Tactical communication in the air force
Transcription
Tactical communication in the air force
No 1 | 2015 Tactical communication in the air force Focus Information decides showdowns in the air Page 3 6 | Swiss Air Force Centenary: the military taking command of the air 1 0 | Interview with Lieutenant General Aldo C. Schellenberg Dear Readers The secure transmission of tactical information in the air force has undergone enormous technological advances and companies such as Crypto AG have done much to bring them about. The fact remains that the reliable protection of communication between operational command and control on the one hand and the fighter aircraft on the other is a particularly critical factor for the success of a mission. 12 | Unmanned reconnaissance from the air 1 5 | Personal protection at conferences: secure mobile communication is essential 19 | IDEX in Abu Dhabi: focused on security 2 2 | Integrated radio system for diverse operations The exchanged information is subject to risks. In the interview with the current head of the Swiss Air Force, you can read about those risks and the protective actions taken to counter them. I hope you enjoy reading this latest issue of CryptoMagazine. Publication details Published three times a year | Print run | 6,200 (German, English, French, Spanish, Russian, Arabic) Giuliano Otth President and Chief Executive Officer Publisher | Crypto AG, P.O. Box 460, 6301 Zug, Switzerland, www.crypto.ch Editor-in-chief | Tanja Dahinden, Crypto AG, Tel. +41 41 749 77 22, Fax +41 41 741 22 72, [email protected] Design / layout | illugraphic, Sonnhalde 3, 6332 Hagendorn, Switzerland Translation | Apostroph Luzern AG, Töpferstrasse 5, P.O. Box, 6000 Luzern 6, Switzerland Printing | Druckerei Ennetsee AG, Bösch 35, 6331 Hünenberg, Switzerland Reproduction | Free of charge with the consent of the editorial office. Courtesy copies requested. Copyright by Crypto AG Illustrations/photo credits | Bloomberg / Kontributor: p. 17 | Crypto AG: pp. 2, 20, 21, 23 | DCNS Group: p. 22 | Federal Archive: p. 9 | Keystone / Photopress-Archive / RIA / Str: p. 6 | R. Winzer: pp. 7, 12, 13 | R. Winzer (Royal Jordanian Falcons): p. 3 | Shutterstock: cover, pp. 15, 19 | Swiss Air Force: p. 11 Focus Information decides showdowns in the air For air force units, fast and reliable communication channels between partners make all the difference between the success and failure of a mission. From the flood of data generated by the various sensors (radar, etc.), pilots must immediately be able to cull the information needed for a consolidated operational picture and exchange commands and instructions for the upcoming operation with their commander quickly and precisely. Special challenges are associated with the use of the necessary communication resources. Ralf Winzer | Customer Segment Manager The successful deployment of modern air forces has long depended upon much more than just high-performance fighter aircraft and skilful pilots. Numerous players communicating efficiently among themselves play at least as big a part in the effective execution of a mission in the air. As with any other military option, the air force relies on the perfect interplay of effectors, sensors and command structures. The effectors include fighter aircraft and anti-aircraft units in particular. The sensors consist of ground-based radar systems with stationary and mobile stations, but also on-board radar, etc. They deliver the data necessary to compile recognised air pictures (RAPs) at the tactical operation centre (TOC). At the deployment location or air operations centre (AOC), the tactical fighter controllers (TFCs) draw on the mission objectives and the RAPs to command and control the pilots assigned to them. CryptoMagazine 1/15 | 3 Focus The three communication channels in air operations AIRBASE The aircraft and ground units typically communicate with each other over three communication channels: • Mission-net voice: Broadcast push-to-talk (PTT) voice channel between the pilots and the TFCs or the pilots among themselves • Mission-net data: A data link for transmitting tactical data between the AOC and the aircraft (and other combat participants). Data is typically transmitted in the TDMA (time division multiplex access) process. • Airbase-net voice: Voice channel between the pilot and the airport tower for attending to take-offs or approaches and taxiing. Threats and protective actions The exchange of information between the aviators and the ground units is subject to different threats: • Interception: Intercepted transmissions give the opponent an indication of the intentions of the mission, the level of available knowledge and the operational disposition and position of the aircraft. • Localisation: The localisation of radio signals allows the opponent to determine the combat participants' current position and direction of flight. • Jamming: The opponent inhibits communication by transmitting interference signals at the same frequency level. • Deception: The opponent alters the messages or feeds bogus messages into the communication chain. 4 | CryptoMagazine 1/15 Adequate action must be taken to provide effective protection against the above threats both for the transmitted information and the communication channels employed. TRANSEC and frequency hopping Voice and data communication during combat are vital components for survival in air operations. Despite all the automated electronic data-transmission, fire-control and control systems, voice communication is the top choice for communication "in the heat of battle" between pilots, their comrades-in-arms and the TFC. As mentioned above, the TDMA process is employed in data communication where sensor data from various systems has to be sent to several different mission participants. In the data block sent periodically, every participating system is assigned a time slot during which it inserts its data. Various transmission security (TRANSEC) precautions are taken to enable communication to be protected from jamming and to make localisation substantially more difficult. Frequency hopping is an established method, especially in voice and data transmissions during combat. Instead of broadcasting at a constant frequency, the radio unit hops several times per second within the defined frequency range. This procedure greatly inhibits localisation and jamming on a certain frequency. The adjustment of broadcasting power to the given situation also optimises a stable connection with respect to detectability. Focus COMSEC and encryption Even though the transmitted information usually does not contain any state secrets, eavesdropping by the enemy can still affect events in substantial ways. The consequences are much more serious when the opponent actively intervenes in communication by falsifying messages, so that, for example, planes are rerouted or firing orders are manipulated. AOC: air operations centre The AOC is the central command and control instrument an air force has for tactical operations. The operational processes are largely standardised in today's world because of NATO influence. The powers of command and control are in the hands of the air component command (ACC). Work proceeds within the framework