Military Review

In the US, work is underway on the "tactical" Internet


US military researchers have tested the possibility of progressive forces in remote locations the opportunity to communicate with each other using the "local, tactical internet."

The Defense Advanced Research Projects Agency (DARPA) of the United States Department of Defense Research calls this technology Mobile Content Based Mobile Edge Networking (CBMEN) technology.

“Ground forces or Marine Corps (ILC) units in remote front-line positions often do not have the ability to quickly exchange intelligence information and images on mobile devices because they do not have access to a central server,” the DARPA said in a statement. networks tend to be controlled from the top down.

DARPA intends to develop a network that works, on the contrary, according to the “bottom-up” principle, which will allow soldiers on the battlefield to contact and exchange data on their mobile device, turning it into their own server.

The agency calls this concept "reliable front-line remote data storage."

The main advantage of the “ascending network”, according to DARPA, is the following: “if the radio or cell phone of the fighters is disconnected from the headquarters server, they, however, can independently reproduce and exchange important data, significantly improving their situational awareness and ability to perform the set task. "

CBMEN technology would allow troops on the battlefield to exchange data such as photos of local leaders or biometrics of suspects.

According to DARPA, CBMEN software has already been tested in field conditions at the Fort HP Hill facility (Fort AP Hill - US military test base in Virginia) using humanoid robots and smartphones, as well as a promising individual handheld radio device Rifleman Radio.

During the next phase of testing, which begins this month, it is planned to demonstrate the capabilities of the new technology to provide “improved support for the task at the theater of operations in the context of a comprehensive joint information exchange between the CMP networks and the US Army using military radio devices and commercial smartphones.
Dear reader, to leave comments on the publication, you must to register.

I have an account? Sign in

  1. zart_arn
    zart_arn 12 September 2013 11: 11
    "Whoever is aware is armed." Almost everything depends on the speed and accuracy of obtaining information on the battlefield.
    1. GreatRussia
      GreatRussia 12 September 2013 11: 30
      Quote: 787nkx
      There must be a very closed, encrypted network.

      Yeah. Otherwise, you can get something like:

      For many years, security researchers have been warning of the vulnerability of navigation and communications systems of modern aircraft. Protection methods are often weak or absent. White hackers demonstrate how to capture radio communications in the air-ground section and even how to make "ghosts" of airplanes that appear on air traffic control systems.

      On April 10, at the Hack In The Box conference in Amsterdam, Spanish explorer Hugo Teso took the game to the next level: he showed how an Android smartphone app can take control and control commercial aircraft in flight. “You can use this system to change everything related to aircraft navigation,” said Teso in a telephone interview with Andy Greenberg, representative of Forbes magazine.

      U Teso, who holds a private jet pilot license, showed flaws in security systems in the 35-year-old air-ground communication standard called the Address-Reporting Aviation Communications System, or ACARS. Slides of his presentation are posted on the Internet.

      ACARS is used to transfer large amounts of information between aircraft and control rooms, including navigation data used by the aircraft flight control system (CMS).

      Modern flight control systems are computerized modules that are in the cockpit with many other system units; The latest flight control systems are so sophisticated that many aircraft no longer need navigators.

      Despite all its advancement, the SOUs do not check the data that they receive through ACARS from the control centers. “The Address and Reporting Aviation Communications System (ACARS) is not at all safe. Pilots have no way to check whether the messages received are true or not, ”said Teso Greenberg. “You can use them to download aircraft data, which will result in a low degree of security. And then the game is over. "

      Experimenting with the SOU modules that he purchased on the eBay website, Teso developed the malicious pieces of software (he called them SIMON) that actually took control of the SOU software. Teso was able to create an application that he called PlaneSploit.

      PlaneSploit can import data from the famous FlightRadar24 app to search for flights in the radio range, and then use ACARS to load SIMON for a specific airplane flight control system.

      As soon as SIMON gets on board, PlaneSploit can control the aircraft remotely. Teso even created the accelerometer function in such a way that tilting the smartphone can bring the plane to the same position.

