted data. After all, it is a constantly evolving landscape of measures and countermeasures, requiring intermittent changes in approach.

An alternative approach to defeating the narrowband jammer is to increase the bandwidth of the signal so that it is in essence transmitted on many frequencies. Since the narrowband jammer may defeat only a narrow frequency range, the frequencies outside of the range are successfully received. This approach is known as direct sequence spread spectrum (DSSS). Finally, traffic flow security can be used to randomise data so that an adversary cannot tell which bits are real data and which are ‘fill’ data.

Alan C. Tribble

Manager, Government Systems Marketing - Asia Pacific, Rockwell Collins actribbl@rockwellcollins.com

Geointelligence Sept -oct 2013

Techniques for jamming wireless transmissions are known as electronic counter measures (ECMs). ECMs reduces the desired signalto-noise ratio, overwhelming the desired signal with noise to the point that the signal cannot be received by its intended source.

23


Tactical Communications

The Future of Radios << Cognitive Radio for military communications has been an intensive topic of research in recent years. Its main applications range from the utilisation of unused frequencies to interoperability among large communication systems in all layers >>

Geointelligence sept - oct 2013

C

24

ognitive Radio (CR) systems obtain information about their environment and adjust their operation accordingly to provide required services to end users. Regarding spectrum use, future wireless systems equipped with CR capabilities could dynamically access new frequency bands, and at the same time protect higher-priority users on the same bands from harmful interference[3]. For future mobile communication systems, CR techniques present a promising opportunity for costefficient access to spectrum bands to meet growing user demands. The emergence of CR techniques, especially in the terrestrial domain,

has recently played a significant role in wireless research. The focus in CR research has remained strongly on terrestrial civilian networks, although activities such as Software and Cognitive Radio for European Defense (SCORED) addressed the same issue from the point of view of military communications. In addition to terrestrial applications such as utilising the unused frequencies, known as white spaces in between high-power TV-transmitters, CR has been proposed to other applications such as LTE to allow more efficient spectrum utilisation and frequency sharing between

terrestrial and satellite systems. Research has been carried out in this field and it has been found that the key issue is to either avoid or manage the interference between systems sharing the spectrum, which also applies to tactical communications. In fact, CRs, due to their inherent environment sensing and transmission adaptation capabilities, are perfect communication platforms to construct tactical communication systems.

Cognitive Radio Future wireless communications will demand radio technologies


providing significantly higher capacity, bit rates and flexibility than existing systems. In addition, wireless access should cover the entire population, including rural and distant areas.

These radios are aware of their environment and the available resources. They learn from the environment and adapt to variations in the environment in real-time. In many cases, awareness of the environment equals awareness of the radio spectrum obtained through its own active measurements or from external sources such as public databases[1]. Spectrum awareness is not the only thing that can guide cognitive operation[2]. Time, space, and energy are other possible radio resources to be aware of and which guide operation. Relaying and various Multiple-Input and Multiple-Output (MIMO) methods can be used opportunistically to exploit spatial opportunities[2]. As an example, sensing combined with beamforming could give more accurate information about spectrum use in the vicinity. In addition to being aware of surrounding environment and current situation, CRs also need mechanisms to utilise the information. Cognition can be applied in multiple layers starting from physical layer adaptation, including antennas, radio resource management on link layer controlling the spectrum deployment in time and frequency domains, and network functionality comprising routing, including selection of the used radio system. Figure 1 shows a general

Sensing & Observing

Policies & Regulations

Learning & Decisions

Execution Figure 1: The cognitive cycle

cognitive cycle for characterising the operations of Cognitive Radio System (CRS). According to the definition, CRS has capabilities to obtain knowledge, adjust according to the knowledge and learn from the results. The definition is broad, and detailed techniques for creating the CRS functionalities have not yet been defined.

messages between users, thus increasing the throughput and capacity requirements to a new level. The introduction of MIMO and multicarrier techniques has provided more throughput and system capacity but the spectral efficiency has become a problem as the systems require more bandwidth.

CR in Tactical Communications

CR offers new possibilities to further enhance the performance of a modern tactical communication system by introducing methods and mechanisms to avoid interference and interception, improve systemwide spectral efficiency and allow more flexible resource utilisation. In addition to terrestrial wireless links, satellites, UAVs and wired connections are combined in a hybrid system (Figure 2).

Tactical communications networks are operated in a dynamically changing environment, where interference and sudden changes in the network configuration and radio parameters take place. However, with traditional Combat Net Radios (CNR), it is rather challenging to guarantee a specific performance level for users as the system parameters have to be fixed and agreed beforehand. Problems were first limited through wellperformed frequency planning, and later the introduction of wideband radios featuring automatic frequency allocation solved many issues with co-site interference. Since the introduction of voice transmission, the required information bandwidth has increased drastically. Today, the communication systems transfer images, video and data in addition to voice and data

In addition to industry-driven projects targeting common applications, research activities have been carried out to study the applicability of CR to military communications. As an example, Defense Advanced Research Projects Agency (DARPA) has launched several programmes related to CR in the United States. DARPA’s neXt Generation Program (XG) aims to develop theoretical solutions for dynamic control of the spectrum, technologies and subsystems that enable reallocation of the spectrum

Geointelligence sept - oct 2013

CR has been an active topic of research for some years now. CR technologies have been proposed to improve spectrum occupancy by exploiting the unused parts of the spectrum without interfering with primary users who have either higher priority or legacy rights[4], [3].

Information Processing

25


interview: Ari Hulkkonen, Senior Manager, Elektrobit

CR Improves Spectrum Utilisation CR aims to introduce secondary usage of the spectrum resources without interfering with the primary usage of the licensed users. How does CR ensure this? The secondary usage of the spectrum is one important application for CR. CR technologies can also be applied in many other ways to improve efficiency, throughput and coverage of the primary network. An example of another quite different CR scenario is extending the primary network coverage by providing satellite spots to support a terrestrial cellular network. However, the secondary usage is an important application especially from tactical communications applications point of view as the principles used in the secondary spectrum utilisation can also be applied to tactical communications, typically not to cause interference but to avoid it.

