UNITED24 - Make a charitable donation in support of Ukraine!

Military

CHAPTER 2

COMMUNICATIONS


TOPIC: Frequency Management.

DISCUSSION: The current automated frequency management and engineering capabilities are inadequate to support the fast-paced tactical environment of Command, Control, Communications and Intelligence (C3I) equipment on the electronic battlefield. During major joint military operations, such as Operation DESERT SHIELD, radio frequency (RF) requirements quickly exceed the available frequency resource. The proliferation of RFC31 equipment, deployed on the battlefield, has created a potential situation for acute interference between mission critical C31 systems. Without the proper automated management and engineering tools used at the appropriate echelons of command, compatible battlefield frequency management cannot happen.

Frequency managers at the various echelons of command do not have the proper automated tools to manage their frequency resource or provide engineering support.

No capability exists to electronically transfer mission-essential frequency assignment data between echelons of command and service components.

Those few units with automated engineering tools were able to quickly engineer noninterfering RF systems, whereas the units without such tools could not.

LESSON(S): An automated capability is needed at the joint level which will subdivide the tactical frequency bands porportional to the service components' requirements. The Army needs a similar capability when deploying a multicorps force.

A capability is needed to electronically distribute frequency assignment data between echelons of command. The data transfer must be interoperable with existing service components' automated frequency engineering systems.

Automated frequency engineering tools are needed at corps and division echelons.

TOPIC: Intelligence Operations.

DISCUSSION: The communications architecture that supports intelligence operations is inadequate. Many tactical commanders' requirements for timely, detailed intelligence for planning and executing operations exceeded intelligence capabilities. Prior to G-Day, the U.S. Army component of USCENTCOM (ARCENT) and corps established communications, computer, and imagery links down to several divisions. Corps and several divisions received TROJAN Special Purpose-Integrated Remote Intelligence Terminal (SPIRIT) for secure Satellite Communications (SATCOM) (voice, data, fax) and Tactical Exploitation of National Capabilities (TENCAP) Tactical High-Mobility Terminals (THMT) and other Secondary Imagery Dissemination Systems (SID Ss) to receive intelligence data and products.

These systems had significant fielding and integration challenges. There were insufficient numbers of systems to provide each echelon with a dissemination capability. No brigade or below received a system. Furthermore, the systems did not provide adequate quality or quantities of hard-copy photos to satisfy commanders, necessitating reliance on couriers.

Once the ground war started, some commanders perceived that intelligence products from their higher headquarters became less frequent. They attributed this in part to communications problems. Retransmission assets and tactical satellite (TACSAT) lines were limited. The fast pace of the ground war and great distances between units caused problems in maintaining communications. Frequency modulation (FM) radio systems simply could not cover the distances between command posts, particularly while on the move. Consequently, intelligence updates were sporadic and seldom timely.

A robust communications architecture (equipment and personnel) must be deployed early to support the heavy message and data flow of intelligence information to and within a theater of operations.

Problems existed in the following areas:

- Connectivity from the Continental United States (CONUS) to theater.
- Connectivity within the theater among intelligence units.
- Connectivity within the theater to its fighting units (most important link).

LESSON(S): The Army must ensure adequate circuitry and communications security between echelons of command, both joint and combined, thereby enhancing the rapid dissemination of intelligence information.

TOPIC: Joint Intelligence Information Exchange.

DISCUSSION: Doctrine does not adequately address intelligence information exchange in joint and/or combined organizations. Operations orders sometimes do not clarify priorities or command relationships among joint intelligences (J2s). Intelligence collection units must understand their taskings and understand which J2 or G2s have priority of collection effort. The assumption should be made that a Joint Intelligence Task Force must be formed early to pull together the intelligence picture. Contingency plans (CONPLANs) and operation plans (OPLANs) should address this matter and modify intelligence structures to make implementation easy. Clarity of intelligence C2 is critical to the effectiveness of this task force. The Joint Intelligence Task Force must pull together the collection and production activities of the following:

- Service tactical assets.
- Theater tactical and strategic assets.
- National assets for tactical strategic use.
This is a difficult task. It involves hundreds of pieces of equipment and units and requires extensive manpower and equipment augmentation to be effective.

