Professional Documents
Culture Documents
Vdocuments - MX B GL 351 001 FP 001 Signals in Support of Land Operations Volume 1 Principles
Vdocuments - MX B GL 351 001 FP 001 Signals in Support of Land Operations Volume 1 Principles
Vdocuments - MX B GL 351 001 FP 001 Signals in Support of Land Operations Volume 1 Principles
ALTHOUGH NOT CLASSIFIED, THIS PUBLICATION, OR ANY PART OF IT, MAY BE EXEMPT FROM
DISCLOSURE TO THE PUBLIC UNDER THE ACCESS TO INFORMATION ACT. ALL ELEMENTS OF
INFORMATION CONTAINED HEREIN MUST BE CLOSELY SCRUTINIZED TO ASCERTAIN WHETHER OR
NOT THE PUBLICATION OR ANY PART OF IT MAY BE RELEASED.
WARNING
ALTHOUGH NOT CLASSIFIED, THIS PUBLICATION, OR ANY PART OF IT, MAY BE EXEMPT FROM
DISCLOSURE TO THE PUBLIC UNDER THE ACCESS TO INFORMATION ACT. ALL ELEMENTS OF
INFORMATION CONTAINED HEREIN MUST BE CLOSELY SCRUTINIZED TO ASCERTAIN WHETHER OR
NOT THE PUBLICATION OR ANY PART OF IT MAY BE RELEASED.
PREFACE
APPLICATION
AIM
4. This publication states the Signals doctrine for Land Force field operations. It is
commonly referred to as SILO.
SCOPE
5. The doctrine is applicable to all scales of conflict and to all levels of command within an
area of operation. The publication describes:
d. the major tactical considerations that affect the provision of communications on the
battlefield.
CONTEXT
6. This manual in the B-GL-351 series highlights Signals support in the tactical land
environment. The cut-off point between the various manuals is arbitrary and some overlap is
inevitable.
i
B-GL-351-001/FP-001
TERMINOLOGY
8. The terminology used in this manual is consistent with that of the Army Glossary and
AAP-6, NATO Glossary of Terms and Definitions.
ii
SILO — Principles and Fundamentals
TABLE OF CONTENTS
PREFACE ................................................................................................................................i
CHAPTER 1 SIGNALS IN THE LAND FORCE OPERATING ENVIRONMENT
SECTION 1 SCOPE OF SIGNALS .......................................................................................1-1
101. Introduction .........................................................................................................1-1
102. Role of Signals....................................................................................................1-1
103. Signals’ Functions...............................................................................................1-1
104. Signals’ Components..........................................................................................1-1
105. Command and Control........................................................................................1-2
106. Command and Control System...........................................................................1-3
107. Army Operational Functions ...............................................................................1-4
108. Information Environment.....................................................................................1-4
109. Signals’ Command and Staff ..............................................................................1-5
110. General Principles of System Management (SM)...............................................1-6
111. Responsibilities of Signals in System Operations...............................................1-7
112. Tasks of Signals in CIS Planning........................................................................1-8
SECTION 2 THE OPERATIONAL ENVIRONMENT .............................................................1-8
113. General ...............................................................................................................1-8
114. Continuum of Operations Framework.................................................................1-9
115. Spectrum of Combat.........................................................................................1-10
116. Full Spectrum Operations .................................................................................1-11
117. The Electromagentic Battlespace .....................................................................1-12
118. Joint, Interagency, Multi-national and Public ....................................................1-12
SECTION 3 TYPES OF LAND FORCE OPERATIONS ......................................................1-14
119. Land Operations ...............................................................................................1-14
120. Expeditionary Operations .................................................................................1-14
121. Domestic Operations ........................................................................................1-15
122. Joint, Inter-agency, Multi-national, and Public (JIMP) ......................................1-15
SECTION 4 OPERATIONAL CONCEPTS/IMPERATIVES.................................................1-16
123. Collaborative Working.......................................................................................1-16
124. Effects Based Approach to Operations.............................................................1-17
SECTION 5 COMMAND SUPPORT ...................................................................................1-18
125. General .............................................................................................................1-18
126. Command Support Components ......................................................................1-19
iii
B-GL-351-001/FP-001
iv
SILO — Principles and Fundamentals
v
B-GL-351-001/FP-001
vi
SILO — Principles and Fundamentals
vii
B-GL-351-001/FP-001
viii
SILO — Principles and Fundamentals
LIST OF FIGURES
ix
SILO — Principles and Fundamentals
CHAPTER 1
SIGNALS IN THE LAND FORCE OPERATING ENVIRONMENT
SECTION 1
SCOPE OF SIGNALS
101. INTRODUCTION
1. Since 1903, Signals has been assigned the responsibility for the provision of
communication links and services required by army commanders for command and control (C2)
of their forces during operations. As the world changes and technology continues to evolve
exponentially, the fundamental principles of Signals have remained constant. Signal Doctrine,
as it applies to supporting commanders engaged in Land Operations, is rooted, is proven
principles that more so adapt to the demands expected of it and the processes it supports. This
document will describe how Signals supports commanders and war fighters in the modern
operational environment.
1. The role of Signals is to provide the commanders and their staffs with the means to
exercise command and control through the exploitation of the military and global information
environments while denying and exploiting the enemy's use of the same.
1. Signals has two major functions in support of Land Force (LF) within the operating
environment:
a. Signals must enable Commanders at all levels to command and control their
forces in the successful completion of their assigned mission across the entire
Spectrum of Conflict within the Continuum of Operations.
1. To enable commanders to execute effective command and control and to enhance their
decision making process within the Land Command Support System (LCSS), it is important to
understand the two components of Signals—Communication Information System (CIS) and
Electronic Warfare (EW) see Figure 1-1. CIS has two sub-components—Tactical Command
and Control, Information System (TacC2IS) and Tactical Communications (TacComms)—and
shares a relationship with the Electronic protection (EP) sub-component of EW. Chapters 2 and
3 of this volume cover in detail TacC2IS and TacComm. EW has three sub-components—the
Electronic Attack (EA), the Electronic Support (ES) and the Electronic Protection (EP).
Chapter 4 of this volume will cover EW in detail. This construct is duplicated at all levels of
command and each signals component has a technical relationship with its counterpart at
higher, lower and lateral levels.
B-GL-351-001/FP-001 1-1
SILO — Principles and Fundamentals
2. The LCSS supports the Army’s desired end-state of command superiority by:
a. fully integrating with the Canadian Forces (CF) unified command and control
(C2) systems to support future missions;
b. operating across the full spectrum of conflict;
c. interacting seamlessly with civil authorities and non-governmental organizations;
and
d. being user-friendly, effective, achievable, affordable and sustainable within both
integrated garrison and deployed domains.
3. The primary purpose of the LCSS is to provide commanders with the information and
information services required to make effective and timely C2 decisions about their forces
deployed in domestic and expeditionary operations. The LCSS is a combination of systems that
can be grouped into TacComms and TacC2IS and delivers major Intelligence, Surveillance,
Target Acquisition and Reconnaissance (ISTAR) systems to operational commanders and
staffs. This includes EW, unmanned aerial vehicles (UAV), Weapon Locating Sensors (WLS),
Ground-based Air Defence (GBAD) and Nuclear, Biological, Chemical (NBC) sensors.
1. Command is defined as the authority vested in an individual for the direction and
control of military forces.1 This involves the exercise—and delegation of—authority,
acceptance of responsibility and a demonstration of leadership and competence. Command is
the purposeful exercise of authority over structures, resources, people and activities.2
1
B-GL-300-003/FP-001, Command in Land Operations.
2
Canadian Defence Academy, Leadership in the Canadian Forces, Doctrine, 2005, p. 7
1-2 B-GL-351-001/FP-001
Signals in the Land Force Operating Environment
2. NATO has defined control as “the process through which a commander, assisted by his
staff, organizes, directs and co-ordinates the activities of the forces allocated to him”3. Control
should be viewed, not just as top-down direction, but also as including the feedback from
bottom-up as to the effect of the action taken. To achieve control, the commander and his staff
employ a common doctrine and philosophy for command and use standardized procedures
(including staff work) in conjunction with the communications information systems available.
3
NATO Definition AAP 6 (2005)
B-GL-351-001/FP-001 1-3
SILO — Principles and Fundamentals
1. The Army defines five operational functions: command, sense, act, shield, and sustain.
Commanders seek to integrate and apply these functions as overwhelming combat power when
and where required. B-GL-300-001/FP-001 Land Operations defines combat power as “the
total means of destructive and/or disruptive force that a military unit or formation can apply
against an opponent at a given time”. The aim is to convert the potential of forces, resources
and opportunity into actual capability that is greater than the sum of the parts. Signals provides
a capability to integrate the activities of the operational functions to enhance or magnify the
effect of friendly combat power and diminish that of the enemy:
b. Shield. Signals role in this operational function is protection and security of the
network from both CS and C2IS threats posed by hackers, viruses and enemy
electronic warfare (EW) units.
d. Act. Signals role in this operational function is associated with Electronic Attack
(EA), which is a sub-component of EW. It is the employment of electromagnetic
energy, including direct energy, to reduce or prevent hostile use of the
electromagnetic spectrum and to ensure its effective use by friendly forces.
1. The domain in which Signals will forever be intrinsically linked is the information
environment. The term “information environment” brings with it an immensity and scope that is
seemingly all encompassing. Of particular importance to Signals is the inherent understanding
of the following two sub-sets of the information environment:
1-4 B-GL-351-001/FP-001
Signals in the Land Force Operating Environment
2. The information environments exist within the land operations environment, and in order
for Signals to effectively enable information exploitation in support of commanders and their
staffs, Signals must understand the land operational environment in which they operate.
Therefore, the Army requires the infrastructure that allows the Land Forces to operate within the
MIE and to interface with the GIE so as to use CIS to enable the integration of all Land Force
activities as follows:
4
Ibid
5
Land Force Information Operations B-GL-300-005/FP-001
B-GL-351-001/FP-001 1-5
SILO — Principles and Fundamentals
3. Economy. The limited availability of highly qualified support personnel suggests that
service desk functions should be centralized with the senior deploying HQ. System support
capabilities should allow for remote management of distant devices. Best industry practices in
information technology (IT), where this is possible and sensible, are used. These include a
tiered structure with junior (i.e. less experienced) personnel acting as initial points of contact
with access to more specialized resources provided when the situation warrants. This “bottom
up” approach is harmonized with the fact that CIS plans are developed from the top down. That
is, the SM concept is integrated with existing and developing staff and signals doctrine.
4. Flexibility. The mature SM concept addresses the entire spectrum of operations from
war fighting through peace support operations (PSO) to domestic operations and through the
five phases of operations; i.e. a single support concept for garrison and deployed forces is the
goal. In addition, CIS must be robust such that the loss of any single workstation, server or
communications means has the minimum operational impact.
1-6 B-GL-351-001/FP-001
Signals in the Land Force Operating Environment
5. Mobility. Headquarters must possess a high degree of strategic and tactical mobility to
facilitate flexible C2. System support capabilities must possess the same degree of mobility.
Hardware repair (primarily through replacement of faulty communications or computer
components) should be carried out as far forward as possible. Software repair6 (less data and
quick-fix issues) is normally carried out as far back as possible.
1. Within Signals, there are functional responsibilities directly associated with providing the
means of C2 to a commander and their staff. These responsibilities, as they pertain to the
signal network, can be categorized as:
6
Software repair in this context refers to issues such as adjustments to computer code and development of software
patches. Software problems that can be resolved through simple re-installation of applications are carried out on site.
B-GL-351-001/FP-001 1-7
SILO — Principles and Fundamentals
2. It is important to note that the above categories are mutually supportive of each other
and only by achieving synergy amongst the categories can effective signal system support be
achieved. Also key to note is that the term “system” is not limited to only the physical personnel,
equipment and networks, but encompasses the electromagnetic spectrum, tactical and technical
processes, operational mission, and the entire compliment of information that is applicable to
accomplishing that mission.
b. System Adaptation. The Signals command and staff needs to create the
conditions for maintaining the operating integrity of the supporting information
bearer capabilities.
SECTION 2
THE OPERATIONAL ENVIRONMENT
113. GENERAL
1. 21st century armies conducting land operations must remain flexible, adaptive, and
capable of succeeding across the entire continuum of operations. No longer is the massing of
armies along fixed lines, using the acquisition of physical territory as the indicator of success or
failure, the norm; however, this must remain as a potential threat. The modern threat is
asymmetrical and the battlefield of the future is often a non-linear, non-contiguous battlespace
to be potentially fought in urban terrain and complex environments wherein the threat is not
readily identifiable. Combatants may well be insurgent groups, organized military or possibly a
combination of both.
1-8 B-GL-351-001/FP-001
Signals in the Land Force Operating Environment
2. The rapid advances in technology and its application in weapons and communication
networks have become relatively inexpensive to place in a nation’s arsenal or in the hands of
insurgent organizations. The ease of acquisition has given an adversary the potential to be a
lethal threat to the stability of not only states within their sphere of influence but also to global
peace.
3. The operating environment is the overall operational and tactical circumstances in which
the LF is expected to conduct operations. It exists on both the physical and psychological
planes. It is a complex mix of the geographical, environmental and human factors that
collectively and significantly complicate the conduct of operations.
5. As a direct result of the complexity of the operating environment, the threats within it and
the technology available both to us and our adversaries, Signals has two major functions in
support of LF within the LF operating environment:
a. Signals must enable Commanders at all levels to command and control their
forces in the successful completion of their assigned mission across the entire
Spectrum of Conflict within the Continuum of Operations; and
B-GL-351-001/FP-001 1-9
SILO — Principles and Fundamentals
1. The spectrum of conflict is a backdrop for all operations and describes the environment
in which they occur. The main discriminator is the level of violence involved, which ranges from
peaceful interaction amongst international players (states, corporations, non-government
agencies (NGOs)), through low-level conflicts, to general war (see Figure 1-3). Military forces
operate throughout this spectrum.
1-10 B-GL-351-001/FP-001
Signals in the Land Force Operating Environment
4. Signals must made aware of and understand the requirements of all forces operating
throughout the spectrum of conflict and provide Commanders at all levels, regardless of their
place within that spectrum, with the Command Support and offensive, defensive and stability
operations support (as they pertain to the EM battlespace) that best suit the demands of the
supported LF at any given time or instance. Signals must ensure that the support provided is
adaptive, responsive and simple enough to respond to the exigencies of the constantly evolving
framework that is defined as the continuum of operations.
7
Army Terminology Panel
B-GL-351-001/FP-001 1-11
SILO — Principles and Fundamentals
1. Adapting to the JIMP framework is instrumental to the success of the command function
particularly in the Comprehensive Approach to Canadian operations. The LF can anticipate that
few if any future operational deployments will be conducted outside of this framework. How one
deals with events as one moves through the continuum of operations will differ as will those who
have responsibility for response in a supporting or supported role to a given emergency or
contingency. Under the JIMP framework, the military becomes just one of the many effects
available to government in the context of domestic, continental or international operations. This
applies equally to all elements of national security, including civilian security partners, in order to
achieve unity of effort through Collaborative Working (CW), collective response and combined
effects. In many campaigns, the military will be in a supporting role depending upon the cause
of the crisis and the requirement to exercise that element of power.
2. This serves to reinforce the point: for the LF command systems to be effective within the
JIMP framework, they must be applied in harmony with many other actors and commanders
must be personally engaged in the process. Indeed, the Chief of the Defence Staff (CDS)
charges his strategic staff and operational level HQ to maintain such contact and liaison with all
potential security partners.8 Commanders at section through formation levels must be
cognizant of and be prepared to operate within the JIMP framework. All levels of HQ,
8
CDS, Concept of Operations: CF Strategic Command. NDHQ, 14 Nov 05
1-12 B-GL-351-001/FP-001
Signals in the Land Force Operating Environment
particularly land formation and unit task force, must be organized to engage and interact with
local authorities, non-governmental organizations (NGOs), other government departments
(OGDs), other security services, etc. This involves staff, liaison and communications personnel
with the right training, education, skills and collaborative tools to engage actively with civilian
agencies to achieve coherent mission planning and execution.
3. The interagency aspect, though not well understood, is key to mission success, in
particular as it is at the heart of the strategy for the Comprehensive Approach. Mutual
understanding, liaison, building trust, confidence and a sense of common purpose with other
players (and even integrating them into campaign planning or sharing information) are at the
heart of effective command and mission success. A network of liaison teams must be
established to reinforce the concepts of CW, Effects Based Approach to Operations (EBAO),
and Network Enabled Operations (NE Ops) with emphasis on psychological effects. The priority
function of a formation HQ will be to plan and synchronize psychological effects, with the
delivery of physical effects left to the tactical commanders, within the commander’s intent and
extant targeting rules. Command and Control Information Systems structures, processes,
systems and security measures must allow for civilian integration within any operation.
4. Multi-National (MN) operations have broad implications for Canada particularly in a lead
nation context. Our recent history suggests that Canada is likely to be asked by NATO, the UN
or possibly other coalitions to command an MN force at the formation level. Commitments such
as these bring real benefits to Canada in terms of influence and presence, and provide all
elements of the LF with much needed operational experience in the LF operating environment.
The most likely mission will involve a CF-led MN force at the land formation level. Implicit in this
is the capacity to provide the core command and command support capabilities regardless of
the staff composition and contribution from coalition partners. Within an MN staff there is a
need to assemble the team early in the training and mounting stages in order to build trust and
cohesion. Equally, clear operating procedures are essential, and the staff decision tools and
CIS must impose limited training and be configured to cater to the appropriate security domain.
Signals must be prepared to provide a core command support capability that can expand to
accommodate an MN formation and/or units and operate concurrently with national command
elements (NCEs). Command systems, processes and procedures must account for the
technological awareness of the entire MN team and be designed with this in mind.
B-GL-351-001/FP-001 1-13
SILO — Principles and Fundamentals
SECTION 3
TYPES OF LAND FORCE OPERATIONS
1. The broad range of tactical level operations, tasks and activities that are conducted to
realise success in a campaign are divided into three groupings or categories as follows:
a. offensive operations;
c. stability operations.
2. These types of tactical level operations, together with tactical tasks, describe the total
tactical activity undertaken by a military force within a campaign. Each type is guided by a set
of principles. These types of operations are further broken down into subordinate types of
tactical operations (see Figure 1-5). Operations will be further discussed in Chapter 6 of this
volume.
1. The intent that Canada will deploy a CF expeditionary capability has been recognized in
the recent establishment of an expeditionary command. The emphasis at the moment is on
structure with doctrine, process, culture and equipment being considered in parallel.
2. The implications of creating a full spectrum expeditionary capability for the CF are not
readily apparent. One can surmise that a joint C2 capability will be required along with a
harmonization of the key command support elements. The challenge will be to identify the
1-14 B-GL-351-001/FP-001
Signals in the Land Force Operating Environment
requirements, based on a solid joint doctrinal foundation, sufficiently early enough to allow the
new capability to be fielded for maximum effectiveness from the outset. The LF plays a key role
in CF expeditionary operations and will be an important participant in developmental aspects of
a joint capability. Expeditionary forces are inherently joint and must have processes and
systems in place that allow communications and collaboration without reliance on ad hoc
solutions. This implies a set of core capabilities at high readiness and with the necessary
mobility. Land HQs must be rapidly deployable domestically or internationally by a combination
of air, sea and land (rail); therefore their design must facilitate strategic mobility. To improve
responsiveness and agility, expeditionary forces must leverage the use of networks for
collaborative working and reach-back communications. Split-base operations can be part of the
design of forward Command elements.
1. With the stand-up of Canada Command (CANCOM), there will soon be more clearly
defined Command requirements for the surveillance of, and conduct of operations within,
Canada’s territory, airspace and coastal approaches. It is important to note that although the
location of the operations is different than Expeditionary operations, the nature of the operations
and the campaign themes associated with them remain unchanged.
2. Canada Command has moved to re-energize a regional command structure, with joint
operation centres in each of the six regions, and as a consequence established a need for a
supporting CIS infrastructure. This has implications for the manning and command support
capabilities within each of the regional Joint Task Force (JTF) HQ, in particular the termination
of national CIS at the protected, classified and caveat levels. Less clear are the respective
command responsibilities for force employment (FE) and force generation (FG) between
CANCOM—ostensibly as the force employer—and the environmental chiefs of staffs.
3. The LF will need to ensure that its Tactical Command and Control Information System
(TacC2IS) is integrated such that it supports deployments within Canada using both military and
civil infrastructure. It is imperative that the C2 tools used both domestically and abroad are the
same to ensure that the Command Support process is seamless to LF Commanders and their
staffs.
1. To respond to the threats (real or potential), the Army must be prepared to conduct
operations as part of a Joint, Inter-Agency/Inter-Departmental, Multi-National and Public (JIMP)
effort. The application of military effects cannot succeed in isolation and the Army is but one
element of a comprehensive approach to address the root causes of conflict across the
continuum. This operational reality demands that today’s army be one that understands the
strategic imperatives to success and is able to coordinate within that JIMP environment to
achieve it. This operational reality demands a Command and Control Information
Systems architecture as its backbone to enable success. Signals must succeed at defining,
implementing and evolving that C2IS architecture.
2. Adapting to the JIMP framework is instrumental to the success of the command function
particularly within the national strategy of Diplomacy, Development and Defence (3D) context
for Canadian operations. The LF can anticipate that few if any future operational deployments
will be conducted outside of this framework. How one deals with events as one moves through
B-GL-351-001/FP-001 1-15
SILO — Principles and Fundamentals
the continuum of operations will differ as will those who have responsibility for response in a
supporting or supported role to a given emergency or contingency. Under the JIMP framework,
the military becomes just one of the many effects available to government in the context of
domestic, continental or international operations. This would apply equally to all elements of
national security, including civilian security partners, in order to achieve unity of effort through
CW, collective response and combined effects.
3. This serves to reinforce the point for the CF command systems to be effective within the
JIMP framework, they must be applied in harmony with the many other actors and commanders
must be personally engaged in the process. Indeed, the CDS charges his strategic staff and
operational level HQ to maintain such contact and liaison with all potential security partners.9
Commanders at section through formation levels must be cognizant of and be prepared to
operate within the JIMP framework. All levels of headquarters, particularly land formation and
unit task force, must be organized to engage and interact with local authorities, NGOs, OGDs,
other security services, etc. This involves staff, liaison and communications personnel with the
right training, education, skills and collaborative tools to overcome a natural mistrust and
engage actively with civilian agencies to achieve coherent mission planning and execution.
SECTION 4
OPERATIONAL CONCEPTS/IMPERATIVES
1. Collaborative Working and its sub-set collaborative planning are concepts gaining wide
acceptance within both the military and civilian environments. They have the potential to help
overcome the intra-military and civil-military cultural gaps which hinder communications,
common understanding and action, and the building of trust. Collaborative Working can create
new synergies and multiply the net capacity of the spectrum of partners and can be defined as
the process by which the collective intellectual power, experience and knowledge of command
and staff teams are applied to achieve a common intent.10
9
CDS, Concept of Operations: CF Strategic Command. NDHQ, 14 Nov 05
10
DRDC Valcartier, Collaborative Working in a Domestic Operation (CW in DOMOPS) Study, p. 5
1-16 B-GL-351-001/FP-001
Signals in the Land Force Operating Environment
b. the exercise of command-led operational art and the sensible use of mission
command will be critical to the success of EBAO; and
11
Army Terminology Panel
12
Army FEC, pp. 24 and 25
B-GL-351-001/FP-001 1-17
SILO — Principles and Fundamentals
SECTION 5
COMMAND SUPPORT13
125. GENERAL
1. Within the context of command, control is seen as a single yet vital element that is
exercised through command support, which is defined as the integrated system of resources
necessary to enable command. If “Control” is viewed as the means by which command is
exercised, this definition encompasses the idea that all resources (human, intellectual and
physical) involved in enabling the control of military operations by the commander, when
integrated as a system, are considered Command Support.
2. The most significant recent development in the army’s C2 capability has been the
increased application of information technologies to military operations. In the past, the staff
collected, processed, stored, displayed and disseminated battlefield information using a variety
of manual or analog systems. The signal and administrative communities supported these
activities through the use of combat net radio (CNR), teletype, manual dispatch services and
central registry systems. Battlefield information held by various commanders was often
inaccurate and untimely and the subsequent sharing of this information through analog systems
often led to very different views of the battlefield within a given command. This lack of shared
and common awareness of the battle space presented a significant impediment and risk to our
conduct of military operations.
3. The introduction of networked sensors and information systems within the military and
the digitization of battlefield information have blurred the clear dividing line between yesterday’s
staff and signal systems organizations. Communication and Information Systems networks now
link human operators to essential battlefield information through the provision of advanced
software applications. The human, intellectual and physical resources employed by the two
domains are now becoming part of a single integrated system.
4. The capability generated through the subsequent integration of the staff and signal
systems is now referred to as “Command Support.” The purpose of Command Support is to
enable the commander to exercise effective control of assigned military forces and operations
through the exploitation of battlefield information and CIS.
5. It is important to note that the information required by today’s military commander has
changed little over the years. The real change has occurred in our ability to effectively manage
that information and present it to commanders in a form useful for decision-making. To fully
exploit the technology now available to our forces, we must be prepared to rethink our existing
command support system from the ground up.
13
B-GL-331-001/FP-001 – Command Support in Land Operations
1-18 B-GL-351-001/FP-001
Signals in the Land Force Operating Environment
B-GL-351-001/FP-001 1-19
SILO — Principles and Fundamentals
Figure 1-6: The Model Shows the Linkages Between IM and SM, and Responsibility Layers
Between All-arms Command and Staff to Signals Command and Staff
14
In the purest sense, tactical information will answer “who,” “what,” “when” and “where” type questions. This
information must still be exploited by human beings, perhaps assisted by technology, to answer “why” and “”how
“type questions. While type of information processing would more properly be classified as “Knowledge
management,” this manual will assume information processing to include all of these questions.
1-20 B-GL-351-001/FP-001
Signals in the Land Force Operating Environment
(1) System Executive and Planning (SEP). The SEP functions occur at
the highest level of the formation. The SEP function includes planning,
issuing orders and instructions, and monitoring the execution of the plan.
The functions will depend on the nature and size of the deployment.
(2) Operational System Control (OSC). This is the next echelon of system
management and exists in all HQ above unit level and at formation
resources. The OSC responsibilities include performing technical
supervision of the system and issuing detailed directives to subordinate
system management facilities, in accordance with SEP orders and
instructions, concerning, move timings, times for opening and closing
links and nets, communication resources, Communication security
(COMSEC).
(3) Facility Control (FC). The FC is the control level, which is responsible
for the technical control of all CIS equipment and implementation of
respective OSC directives and orders at each communication facility.
The FC is responsible for the details real-time technical control of the
system equipment.