of the air operations directive Tap-proof encryption of voice and data effectively protects communication security (COMSEC). It makes it impossible for the opponent to interpret the tapped messages and they become useless. It also prevents the opponent from feeding altered messages into the encrypted system. (AOD) – a high-level operational directive for the air force – and the rules of engagement (ROE). The Swiss AOC comprises the three sections operations planning, operations command and control, and operations support. The AOC is in close proximity to the relevant operational centres, allowing the ACC to intervene in events in the air in real time. The work of the AOC or ACC results in the air tasking order (ATO), where the individual flights are planned in detail in a daily time frame and in the airspace control order (ACO) and special instructions (SPINS), where airspace reconnaissance objectives and any instructions for special situations are stipulated. One example of a special situation is the provision of security at an international event with government representatives such as the World Economic Forum (WEF) in Davos, Switzerland. Time division multiplex access (TDMA): every slot is assigned one station for transmitting while all the other stations receive. Under this arrangement, data can be exchanged continuously between all network participants for commands, track exchange, common operational pictures, etc. CryptoMagazine 1/15 | 5 Swiss Air Force Centenary: the military taking command of the air In many armed forces across the globe, the air force is highly prestigious and holds a special fascination for observers. It is no wonder given the advanced and complex technology incorporated in aircraft and other aerial vehicles. The training of pilots – and of support personnel – is demanding and arduous. The Swiss Air Force celebrated its centenary in July 2014. For Crypto AG, this occasion is reason enough to recount the exciting story of military aviation in this country and in general. Ralf Winzer | Customer Segment Manager "What is going on over the next hill?" This question is one that every commander asks in combat. A completely new answer opened up the moment human beings were able to take to the air. Back in 1891, the Swiss Armed Forces (together with several other European armies) discovered airspace as an area for operations. The general staff decided to procure captive balloons to support the cavalry's reconnaissance activities. Kite balloons, also commonly known as "federal sausages" (undated photo from sometime during World War I (1914 – 1918) 6 | CryptoMagazine 1/15 Great pioneering spirit went into designing and equipping the first aerostats. Circular and kite balloons were filled with hydrogen generated in field conditions. They rose into the air on a rope tethered to the ground, enabling the first form of air reconnaissance. With the advent of new field phones, reconnaissance findings could be transmitted to ground troops. Reconnaissance was thus the first use of air force units and still remains an essential one today throughout the world. Hawker in a duet: Swiss Hunter T Mk 68 with Australian Sea Fury in a demonstration flight at the AIR14 air show in Payerne As World War I approached, acceleration occurred not only in political events. The military also had to cope with fast-shifting fronts and rapid troop movements. People therefore began questioning the use of captive balloons. A number of aviation pioneers throughout Europe and the United States were demonstrating the first functional flying machines at the same time. Their potential uses were not lost on the military. On 31 July 1914, the Swiss Federal Council commissioned Theodor Real – a cavalry captain and fervent pilot – with creating an air service. The project was financed through a popular fund-raising campaign. Captain Real was able to motivate nine aviation pioneers to contribute their own private flying machines. When war came, Switzerland was compelled to build up its own aviation industry, as the machines ordered in Germany could no longer be delivered. So, the armament company K+W in Thun, in the Swiss canton of Bern, developed the DH-1, a bi-plane with twin fuselage for conducting reconnaissance. Between the two World Wars, the growing significance of air warfare was recognised. The air service became a full-fledged branch and successively expanded its stocks of aircraft and aerial equipment. Air forces widened their scope of activity continuously in the conflict-filled environment created by the World Wars. Along with reconnaissance, they were soon performing combat-support measures such as airspace control, control of enemy airspace and engagement with ground targets. Effective anti-aircraft defence equipped with 20 mm cannons also began developing from 1935. At the outbreak of World War II, the Swiss Air Force already had 86 fighters and 121 observation and ground-attack aircraft. Chief among them were the Messerschmitt Me-109 and the Morane D-3800. During the same period, Junker Ju-52 transport planes were procured. Four of them continue to be used today for sightseeing flights and are fondly nicknamed "Aunt Ju". From this time forward, the Swiss Air Force was capable of performing the three tasks it continues to have today, namely intelligence gathering, protection of airspace and air transports. Combat actions have occurred repeatedly between Swiss aircraft and aircraft from other countries in conjunction with the defence of Swiss airspace. In addition to actual flight activities, the air force also had to build up the requisite logistics and a suitable set of management instruments. So, during mobilisation from 1939 onward, 221 ground-based observation posts supplied information about the airspace and other militarily relevant events as well as producing recognised air pictures. Radar techniques were still largely unknown at the time. The planes communicated by voice radio using an ingenious system known as the "Bambini Code". Unlike today's encrypted communication, the purpose of this "baby talk" was not to conceal the content of the message but rather to use easy and CryptoMagazine 1/15 | 7 straightforward key words to render the message as understandable as possible in a noisy environment. So, the "angeli" (own aircraft) were taking a stand against the "diabolic" (enemy aircraft). The air force had "bibis" (fighter planes) and "camions" (transport aircraft) for its missions. A radio message to the bambini was directed to everyone; aircraft flew in the direction of Norway (north), Atlanta (west), Sudan (south) or Mecca (east). Following the operation, the pilots returned to their base with "ritorno casino", where they treated their planes to a "Campari" (fuelled them) on the "campo" (airport). The Swiss Air Force was capable of performing the tasks it continues to have today, namely intelligence gathering, protection of airspace and air transports. After the nearly seamless transition from World War II to the Cold War, military aviation faced ever-tougher requirements. Greater flying speeds and altitudes were needed to evade the steadily improving anti-aircraft and reach the operations site quickly. At the same time, the planes had to be able