Geointelligence sept - oct 2013

In the secondary spectrum utilisation scheme, the CR devices must know if the frequency they intend to use is occupied or is it free. Typically, the knowledge is based on frequency allocation information in databases provided by either authorities or companies managing the data in their servers. Then, power limits have been given and the CR devices are not authorised to exceed those limits.

26

Very low power devices may also deploy spectrum sensing or combined approach deploying both the database method and sensing. The problem with sensing is that a single receiver will never be able to detect the primary user with 100 per cent reliability. Thus, collaborative sensing where all the nodes of the network may provide information of the spectrum has been introduced. When the database information is not available, collaborative sensing

is the only way to reliably detect the primary network and it is therefore one of the key methods applicable to tactical communications applications.

Wireless communications in future will demand radio technologies providing significantly higher capacity, bit rates and flexibility than existing systems. In what way does CR fit the bill? In order to provide new Internettype multimedia services for the mobile users, much more bandwidth is needed. In the physical radio layer, MIMO techniques and the deployment of multicarrier air interface have improved the spectrum efficiency and data rates that can be provided to the users. Examples of systems utilising these technologies are LTE, WiMAX, WiFi, etc. However, this is not enough as the number of mobile users is increasing exponentially. The fact is that more bandwidth must be allocated to the mobile systems in response to the increasing need. However, the only problem is that every single frequency applicable to mobile communications has already been allocated. To improve the overall system capacity, in cellular systems, the solution so far has been to introduce smaller and smaller cells so that the spectrum can be re-used more efficiently. However, this increases the number of access points required, which increases the system cost and its maintenance cost. It also creates more overhead in the networks due to the control traffic required. Another way to improve the spectrum efficiency is to use advanced radio resource management (RRM) systems that allow the lowest possible frequency

re-use patterns to be deployed. CR is foremost among technologies that targets to improve the spectrum utilisation, thus improving the overall spectrum efficiency of the communications system and enhances the instantaneous system throughput and overall capacity. CR technologies, for example, allow the unused frequencies to be deployed, not to mention the advanced interference management and avoidance, which also improves the system capacity.

You have been a part of numerous research projects being carried out by defence organisations to study the feasibility of CR in tactical environment. Can you tell us about them? Currently, one of the leading activities which I would like to emphasise is the Finnish Defence Forces (FDF) Technology Programme 2013, in which one of the key technology areas addressed is a highly mobile ad hoc network based on CR. The Programme 2013 comprises three main activities: Protection, Command System and Situational Awareness. Each activity has been divided into two or more projects, which focusses on specific technology topics. The Command System activity consists of two projects: Wireless Air Interface (WAI) and Intelligent Networks (IN). The WAI project studies the air interface with a focus on methods that improve the LPD and LPI performance of the wireless systems. This comprises waveform development, antennas and as a special topic, the deployment of HF radio. The IN project then combines all this into a single wireless cognitive network and adds the security issues. The FDF Technology Programme started in 2013 and will be completed in 2016.


establish the connection between nodes and to other systems using either wireless or cable/ fibre communications. The wireless interface is provided by the router’s integrated SDR baseband section that allows various military or commercial waveforms to be run, depending on the customer’s requirements.

References

and prototypes to demonstrate applicability to legacy and future military radio systems.

more crowded, there is a need for methods that allow more efficient utilisation of radio resources.

In Europe, EU-funded projects such as ARAGORN and SENDORA, activities funded by the European Space Agency (ESA) such as the ACROSS[5], and national projects and programmes such as TRIAL have developed CR solutions. In addition, the European Defence Agency (EDA) has launched its own projects to support the development of CR and its applicability to military communications. An example of such an activity is SCORED (Military Software-Defined Radio capabilities including applying Cognitive Radiobased Spectrum Management in the Security and Defence domains).

EB Tactical Wireless IP Network (TAC WIN)

Elektrobit has participated in numerous of these projects and is currently developing technology and solutions that allow deployment of CR functionality in practical applications. Following years of active work on MIMO and multicarrier technologies that provided a significant increase in the throughput of wireless links, CR is today one of the key technologies supporting the rapidly increasing requirements for system capacity. While spectrum resources are limited and bands have become more and

EB TAC WIN is a complete solution to building a tactical communications mobile ad hoc network for vehicle and stationary applications. With TAC WIN, battle groups can create high-data-rate wireless IP networks as backbones to support C2 data transmission during operations. The flexibility to use the EB solution in different frequency bands and network topologies provide cost effectiveness, ease of use and efficiency in various tactical communication scenarios. The EB TAC WIN is built with these basic components: the tactical router and the radio head unit. TAC WIN can be deployed as an independent network or as part of a larger operative network supporting a great variety of applications and physical equipment connected to the same flexible and dynamic mobile ad hoc network with highspeed connections comparable to commercial internet services. TAC WIN provides flexible routing functionality and interfaces to

2  F. H. P Fitzek and M. Katz, editing, Cognitive Wireless Networks, Springer, 2007. 3  S. Haykin, “Cognitive radio: Brain-empowered wireless communications,” IEEE Journal on Selected Areas in Communications, vol. 25, pp. 201–220, February 2005. 4  J. Mitola III and G. Q. Maguire, Jr., “Cognitive radio: Making software radios more personal,” IEEE Personal Communications, vol. 6, pp. 13–18, Aug. 1999. 5  M. Höyhtyä, J. Kyröläinen, A. Hulkkonen, J. Ylitalo, and A. Roivainen, “Application of cognitive radio techniques to satellite communication,” in Proc. DySPAN, pp. 540¬–551, October 2012.

Ari Hulkkonen, Senior Manager, Elektrobit With inputs from Reima Kettunen, Juha Ylitalo and Marko Höyhtyä

Geointelligence Sept - oct 2013

Figure 2: Cognitive Tactical Communication Network

1  M. Höyhtyä, A. Hekkala, and A. Mämmelä, “Spectrum awareness: techniques and challenges for active spectrum sensing,” in Cognitive Wireless Networks, edited by F. Fitzek and M. Katz, pp. 353-372, Springer, 2007.

