You are on page 1of 3

Guest Column | Col Mandeep Singh (retd)

It’s All in the Network


detect and geolocate forces, identify and classify them as intelligence and machine learning (AI/ML) augmented pro-
friendly or hostile. The sensors are also used to assess the ef- cesses to better inform decisions and accelerate the process,
fectiveness of actions taken, that is battle damage assessment. e.g. all engagements beyond visual range already use comput-
Communications element: It provides the data links that er-assisted decision-making.
Technological advancements have changed face of warfare pass information among systems and operators. The infor- Effects element: The fifth and final element of a battle net-
through battlefield networks but have also introduced mation transmitted can include voice, video, one-way data
broadcasts or two-way data links.
work is where information is turned into effects in the bat-
tlespace. These effects include both kinetic fires, which phys-
vulnerabilities Processing element: This is one of the most critical com- ically damage or destroy adversary forces, and non-kinetic
ponents of a battle network. It is used to analyse, aggregate fires, such as electronic warfare, directed energy weapons or
The single most important activity in war is connecting platforms and systems across domains by seam- and synthesise data from a variety of sensor sources to in- cyberattacks.
command and control. It cannot by itself drive home an attack lessly passing surveillance, targeting, damage assessment, and form decisions. A key discriminator in the processing ele- To function effectively, these elements should have interop-
against the enemy or thwart one that is launched against its other information from one platform to another to improve ment is where the processing occurs: on-board the sensor, erability between all sub-systems, immunity to disruption
own troops. It does not destroy any target, provide supplies the accuracy, range, persistence, and speed of effects. As the in the cloud or at the tactical edge. The platforms that carry with very high redundancy. Only then will the commanders
or carry out a medical evacuation. Yet without command and network integrates more platforms, sensors, communication some sensors may also have sufficient size, weight and power be able to rapidly understand the battlespace, direct their
control none of these or any other military activity will be pos- paths and other nodes, the efficiency increases in a nonlinear (SWAP) to carry the computational components needed to forces faster than the enemy and deliver synchronised com-
sible. Without command and control armies will be reduced manner so that the battlefield network is transformed from a process the data they produce before transmitting it. Cloud- bat effects across all domains to achieve the desired end state.
to mobs carrying out random acts of violence. It is only with force multiplier into a force exponent. The ultimate objective based processing offers the advantage of essentially unlimit-
command and control that commanders can optimise their is to see farther with greater clarity and to act faster with more ed processing and data storage capacity without the SWAP Current Networks
resources so that a military force performs its task in an or- precision than one’s adversary while denying the other side limitations of many platforms. Sensors can transmit raw or The current battlefield networks in service range from the
ganised manner towards a stated goal. the ability to do the same. partially processed information to data centres on the ground India’s project Shakti to Russian battle network. Some of
Command and control is something that commanders do. for final processing and analysis. these are:
It includes, but is not limited to, gathering and analysing in- Five Elements Decision element: This is the most important part of the India: Shakti, a fully digitised, integrated and networked
formation, making decisions, organising resources, planning, The battle network is made up of five functional elements each battle network because it is where information is translated Artillery Combat Command and Control System (ACCCS)
communicating instructions, coordinating, monitoring re- with a combination of personnel, platforms, processes and into action. Where the decision is taken, how it is made, and was the first among the various Combat Command Control
sults and supervising execution. With time and technologi- technology to carry out a given task. Some of the platforms who is involved depends on what types of actions are being and Information (C3I) systems fielded in the Army. It is a net-
cal advances, the instruments of exercising command and and payloads can be part of multiple functional elements si- considered. For the foreseeable future, major decisions such work of military-grade tactical computers automating and
control have evolved and expanded to encompass commu- multaneously. These elements are: as the use of lethal force, will likely involve a human-in-the- providing decision support for all operational aspects of ar-
nications, computers, intelligence, surveillance and recon- Sensor element: The first element comprises the sensors, loop at some level. Human-in-the-loop decision-making can tillery functions from the corps down to the battery level. The
naissance. Within this, battlefield networks are used to detect both active and passive, to collect data. This data is used to still involve many forms of computer-assisted or artificial system is also designed to seamlessly integrate with overall
what is happening on the ground, process that data into ac-
tionable information, decide on a course of action, commu-
nicate decisions among forces, act on those decisions and Battlefield essential
Shakti Artillery Combat
assess the effectiveness of the actions taken. Command and Control System
It is important to understand that this process is sequential (ACCCS) at Army Day Parade
and not conforming to it can lead to lapses and errors with
deadly results. A decision should be taken only after the in-
formation has been processed. Similarly, action should not
precede the decision.