Figure 1-7: Primary Functional Components of SM in Their Relation to Signals Functions and
Tasks Within Command Support
2. System Management in network operations includes some of the following key tasks:
B-GL-351-001/FP-001 1-21
SILO — Principles and Fundamentals
1. Global connectivity is essential for linking strategic, operational, and tactical aspects of
command and control and the ability to project forces worldwide. CIS support operations
globally with space-based and terrain-based systems. CIS must be configured to provide the
required information support with a minimum of physical repositioning, whether in a strategic
deployment phase or moving for a tactical attack. Both military and commercial CIS play
important roles in today’s Land Force operations.
2. The Army uses information technologies on the battlefield to provide an integrated
Command and Control structure. The Army has migrated to a tiered common user core with
associated specialist applications, which will function in a seamlessly fashion in garrison and in
the field. This common user core concept uses Commercial Communication Services,
Multinational Military Satellite Communications and the LCSS as an information bearer. This
common user core is supplemented as required by specialist applications to deal with specific
information requirements or processing. The integration of modern CIS with our tactical units will
continue to enhance their connectivity, decision-making, and, ultimately, lethality, survivability,
and the ability to control the tempo of operations.15
15
B-GL-300-005/FP-001 Land Force Information Operations.
1-22 B-GL-351-001/FP-001
Signals in the Land Force Operating Environment
3. Much of the Land Force information traffic flows over commercial systems. This is quite
true domestically and like most nations the Land Force relies on elements of an information
environment it does not control (see Figure 1-8). Some examples of non-military networks are:
4. While the availability of non-military IS can often offer commanders an alternative means
to satisfy requirements there is a need to carefully assess the security risks of this option. Using
non-military IS may also reduce the requirement for deployed military IS, and allow planners to
compensate for shortages and or meet surge requirements in this area. Additionally, by using
non-military IS, there may be savings in support and maintenance. Signals have a responsibility
B-GL-351-001/FP-001 1-23
SILO — Principles and Fundamentals
for standardisation of non-military equipment and software used throughout the area of
operation (AO). Planners who deploy modular IS will need to ensure that these systems ideally
are open, non-proprietary, and have commonly accepted standards and protocols in order to
simplify the interface requirements.
129. SECURITY
1. The increasing dependence on CIS has created both increased capability but also
increased vulnerability. Computer systems and networks are vulnerable to attack at any time.
The Rand Corporation of the United States has stated that the anonymity of cyberspace has
blurred the distinction between crime and warfare and between accident and attack. A wide
range of methods and techniques can accomplish gaining access to someone’s computer or
communications network. Cyber attacks provide the opportunity for individuals or small groups
to wreak havoc on networked services and information that may have impact on a local,
regional, and global scale. These intrusions may be initiated at any time or any point in
operation. Accordingly, security measures and procedures must actively, as well as passively
preserve the confidentiality, integrity, and functionality of our networks.16
2. Communication systems such as microwave and satellite links between sites are
vulnerable as well to monitoring and tapping. A microwave system may emit a signal the
diameter of a nickel. That same signal will have a diameter of one mile when it reaches a
receiving dish approximately 20 miles away. Anyone with the right equipment can monitor the
signal if they are within the beam path. A communication satellite has a footprint that is as big
as North America. Once again, the signal is easy to monitor, and Signals must take all
necessary steps to preserve the integrity and functionality of the network by implementing good
security policies, installing cryptographic equipment and building a robust and redundant
network.
16
B-GL-300-005/FP-001 Land Force Information Operations.
1-24 B-GL-351-001/FP-001
SILO — Principles and Fundamentals
CHAPTER 2
THE TACTICAL COMMAND AND CONTROL INFORMATION SYSTEM
SECTION 1
GENERAL
201. INTRODUCTION
1. This chapter presents the principles and general characteristics of a tactical command
and control information system (TacC2IS) for the Canadian Land Forces in the early twenty-first
century. These principles and characteristics are not specific to any particular equipment or
system, but rather provide the conceptual foundations upon which such equipment and systems
are to be designed, constructed, operated, managed and employed. While this chapter lays out
the general requirements for information storage, retrieval, processing and display at various
Land Force (LF) organizational levels, it does not prescribe the technical implementation of a
TacC2IS by which to achieve them. Operations and engineering staffs must continually work
together to define and develop specifications for hardware and software that make maximum
use of evolving technologies to improve the physical implementation of the LF TacC2IS.
202. BACKGROUND
1. Command and control (C2) has always been a vital aspect of military operations, but
only recently has it used such an extensive amount of sophisticated technology. The increasing
range, speed and accuracy of modern weapons systems are continually shortening the time
available for the tactical decision-action cycle, while at the same time, improvements in
intelligence, surveillance, target acquisition and reconnaissance capabilities are producing more
and more information over greatly increased distances. Consequently, the real size of the
tactical battlespace is continually increasing. Advancements in technology are also enhancing
the mobility and the night-fighting capabilities of the world’s military forces, resulting in an
increased tempo of tactical operations.
2. Apart from the changes in the conduct of traditional tactical operations against opposing
military forces brought about by improvements in warfighting technology, the complex nature of
contemporary conflict sees Canadian Land Forces increasingly engaged in protracted battles
against forces employing asymmetric capabilities and tactics. Defeating such forces requires
the identification and tracking of trends in the behaviour of many groups and individuals
operating across a large geographic area, the timely dissemination of actionable intelligence to
the lowest echelons of our own forces, the rapid recognition and evaluation of innovations or
changes in the adversary’s capabilities or tactics and the constant sharing of information
throughout the force and with the force’s joint, interagency, multinational and public partners
(JIMP) in order to maintain the accurate shared situational awareness necessary to ensure unity
of purpose and co-ordination of action. Consequently, command and control of land tactical
forces in contemporary operations depends to an unprecedented degree on communications
and the ability to process information fast enough for decisions to be relevant.
B-GL-351-001/FP-001 2-1
SILO — Principles and Fundamentals
of C2 information. The TacC2IS is the component of the overall command support capability
responsible to provide computer-based information handling support to LF tactical commanders
and their staffs. As such, it constitutes the land operations extension of the CF integrated
command and control information system (C2IS).
1. The purpose of the TacC2IS is to support the information storage, retrieval, processing
and display requirements of LF commanders in the field. It supports tactical commanders at all
echelons and for all arms and services. In order to ensure that command support processes
remain focused on the commanders, and not their staffs, any special requirements of the staff
are subordinate to the direct needs of the commanders themselves. This does not mean that
the TacC2IS ties commanders to their HQ, only that TacC2IS resources are assigned to ensure
that the information requirements of commanders are met first, whether directly or through their
HQ staff.
2. The TacC2IS is built solely for the purpose of assisting in the tactical command and
control of land forces in operations. It is not designed to be used for the general administration
of resources such as maintaining the personnel records on each soldier. Those activities are
supported by CF enterprise information systems with connections to the TacC2IS as necessary.
At the other extreme, the TacC2IS is not intended to directly control the actions of specific
resources on the battlefield. For example, it will not be used to calculate the charge and
elevation for a gun and will not be used to tell a gun when to fire. These platform level C2
activities are supported by the single combat function information systems developed and used
by each arm and service, and/or by on-board fire control systems embedded within the
weapons platforms themselves.
3. The tasks performed in a given tactical HQ or command post (CP) may be considered to
be divided between common C2 tasks and specialized single combat function tasks. TacC2IS
provides the so-called Common User Core (CUC) of computer-based information storage,
retrieval, processing and display capabilities required for effective, efficient command and
control of land operations. This includes such things as office automation tools, messaging
capabilities, common database management facilities, electronic maps and other common
geospatial information. While the single combat function tasks performed within a specific
command post are, by definition, not common C2 tasks, some of them are so closely related to
C2 activities that including support for them in the TacC2IS is easily accomplished and,
furthermore, not including them in the TacC2IS reduces the overall effectiveness of the
command post. This loss in effectiveness is due to the need for personnel working in the
command post to frequently switch contexts between C2 tasks performed on TacC2IS
workstations and single combat function tasks performed manually or on different workstations.
In other words, where it makes sense to do so, certain single combat function information
storage, retrieval, processing and display requirements may be implemented directly in the
TacC2IS. Regardless, all single combat function information systems must interoperate with the
TacC2IS in such a manner as to maximize the efficiency and effectiveness of the overall
command and control of tactical land operations.
2-2 B-GL-351-001/FP-001
The Tactical Command and Control Information System
The TacC2IS must provide commanders at all levels timely access to accurate, relevant,
verifiable information in forms that make that information directly usable as an aid to
command decision making.
2. In addition to providing commanders at all levels with high quality information in support
of command decision making, an effective LF TacC2IS must exhibit the following general
system characteristics:
B-GL-351-001/FP-001 2-3
SILO — Principles and Fundamentals
c. Mobility: the ease with which the TacC2IS can move around on the battlefield in
response to changing operational needs and priorities. This includes such
considerations as software portability and the packaging and transportability of
installations and major system components.
3. Two final, but vitally important, characteristics essential to the effectiveness of the LF
TacC2IS are the protection of command integrity and the safeguarding of command authority:
2-4 B-GL-351-001/FP-001
The Tactical Command and Control Information System
The TacC2IS must not intrude upon, and should wherever possible enhance,
command integrity and command authority, thereby reinforcing and facilitating
the Canadian Land Force philosophy of mission command.
SECTION 2
ELECTRONIC COMPUTERS AS AIDS TO INFORMATION PROCESSING
205. GENERAL
1. The term data processing has traditionally been defined as the capture, storage, and
processing of data necessary to turn it into information upon which management and control
decisions can be based. There is an important difference between data and information. Data
are collected facts, which generally are not useful for decision making without further
processing. Information, on the other hand, is directly useful in decision making. Information is
based on processed data and is, therefore, the output of a data processing system. In practice,
however, the distinction between data and information is often difficult to make. One individual’s
data may be another’s information. For example, the ammunition held by individual soldiers is
certainly information to a frontline non-commissioned officer. However, when the decision
maker is the commander of a brigade, the ammunition holdings of individual soldiers are simply
data that must be further processed and summarized to be of use in his or her decision making.
Because electronic digital computers are being used increasingly at all levels of decision
making, the term information processing is used rather than data processing.
2. Each of the individual steps of information processing done by a computer can also be
done by the human mind. What makes the electronic digital computer so powerful is the speed
(orders of magnitude faster than human thought) and accuracy with which simple calculations
and/or logic operations can be processed. This makes it possible for the computer to perform
computational tasks that would otherwise be impossible because of time limitations. This, in
turn, allows the creation of information that would have been impossible to obtain with manual
systems simply because the amount of calculation necessary to produce the information would
have been prohibitive. Consequently, the use of electronic digital computers has substantially
increased the quantity of information available to decision makers in business, government and
B-GL-351-001/FP-001 2-5
SILO — Principles and Fundamentals
military organizations. However, the vast quantities of information made available by computers
are not always helpful to decision makers. So much information is now available that decision
makers sometimes have difficulty sorting it out in order to identify and use what is truly relevant.
Luckily, the processing power of the electronic digital computer, if properly applied, can aid this
as well.
2-6 B-GL-351-001/FP-001
The Tactical Command and Control Information System
B-GL-351-001/FP-001 2-7
SILO — Principles and Fundamentals
∗
The functions, capabilities and characteristics of telecommunications systems are presented in Chapter 2 of this
manual.
2-8 B-GL-351-001/FP-001
The Tactical Command and Control Information System
B-GL-351-001/FP-001 2-9
SILO — Principles and Fundamentals
1. A local area network (LAN) is simply two or more electronic digital computers connected
to each other in a single location, usually within a single building or facility. Some peripheral
electronic devices such as printers, plotters, scanners, projectors and the like can also be
connected directly to a LAN so that they can be used by anyone on the network. Individual
LANs at different locations can be interconnected by so-called wide area networks (WAN) that
make use of telecommunication systems to convey information between computers on
geographically separated LANs. There are three roles for computers in a network:
a. Clients: computers that use but do not provide network resources.
b. Peers: computers that both use and provide network resources.
c. Servers: computers that provide network services.
2. The type of operating system a computer uses determines which role it plays. Servers
run network operating systems. Clients run client operating systems. Peers run peer network
operating systems. However, since many commercially available operating systems support
more than one of these roles, the manner in which a computer is actually used on the network is
often what determines its role. Based on the roles of the computers attached to them, networks
are divided into three types:
a. Client-Server (also called Server-based) Networks: are defined by the
presence of dedicated servers on the network that provide security and
resources to the network. Client-server networks divide information processing
tasks between clients, which request services such as file storage or web page
access, and servers, which provide the services. There are many types of
servers, including file servers (often called shared drives), print servers,
application servers (including database management systems [DBMS]), e-mail
servers and web servers, among others. Server computers are typically more
powerful than client computers, and are often optimised to function as servers.
Client-server networks require users to login to the network before access to
servers is provided. A user can work on a client as a stand-alone computer
without logging in to the network, but without login authorization from the
2-10 B-GL-351-001/FP-001
The Tactical Command and Control Information System
c. Hybrid Networks: are defined by the presence of all three types of computers
operating simultaneously. This means that while most shared resources are
located on servers, network users still have access to any resource being
shared by peers in their workgroups. Users can work on a client and access
peer resources without logging in to the network, but in order to access server
resources, that user must login to the network through the centralized security
controller.
3. The Internet is the largest and most familiar WAN in the world; however, a great number
of businesses, governments and private organizations operate private WANs, called intranets,
to interconnect their internal computer users at different geographic locations. The Internet has
had a profound effect on the storage and retrieval of information. It effectively pools all of the
information that is stored on all of the servers linked to the Internet to create the largest
collection of data and information ever assembled in human history—all accessible to anyone
with an electronic digital computer connected to the Internet. Intranets allow the pooling of
information within an organization so that information whose distribution must be restricted to
those within the organization can be shared internally among all users connected to the intranet.
SECTION 3
COMPUTER-BASED INFORMATION SYSTEMS
209. GENERAL
B-GL-351-001/FP-001 2-11
SILO — Principles and Fundamentals
executed by the computer hardware within the system. In other words, in a computer-based
information system, the actual processes by which data and information are transformed into
outputs for use by decision makers are a prudent combination of procedures, carried out by
people, and programs, executed by electronic digital computers.
2. Generally speaking, the more complex and unstructured the decisions to be supported
are, the more intertwined and interactive the human procedures and the computer programs
must become. The goal within any computer-based information system is to design information
processes so as to maximize the use of computer programs to mechanize, enhance and even
automate the procedures associated with storing, retrieving, processing, displaying and
communicating information, while still retaining the necessary degree of human insight, intuition
and judgement throughout each process to ensure that decisions made with the help of the
system are appropriate and effective. This implies that the application programs within a
computer-based information system cannot be developed in isolation from the human
procedures with which they must interact in order to provide the required quality of output to the
decision makers. Conversely, the human procedures within a computer-based information
system cannot be developed in isolation from the application programs intended to mechanize,
enhance and even automate many of those procedures in order to improve the quality of output
available to the decision makers.
The design and implementation of the human procedures and the computer
programs within any computer-based information system must result in
processes that reflect the truly symbiotic relationship between people and
computers in all such systems.
3. Beyond that, the ways in which these information handling processes are defined,
shaped and interwoven with inputs, data files, outputs, people and hardware to form the overall
computer-based information system by which decision makers are supported will be determined
largely by the nature of the decisions to be made and the characteristics of the decision making
environment. In other words, the true “power” of the computers used in such systems cannot be
measured by the speed of their processors and the size of their memories; rather, it must be
assessed by the degree to which they allow human thought, creativity and intuition to interact
with the computational capabilities of electronic digital computers to create powerful new ways
of formulating, understanding, analysing and, ultimately, solving the complex problems faced by
decision makers at all levels of the organization. Thus, the value of the computers within an
organization is determined by the ease with which users can understand, configure, manipulate
and communicate with those computers in order to have the computers mechanize, enhance or
automate procedures in ways that allow the users to achieve their information processing goals
with effectiveness, productivity, safety and satisfaction under the intended operational
conditions.
4. The need to support different types of decisions made under different operational
conditions has led to the emergence of a number of more or less standard classes of computer-
based information systems. Commonly encountered classes include business information
systems, real-time (information processing) systems and modelling and simulation systems.
These classes represent broad collections of systems unified by some dominant purpose,
feature or characteristic. Within each class, there are a number of categories into which specific
systems can be placed. Classifying and categorizing computer-based information systems is a
2-12 B-GL-351-001/FP-001
The Tactical Command and Control Information System
slippery undertaking; the classes and categories tend to blend, separate and change over time
in response to changes in technology, changes in the computing environment and changes in
the tasks to which electronic digital computers are applied. However, despite the shortcomings
of computer-based system classification schemes, they still do have a practical use. Even
though the boundaries and definitions shift, often resulting in overlaps and inconsistencies, each
system class and category emphasises certain features that may be relevant in any particular
situation. Therefore, the most practical use of computer-based system classifications is in
identifying a number of widely usable features that are typically associated with particular
system types.
5. Army tactical C2 information systems form a distinct class of computer-based
information systems that is unlike any other class of computer-based system presently found in
the world. While they share individual functions and characteristics with a number of traditional
types of computer-based systems, the total requirement creates a unique type of system that is
neither simply a new category within an existing class nor a mere aggregation of categories of
systems drawn from different existing classes. The best way to describe army TacC2IS as a
class of system is first to describe some of the system categories found within the traditional
classes of computer-based information systems, and then to synthesize the relevant functions
and characteristics from each category into a coherent portrayal of an army TacC2IS.
1. The most obvious class of computer-based information systems with which to begin any
consideration of army TacC2IS is business information systems. These give managers at all
levels of a business or government organization the ability to collect, analyse and summarize
the diverse types of information they need to perform effectively. Throughout business and
government, management uses information for two purposes: planning and control. Planning
occurs prior to the execution of any organizational activity. Objectives are established in the
planning process. Planning depends to a large degree on predictive and external information.
Historical information is useful in planning only in that it helps management predict the future.
Control is the process of comparing actual results with the plans identified in the planning
process. Feedback information about the performance of the business or governance system is
used by management for control. When deviations from the plan are detected, management
attempts to get the business or governance system back in control by making changes to the
inputs. Thus, a large percentage of the information produced and used within businesses and
government is feedback. Business information systems monitor the business or government
operation being controlled, compare the operation’s outputs to plans, and provide the feedback
information necessary for management control. The use of computer-based information
systems to support management planning and control within both business and government has
always been directed at making operations more effective and efficient; however, since the mid-
1980s the emphasis within the business community has shifted toward using those same
systems to gain competitive advantage in the marketplace.
2. The computer-based information systems used in business and government have
traditionally been more successful in providing information for control decisions than for
planning decisions. In other words, their success has tended to decrease the higher the level of
decision making. However, advances in a wide-range of electronic digital computer
technologies have made the use of computer-based information systems increasingly applicable
to planning, as well as to decision making at the higher levels of organizational control.
Consequently, over the years, a hierarchy of system categories has emerged within the
business information system domain to account for the stratification of information processing
B-GL-351-001/FP-001 2-13
SILO — Principles and Fundamentals
activities generally performed within business and government organizations to transform mere
data about an organization’s interactions with its environment into the sort of information needed
by decision makers at various levels of management and control within the organization. The
standard model consists of a hierarchy of four categories of computer-based business
information systems, supported by a fifth category that spans all four levels.
3. At the base of the business information system hierarchy are the transaction processing
systems (TPS), which give workers and their first-line supervisors ready access to information
that ensures the effective conduct of the organization’s minute-to-minute activities. These
systems also populate the database(s) used by the systems at the other levels of the hierarchy.
The second level of the business information system hierarchy consists of the management
information systems (MIS) that help lower and middle-level managers implement the
organization’s policies and plans by providing information that helps maintain and, whenever
possible, increase employee performance, product quality and customer service. The third level
of the business information system hierarchy comprises the various decision support systems
(DSS) that are used to analyse alternatives and answer what-if questions in order to inform
management decisions regarding future actions. Finally, at the pinnacle of the business
information system hierarchy, are the executive information systems (EIS) that support top-level
managers in formulating strategy and policies. All four levels of the hierarchy are supported by
office automation systems (OAS) that provide computerized support to routine office work in the
form of word processing, presentation packages, electronic spread sheets, electronic calendars
and so on.
1. The shared database is the key building block in the design and implementation of any
business information system. The shared database is the prime integrating force that provides
coherence to the overall information system. If a good fit is not achieved between the
processing and decision-making needs of the organization and the database, in terms of the
accuracy, timeliness, relevance, verifiability and usability of the information supplied, the design
and implementation efforts expended on the other elements of the system will have been in
vain. A database consists of data elements organized into records and files in a way intended
to most efficiently meet users’ information requirements. The data stored in an organization’s
database provide meaningful representations of the real-world entities that influence and are
influenced by the decisions made within the organization. For example, sales clerks may often
need to know how many pieces of angle iron are in stock in order to fulfill a customer’s desire to
purchase some angle iron. It would be impractical to have to go to the warehouse and count
the number of items every time to know the quantity on hand. Instead, a clerk accesses the
data within the information system that represents the actual angle iron inventory. Clearly, to be
of use to a sales clerk, the data retrieved from the database must be accurate and up to date,
reflecting the precise quantities of angle iron presently stored in the warehouse. It must also be
displayed to a sales clerk, in a usable form, in less time than it would take the clerk to go to the
warehouse and count the angle iron.
2. The warehouse manager, on the other hand, probably does not care about the minute-
to-minute tally of angle iron on hand; however, he or she probably does want to know when the
amount of angle iron in the warehouse reaches a certain level, so that more can be ordered
before the warehouse runs out of stock. The same database that was used to tell the sales
clerks precisely how many of each type of angle iron was on hand can inform the warehouse
manager when a certain threshold level of angle iron is reached, triggering a decision to order
more angle iron. At still higher levels within the organization, an executive might wish to know
whether angle iron will continue to be a profitable item to stock in the coming year. The
2-14 B-GL-351-001/FP-001
The Tactical Command and Control Information System
database can provide historical data to support the analysis of sales trends, the impact of
certain market factors on profits from angle iron and so on in order to inform the executive of the
likely outcomes of various plausible alternative situations. In this way, a well-designed database
integrates all of the information that is important to the organization so that it can be efficiently
and effectively stored, retrieved, processed, displayed and communicated as needed by
decision makers at all levels.
2. Transaction processing systems control the collection of specific data in specific formats
and in accordance with rules, policies and goals of the organization. They generally include
components to collect, retrieve, and report data on each individual transaction, as well as to
make these data available for processing as part of other transactions, for use in management
decision making or for some strategic purpose. Certain TPS such as airline reservation
systems may automate some decision-making functions within a transaction, such as finding the
flight that best meets the customer’s needs. Examples of TPS are point-of-sale systems, order-
entry systems, distribution and logistics systems and general accounting systems. Transaction
processing systems were the first type of computer-based business information systems, but
now TPS applications are usually just components of a more comprehensive business
information system.
3. Organizations keep detailed records of individual transactions for four primary reasons:
B-GL-351-001/FP-001 2-15
SILO — Principles and Fundamentals
organization’s front-line employees, managers use both detailed and summarized records of
business transactions to make decisions. They need to follow trends, identify problems and
verify that their decisions have the impact they expect. By recording detailed transaction data
directly in the organization’s database, the TPS makes that data available to the organization’s
managerial decision-making processes. Audit trails based on the transaction data stored by
TPS can be used both externally, as in independent audit of financial reporting, and internally,
as in troubleshooting a business problem.
5. The primary design objectives for a TPS are (a) to provide employees and first-level
supervisors with timely access to accurate, up-to-date information in formats that allow that
information to be used directly in the performance of specific business transactions and (b) to
get the correct data entered into the system with the least amount of time and effort. Since the
goal is to correctly carry out and record all business transactions with minimum time and effort,
TPS are based on detailed models of how each particular transaction should be processed.
Most contain enough structure to enforce rules and procedures for work done by clerks or
customer service agents. A well-designed TPS can minimize data entry effort and reduce errors
by automatically filling in data such as a customer address or unit price once the user has
entered the customer number or product identification. Some TPS bypass clerks entirely and
totally automate certain business transactions, such as the way automated teller machines
(ATMs) automate deposits and cash withdrawals. Either way, a well-designed TPS checks
each transaction for easily detectable errors such as missing data, data values that are
obviously too high or too low, data values that are inconsistent with other data in the database
and data in the wrong format. It may also check for required authorizations for the transaction.
Finally, when all the data for the transaction have been collected and validated, the TPS stores
the data in a standard format for later access by others. The key attribute of any TPS is
“throughput,” the volume of transactions that can be correctly processed in a given time.
2-16 B-GL-351-001/FP-001
The Tactical Command and Control Information System
feedback about performance indicators such as productivity, product quality and customer
service. A typical MIS report provides summary information rather than the details of individual
transactions; however, much of the information that the MIS uses is initially captured and stored
by one or more TPS. The key difference is that transaction processing is oriented toward
capturing, processing and storing data, whereas an MIS is oriented toward using the data to
produce management information. For example, a list of every sale that occurred during a day
or week would be extremely difficult for a manager to use in monitoring a retail store’s
performance. However, the same data could be summarized in measures of performance such
as total sales for each type of item, for each salesperson, and for each hour of the day. In this
example, the computerized inventory and price assistance provided to transaction processing
remains essential, but the MIS then summarizes and organizes the data collected by the TPS to
present information for use by management. As the data are collected through various TPS,
they also become available to produce the reports required by an MIS. Historically, most
organizations implemented TPS first, since efficient processing and tracking of transactions with
customers was (and is) a necessity in both business and government. The concept of MIS
emerged partly as a response to the shortcomings of these first computerized TPS, which often
improved transaction processing but provided little information useful for management decision
making.
4. One of the most important components of an MIS is the management reporting system
(MRS) that retrieves data from the database and presents it to users in the form of reports. A
report is simply a printing or display of items of information in a form that is useful to managers.
The representation of information in a report can be textual, graphical, pictorial or whatever
other format is best suited to aiding the manager in understanding the significance of the
information and then using it in his or her decision making. The MRS used by managers within
the individual functional areas of an organization is often simply the reporting component of the
respective TPS. At higher levels of management, MRS can combine data from two or more
TPS (through the DBMS) to provide information that managers could not obtain from the
individual systems. Managers generally use some combination of detail reports, summary
B-GL-351-001/FP-001 2-17
SILO — Principles and Fundamentals
reports, exception reports and predictive reports to monitor organizational performance and
identify problems:
d. Predictive Reports: are useful in developing plans for future activities. They
often make use of statistical and modelling techniques such as regression, time-
series analysis and simulation. These reports help management personnel
answer what-if questions about their part of the business. The statistical and
modelling techniques that produce predictive reports depend largely on
historical data. Such data must be readily accessible by the MIS in a form that
can be used by the models; otherwise, these models will be of little use to
management.
5. Management reporting systems must produce management reports such that managers
are provided with the information they need at the appropriate time without overloading them.