27


Interview

“Textron Systems is Committed to Supporting Indian Security Agencies” << It is not just helicopters, UAS or weapons that Textron Systems is offering to India. The company is combining its surveillance and intelligence-monitoring and analysis capabilities for end-to-end intelligence. Inderjit Sial, President and Managing Director, Textron India, tells us more... >> How important is India as a market for Textron Systems? India, with its vast land and sea boundaries, diverse geography and vast population, needs an effective security environment for sustained economic growth. Government of India has undertaken the task of rapid modernisation of its defence as well as paramilitary forces. Textron Systems is committed to supporting the Indian military, paramilitary and central armed police forces with its best defence, internal security and aerospace solutions.

Geointelligence Sept - oct 2013

Can you brief us about the activities and profile of Textron Systems in India?

28

Inderjit Sial President & Managing Director Textron India

Textron India headquarted at Bangalore, is a wholly owned subsidiary of Textron Inc. It works closely on engineering and other business solutions with other Textron Systems businesses, as well as Textron’s Cessna and Bell Helicopter units. Textron India currently has a vast talent pool of more than 450 highly qualified engineers. In addition, Textron India has business development and sourcing teams located in Bangalore which support the various Textron business units in the country.


RemoteView 3D Pro extension showing a 3D terrain model of a threat dome associated with a known lethal explosive device

You are in talks with Central Armed Police Forces and Ministry of Home Affairs for several internal security requirements. What are the products that Textron Systems has for the growing internal security market in India?

Textron Systems’ vast array of products includes Unmanned Aircraft Systems (UAS), unmanned surface vessels and sophisticated unmanned command-andcontrol systems, all of which are gaining broad interest globally. By combining the surveillance and multi-source data collection capabilities of these products (for information, video and imagery) with intelligence-monitoring, analysis and dissemination capabilities of Overwatch solutions, we ensure that our customers benefit from end-toend intelligence capabilities which equip them with broad security capabilities. In addition, our family of Unattended Ground Sensors (UGS) are a scalable, effective solution for both tactical and non-military applications covering a variety of terrains and targets. This includes the MicroObserver UGS system, which is our next-generation solution that provides situational awareness for perimeter defence, force protection and border security.

<< Textron’s products include UAS, unmanned surface vessels and sophisticated unmanned C2 systems, all of which are gaining broad interest among customers whose needs fall within the realm of protecting the homeland >>

As part of our sales activities, Textron Systems and RSI Softech are in dialogue with various Indian government agencies.

What are your offerings in the area of unmanned systems? Textron’s AAI Unmanned Aircraft Systems operating unit has more than 35 years of experience designing, producing, testing, fielding and supporting unmanned systems throughout the world.

Geointelligence sept - oct 2013

While a number of Textron Systems operating units are engaged in business in India, I would like to focus on the company’s Overwatch Geospatial Solutions (Overwatch) operating unit. Overwatch is an industry provider of highly sophisticated geospatial software applications and services. We have partnered with RSI Softech India, a Hyderabad company, to jointly sell and integrate a portfolio of geospatial solutions in India. RSI Softech is a leading integrator and supplier of geospatial intelligence solutions in India. For more than 15 years, the company has built a reputation of serving the Indian market with reliable, affordable solutions in the areas of security and intelligence, surveillance and reconnaissance.

29


<< Overwatch solutions enable analysts to integrate and leverage multiple intelligence sources to improve situational understanding and deliver actionable intelligence in support of counter-terrorism, irregular warfare and civil applications such as ecosystem management and environmental planning >> Our foremost UAS is the highly regarded Shadow Tactical UAS. Shadow systems have amassed more than 800,000 flight hours supporting operations in Iraq and Afghanistan. The Shadow system is in use by the US Army and Marine Corps, and is also the tactical UAS of choice for the Australian, Swedish and Italian armed forces. It is an outstanding tactical UAS with great operational capabilities.

AAI’s Aerosonde Small Unmanned Aircraft System is ideally suited for both land-based and shipboard operations in spaceconstrained environments. In fact, the Aerosonde can be deployed in its shipboard configuration with no ship alterations, and is an affordable and space-saving solution for our customers. The Aerosonde aircraft’s single electro-optic/ infrared payload delivers day-and-night, persistent intelligence, surveillance and reconnaissance, while its large payload size, weight and power can accommodate another payload of choice for multi-mission flexibility. It utilises AAI’s one-piece Launch and Recovery Trailer and the Expeditionary Ground Control Station for expeditionary land- and sea-based operations.

Geospatial intelligence is one of the prime requirements of security forces around the world. You have a dedicated division in this regard — Overwatch. Can you tell us about the offerings of the division?

Overwatch delivers multi-source intelligence (multi-INT), geospatial analysis and custom intelligence solutions which support military commands, intelligence agencies, national agencies and commercial services. Our solutions enable analysts to integrate and leverage multiple intelligence sources to improve situational understanding and deliver actionable intelligence in support of counter-terrorism, irregular warfare and civil applications such as ecosystem management and environmental planning. Overwatch is at the forefront of technology innovation, providing advancements in the multi-source and geospatial intelligence fields. Among the many capabilities, our software solutions can provide the following: »   On-demand image processing »   Multi-terabyte image support »   Advanced 3D analysis and visualisation »   Customised, web-enabled workflow management »   Full motion video exploitation »   Collection and collaboration integration software »   Human terrain socio-cultural information software

Geointelligence sept - oct 2013

»   Multi-source intelligence fusion and predictive analysis

30

With so many companies claiming to offer tools for data fusion and analysis, how are your solutions different from others available in the market?

Medina Wireless Surveillance software showing geographically mapped call data and relationships among acquired data

Overwatch works with customers and partners to understand all the factors that affect their intelligence and mission needs. We leverage our extensive base of multi-INT and geospatial domain expertise to


We are also developing innovative new technologies that will provide continuing advancements in the intelligence field. Innovations such as cloud computing platform integration and delivery will extend our capabilities to include more rapid service configuration, adaptability, interoperability and collaboration.