to make observations slowly and close to the ground and attack ground targets if need be. From the 1950s, military aviation and defence against it took on a fundamental significance in military doctrines. Thus propellers gave way to jet engines. As in other countries, the Swiss Armed Forces substantially increased its armaments and successively purchased single-engine fighters of English origin. In this context, the Hawker Hunter in particular proved to be one of the most advanced and manoeuvrable fighters of its time. It is no wonder that, even today, the Swiss aerobatics squadron Patrouille Suisse still displays the agility of the Hunter in bold manoeuvres. Technology and aviation continued to advance rapidly. In the 1960s, the next wave of modernisation hit. The military leadership opted for the French Mirage III from Dassault, a plane with characteristic triangular wings. The Mirage III flew at double the speed of sound and, in specialised versions, could be used for air reconnaissance and as a fighter-interceptor. From 1975 to 1985, the fleet of combat aircraft was modernised with the addition of about 100 F5 Tiger fighters (Types E and F) from Northrop. 8 | CryptoMagazine 1/15 In the 1990s, controversial discussions ensued between opponents and supporters of the armed forces. They culminated in a referendum where the supporters won out. The political powers that be then procured 34 fighter aircraft of the Type F/A-18 Hornet from McDonnell Douglas (now Boeing). With the F/A-18s, Switzerland currently has a polyvalent fighter plane of the fourth generation with board electronics capable of meeting today's combat situations (radar, fire control system, early detection of enemy target acquisition, deception of the enemy fire control system, etc.). The F/A-18 thus takes over the task of defending Swiss airspace from its predecessor, the Mirage IIIS. The historic development of the air force is an example of the effects that technological advances have on military procedures in general, but also on the resources that are furnished. During World War II and the Cold War that followed, hundreds of aircraft were in action defending the airspace of a small country such as Switzerland. In light of today's radar systems, anti-aircraft options and systems for information procurement and analysis, the same task can now be handled by a few dozen aeroplanes. The history of military aviation is an example of how human beings and enterprises can apply top technological performances and great enthusiasm in order to attain great achievements in a fast-changing environment, be it in aviation, in information procurement, or in the field of communication technologies. The further technical development of national defence is certain to bring about exciting innovations, to which Crypto AG will continue to contribute. Pigeon basket for bicycle and alpine troops (1917) Another type of transmission: carrier pigeons in the military Pigeons were being used to carry messages in Antiquity. These The birds found their way autonomously, were swift and hardly intelligent animals are capable of finding their way back to their needed to fear the enemy's "air defence". They proved to be "dovecote" when let loose at a far distant location. The pigeon such an effective means of communication that the final towers of the then Republic of Genoa, or the "airmail" announce- 30,000 feathered members of the Swiss Armed Forces were ment of the English victory in the Battle of Waterloo in 1815, show not discharged until 1996, at which time they were given to that the military has long made use of the capabilities of these a charitable foundation. feathered friends for the long-distance transmission of tactical news. The Swiss Armed Forces founded a carrier pigeon service in 1917, which was integrated in the regular signal troops in 1951. CryptoMagazine 1/15 | 9 "Safety is a process that entails constant improvement" Interview with Lieutenant General Aldo C. Schellenberg, Head of the Swiss Air Force The interview was conducted by Casha Frigo Schmidiger | Publicist Lieutenant General, the Swiss Air Force has a broad range of tasks to perform in ordinary and extraordinary circumstances. Not only does it safeguard air sovereignty (in efforts that include air patrolling and air defence), it also performs additional diverse activities such as providing air transport and preparing information for political and / or military entities. What role do you feel a well-functioning command and control and information network plays in this regard? How big a priority is it to protect the information processed in this network? The deployment of the Swiss Air Force is based on a system group consisting of sensors, effectors, command and control systems, airports, means of communication and aircraft. Realtime control and command is practiced today and demands a well-functioning network for command and control, and for information. Information is processed in applications. That means the application systems and the transmission networks both have to be protected in accordance with the classification of the information. The protection of information is mandatory for ensuring that no mistakes occur either in the chain of information from sensors to effectors or in the chain of command from the operation centre to the fighter planes. What risk is there that the exchange of information between sensors and effectors can be influenced from the outside and what consequences could this have? The risk of outside influence tends to be considered minimal because the application systems and the transmission networks are decoupled from the outside world. To estimate the risk, one has to understand the methods that can be used to attack a decoupled system. The biggest danger is presumably posed by careless use of storage media, which allows malware to be planted in the system. Media reports tell us that attacks were launched on "opposing" systems. There are scarcely hard and fast facts about these activities, which are presumably carried out by secret services. The damage can be tremendous, however, because entire systems can be paralysed in extreme cases. A particularly serious problem appears to be that the systems function impeccably on a daily basis, lulling people into a false sense of security. 