Battlefield Networks
Primarily, a battlefield network is a combination of target
acquisition sensors, target localisation sensors, command
and control (C2) elements, weapons, weapon platforms, and
electronic communications linking them together. Battle net-
works are also referred to as the ‘sensor-to-shooter kill chain,’
or just the ‘kill chain.’
This system, or the network, is not a new phenomenon
though the components of the same have changed over time.
While scouts and couriers were used earlier, satellites, drones
and aircraft do the task of reconnaissance now. Similarly,
semaphore flags, telegraph and field telephones have large-
ly been replaced by more modern communication systems.
The new systems have given the capabilities to look and strike
deeper but this capability, coupled with speed and ubiquity of
communications, means that there is an exponential increase
in the amount of information being generated by sensors that
needs to be processed in time before arriving at a decision.
This puts a lot of pressure both on the network and the com-
mander, and poses some major challenges.

Better Options
The objective of a battlefield network is to enable better op-
tions for commanders, speed up the decision making process
and optimise effects in the battlespace. This is achieved by

12 FORCE | July 2023 FORCE | July 2023 13


Guest Column | Col Mandeep Singh (retd)
C3I grid. The other systems are the air defence control and re- such a concept, the Chinese have been developing an integrat- environment. The US also has the Terrestrial Layer System,
porting system, battlefield surveillance system and battlefield ed ‘system confrontation’ approach to operations since 2005 which is intended to network a range of sensors—including
management system. that is akin to but broader than US network-centric warfare. intelligence agency sensors—to enable precision kinetic, elec-
Russia: Since initiating the reform of the Russian Armed The PLA’s aim for creating an informatised force is to build tronic and cyberattacks. One system that it started operation-
Forces in 2008, Moscow has developed a limited network-cen- a system of systems that can coordinate activities across the alising is the Integrated Battle Command System (IBCS). It
tric warfare capability that was tried out first in Syria. It plac- military and inside and between military theatres, arms, and was initially planned to be used against regional ballistic mis-
es emphasis on force enablers and force multipliers like the services. The central warfighting system in this concept is sile threats but has now a wider role of integrating a broader
electronic warfare (EW) capacity and a unified reconnais- the operational system, a linkage of organisations, function- array of sensors and shooters to counter cruise missiles and
sance and intelligence capability. Russia had created a unified al processes and networks enabling integrated joint service unmanned aircraft threat as well.
command-and-control (C2) structure as part of the National warfighting across all domains. The operational system is
Defence Management Center (Natsionalnomu Tsentru Upra- made up of five component systems: the command system, Severe Limitations
vleniya Oboronoy—NTsUO) in Moscow that lies at the heart firepower strike system, information confrontation system, Most of the current battlefield networks have severe opera-
of Russia’s network-centric capability. reconnaissance-intelligence system, and support system. tional limitations. Designed for military operations of yore,
The NTsUO acts as an information hub, facilitating all mil- Within this, the Network Systems Department of PLA Stra- they are not optimised for speed, complexity and lethality
itary operations in real time, managing all military subunits tegic Support Forces (SSF) is a theatre command-level orga- of future conflicts. The networks have limitation in terms
in the Russian Armed Forces, including the nuclear triad. It nization responsible for information warfare with a mission of range and complexity of sensors as the decades-old plat-
unites the various automated C2 systems functioning across set that includes cyberwarfare, technical reconnaissance, forms cannot adequately leverage new technology even cur-
the Armed Forces. Consequently, the NTsUO includes three electronic warfare, and psychological warfare. rently available.
command-and-control centres uniting the various automat- China is now moving towards ‘intelligentised’ approach Lack of interoperability between various systems is a ma-
ed C2 systems: the Strategic Nuclear Forces Command and to warfare away from its ‘informationised’ approach to war- jor limitation as services specific networks rarely have the
Control Centre, the Battle Management Centre and a Centre fare by harnessing emerging technologies such as artificial ability to communicate with each other. Another limitation
for Management of Day-to-Day Activities. Despite the im- intelligence, cloud computing, big-data analytics, quantum of the current battlefield networks is that it either does not
pressive structure, the Russian network has serious limita- information and unmanned systems that will enable her to have the supporting structures to enable future C2 or they