We are no longer talking about collection of data but rather big data. How to derive actionable intelligence in realtime from the huge amount of data generated every day is a challenge facing security agencies around the world. How are you addressing this problem? As the need for more timely and accurate information analysis expand, systems today must incorporate capabilities that enable an analyst to effectively ingest, correlate and integrate smart or self-aware multi-source data including imagery, video, sensor data and embedded metadata into their analysis and reasoning processes. These capabilities, in addition to understanding the user workflows, operational tempos and diversity of requirements, are incorporated into Overwatch’s solutions to drive how software and data are assembled to solve problems. These solutions support a wide variety of geospatial analysis workflows. The ability to optimise analyst workflows enables analysts to be far more effective in accessing, displaying and analysing geospatial data in very tight timelines. For exhample, Overwatch’s GeoCatalog product enables geospatial analysis organisations to access and analyse large volumes of geospatial data stored locally, or to retrieve and access data that is archived

<< There are many projects in India for which Textron products meet and even exceed requirements. RSI Softech and Textron Systems are working closely to localise the products and offerings for programmes which may support India’s programmes like NAT Grid, Crime and Criminal Tracking Network and Systems >> and physically stored across a geographically dispersed enterprise. All of this helps optimise collected spatial data to support intelligence production needs and obviate the need for additional, and often redundant collection.

How do you overcome the challenge of interoperability/ common standards? Overwatch is a member of the Open Geospatial Consortium (OGC), an international voluntary consensus standards organisation. Within the OCG, more than 400 commercial, governmental, non-profit and research organisations worldwide collaborate in a consensus process to encourage development and implementation of open standards for geospatial content and services. Our product development methodologies support prescribed standards outlined by the NATO Standardization Agreement (STANAG), which defines processes, procedures, terms and conditions for common military or technical procedures or equipment between the member countries of the alliance. Additionally, Overwatch geospatial solutions meet the MIL-STD-2500C standards which

establish the requirements for the National Imagery Transmission Format Version 2.1 (NITF 2.1). Our geospatial solutions are certified by the US Joint Interoperability Test Command for NITF standard compliance. As underlying principles for development, these activities support the delivery of solutions that incorporate open, interoperable data models as opposed to proprietary data.

Apart from RSI Softech with which you have recently announced your partnership, which other Indian companies have you joined hands with? As mentioned previously, RSI Softech, with its roster of software and hardware solutions and exposure to Indian armed forces and central police organisations, is a valuable partner for Textron Systems and Overwatch. We do not have a relationship with any other entity in the Indian market at this time.

Any particular major contracts that you are looking forward to and would like to talk about? What can we expect from Textron Systems in the coming years? Currently, there is an urgent need in India for a number of Textron products and solutions. There are many projects in India for which Textron products meet and even exceed the requirements. RSI Softech and Textron Systems are working closely to localise the products and offerings for programmes which may support India’s National Intelligence Grid (NAT Grid), the Central Monitoring System of India (CMS), the Centre for Communication Security Research and Monitoring (CCSRM), Crime and Criminal Tracking Network and Systems (CCTNS), the National Counter Terrorism Centre (NCTC) and other defence and government agencies.

Geointelligence sept - oct 2013

design solutions that break down barriers and deliver comprehensive, mission-focussed situational understanding.

31


spotlight

Geointelligence sept - oct 2013

<< The state of Uttarakhand witnessed a severe disaster due to heavy rainfall and landslides on 16-17 June 2013. Given this background, GeoIntelligence takes a look at how geospatial technology could help in mitigating and minimising the impact of the unavoidable natural hazards the region is prone to and the lessons learnt from the recent disaster >>

32

“We are dying sir, we are dying...” This was the only message that IndoTibetan Border Police (ITBP) jawans (soldiers), posted at Kedarnath1 in Uttarakhand state of India, could convey to their commander before the communication lines collapsed on the morning of June 17, 2013. It was raining incessantly in the temple town for the last three days. But that day, the soldiers sensed that the danger was unusual – the

weather gods were in no mood to show mercy. And soon their intuition proved right. Waters from upper reaches came gushing towards Kedarnath valley and washed away with it everything that came in their way. The mighty waters relented only after they had swallowed thousands of people, infrastructure worth millions of dollars, and completely destroyed the towns of Kedarnath and Rambara.

T

he disaster is said to be the country’s worst natural calamity since the 2004 tsunami. The estimated damage including development projects incurred by the state due to the calamity is believed to be Rs 3,000 crore. According to the survey conducted by PHD Chamber of Commerce and Industry, the devastation in Uttarakhand, a state dependent heavily on tourism, is


Security forces carrying out the rescue act

While nature will continue to have its own way, the best that man can do is to learn to predict, prepare or mitigate natural hazards and devise ways to live in harmony with nature.

Natural Hazard Risk Management Typically, natural hazard risk management plan involves the following:

»  Risk assessment – analysis and evaluation of the type of risk, identification of location and its potential impact on the society »  Risk control – preventive and curative measures to be taken to reduce the impact of natural hazards »  Disaster and contingency planning – in case a disaster strikes, how should it be managed »  Disaster analysis and evaluation – post-disaster, assessment of damage (financial, infrastructure/ topographic) and the lessons learnt from the calamity

Risk Assessment Risk assessment methodologies help planners identify the type of risks associated with a particular area – be it landslides, floods, earthquakes or fires. In order to better the understanding of the type of disasters that can hit an area, hazard mapping of the area is undertaken. The maps generally show risk zones as well as disaster impact zones. These could include landslide hazard maps, flood zone maps, seismic zone maps, forest fire risk maps, etc. Only after the threats are identified and risk assessed,

Geointelligence sept - oct 2013

expected to cause revenue loss of Rs 12,000 crore to the state’s tourism industry in the current fiscal, that is, about 11 per cent of Uttarakhand’s Gross State Domestic Product (GSDP).

33


interview: Ari Hulkkonen

An aerial view of flood-ravaged Rudraprayag in Uttarakhand

can the administration plan any infrastructure, appropriate economic activity, settlement planning for the area.