LESSON(S): In joint and combined operations, there must be a central command to pull together and maintain an accurate, up-to-date intelligence picture.

TOPIC: Data-Link Architecture Employment.

DISCUSSION: The data-link architecture was theoretically sound, but not always tactically sound. For example, Class I Joint Tactical Information Distribution System (JTIDS) terminals, using the Interim JTIDS Message Specification (IJMS) for jam-resistant data communications, were minimally employed by capable units. Although all participants in the interface were not capable of IJMS operations and others were in the process of obtaining an IJMS capability, the initial capability to exercise this very important option existed, but had not been adequately exploited. The plan to implement the IJMS option in the "D-DAY" configuration with available equipment had been discussed, but basically had not progressed beyond the discussion stage. As more required equipment arrived in-theater, it was introduced into the architecture piecemeal without an overall plan. Communications limitations (primarily high frequency (HF)) for data link and voice between ground and seaborne platforms and airborne platforms were degraded by atmospheric conditions, physical location of surface elements and a host of other factors. The automatic radio relay equipment (AUTOCAT) capability was expedited for Operation DESERT STORM and was used as a radio relay (U.S. Air Force EC-130 aircraft (VOLANT SOLO), Royal Saudi Air Force (RSAF) KE-3, RSAF E-3) when required. Although an interface plan may meet the necessary technical requirements and "should work," there are many factors outside the theoretical limits of equipment that impact the architecture. Taken separately, these factors may have minimal impact, but, in combination, they detract significantly from link performance of communications capabilities, equipment limitations, and threat assessment. Sound, in-depth planning and control by the Interface Control Unit (ICU) are absolutely imperative and should be continually provided as the interface evolves and matures.

LESSON(S): Jam-resistant data-link operations must be exploited whenever possible. Planning must be conducted to rapidly and effectively integrate additional equipment into the architecture. Also, reconfiguration and relocation of ground communications and antenna systems must be explored to `improve reliability of data and voice communications between surface and airborne platforms. Finally, the radio relay (AUTOCAT) capability must be more fully exploited.

TOPIC: Communications Plan.

DISCUSSION: The communications plan as published in Operation DESERT SHIELD monthly special instructions (SPINs) was comprehensive, yet contained potential conflicts between data and voice frequencies and was extremely cumbersome to use. The entire communications plan was contained in the Operation DESERT SHIELD SPINs, but users had to leaf through or reference several pages to correlate required information, i.e., frequency, TADIL code, use, etc. Again, the information was there, but needed to be reorganized in an easier to use format to eliminate confusion by the user. Voice and data frequencies were basically deconflicted, but without considerable time-consuming research through the communications plan, users could select frequencies that did conflict, increasing the potential for system degradation and equipment failure. LESSON(S): The communications plan needs to be reorganized with input from the user and concentration on user friendliness.

TOPIC: Range Extension.

DISCUSSION: Range extension communications assets in the division and corps are inadequate. The ranges/distances covered and the speed of movement reinforces the AirLand Operations requirements for range extension and the ability to perform C2 on the move. Extensive use was made of multichannel satellite, single-channel satellite, single-channel HF, and multichannel Tropospheric Scatter Path (TROPO) systems. These assets were over and above what the tables of organization and equipment (TOEs) for division and corps now have. Also, the mobile subscriber equipment (MSE) system mounted on High-Mobility Multipurpose Wheeled Vehicles (HMMWVs) was found to be capable of keeping up with fast-moving formations--much better than earlier systems.

LESSON(S): Relook the TOE of divisions and corps to consider the requirement for range extensions communications assets. This should be done as a part of organizational considerations in developing air and land operations force structure.

TOPIC: High Frequency (HF).

DISCUSSION: HF communications for voice and data were difficult throughout the region. The distances involved, the types of terrain to negotiate, atmospheric conditions, antenna site selection and other factors combined to make HF communications for voice and data extremely difficult. The Interface Control Unit (ICU) cell used a number of different types of HF radios and antenna configurations.