10 | CryptoMagazine 1/15 The command and control and information system of the air force ‒ abbreviated FIS LW ‒ is also based on individual components such as FLORAKO, a Swiss radar system for air surveillance. What operational possibilities does this system give to your commanders and what additional possibilities are set to come in the near future? FIS LW has diverse customised tools to support staff work as well as operations planning and operations command and control for air force resources. It also enables the air force to monitor and evaluate operations. With command and control management on FIS LW, basic and operational commands can be recorded, managed and distributed, regardless of whether the recipient is in a command and control facility or on a plane, is reachable through partial mobile access via microwave, or is abroad and connected by satellite. Operational command and control for FIS LW controls all phases of aircraft operations, from the provision of resources and flight preparation up to take-off and after landing, to refurbishment, evaluations and statistics. FIS LW is the system used for planning and the issuing of commands in every instance, whether fighters are commanded to conduct air patrols or a Stinger battery is deployed to engage in dynamic anti-aircraft protection, whether dozens of intelligence units are sent to observation posts or transport helicopters are ordered to take supplies to villages cut-off from the outside world. It is always the same FIS LW with flexibly configurable role authorisations, whether an air operation directive is drawn up or the start of an aeroplane deployment is signalled. Since 2003, FIS LW has been running 365 days a year, 24 hours a day – even though the air force performs its air patrolling and search and rescue (SAR) responsibilities day in and day out. If the situation ever becomes critical, nothing needs to be changed or replaced – the same FIS LW is used all the way up to a state of defence. to ensure the operational capability of the armed forces at all times. • Reaction in order to determine the effects in technical and non-technical areas and to restore the operational capability of the armed forces. These processes must be able to be implemented in all situations, even in a highly disrupted cyberspace. Lieutenant General Aldo C. Schellenberg (*1958) studied economics at the University of Do the armed forces treat strategic and tactical information differently in terms of security? Yes. Strategic and/or tactical information is classified according to the informational content and its significance for an operation. Treatment varies with the classification. This approach, in turn, has an influence on the design of the technical systems. Zurich, where he earned a doctorate (Dr. oec. publ.). He was the owner of a corporate consulting firm. Schellenberg has been head of the Swiss Air Force since 2013. How does the air force prepare for special operations such as the World Economic Forum (WEF) held annually in Davos, Switzerland? What role does safeguarding information sovereignty play in this context? The cyber threats are real. Cyberattacks can have serious effects especially where they can endanger operations and infrastructures. That is why the necessary security mechanisms have to be incorporated when systems are designed and procured to make sure cyberattacks fail. A clear-cut, identified air situation is needed for the operational command and control of aircraft. Everything is done to safeguard the integrity and secure transmission of data. No additional technical actions are required with respect to information security because the same systems are used on a daily basis for operations planning and operations command and control. Apropos cyberattacks: What do you think the Swiss Armed Forces can do to provide protection from cyberattacks? The armed forces must always be in a position to recognise cyber threats, to protect against them, and to ward them off. To this end, the armed forces must implement and have full mastery of the following four processes: • Command and control in order to be in a position continuously and at all times to ensure and control cyber defence both in the basic readiness and in the operational readiness of the armed forces. Achieving this objective requires the best possible deployment of the necessary partners and providers. • Anticipation in order to detect possible cyber threats early on, so that necessary decisions can be made and corresponding actions planned. • Prevention in order to minimise risks from cyber threats in all possible areas (technical, organisational, human, etc.) and How safe is our airspace today? Switzerland is located at various intersections of international air routes. As a result, it has one of the most complex and densely used airspaces in Europe. Over a million instrument flights are conducted through Swiss airspace annually, part of them as transit flights, but over 450,000 flights going to or from a Swiss airport. Instrument flight traffic is monitored by civilian and military radar and managed by flight controllers round the clock. Strict adherence to aviation regulations is essential and must be monitored at all times and enforced whenever necessary. This latter task is a sovereign responsibility of the state. For this reason, the air force is entrusted by law to safeguard air sovereignty. Like the police on the ground, the air force carries out preventive checks in airspace, helps out if technical problems occur (e.g. failure of transponders or communication systems), or intervenes with its fighter planes to address serious violations of aviation regulations and border violations by government aircraft. Preventive checks are conducted almost daily, with hot missions taking place once or twice a month. Accidents cannot be entirely prevented – there is no such thing as absolute safety. Safety is not a static state, either. It is a process that entails constant improvement. Every incident relevant to safety must be analysed precisely and, where need be, it must trigger actions to improve safety. The air force contributes to these efforts in essential ways. To optimise air patrolling, the air force will introduce "Luftpolizeidienst 24" (LP24) by 2020 – an on-call air patrolling service operating 24 hours a day, 365 days a year. CryptoMagazine 1/15 | 11 Unmanned reconnaissance from the air Aeroplanes represent a privileged means of reconnaissance, i.e. the acquisition of relevant information outside one's own sphere of influence. To operate outside one's own sphere of influence, one must be able to act as discreetly, flexibly and quickly as possible and not subject one's own resources – especially human resources – to avoidable risks. Unmanned aerial vehicles, aka drones, offer interesting possibilities in this regard. Ralf Winzer | Customer Segment Manager Knowledge about the environment is of eminent importance in conflict situations: to perform his duties, every head of operations, military commander or political negotiator depends on finding out what is going on behind the scenes on the opponent's side and what the terrain is like, in short, on knowing what awaits him "over the next hill". With the advent of aviation came the rise of air reconnaissance, in other words, a means by which an army can observe terrain and troop movements from the air without first expending great efforts overcoming obstacles on the ground. But military aviation has its price. Fighter planes, military helicopters and similar aerial vehicles are highly complex to develop and quite expensive to procure. They need extensive maintenance logistics and require airports whose runways pose potential targets that enemies can recognise from afar and attack. The biggest efforts go into the extensive training of the pilots. They must have perfect control of their supersonic aircraft at all times and succeed in carrying out whatever mission they are assigned. What could be more logical than wanting a lightweight aerial vehicle that could be easily controlled from the ground or that is capable of flying autonomously? The advantages of these unmanned aerial vehicles (UAVs) or