To achieve this, MRS typically employ three report generation strategies: periodic, event-
initiated and on-demand:
2-18 B-GL-351-001/FP-001
The Tactical Command and Control Information System
6. The primary design objective for an MIS is to provide managers with timely access to
accurate, relevant, verifiable information about the organization’s current performance in
formats that allow that information to be used directly in their decision making. Management
Information Systems are used to allow managers to recognize when current performance is
deviating significantly from planned or expected performance, in terms of some agreed upon set
of performance measures, so that they may initiate appropriate corrective action within their
portions of the organization. Most contain enough structure to enforce organizational policies
and procedures for work done by managers and front-line supervisors. A well-designed MIS
can minimize the time and effort required to recognize and diagnose problems and to initiate
appropriate corrective action by presenting information in consistently structured, easily
understandable formats that allow users to grasp the significance of the information straight
away, and by automatically transferring information generated during monitoring and diagnosis
into the formats used to communicate instructions and other control information to the elements
being managed. Some MIS bypass managers entirely and totally automate certain routine
monitoring and control functions. Either way, a well-designed MIS allows managers to identify
deviations from planned performance and assists them with the selection and initiation of
appropriate corrective actions to prevent those deviations from causing adverse consequences
B-GL-351-001/FP-001 2-19
SILO — Principles and Fundamentals
for the organization. The key attribute of any MIS is “data integration,” the degree to which the
disparate pieces of data important to decision making throughout the organization can be
maintained, aggregated and manipulated to provide individual decision makers with timely,
accurate and relevant information in a form they find useful.
2. The common thread through a wide range of DSS applications is that they emphasize
analytical work rather than transaction processing, general management work or general office
work. Decision Support System software helps with tasks such as figuring out the best way to
load and ship a product on trucks and trains or determining how running one customer’s order
affects another order in the pipeline. Essentially, a DSS is used to model a complex set of
circumstances and then allow the user to manipulate various parameters of the model to assess
the impact of diverse conditions. A DSS supports this work by providing flexible, user-
controllable methods for displaying and analysing data and formulating and evaluating decision
alternatives. The users of the various application software packages and computer programs
within a DSS might include managers themselves for certain general types of analysis,
functional specialists within a manager’s staff for more elaborate analyses within a particular
field of activity and highly skilled analytical specialists (e.g., operations researchers and/or
management scientists, economists, behavioural scientists, etc.) for the application of rigorous
analytical methods and techniques to complex managerial problems.
3. As with all computer-based information systems, a DSS comprises the input, data files,
processes, outputs, people and hardware needed to store, retrieve, process, display and
communicate information in ways that are both relevant and useful. Many DSS users do a lot of
analytical work and feel comfortable working with models, data analysis and statistics. To be of
benefit to the planning and control of an organization’s activities, however, the DSS must
provide effective, efficient mechanisms by which managers can present problems to the system
for analysis, and by which the results of those analyses can be communicated to managers in
ways that support, not supplant, their decision making processes. In cases where the
managers themselves conduct the analyses, aided only by the software applications available
2-20 B-GL-351-001/FP-001
The Tactical Command and Control Information System
directly to them, the need is for appropriate user interfaces to the software. In cases where the
analyses are conducted by people other than the managers who must make the actual
decisions, the need is for well-articulated procedures, techniques and tools for (a) accurately
translating managerial questions into problems to be solved by analysts employing specialized
methods and techniques and (b) presenting the results of the analyses back to managers in
forms they can understand and use effectively within their overall decision making processes.
e. improved communication;
5. Decision Support Systems originally relied on improved user interfaces, graphical and
statistical methods and simulation and optimization models to support better decision making.
Many once-innovative DSS concepts are now common across many types of business
information systems. For instance, predictive reports generated by an MIS might well be based
on simple simulations and elementary statistical techniques originally implemented only in highly
specialized DSS. Nonetheless, there are still many applications with a distinct DSS flavour. An
insurance agent showing a customer costs and benefits of various alternatives computed from
the details of the customer’s actual situation is an example of a DSS supporting repetitive
decision making by first structuring the customer’s decision and then providing information,
models and analytical tools to help the customer in making that decision. A production manager
using a process simulation package to determine the likely increase in productivity that would
result from the acquisition and use of an expensive new piece of equipment is an example of a
DSS supporting non-repetitive decision making by providing a detailed statistical analysis in
response to a simple what-if question.
6. The database provides access to internal or external data relevant to the decision
making being supported by the system. A business information system DSS normally retrieves
data from the same corporate database that is updated by the organization’s various TPS and
used by its MIS. These data form a baseline that mathematical models can use in extrapolating
from past to future conditions. Within the DSS, they are employed to analyse trends, make
forecasts and model various alternative situations. The knowledge base provides information
about highly complex relationships among data that an ordinary database has problems
representing. It consists of rules of thumb, known as heuristics, which define acceptable
solutions and methods for evaluating them. For instance, a knowledge base could incorporate
some heuristics about an appropriate ratio of staff to sales volume in order to signal if the
forecasted volume resulting from some proposed change exceeds the volume that the projected
B-GL-351-001/FP-001 2-21
SILO — Principles and Fundamentals
staff can handle. The model base typically includes an array of spreadsheets, simulation
packages, forecasting tools and statistical packages that allow DSS users to create what are
essentially sophisticated ad hoc queries of the data and knowledge bases, based on what-if
questions, that incorporate into their reports the uncertainty associated with forecasting future
events.
7. The user interface for a DSS must allow its users to control the data and models to be
included in their analyses. The flexibility of the DSS user interface contrasts with that typically
found in MIS and TPS where the user is more passive, receiving data in limited formats or
entering data into carefully crafted screens or forms. Because DSS support complex decision
making under conditions of uncertainty, users typically analyse many alternatives and extensive
data about each alternative. This means a high quality DSS should compare, contrast and
aggregate data in a wide range of graphical and tabular formats. This often requires the
application of statistical techniques to the data available within the database and/or the use of
simulations to conduct experiments relevant to the impending decisions. The computer-based
simulations in DSS range from simple Monte Carlo simulations run in an electronic spread sheet
to full-blown interactive process simulations of an entire business activity run in a sophisticated
modelling and simulation package. Because DSS users are usually not computer
programmers, a DSS must provide users with a language for manipulating the system’s models
that they find easy to understand and use. However, whereas an MIS simplifies user access to
data by employing carefully predefined formats that impose structure for the purpose of
supporting timely control decisions, a DSS allows users to construct previously undefined
formats based on innovative queries that generate novel combinations of data elements to
answer what-if questions for the purposes of exploring decision alternatives in support of
planning. Essentially, these ad hoc queries are the manager’s what-if questions, along with
descriptions of the relevant factors and conditions of interest for the decision to be made, re-
formulated to match the DSS user’s choice of models and analytical techniques.
8. The primary design objective for a DSS is to provide managers with timely access to
accurate, relevant, verifiable information about the likely effects of various alternative courses of
action in formats that allow that information to be used directly in their decision making.
Decision Support Systems are used to allow managers to explore and, if possible, quantitatively
compare decision alternatives in terms of some agreed upon set of performance measures.
Most contain enough structure to support rigorous analysis of the alternatives. A well-designed
DSS allows managers to understand (a) which course of action is preferable in terms of the
criteria applied during the analysis, (b) which factors relevant to the decision those criteria
represent and (c) the degree of uncertainty associated with the preference for one alternative
over all others. The key attribute of any DSS is validity, the degree to which the models within
the system, including those created by users, provide a useful representation of the real world
problem confronting the decision maker.
2-22 B-GL-351-001/FP-001
The Tactical Command and Control Information System
monitoring operating results and general business conditions. Sometimes called “executive
support systems,” these systems attempt to take over where the traditional approach to MIS
falls short. Although sometimes acceptable for monitoring the same indicators over time, the
conventional MIS practice of providing pre-specified reports, either on a scheduled basis or on-
demand, is too inflexible for many questions executives really care about, such as
understanding problems and new situations. In order to address this deficiency, EIS provide
executives with the status and performance information they need, as well as helping them
understand the causes of exceptions and surprises.
2. The point of any EIS is to provide executives timely access to the accurate, relevant,
verifiable information they need, whenever they need it and in whatever form they find to be
most useful. A well-designed EIS is an upward extension of the various MIS and DSS within an
organization. For an EIS to operate effectively, line managers, functional staff members and
analysts throughout the organization must ensure that the information available to executive
decision makers from various other systems through the EIS is timely and accurate. The
essential purpose of the EIS is to allow the executive to determine, interactively with the system,
which information is relevant and in what form it is most usable. For example, an EIS might
allow its users to isolate and interactively re-organize information from a standard financial
report generated by an MIS to combine, aggregate and represent the information contained in
the report in a variety of ways that allow their experience and intuition to “see” the information
from many different perspectives. It may also allow users to combine the information from a
number of different MIS reports to create entirely new aggregations and perspectives that cross
the functional, departmental and geographical lines of management within the organization.
This type of semi-structured, interactive dialogue with the information available within the
organization is a key to sparking the sort of creative insights necessary for understanding novel
situations, making new connections between potential causes and effects and generating
innovative solutions to problems. Thus, an EIS aims to support the creative and intuitive
aspects of running a business or government organization, rather than the more structured and
analytical aspects associated with the routine planning, direction and control of standard or
ongoing activities.
3. An EIS typically provides a set of integrated computer tools that allows a decision maker
to interact directly with the data and models available within the organization’s computers in
order to retrieve information useful for understanding novel or complex situations and for
supporting unstructured decisions. Such decisions might involve plant expansion, mergers,
acquisitions or new products. Executive information system users can interactively choose
among numerous tabular or graphical formats for the display of outputs. They can also control
the level of detail, the triggers for exception conditions, and other aspects of the information
displayed. To facilitate this, an EIS provides user-friendly languages and interfaces to give
decision makers direct control over the information retrieval, processing and display capabilities
of the system. An EIS is intended for use by people with high levels of knowledge and insight
into the business activities they plan and direct, but perhaps very limited computer-related
knowledge and formal analytical skills.
4. Executives who use EIS often receive the results of analyses done by others, but rarely
spend time doing analytical work themselves. Consequently, EIS are much more concerned
with providing information in an easy-to-use format than providing sophisticated analytical
capabilities such as statistical tests or model building. Although they sometimes resemble DSS,
EIS respond to the particular requirements of top-level managers. They focus less on modelling
and more on assembling and displaying data, recognizing trends, determining underlying
causes and communicating knowledge. Executives generally use EIS to answer specific
B-GL-351-001/FP-001 2-23
SILO — Principles and Fundamentals
5. The primary design objective of an EIS is to provide executives with timely access to
accurate, relevant, verifiable information about the organization’s overall performance, including
its position in the business market or public opinion, in formats that allow that information to be
used directly in their (strategic) decision making. Executive Information Systems are used to aid
executives in exploring the deeper significance of the organization’s information by allowing
them to shape and study the available information in imaginative and original ways based on
their experience and insight. Most impose very little structure, leaving users free to organize
and re-organize information in as many ways, and in as many formats, as possible. A well-
designed EIS allows executives to find novel or innovative relationships within the organization’s
information in order to (a) grasp the underlying causes of problems with the organization’s
performance, (b) recognize important new opportunities for the organization and (c) identify
emerging threats to the organization’s success. The key attribute of any EIS is intuitiveness, the
degree to which the system not only behaves in ways that appear intuitive to users (making it
easy to use), but actually stimulates the user’s intuition and supports creative problem solving in
the domain of interest.
2-24 B-GL-351-001/FP-001
The Tactical Command and Control Information System
B-GL-351-001/FP-001 2-25
SILO — Principles and Fundamentals
responsiveness to external events; however, it is usually not a disaster if the response to a user
command entered into a word processor is not forthcoming. The user may become annoyed at
having to wait for responses to individual commands, but if the overall word processing job can
be done faster, more effectively and/or more economically with the aid of an electronic digital
computer to mechanize, enhance and automate the many procedures involved (including those
associated with communicating and/or subsequently modifying the text), then the user will
simply adapt to the lack of responsiveness and use the computer anyway. Similarly, a
computer-aided procedure that takes anywhere from several minutes to a few hours to produce
an output from some associated input is perfectly acceptable if the business decision it informs
only has to be made within a day or two of the time the information is available for processing.
3. A real-time system, on the other hand, interacts with its environment with the explicit aim
of affecting, usually by controlling or alerting someone who can control the current state of some
part of that environment. It is this aspect of directly controlling the current state of some portion
of its environment that distinguishes a real-time system, where response time is critical to
mission success, from an interactive system, where response time is important but not crucial.
The consequences of a computer word processor taking too long to respond to a user input are
generally limited to adversely altering the current emotional state of the human operator (e.g., it
can result in impatience and frustration on the part of the user). On the other hand, the
consequences of a jet fighter’s computer-based avionics system taking too long to produce an
output in response to an input from its environment generally include loss of control of the flight
behaviour of the aircraft, a situation that can lead directly to the failure of the operational mission
and, quite possibly, the loss of the aircraft and the pilot. In a real-time information processing
system, the consequences of not providing an output in time are just as bad as those resulting
from the provision of an output that is logically incorrect. Most business information systems are
interactive, but are not real-time systems. In terms of response time,
a. Interactive Systems: are those where response times are important to the
perceived usability of the system, but not to the correctness of its operation.
The successful performance of the overall mission does not depend on the
computer-based information system meeting finite and specified deadlines for
the provision of output in response to some associated input.
b. Real-time Systems: are those in which the correctness of the system depends
not only on the logical result of the computation, but also on the time within
which the results are produced. The successful performance of the overall
mission depends on the computer-based information system meeting finite and
specified deadlines for the provision of output in response to some associated
input.
The correctness of a real-time system depends not only on the logical result of
the computation, but also on the time at which the results are produced.
2-26 B-GL-351-001/FP-001
The Tactical Command and Control Information System
b. Soft Real-time Systems: are those in which response times are central to the
correct behaviour of the system, but the system will still function properly, that is,
perform its mission successfully, if deadlines are occasionally missed. Soft real-
time systems are characterized by the fact that the system can tolerate some
violations of timing constraints without severe consequence.
5. There is a continuum between the extremes of “hardness” and “softness” and most
systems fit somewhere in between. For example, the flight control system of a combat aircraft
is a hard real-time system because a missed deadline could lead to a catastrophe, whereas a
data acquisition system for a process control application is soft as it may be defined to sample
an input sensor at regular intervals, but also to tolerate intermittent delays. In many real-time
applications, activities that have to occur in a timely fashion coexist with those that are not time
critical. An accounting application or a long-term planning activity running on an automated
factory’s computer is an example of the latter. Both types of activities consist of one or more
tasks, and a task with a finite and specified time constraint is known as a real-time task. Ideally,
the computer should execute real-time tasks so that each task will meet its deadline, whereas it
should execute the remaining tasks so that the average response time of these tasks is
minimized.
7. A real-time system can be divided into two parts—the controlled system and the
controlling system. The controlled system within a real-time system consists of the hardware
devices, e.g., sensors and actuators that form the system’s interface with the physical
environment it seeks to affect. For example, in a telecommunications system the controlled
system might consist of multiplexers, switches and printers, whereas in a process control
system it might include valves, relays or hoppers. The controlling system within a real-time
system comprises the computer-based information processing system that directs the behaviour
of the controlled system. For example, in an automated factory, the controlled system is the
factory floor with its robots, assembling stations and assembled parts, while the controlling
system is the computer and the human interfaces that manage and coordinate the activities on
the factory floor. As with all other computer-based information systems, the controlling system
within a real-time application consists of inputs, processes, data files, outputs, people and
hardware. For highly structured situations, such as an automated assembly line, the controlling
system might rely exclusively on automated procedures, in which case the human operator’s
only role is to initiate system operation and then monitor the system’s performance in order to
stop or over-ride the computer in the event of a system error or failure. In less structured
B-GL-351-001/FP-001 2-27
SILO — Principles and Fundamentals
situations, such as flying a high performance aircraft, the control processes might involve
human operators carrying out procedures that guide the controlling system’s computers in the
execution of their programs. Either way, time and reliability constraints are imposed on the
entire system by the ongoing physical behaviour of the external world that it seeks to affect.
Unless the computer-based information processing system can provide the correct instructions
to the appropriate components of the controlled system, e.g., the control surfaces of an airplane,
in a timely and reliable manner, the computer’s role will be meaningless.
8. Although the nature of the equipment that constitutes the controlled system varies widely
with the purpose of the system, the design of the controlling system can be generalized. It is, in
fact, this commonality across a wide range of controlling systems that makes real-time systems
a class of computer-based information systems. The minor idiosyncrasies required by the
various types of controlled systems simply result in distinguishable categories within the real-
time systems class: (real-time) communications systems, (real-time) flight control systems,
(real-time) process control systems and so on. The primary characteristics of any real-time
information processing systems are:
2-28 B-GL-351-001/FP-001
The Tactical Command and Control Information System
must have safeguards to ensure that their responses are based on information
that properly represents the current state of the controlled environment.
d. Reliability: in order to control its environment successfully, a real-time system
must be able to perform its function dependably, giving consistent results on
successive processes. Operators must be able to trust real-time systems to
perform as intended. In essence, reliability is a measure of how often a system
will fail. Although real-time systems are designed to maximize the time between
failures, fault tolerance is concerned with the recognition and handling of failures
when they do occur. A real-time system must fail gracefully—it must provide a
useful degraded service in the face of failure.
e. Economy: in order to control its environment successfully, a real-time system
must be affordable and economically sustainable. The cost of in time response,
completeness, total correctness and absolute reliability must be taken into
account when considering these ideals. As with any product, the performance
of an actual real-time system is constrained by economic considerations. An
on-line system that guarantees a maximum response time of half a second may
not be able to compete with a system that only offers a response time of two
seconds, but sells at half the price. In order to maintain its commercial viability,
a real-time system must be as inexpensive to produce, run and maintain as
possible.
9. The primary design objective for a real-time information processing system (i.e., the
controlling system within a real-time system) is to reliably compute the correct responses to
inputs representing the current state of a controlled system and provide outputs in the form of
instructions to the actuators within the controlled system in time to produce the desired effect(s)
in the external environment. Since the goal is to affect the external environment by directing the
behaviour of the controlled system, real-time information processing systems typically have
substantial amounts of knowledge concerning the characteristics of the application domain and
the controlled system built into the system. The more structured the application domain is, the
more automated the control processes can be. A well-designed real-time information
processing system can improve the effectiveness, efficiency and economy of a real-time system
by incorporating appropriate computer programming and, if need be, operator procedures for
dealing with about-to-be-missed deadlines, and by allowing for the graceful degradation of
capability in the event of major component failure. The key attribute of any real-time information
processing system is timeliness, the speed with which an undesired condition in the controlled
system can be recognised and correctly diagnosed, appropriate decisions made and corrective
action initiated.
B-GL-351-001/FP-001 2-29
SILO — Principles and Fundamentals
SECTION 4
FUNCTIONS AND CHARACTERISTICS OF A LAND FORCE TACTICAL COMMAND
AND CONTROL INFORMATION SYSTEM
219. GENERAL
2-30 B-GL-351-001/FP-001
The Tactical Command and Control Information System
4. A well-designed tactical MIS capability can minimize the time and effort required to
recognise and diagnose problems encountered during mission execution and to initiate
appropriate corrective action by presenting information in consistently structured, easily
understandable formats (e.g., standardized reports presented textually, graphically, pictorially
and/or acoustically) that allow current operations staff to grasp the significance of the
information straight away, and by automatically transferring information generated during
monitoring and diagnosis into the formats used to communicate instructions and other control
information to the subordinate elements being controlled by the headquarters. Some tactical
MIS capabilities within the TacC2IS can bypass current operations staff entirely and totally
automate certain routine monitoring and control functions. Either way, a well-designed tactical
MIS capability allows current operations staff to quickly identify deviations from planned or
expected performance and assists them with the selection and initiation of appropriate
corrective actions to prevent those deviations from causing adverse consequences for the
organization. The key attribute of the tactical MIS capability within the TacC2IS is data
integration, the degree to which the disparate pieces of data important to execution phase
decision making throughout the land operations chain of command can be maintained,
aggregated and manipulated to provide individual current operations staff officers with timely,
accurate, verifiable information relevant to the situation at hand and in a form they find useful.
5. The plans staff at the various headquarters within the land operations chain of command
also need to retrieve and process all of the information relevant to a particular situation in order
to evaluate, interpret and analyse it in preparation for presentation to their commanders. In their
case, however, the requirement is for timely access to accurate, relevant, verifiable information
B-GL-351-001/FP-001 2-31
SILO — Principles and Fundamentals
about the likely effects of various alternative courses of action in formats that allow that
information to be used directly in their decision making. This calls for a tactical planning support
capability within the TacC2IS that will allow plans staffs to explore and, if possible, quantitatively
compare decision alternatives in terms of some agreed upon set of performance measures.
Much like the DSS found in the business information system domain, the tactical planning
support capability should contain enough structure to support rigorous analysis of the tactical
alternatives. One significant difference between the traditional DSS and a tactical planning
support capability is the absence of a knowledge base of heuristic information. The heuristic
planning information associated with tactical land operations requires more judgement and
insight than can presently be represented in computer data files. The staff officers from the
various staff branches, arms and services must apply this knowledge to select the inputs, guide
the execution of the computer programs and to interpret the output produced by the computer
models. Therefore, the processes by which planning information is produced and used must
consist of a tight interaction between human procedures and computer programs; the two must
be developed together if the computer-based planning support capability within the TacC2IS is
to be effective. A well-designed tactical planning support capability allows plans staff to
understand (a) which course of action is preferable in terms of the criteria applied during the
analysis, (b) which factors relevant to the decision those criteria represent and (c) the degree of
uncertainty associated with the preference for one alternative over all others. The key attribute
of the tactical planning support capability within the TacC2IS is validity, the degree to which the
models within the system, including those created by users, provide a useful representation of
the real world problem confronting the supported commander(s).
6. Finally, commanders throughout the land operations chain of command must be able to
use the accurate, up-to-date information available to them through the TacC2IS operational
database effectively and efficiently in order to quickly and accurately assess the situation, make
sound decisions and issue appropriate directions. Because command involves the creative
expression of human will, commanders need a capability within the TacC2IS that will provide
them with timely access to the accurate, relevant, verifiable information they need, whenever
they need it and in whatever form they find to be most useful. Such a commander’s information
system capability is patterned on the executive information systems found in the business
information system domain. A well-designed commander’s information system is at once an
upward extension of the various tactical MIS capabilities and tactical planning support
capabilities within the TacC2IS and the driving force behind the design and implementation of
those staff support capabilities. In the Canadian LF, commanders are the central focus of the
command function and, hence, of the command support capability. Therefore, the primary
purpose of the tactical transaction processing capability, the tactical MIS capability and the
tactical planning support capability within the TacC2IS is to provide commanders at all levels of
the land operations chain of command with timely access to the accurate, verifiable information
they require to make sound tactical decisions. Where these capabilities provide staff officers
with the tools to make decisions and issue direction, it is because they do so on behalf of the
commander in order to relieve him of direct responsibility for the myriad minor details involved in
the planning and execution of land operations.
2-32 B-GL-351-001/FP-001
The Tactical Command and Control Information System
8. The commander’s information system imposes very little structure, leaving commanders
free to organize and re-organize information in as many ways, and in as many formats, as
possible. This type of semi-structured, interactive dialogue with the information available within
the TacC2IS is a key to sparking the sort of creative insights necessary for understanding novel
situations, making new connections between potential causes and effects and generating
innovative solutions to problems. Thus, the commander’s information system aims to support
the creative and intuitive aspects of planning and executing land operations, rather than the
more structured and analytical aspects associated with the routine staff work involved in the
planning, direction and control of standardized activities. A well-designed commander’s
information system capability allows commanders at all levels to find novel or innovative
relationships within the available information in order to (a) grasp the underlying causes of
problems with the organization’s tactical performance, (b) recognize important new tactical
opportunities for the organization and (c) identify emerging threats to the organization’s tactical
success. The key attribute of the commander’s information system capability within the
TacC2IS is intuitiveness, the degree to which the system not only behaves in ways that appear
intuitive to commanders (making it easy to use), but actually stimulates the commanders’
intuition and supports creative problem solving in the planning and execution of land operations.
9. Notwithstanding the fact that much of the structure and functional capability of the
TacC2IS is drawn from the business information system domain, the tactical command and
control of land operations is a real-time system. The controlled system is the actual combat
power of the fighting units and formations, i.e., the sensors are the reconnaissance and
surveillance vehicles, the unmanned aerial vehicles, the electronic intercept and direction
finding systems, the foot patrols and so on, while the actuators are the tanks, guns, armoured
B-GL-351-001/FP-001 2-33
SILO — Principles and Fundamentals
personnel carriers and so on that deliver the effects that alter the external environment to fit
Canada’s political and diplomatic will. In other words, these are the assets that monitor the
current state of the battle space and, when so directed, act to change that state in ways
beneficial to the achievement of the force’s tactical, operational and strategic objectives. The
controlling system is the chain of command, the unbroken sequence of commanders, supported
by their staffs, that connects each individual soldier to Canada’s national objectives. The chain
of command acts as the regulating element in the feedback loop by which the operation of the
overall system, in this case a LF field organization conducting tactical operations, is controlled.
10. As United States Air Force Colonel John Boyd famously explained, war is a time-
competitive struggle. The side that can correctly understand the situation first and, therefore,
initiate an appropriate action first has a decided advantage over the adversary who must now try
to understand the new situation created by the side that acted first. This means that response
times to events in the battlespace have finite and specified deadlines. These deadlines are
determined by the enemy’s capacity to act—in order to win, one must operate with a shorter
observation-orientation-decision-action (OODA) cycle than one’s adversary. These deadlines
are real, and so are the consequences of missing them. Tactical land operations must be
categorized as soft real-time systems, because deadlines can occasionally be missed without
causing disastrous consequences. However, if a single major deadline or a series of minor
deadlines is missed, the system will fail to achieve its mission. Thus, the controlling system
must operate in real-time, subject to strict timing and reliability constraints.
11. This all means that the TacC2IS is a real-time information processing system, the
correctness of which depends not only on the logical results of the information processing
activities carried on within it, but also on the time at which those results are produced. Each
and every process, from transaction processing through aggregation and summary reporting to
support control of ongoing operations through analyses conducted in support of planning, all the
way to command decision making as a creative act of human will, is subject to the rigours of
timing and reliability constraints derived from the need to interact with the external world as
events occur. It is this combination of the need to capture, organize and manipulate vast
amounts of information in order to understand and reason about what is in essence a very
complex, unstructured situation with the need for real-time response times on the order of
seconds, minutes and hours that makes army TacC2IS a unique class of computer-based
information systems.