  2. 787nkx
    787nkx 12 September 2013 11: 20
    There must be a very closed, encrypted network.
  3. Ragnarek
    Ragnarek 12 September 2013 11: 26
    fun. Is it interesting for our people? that's what you can’t refuse - it’s technological
    1. 787nkx
      787nkx 12 September 2013 11: 46
      It is with this concept that the soldier-soldier-commander network is not present.
    2. mogus
      mogus 12 September 2013 12: 18
      According to the principle of cellular communication. Transceiver on a six-copter. While single and it is not known when in life recourse
  4. Valery Neonov
    Valery Neonov 12 September 2013 11: 32
    Quote: Ragnarek
    that's what you can’t refuse - it’s technological

    You can’t argue with that .. recourse and they don’t know how to fight one vegetablewink!
  5. Altona
    Altona 12 September 2013 11: 45
    If there is an exchange of tactical data that within a small amount of time (no more than an hour) can radically change the situation, then might strong encryption not be required? How does all this work in EW conditions and in terrain folds? At what distance from each other can such an exchange take place? And how do fathers-commanders work out such a stream of information from every soldier’s smartphone?
    1. wax
      wax 12 September 2013 12: 09
      The main thing is not to play too much, and then all these devices will exchange info by themselves.
      1. BARKAS
        BARKAS 12 September 2013 13: 24
        Quote: Altona
        then maybe strong encryption is not required?

        Americans often fabricate information about the course of hostilities in order to present their military men in a favorable light for the public, and information leakage is not acceptable for them even in the future!
    2. roma2
      roma2 12 September 2013 13: 45
      Encryption should always be, it’s another matter that for a tactical level, encryption strength is simpler (does not exceed several days), such encryptors are executed as a single microprocessor assembly and do not take up much space.

      The exchange range depends on what information will be transmitted, if the location coordinates, short codograms (SMS), then standard VHF radio stations (transmission speed in the VHF range up to 16 kbit / s), the distance between a portable and a stationary (car) radio station when climbing antennas to a height of 11 meters, on medium-rugged terrain is up to 18 km.

      Resistance to REB means depends on the operating modes of radio stations (noise-resistant coding, frequency hopping, etc.)
    3. IGS
      IGS 12 September 2013 14: 55
      On the subject:

      "The new network is being developed as part of the DARPA 100 Gb / s RF Backbone (100G) program to create a wireless alternative to fiber-optic networks. On the battlefield, it is impossible to provide reliable wireless communication between mobile ground units and even more so aircraft. Therefore, DARPA initiated the development of a new wireless network. Generation: ultra-secure with new algorithms and providing high data rates Applied Communication Sciences will develop a spatial multiplexed modulation network that will achieve spectral efficiency of more than 20 bits per hertz per second and can provide data rates of 100 Gb / s. 100G will be able to provide the maximum data transfer rate between air platforms at an altitude of 18 km and a distance of 200 km, as well as at a distance of 100 km between ground forces.

      The first phase of the DARPA program will develop new low-power millimeter wave modulation and transmit / receive technologies. Applied "Communication Sciences will then manufacture a prototype of 100G network devices. The prototypes of the transceivers will be installed on airplanes and stationary ground objects, which will allow testing the new wireless network in conditions close to real combat.

      DARPA officials emphasize that several contracts are planned to be signed under the 100G project: about $ 18,3 million will be spent on the first phase of the project alone. "
  6. Starover_Z
    Starover_Z 12 September 2013 11: 50
    Yes, another factor is the recharging of communication devices of a tactical link, especially during a clash. Everyone already knows that with weak signals, at least mobile phones begin to increase their signal level in order to maintain high-quality communication and the battery begins to be consumed intensively.
    And where in the trenches to recharge, or among the city ruins, just during the battle, when communication is urgently needed?
  7. erased
    erased 12 September 2013 12: 04
    Well done Americans, create technologists, build systems. There would be an example to take from them. One trouble - in the case of a b-alsha war, the use of nuclear weapons and special means of suppression, all electronics will turn around in a copper basin. And command and control will return to the beginning of the last century - messengers, signals, telegraph.
    So apparently amers exclude such a war. Znatsya is preparing an operation for the "non-military" conquest of Russia. The fifth, sixth and seventh columns within the country will help them. That is, bureaucrats of various levels, including army and police, bought with giblets; bandits, terrorists and militants of all stripes (Caucasus and neighboring regions); supporters of the West from among the liberals, tolerasts and others.
    So it turns out that in addition to restoring the army, military-industrial complex and scientific and industrial potential from the ashes, these columns need to be neutralized urgently. Otherwise, the pipe business.
  8. Nitarius
    Nitarius 12 September 2013 12: 24
    Ours have long had to work ABOUT SUCH!
    Amers tanks Abrams on the battlefield have their own network.
    Ours has long had to think about it! and the faster the better. Let’s not control your weapons from a distance, namely data transfer.
  9. vladsolo56
    vladsolo56 12 September 2013 12: 32
    Another cut of money, dubious military benefits of such a novelty
  10. Alexey M
    Alexey M 12 September 2013 13: 05
    The network on the battlefield is a good thing. When a platoon leader sees with his platoon’s eyes, and a company commander sees with his platoon’s eyes and upward. When data is exchanged continuously, including video, this is only a plus. The only question is how to work in the reality will be.
    And on the other hand, let a counter-strike be downloaded into the network and play war games, and we will be calmer.
  11. 787nkx
    787nkx 12 September 2013 13: 24
    Posted by Evgeny Shtepan