remotely piloted aircraft (RPA) are obvious: • If fitted only with reconnaissance equipment, RPA is lightweight and also inexpensive to procure and operate. • The required infrastructure (take-off ramp, piloting system) is minimal. • The aerial vehicles are highly manoeuvrable and can "fly under" enemy radar in nap-of-the-earth flight paths (flying low to the ground). • RPA moves along quite discreetly with its quiet rotors and night vision devices. • Owing to their small size, RPA does not (yet) currently conform to the "predator-prey system" of common anti-aircraft. • The pilot is at a safe distance away at a location on the ground directly next to the evaluator, which operates the sensors and analyses and forwards the transmitted reconnaissance information. ADS 95, a reconnaissance drone system used by the Swiss Armed Forces*: console in the mobile ground control station: control of sensors with evaluator workstation (on the left), navigation and maps (in the middle), flight instruments with pilot workstation (on the right) 12 | CryptoMagazine 1/15 * The operational scenarios depicted in this article relate neither to the ADS 95 nor to the responsibilities of the Swiss Armed Forces. RPA can deliver aerial reconnaissance in the visible range but also in the infrared spectrum or in other measurement ranges. Furthermore, heavier-duty models can of course also be equipped with weapons and fire-control systems. Airborne reconnaissance is employed by the military, the police and border control. The latter two functions are increasingly performed by drones. Unmanned aerial vehicles function similarly to model aircraft. The essential difference is that the toy can be controlled only as long as it is in view, whereas a drone can be piloted from a mobile or stationary control centre. The operating console at the ground station is typically divided into three areas. Reconnaissance is the first. This area shows the reconnaissance information received by the sensors (particularly the pictures taken by the cameras) and allows the evaluator to control the sensors or direct the cameras to zoom in on relevant details. Control is the second area. Like an aeroplane cockpit, it features a compass, an altimeter and airspeed indicator, etc. that allow the pilot to control the drone. The pilot's work in today's RPA consists primarily of entering flight direction and altitude (comparable to the autopilot feature in a plane). Stabilisation in the air is done automatically. The aerial vehicles now take off from a type of catapult and land largely independently using a radio control system similar to the civilian ILS (Instrument Landing System). In the third area of the console, the pilot and the evaluator are furnished with various navigation aids and maps. The data gathered by the sensors on the drones is typically transmitted in real time to the operational command and control or the operations centre. There, this information is analysed and incorporated into the common relevant operational picture (CROP). ADS 95, a reconnaissance drone system used by the Swiss Armed Forces*: ranger drone with take-off ramp CryptoMagazine 1/15 | 13 Drones have gained in military significance in recent years. Many analysts see them as a symbol for a change in the way war is waged. Some go as far as saying that drones will one day largely take over the combat and logistics functions of manned aircraft. The backbone of every drone system is data transmission between the drone and the ground control station and between the ground control station and the operations centre. Drones can be divided into three categories: strategic, operational and tactical. Strategic drones are used for large-area reconnaissance over enemy territory. They include systems such as the RQ-4 Global Hawk from Northrop Grumman, which operates up to 40 hours at a maximum flight altitude of 20,000 metres and has a range of 3,000 nautical miles. Operational drones include the MQ-1 Predator and MQ-9 Reaper from General Atomics. They are used in military operational areas and can be employed for reconnaissance as well as for attack purposes. Finally, tactical drones fly at a low altitude over short distances. Their main function is to enable commanders on site to monitor enemy activities without endangering their own soldiers. One example of this type is the RQ-14 Dragon Eye from MCWL. Unlike their strategic and operational counterparts that are capable either of being remote controlled or being pre-programmed for autonomous flight, tactical drones are always controlled by operators in the ground control station. Police forces also often use them for crowd control and border control.1 Drones perform valuable services in national defence, in the fight against terrorism, in police work (e.g. during demonstrations and unrest) and in border control. They arrive where the action is, quickly and discreetly. Of even greater relevance is that no human soldier need be exposed to direct danger in these types of missions. The backbone of every drone system is data transmission between the drone and the ground control station and between the ground control station and the operations centre. It must be as insusceptible as possible to interference and unauthorised tapping. A potential enemy should not be able to render the drone non-manoeuvrable, to take control of it, or to intercept the data the drone is recording. Protection against interference or jamming is achieved by means of frequency hopping and similar processes whereby protection against undesired tapping requires effective encryption that in no way impairs the transmission rates of data transfers. In this respect, drones vividly show the significance of ultra-secure data transmission. Source: 1 ETH Zurich (Federal Institute of Technology Zurich), CS, 2010: Analysen zur Sicherheitspolitik (Security policy analyses) Drone Operations Centre DRONE GROUND CONTROL STATION OPPONENT OUT OF OWN AREA OF INFLUENCE Controlled from their ground control station, drones deliver information about enemy troop movements. The ground control stations transmit the information that has been gathered to the operations centre. 