Defense

Challenge

The character of war has changed during the past decade towards more rapid threats that sometime resemble terrorist activities and other complex novel situations more than traditional state on state warfare. This calls out for the employment of units and modular task forces that can be directed to operations within minutes. Often these forces relatively small and must operate with increased autonomy while sharing situational information with the headquarters. How can such a force be employed when dedicated communications assets may not be available, there is no time to build tactical networks in the operating area and parts of the task force may come from different branches of the military with their own tactical networks?

The strength of such a force can be considerable due to added technology with, for example, drones and electronic warfare and intelligence assets. The amount of data processed within the force and exchanged with the HQ is thus vastly greater than before, bringing the urgent need to prepare for cyber warfare threats as well.

Solution

Goodmill Systems’ router family has a model both for vehicles that can be utilized in cars, tanks, and ships and for HQs that can be either battery powered and man-portable or fitting to indoor specifications. Goodmill routers enable all the elements of rapidly deployable forces to connect with broadband access with all existing IP-based networks in the operational area. As multichannel routers the connectivity can be seamlessly built over both existing commercial networks and dedicated military networks as these networks become available. The same feature ensures a high level of electronic warfare protections, since bringing down the connectivity requires disabling all the available networks that can utilize a wide range of radio technology and wireline connectivity. Finally, the utilization of existing networks ensures that deploying the force does not create new electronic signals that would give away the deployment and the built-in IPSec/VPN encryption keeps the data out of prying eyes and ears regardless of the network used.

Key Benefits

  • Ability to deploy units without dedicated comms support
  • Fully connected units with location information enable tactics such as swarming
  • Seamless integration of commercial and tactical IP-based networks including SATCOM
  • Built in encryption for all traffic
  • Ability to utilize commercial network innovations as they become available
  • Protection from electronic intelligence by fusing in with civilian use