tions especially in the use of military communications and carry out faster processing and the fusing of information for require maturation.
reconnaissance satellites as has been experienced in the Rus- quicker decision-making and command-and-control efforts
so-Ukraine conflict. to support future combat operations. Next Gen Networks
China: China perceives modern military conflict as a con- United States: The battlefield networks include the Ad- The battlefield networks that can meet the needs of the fu-
frontation between opposing operational systems that is vanced Battle Management System (ABMS) of the United ture force have been enabled largely by technological ad- A2/AD environment
waged not only in the traditional physical domains of land, States Air Force, which started out as a replacement for the vances that have taken place in recent decades. It is a point The battlefield network should be able to securely and reli-
sea and air but also in outer space and the nonphysical cog- E-8C Joint Surveillance Target Attack Radar System (JSTARS) of interest that these advancements have been driven in part ably connect sensors to shooters and support command and
nitive, cyberspace, and electromagnetic domains. To execute aircraft and has evolved into a secure, military digital network by commercial developments: lighter, cheaper and higher control in a lethal, electronic warfare-rich environment. The
fidelity sensors; increases in data throughput capacity and battlefield network itself will be a prime target for the enemy
coverage from cellular, fibre, and satellite communications hence it should not only have immunity against soft kill but
tech risk Networking is
essential for operational
networks; massive cloud computing and data storage cen- also the required redundancy against hard kill weapons as
efficiency tres; and big data analytics, machine learning (ML), and ar- well. Also, the network should have the requisite technical
tificial intelligence (AI) systems. maturity and affordability to be able to function in the future
The application of these commercial technologies to mili- operating environment.
tary battle networks has manifested itself in whole or in part However, the biggest challenge is the military’s continued
in many different concepts, initiatives, strategies and buzz- focus on platforms and not the network. Most of the focus re-
words over the years. This long line of thinking includes the mains on acquiring newer platforms that are visible and offer
Revolution in Military Affairs and what the Soviet’s termed better optics than a network subsystem mounted on a truck.
the Long-Range Reconnaissance-Strike Complex in the 1980s
and 1990s; the Transformation Initiative, Network-Centric Recent Developments
Warfare, and the Third Offset Strategy of the 2010s (to name Russia has had the opportunity to battle test its networks,
a few examples). Realising the importance of harnessing the first in Syria and more recently during the ongoing conflict
civil technological advancements, China has formalised the with Ukraine. There are reports that Russia has refined its
process with its Military-Civil Fusion (MCF) Development Strelets-M Integrated Command and Communication System
Strategy to ensure more effective flow of dual-use technolog- (ICCS) and the Andromeda-D battlefield management sys-
ical innovation into the defence sector. One key area where tems. These networking systems allow drone operators and
such a technology is proposed to be used is the development other soldiers to input enemy positions and targets on a digital
of the battlefield network. map, facilitating fighter aircraft, kamikaze drones, or artillery
with guided shells to engage the targets with minimal delay.
Gathering Information Due to these improvements, Russia has been able to short-
Starting from the first stage, gathering of information and ac- en the sensor-to-shooter kill chain and is largely succeeding
cess to data so collected is the first criticality. The information in detecting Ukrainian attempts to its defensive lines well in
should not be corrupted and the network should have the ca- time and frustrating the attempts to a great extent through
pability to speedily process the intelligence data collected to the use of affordable and yet effective fire strikes using drones
translate it into actionable information. and guided artillery shells. Some of battlefield networks being
As the battlefield network will incorporate both new and developed and fielded by other countries are discussed below.
legacy systems, it should ensure interoperability not only India: The Indian army is working on a number of key proj-
between the sub-systems but also between the networks of ects to enhance battlefield situational awareness within the
different services. For instance, the air force network should framework of network-centric warfare. These projects include
be able to communicate and exchange information with the Project Sanjay, the new battlefield surveillance system that
army’s networks, especially of the air defence. aims to provide an integrated surveillance picture to com-