14 | CryptoMagazine 1/15 Personal protection at conferences: secure mobile communication is essential A conference with top politicians and other decision-makers inevitably involves security units coming out in force. Ensuring the personal security of national and international guests and their delegations incurs considerable expense. The goal has to be "absolute security" from arrival to departure. One key to success is having a reliable mobile communication group of bodyguards in close contact with the mission operation centre and with other complementary service providers. Urs Kürzi | Customer Segment Manager The jet of the top politician invited to the event lands at a private airport outside the commercial capital. Comfort and convenience await the high-ranking guest and his delegation on their arrival. After landing, the guests are picked up directly from the aeroplane stairs with a limousine and taken immediately to the customs office set up especially for the conference. There, they take care of entry formalities, identity checks and customs clearance. The bodyguards greet the guests at the customs office right after the entry point and give each of their counterparts, the top politician's security agents, a secure mobile phone. The conference participant's bodyguards and security agents are in the same communication group. The civilian communication device, a mobile phone with integrated encryption module, is inconspicuous but has an encrypted address book containing all phone numbers of the security forces and various emergency numbers. The smartphone has hardware-based encryption, so the security agents' phone numbers and names are protected against all attacks from the mobile network, even if the phone is lost. No instructions are needed for using the secure mobile phone because there is hardly any difference between it and an off-the-shelf smartphone. Once the user logs into the secure application, phone operation is intuitive. The trip to the venue of the ministerial conference takes about two hours. On the way, the bodyguards send the security manager at the mission operation centre encrypted text messages informing him about the status of the convoy. They can comply with spontaneous requests from the guests because deviations from the daily itinerary are part of their everyday routine. They are accustomed to reacting spontaneously and understand how to make last-minute decisions. The travel routes are adjusted to current traffic and weather conditions, with any changes communicated to the mission operation centre. The group passes through the police-run checkpoints at the conference venue in no time. CryptoMagazine 1/15 | 15 The bodyguards belong to a special unit of the armed forces. They ensure the security of individuals protected under international law and guard their accommodation. The conference centre itself is secured by units of the armed forces responsible for facility protection. This work consists mainly of identity checks on individuals and monitoring goods entering and leaving the conference centre. The checks and the inspection of materials entail major efforts on the part of the facility protection unit. Simple and pragmatic preparations to limit threats Successful protection of the conference begins months earlier with thorough planning. The government security service draws up a precise list of the top politicians who are coming, with exact information on their arrival and departure times, flight numbers and detailed planning of the meeting and presentations. The potential dangers faced by the respective guests and protective measures to counter them are determined in advance and discussed with the security agents. This knowledge does much to minimise any dangers the guests might face at the conference. Then, the mission infrastructure is put in place and the alternative plans are recorded with security options and converted into operational plans. The bodyguards customarily use smartphones for reasons of discretion because they look just like off-the-shelf mobile phones. One central advantage of a mobile voice solution is that it allows the person to follow unforeseen events. These are the types of situations in particular where security forces rely on fast, secure voice communication. On request, conference participants themselves can be given encrypted smartphones, allowing them to call and text each other in encrypted form. Another vital aspect of security involves keeping secret the location of the conference visitors under protection and of their bodyguards, all of whom bring along their own secure smartphones. To prevent the location of these individuals from being determined, it is advisable that they make temporary use of a local mobile number or SIM card. This precaution does not prevent the possibility of the guests calling home or any number in their country of origin – and their location is not revealed in the process. A gateway in the government ministry in the guests' country of origin terminates the encrypted calls and passes them on to the national phone network. 16 | CryptoMagazine 1/15 Security management centre Central communication management is indispensable because it is designed especially for quickly changing situations. Crypto Management Suite CMS-1200 makes this management possible. With its help, the communication hierarchy is defined, address books are created and participants are put in cryptographically separate groups (Crypto Domains), which are then transmitted to the security modules of the smartphones. The Crypto Management Suite fully supports the handling of lost phones as well as the inclusion of ad hoc units in extraordinary situations, so the security policy can be enforced no matter what the circumstances. Security management has yet another special feature. Individuals and representatives of a defined user group have to be duly authorised in the defined communication hierarchy in order to contact the high-ranking conference guests. These are the types of situations in particular where security forces rely on fast, secure voice communication. Guarding airspace So much for the scenario on the ground and for the direct protection of guests. The air force is naturally responsible for safeguarding air sovereignty. The airspace is closed to all civilian aircraft for the duration of the conference. Any violation of this rule in the restricted airspace can be clarified immediately. To do so, fighter jets take off from the closest military airfield of the armed forces to enforce air traffic control in the protected zone. If the closed airspace is violated (e.g. owing to poor flight preparation by the pilots and their consequential ignorance), the fighter jets are in the air within minutes to identify the aeroplane, have the air operation centre check the identification against the civilian flight plan, contact the pilot and escort the plane out of the no-fly zone. These types of airspace violations can result in five-figure fines in dollars, as the international currency. To protect conferences attended by high-ranking political and business decision-makers, the air force also has to be prepared to down a plane in cases of clear danger. During the conference, the defence minister is always accompanied by an air force pilot as liaison to the air operation centre. If a pilot of an aircraft that has penetrated the closed airspace ignores every attempt to have him contact the fighter jets, which rock their wings or fire magnesium pellets to indicate clearly that the pilot is supposed to follow them, the minister of defence can basically order the plane to be shot down. The air force makes helicopters available to protect the surrounding terrain by flying over valleys lying in the radar shadows. It also conducts passenger and cargo flights to neighbouring cities. Individual helicopters are equipped for SAR (search and rescue) missions to ensure rescue or medical care in the event of an accident. For all eventualities, helicopters with aerial gunners are likewise available, ensuring preparedness to intervene against slow flying objects. Coordination through the mission operation centre During the conference, the mission operation centre (MOC) is abuzz with activity round the clock and can aptly be called the "nerve centre" of the entire operation. The