1. The staff decides access authorizations, authentication procedures, data retention and
release criteria, and basic operating procedures. In order to ensure that the TacC2IS functions
effectively and efficiently as part of the overall command support capability, Signals:
2-34 B-GL-351-001/FP-001
The Tactical Command and Control Information System
1. The unique nature of army Tac2CIS presents a significant challenge to those who must
specify, design, construct, operate, manage and employ such systems because the knowledge,
methods, techniques and tools available to support the performance of these activities have
generally been developed to meet the needs of one or more of the traditional classes of
computer-based information system. Almost since the introduction of electronic digital
computing, the computer-based systems realm has been divided into two distinct domains:
business information systems (often referred to generically as management information
systems) and real-time control systems (sometimes referred to as embedded systems). Each
domain enjoys a very large community of practice, and is well supported by academic
institutions, industry standards bodies and professional journals. However, because each
domain comprehensively addresses the particular needs of an entire sphere of uses for
computer-based information processing, and because there is as yet very little overlap between
those spheres of use, little in the way of models, methods, techniques and tools are shared
between the two domains. On the other hand, one of the things that makes army Tac2CIS so
unique is that the most fundamental functions and characteristics that define any computer-
based system as being part of either one domain or the other are of equal importance in army
Tac2CIS. This is perhaps the principal reason for the extreme difficulty military forces around
the world seem to be encountering in developing and employing these systems.
2. An army TacC2IS is a complex computer-based information processing system that
seeks to utilize the most current technology for its hardware and software platforms as well as
the latest techniques for software definition, development and life-cycle maintenance. In
addition, its implementation involves the co-ordination, interface and, eventually, integration of
several information systems, some of which are more advanced than the Tac2CIS in their life-
cycle and others of which have not yet been initiated. Furthermore, experience has shown that
information systems interact very strongly with their environment and the requirements of these
systems evolve not only with time but also with use. With time and experience, the users’
needs and expectations will evolve and require more sophistication and performance. In such
an environment, the risks associated with using a linear approach to life-cycle management are
unacceptable; therefore, an evolutionary approach will be applied. The development and
implementation of new system versions must be carefully planned and managed to avoid
damage to the current operational system and discrepancies between the identified
requirements and the implemented versions. However, the users of army Tac2CIS cannot rely
upon system developers and technical experts to produce the systems they need based simply
on past experience and the use of industry standard practices; they must take ownership of their
requirements and remain active participants throughout the entire process of developing
systems by which to satisfy them. The developers, for their part, must constantly work to find
better ways of specifying, designing and constructing systems that will meet the needs and
expectations of army Tac2CIS users.
B-GL-351-001/FP-001 2-35
SILO — Principles and Fundamentals
3. The method traditionally used to define the requirements for a Tac2CIS rests upon two
fundamental principles. The first is primacy of data and the second is the progressive
decomposition of the problem into its constituent parts in a coherent manner. The reason for
the primacy of data is that experience in the information systems field has shown an
organization’s data is relatively stable when compared with the functions that are performed.
The data usually only changes when the mission of the organization changes, whereas the
functions performed adapt to changes in the environment in which the organization operates.
Therefore, an information system based upon the data will be more stable and will likely require
fewer resources to maintain during its lifecycle than one based upon functions. Moreover, in
complex environments a shared database is the prime integrating force that provides coherence
to the overall information system.
4. The progressive decomposition of the problem starts at the overall or purpose of the
system and then analyses the constituent components at successive levels of detail until
sufficient detail has been exposed to permit the solution design phase to begin. This is the tried
and true engineering approach of breaking a large, complex problem down into a coherent set
of manageable problems that can then each be solved and the solutions subsequently
integrated to solve the original problem. This decomposition can take the form of data flow
diagrams, object interaction diagrams, use cases or any other method for describing the
functional information processing behaviour of the system. Because different parts of the
system emphasize different functions and characteristics, the methods and tools must be
selected in order to match the particular problem being addressed. Proper selection and use of
techniques and tools drawn from these methods can ensure the logical correctness of the
resulting computer-based system.
2-36 B-GL-351-001/FP-001
SILO — Principles and Fundamentals
CHAPTER 3
TACTICAL COMMUNICATION SYSTEMS
SECTION 1
INTRODUCTION
301. GENERAL
1. Operational success will continue to be more and more dependent upon knowledge
based, network-enabled Command. Increasingly, the Army will be a digitized force to the lowest
level possible, incorporating the application of current and evolving technologies.
Interconnectivity and interoperability must be maintained between headquarters (HQ) that are
linked to an array of sensors, surveillance, reconnaissance and strike platforms. Units and
individual soldiers will provide commanders and staffs at all levels and echelons with an
increasingly near real-time, relevant and multi-dimensional common operating picture (COP).
Communications and Information Systems (CIS) provide the underlying infrastructure for a
network-enabled command capability that supports operations by providing the integrated
information network necessary to achieve the Commander’s goal of information superiority in
the battlespace. Communications and Information Systems encompasses two distinct but
closely related systems, the communications systems (CS) that are used to relay information
between locations, and the information systems (IS) that are used by individuals to store,
retrieve, process and display information in support of their job-related tasks. Information
systems specifically designed and employed to support the exercise of command and control
over military forces are referred to as command and control information systems (C2IS).
2. In order for the Army to successfully operate in a Joint, Interagency, Multi-national and
Public (JIMP) context the CIS must possess a high degree of interoperability. Communications
and Information Systems must provide reliable connectivity within and between the tactical,
operational and strategic levels. Communications and Information Systems must include
interfaces with coalition forces and national and international infrastructure to enable the
acquisition, processing and distribution of the information necessary to ensure the successful
execution of the commander’s mission.
4. Any form of communication involves patterns: for example, patterns of ink on a printed
page, electrical current variations on a wire or vibrating air molecules. In order to communicate
information, we must first agree on assigned meanings for particular patterns, and then find a
way to transmit sequences of such patterns. The paths between communication parties are
called communication channels or communications links, and might involve electrical cable,
telephone lines, microwave channels or some combination of these. The devices employed to
B-GL-351-001/FP-001 3-1
SILO — Principles and Fundamentals
send and receive information across a channel or link are usually called stations; when we need
to distinguish their respective roles in the communications process, we refer to them as
transmitters and receivers. We can simplify matters for now by concentrating on
communications channels that merely connect one station to another. Of course, more than two
stations may be linked together on a single channel, but this is an example of networking, which
will be addressed later on.
302. TERMINOLOGY
SECTION 2
MEANS OF COMMUNICATIONS
303. GENERAL
3-2 B-GL-351-001/FP-001
Tactical Communication Systems
(2) Visual. Signals no longer has any responsibilities associated with the
employment of visual means of communication.
304. TELECOMMUNICATIONS
a. at the transmission level, voice, data and video are carried by the same
transmission medium, but they are independent;
b. at the network level, voice, data and video are carried by a single network that is
aware of the differences between them; and
c. at the application level, there is a logical connection among voice, data and
video which is understood by the communication equipment.
3. Unguided media provide a means for transmitting electromagnetic waves but do not
guide them; examples are propagation through air, vacuum and seawater. Traditional Signals
terminology refers to all such unguided transmission media as radio or wireless.
B-GL-351-001/FP-001 3-3
SILO — Principles and Fundamentals
b. Computer Based Systems. Command and Control systems utilized today and
into the future rely on secure networks based on current and evolving
technology. Using battlefield automation systems and communications allows
users to share resources and pass information by maximizing the available
information networks through near seamless connectivity and interoperability.
This means allows for managing, transporting via messaging, processing and
presenting data as usable information. This information can take the form of
imagery, video, colour graphics, digital overlays, geospatial and database
related information. Information can be passed, then printed as hardcopy or
stored on a magnetic or optical medium for future reference. Documents and
images sent throughout the network can be restricted by limitations present in
the CIS infrastructure.
3-4 B-GL-351-001/FP-001
Tactical Communication Systems
5. Visual Means. Visual means are those methods of transmission that can be received
by optical systems. Visual means are available to everyone and are useful to send simple,
prearranged signals over short distances. Visual codes are insecure and can be imitated by the
enemy to deceive and confuse. In the absence of other electronically based TacComms, visual
means is an extremely useful form of LOS short-range communications and may be less
vulnerable to enemy actions. Some of the visual LOS means of communicating are:
b. aircraft manoeuvres;
d. flags;
e. infra-red (IR);
g. panels.
6. Aural. This means of communication utilizes sound signals for the transmission of
information over audible ranges such as whistles, horns, sirens or voice amplifiers. Sound
signals are vulnerable to interception and can be imitated by the enemy, thus their usefulness
may be impaired by local and battle noises.
B-GL-351-001/FP-001 3-5
SILO — Principles and Fundamentals
1. It is evident that the electrical/electronic means best satisfy the tactical requirements for
rapid, high capacity communications. The ability to use these means will depend on the
characteristics of the information to be transmitted, the distances to be covered and the
operational environment. The amount of information that can be transmitted by
electrical/electronic means depends on a number of technical factors. The three most important
factors are:
a. signalling speed;
b. redundancy; and
c. bandwidth.
2. Signalling Speed. The amount of information that can be passed will vary directly with
the rate at which it can be transmitted and received. However, this by itself may be misleading,
as it gives no indication of response time. Speech rates over voice circuits average less than
100 words per minute; however, the response time for person-to-person conversation is fast.
Data transmission is very fast, enabling users at different levels of command at different
locations to access information concurrently in a near real-time or real-time manner.
c. Data. This is the least redundant mode of transmission but the length, number
and spacing of the code elements introduces some redundancy to gain
readability and accuracy. High-speed electronic techniques such as Cyclical
Redundancy Checks (CRC) exist to ensure that data is successfully exchanged
between subscribers to a system.
3-6 B-GL-351-001/FP-001
Tactical Communication Systems
c. Facsimile. A still picture can be transmitted slowly over a voice circuit or more
rapidly over a data circuit of greater bandwidth. Largely superseded by C2
Message Handling Systems supporting attachments, facsimile transmission is
retained for legacy purposes and for basic communications with non-digitized
allies and coalition members.
1. Communication link is the general term used to describe the connection over which
signals are passed between two directly communicating stations. The term includes both the
physical transmission medium and the devices that use that medium to provide one or more
communication channels between the stations. Communication links are categorized by the
degree to which signals can be passed in both directions over the physical transmission
medium between communicating stations. There are four types of communication links:
simplex, half-duplex, duplex and multiplex.
2. Simplex. A simplex communication link can pass signals in only one direction between
stations. One of the stations is equipped with a transmitter; the other station is equipped with a
receiver. This provides one-way communication from the source station to the destination
station over the single physical transmission path by which they are connected. The most
common examples of simplex communication links are commercial radio and television
broadcasts.
B-GL-351-001/FP-001 3-7
SILO — Principles and Fundamentals
4. Duplex. A duplex communication link can pass signals between stations in both
directions at the same time. In order to send and receive signals simultaneously, each station is
equipped with a both a transmitter and a receiver. This simultaneous two-way communication
requires the establishment of two physical transmission paths between the communicating
stations so that each transmitter has a dedicated connection to the receiver at the other station.
Thus, a duplex link is really two simplex links passing signals in opposite directions between the
communicating stations. Duplex links are sometimes called full-duplex links, but this term is
considered redundant and its use is to be discouraged. The term “four-wire circuit” is a
traditional term used in line networks to indicate a duplex link consisting of two pairs of wires,
each providing a simplex link between the communicating stations. In radio networks, a duplex
link consists of two different carrier frequencies, each providing a simplex link between the
communicating stations. A familiar example of a duplex communication link is a telephone.
5. Multiplex. A multiplex link can pass more than one signal between stations at the same
time. This allows more than one source to convey information simultaneously over the same
physical transmission path. In addition to transmit and/or receive device(s), each station is
equipped with a multiplexer that divides the overall bandwidth of the physical transmission path
into a number of separately accessible lower-bandwidth paths. Each of these lower-bandwidth
paths provides an independent communication channel capable of carrying its own signal
between the communicating stations. In other words, a multiplex link uses a single physical
transmission path to provide a number of communication channels between stations. This
allows each of a number of sources at one station (up to the number of channels multiplexed
onto the transmission path) to communicate independently with a selected destination at the
other station as if each source-destination pair had its own physical transmission path between
the communicating stations. Common examples of multiplex links are cable television
distribution systems that use a single cable to simultaneously deliver a number of television
channels to a cable subscriber, telephone trunks that use a single microwave link to
simultaneously carry a number of separate subscriber calls between telephone exchanges and
satellite links that use a single physical transmission path to simultaneously carry a variety of
telephone and data services to CF personnel deployed on a mission somewhere in the world.
a. Amplitude Modulation;
b. Frequency Modulation;
c. Phase Modulation;
2. Amplitude Modulation (AM). The amplitude of the carrier wave is varied in accordance
with the signal carrying the intelligence. A complex wave form results consisting of the original
carrier wave plus two bands of frequencies called sidebands, one above and one below the
carrier frequency. The system is simple but not very efficient since both sidebands contain the
3-8 B-GL-351-001/FP-001
Tactical Communication Systems
same intelligence and the carrier wave contains none. This modulation technique is also prone
to carrying both man-made and natural electrical disturbances. All older, high frequency (HF)
radios employ AM.
3. Single Sideband (SSB). This is a form of AM in which only one of the sidebands is
transmitted; the second sideband and the carrier may be suppressed. Compared with double
sideband AM, SSB increases by about 50% the ground wave range for a given weight of radio
and battery, and occupies a much narrower bandwidth. SSB adds to the complexity of the
radio set and requires a high standard of frequency stability. Independent sideband (ISB) is a
variation on this system in which both sidebands are transmitted but each one is modulated with
a different intelligence signal.
4. Frequency Modulation (FM). In this method of modulation, the frequency of the carrier
wave is varied by the intelligence signal. The resulting radio system is more complex than in AM
but is considerably more efficient: it provides higher quality circuits with better signal-to-noise
ratios and weak interfering signals are suppressed. On the other hand, the transmitted signal
occupies a wide bandwith, a result which precludes its use below very high frequency (VHF)
and limits its range. FM is the standard method for combat net radio (CNR).
5. Phase Modulation (PM). In this method, the phase of the carrier wave is modulated by
the intelligence signal. This technique is used either as a preliminary stage to FM to avoid the
need for extensive frequency stabilization or alone. In this latter case, it requires a wide
bandwidth.
a. Pulse Amplitude Modulation (PAM). The mixing of the intelligence wave and
the carrier wave is done as for normal AM except that the transmitter is turned
on and off. The pulses are equally spaced and of equal duration (1 to 3
microseconds) but vary in amplitude. This technique produces very low average
power in relation to peak power and allows the driving of the transmitting circuits
far above their normal power ratings for continuous operation. A second
advantage is increased signal-to-noise ratio if the receiver is silenced during the
pulse intervals.
b. Pulse Frequency Modulation (PFM). The mixing of the intelligence wave and
the carrier wave is done as for normal FM except that the transmitter is turned
on and off. In this case, the amplitude of the pulses remains constant and the
frequency of the carrier is made to vary from pulse to pulse by the modulator.
This technique provides the same advantages as PAM under the same
conditions. PAM and PFM techniques can be combined to achieve diplexing.
B-GL-351-001/FP-001 3-9
SILO — Principles and Fundamentals
e. Pulse Code Modulation (PCM). In this form of modulation the amplitude of the
modulating signal is sampled at regular intervals and transmitted as a binary
code group of pulses. The size of the group of pulses increases with the
requirement for higher fidelity with an attendant increase in bandwith. Digital
techniques are advantageous in that much more intelligence can be transmitted
at a faster rate compared to the other forms of modulation. Also, the encryption
of voice signals is much simpler to accomplish when the intelligence is
converted into digital form from its initial analogue form. These systems require
a wide bandwidth for more efficient operation and are, therefore, suitable for
high capacity trunk circuits.
f. Delta Modulation (DM). This modulation uses the same technique as PCM;
however, instead of the absolute signal amplitude being transmitted, at each
sample, only the changes in signal amplitude from sampling instant to sampling
instant are transmitted.
3-10 B-GL-351-001/FP-001
Tactical Communication Systems
309. MULTIPLEXING
1. Multiplexing is the transmission of two or more signals using a common carrier wave. It
enables a number of voice or other channels to be sent over a single circuit. Multiplexing
systems are generally described in terms of the numbers and types of channels which they are
designed to accept. Common methods of multiplexing are:
B-GL-351-001/FP-001 3-11
SILO — Principles and Fundamentals
SECTION 3
RADIO COMMUNICATION SYSTEMS
17
Formally known as electronic counter measures (ECM).
18
Formally known as electronic protective measures (EPM).
3-12 B-GL-351-001/FP-001
Tactical Communication Systems
c. Range. The power rating of radios, the nature of the ground, the propagation
conditions, the propagation characteristics of the frequency band in use, all tend
to limit the range over which reliable radio communication can be provided.
d. Capacity. The traffic capacity of any link is limited by the type, power and
bandwidth of the radio set.
1. All users of electromagnetic radiations must share one single frequency spectrum. This
sharing is regulated world wide by a UN agency, the International Telecommunications Union
(ITU). By international agreement the spectrum is divided into bands, sub-bands and
frequencies designated for specific purposes. From these bands, allocations and assignments
are made by national authorities who are responsible for ensuring their proper use. Frequencies
which are likely to be received beyond national boundaries must be co-ordinated internationally.
2. Within these bands, allocations are made for civilian and military purposes. In addition to
frequencies for radio communications, allocation must be made for radio location, navigation
systems, surveillance equipments, fire control systems and various industrial processes.
3. Despite improvements in equipment design, the ever increasing civilian and military
demand for frequencies makes the task of allocating frequencies ever more complex. The
difficulty is increased by the fact that certain frequency bands are more effective than others for
certain purposes. In war, the enemy will also be sharing the same frequency spectrum for his
own purposes.
a. Very Low Frequency (VLF) 3-30 kHz. This band offers few frequencies and
this all but precludes its use for general communications. Parts of the band are
used for long range radio navigation signalling (Omega), for frequency
calibration and for sub-marine communications. The ground wave component
has great penetration power and can travel in excess of 1600km. The sky wave
component is perfectly reflected by the ionosphere and can encircle the globe.
Power requirements are high.
b. Low Frequencies (LF) 30-300 kHz. As for VLF, the ground wave component
can reach relatively great distances. The sky wave component is subject to
increasing attenuation as the frequency increases but it is not affected by
ionospheric disturbances like HF and is a better transmission medium in the
auroral zone. Ranges from 800 to 12000 km are possible.
c. Medium Frequency (MF) 300-3000 kHz. This band is used intensively by
civilian broadcast stations. The range of ground wave can vary from 80 km at
3000 kHz to 300 km at the lower limit of the band. Sky wave communication is
unreliable during the day but at night distances of up to 5000 km can be
achieved. Attenuation reaches its maximum at about 1800 kHz and varies with
the season. At all times, fading is severe.
B-GL-351-001/FP-001 3-13
SILO — Principles and Fundamentals
d. High Frequency (HF) 3-30 MHz. The range of the ground wave decreases to
little more than line of sight distances. Long range sky wave communication is
possible but is subject to ionospheric conditions: range will vary with frequency,
day and night and solar activities. This band is used by the military for
long-range communication and back up tactical radio nets. Civilian use includes
radio amateurs, short wave broadcast, citizen's band and various industrial,
scientific and medical users.
e. Very High Frequency (VHF) 30-300 MHz. There is no usable surface wave and
sky wave reflection in the lower part of the VHF band. This can only be achieved
through sophisticated scatter techniques over ranges of 600 to 2000 km.
Transmission in this band is done mostly through a direct wave which travels
above the surface of the earth. The range is generally limited to line of sight, and
the best results are obtained when antennas are elevated above the ground.
Longer range can be obtained through a technique called automatic radio
rebroadcast (RRB) in which a received signal is automatically retransmitted on a
different frequency by the second radio of a rebroadcast station specially sited
for this purpose. This band is used by the military for CNR and by civilians for
FM radio and TV broadcast and air traffic control. Radio communication in this
band is free from noise and interference, provides good speech quality and is
reliable 24 hours a day over suitable terrain.
f. Ultra High Frequency (UHF) 300-3000 MHz. Except for the lower part of this
band where troposcatter reflection can achieve moderate ranges,
communication is near line of sight. Lack of interference and fading generally
affords high quality reception. Compact and directive antennas can concentrate
the radiated energy in a narrow beam resulting in much greater transmission
efficiency. The military use this band for air to ground communication, for radio
relay transmission and for some satellite links. Civilian use includes TV
broadcast, some industrial usage and satellite navigation.
g. Super High Frequency (SHF) (3-30 GHz). This band offers many times the
information carrying capacity of all lower bands put together. Throughout this
band, wide band communications are obtained over line of sight paths with very
low power. The reduced size of the antenna permits this form of transmission
from aircraft or satellite, enabling global ranges to be achieved by
retransmission. Transmissions in this band are subject to atmospheric
absorption and will be affected by weather; i.e., rain, fog, etc.
h. Extremely High Frequency (EHF) (30300 GHz). This band is also known as
millimetric waves. Tropospheric, ionospheric and atmospheric absorption is
severe in this band and circuits must be carefully engineered. Once established,
these circuits offer high reliability and very wide bandwidths capable of large
volumes of traffic. Ground range is normally limited to a few kilometres making
enemy interception or jamming difficult, except when satellite or aircraft
platforms are used. This band permits use of small dish antennas. The full
capability of this band is still not fully exploited. In addition to satellite
communication, the army could use this band for intra-HQ communications.
i. Decimillimetric waves (300-3000 GHz). Imagery, target acquisition,
surveillance devices and thermal sensors operate in this band. Atmospheric
absorption is most severe in a humid or moist environment and ranges are
reduced in fog and rain.
3-14 B-GL-351-001/FP-001
Tactical Communication Systems
1. Propagation Paths. There are two principal paths by which radio waves can travel from
a transmitter to a receiver: by ground wave or sky wave. All radio transmissions use one or both
of these paths or various associated phenomena.
2. Ground Wave. Ground waves travel more or less directly from the transmitter to the
receiver (see Figure 3-1). This form of propagation is affected by the electrical characteristics of
the ground and by the amount of diffraction, or bending, of the wave around the curvature of the
earth. The components of the ground wave are:
a. Direct Wave. This component travels directly through space from the
transmitting to the receiving antenna. On the ground, range is limited to the
line-of-sight distance plus the small distance added by atmospheric refraction
diffraction of the wave around the curvature of the earth. The range can be
extended by raising the height of the antenna above the ground. Range is also
affected by antenna gain, the power of the transmitter and the sensitivity of the
receiver.
b. Ground Reflected Wave. The ground reflected wave is the portion of the direct
wave that reaches the receiving antenna after being reflected from the surface
of the earth. When both the transmitting and receiving antennas are on, or close
to the ground, the direct and ground reflected components tend to cancel each
other;
c. Surface Wave. This component travels in contact with the ground and follows
the curvature of the earth. The surface wave predominates at frequencies below
30 MHz and relatively long ranges can be expected over areas of high
conductivity. Wave dissipation or attenuation is greatest over jungle and desert
and is least over sea water. Although surface waves tend to follow the contours
of the ground, obstacles such as hills gradually attenuate these waves by
reflection, scattering, and absorption.
d. Sky Wave. The second path over which radio waves can travel is through
ionospheric reflection (see Figure 3-2). These waves travel up to the ionosphere
and are reflected back to earth. Long distance transmission is achieved
principally by the use of sky waves at HF. For very long ranges, (beyond 4000
km) transmission may take place by successive skips from the ionosphere and
the earth's surface (multi-hop transmission). There are, however, some special
considerations in achieving a sky wave path. Above 30 MHz, sky wave working
is generally impossible. Furthermore, for any given path there are critical limits
to the frequency and to the angle at which the wave must strike the reflecting
medium (angle of incidence). The optimum frequency depends on the
B-GL-351-001/FP-001 3-15
SILO — Principles and Fundamentals
geographic location of, and the distance between the transmitter and receiver,
the time of day, and the season of the year. The path and angle of propagation
determine to a large extent the type of antenna that must be employed.
Depending on its frequency and the angle of attack, the reflected sky wave may
return to a point lying within the range of the ground wave, or beyond it. In the
former case, severe distortion of the received signal may result from the
alternating reinforcement and cancellation of the two incoming waves. In the
latter case, no signal will be received between the limit of ground wave reception
and the point at which the sky wave returns to earth. The area in which no signal
is received is termed the skip zone. Despite these limitations and except for
periods of severe ionospheric disturbances, sky wave working can be a useful
method of communication.
3. Forward Scatter Reflection. In addition to the relatively efficient reflection that can be
achieved by a sky wave at HF, a much weaker reflection and scattering phenomenon occurs at
considerably higher frequencies. Unlike sky wave reflection, which takes place only in the
ionosphere, scattering takes place throughout a large volume of the atmosphere and at some
depth causing the propagated wave to diffuse widely. The signal arriving at the receiver,
therefore, is the sum of a large number of very small signals. As a result the signal strength is
constantly varying with rapid short term seasonal and daily variations. Communications
employing this path require high power transmitters, complex receivers, and high gain
directional antennas. There are two forms of scatter transmission in wide use:
3-16 B-GL-351-001/FP-001
Tactical Communication Systems
1. Links. A link is a communication path of specified character between two points. Link
communication for passage of voice or data signals can be achieved through sky wave High
Frequency (HF) radio, scatter radio or satellite. Only HF sky wave radio will be dealt with in the
following paragraphs.
2. Characteristics. Sky wave radio generally shows the characteristics of all radio
communication however some specific aspects deserve mention:
B-GL-351-001/FP-001 3-17
SILO — Principles and Fundamentals
c. Mobility. The need for a number of elaborate and large antennas seriously
limits the mobility of this type of station. Once installed, the station cannot be
moved without an interruption in its communications.
(1) The extensive antenna parks generally required for this type of operation
are readily distinguishable by aerial or ground reconnaissance and
present inviting targets.
(2) The requirement to operate these links within narrow and predictable
frequency limits renders these systems very vulnerable to detection, and
thus to jamming or direction finding.
(3) Electromagnetic Pulse. Electromagnetic pulses (EMP) or post nuclear
atmospheric disturbances would black out these links for some time.
3. Application. Sky wave radio is normally used for the following BLOS applications:
b. Operational and administrative links within the AO and at the joint and coalition
level.
b. Frequencies chosen for this form of transmission are based on estimates of path
performance provided by prediction tables or computer calculations. Although
generally dependable, these estimates are no guarantee of continuous and
reliable operation. Several frequencies are normally required for long term day
and night or all season operation. The application of ALE capable radios
enhances link stability.
3-18 B-GL-351-001/FP-001
Tactical Communication Systems
5. Operating Modes. Operating modes may include voice and data. Facilities afforded
the user are mostly a function of the bandwidth available, the speed of transmission possible
and the mobility required.
6. Facilities:
a. Remote Installation. Terminal equipment may be located away from the radio
station in which case mobility is further restricted. Costs in operating personnel
are higher as both the radio and the remote sites must be manned.