14 FORCE | July 2023 FORCE | July 2023 15


Guest Column | Col Mandeep Singh (retd)
manders and staff at all levels by integrating a large number space, and relies on interlinked command and control, com- air defence system to the use of drones and electronic warfare This is best illustrated by looking at some prominent net-
of sensors and creating number of surveillance centres for the munications, computers, intelligence, surveillance and re- systems in the Russia-Ukraine conflict, battle network com- work failures in recent times, from the shooting down of an
field formations. The project has already undergone field trials. connaissance to quickly coordinate firepower and expose for- petitions have always existed. In this battle of operating sys- Indian Air Force helicopter by friendly fire in 2019 to the fail-
The other project is upgradation of the artillery combat eign weaknesses. It is important to note that the PLA refers to tems and networks, the adversary networks themselves have ure of the Russian C2 system in the initial phase of the conflict
command and control system (ACCCS) with highly accurate “systems destruction warfare” as the next way to conduct war become the prime target. with Ukraine. Though Russia had invested heavily in upgrad-
defence series maps, its integration with Project Sanjay will as warfare is no longer solely focused on the destruction of The laned MDPW of China is a prime example of battle- ing its C2 capabilities and had even tested its networks in Syr-
complete the sensor-shooter grid. Project E-Sitrep Situation- enemy forces; rather, it is aims to disrupt, cripple or outright field networks being developed to counter and degrade the ia, the Russian military was plagued by poor intelligence and
al Reporting Over Enterprise-Class GIS Platform (E-Sitrep) destroy the other’s underlying networks and infrastructure. adversaries’ network(s). This is an important aspect to bear reconnaissance capabilities in the early months.
will take care of all operational correspondences in the army. in mind as the battlefield networks will not only need to com- For example, during the counteroffensive in Kharkiv, the
These projects will be integrated to provide inputs to the new Threats to Networks pete against a hostile network but will be expected to still be Russian military often lost track of Ukrainian brigade elements,
situational awareness module for the army (SAMA). Intelligence gathering is a fine art. It goes beyond UAVs send- able to function effectively. leading to the successful Ukrainian rout of Russian forces in
SAMA is a decision support mechanism that is designed to ing back images to real and perceived targets. This aspect is the region. Moreover, each Combined Arms Army operated
present a comprehensive battlefield picture to commanders important as almost all militaries across the globe are smitten Artificial Intelligence independently through its axes of advance, with little over-
at all levels. The aim of all these projects is to enable improved with livestreaming i.e. live feeds being provided from the battle While battlefield networks, particularly the air defence net- all coordination. Russia faced major communications issues
battlefield surveillance, faster decision making and appropri- zone and being used to make decisions. works, already making use of artificial intelligence (AI) and with even the Strelets reconnaissance, command-and-con-
ate weapon response using automated means and technology The belief that the image is the reality is a dangerous one Machine Learning trol, and communi-
to meet future challenges. with serious consequences as livestreaming has a very real (ML) to a limited ex- cations system being
United States: Taking a different route, the US is develop- tendency of affecting perceptions and negatively influencing tent, the use of AI/ targeted and disrupt-
ing an overreaching system called the Joint All Domain Com- decision-making. It has also led to an overreliance on UAVs ML in battlefield net- ed early in the inva-
mand and Control (JADC2). This is in consonance with the and livestreaming at the cost of other assets. Unless checked, works will increase sion. The loss of over
transformation under way as the US prepares to fight near- this can lead to changes in operational behaviour to satisfy significantly in the 200 command posts
peer adversaries in multidomain operations. the hunger for pictures – at the cost of achieving real objec- years to come. AI/ML and communication
The JADC2 aims to connect sensors from all military ser- tives. The battlefield networks should be so designed that applications across stations only added
vices into a single network wherein a cloud-like environment undue credence is not given to imagery at the cost of other the systems will al- to the chaos and con-
is provided for the joint force to share intelligence, surveil- inputs. low for integration fusion.
lance and reconnaissance data, transmitting across many The efficacy of any weapon or support system is directly of larger number of
communications networks to enable faster decision making. dependent on the degree of integration into the battlefield sensors using robust Technological