Geointelligence sept - oct 2013

The Uttarakhand Scenario

34

The recent disaster in the state was caused by rains resulting in floods and landslides. Geological Survey of India (GSI), in its ‘Preliminary study Note on Natural Disaster at Uttarakhand,’ observed that very heavy and incessant rains from 15 to 17 June 2013 caused exceptionally high rise in the river discharges. “The rise in the river level was of the order of 5-7m where the valley was wide and 10–12m where the valley was narrow,” the report said, adding, “The gush of water running down from Kedarnath and Rambara areas brought mammoth sediment load which consisted of huge rock boulders with the longest diameter ranging from 3-10m. The enormous volume of water induced toe erosion along all the river valleys which in turn

triggered landslides at a number of places.” The National Institute of Disaster Management (NIDM), in its report on the Uttarakhand disaster, further elaborates the point, “The Alaknanda and its tributary Mandakini occupied their flood ways and started flowing along the old courses where human habitation had come up with passage of time (when the river had abandoned this course and shifted its path to the east side). Thus, the furious river destroyed the buildings and other infrastructure that came in its way.” Experts say that with the present level of technology available within the country, it is not possible to predict the devastation of this magnitude. But was it really impossible to see that the state was sitting on a time-bomb, waiting to explode? NIDM in its reports states, “Geologically, the rocks in this area are found highly deformed,

degraded and dissected by structural discontinuities and drainages. Seismo-tectonically, the area is traversed by several lineaments, faults and thrusts, which are considered to be geodynamically active. The area had suffered an earthquake on 29 March 1999 (M-6.8) which caused loosening of rock masses, ground cracks and landslides etc.” Talking about the Kedarnath Valley, Uttarakhand Space Application Centre (USAC) in its report about the recent disaster in Kedarnath Dham and Mandakini Valley, mentions, “The region is seismically and ecologically very sensitive and fragile and even small disturbances (natural or anthropogenic) trigger changes that rapidly assume the dimension of a disaster.” It is unlikely that the government was unaware about the region’s vulnerably to natural hazards, given the fact that it had identified landslide, soil erosion and glacier recession as some


of the major challenges before the administration in its report, State Action Plan on Climate Change, published in 2012. Also, its Disaster Mitigation and Management Centre at Dehradun (an autonomous institute under the aegis of state government’s Department of Disaster Management, it is responsible for formulating appropriate policies and strengthening the capabilities of both the administration and local population to cope up with all aspects of disaster management) carries out a number of studies to assess the disaster vulnerability of the state. For example, it has completed landslide and environmental risk assessment of Nainital and Mussoorie cities, vulnerability of the building stock of Mussoorie, Nainital, Bageshwar, Haridwar, Dehradun, Rudraprayag, Pauri, Srinagar and Joshimath have been assessed. There are also several organisations which are carrying out extensive studies in hazard assessment and management, for example, GSI, Central Road Research Institute (CRRI), Wadia Institute of Himalayan Geology (WIHG), DRDO, IIT Roorkee, National Remote Sensing Centre (NRSC), etc. They share their reports and findings periodically with the government. But clearly in this case, adequate precautionary measures were absent and construction activity on the hills was unchecked.

breaks through the ground surface at new locations, etc. Similarly, the rising level of rivers due to continuous and relentless rains can be an indication of possible floods. Animals are said to be blessed with the capability to anticipate these dangers. The unusual anxiety and distress among cattle, dogs or other domestic animals can be a sign of an impending danger. Restricting development: “Landuse planning is one of the most effective and economical ways to reduce losses by avoiding the hazard and minimising the risk,” says Dr Surya Parkash, in his book, Training Module on Comprehensive Landslides Risk Management. The author further says, “This is accomplished by removing or converting existing development or discouraging or regulating new development in unstable areas.” Protecting existing structures: Relocation is not always possible and hence there is a need to strengthen the existing structures

<< Location intelligence is the most sought-after information whenever a calamity strikes. Geospatial technology aids in search and relief operations. It can also be used for mobilising resources during disaster period >> against disasters. Slopestabilisation methods are usually adopted for prevention against landslides. Monitoring and warning systems: Early warning systems are being used by several countries for realtime automated monitoring of natural disasters. These include monitoring the movements, development of stresses, and pore pressures or hydrostatic pressures continuously and transmission

Worst Affected District of the State Uttarakhand

Risk Control

General observation: Nature has its own way of conveying threats. The need is to educate people about the possible cues that nature provides before any impending disaster. Some of the landslide warning signs to look for are – walls or stairs begin to pull away from the building; slowly developing, widening cracks start appearing on the ground or on the streets; water

Rudraprayag

Geointelligence Sept -oct 2013

There are various tools available for risk mitigation:

35


How India Carried Out One of the World’s Biggest and Quickest Search and Rescue Operations?

T

he Indian state of Uttarakhand recently witnessed one of its worst natural disasters. The floods accompanied by landslides killed hundreds of people and injured thousands. “The magnitude of the disaster was so huge that in the first phase, we were not even sure about what had actually happened in the region – was it just flash floods or something more,” said Keshav Kumar, Deputy Commandant (Administration), National Disaster Response Force (NDRF). (NDRF is a disaster response agency under National Disaster Management Authority which is an apex national body for disaster management and is entrusted with the responsibility of laying down policies, plans and guidelines for disaster management.) NDRF had moved its teams to the state by June 17 itself but was unable to proceed to the devastated zones due to collapsed roads.

Geointelligence sept - oct 2013

People were scattered and stranded all over the places –Pindari Glacier, Sunder Dunga Glacier in Kumaon

36

of instrumental generated data at regular time intervals.2 For example, post tsunami 2004, the Indian government set up an Indian Tsunami Early Warning Centre (ITEWC) at Indian National Centre for Ocean Information Sciences (INCOIS ESSO), Hyderabad. The centre is one of the best systems in the world today, and is not only serving as the primary source of tsunami advisories for India but also as the regional tsunami advisory service provider for the entire Indian Ocean region.