1. General. Combat Net Radio (CNR) systems are categorized into three distinct
groupings based on inherent characteristics acquired with their respective use of the frequency
spectrum, engineering design and technical capabilities. The three groupings are Combat Net
Radio Primary (CNR(P)), Combat Net Radio High Frequency (CNR(HF)) and Combat Net Radio
Air-Ground-Air (CNR(A/G/A)). Characteristics specific to the current CNR radio family are
detailed under their separate headings in Volume 2 while common characteristics to these
groups are:
a. Radio Nets. A combat radio net consists of a net control station and a number
of sub-stations. Radio Rebroadcast (RRB) stations may also be employed to
extend the operating range. The net control station, normally found at the senior
HQ, controls the traffic (voice or data) and enforces circuit discipline. Sub-
stations on the net are provided by a subordinate unit HQ or attached to an
adjacent HQ see (Figure 3-3). Key personnel when moving away from the HQ
may be required to join this net during the period of absence.
c. All transmissions on CNR are simplex; that is, no more than one station can
transmit at any one time. In principle, all stations hear all messages passed on
the radio net, thus making the network “all informed”.
B-GL-351-001/FP-001 3-19
SILO — Principles and Fundamentals
protected; while use of the frequency spectrum (even in the frequency hopping
mode) is still evident to the enemy, the information being passed is not. Secure
is the normal operating mode for CNR.
(1) Enemy Electronic Support.19 Enemy Electronic Support (ES) can often
determine, by traffic volume and electromagnetic signature, the types of
formations/units within the battlespace and may even determine by
analysis of the various CNR nets friendly intentions or possible
operations. The presence of a cluster of stations at a particular location,
located through the use of direction finding equipment, that are operating
on several different nets can facilitate the identification of that unit just by
analyzing the different modes and bands that the CNR are operating in
and the number of distinct nets that are operating.
3. Frequency Coverage. The most suitable frequencies for CNR systems are in the HF,
VHF and UHF radio frequency bands. Current radios used by the Army operate in the bands
from 1.5 MHz to 400 MHz. Certain CNR radios are designed to operate in fixed frequency
mode as well as various forms of spread spectrum transmission such as frequency hopping.
Net radios with wide frequency coverage tend to be expensive; however, technological
advances in radio design and production are reducing costs. Individual radios that cover only
one or part of a radio frequency band are normally used; therefore, a radio detachment often
requires two or more radio sets, usually an HF and VHF combination, with a consequent weight
and size penalty. Radios with much broader frequency coverage and the capability for more
than one form of modulation are justifiable however for special roles (e.g. long range patrols).
19
Formally known as electron support measures (ESM).
3-20 B-GL-351-001/FP-001
Tactical Communication Systems
UHF
UHF
JTF HQ
VHF
VHF
Coy FOB #2
VHF HF HF
ISTAR VHF
Long Sensor
Coy FOB #1 Range
Patrol Patrol
Figure 3-3: CNR Linking Formation Level HQ with Subordinate HQs, Forward Operating Bases
(FOB) and Specialized Assets
4. Operating Modes. CNR can be used to provide voice and data as modes, but secure
voice is the priority mode of operation.
5. Facilities:
b. Antenna. CNR antennas are distinct to the radio type as well as related
engineering design specifications such as using cosite antenna designs on
vehicles where more than one transceiver is fed to the same antenna. The
employment of tactical radios also has a bearing on the type and size of
antenna used, for example, manpack or vehicle borne. VHF radios typically use
omni-directional antennae in a whip or elevated ground configuration with direct
wave propagation as the communication path. HF radios tend to use omni-
directional, long wire or specific tuned-to-frequency constructed antennae. HF
radios utilize both direct and skywave to achieve desired transmission path
results. Distance, terrain, power output, mobility and electronic protective
measures (EPM) all have a bearing on antenna performance and use. Normally
the antenna used in CNR cannot be sited at any great distance from the
transceiver.
B-GL-351-001/FP-001 3-21
SILO — Principles and Fundamentals
2. A spacecraft based repeater in geosynchronous orbit (36,000 km above the earth) will
appear to be stationary with respect to the terrestrial terminals and can be accessed from
anywhere in an area of one-third of the earth's surface depending on the “footprint” of the
satellite. The terminal can be fixed or mobile and the transmission path extends from the
earth's surface to the spacecraft and back. The quality of transmission to the ground terminals is
not affected by intervening terrain or distance within the earth bound footprint.
20
http://broadband.gc.ca/pub/technologies/tech_factsheets/satellite/index.html
3-22 B-GL-351-001/FP-001
Tactical Communication Systems
SATELLITE COMMUNICATIONS
JTF HQ
BG HQ
Coy HQ
Pl
Pl
Coy HQ Coy HQ
Pl Pl
Figure 3-4: Satellite Communications Linking Formation Level HQ with Subordinate HQs
4. Satellite Types:
b. Non-equatorial. Low earth orbit (LEO) satellites’ orbits are non-equatorial with
orbital heights less than 1500 km above the earth. This type of satellite has
shorter delay and requires the ground terminal to switch between satellites as
they pass overhead. LEO limits visibility of satellites in terms of earth coverage
area and times of coverage. With LEO Doppler effects are present
continuously but vary with orbit, satellite orbital position, and location of earth
station. LEO vehicles have higher atmospheric drag, orbits are not as secure
as high-orbit satellites and satellites require additional fuel for orbit maintenance.
B-GL-351-001/FP-001 3-23
SILO — Principles and Fundamentals
5. Satellite communication systems can provide high quality speech, data and television
channels. Tactical communications systems utilize satellites to obtain wide bandwidth
transmission at extended ranges over terrain not otherwise accessible.
6. Characteristics:
b. Mobility. Forward area satellite terminals are highly mobile and can be either
man portable or installed in tactical vehicles.
(2) Rain is the main factor that negatively effects satellite communications
while clouds, snow and fog can contribute to poor propagation.
Atmospheric particles can affect communications particularly higher
satellite frequency bands such as Ku and Ka.
7. Signal Security. Traffic over all channels can best be encrypted by using on-line bulk
encryption devices. These may be located at ground terminal stations and at switching facilities
as required to ensure security of transmission between subscribers. The satellite simply acts as
a repeater and there is no requirement to decrypt and re-encrypt the signal at the satellite. All
classified traffic passed by this form of transmission is protected by cryptographic equipment.
Unclassified services such as Internet access can use clear channels.
8. Application:
3-24 B-GL-351-001/FP-001
Tactical Communication Systems
c. Satellite communication systems can form part of the area trunk system.
Interconnecting links are required to permit integration of systems and/or to
provide communications to the supported HQ or local signal facility.
9. The present and ever expanding use of intelligence gathering systems in the form of
battlespace sensors and unmanned aerial vehicles (UAVs), as an example, finds satellite
communications systems ideal as an intelligence gathering and forwarding platform.
Intelligence, Surveillance, Target Acquisition and Reconnaissance (ISTAR) is a prime user of
this system.
1. Area Trunk Systems. Trunk systems are often referred to as Area Systems. The Area
Trunk System is a microwave system which provides trunk telephone and data communications
delivered by SHF and UHF line-of-sight (LOS) Radio Relay (LOS-RR) as well as fibre optic
cabling and equipment. The Trunk System could also provide access to strategic
communications, allied or commercial networks. The system is comprised of high capacity
long-range communications (static and limited mobility). LOS radio can establish links up to 40
km and can be used to link subordinate HQs of a formation or with a coalition HQ
(see Figure 3-5). A Radio relay describes a form of wide band radio transmission employing
LOS paths for point-to-point or link communications:
a. Radio relay consists of two terminal stations communicating with each other
directly or through one or more repeater stations. Repeater stations possess
duplicate radio equipment to enable tandem operation. Combinations of these
basic installations allow a variety of system and circuit interconnections.
b. Depending on the type of equipment, radio relay systems can provide a set
number of high quality speech and data channels, or a lesser number of video
channels.
B-GL-351-001/FP-001 3-25
SILO — Principles and Fundamentals
Allied
HQ
JTF HQ
Coy FOB #3
BG HQ
Coy FOB #2
Figure 3-5: LOS Linking a Formation Level HQ with Subordinate HQ and FOBs
2. Characteristics:
b. Mobility. Radio relay cannot currently be operated on the move. It is, however,
readily transportable by vehicle. Helicopters may be used to move stations over
impassable terrain or to otherwise inaccessible sites. Once on site, it can be set
up and torn down relatively quickly.
c. Economy. For average path ranges, radio relay is much more economical in
resource use than the other methods of providing multi-channel
communications. However, its greatest advantage is that, provided suitable
sites are available, additional links can be interconnected with the deployment of
few additional stations. It is thus possible to provide a communication grid
economically.
3-26 B-GL-351-001/FP-001
Tactical Communication Systems
circuit paths can be predicted with a high degree of assurance and, once
engineered, circuits are extremely stable. However, this method is quite
susceptible to weather conditions. For example, the range might be degraded
by as much as 50% in a severe rain or snowstorm.
e. Vulnerability:
3. Signal Security. Although the low power of equipment and the effects of screening by
terrain greatly reduce the range of useful intercept, interception is still possible and traffic must
be protected. Traffic over all channels is encrypted with the use of on-line, bulk encryption
devices.
4. Application:
a. Low capacity radio relay sets generally have the associated multiplexing
equipment as an integral feature of the installation. In higher capacity stations,
installation of the radio relay set and the associated multiplexing equipment may
be separate depending on size and capacity.
b. Because of its characteristics, radio relay is the main transmission system for
tactical area trunk CS (voice and data) used at Brigade Group to Battalion/Battle
Group HQ level in the area of operations (AO).
5. Frequency Band:
a. The wide bandwidth employed in radio relay necessitates operation in the VHF,
UHF, or SHF bands:
B-GL-351-001/FP-001 3-27
SILO — Principles and Fundamentals
(1) At VHF, it is still possible to work beyond the optical path and with
relatively narrow margins of path clearance. In this frequency range, the
methods of predicting usable circuits are well established and
comparatively simple. Because of the less demanding characteristics,
VHF is much more suited to tactical use, particularly for maintaining
communications with mobile forces within the AO. Unfortunately, the
congestion in this band does not always afford the large number of
frequencies needed for a wide area radio relay system.
(2) At the upper VHF (225 to 300 MHz), and within the UHF and SHF bands,
the path is virtually true LOS and transmission quality is excellent in clear
weather and with an unobstructed path (i.e. clear of deciduous and
coniferous trees) provided Fresnel zone clearance is accounted for.
Severe degradation may be experienced in heavy precipitation.
b. A radio relay system requires a large number of frequencies over a broad band.
Circuits are normally duplex and adjacent links must be established with broad
frequency separation. At junctions, links of adjoining systems require a similar
separation of frequencies. Because of the zigzag course usually followed by
radio relay links, dissimilar frequency lists may be needed for nearby parallel
links if interference is to be avoided. It is normal to use computer software for
frequency assignment, path loss calculation and siting of stations.
SECTION 4
LINE COMMUNICATIONS
317. GENERAL
2. Fibre optic cables or fibre optic cable assemblies (FOCA) are also used for line
communications. In this case, the connection is a clear plastic or glass fibre and the information
is passed by modulating a light beam, as it is transmitted over the fibre. The major advantages
of fibre optic cables over metallic cables are:
c. it is very difficult to tap into by the enemy and unauthorized intrusions can easily
be detected by monitoring the signal strength; and
d. it has a bandwidth up to 1000 times greater than that of a metallic cable of the
same size. Multiple strands of fibre in the cable exponentially increase the
bandwidth available.
3-28 B-GL-351-001/FP-001
Tactical Communication Systems
3. Fibre optic cable has developed into the pre-eminent means of tactical line
communications at HQs, primarily because of its massive bandwidth. Fibre optic cables are
used exclusively in connecting large capacity data systems to their backbone radio relay
carriers. Fibre is also used to connect a HQ node to its radio emitters up to 5 km away from the
HQ site.
4. Line systems are classified according to the degree of permanence inherent in the
installation as either field or permanent line systems. Field line systems are characterized by
ruggedness, simplicity, ease and speed of installation and removal. Permanent line systems
tend to be more complicated, must be individually planned and built and take time and heavy
equipment for construction.
5. Line communication systems can be laid over the ground, suspended on poles or
towers, buried or submerged, or structure wired into buildings.
318. CHARACTERISTICS
B-GL-351-001/FP-001 3-29
SILO — Principles and Fundamentals
319. APPLICATION
b. Field line communications will be used in periods of radio and electronic silence,
in the preparatory stages of offensive operations, as long as possible during
defensive operations and at all times within unit or formation HQ. Specific
usage will be to provide combat information exchange, voice and data, within
staff cells of an HQ, to connect an HQ to the area trunk CS, to provide remote
facilities for CNR and to provide an inter-unit line grid in the absence of radio
communication. Fibre optic cable assemblies are also used as CIS backbone
cabling connecting radio parks to HQ facilities at distances up to 5 km.
a. Multiplex signals may be transmitted at radio frequency over line (coaxial cable)
or at light frequencies over FOCA. A higher grade of field cable, e.g., carrier
quad or a fixed line system is required for this form of transmission. Such a line
requires repeaters and equalizers inserted at regular intervals throughout its
length. This type of line system normally forms part of an area multi-channel
trunk system.
b. Television and high-speed data circuits, which occupy a very wide band, are
transmitted over coaxial or fibre optic cable. Coaxial cable is subject to line loss
and problems inherent in amplifying this type of signal limit the length of these
lines for field applications. However, fibre optics (field grade) cable does not
have the same restrictions and is the preferred transmission medium for high-
speed data circuits with lengths up to 5 km.
3-30 B-GL-351-001/FP-001
Tactical Communication Systems
SECTION 5
HAND CARRIAGE COMMUNICATIONS
321. GENERAL
2. The common methods of carriage consist of runners on foot (within HQ only) and
dispatch riders on motorcycles or wheeled vehicles (Signals dispatch service (SDS) and/or
Liaison Officers (LO). When available, aircraft, boats, trains or any other form of transport may
be used for this purpose. Formations and units provide these communications to subordinate
and lateral headquarters.
322. CHARACTERISTICS
c. Economy. This method may be relatively costly in personnel but under difficult
warfare conditions, it is an effective method of passing critical
messages/information.
B-GL-351-001/FP-001 3-31
SILO — Principles and Fundamentals
323. APPLICATIONS
d. Message traffic when the other means of communication are inoperative or are
reserved for higher priority traffic.
SECTION 6
NETWORKING (MULTI-POINT COMMUNICATIONS)
324. GENERAL
1. A communication network is created any time more than two stations are connected by a
single communication system. When a communication system connects only two stations, it is
obvious that every signal transmitted by one station is intended to convey information that is
both meaningful and relevant to the destination served by the other station. This is not always
the case for a communication system that connects three or more stations. In such a system,
not every signal transmitted by a given station will necessarily be meaningful and relevant to all
other stations on the network. Moreover, many transmissions may convey information intended
exclusively for some identifiable subset of all the stations connected to the network. Telephone
calls and e-mails are examples of communications of the latter nature. On the other hand,
some communication systems are specifically intended to allow a single source to convey
information that is assumed to be meaningful and relevant to all destinations served by the
system. Television programmes and earthquake or tsunami warnings are examples of
communications of this nature. The diverse nature of communications between various sources
and destinations has led to the development of a number of different architectures and
techniques for conveying information between stations on a communication network. At the
most general level, communication networks may be divided into two architectural groups:
switched networks and broadcast networks.
3-32 B-GL-351-001/FP-001
Tactical Communication Systems
2. The intermediate nodes in a switched network are not concerned with the content of the
transmitted signal; their purpose is simply to provide a facility that will route the signal from node
to node (i.e., switch to switch) through the network until it reaches the selected destination
station(s). This requires the source station to provide the system with the address(es) for the
destination station(s). The switches then use this address to determine which series of
communication links to use to convey the signal to the selected destination station(s). The use
of switches substantially reduces the number of communication links required to interconnect all
the stations. This is especially important when new stations are added to the network; a new
station requires only the installation of a single link to the nearest switch rather than the
installation of a separate link to each existing station on the network. Many of the
electrical/electronic telecommunication systems for which Signals is responsible employ
switched networks. There are three types of switched networks: circuit-switched, message-
switched and packet-switched.
B-GL-351-001/FP-001 3-33
SILO — Principles and Fundamentals
6. Clearly, the queuing nature of message switching does not support “real-time”
communication between stations. However, the combination of store-and-forward switching
with multiple path routing allows message-switched networks to make efficient use of a
relatively modest number of transmission channels to convey large volumes of record
information between three or more stations in a timely, reliable manner.
8. The combination of small packet size and powerful routing over multiple paths allows a
packet-switched network to efficiently convey large volumes of information between many
stations, in what can often appear to be real-time, over a relatively modest number of
transmission channels. Packet-switched networks are commonly used for computer-to-
computer data communications over so-called wide area networks, often utilizing existing
transmission infrastructures such as telephone networks.
3-34 B-GL-351-001/FP-001
Tactical Communication Systems
B-GL-351-001/FP-001 3-35
SILO — Principles and Fundamentals
address of the packet to determine whether it should process the packet in order to convert the
user information within it into a suitable form for presentation to the intended recipient or simply
ignore it. Normal all-informed broadcasts are possible on an addressable broadcast network
simply by assigning one address as the “broadcast” address. Every receiving station will
process packets addressed to the broadcast address. An even more sophisticated
enhancement is the use of multi-cast addresses which specified groups of receiving stations will
process. Local area networks (LANs) that interconnect computers within a small geographic
area are the most common example of addressable broadcast networks.
5. The Internetworking Protocol. The Internet Protocol (IP) was created as a way to hide
the complexity of physical addressing by creating a virtual addressing scheme that is
independent of the underlying network. The Internetworking Protocol does not ensure that data
is delivered to the application in the appropriate order; that responsibility is left to upper-layer
protocols such as transmission control protocol (TCP) and user datagram protocol (UDP).
(Note: IP is a connectionless, network-layer protocol in that it does not require a reply but
assumes the data was received, this is why it is used along with TCP which requires a recipient
reply before continuing with data transmission).
3-36 B-GL-351-001/FP-001
Tactical Communication Systems
2. A wide area network (WAN) is a computer network covering a wide geographical area,
involving a vast array of computers see (Figure 3-7). This is different from LANs that are usually
limited to a room, building or a deployed HQ complex. The best example of a WAN is the
Internet. WANs are used to connect distant LANs together, so that users and computers in one
location can communicate with users and computers in other locations. Many WANs are built for
one particular organization and are private. Others, built by Internet service providers, provide
connections from an organization's LAN to the Internet. WANs are most often built using leased
lines. At each end of the leased line, a router connects to the LAN on one side and a hub within
the WAN on the other.
B-GL-351-001/FP-001 3-37
SILO — Principles and Fundamentals
CHAPTER 4
ELECTRONIC WARFARE IN THE ELECTRO MAGNETIC BATTLESPACE
SECTION 1
INTRODUCTION
401. GENERAL
1. Electronic warfare (EW) has been practiced in every conflict since World War I.
Fundamentally the practice of EW has not changed. However, the context in which EW must
operate has. The Canadian Land Force (LF) has placed a greater emphasis on joint and
coalition operations. As well, closer relationships with national and strategic agencies have had
significant impacts on the conduct of EW. The purpose of this chapter is to provide an overview
of EW and the role it plays to conduct offensive, defensive and stability operations as they
pertain to the electromagnetic (EM) battlespace.
3. EW may be conducted by a broad range of assets, ranging from a single soldier with
man-portable equipment to a full squadron operating under armour. In order to maximize the
capabilities of the Canadian Forces (CF) signal intelligence system and LF EW assets, EW
operations will, wherever possible, be integrated with coalition and CF EW and signal
intelligence agencies.
1. The concept and doctrine of EW are derived from a series of definitions that, in general
terms, explain the boundaries of the activity. The central definition for EW, from which
subordinate definitions are derived, is as follows:
21
NATO Military Committee (MC) 64 NATO EW Policy, NATO ATP 51(A) EW in the Land Battle and AAP-6 (U)
NATO Glossary of Terms and Definitions.
B-GL-351-001/FP-001 4-1
SILO — Principles and Fundamentals
c. Electronic Protection (EP). The action taken to ensure friendly effective use of
the EM spectrum despite the adversary's use of EM energy.
4-2 B-GL-351-001/FP-001
Electronic Warfare in the Electro Magnetic Battlespace
2. They also support defensive EW carried out by all arms/services. Specifically, the
following tasks can be carried out by EW organizations:
B-GL-351-001/FP-001 4-3
SILO — Principles and Fundamentals
c. With the expanded area of interest, national assets are now deployed and work
closely with tactical EW elements to support LF operations.
c. The capability to process and secure highly classified information and special
materials based on national policies and security orders.
f. The ability to operate either under armour (medium EW) and using highly mobile
platforms or man-packs (light EW) in order to effectively compliment the
supported formation.
4-4 B-GL-351-001/FP-001
Electronic Warfare in the Electro Magnetic Battlespace
(4) The ability to integrate with the DF capability to provide a single package
capability.
(5) The ability to detect and track low probability of intercept (LPI) signals
(e.g., frequency hopping (FH)).
(7) Conduct first line analysis on collection and reflected in the TACREP.
(2) Broad band coverage to the greatest extent possible and in step with
intercept capabilities.
(3) The ability to integrate with search and intercept capability to provide a
single package capability.
B-GL-351-001/FP-001 4-5
SILO — Principles and Fundamentals
(5) Interfacing with the land integrated support station (LISS) to enable 2nd
level collation of new signals.
(7) Recording.
(2) The ability to attack both communications and radar frequency bands.
(3) Upgradeability.
4-6 B-GL-351-001/FP-001
Electronic Warfare in the Electro Magnetic Battlespace
(4) The ability to create, hold and secure highly classified materials and
databases.
(6) The ability to be mobile in both light and medium armoured vehicles.
(4) The capability of supporting timely transmission of data from the sensor to
the end-product customer without requiring either hard-copy or air
gapping.
22
For more information see B-GL-300-004/FP-000 Sustainment and supporting sustainment
system manuals.
B-GL-351-001/FP-001 4-7
SILO — Principles and Fundamentals
SECTION 2
ELECTRONIC WARFARE SUPPORT
405. GENERAL
23
Sanctuary (or split based) operations is a term used to describe operations that are being conducted from a safe
area (normally out of theatre in Canada) to directly support operations in theatre.
24
MC 64 NATO EW Policy.
4-8 B-GL-351-001/FP-001
Electronic Warfare in the Electro Magnetic Battlespace
8. Electronic Support systems collect data and/or produce information or intelligence, which
can be used to:
10. Electronic Support (except for organic communications systems) employs passive
sensing. In general, ES can collect information throughout a commander’s area of interest and
is an all weather capability. Direction finding ranges and accuracy of ES are greatly increased
with the use of elevated platforms. Electronic Support equipment needs to be modular and
compatible to allow for deployment in fixed-wing, rotary-wing or UAV type platforms. Electronic
Support requires special equipment, well trained soldiers and clear direction from the ISTAR
process on priorities, the types of targets sought and the kind of information desired so wasted
effort is prevented.
11. To exploit the adversary's transmissions, EW elements search the spectrum to find
which frequencies the adversary is using. When they find a target frequency, or set of
frequencies in the case of frequency agile systems, they then intercept the transmissions, use
DF equipment to locate the transmitters and then analyse the message content or emission
types to gain information and disseminate the information to anyone who requires it.
B-GL-351-001/FP-001 4-9
SILO — Principles and Fundamentals
3. In the early stages of an operation, search operations are vital to providing the
information necessary for development of the overall ES capability. The results of search
provide detailed information on the portions of the EM spectrum employed by an adversary and
from this allow the ES package to be task-tailored to exploit the particular theatre. This is
particularly important where the size of the EW force will be limited by the overall contingent
size.
4. Search and intercept operators are required to exploit as much of the EM spectrum as
possible. This will include high frequency (HF), very high frequency (VHF), ultra high frequency
(UHF), super high frequency (SHF) and extremely high frequency (EHF) bands for
communications and radar activity. In tasked tailored operations, the requirement might exist to
have one team focused on search and the other on intercept and cross queuing each other for
direction finding. The team focused on search has some knowledge of the target language, and
will record all voice transmissions heard. The team notes the frequency, the type of modulation
and the mode of transmission. If the net is operating in plain language, the operator can log the
call signs, the type of net and an outline of the traffic. If the operator recognizes it as an
important net, the operator calls for another operator to look specifically at that particular
frequency. In the case of non-communication transmissions, general operators are looking for
emissions with unique signal characteristics before conducting follow on direction finding and
analysis.
4-10 B-GL-351-001/FP-001
Electronic Warfare in the Electro Magnetic Battlespace
5. The team involved in a specific search will be assigned to specific frequencies and looks
for specified nets. Following a frequency change, the team will be busy trying to rediscover the
net on its new frequency. Details of priority nets and those which show promise of providing
useful information are then passed to an intercept operator. Modern search equipment
incorporates microprocessors, which can be programmed to automatically scan a portion of the
band, ignoring friendly or restricted frequencies.
7. These activities require very specialized operator skills such as linguistics. Once an
important radio net is identified by search, it is handed off to an intercept operator who records
the information passed on that net. The intercept operator exploits the information on the net to
the extent possible and then passes the results to analysts for further exploitation, fusion and
reporting. The intercept operator passes the data files to the analyst for further exploitation.
The same process is conducted with regard to intercept of non-communication emitters.
8. Many signals will not be immediately exploitable. These signals will be recorded,
logged, databases updated and passed to other EW assets for exploitation. In certain
instances, the support of coalition national agencies will be necessary to exploit these signals.
The process of exploitation in this case must be as fast as possible to ensure the commander is
supported with timely strategic SIGINT.
10. Intercept can be conducted against secure and insecure nets, but the information
obtained will vary. Secure targets yield valuable information in the form of emission
characteristics (e.g., frequency and modulation), and some inference can be drawn about the
relative importance of the net based on traffic patterns and location of stations. Secure stations
are still subject to DF, as are stations working insecure.
11. From intercept the analysts receive information about frequency, message content,
traffic flow, activity patterns and transmission types. This information is enhanced by locations
and movement provided by DF. In conjunction with other sources of intelligence, the analyst will
try to determine the adversary order of battle, strengths, intentions, unit identities and
deployment.
12. Search and Intercept Equipment. The fundamental equipment in any search and
intercept system is the receiver and associated antenna or antenna system. Intercept receivers
are very sensitive with high degrees of both of frequency accuracy and stability. With a high
gain antenna and good siting, receivers are capable of exploiting signals at a greater range than
normal communication receivers. Intercept receivers usually incorporate a digital frequency
meter, which gives the operator a precise frequency read-out for use by direction-finding
stations. They also have a panoramic display that can detect all transmissions within a certain
range even if these transmissions are infrequent or short.