The JADC2 intends to enable commanders to make better de- network. Care should be taken to ensure that the degree of in- communication paths Dangers
cisions by collecting data from numerous sensors, processing tegration is optimal for all systems and sub-systems and it is to synthesise and pro- It is often said that
the data using artificial intelligence algorithms to identify not done in a haphazard or patchy manner thereby degrading cess data into action- the nature of warfare
targets, then recommending the optimal weapon—both ki- the potential of the weapon (or support) system. able information at has changed and re-
netic and non-kinetic (e.g., cyber or electronic weapons)—to machine speed. This cent technological
engage the target. Network Competition in effect will create advancements have
China: The Chinese People’s Liberation Army (PLA) is de- With advances in communications and computer technolo- improved capabilities made the present day
veloping its own battlefield network that is proposed to be a gies, the benefits associated with networking military systems in information detec- and future wars much
multi-domain network that can support its new operational have also increased at an affordable cost. But it has also in- tion, identification different from the
concept called Multi-Domain Precision Warfare (MDPW) and creased the competition and conflict between capable, com- and synthesis across conflicts of the past.
also have the capability to disrupt, cripple or outright destroy petent adversaries. As competencies increase, so do the threat multiple domains. Most of the scholars use the phrase “paradigm shift in the na-
an adversary’s underlying networks and infrastructure, spe- from adversary networks. From indirect artillery fire tech- The capability of AI to processes vast amounts of informa- ture and spectrum of war” while discussing these changes and
cifically the US JADC2 initiative. niques first developed in the late nineteenth century to the tion faster and more accurately is just one of the advantag- tend to focus on technology leading these changes as modern
The MDPW aims to align all PLA forces, from cyber to duel between the US Air Force and the Vietnamese integrated es of using AI in battlefield networks. It can ingest, process armies look deeper, process almost unlimited amount of data
and synthesise vastly more information at superhuman speed and strike farther than ever before. But these changes are not
Graphic Imagery Thales depicts operationalisation of its Deployable Tactical Internet (DI@NE) for brigade and above; and Mobile
Tactical Internet (M@TIS) based on heterogeneous radio networks for battalion and below
while also predicting the outcomes of a potential course of without their dangers, namely the overreliance on technology
action and evaluate environmental or adversarial variables on the one hand and the failure to fully exploit the latest capa-
that would be beyond human capacity to assess. Through its bilities on the other.
prediction capabilities, AI can identify and continue tracking An overreaching battlefield network that links all enti-
a high-value target even when the target disappears from the ties, provides limitless real-time information and images of
line of sight. It can proactively mobilise kill platforms and car- far and beyond with multiple options being generated by AI
ry out dynamic re-tasking of platforms. driven sub-systems and weapon systems taking on real (and
AI has the ability to find connections between disparate perceived) hostiles, like the Skynet of Terminator series may
pieces of information and by collating data across domains be desirable and attainable, but unless it is managed and
and services into a single place, it makes information more controlled with the required human intervention, it may well
discoverable for swifter and sharper decisions. It has an add- become the nemesis. The battlefield networks thus need to
ed advantage that it can see ahead of the battlespace, giving be designed and developed with due care so that they are the
commanders a cursory understanding of the environment solution rather than a part of the problem.
beyond current capabilities and the ability to respond proac- It also needs to be remembered that technology alone will
tively rather than reactively. never be able to solve all the problems of command and con-
trol as an advancement is often accompanied with unexpect-
Limitations Exposed ed complications and side effects or by the inevitable rise
The technological advances and new-gen battlefield networks of effective countermeasures. It is true for all technological
being tested across the globe seem to offer new capabilities advances. And it is true for battlefield networks. The need is
to militaries but it is important to note that not all capabili- thus to be ready for the changes and advancements by being
ties publicised or assessed translate into actual performance ahead of the curve for only those who harness and exploit
in battle. these changes will survive in the future battlespace.;

16 FORCE | July 2023 FORCE | July 2023 17

You might also like