Did Uttarakhand Government Ignore all Warnings? Unplanned development work: Environmentalists blame the

region, Arva Tal on Gangotri–Mana axis etc. The challenge for the rescuers was not only to identify areas where the survivors were but also to reach to them quickly, provide food and medication, evacuate them and take them to safer zones. And this had to be done in a weather which prevented safe flying and when there was absolutely no road connectivity. Several of the stranded people had also incurred injures due to the disaster, and required immediate medical aid. “Initially, there were too many hiccups. Rains weren’t stopping, the ground was fragile, roads were completely damaged and the telephone lines weren’t working. It was a challenge to operate in those conditions,” explains Comdt GS Chauhan, who was responsible for overseeing ITBP’s operation in the state. “In fact, the only way we could communicate with each other was with our HF sets, which require frequent charging but there was no electricity at that time. The jawans (soldiers) would call, provide us the necessary info and switch off their sets. Things, however, improved as the days progressed,” he added. Being stationed in the region, ITBP was the first ground responder to the calamity. Given the magnitude unplanned and unabated development work, esp., hydel-power projects for the present crisis in the state. According to reports, 45 hydropower projects with a total capacity of more than 3,000 MW are operational in the state, and around 200 big and small projects are proposed or under way. In the Alaknanda-Bhagirathi basin alone, nearly 69 hydropower projects with a total capacity of about 9,000 MW are underway. The implementation of these projects is estimated to affect about 65 per cent of Alaknanda and 80 per cent of Bhagirathi river. In its report on hydropower development, published in 2009, the Comptroller and Auditor

of the disaster, it was impossible for the administration to operate without the help of Indian Armed Forces. Indian Air Force (IAF), Indian Army and in some cases, even Indian Navy, rendered their services to the SAR operations. Border Roads Organisation (BRO) which builds and maintains roads in mountainous regions, diverted its resources – both personnel and equipment from other projects for clearing roads and rescuing the affected. How was information about stranded people collected? Information about the stranded people was collected through a number of sources, the chief among them being helplines. Phone numbers were flashed across the country and people were asked to contact on these numbers with information about the survivors or their whereabouts. As phone became the chief source of gathering location intelligence about survivors, the administration worked overtime to ensure restoration of telecommunication facilities. Also, the rescuers were provided with satellite phones for unperturbed services. General (CAG) had pointed out the lack of measures being planned or designed in any hydel project being carried out in the state, to cope with the risk of flash floods. Voicing its concern over deforestation and the ongoing and proposed hydropower projects, CAG had said that the projects are weakening the mountains. IMD warning: India Meteorological Department (IMD) maintained that it did warn the state government about the heavy rainfall in the region 48 hours in advance. State Chief Minister (CM) Vijay Bahuguna is reported to have said that the forecasts were not actionable as the warning was not clear. “It only


The Government of Uttarakhand provided the latest information on rescue and relief measures in the state on its website www.uk.gov.in, while the Indian Army launched www.suryahopes. in. The website gave minute-tominute update on army operations across the state, location wise data of people stranded at various places, list of rescued persons, helpline numbers, latest news about flood victims and provided links to Uttarakhand government website and Google sites giving information on flood affected people. Google had introduced an online Crisis Map for Uttarakhand which provided information on rescued people, roads closed and cleared areas, people stranded, relief camps, medical centres and so on. It had also launched its webapp, Person Finder, which helped people search and post information about missing people. The jawans also physically screened several areas to rule out the presence of survivors in inaccessible areas. said there would be heavy rains and snowfall in the upper ridges,” he is reported to have said. However, experts say that whenever an alert of heavy rainfall is issued, it does involve the possibility of cloudbursts. So the question is that despite IMD issuing a timely warning, why did the administration not swing into action? Possibly, because the administration is not well-versed with the terminology used in the warning. But can a person trained in disaster management afford to do so? As per the Disaster Managment Act, every state is required to constitute its State Disaster

The work ahead Unlike others, BRO’s work does not end with the successful completion of SAR operation. It now faces the herculean task of rebuilding the roads and reconnecting the region with the rest of the country. The challenges are many. For example, the devastation has rendered several zones which hosted roads earlier unsafe, and so on. A massive road rehabilitation programme has been taken up by BRO in the entire state.

The disaster will be remembered in history not only for its extent of devastation but also for the manner in which the search and rescue operation were carried out. It was the efforts of all the agencies involved in the rescue mission state government, Union Ministry of Home affairs, NDMA, BRO, ITBP, Indian Armed Forces, NDRF, and Union Ministry of Road & Surface Transport - that ensured speedy evacuation, both by air and land, of stranded pilgrims and citizens.

Army personnel busy in rescue operations in Pindari glacier in Uttarakhand

Management Authority (SDMA) headed by a CM and eight other members. The SDMA is responsible for taking preparedness measures and building response capacity as per their vulnerability to various measures. The CAG report 2013 on disaster preparedness in India found that even though the SDMA was constituted in October 2007, it had not formulated any rules, regulations, policies, and/ or guidelines. The audit found that no plan was prepared in the state for early warning and the communication system was also inadequate. The CM is reported to have accepted the fact that the state doesn’t meet the norms prescribed by NDMA.

Disaster and Contingency Planning Since natural hazards are bound to occur, it is important to have contingency plans. What to do when a disaster strikes, how much area will it affect, what are the areas where casualties would be high/ people can get trapped, and which routes to be used for evacuation purposes? Geospatial technology is greatly used for obtaining these answers. Location intelligence is the most sought-after information whenever a calamity strikes. The technology aids in search and relief operations. It can also be used for mobilising resources during disaster period.

Geointelligence Sept -oct 2013

Helicopter recce and UAVs were also put into service to gain information about survivors.

37


Pre and post satellite image of Kedarnath valley

Pre

Post

Image courtesy: USAC

Geointelligence sept - oct 2013

Post-disaster Analysis and Evaluation

38

Post-disaster, preparing database related to relief and rehabilitation work, and assessing the damage village/ district wise are the major tasks before any government. Here too, geospatial technology plays an important role. “The technology can be used for damage assessment (settlement, road/ infrastructure/ industry, agriculture), topographical change, geomorphological change, land use change, glacier health, snow cover change (if any), river dynamics and drainage network change,” explains Dr P.K.Champati Ray, Head, Geosciences and Geohazards Department and Course Director, Natural Hazards and Disaster Risk Management (NHDRM), Indian Institute of Remote Sensing. He adds, “New vulnerable slope mapping, new landslide hazard zonation should be attempted now

with comprehensive risk assessment of areas where more than 10 lives or Rs 10 lakh are at risk, something similar to EMDAT guidelines.”

Uttarakhand Scenario The report released by USAC helped understand the real reason behind the floods and allayed stories wherein glacier melting was blamed for the disaster. The organisation has already carried out various analyses like optimal alternate route (track route and motor route) to reach the Kedarnath temple, rapid damage estimation of Mandakini valley, snow mapping and glacier retreat of Chorabari Glacier system, plan for control of debris flow and avalanche for Badrinath Dham, etc. GSI has already carried out geoscientific studies in the affected areas of Uttarakhand. This study was important to help suggest/

delineate suitable and safe sites for relocation/ rehabilitation of 270 odd villages / human settlements that were worst affected by the disaster and to assist BRO, state PWD and or other central/ state agencies in identifying optimum alignment of roads which could be more stable and less prone to landslide hazards.