phone in the MOC rings significantly more often than in a regular operations centre. The constant exchange of information and a correct flow of reports to the MOC staff are vital for the success of the operation and therefore essential to the security of the conference participants. Above and beyond that, the security managers have intimate knowledge of the local features of their area of operations. This is indispensable because a common relevant operational picture (CROP) is compiled from all messages, calls, operational pictures, weather reports, aerial surveillance pictures, flight and operational plans, facility protection, transport requests, traffic reports and even VIP personal security. And the security managers can interpret all this information accordingly and put it into context with the local features of the area. At the private airfield outside the city, bodyguards take charge of security by accompanying their guests in the car or guarding the convoy from the air. CryptoMagazine 1/15 | 17 CLOSE PROTECTION OFFICERS VIPs VIP A VIP B VIP C Officer A Officer B Officer C Crypto Management Suite CMS-1200 Security Manager MISSION OPERATION CENTRE Sample configuration of a reliable communication hierarchy: the security management centre (Crypto Management Suite CMS-1200) supports the preparations of the mission infrastructure with secure smartphones for the bodyguards or flexible reactions to quickly changing situations during a "hot mission". A PC application can be used for defining new communication hierarchies simply and conveniently, for incorporating additional equipment in the network, for changing the encryption key, for excluding lost phones, or for carrying out a factory reset on a stolen device. Secure voice and messaging communication by means of secure smartphones from the mission operation centre to the bodyguards is indispensable. The mission operation centre communicates over secure voice radio with the outposts of the armed forces, namely the facility protection unit, the checkpoints, the mobile radar posts, the logistics centre, the patrolling service and the civilian traffic control centre of the police. Last but not least, the mission operation centre for the conference is in constant contact with the fighter jets and the air control centre over the secure aeronautical radio service of the air force. In a communication group for protecting a conference, a wide variety of secure communication solutions can provide services. The ones actually chosen to do so depend on which system is especially well suited for the deployed troops in terms of mobility, radio propagation and speed of movement. In the case of bodyguards, factors such as discretion and the determination of the communication hierarchy also come into play. 18 | CryptoMagazine 1/15 All's well that ends well A conference of this kind is of more than just political significance. It gives the venue an opportunity to give a positive impression of the country to top political and business leaders. Instead of feeling like being locked up in a fortress, guests and the local population should feel protected at all times through discreet measures. Secure communication on smartphones can offer reliable security particularly for personal protection. What counts in the end is that security can be furnished round the clock. Sources: • "Tages-Anzeiger", online edition, 7 May 2014: So funktioniert das Air Operations Centre (This is how the Air Operations Centre works) • "CUMINAIVEL", 22 January 2013: Spontanes und flexibles Handeln im Personenschutz (Spontaneous and flexible action in personal protection) IDEX in Abu Dhabi: focused on security Every two years, the most important suppliers of armaments gather at the International Defence Exhibition & Conference (IDEX) in Abu Dhabi. In February 2015, that time had come again. Under the patronage of His Highness Sheikh Khalifa Bin Zayed Al Nahyan, President of the United Arab Emirates and Supreme Commander of the UAE Defence Force, this, the world's largest defence exhibition, took place for the twelfth time. Crypto AG was also on hand once again with a stand. Markus Baumeler | Head of Bid Management Given its enormous size, international orientation and diverse programme of social events, the IDEX is an ideal opportunity to forge close ties and to engage in professional discussions with governmental decision-makers and high-ranking representatives of defence organisations. The exhibition opened with a spectacular staging of a terrorist attack, which left the audience in the stands riveted every day. A realistically replicated container port was captured by a group of terrorists. However, the fictional military intervention spearheaded by the Armed Forces of the United Arab Emirates CryptoMagazine 1/15 | 19 was not long in coming. In a large-scale operation involving helicopters, armoured vehicles and ground troops, they fought the terrorists, freed the hostages and won back sovereignty over the territory to the accompaniment of simulated bombing raids. The IDEX is known for these kinds of action-packed and elaborately staged shows – but also for its reputation as one of the most important defence exhibitions that counts the leading companies of the industry among its exhibitors. Steady growth In some 140,000 square metres of exhibition space, 180 local and 1,100 international suppliers from 55 countries presented their product innovations for operations by land, sea and air. The largest exhibitors were companies from the United States, Germany, Turkey, China, Italy and France. Over 80,000 visitors, mostly local, viewed the exhibition stands in the spacious indoor and outdoor areas – a record high attendance for the IDEX. The IDEX is an ideal opportunity to forge close ties and to engage in professional discussions with governmental decision-makers. Scenario of a terrorist attack on a container port The "Unmanned Exhibition (UMEX)" was fully integrated in the exhibition premises for the first time this year. Last time it was still part of the "Naval Defence and Maritime Security Exhibition (NAVDEX)", now held for the third time in a row as part of the IDEX. This integration underlines the growing importance of unmanned systems. Their possible uses are practically unlimited and they are increasingly deployed in modern armed forces (refer also to the article entitled "Unmanned reconnaissance from the air", pages 12 to 14). Through numerous live demonstrations, visitors vividly experienced the ingenious technical functions of the unmanned systems. Will Star Wars soon be a reality? Will the fights involving laser weapons from the films of the same name occur in future not just "in a galaxy far, far away" (quotation from the films)? Many visitors may have asked themselves this question after seeing the laser cannons at the IDEX, intended for use as anti-aircraft weapons. The portable hand terminal of the MultiCom radio system from Crypto AG is also available with an Arabic keypad. 