B-GL-351-001/FP-001 4-11
SILO — Principles and Fundamentals
4. In the HF frequency band, single station location can be performed. In effect, the target
emitter is located by a single ground station rather than by triangulation with a deployed
baseline. Again, it is expected that in the near future, this type of locating capability will be
available in other bands a well. In essence, the need to deploy a baseline to obtain accurate DF
information will be reduced. This will have particular application in operations other than war
(OOTW), where a limited number of EW systems can be deployed and in situations where it is
not practical to deploy baselines.
4-12 B-GL-351-001/FP-001
Electronic Warfare in the Electro Magnetic Battlespace
408. ANALYSIS
1. Analysis is a process of taking sensor data and converting it into information that is
useful. It is important to understand that analysis occurs throughout the ES process and not just
as a final step. The key principles in analysis that apply to ES are accuracy and speed. The
outputs from analysis are SIGINT, immediate threat warnings, force protection, EA targets and
assessments of the effectiveness of EA and other IO measures such as psychological
operations (PSYOPS) or deception.
2. Specially trained SIGINT analysts primarily carry out the analysis function. The analyst
takes direction—Priority Intelligence Requirements (PIR)—from the EWCC and converts this
into tasks for the ES sensors. The ES sensors then collect the necessary data and information
and provide them to the analysts. The analysts then take the sensor results, use various
databases and produce their products. The analyst must integrate information from search,
intercept, and DF of communication and non-communication emitters and produce a SIGINT
view of the battle. From an all-source cell perspective, SIGINT is considered a single source
that must be integrated with other sensor information [recce, UAV, human intelligence
(HUMINT)] to produce Red Situational Awareness (SA) for the commander.
3. Accuracy of the products is critical. The ES process must produce reliable information
and be able to indicate to the ASIC how accurate the information is. Inaccurate information can
have a detrimental effect on the entire process of producing Red SA. Speed of reporting
requires the ES process to produce accurate results as quickly as possible. This allows the
commander to have Red SA faster and hence enables him to quicken his decision-action cycle
relative to the adversary’s.
B-GL-351-001/FP-001 4-13
SILO — Principles and Fundamentals
4. With software and databases being part of ES systems, software can compare ES
results to known databases and provide instantaneous analysis of a signal. This is particularly
true in ELINT. Radars are detected, characterized, located, identified and reported without
necessarily having a human interface. This level of analysis converts signal data into useful
information. Search and intercept operators conduct analysis based on knowledge of the
adversary systems. In principle, the analysis should be done as quickly as possible using
integral software and operator knowledge. As analysis and data fusion software develops, ES
equipment and operators will conduct more analysis. Analysis is a time consuming process.
The adversary uses many means to ensure that it takes considerable time to produce results.
5. From intercept, the analysts receive information about frequencies, call signs, types of
net, message content, traffic flow, activity patterns and transmission types. For both radio and
radar, intercept can identify the equipment by its technical characteristics (electronic
fingerprinting). When fused with locations and tracks from DF, this information enables the EW
analyst to build up the adversary electronic order of battle. The result of their efforts will be
intelligence concerning the adversary order of battle, strengths, intentions, unit identities and
equipment developments. Some information cannot be held by the analyst while developing
SIGINT since it is time perishable and therefore must be passed immediately to the
EWCC/ASIC for action. The analyst is a detective and quickly seizes upon any errors or
breaches of security. The building up of an overall SIGINT picture by analysis is a lengthy
process. If the adversary EP is effective, SIGINT obtained by intercept is fragmentary at first
and gains coherence only as a result of close observation over a period of time.
6. The tactical SIGINT picture is optimally complemented by National systems and their
access to first and second party databases. In theatre, SIGINT analysts can work with the
National system to provide a SIGINT picture of the area of operation. This in turn provides a
detailed communications picture for the EW analysts, the EWCC and the ASIC to aid in their
intelligence preparation of the battlefield (IPB) and subsequent tasking of the commander’s EW
assets.
7. Location of Analysis. Many factors dictate the location of the analysts. Factors that
would determine the location of the analysis function are:
4-14 B-GL-351-001/FP-001
Electronic Warfare in the Electro Magnetic Battlespace
8. Traditionally, the analysis function has been co-located with the search and intercept
functions. Tactical communications has normally been conducted with low bandwidth tactical
radios. The analyst had to reduce the amount of information passed to a size that could be
routinely transmitted by that means. The arrangement also allowed for a close relationship
between intercept and analysis. Current communications technology allows for a far more
flexible deployment of the analysis function. In recent operations, both sensor and analysis
functions have been conducted in separate locations over strategic distances. Additionally, the
analysis function has been integrated with ES sensors into a single vehicle detachment. This
demonstrates that the location of the analysis function is flexible and mission dependant.
9. Within the ISTAR CC there will likely be a need to have SIGINT analysis capabilities.
This will create a synergy with the ASIC and the other sensors. As well, national level
communications links will be readily available to the analysts.
10. Analysis Security. Many SIGINT databases and analytical methods are highly
classified and specially protected. This creates a requirement for a Special Compartmented
Information Facility (SCIF). Access to the information and many SIGINT products require
special security clearances. Commanders, designated staff and the ISTAR CC will require
regular access to this information and will need to be cleared appropriately.
12. Enemy Electronic Deception versus Analysis. Analysts must be aware that an
adversary may attempt deception. A properly conceived deception plan is aimed at the
commander not the ES system. An electronic deception is normally planned as part of an
overall deception plan. In some instances, however, it is possible for only an electronic
deception to be attempted. In this case, the aim is to deceive the ES system into reporting false
information that will be reported to our commander. Analysts must be aware that deception is
possible and question results that appear unusual. When this occurs, the ISTAR system may
be able to confirm or deny the adversaries’ use of deception with other sensors. Analysts
should not be over cautious and not report for fear of deception.
13. Conclusion. As discussed earlier, automated tools will significantly speed up the
analysis process, but analysts must still be highly skilled in order to quickly make sense of a
myriad of data. Although progress in the areas of artificial intelligence and automated tools is
constantly being made, the main tool remains a highly skilled analyst.
B-GL-351-001/FP-001 4-15
SILO — Principles and Fundamentals
SECTION 3
ELECTRONIC ATTACK
1. Electronic Attack is defined as: That division of EW involving actions taken to prevent or
reduce an adversary's effective use of the EM spectrum through the use of EM energy. There
are three subdivisions of EA—electronic jamming, electronic deception and electronic
neutralization25:
25
MC 64 NATO EW Policy.
26
MC 64 NATO EW Policy.
27
MC 64 NATO EW Policy.
28
MC 64 NATO EW Policy.
4-16 B-GL-351-001/FP-001
Electronic Warfare in the Electro Magnetic Battlespace
2. Within the LF, EW units conduct electronic jamming. The responsibility for jamming
rests with the G3 /Chief of Staff (COS), and jamming is coordinated by the FSCC and electronic
EWCC. The EWCC is responsible for the execution of jamming based on targets determined by
the targeting process. Coordination with other staffs, in particular the G2 and G6, is critical.
1. Jamming operations are most successful when they are permitted the greatest possible
latitude to attack both planned and opportunity targets. Coordination of jamming operations
should commence early in the planning cycle and continue through all operational phases. The
measures for controlling jamming are normally contained in the operations order. Control is
exercised in one of four ways:
B-GL-351-001/FP-001 4-17
SILO — Principles and Fundamentals
c. On/Off Control. On/off control is the direct control of a jamming operation from
moment to moment.
2. These four methods of controlling jamming are applied in a manner that permits
maximum flexibility and minimum delay in obtaining authority to conduct jamming operations
without compromising limitations imposed by superior headquarters. Unless forbidden by a
higher commander or established rules of engagement, any formation commander can
authorize jamming. Commanders at all levels must be fully conversant with the orders
governing the use of jamming and be aware of the possible adverse effects on intelligence
collection, command and control and weapon systems.
a. Jammer Power. In general, the higher the power the more effective the
jamming.
b. Range to the Target Receiver. The closer the target, the more effective the
jamming.
29
ATP 51(A) Chapter 4.
30
ATP 51(A) Chapter 4.
31
ATP 51(A) Chapter 4.
4-18 B-GL-351-001/FP-001
Electronic Warfare in the Electro Magnetic Battlespace
c. The Link Distance. The link distance is the distance between the transmitter
and receiver. The longer this distance, the more effective the jamming is (less
jamming power is required).
d. Ground. For ground-based jammers, the ground itself can mask the target or
necessitate greater power to produce effective jamming.
e. Power of the Adversary Transmitter. Depending on the power output of the
adversary transmitter, more jammer power may be required to effect jamming.
Normally, the power output is known and can be factored into the equation to
determine the required jammer power output.
5. Types of Jamming. The types of jamming that may be employed are as follows:
a. Spot Jamming. Spot jamming occurs when a jammer attacks one frequency or
narrow band of frequencies in specific use by the victim. It is normally tuneable
over a range of frequencies. Spot jamming causes minimum interference with
friendly systems and permits maximum use of available jamming power. A spot
jammer requires very accurate knowledge of adversary frequencies.
b. Barrage Jamming. Barrage jamming occurs when a jammer attacks over a
wide band of frequencies simultaneously. The power available will be spread
over the entire bandwidth; this results in less power on any particular frequency
than occurs with spot jamming. Barrage jamming is likely to harass the victim
over a number of frequency options rather than totally deprive the victim of using
any particular frequency. Less detailed steerage is necessary for barrage
jamming. Also, the chance of interference with friendly nets is greater than with
spot jamming.
c. Sweep Jamming. Sweep jamming attempts to compromise between the
advantages of spot jamming and barrage jamming. The frequency of the
jamming signal is continuously varied within a specific bandwidth. All available
power is used for one frequency or a narrow band at any instant, but the tuning
is swept back and forth across a whole band of frequencies. Higher sweep
rates can achieve more effective results.
d. Automatic Search Jamming. More sophisticated jammers use advanced
technology to maximize their effectiveness yet reduce their vulnerability. The
automatic search jammer (also known as a responsive jammer) incorporates an
intercept receiver, which automatically searches a selected band of frequencies
to find frequencies of interest for which the system has been programmed. The
jamming transmitter is then automatically tuned and activated on the target
frequency. For the victim station, the jamming appears to be continuous.
Sometimes a capability is incorporated into the system to look through the
jamming transmissions and follow any changes in frequency made by the victim.
Complex systems will include a computer management function, which allocates
power resources to simultaneous targets.
B-GL-351-001/FP-001 4-19
SILO — Principles and Fundamentals
1. To be effective, a ground-based jammer has to be sited close to the forward line of own
troops (FLOT) so it can take advantage of the high power output (which is typically between 1
kW and 2 kW). This siting allows the jammer to be effective against targets that are in depth
(for example, artillery nets), but it makes the jammer vulnerable. Thus the jammer should be
mounted in an armoured vehicle. Mounting the jammer on an elevated platform such as an
UAV can eliminate the loss of power of a jamming signal caused by intervening terrain
(attenuation). This technique provides a line of sight path from the jammer to the target
receiver, thus enabling a lower power jammer to be used. An airborne jammer of as little as 200
watts output at a distance of 40 km can be as effective as a ground-based jammer of 2 kW
output at 15 km.
1. Expendable jamming involves placing a low power jammer within a few hundred metres
of a target receiver. This can have the same disruptive effect as a high power jammer 15 to 20
km away. Expendable jammers can be hand-placed, airdropped or artillery delivered. They can
be programmed to lock on to strong local signals, or they can be programmed to switch on to a
certain frequency at a predetermined time. If expendable jammers are delivered as a mix with
explosive ordnance, they could seriously degrade the adversary's efforts to restore order out of
chaos. Special Forces, reconnaissance and forward troops may be tasked to place expendable
jammers. Their use would be coordinated, as with other jamming, through the targeting
process.
SECTION 4
ELECTRONIC PROTECTION
1. Electronic protective measures are defined as: That division of EW involving actions
taken to ensure friendly effective use of the EM spectrum despite the adversary's use of EM
energy. There are two sub-divisions of EP:
32
MC 64 NATO EW Policy.
4-20 B-GL-351-001/FP-001
Electronic Warfare in the Electro Magnetic Battlespace
1. Systems are now available that can provide protection for LF by using jammers against
electronic artillery fuses such as variable-time or proximity fuses. The jammer causes the
artillery round to detonate prematurely. The system detects the signal from the artillery round
and automatically sends a signal, which detonates the round. The system is, in fact, a
combination of ES and EA that provides EP.
SECTION 5
ORGANIZATION FOR EMPLOYMENT
1. There are two broad organizational paradigms for EW employment:
1. Light Electronic Warfare (EW) assets have the full spectrum of operational capability and
are mounted in wheeled soft-skinned vehicles thus having the ability to operate dismounted to a
limited degree. Logistical limitations of the platforms employed may dictate a slightly degraded
capability that is offset by increased mobility and reduced logistical support requirements.
1. Medium Electronic Warfare (EW) assets are equipped with wheeled armoured sensor
platforms. Medium EW may have an increased technical capability due to the increased load-
carrying capacity of the platform and provide increased operator protection. Medium EW has
increased logistic support requirements.
2. For all deployments, subject to resource constraints and based on the assigned mission,
the EW team/detachment/troop/squadron will be formed on a grouping of the following building
block functions/entities tailored to the operation:
a. Electronic Warfare Coordination Cell or Signals Electronic Warfare Coordination
Cell;
b. Electronic Warfare Liaison Officer;
c. Electronic Warfare Operation Centre or Signals Electronic Warfare Operation
Centre;
d. Mobile Electronic Warfare Team;
e. Electronic Attack; and
f. Combat Service Support.
B-GL-351-001/FP-001 4-21
SILO — Principles and Fundamentals
6. Rapid Deployment Troop. Electronic Support Team, Analysis Team, one EWLO team,
a wheeled vehicle baseline capable of full spectrum ES and limited EA and integral specialist
technical support.
SECTION 6
COMMAND AND CONTROL OF ELECTRONIC WARFARE
1. When speaking of command and control of EW, this normally refers to specialist EW
units/detachments within formations. Electronic warfare units provide formation commanders
with capabilities to conduct ES and EA operations. All units and formations conduct EP with
EW units providing specialist advice. Electronic Warfare must be coordinated centrally at each
level of command. This does not prevent the allocation of EW capabilities to subordinate
formations and units. Internal to an EW unit, command and control is exercised via the EWCC,
which exercises command on behalf of the EW unit and the EWOC exercises operational
control of the EW assets. However during specific tasked tailored operations the EWCC could
be augmented with an analyst team to take over the control function from the EWOC.
416. COMMAND OF EW
1. Electronic Warfare unit commanders exercise command over their organic EW assets
and, depending on the command relationship,34 exercise control (on behalf of the commander)
of additional EW assets assigned. The EW commander is also the arms adviser to the
commander on EW matters. Because of this, it is imperative that the EW commander be
involved in the supported unit’s operational planning process (OPP) to allow for proper usage of
the assets available or to allow for the EW commander to request additional support from higher
HQ’s EW.
33
The level of ES that can be provided by a single detachment is limited to essential force protection and short-term
warning.
34
B-GL-300-003/FP-001 Command in Land Operations provides details of various command relationship under
which forces can be assigned.
4-22 B-GL-351-001/FP-001
Electronic Warfare in the Electro Magnetic Battlespace
2. For the purposes of this document, the EWCC will be the central capability referred to for
the operational control of the supported unit’s EW capabilities. As the EW unit becomes
smaller, for example, a Troop at the battle Group level, the EWCC may simply be the EW
commander and his or her senior EW non-commissioned officer (NCO).
3. The EWCC is located at the tactical headquarters and acts as the EW unit commander’s
operations (Ops) staff. This coordination is primarily in the form of direction with regard to
movement and allocation of EW assets in support of specific units during different phases of
formation operations. The EWCC should be considered the same as any other CC located at
the unit HQ.
1. The EWCC is the focal point for all EW activities within a given level of command. The
supporting EW unit normally provides the EWCC. Each level of command that has EW assets
allocated will have an EWCC. The EWCC performs the following functions:
a. Develop the EW plans to support the commander’s operation and ISTAR plan.
d. Provide specialist EW advice to the commander and other staff, including EP.
3. In the context of joint and multinational operations, the same technical control
relationship would occur. The joint EWCC would exercise technical control over the Land
component EWCC (as well as those of the Air and Maritime elements). Canadian LF formations
will normally be allocated to an allied formation for operations. The allied formation SEWCC is
responsible for the coordination of all EW activities within the formation. Technical control and
passage for EW information to other nations will be based on national agreements and policies.
B-GL-351-001/FP-001 4-23
SILO — Principles and Fundamentals
1. The EWOC exercises operational real time control of the formation EW capability
specifically with regard to ES in accordance with the EW unit commander’s direction. The
primary function of the EWOC is to control the ES system as it executes search, intercept and
direction-finding tasks. However during tasked tailored operations, the EWOC function could be
replaced with an analyst team located in the EWCC carrying-out the ES control functions.
1. Electronic warfare liaison officers (EWLOs) are normally allocated from the formation
EW unit to subordinate formations that do not have an organic EW unit. The purpose is to allow
subordinate formations and units access to the capabilities of the EW system, in particular, ES
information and EA. If a subordinate formation or sub-unit is allocated EW resources, an
EWCC, depending on the size, organization and mission of the supported sub-unit or formation,
is provided for its support.
2. An EWLO at the EW squadron (Sqn) level will normally be a Captain. At the Brigade
(BG) level, an EWLO will be a Sergeant or a Warrant Officer.
SECTION 7
ELECTRONIC WARFARE PLANNING AND PROCESSES
1. Formation HQs use the OPP to produce a plan based on the mission, concept and intent
of the higher commander. The IPB process and the targeting process support the OPP. The
SIGINT IPB creates a picture of the EM spectrum for the EW commander to be able to better
advise the G2, G# and the supported commander with respect to how best to employ the EW
assets available.
4-24 B-GL-351-001/FP-001
Electronic Warfare in the Electro Magnetic Battlespace
d. Decision. The staff presents the results of COA war game to the commander
for a decision on which COA to develop into a plan.
e. Plan Development. Another war game is conducted to refine the selected COA
and develop the decision support template (DST), the synchronization matrix
and high payoff target list (HPTL). The targeting process produces the attack
guidance matrix (AGM). The EWCC supports the targeting process with
coordination of EA. The result of this step is the production of an order with an
EW annex; and
f. Plan Review. The coordination of the details of the plan with subordinate units
is conducted during this step. The EWCC coordinates the EW plan with higher
and lower formations as necessary.
1. The IPB process provides a continuous analysis of the adversary, weather and terrain.
The result of the process is the information collection plan (ICP). The process has four steps:
a. Define the Battlefield. The staff refines the AO and defines the area of
intelligence responsibility (AIR) based on the higher formation orders and the
commander's initial planning guidance.
2. The EWCC must participate in IPB. In fact, in conjunction with National Assets, it is
responsible to prepare the SIGINT IPB. This will allow the G2 to more fully understand the
electronic battlefield when preparing the ICP. This in turn will provide direction to the EWCC for
ES through the ISTAR CC. The IPB process is a useful tool for the EWCC in preparation for ES
operations.
3. Targeting is defined as “the process of selecting targets and matching the appropriate
response to them taking account of operational requirements and capabilities.”35 The targeting
process assists the commander by determining which targets are to be acquired and attacked,
when they are to be attacked and what is required to defeat the target. A target is an adversary
function, formation or equipment, facility or terrain planned for destruction, neutralization or
35
AAP 6 NATO Glossary of Terms and Definitions.
B-GL-351-001/FP-001 4-25
SILO — Principles and Fundamentals
suppression in order to delay, disrupt, divert, limit or destroy the adversary.36 Targeting links the
commander, the sensors and the engagement systems. The targeting process has four
functions:
a. Decide. Decide is the cornerstone of the targeting process and requires close
coordination between the commander and the intelligence, plans, operations
and targeting team elements. The process begins with receipt of a mission,
whether assigned by higher HQ or deduced by the commander. The
commander, with input from his staff, analyses the mission and considers the
tasks that must be performed. Targeting priorities must be addressed for each
phase or critical event of an operation.
b. Detect. Detect is the next critical step in the targeting process. The G2 is the
main figure in this step as he coordinates the effort to detect high payoff targets
(HPTs) identified in the decide function. To ensure there is no duplication of
effort, specific direction is given to target acquisition systems capable of
detecting high priority targets. Information needs are expressed as priority
intelligence requirements (PIRs) and information requirements (IRs). The detect
function is carried out through the execution of the ICP.
c. Deliver. The deliver function of the targeting process executes the AGM and
supports the commander’s battle plan once the HPTs have been located and
identified. During the detect function, it is the TA assets that have to be
managed. The deliver function provides the framework for the efficient
employment of firing assets. The attack of targets must satisfy the attack
guidance developed during the decide function.
36
B-GL-300-007/FP-001 Firepower Chapter 3.
4-26 B-GL-351-001/FP-001
Electronic Warfare in the Electro Magnetic Battlespace
4. The EW system is involved in the targeting process in two ways. Firstly, EA is integrated
as an engagement system with all of the other engagement systems at the commander’s
disposal. The EWCC, which is a member of the targeting team, is responsible for the
integration, tasking and control of EA based on the targeting priorities. The second way that the
EW system is involved in the targeting process is that the entire EW system is required to
conduct its own targeting process for effective EA support.
5. The EWCC with the targeting team conducts the decide function for EA. The targeting
team will recommend the use of EA and the control measure37 to be in effect. The ES provides
the detection function for EA. This involves the collection of information (in effect target
acquisition) in sufficient detail to allow for effective EA. For example, determination that a
specific frequency is an artillery net and its general direction is sufficient information to allow the
EWCC to target that particular net. The deliver function is conducted by the EA detachments as
directed and coordinated by the EWCC. The ES then provides the assess function by
determining if the EA has been effective and recommends new targets to the EWCC to ensure
the EA remains effective.
1. The ISTAR planning process within the formation is a continuous process much like IPB
and targeting. A cycle begins with the receipt of the commander’s guidance on completion of
his or her mission analysis. The guidance contains the PIRs that are of concern to ISTAR.
1. At this stage in the process, PIRs should be considered to be of two types. Some PIRs
are things that the commander will need to know for the execution of the mission. For example,
the commander may want to know if the adversary will delay or defend. As a result, during
execution, ISTAR will look for indications that the adversary is thinning out in preparation for a
withdrawal. Other PIRs will be for planning. For example, the commander may want to know
the extent to which the adversary’s defences have been prepared. These latter PIRs are
immediately translated into tasks in the ISTAR coordination centre (ISTAR CC) and issued out
to sensors. The EWCC converts tasks from the ISTAR CC into ES tasks.
1. Intelligence, surveillance, target acquisition and reconnaissance provides the terrain and
environment information that allows the G2 to describe the battlefield effects. The ISTAR CC
also contributes to the evaluation of the threat by providing intelligence from existing databases
and from the results of the collection efforts resulting from the PIRs issued for planning. The
EWCC will work with the ISTAR CC and the G2 to add the electronic battlefield to the G2’s IPB.
This will in turn keep the EW commander as part of the planning process and overall IPB so that
the supported commander, the G2 and the G3 have an understanding and appreciation for what
electronic targets are available and prosecutable in support of the operation.
37
See chapter 6 of B-GL-358-001/FP-001 for EA control measure measures.
B-GL-351-001/FP-001 4-27
SILO — Principles and Fundamentals
1. As the formation operations staff develops the COA, EW planners contribute to the
development by advising on the EW contribution to each COA. The EW planners participate in
the COA war game and the plan war game in order to ensure that EW tasks are fully
synchronized with the remainder of the plan.
2. During plan development, the EWCC continues to contribute to the common operational
picture, as it collects information based upon the PIRs issued for planning. The updated
common operational picture allows the COA to be adjusted to a change in adversary disposition
or in increase in our knowledge of the adversary disposition.
1. The ISTAR plan is included as an annex to the formation operation order. Like the Fire
Support annex, the ISTAR plan is prepared by the ISTAR CC and is issued as part of the
formation operation order. The ISTAR plan describes how the assets of the ISTAR system will
be used to collect the information required in the ICP.
2. The ISTAR CC will coordinate unit ISTAR plans on behalf of the G3 ISTAR. This will
identify gaps in the ISTAR coverage and allow action to be taken to cover the gaps if possible.
It will also identify to the ISTAR CC, the ISTAR priorities of subordinate commanders, so that
information that is collected that is particularly relevant to their battles can be processed on their
behalf. The EWCC will assist in this coordination by evaluating the ES coverage of a
subordinate formation in conjunction with the SIGINT IPB.
3. ISTAR Overlay. The ISTAR overlay links the ISTAR plan, IPB and the targeting
process. The overlay details the named area of interest (NAI) and target area of interest (TAI)
that are developed during the formation OPP. Collection tasks within these NAI and TAI will be
detailed in the ISTAR annex and the ISTAR matrix.
4. ISTAR Matrix. The ISTAR matrix is an appendix to the ISTAR annex. It is based upon
the ICP produced by the G2. The ISTAR matrix relates the ICP to the ISTAR system sources
and agencies. It identifies collection tasks to ISTAR sensors and is prepared by the ISTAR CC.
The EWCC will be represented on the ISTAR matrix and is the main tasking document for ES.
It also allocates tasks to other formation units since it forms part of the formation operation
order.
5. Information Collection Plan.38 The ICP identifies the PIRs, the IRs and the combat
indicators necessary to evaluate the adversary’s COA and to predict the adversary’s future
activities. It is an appendix to the Intelligence annex to the formation operation order. It allows
all units to understand the information required to draw the appropriate conclusions about the
adversary. This is a very important document for the EWCC and the EW analyst. It allows the
EWCC to focus its analytical efforts. Conclusions drawn by the analysts must support PIRs and
IRs.
38
Examples of the ISTAR overlay, ISTAR matrix and the ICP can be found in B-GL-352-001/FP-001 Land Force
Information Operations—Intelligence, Surveillance, Target Acquisition and Reconnaissance Chapter 3.
4-28 B-GL-351-001/FP-001
Electronic Warfare in the Electro Magnetic Battlespace
1. There is not one EW Process. The EW system conducts two processes: ES and EA
processes. The EWCC is the focal point of both of these processes.
2. The Electronic Support Process. The ES process is a sub-process of the ISTAR and
intelligence processes. The ES process mirrors the intelligence cycle in that it consists of
direction, collection, processing and dissemination. The process begins with direction from
collection management on the areas to be covered. This consists of the ICP, ISTAR overlay
and ISTAR matrix. The EWCC converts these documents into specific targets such as
networks (C2, artillery, reconnaissance nets), critical nodes (command posts, communication
centres) and activities (radar, movements) that will satisfy the collection tasks. The targets are
passed to the EWOC or the analyst team for additional analysis, refinement and tasking to the
sensor systems. The sensors, both COMINT and ELINT, conduct the collection phase of
search, intercept and. The search systems continuously look for targets and pass those of
interest to intercept for further detailed collection. Direction finding is conducted to determine
locations, and this information is fused with the intercept information.