    In the near future, Russian special services will be able to acquire their own communications system. The implementation of this project is expected to be carried out by the Center for Information Technologies and Systems of Executive Authorities. The draft law on the creation of an “integrated communications network” is currently being approved by the relevant departments and organizations.

    The need to create Russia's own special communications system is due to the fact that the existing methods of information exchange do not provide complete secrecy and security against external intrusion. Currently, the secret services, as well as the military and law enforcement agencies have their own closed cellular and e-mail systems. However, for interdepartmental and other external interaction, the security forces use the communication networks of civilian operators (MegaFon, Rostelecom, and others). Moreover, even government and presidential services exchange information, including through servers located in the United States.

    This state of affairs does not suit security officials who have long warned of the vulnerability of the existing communications system. In recent years, the Ministry of Defense several times raised the issue of creating an ISS, but this initiative was considered difficult to implement. For example, in 2009, several options were proposed for creating a communications network for power services, which were not implemented partly due to lack of funding, partly because of the need to involve civilian operators.

    A new round of special services activity gives hope for the creation of a common special communications system, since the design of such a system was approved by V.V. Putin and sent for approval to the relevant departments. Tentatively, the design and construction of the network will be carried out by CITIT, and the management and operation of Rossvyaz. If a positive decision is made, the financing of work will be carried out from the federal budget, the adjustment of which is provided for by the draft FSB.

    At the same time, the creation of our own special communications system does not guarantee complete security when exchanging information. This is evidenced by the experience of operating the American SIPRNET network, which connects the US State Department, the White House, the Pentagon and other law enforcement agencies. With the highest degree of protection against cyberattacks, the internal communication system could not save the United States from the human factor - analyst Bradley Manning simply transferred 600 thousand secret files to the WikiLeaks portal.

    Will Russia be insured against the appearance of its Manning?
  12. roma2
    roma2 12 September 2013 13: 26
    Quote: Starover_Z
    And where in the trenches to recharge, or among the city ruins, just during the battle, when communication is urgently needed?

    Solar battery chargers available

    So dynamo cars
  13. Bort radist
    Bort radist 12 September 2013 13: 26
    Sharing information on the battlefield is good, but all should be its. A virus in such a network, channels available to the enemy, death are similar.
  14. Kovrovsky
    Kovrovsky 12 September 2013 14: 23
    Quote: Starover_Z
    Yes, another factor is the recharging of communication devices of a tactical link, especially during a clash. Everyone already knows that with weak signals, at least mobile phones begin to increase their signal level in order to maintain high-quality communication and the battery begins to be consumed intensively.
    And where in the trenches to recharge, or among the city ruins, just during the battle, when communication is urgently needed?

    The technology will be taken from Philips. They have mobile phones for a month without recharging! wink
  15. saag
    saag 12 September 2013 14: 26
    and probably the binary number system and the same TCP / IP stack?
  16. 787nkx
    787nkx 12 September 2013 14: 56
    General-purpose network protocols will not be unambiguously applied here. And most likely the local network will be with the implementation of an external gateway through the commander's walkie-talkie.
  17. starhina01
    starhina01 12 September 2013 14: 57
    good idea good but many pros and cons request worth considering what
  18. saag
    saag 12 September 2013 15: 13
    Quote: 787nkx
    And most likely the local network will be with the implementation of an external gateway through the commander's walkie-talkie.