20 | CryptoMagazine 1/15 Opening of the Swiss Pavilion by Lieutenant General André Blattmann, Head of the Swiss Armed Forces, Martin Sonderegger, Chief of Armament of the Swiss Armed Forces and the Swiss ambassadress Andrea Reichlin (from left to right). Lively interest in the products from Crypto AG This year, Switzerland was represented at the IDEX by more than 30 companies. One of them was Crypto AG. Along with most other Swiss enterprises, its stand was in the Swiss Pavilion. The pavilion is an appealing platform and exerted a real pull on exhibition visitors once again. This can be seen as a sign of the excellent collaboration of the Gulf States with neutral and politically stable Switzerland and its independent companies, collaboration based on years of trust. Information security and top quality are of prime importance in the Arab World, a fact also evident from the numerous visitors who stopped by the Crypto stand. They obtained information there about high-security solutions and took the opportunity to discuss current and future challenges facing the most modern networked defence organisations. Keen interest was shown in the MultiCom radio system, among other products. Along with voice radio, it enables real-time transmission of text messages, an increasingly important capability in tactical operations. The keypad of the mobile hand terminal (HC-2605) or a computer connected to the stationary unit (HC-2650) can be used to send and receive text messages quickly, easily and reliably. For example, this approach can help to prevent misunderstandings and misinterpretations caused by a high level of ambient noise. Visitors also displayed great interest in the secure solutions for end users and network security. They were amazed by the smallest encryption platform in the world, which provides reliable maximum protection for mobile telephony, or topperforming network solutions, such as the robust HC-8224 Airborne Version, designed to protect IP/VPN-based connections and to be integrated in an aircraft. Dialogue on information security Along with guests from the Arab World, Crypto AG was able to welcome to its stand again this year the Chief of the Swiss Armed Forces, Lieutenant General André Blattmann, and the Chief of Armament of the Swiss Armed Forces, Martin Sonderegger, plus other high-ranking officers and the Swiss ambassadress to the United Arab Emirates Andrea Reichlin. In this setting, the latest trends, information security challenges but also local conditions and developments were discussed extensively in a direct dialogue among the parties. CryptoMagazine 1/15 | 21 Integrated radio system for diverse operations The Secure HF Radio Communication System from Crypto AG is a portable yet complete radio system. As such, it can be put to highly diverse use to ensure ultra-secure messaging and voice communication no matter what the situation. For instance, the coast guard can employ it to maintain sovereignty over state coastal areas or joint naval forces can utilise it to fight piracy. It can be deployed in vehicles of the border patrol or ground forces, or in diplomatic missions. Tanja Dahinden | PR & Corporate Communications Manager Pirates operate off coasts worldwide, e.g. the Horn of Africa, but also parts of Southeast Asia. They are organised mostly in gangs. These sometimes heavily armed militias attack and board (cargo) ships on the open sea, threatening international shipping routes and posing immense dangers to the security of global trade routes. To counter piracy effectively, navies of different countries join together in many cases to form joint armed forces and provide common support to the affected coastal nations. These multinational operations are coordinated from a military base on land in the affected region or from an operations centre on board a ship. 22 | CryptoMagazine 1/15 From these centres, the military issues operational commands and communicates situation reports and other highly sensitive information. The ships and reconnaissance aircraft involved in the anti-piracy operations likewise always maintain radio contact with each other. On missions such as these, the (joint) naval forces are compelled to rely on the high-security transmission of strategic and tactical operational information in order to maintain sovereignty over the operational area at all times and to prevent endangering the security of their own forces. Non-encrypted information could be intercepted by the pirates and manipulated. An international algorithm is generally used for encrypting the highly classified information exchanged within an alliance of states. Under this approach, the individual states can retain their sovereignty without compromise. Sovereignty over the operational area should be able to be maintained at all times. The portable secure radio system* from Crypto AG ensures high-security communication among ships or with the operations centre on land. It can be installed and de-installed quickly and easily as a semi-permanent infrastructure on frigates, offshore patrol vessels and other ships in the operational zone. A sturdy case holds the system components, from notebook and encryption solution to radio, antenna and other accessories. The integrated system enables voice communication and messaging over an encrypted radio link, thereby meeting different communication needs: Do messages have to be sent immediately or are they of great importance but not timecritical? Is an immediate answer or confirmation required? Are certain events required to be documented in writing? Change of scenery. A region that already has a weak infrastructure suffers a natural disaster, a terrorist attack or a major armed conflict that prevents any further communication over the Internet, by landline telephony or by radio. This outage also affects diplomatic missions in the crisis region that desperately depend on contact with their headquarters at the foreign ministry in the country sending them. Being portable, configurable and immediately deployable, the Secure HF Radio Communication System from Crypto AG also ensures ultra-secure radio communication completely independent of central infrastructure in these kinds of situations as well. Of course, this radio solution is intended not only for disasters. It can be put to highly versatile use that is not confined to certain scenarios. Regardless of the use and the basic conditions associated with it, this product guarantees maximum security and the reliability of the entire system, trouble-free operation and the transfer of comprehensive know-how because with Crypto AG, all system components are delivered by a single company. * The radio system supports HF, VHF and UHF bandwidths. The integrated radio system ensures an ultra-secure exchange of information in military and in civilian settings no matter what the situation. CryptoMagazine 1/15 | 23 Zug Abu Dhabi Muscat Kuala Lumpur Rio de Janeiro Headquarters Seminars Crypto AG Information Security Specialists P.O. Box 460 28 September to 2 October 2015 6301 Zug Switzerland Technical Vulnerability Testing T +41 41 749 77 22 5 to 9 October 2015 F +41 41 741 22 72 [email protected] Contemporary Cryptography www.crypto.ch 12 to 16 October 2015 Regional offices The seminars are all held at Crypto AG premises in Steinhausen, Switzerland. Brazil, Rio de Janeiro Malaysia, Kuala Lumpur Sultanate of Oman, Muscat Contact and further information United Arab Emirates, Abu Dhabi www.crypto.ch/en/products-and-services#seminars