3. The EWOC or the analyst team then processes the information into a single source
intelligence product (SIGINT) disseminated in the form of TACREPs or EWSUMs. The EWOC
can also re-task the sensors as necessary. The products are then disseminated to the EWCC
who provides the results to the ASIC. The ASIC may ask for additional information from the
EWCC or request additional ES tasks through the collection managers to the EWCC.
5. The conduct of EA will have a direct effect on the ES collection. The ES resources
normally dedicated to ES tasks will be required to monitor the effects of EA and will thus cause
some degradation of the ES effort. Normally, many of the EA targets have been well developed
and, therefore, the ES effort will not be completely degraded to support EA. ES should continue
during EA activities. If necessary, the G3 ISTAR will make the decision on the priority of effort
based on advice from the EWCC, the G6 and the G2. The G6 must be involved in the planning
process regarding EA assets to ensure the RFL is being obeyed, on behalf of the G3, and to
ensure there is a limitation of any signals fratricide. This is a risk assessment that must be
presented to the supported commander.
B-GL-351-001/FP-001 4-29
SILO — Principles and Fundamentals
SECTION 8
ELECTRONIC DECEPTION
All warfare is based on deception.
428. AIM
1. The aim of deception is to mislead the adversary commander and induce him into doing
something counter to his interests. The EM spectrum is an ideal medium to employ deceptive
techniques because it is shared with the adversary. His ES system is a means to provide him
false information. Electronic deception is employed as part of an overall tactical deception plan
and cannot be practiced indiscriminately. Careful scripting and control at the highest possible
level are required as well as highly skilled operators who must be well briefed. On the other
hand, low-level imitative deception can be attempted by EW elements if the aim is limited to
delaying adversary traffic from a few minutes to a few hours or if there is an opportunity to
temporarily confuse adversary commanders at formation or unit level. Electronic deception is a
potent weapon with few of the disadvantages of jamming, but it can be very expensive in
manpower and equipment.
429. PLANNING
1. Electronic deception must be considered during the planning phase of any deception
plan. The G3 has responsibility for developing the overall deception plan. The planning of ED
is the responsibility of the EWCC on behalf of the G3 (via a designated G3 IO). Many other
staffs are involved with the development of deception plans. Annex B to this chapter provides a
guide for the EWCC to plan and coordinate ED. Electronic deception is particularly effective in
the following circumstances:
39
More information on deception can be found in B-GL-354-003/FP 001
Land Force Deception.
4-30 B-GL-351-001/FP-001
Electronic Warfare in the Electro Magnetic Battlespace
c. When it is skilfully conducted and fully integrated into the overall deception plan.
2. All units in a formation could be involved in ED. Electronic deception is divided into
three categories:
SECTION 9
ELECTRONIC NEUTRALIZATION
430. GENERAL
B-GL-351-001/FP-001 4-31
SILO — Principles and Fundamentals
CHAPTER 5
SIGNALS PLANNING
SECTION 1
INTRODUCTION
1. Signals and staff have a symbiotic relationship that demands that both entities fully
understand the requirements of the other to achieve mission success. In order for Signals to
successfully provide the Command Support necessary for the staff to support the Commanders
decision-action cycle, Signals needs to understand the information exchange requirements of all
involved in that cycle in the context of the Land Operating environment (LOE). Further, Signals
must be able to provide the most suitable environment within that LOE from which to execute
that decision-action cycle efficiently and effectively. There are a significant number of factors
that affect Signals’ ability to achieve that aim. The goal of this chapter is to outline the process
and the factors that affect Signals in their provision of Command Support services. By
understanding the process and the requirements that drive it, Commanders and staff will
understand what is required of them to ensure that the Command Support provided by Signals
is the best possible, given the operational requirements.
2. A formation's Signal element is responsible for providing the Commander and staff with
the personnel, equipment and vehicles required to exercise command over subordinate
formations and units, for electronic warfare (EW) support and for the administrative support and
security of the headquarters (HQ). These responsibilities cannot be met properly unless the
efforts of the general staff and Signals are complementary. Each has to know and accept its
responsibilities towards the other.
1. Training. The general staff assists in the preparation of training plans. The staff must
ensure that these plans direct and facilitate training of all elements of the formation in
communication procedures, equipment and facilities.
b. Issue orders for the opening, closing and joining of communication nets.
e. Enforce policy concerning the distribution and use of codes and encryption
devices.
B-GL-351-001/FP-001 5-1
SILO — Principles and Fundamentals
1. General Responsibilities. The formation Signal unit has the following responsibilities:
(1) training;
5-2 B-GL-351-001/FP-001
Signals Planning
i. Drafting the Command and Signals paragraphs and the Communications and
Electronics Annex to Operation Orders and the preparation of Communications
and Electronics Operating Instructions (CEOIs).
k. Providing advice on the policy and planning of EW activities and the allocation of
EW elements.
1. To work efficiently, the tactical Signal systems must be co-ordinated as one entity;
therefore, a control system must be established at all levels of command. Control aims at the
best utilization of all systems in order to meet operational requirements. A considerable degree
of centralized planning and overall control is necessary to eliminate undesirable duplication or,
alternatively, to exploit available systems to their full potential. However, substantial delegation
of authority is required in the execution of the Signal plan.
2. Controlling agencies are fielded as part of Signal units; they exist to assist key Signal
officers in discharging their responsibilities towards Commanders and staffs. Control and co-
ordination of tactical systems is exercised from the highest to the lowest levels of command;
thus, at any level, a Signal officer (Sig O) is operationally responsible to his or her Commander
and subject to technical control instructions issued by the senior Sig O at the next higher level of
command.
1. To be effective and meet the requirements of Commanders at all levels, Signals must
provide the Command Support necessary to sustain the Land Command Support System
(LCSS) in accordance with certain principles. All of these principles are interrelated although
they may not be mutually compatible in all circumstances. Their application and their relative
importance in planning and in operations must therefore be weighed against the specific needs
in every situation.
B-GL-351-001/FP-001 5-3
SILO — Principles and Fundamentals
2. Capacity. The system must be capable of handling the traffic generated by the users
within the specified time frame, in the required mode and without inhibiting the tempo of
operations. Constant monitoring of the LCSS must be carried out to ensure that operated
systems are engineered to meet the capacity needed for peak loads. These peak load periods
can be anticipated with the co-operation of users.
3. Economy. The increasing complexity of warfare means that more and more of the effort
has to be diverted from the primary function of fighting to tasks that, although essential, are
ancillary. One of these tasks is the provision of an LCSS. It must therefore be as economical
as possible and demand the least amount of human and material resources for its operation and
maintenance. It is important that LCSS facilities be allocated in accordance with operational
priorities and that their use be strictly controlled to ensure they serve the intended purpose.
b. signal plans are based on the minimum scale needed to accomplish the tactical
mission; and
c. signal spares and reserve holdings are properly planned to promote reliability
and flexibility.
6. Flexibility also implies the ability to provide systems which are interoperable and can be
adapted to diverse operations and/or combat functions.
b. standing operating procedures (SOPs) and drills to reduce the time needed to
plan and redeploy LCSS components;
d. close co-ordination between the user and the Signal planner; and
e. systems that are user-oriented and can be used for a variety of combat
functions.
8. Mobility. This is the ability to deploy everywhere on the battlefield and to meet the
needs of the user without restricting freedom of action and ability to manoeuvre. LCSS
components must have the same tactical mobility as the forces being supported.
9. Mobility is also enhanced by the design of communication systems that allow for
separate movement of user HQs and Signal facilities (e.g., an area trunk system).
5-4 B-GL-351-001/FP-001
Signals Planning
10. Reliability. Reliability is the capability of a system to operate efficiently within the
specified performance standards, for a planned period of time and under the conditions likely to
be encountered. The system must remain available to the user for traffic despite damages and
technical failures. Its maintenance and restoration requirements must be satisfied within
allowed and available resources.
13. To achieve security it is essential that every LCSS user know and observe the Signal
security procedures established to ensure the protection of classified traffic, documents and
equipment. Security should be applied in balance with the requirement to ensure that critical
information remains available to Commanders when and where they require it.
14. Simplicity. The simpler the system, the more likely it is to withstand the stresses of war.
Simple systems are easily operated, readily adaptable and easy to deploy and maintain.
15. Land Command Support System components must be designed as much as possible to
be operated by users with minimum training. Any design that increases the level of technical
complexity must produce equivalent improvements in operational effectiveness.
16. Survivability. The system has to be capable of withstanding physical and electronic
attacks by the enemy. In particular, equipments must be designed to operate effectively in an
environment with a severe electromagnetic pulse (EMP) threat. Equipment has to be hardened,
facilities protected and alternate facilities provided. Personnel are to be well trained in
defensive measures, EPM procedures and restoration drills.
B-GL-351-001/FP-001 5-5
SILO — Principles and Fundamentals
17. Timeliness. Combat information has a short useful life span. In order to be successful,
Commanders must complete their command and control (C2) process in a shorter time frame
than their opponents. The LCSS components must therefore be engineered, organized and
operated so as to allow the processing and transmission of combat information within the
required time frame. Staff and Signal personnel are to be imbued with a sense of urgency.
1. To promulgate the direction required to execute Signal plans, a system of orders and
instructions is used. These may be issued through either staff or Signal channels, according to
their nature. In general, Signal matters which are part of the Commander's plan or that touch on
the authority or resources of subordinate Commanders are covered by orders issued by the
Commander or in his name by the formation Sig O. Detailed technical instructions necessary to
provide Signal support to further the Commander's plan are issued directly by Signals. The
major part of this chapter deals directly with the Signal Estimate by design, as it is the
foundation process used in generating the subsequent Signals orders and instructions.
2. The Figure 5-1 represents a Signals Planning Process model as applied to the current
LCSS, which may be adapted to cover any integrated information system/communications
system (IS/CS).
5-6 B-GL-351-001/FP-001
Signals Planning
SECTION 2
SIGNAL ESTIMATE
506. GENERAL
1. This section describes a Signal Estimate, which outlines the planning considerations and
process that is required to determine the requisite Signal support to the LF. The process of
Signal planning starts with a Signal estimate, which generates the plan used to formulate any
subsequent Signal orders and instructions. The estimate of the situation is a time-honoured
process, which is used by Commanders at various levels to ensure that complex problems are
considered thoroughly in a logical process of reasoning. The Signal estimate process can be
quickly stated as an activity by which a Sig O follows a logical process of reasoning to consider
all the circumstances and factors affecting the military situation and decide on the course of
action to be taken in order to accomplish the assigned tactical mission.
2. The mental process used is the same for both the tactical and the Signal estimate. It is
important to keep the following differences clearly in mind when considering the Signal estimate
vis-à-vis its tactical counterpart:
1. Prior to the advent of modern information technology, it was nearly impossible to quickly
produce and mass-distribute information in any other way than text based documents.
However, the text-based approach to a Signal estimate is inefficient. Large quantities of text are
required to communicate Signal concepts clearly, which can lead to fatigue, if not outright
confusion for the reader. In addition, a text-based estimate can take an inordinate amount of
time to produce.
B-GL-351-001/FP-001 5-7
SILO — Principles and Fundamentals
2. The following presents a methodology for conducting and presenting a Signal estimate
using a largely graphical format. It is a guide, not a template. Used intelligently it can make the
Signal estimate easier to conduct and to present. Used blindly, it will hinder, rather than help
the process. Remember, the estimate is a tool whose effectiveness will be dictated by the skill
with which it is applied.
508. METHODOLOGY
1. The Signal estimate can be effectively divided into the following stages:
(2) translate the user requirement into Signal terms using a service-centric
approach; and
(3) determine the restrictions on our freedom of action in meeting the user
requirement.
b. Evaluation of Factors, in which we identify the internal and external factors that
will affect the operational situation and analyze the potential effects of each. For
ease of review, these factors are normally considered in the following standard
order:
(3) environment;
(4) surprise;
(5) security;
(8) other.
5-8 B-GL-351-001/FP-001
Signals Planning
d. Deliver the Decision Briefing, in which the Commander is presented with the
shortlist of options developed above.
e. Developing a Detailed Plan based upon the COA selected by the Commander.
3. Commanders, Operations Officers (Ops O) and Chiefs of Staff (COS) have a vested
interest in the success of the Signals Plan and are a valuable source of information to provide
clarification to any questions that may arise while completing your estimate. Seek out advice
when you do not understand something.
1. During operations adequate preparation time is not the norm. At best, you may be
handed a draft operations order, given a few minutes in which to ask questions and then be
expected to produce a draft Signal plan in a matter of hours. At worst, you may find that you are
expected to develop your Signal plan concurrent with, if not in advance of, the development of
the tactical plan. To aid in production of the estimate the following points must be governing
factors:
a. Speak the User’s Language. Know your tactical doctrine at the level at which
you are employed. Be familiar with any modifications of meaning or terminology
that your supported tactical Commander uses;
B-GL-351-001/FP-001 5-9
SILO — Principles and Fundamentals
2. Mission Analysis. Within the Estimate of the Situation, the accepted tool for
determining the user requirement is Mission Analysis. A detailed exposition of Mission Analysis
is found in B-GL-300-003/FP-001 Command in Land Operations. It should be read in detail and
pondered at length. In summary, Mission Analysis consists of the following steps:
f. Regularly Review the Results. No plan survives contact and neither should
any Mission Analysis. As the situation changes or new factors come to light,
review the Mission Analysis to ensure that the results are still valid. If they are
not, then redo the Mission Analysis.
3. Define the Requirement in Signal Terms. Once the Mission Analysis is complete, you
should have a clear understanding of what is required. Producing a network diagram at this
point is a useful and efficient way of translating this into Signal terms. If supporting a multi-
phased operation with regroupings between phases, it will be useful to produce a separate
network diagram for each phase. A useful and logical methodology for determining the Signal
support requirement is to:
5-10 B-GL-351-001/FP-001
Signals Planning
B-GL-351-001/FP-001 5-11
SILO — Principles and Fundamentals
5-12 B-GL-351-001/FP-001
Signals Planning
1. Having determined what Information Services are required, the next step is to determine
the best means of delivering them. In some situations the answer will be straightforward and
simple: usually because only one delivery means is available. Other situations may be more
complex. A thorough, logical analysis of the external environment and how it will affect your
delivery of information services (this process is sometimes referred to as the Signal Preparation
of the Battlefield) will give you a high degree of confidence that your resulting plan will not be
held up in future years as a good example of how not to do things.
B-GL-351-001/FP-001 5-13
SILO — Principles and Fundamentals
2. Signal Preparation of the Battlefield is best done link-by-link, rather than the terrain-
centric approach of ground left/centre/right used in the tactical estimate. Begin by considering
technical requirements and friendly force capabilities. While this will likely shock your
manoeuvre arm colleagues, it makes sense to eliminate alternatives that cannot support the
required Information Services as early as possible. Furthermore, this will enable you to identify
at the outset if you have Information Service Delivery requirements that your current equipment
cannot support due to technical limitations. Consider the remaining Information Service
Delivery options against, as a minimum, the following external factors:
3. Presentation. Signal Preparation of the Battlefield presents its results in the form of a
graphical and tabular product: the Service Delivery Assessment (SDA). A separate SDA is
prepared for each required service identified to this point in the Signal estimate, identifying the
factors and deductions pertinent to each. If the SDA is large, it may be helpful to break it into a
number of smaller SDAs each of which considers a subset of the applicable factors. A sample
SDA for a single link (C/S 1 to C/S 0) is shown below. Note that this is an indicative example
only. An actual SDA would contain considerably more facts and deductions!
5-14 B-GL-351-001/FP-001
Signals Planning
Enemy/Opposing
Forces/Local
Population
Surprise
B-GL-351-001/FP-001 5-15
SILO — Principles and Fundamentals
Sustainment
and Support
Technical
Issues
1. Only deductions that meet the following rules of thumb should be recorded:
5-16 B-GL-351-001/FP-001
Signals Planning
c. Is This Going to Affect My Plan? If the deduction is not going to affect how
you do business, don’t bother recording it. However, before you cast the
deduction aside be very certain that it will not, under any circumstance, affect
what you do. Not many deductions will fall into this category, but a few may. A
good example is a nationally mandated procedure where you have no flexibility
in its application (e.g. cryptographic storage and accounting).
513. ANALYSIS
1. Analysis, the application of expert judgment to facts to determine their significance, has
been referred to as the “dark mystery” of the estimate process simply because it is by nature a
subjective activity. While the expertise of one’s judgment is certainly a function of experience
(among other things) it is possible to conduct analysis in a structured and coherent way. The
following process is suggested as a starting point:
b. Identify Options. For each service, eliminate those options that are precluded
by the laws of nature and/or other factors (e.g. if a high speed, large bandwidth
data capability is a requirement, you can safely eliminate HF as a means of
delivery). Further analyze the remaining service delivery options as follows:
(3) Security. Identify the overall security risk (and the resources required to
mitigate it) associated with each option. A thorough understanding of this
will be essential if (when) changes are required to the plan and you are
required to provide rapid assessments of the security risks inherent in a
proposed change.
B-GL-351-001/FP-001 5-17
SILO — Principles and Fundamentals
1. The penultimate step in the estimate process is the development and assessment of
COA that will enable you to achieve your operational tasks within the existing operational
environment. This is often done in a two-phase process: a brainstorming session, in which
concepts of operations are generated, followed by an assessment of the merits and
shortcomings of each COA in relation to the operational situation. Regardless of the approach
taken it is essential that COA be:
5-18 B-GL-351-001/FP-001
Signals Planning
COURSE OF
ADVANTAGES RISKS REMARKS
ACTION
1. INMARSATs with each patrol 1. Strategic link Strategic Comms
give high reliability comms in high- redundancy reduced since assets att
threat areas. INMARSATS det to ptls. TACOM – auth
2. Reliance upon our own cable 2. Line stores arrival date reqr from CF J6 to
RABID GERBIL assets in planning reduces risk in theatre cannot be det INMARSATs.
since theatre recce not yet guaranteed, possible Alternatively, add
completed. delays in full OPRED date INMARSAT terms
of JTF HQ and leases may
be reqr.
1. Use of IRIS VHF in ptls reduces 1. Mountainous terrain Guaranteed
trg burden on Sig Ops, since Coy means that VHF comms comms with ptls
signalers fully trg on IRIS OPCAP will reqr RRB depl to be essential since
DRUNKEN 1. reliable. Additional RRBs force protection is
DUCK 2. Contracting cable plant constr in may be reqr. Comd’s primary
theatre reduces work load on own 2. Unknown if cable stores concern.
tps. and expertise aval locally,
TAVs may still be reqr.
Figure 5-6: Table Describing Comparison of Courses of Action
1. Once the COA has been developed and assessed, it will be time to present them to the
supported Commander, who will decide what they really want to do. A full discussion of
Decision Briefings is outside of the scope of this publication; however, the following guidelines
should be respected in all cases:
b. Accuracy. Ensure that your briefing draws a clear distinction between facts,
inferences and speculation. There is a world of difference between knowing
something to be true and hoping that it is true.
c. Simplicity. Keep the structure of the briefing clean and easy to follow.
1. Once the supported Commander has selected a COA for implementation, the estimate
will then have to be turned it into a clear, concise plan that subordinates can execute. There are
multiple ways of doing this:
B-GL-351-001/FP-001 5-19
SILO — Principles and Fundamentals
2. The primary difficulty in conducting the Signal estimate has not been the estimate
process itself, but rather the difficulty inherent in clearly and efficiently communicating the
reasoning process used. A more formatted formal method for drafting a Signal estimate will be
published in the Army Communications-Electronics Standard Instructions (CESI).
1. The ability of Sig Os to plan successfully the Signal support of operations depends to a
great extent on:
a. the receipt of the accurate, complete, up-to-date and early information needed;
b. the ability to think through the Signal problem in a logical but expeditious
manner;
c. a thorough knowledge of Signal personnel and CIS equipment capabilities
including those of cooperating forces;
d. a thorough understanding of tactical concepts and plans;
e. streamlined battle procedure, aided by C2IS software programs, to speed up the
planning process and to enhance the ability to react to unforeseen events; and
f. good communication capability to be able to impart one's intention quickly and
accurately whilst gaining the cooperation of subordinates and allies.
2. Liaison and Visits. Visits are essential to confirm the adequacy of communications
services, to assess the situation and to obtain advance information. A Sig O makes frequent
visits to the various staff centres and to subordinate Sig Os periodically to gain early warning of
impending moves or operations visits. Also, the inspection of deployed detachments to ensure
that systems are functioning properly and to detect emerging problems is essential.
1. Orders detailing the tasks and grouping of several Signal elements and giving the
essential coordination details required to ensure the execution of the Signal plan in support of
an operation are issued by formation Commanders or in their name by formation Sig Os.
Depending on the formation SOPs or the complexity of the tasks, formation Sig Os will normally
choose to issue simple orders in the appropriate paragraph of the Op O; further detailed orders
will be issued as an EW annex and a CE annex to the Op O. These annexes may be issued
simultaneously with or separately from the main body of the Op O when Signal deployment
timings preclude coordination of the issue. In all cases, the main body of the Op O makes
reference to the annexes. Supplemental instructions may be issued as Fragmentary Orders
(FRAGOs) to the main Op O at any time.
5-20 B-GL-351-001/FP-001
Signals Planning
may be issued by the formation Sig O to other elements under command of the multinational
Signal organization or those elements not under his command when detailing tasks for a duly
authorized Signal operation.
1. The CEOIs are issued by formation and unit Sig Os at all levels of command to
coordinate the operation of CIS systems and subsystems. If CE Op Os and CE Annexes to Op
Os are concerned with the “who” and “what,” CEOIs deal with the "how" of CIS operations.
They contain the essential details needed for the operation and integration of CIS. They are
issued along Signal channels and are intended for CIS operators and supervisors. Topics
covered under the CEOI include:
h. In Theatre BLOS;
i. Codewords;
j. Nicknames;
a. network configuration;
B-GL-351-001/FP-001 5-21
SILO — Principles and Fundamentals
d. server configurations;
e. client configurations;
1. Standing Operating Procedures (SOPs) deal with a broad range of tactical, Signal and
administrative activities intended to become routine. These drills form the basis of all recurring
activities and promote efficiency by eliminating or reducing the need to detail these steps in
every plan. For Signal units they may cover Signal C2 measures, activities affecting staff and
other users as well as those pertaining to the administration, protection and movement of
headquarters.
5-22 B-GL-351-001/FP-001
Signals Planning
1. Many publications are available to Signals that can be used to pass or to gain
information on personnel and equipment. Some of these are listed below:
c. Life Cycle Materiel Manager (LCMM) publications deals with equipment and
covers the following areas that are of interest to Signals technical staff:
B-GL-351-001/FP-001 5-23
SILO — Principles and Fundamentals
ANNEX A TO CHAPTER 5
SIGNAL ESTIMATE FORMAL TEMPLATE
Copy No __ of ___
SIGNAL ESTIMATE OF THE SITUATION
By
I. C.A.N. Write
Major
CO 20 CMBG HQ & Sig Sqn
at (place) at (hours) on (date)
References: A. MCE 6100/6/94/649413 Republique Rwandaise, Jun 94, 1:250,000
B. UN Security Council Resolution xxx/xx Aug 55
Time Zone: CHARLIE (ZULU plus three hours)
Assumptions:
(1) List any relevant assumptions made in the preparation of the estimate (i.e. this is filled
out as you go through the estimate).
Question/factor Consideration/deduction Tasks/constraints
(a) (b) (c)
MISSION The task(s) given, and the purpose, against which all factors are considered.
STEP 1— MISSION ANALYSIS
(Why?)
1. How must my action directly
a. Superior Commanders support my immediate superior,
taking into account his intent and
(1) Two levels up (Intent).
concept of operations, and the
(2) One level up (Intent and intent two levels up?
concept of Ops).
b. Superior Signal Commanders How does this effect the higher
(1) Intent and concept of Ops. Signal Plan, and will it effect my
(2) Analysis of en RECS/EW immediate superiors intent and
and tactical objectives in your area concept of operations?
of responsibility.
c. My Role in his Plan
(What?)
2. Tasks What task(s) must I complete to
a Assigned. accomplish my Mission?
b. Implied.
(What not? When?)
3. Constraints (if any) What constraints have been placed These constraints must be clearly
a. Time incl fixed timings. on me by both the Superior Tactical stated in your Aim.
and Signal Commanders
b. Space.
What limitations are there on my
c. Resources.
freedom of action?
By when do I need to decide?
B-GL-351-001/FP-001 5A-1
SILO — Principles and Fundamentals
5A-2 B-GL-351-001/FP-001
Annex A to Chapter 5
B-GL-351-001/FP-001 5A-3
SILO — Principles and Fundamentals
5A-4 B-GL-351-001/FP-001
Annex A to Chapter 5
B-GL-351-001/FP-001 5A-5
SILO — Principles and Fundamentals
5A-6 B-GL-351-001/FP-001
Annex A to Chapter 5
B-GL-351-001/FP-001 5A-7
SILO — Principles and Fundamentals
5A-8 B-GL-351-001/FP-001
Annex A to Chapter 5
B-GL-351-001/FP-001 5A-9
SILO — Principles and Fundamentals
5A-10 B-GL-351-001/FP-001
SILO — Principles and Fundamentals
CHAPTER 6
SIGNAL TACTICS IN SUPPORT OF LAND OPERATIONS
SECTION 1
601. INTRODUCTION
1. Land Force (LF) operations are conducted in the face of a myriad of threats, on varied
terrain and environments and across the complete spectrum of conflict. Signal tactics must
continue to include the support for traditional force-on-force peer conflict while remaining
adaptable to support full spectrum LF operations fought in complex or urban terrain within an
asymmetrical, non-linear, and non-contiguous battlespace.
2. This chapter explains the implications on Signals of the tactical doctrine for various types
of operations. It looks at tactical communications (TacComms) and tactical communications
information systems (TacC2IS) planning considerations and provides guidance for Signal
Officers (Sig Os) with regards to the three main categories of tactical operations: offensive
operations, defensive operations and stability operations. It also addresses considerations for
enabling activities and underlying tactical tasks or activities associated with these tactical
operations. Signal support to unique operations (airborne, airmobile and amphibious) along
with the Signal support to operations undertaken in specific environments such as Chemical,
Biological, Radioactive and Nuclear (CBRN), mountain; desert; artic and jungle will also be
described.
3. Guidance provided in this chapter does not relieve Sig Os from the obligation of making
a proper Signal estimate. These are general observations derived from the types of TacComms
available to the LF as they are applied using the operational tactics and principles of Signals.
Signal Officers are still required to adapt this general guidance to the tactical situation at hand.
B-GL-351-001/FP-001 6-1
SILO — Principles and Fundamentals
NOTES
1. Security and control refers to the establishment of a safe and secure environment, in which other
non-military agencies may operate and assist in the operational and strategic objectives.