    This will be a bottleneck, the commander's radio dies and that's it, no connection, in my opinion there should be its own military network that does not intersect with civilian communication lines and is not systemically compatible with them, connection on the principle of "each with each
    1. IGS
      IGS 12 September 2013 18: 46
      It will be analogous to the P2P architecture. Any walkie-talkie will be able to take over the function of the commander in case of its failure. (The same as "skype")
  19. KAZAK67
    KAZAK67 12 September 2013 15: 25
    damn how kids
  20. darksoul
    darksoul 12 September 2013 15: 53
    Quote: zart_arn
    "Whoever is aware is armed." Almost everything depends on the speed and accuracy of obtaining information on the battlefield.

    only if this channel is reliable, stable and properly protected, otherwise it will either not be useful or will work against them
  21. Altona
    Altona 12 September 2013 17: 53
    Now such moments are interesting: The soldier played at his leisure after dinner in Angry Birds on his smartphone, or decided to play porn, and then the adversaries flew bang-bang, hammering mortars along the front edge and what should the soldier do? And then the smartphone hung or glitched? So the soldier squeezed into the trench or overloaded the gadget?)) And the second point - but the adversaries of the "invincible" American military with all their devices were seized and I doubt that the "invincible" will not tell you how to use it all ...
    1. clidon
      clidon 12 September 2013 20: 25
      “The soldier got into the tank, and then the enemies were crawling, and the tank broke?” The ax is simpler and more reliable.
      - The vorogs captured the communication center and let the signalmen torment them so that they could tell how to use them. Communication is accordingly better by couriers on horseback or on the run. With an ax.
  22. Altona
    Altona 12 September 2013 21: 16
    An ax is definitely more reliable ... And you can also reliably light yourself up with smartphone radiation, and you can tie yourself up topographically, and even indicate the number of units by the radiation power and network activity ... Although the communication is of course the first thing, he himself served as a signalman ... And of course, digital communication ... Even Marshal Budyonny is credited with the phrase "The Red Army is strong, but communication will destroy it" ...
    1. clidon
      clidon 12 September 2013 22: 12
      You yourself answered everything - if you want superiority over the enemy, use modern means, including communications.
      1. Altona
        Altona 13 September 2013 08: 52
        I just think that such opportunities are redundant directly on the battlefield, that with regard to communication centers, they are not on the front line and it is pointless to torture communications workers (when the equipment is destroyed) ... As for the "friend or foe" radio tags, they are already in modern uniforms , is there an extra gadget as an understudy or what? Will photos from a smartphone's piped camera have operational value? Probably there will be, but just as a photo report about something (room configurations, a photo of another defeated bin laden) ... Oh, yes, the smartphone also has google maps and navigators (while the battery is working) ... Well, given that modern wars are low-contact , it makes sense for amer to just load another porno into your device ... And just in case, take with you an ordinary analog radio station ... You never know?)))
        1. clidon
          clidon 13 September 2013 16: 34
          Once radio stations were considered redundant, it was quite possible to get by with reliable and tested flags that would not fail. The army will be rapidly saturated with electronics, and as practice shows, it is not in vain.
          If you have a navigator, you get where you need to, the electronic card instantly brings data from the UAV, and through the interface it will be possible to direct support to the targets directly. But the batteries and passwords encryption will bring to mind. As brought to mind the radio stations with the callsigns.
  23. Jogan-xnumx
    Jogan-xnumx 13 September 2013 01: 15
    I read a bike on the Internet on the topic: how to make an American soldier incapable. Answer: just steal a roll of toilet paper from him. lol And what will happen if the smartphone, or what else is there like a similar-communicator, does it have a glitch? what
  24. Letnab
    Letnab 13 September 2013 06: 54
    to create such a network, you need a thread device that combines both a radio station and a personal tablet for fighters in their properties .. But at the same time, the unit commander will need a fighter as a carrier of server-type equipment (+ radio station), since he himself will not take everything away , and a self-propelled cart with equipment will not always be near.