Lessons Learnt Risk assessment a must: “Comprehensive risk assessment should be done for all critical areas, monitoring network including observatory and 24X7X365 communication network should be established,” said Dr Champati Ray, adding, “Investment in science and geoinformatics, both in terms of manpower and facility, is required. Regulatory framework and disaster management mechanism should be in place.”


Conclusion

•  All 13 districts of Uttarakhand affected including 4200 villages •  More than one lakh people rescued •  About 600 people dead (the number is likely to increase as the debris is cleared) •  4 ,473 people injured •  5,526 people missing •  Estimated damage including development projects incurred is about Rs 3,000 crore Communication: There is a need to ensure that warnings reach the locals who are likely to get affected by the disaster. In Uttarakhand, for example, despite the IMD issuing warnings well in advance, the government did not issue disaster warning until June 16. And despite that, the pilgrimage was not stopped till the bridges finally collapsed the next day. Education and training: Education and awareness about natural hazards and risk mitigation should be a priority for all - decision makers and the public. The subject needs to be given precedence, for negligence will only result in another disaster. Setting up early warning systems: The government doesn’t have to look far. The success of tsunami center at Hyderabad is a clear indication of how earning warning systems can help mitigate dangers.

Challenges Insurance and financial assistance: Codes for construction based on the vulnerability assessment of an area needs not only be clearly defined but also locals need to be encouraged to follow them. This can be done but providing financial assistance to people who follow codes. Inputs don’t match the requirements: This is one very common problem that experts

say exist with country’s disaster management plans, that is, agencies involved in disaster management rarely get the information they are looking for. Dr Champati Ray suggests, “There should be a comprehensive assessment of requirement and possible inputs to meet such requirement. It should be done before hand and necessary mock drill should be done to assess the requirement and inputs received.” Sharing of information: While several organisations are involved in studies related to natural hazard management, there is a need to encourage them to share their work. This will prevent duplication of work and efforts. Also, during the disaster, coordination and information sharing is important as many organisations are involved in disaster control. Making imagery available on time: Remote sensing imagery is the best way to understand the nature of disaster and its impact. This, if provided timely, can be a great aid to rescue workers. Dr M. M. Kimothi, Director, USAC, says, “Today, our country has satellite systems that provide information periodically on a daily basis as well as on the request of a particular region of the country. However, there are no such systems to provide information on hourly basis, which positively will be achieved soon by the agencies.”

The challenge before Uttarakhand today is to rebuild the state, restore the infrastructure and the economic activity, and restore the faith of locals and tourists in it. People do want development but not at the cost of losing their lives/ property. It is important for the state to maintain a healthy balance between development and environmental sustainability. As Lt Gen Anil Chait, Chief of Integrated Defence Staff, Indian Army, puts it, “Unless the mitigation strategies, preparedness are in place, and until there is coordination and cooperation between agencies to evolve a system to ensure that our people can be safe, things will not improve. We will continue to be reactive. And to deal with natural calamity, we have to be pre-emptive, pro-active. In other words, we have to be prepared.” Prepared not only to deal with the disaster but also to sail through it, as the jawans of ITBP caught at Kedarnath did. Braving all odds, tired and exhausted, the jawans finally managed their way to their base camp. All six of them alive. The weather gods may have been brutally harsh to them, but it could not dampen their spirits. The undying human spirit didn’t let the physical fatigue come in the way of its ultimate instinct – that of the survival.

Notes/ References 1: Kedarnath is located in the Himalaya at a height of 3,583 m (11,755 ft) above sea level in the Mandakini valley of Rudraprayag district, Uttarakhand. It is a very popular destination for Hindu pilgrims, being one of the four dhams in the state. The others being Gangotri, Yamunotri and Badrinath. 2. Training Module on Comprehensive Landslides Risk Management

Aditi Bhan Asst Editor, GeoIntelligence aditi@geospatialmedia.net

Geointelligence Sept -oct 2013

DISASTER IMPACT

39


interview

learnt from this experience and would ensure that the next time the Armed Forces are involved in any such operations, the information sharing is effective and resilient.

Even with NDMA, providing aid to civil authority is something which the Army will have to plan for. Does the Army carry out any training in this regard? Is there a need for specialist equipment?

Lt Gen Anil Chait

Keeping the Faith Alive

Geointelligence sept - oct 2013

Establishing contact with people who were stranded must have been a big problem, with all communication disrupted. What systems were put in place to ensure that no one is left behind?

40

Search and ability to locate was one of the biggest challenges faced by us. In this case, the initial canvas was as wide as 40,000 sq km which had to be reached and searched in the absence of information. Requirement was to grid the complete area, insert soldiers and establish control thereafter. It involved treading every trail and locating those who need help. The real challenge was to find the last survivors amongst the dead, the creeks, crevasses, nallahs and hills. Weather was another factor which hampered the rescue missions. Meagre electrooptical and thermal means available for the SAR operations were impacted by the weather and rain. Time was at a premium and the requirement of troops was very large. The strength had to be enhanced from 5,000 to

nearly 8,500. We had to rely heavily on helicopter operations. Restoring basic amenities to people caught in the nature’s fury was our top priority.

For the benefit of flood-affected people, Indian Army launched a website, www.suryahopes.in. In what way was your initiative different from Uttarakhand Government’s website? One must understand that the Army was among the first responders to this crisis. Hence, the information available to us was first hand and factual. The information put on the website brought about immense response on our helplines. We were able to connect people as we had boots on ground. The same information was also shared with the state government. But means for the information to travel were affected. The collection and collation of information therefore earnestly started in rear area where communications were surviving. Initially, it took time to fathom and craft out suitable apparatus to bring this information to people. We have

I think the disaster preparedness process is evolving. NDMA is the apex national body for disaster management. There is a need for joint training and we are moving forward in this direction. Disaster prone areas have been identified and specialist equipment as part of disaster brick is proposed to be placed forward for quick and effective response.