During operations there was a dependence on HF communications, either voice, data or both, to maintain connectivity within the data interface. Stations that were capable of it were tasked to simulcast on ultra high frequency (UHF), HF, and JTID S Class I terminals in an effort to get communications redundancy into the data links.

This redundant approach worked. Both UHF and the JTID S Class I operations worked well for line-of-sight operations. Operations that were conducted out of line-of-sight had to be accomplished by HF means.

LESSON(S): All participants in voice and data nets must expend the effort and take all the precautions necessary to enhance successful HF voice and data transmission and reception. They must:

a. Guard against self-induced Electromagnetic Frequency Interference (EFI) problems by making sure there are no ungrounded wires, brackets, or other carriers in or around HF radio equipment to cause secondary radiations.
b. Keep HF voice and data radio emitter power levels at a minimum.
c. Maintain I 0-IS percent frequency separation (3 megahertz (MHZ)) between adjacent transmitters to guard against costly equipment failure and serious signal distortion caused by receiver desensitization due to Radio Frequency Interference (RFI).
d. Ensure that the Doppler correction function is enabled in TADIL-A-capable units to guard against a change in frequency caused by the relative motion among link participants.
e. Ensure, for each HF receiver, the Automatic Gain Control (AGC) attack time is properly set to guard against TADIL-A data reception problems.
f. Guard against multipath interference by ensuring that the antenna is free from masking by large structures.
g. Enhance the possibilities for uniform propogation (no dead spots) by emplacing, erecting, and conducting regular preventive maintenance on antenna systems.

TOPIC: Precedence Allocation.

DISCUSSION: Precedence allocation within the tactical circuit-switched network was excessive and resulted in unacceptable call completion rates. JCS Pub 6-05.7 tactical telephone subscriber precedence allocation criteria was not followed by the components. JCS Pub 6-05.7, Page 34-I, lists the following precedence allocation criteria as a guideline:

Flash Override:----------0.2 Percent
Flash:--------------------2.0 Percent
Immediate:---------------4.5 Percent
Priority:-----------------27.8 Percent
Routine:-----------------65.5 Percent

During the early stages of the Operation, a review of circuit switch traffic-metering reports indicated that precedence abuse was prevalent throughout the entire theater. The criteria listed above was adopted as policy and disseminated to all component System Control Stations (SYSCONSs) via message for review and enforcement. A subsequent review of traffic metering indicated that precedence allocation was still excessive. The determination was made that the only subscriber in the network that would be authorized the FLASH Override precedence would be the Commander in Chief (CINC). This decision then became policy and was transmitted via message to component Chiefs of Staff for review and enforcement.

This problem was further compounded by the Mobile Subscriber Equipment (MSE) Preaffiliation List precedence allocation. The MSE software, initially brought into the area of responsibility (AOR), had excessively high subscriber precedence authorizations. At times, high precedence MSE calls dominated the MSE and joint tactical communications (TRI-TAC) gateways. In several instances, high precedence MSE calls also dominated the TRI-TAC gateways into the theater and direct support maintenance (DSM) networks.

Lastly, this problem was compounded by the fact that there currently is not a mechanism that allows an MSE Preaffiliation List to be modified in theater in a timely manner. A new list had to be developed in CONUS and shipped to the AOR which resulted in a delay in achieving the desired theater call completion rates. As with D SN access, precedence allocation is not an unlimited resource. Trunk group cluster sizing and precedence allocation must go hand in hand. The G6 and 16 Staff Officer is charged with the validation of subscriber requirements, a subset being precedence authorization. He must coordinate closely with the network manager to ensure that subscriber precedence does not adversely affect the circuit switch network's overall performance.

LESSON(S): Precedence allocation, throughout the entire theater, must be closely monitored and managed at the Theater level. Current precedence allocation criteria, as listed in JCS PUB 6-05.7, is not stringent enough in a real-world hostile environment.

Table of Contents
Chapter 1: Command and Control (C2)
Chapter 3: Interoperability



NEWSLETTER
Join the GlobalSecurity.org mailing list