It is believed that there was a lack of coordination between various agencies. In retrospect, how could the situation have been handled better? What are your recommendations? State administration in forward areas was affected on account of calamity, resources, warning systems and communications. Individual agencies had to move up proactively to provide timely relief. There is a need for one task force commander to coordinate all resources including Armed Forces, ITBP, NDRF and other agencies, preferably under the Army. There is thus a need for establishing Unified Operational Emergency Control Centre which could become command and control hub for all responders to regulate and provide single window coordination for rescue agencies to ensure that relief reaches timely to the affected people. Lt Gen Anil Chait, the then GOC-in-C, Central Command, Indian Army, was overseeing the Search and Rescue operations in Uttarakhand. Lt Gen Chait took over as Chief of Integrated Defence Staff on July 1, 2013.


events

GEOINT 2013

Naval and Maritime EXPO 2013

October 13-16, 2013 Tampa Convention Center Tampa, Florida, USA

www.namexpo.in

AUSA Annual Meeting &Exposition

September 23-27, 2013 Cochin Port Trust Kerala, India

NCT CBRNe Asia

September 24-27, 2013 Kuala Lumpur Malaysia

www.ib-consultancy.com/events. html?view=event&id=41:nct-cbrne-asia2013&evr_id=0

Expomil 2013

September 26-29, 2013 Romexpo Exposition Center Bucharest, Romania www.expomil.ro/home

geoint2013.com

October 21–23, 2013 Walter E. Washington Convention Center Washington DC, USA

Paris Nord Villepinte France http://en.milipol.com/

International Convention of Autonomous Unmanned Systems and Robotics (AUS&R) November 26-28, 2013 Israel

http://i-hls.com/2013/07/ausr2013/

myeventmarket.com/ausa12/future-ausa-events

DECEMBER

Marine Week 2013

I/ITSEC 2013

www.marineweek.org

http://exhibits.iitsec.org/iitsec13/public /MainHall.aspx

October 22-25, 2013 Bexco, Busan Korea

CCExpo

October 23-24, 2013 Hamburg Germany

December 2-5, 2013 Orlando, Florida, USA

Gulf Defense & Aerospace Kuwait

www.ccexpo.de/en/home

December 10-12, 2013 Kuwait International Fair Kuwait

October 2-4, 2013 Putrajaya, Malaysia

Seoul International Aerospace & Defense Expo

JANUARY

Pacific 2013

www.seoulairshow.com/eng/

OCTOBER GPEC Asia 2013 www.gpecasia.com.my

October 7-9, 2013 Sydney Convention and Exhibition Centre, Australia www.pacific2013.com.au/index.html

Oct 29–Nov 3, 2013 Republic of Korea

NOVEMBER Defense & Security 2013 November 4-7, 2013 IMPACT Expo center Bangkok, Thailand

www.asiandefense.com

Global MilSatCom 2013 November 5-7, 2013 London, UK

www.smi-online.co.uk/defence/uk/conference/ global-milsatcom

Dubai Airshow 2013 November 17-21, 2013 Dubai World Central (DWC) Jebel Ali, Dubai United Arab Emirates www.dubaiairshow.aero

Milipol 2013

November 19-23, 2013

www.gulfdefense.com

DGI 2014

January 21-23, 2014 QEII Conference Centre Westminster, London United Kingdom

www.wbresearch.com/dgieurope/home.aspx

FEBRUARY International Armoured Vehicles February 3-6, 2014 FIVE, Farnborough, UK

www.internationalarmouredvehicles.com/

Defexpo India

February 6-9, 2014 Pragati Maidan, New Delhi India http://defexpoindia.in/#

Singapore Airshow 2014 February 11-16, 2014 Changi Exhibition Centre Singapore

www.singaporeairshow.com/#&panel1-3

Geointelligence sept - oct 2013

SEPTEMBER

41


Image Intelligence

Probable artillery impact craters in Anandan, a nearby town of Aleppo in Syria

Syria’s conflict going global?

Geointelligence sept - oct 2013

E

42

ver since the conflict between Syria’s government (headed by President Bashar Assad) and pro-reform demonstrators took a violent turn in 2011, the United Nations (UN) has been under constant pressure from the US and its allies for launching military action against Syria. The latest provocation comes after footage emerged of a suspected chemical weapons attack in areas surrounding eastern Damascus. Hundreds of people are reported to have lost their lives in this attack, said to be the deadliest of the conflict so far. While rebels are blaming the Assad government for the assault, the latter has denied these allegations, describing it as a pre-planned attempt by the opposition to tarnish the government’s image. The world has reacted angrily to the news with US and its allies favouring a limited military strike against the government. Even as the world debates about its response to the use of chemical weapons, Russia has been successful in convincing Syria to place its chemical weapons under international control. Reports say that UN has confirmed receiving documents from Syria on joining the chemical weapons convention.

Syria’s Furqlus weapons depot near the city of Homs. The depot is said to be one of thefive permanent locations where President Assad stores chemical weapons

Image Courtesy: DigitalGlobe; NBC News; flickr


REGISTER NOW FREE FOR U.S. AND INTERNATIONAL MILITARY & GOVERNMENT

The Largest Intelligence Event of the Year OCTOBER 13-16, 2013

TAMPA CONVENTION CENTER

TAMPA, FLORIDA

CONFIRMED SPEAKERS INCLUDE The Honorable James R. Clapper Jr.

Director of National Intelligence (DNI)

Parag Khanna

Global Strategist, World Traveler, and Author

Dr. David Kilcullen

Author and President & CEO, Caerus Associates

Ms. Letitia A. Long

Director, National GeospatialIntelligence Agency (NGA)

• Hear from leading government, military and technology speakers

ADM William H. McRaven, U.S. Navy

• Network and share best practices with other geospatial technology & remote sensing professionals

Robert Scoble

• Discover hands-on the latest technology, solutions, and services from 200+ exhibitors in 200,000 square feet of exhibit space

Commander, U.S. Special Operations Command (USSOCOM)

American Blogger, Technical Evangelist, and Author

Brought to you by the United States Geospatial Intelligence Foundation

GEOINT2013.COM


Subscribe today

GET YOUR DIGITAL EDITION AVAILABLE ON http://goo.gl/ljcXwl


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.