2. Support to Civilian Infrastructure and Governance will see military forces, at least initially,
conducting tasks that (re)build civilian infrastructure and conduct or assist with certain aspects of
governance such as provision of health care, rule of enforcement and humanitarian aid.
3. Assistance to other agencies refers to military assistance to specific agencies, helping them to
reach operational objectives. For example, military forces may be allocated to assist election organizers
with security and logistical support.
4. Enabling operations link or lead to other tactical operations and their effects. For example, an
advance to contact leads to an attack (and eventual effects such as “seize”) and a withdrawal leads from
one defence to another defence.
5. Each of the tactical activities is realized through tactical tasks and effects that normally comprise
of a mission statement (see text on following pages). Enabling operations consist of activities, as given
above, and these will be issued in mission statements in terms of “conduct…” In order to prosecute
them, enabling activities will be broken down into supporting or constituent tasks for subordinates. For
example, security will be assigned as a covering force or guard force and supporting tasks assigned.
See B-GL-331-002/FP-001 Staff Duties in the Field for further details.
Figure 6-1: Table Describing Land Tactical Operations and Constituent Activities
1. The purpose of offensive operations is to impose the commander’s will upon the enemy
by the focused application of force, when and where required to achieve military objectives.
Successful offensive operations are often decisive.
2. An explanation and description of the characteristics of the aforementioned tactical tasks
of offensive operations can be found in B-GL-300-001/FP-001 Land Operations or B-GL-321-
006/FP-001 Combat Team Operations.
3. Offensive operations are not limited to high intensity peer conflict and could be
undertaken at any point within the spectrum of conflict. The Signals considerations discussed
below are equally applicable to any of the tactical tasks or activities associated with offensive
operations; however, a few select tactical tasks will be described.
6-2 B-GL-351-001/FP-001
Signals Tactics in Support of Land Operations
1. In a hasty attack, the major command and control (C2) consideration is the ability to
pass orders quickly, maintain situation awareness (SA) and to effectively direct and control the
manoeuvre of forces. To do so, all major Signal systems must be used but most often combat
net radio (CNR) will be the primary means, both line of sight (LOS) and beyond line of sight
(BLOS). As a result, it is imperative that effective measures be taken to counter enemy
electronic warfare (EW) action.
2. Once the assault is launched, all means can be used, but Sig Os must be wary of enemy
EW action and must take measures to ensure the effective operations of electronic systems
despite enemy electronic deception and jamming. Physical security will remain a major concern
for all forward elements until mopping up has been completed during the consolidation stage.
3. Sig Os must foresee the requirement for communications during an eventual exploitation
phase and ensure that the TacComms can be extended with little or no notice. Further,
Signallers must be prepared to support Commanders as they move forward in their rovers and
tactical armoured command post vehicles (Tac CPs). The Main Headquarters (HQ) must also
be ready to move forward quickly to keep pace with the progress of forward elements during
high intensity mobile warfare.
1. During an exploitation and or pursuit, the major tactical considerations affecting Signals
are the speed of movement, the fluidity of the front and the extended distances that are required
to be supported. Electronic means of communications will be stretched to the limit and a
premium will be placed on timeliness, quick reconnaissance and short set-up and tear down
times of any mobile HQ or TacComms detachments.
2. The fluidity of the front will demand that calculated risks be taken in regard to the
physical security of isolated elements. Extended distances will probably require the use of
BLOS TacComms such as high frequency (HF) CNR, satellite telephone, cellular phone or
helicopters for radio rebroadcast (RRB) purposes. The area trunk system may have to be
deployed in a linear configuration along the major axis of the pursuit rather than in the full grid
configuration. The insertion of cut-off forces deep in enemy territory will further complicate the
task of Signal planners. Finally, the need for Combat Service Support (CSS) units to follow the
lead elements may well require extensive traffic control communications.
B-GL-351-001/FP-001 6-3
SILO — Principles and Fundamentals
1. Defensive operations are usually undertaken when the enemy has the initiative in order
to prevent him from seizing terrain or breaking through a defended area. Doctrinally, defensive
operations are considered to consist of two specific tactical tasks: the delay and the defence.
Although considered to be separate tasks these activities may overlap in part and are described
as follows:
1. A Sig O must reconcile the high capacity and resilient communications needed to allow
the extensive coordination required during the defensive battle with the need for extreme
discretion until the main battle is joined. During the preparation stage and whilst the covering
force battle is going on, radio silence should be enforced in the main defensive area. This is
particularly important for earmarked reserves and countermoves forces. Liaison Officers, line
and SDS should be the mainstay of communications. Extensive reconnaissance should allow
the positioning of Signal emitters so as to shield them from enemy EW elements.
2. Once radio silence is lifted and the main battle is joined, close co-ordination of electronic
support (ES) and fire support elements is required to ensure the neutralization or destruction of
enemy EW jammers and to preserve our ability to affect the C2 of our own forces.
Communication discipline and skilfully conducted electronic protection (EP) drills will also be
paramount.
3. Signals Officers within the main defensive area must also take measures to coordinate
with the covering force Sig O for the rearward passage of lines by the returning covering force
troops.
4. Laying of communications cables and lines in the main defensive area will require care
and a lot of time if the line grid is to have maximum resilience once the battle is joined. Line
reinforcements should be sought from higher formation and line crews should be deployed very
early in the preparation stage of the main defensive area. Whenever possible, the area trunk
system should use lines including civilian telephone lines, in preference to RRB, especially in
the forward part of the main defensive area. Current CIS trunk nodes permit data access to the
Public Switch Telephone Network (PSTN) through a modem at restricted bandwidth.
5. During the countermove battle, Signals difficulty must ensure the coordination and the
compatibility of signal systems among the rapidly regrouping troops. For example, re-
subordination of units to the proper domain in C2 will be difficult. Troop density will become
very high for short periods and at the same time; there will be an extensive need for
coordination amongst reinforcing, blocking and counter-attacking troops. Signals Officers must
ensure they fully understand the details of all regrouping orders, the manner in which command
will be exercised, the critical timings and the adjustments made to the various control measures
(axis, boundaries, etc.).
6-4 B-GL-351-001/FP-001
Signals Tactics in Support of Land Operations
6. Physical security will become problematic until mopping up is completed if the enemy
has achieved infiltration or widespread penetration. Additional protective measures may be
warranted at this stage.
1. During the covering force battle, the covering force Sig O must have a thorough
understanding of the Commander's concept of operations. A Sig O must be aware of the delay
to be imposed, the manoeuvre to be adopted, the various delaying positions and the handover
arrangements back at the forward edge of the battle area (FEBA). Because of the difficult
psychological conditions of the delaying battle, the Signal Officers will have to ensure his or her
Signal troops are briefed in detail to ensure they understand the battle plan they must support
and the risks that must be accepted.
2. Prudent Sig Os will carry out extensive reconnaissance of the covering force area (CFA)
before the delaying battle is joined so as to be in a position to move signal elements quickly and
effectively once contact is made and time is critical. In particular, withdrawal routes must be
reconnoitred in detail and reserved demolition timings must be known.
3. Liaison must be affected with the main defensive area Sig O through whose area the
final withdrawal must occur so as to coordinate Signal control measures at the handover line
and for the subsequent passage of lines. A covering force role will be extended in depth and
frontage. In the initial stage and until physical contact is made with the enemy, the emphasis
will be on information gathering. Signals Officers will therefore plan for the forward deployment
of EW assets especially ES resources and for a discreet C2 posture. Line, LO and SDS should
be used in preference to other TacComms to prevent tipping the enemy prematurely. Extensive
use should be made of the civilian telephone system employing on-line encryption.
4. Once the delaying battle is joined, the emphasis must switch to providing Commanders
with timely and mobile Signal support. All TacComms will be necessary to support the rapid
deployment of tactical forces from one delay position to the next. Physical security will also
become a problem for isolated signal components. Electronic protection activities such as
jamming support may be required to neutralize the action of forward enemy. The extension of
the area trunk system into the forward battlespace must be carefully weighed against the risk of
destruction or the impossibility of withdrawal and the need for its full exploitation during the main
defensive battle.
5. Covering forces normally carry out extensive grouping and regrouping from one delay
position to the next and affect multiple rearward passages of lines. Signal Officers must ensure
the compatibility of the various systems during these critical stages.
1. A tactical activity conducted by military and security forces, often in conjunction with
other agencies, to maintain, restore or establish a climate of order, stability operations have a
basis in both cooperative and coercive activities. They can occur at almost any portion along
the spectrum of conflict and may happen prior to, during, or following offensive and defensive
operations, or as the primary objective of a campaign. Stability operations are a contributing
factor to creating an environment conducive to allowing diplomatic, informational and
economical instruments of power to predominate in cooperation with a lawful government.
Doctrinally, the tactical tasks and activities considered to fall within stability operations are the
following:
B-GL-351-001/FP-001 6-5
SILO — Principles and Fundamentals
1. Formation sub-units are often dispersed at distances throughout the AO where planning
for the extension of CNR nets is the norm and the adoption of satellite based tactical
communications, as a primary means or as a way to extend CNR enclaves, becomes a
necessity. Signals must plan within the same constraints and restraints described in normal
offensive and defensive operations, but with the knowledge that terrorists, insurgents, guerrilla
forces, conventional enemy military forces and unfriendly indigenous members of the population
pose a significant threat to isolated TacComms resources inside and outside the area of control.
Depending upon the nature of the deployment and the timeline associated with it, a decision
must be made with regards to the type of communications infrastructure best suited to it:
a. Mounted. Mounted TacComms and TacC2IS are normally found in a more fluid
operation and can be established within urban areas as well as open terrain.
Signals must consider the extreme vulnerability and consequential protection
required for mounted, isolated TacComms such as RRB detachments, area
trunk system resources as well as line and SDS routes.
6-6 B-GL-351-001/FP-001
Signals Tactics in Support of Land Operations
1. Enabling Activities are those tactical tasks and activities that are considered as linking
actions between decisive tactical operations. The types of tactical tasks or activities currently
considered to doctrinally be categorized as enabling activities are listed in Figure 6-1.
2. This section will not discuss all the aforementioned tactical tasks associated with
enabling activities but will focus on a few. However, the Signals considerations discussed
below can be easily extrapolated to be applicable to many of the aforementioned tactical task or
activities associated with enabling activities. Further details on Signals considerations for link-
up and relief of encircled forces activities is described under operations in enemy controlled
territory in section 6 of this chapter.
1. Signal Officers must consider the following when planning support for an advance to
contact:
B-GL-351-001/FP-001 6-7
SILO — Principles and Fundamentals
d. Unless friendly forces are advancing on well charted and known territory, siting
of TacComms installations and HQs may have to be done with inadequate
knowledge of the ground unless Signal reconnaissance parties follow closely
behind lead combat elements.
e. Commanders will want to move forward either in their rovers or Tac CPs. This
will further complicate the task of Signal support for the various HQ components.
Movement of Main HQ using Step-Up procedures will require careful planning to
keep up with a rapid advance.
1. Relief of troops includes operations whereby combat activities are taken over by one
force from another. There are two types of tactical activities considered to be relief operations:
a. Relief in Place. This includes both relief of encircled forces and relief of troops
in contact wherein all or part of a force is replaced in a sector by an incoming
unit that takes over operations at this point.
2. Relief operations are delicate operations because of the inherent danger of congestion,
confusion and the coexistence of two parallel TacC2IS within one area. To ensure success,
liaison at all levels between forces must be established and deception, including electronic
deception and Signal security, must prevent enemy interference. The incoming and outgoing
Sig Os must start planning early and ensure the closest coordination between their two
elements.
3. Relief in Place. In a relief in place, the outgoing Sig O is concerned with the following:
b. making provisions for the reception and briefing of incoming Signal troops;
c. maintaining the in-place CIS for as long as possible, this is especially critical for
CNR, other systems (C2, trunk, line, SDS) can be taken over gradually by the
incoming Sig O until only the CNR is left;
d. extricating his or her Signal personnel and equipment after handover has been
done; and
e. coordinating with the higher Sig O the Signal plan for his next position.
6-8 B-GL-351-001/FP-001
Signals Tactics in Support of Land Operations
4. Also in a relief in place the incoming Sig O is concerned with the following:
b. making provision for the early reconnaissance and coordinating take over with
the outgoing Sig O;
c. introducing Signal personnel and equipment gradually into service starting with
SDS, line, C2 trunk and CNR; and
5. Forward Passage of Lines. During a forward passage of lines the moving force Sig O
is concerned with the following:
c. collocating key Signal personnel with the in-place key Signal personnel early in
the passage of lines so as to ensure a smooth passage; and
d. extending the higher formation CIS beyond the line of departure as coordinated
with the higher Sig O.
6. Also during a forward passage of lines, the in-place Sig O is concerned with the
following:
b. making provisions for the reception and briefing of the moving force key Signal
personnel;
c. making provisions for traffic control communications during the passage of lines;
e. initiating Signal planning for the commander's next mission after the passage of
lines.
7. Rearward Passage of Lines. During the rearward passage of lines the moving force
Sig O is concerned with the following:
a. ensuring Signal security behind the handover line where the moving force
should become electronically silent as soon as disengagement is achieved;
b. making provision for early reconnaissance and liaison with the in-place Sig O;
c. co-locating key Signal personnel with the in-place CP early in the passage of
lines so as to ensure a smooth passage; and
B-GL-351-001/FP-001 6-9
SILO — Principles and Fundamentals
d. coordinating with the higher Sig O for the Signal plan in the new rearward
position.
8. Also during the rearward passage of lines, the in-place Sig O is concerned with the
following:
b. making provisions for the reception and briefing of the moving force Signal
personnel; and
c. making provisions for traffic control communications during the passage of lines.
1. A withdrawal is a tactical activity that occurs when a force disengages from an enemy in
accordance with the will of its commander. A withdrawal takes place in the following four
stages, which overlap in part:
2. Since the enemy will have the initiative during the withdrawal, it is extremely difficult to
maintain security and achieve surprise. Signals Officers must participate in the planning of
withdrawals as early as possible so as to take measures to put in place an effective signal
security plan. In particular, transmission patterns must not betray the intentions of the
commander and electronic deception must be used to achieve surprise and deceive enemy EW.
3. Maintenance of morale is critical, especially for isolated TacComms elements that may
get the feeling of “having been forgotten behind.” Sound system management may well require
the reinforcement of Signal leadership elements with forward isolated elements at the very time
when leaders are required in the forward position as well as in the new position to the rear.
4. The Signal considerations during the thinning out stage of a withdrawal are as follows:
a. Signal reconnaissance must start during this stage. Security requirements may
force the reconnaissance to be conducted at night or under conditions of poor
visibility, so additional resources may have to be devoted to this task to offset
the slower pace of activity. Reconnaissance has to take into account the total
distance to be covered, the going on the withdrawal routes, demolition timings,
withdrawal timings, intermediate positions, defiles if any, and the possible sites
for TacComms installations. Care should be taken to screen TacComms
installations from enemy EW.
6-10 B-GL-351-001/FP-001
Signals Tactics in Support of Land Operations
5. The Signal considerations during the preparation of intermediate and new positions are
as follows:
a. The TacComms infrastructure for the withdrawal is put in place during this
stage. Radio silence should be enforced to the rear of the position to be
evacuated. The area trunk system should be deployed axially along the
withdrawal routes but line, rather than RR, should be the main transmission
means if at all possible.
c. In all likelihood, Signal support for a withdrawal will exceed the capability of the
withdrawing force. Reinforcements by the higher formation Signal organization
will be required.
a. In the early stage of the disengagement, the electronic part of the deception
plan should move into full gear in conjunction with other elements of the plan.
b. Electronic deception will not likely succeed very long and the Sig O must be
ready to use all electronic TacComms to provide signal support once the
withdrawal is uncovered and the delaying battle is joined. In particular, ES and
EP resources will be required to neutralize enemy C2 and augment the delay
imposed.
7. Protective and Delaying Action. During this stage, the Signal problem and
considerations follow that of the covering force battle already explained above.
a. Hasty. This activity takes place from the line of march with little preparation.
B-GL-351-001/FP-001 6-11
SILO — Principles and Fundamentals
a. reconnaissance;
a. Signals Officers must reconnoitre carefully all areas where communications for
the crossing force must be put in place. The enemy threat against the crossing
and the terrain largely dictate the means of communications to be used. It is
unlikely that complete surprise can be achieved. Line and SDS should be used
for the traffic control and crossing area organizations so as not to tip off the
enemy as to the exact crossing place and timing.
b. The crossing force when possible should minimize radio emissions until the
battle is joined. Thereafter, the area trunk system should be used in preference
to CNR for the crossing and traffic control organizations.
c. Electronic support resources will be useful at this stage to locate enemy forces
on the far side.
d. In cases where the force in place belongs to another formation, the Sig O must
make the necessary coordination arrangements to ensure an efficient forward
passage of lines.
e. The TacComms infrastructure for the crossing should be put in place as soon as
the force in place has been established on the near side of the obstacle and in
time to control the advance of the assault force through the crossing area.
f. Tactical communications resources required for this task are extensive and will
have to be made available by regrouping the resources of various units in the
formation, such as reconnaissance units, MP units, TacComms resources of the
force in place, TacComms resources of the controlling HQ, etc.
5. The Signals considerations during the assault stage of the obstacle crossing are as
follows:
6-12 B-GL-351-001/FP-001
Signals Tactics in Support of Land Operations
a. Signal support for the assault force relies mainly on its integral resources
supplemented as required by the crossing formation area trunk system
resources.
b. Provision has to be made for the assault force’s passage of lines through the
force in place and for its cooperation with the traffic control organization that it
will direct until the full crossing area is established, after a lodgement is seized
on the far side of the obstacle;
c. As in the deliberate attack, electronic emissions should be discreet before H-
hour; thereafter radio silence can be lifted at the discretion of the assault force
commander; and
d. As soon as intermediate objectives are seized, the crossing area is established
and the traffic control reverts from the assault force commander to the crossing
force commander.
6. The Signals considerations during the final two stages of the build up and the
consolidation of the Bridgehead before the breakout are as follows:
a. The major concern of the bridgehead force Sig O is to ensure that sufficient EW
and TacComms resources cross the obstacle to permit the orderly support of
the consolidation and break out.
b. A balance must be kept between overcrowding the far bank with superfluous
TacComms resources and keeping enough resources to offset equipment
losses and casualties and to allow the support of subsequent stages of the
crossing activity.
c. The bridgehead force Sig O must also make the necessary preparations for a
forward passage of lines by the break out force.
d. The bridgehead is extremely vulnerable at this stage and maximum use of EW
resources must be made to locate and neutralize or destroy enemy C2
elements. As soon as possible, alternate TacComms to CNR must be used on
the far bank to lower the electronic profile of our own TacC2IS.
e. Physical security will also be low until mopping up is complete during the
consolidation phase, requiring further prudence and defensive measures to be
practiced.
SECTION 2
UNIQUE OPERATIONS
1. General. An airmobile operation is the movement of combat forces and their equipment
about the battlefield in air vehicles, usually helicopters or Vertical Take Off and Landing (VTOL)
aircraft, under the control of an LF Commander, to engage in ground combat. It can be
undertaken separately or as part of any type of ground operations. An airmobile force can be
employed independently or in conjunction with other land forces.
2. Airmobile operations are planned in the reverse sequence of their execution as follows:
B-GL-351-001/FP-001 6-13
SILO — Principles and Fundamentals
a. a ground tactical plan to cover the employment in the objective area once the
lifted force is landed;
b. a landing plan, to place the lifted force in the objective area;
c. an air movement plan to fly the lifted force to the objective area;
d. the loading plan identifies the pick-up zone, provides guidance for its
establishment and control; and
e. the staging plan details the control area(s) and provides guidance on the
repositioning of the units, supplies, and equipment required.
1. The Sig O must consider the following during the ground tactical stage of an airmobile
operation:
a. Signal support during this stage is the responsibility of the airmobile force Sig O.
In order to carry out his or her task, the Sig O has to know the enemy EW threat
en-route and in the objective area, the distance from the landing zone to the
objective area, the quantity and size of TacComms resources allowed to be
flown in (vehicular or manpack only), the arrangements made by the higher G6
staff for communications with supporting forces (link up forces, artillery, air
forces) and the method of extraction of the airmobile force.
b. Prior to the insertion of the main body of the airmobile force, it could be
necessary to insert pathfinders for the reconnaissance of the objective area and
marking of the landing zone (LZ). In such a case, special Signal arrangements
must be made for the pathfinders to report back and for recognition signals in
the LZ.
c. As a matter of principle, radio silence should be maintained in the objective area
as long as possible or at least until H-hour.
d. If link-up of the airmobile force with a main ground force is planned, the higher
formation Sig O will make the necessary coordination between the two elements
during the mounting stage.
e. Once the ground operation is on and radio silence has been lifted, an airborne
command post (CP) could be used to coordinate the movement of all
components and relay back to higher HQ reports and requests for support, if the
air situation is favourable and the air defence (AD) threat from the ground is
negligible.
2. Signals considerations during the landing stage of an airmobile operation are as follows:
a. The TacComms for the ground tactical stage must be on stand-by, ready for
use. Signallers in aircraft and disembarking should be on listening watch ready
to receive orders. Dispatch riders (DRs) or runners should accompany selected
commanders ready to transmit their orders to various points on the LZ or to
another LZ. Arrangements for contact with the pathfinder group should be
executed. This is particularly critical if routes are unmarked and guidance from
the LZ to the objective area is required.
6-14 B-GL-351-001/FP-001
Signals Tactics in Support of Land Operations
b. Enemy reaction on the LZ may require breaking radio silence either by the
ground troops or by the aviation unit.
3. Signals considerations during the air movement stage of an airmobile operation are as
follows:
a. The airmobile force Sig O should help the aviation component Sig O prepare the
Signal plan for this stage. Ideally, the flight to the objective should be conducted
under electronic silence, but it may be necessary to coordinate with
accompanying EW helicopters, armed helicopters and close support aircraft for
air space control and suppression of enemy air defence en-route. It will also be
necessary to decide on permissible active navigational aids.
b. Planning for air movement also includes planning for the return of aircraft after
the insertion and for the extraction sorties if a link-up is not planned. The
decision to be electronically silent on the various flights in and out depends on
the mission security requirement, on the enemy threat and, for the extraction
flights, on the immediate tactical situation at the time of extraction.
a. As for any other type of operation, supporting Sig Os must have an intimate
knowledge of their Commander's intentions and plans. But since three separate
components (higher command, ground component and aviation component) are
involved, it is of the utmost importance that complete coordination between
these components' Signal plans be effected.
b. The higher Commander's Sig O must take the lead in planning and coordinating.
Before the higher Commander's orders are issued, the Sig O must put together
the major elements of the Signal plan between the airmobile force and the
outside world. Then, once the airmobile task force is formed, the higher
Commander’s Sig O should meet with the airmobile force Sig O and the aviation
component Sig O to explain clearly how he or she intends to provide Signal
support to the airmobile force and what are the constraints under which all must
operate.
c. The airmobile force Sig O is also the land component Sig O. He or she,
therefore, has a dual responsibility for planning the Signal support internal to the
ground component and also to coordinate the Signal support between the
aviation component and the land component.
d. The aviation component Sig O prepares the aviation Signal plan within the
constraints imposed by the airmobile force Sig O.
B-GL-351-001/FP-001 6-15
SILO — Principles and Fundamentals
e. Once planning is complete and marshalling is done, the airmobile force Sig O
must ensure that a complete Signal briefing is given to all signallers and key
land and aviation commanders and staff officers. All TacComms equipment
must also be inspected and tested for serviceability.
1. General. An airborne operation is a joint operation involving the air movement and
parachute landing of ground forces to interdict an area or to conduct a raid. This section
provides guidance only for additional aspects peculiar to airborne operations. Airborne
operations can be conducted independently or in conjunction with other land forces.
2. Airborne operations like airmobile operations are planned in the reverse sequence of
their execution as follows:
a. A ground tactical plan, to cover the employment once the forces have landed.
b. A landing plan, to organize the manner in which the ground forces will arrive on
the drop zones (DZ) in the objective area.
c. An air movement plan, to fly the force to the objective area.
d. A mounting plan, to assemble army and air force resources and load the aircraft
at departure airfields.
2. The Signal considerations during the ground tactical stage of airborne operations are as
follows:
a. If one replaces the expressions “airmobile” and “LZ” by “airborne” and “DZ,”
previous guidance given on airmobile operations is also applicable for airborne
operations planning.
b. The major difference between airmobile and airborne operations is probably the
depth of insertion into enemy territory. Airborne forces will usually be inserted
deeper than airmobile forces. Consequently, the communications back to
higher HQ and to external supporting forces must be conducted over much
longer distances and will require different means.
6-16 B-GL-351-001/FP-001
Signals Tactics in Support of Land Operations
c. The airborne force Sig O must also be aware that immediately after landing, the
airborne force is extremely vulnerable and that the ground commander will want
to ensure that regrouping of forces into fighting formations is done as
expeditiously as possible. Depending on the conditions after landing, the
airborne force commander may wish to break radio silence in order to speed up
regrouping. Cohesion of the tactical force would thus take precedence over
security.
d. Finally, the airborne force Sig O must plan for air-ground-air (A/G/A)
communication and DZ control during follow-up resupply missions.
3. The Signals considerations during the landing stage of an airborne operation are as
follows:
a. The same guidance as for airmobile operations applies. However, Sig Os must
be ready to react to adverse conditions immediately after landing. The
likelihood of destruction and casualties in flight and on landing and of
unacceptable dispersal on and off DZ may jeopardize the Signal plan.
4. The Signal considerations during the air movement stage of an airborne operation are
identical to those for airmobile operations. During this stage, EW aircraft could accompany the
transport aircraft to neutralize air defence and surveillance radar en route and in the objective
area. The task force Sig O should be ready to advise the airlift commander on this aspect.
5. The Signal considerations during the mounting stage of an airborne operation are as
follows:
a. The same guidance as for airmobile operations applies only change the “higher
commander's Sig O” for “joint task force Sig O,” the “airmobile force Sig O” for
“airborne force Sig O” and the “aviation Sig O” for “airlift force Sig O”.
b. Prior to airborne operations, not only briefings but also rehearsals must be
conducted. The airborne force Sig O will ensure that the complete Signal plan is
rehearsed and “walked through.” Inspection of platform rigged TacComms
equipment must also be carried out in detail.
c. Because of the higher rate of casualties at the outset, the airborne force Sig O
will ensure that the plan includes the requirement for a small reserve of
personnel and equipment in the initial assault as well as in the immediate follow-
up resupply drops.
B-GL-351-001/FP-001 6-17
SILO — Principles and Fundamentals
2. Amphibious operations are normally planned in five stages and in the reverse sequence
of their execution, as follows:
a. Assault. This stage starts with the arrival of the amphibious task force in the
objective area and ends when the mission of the amphibious task force is
accomplished.
b. Movement. The components of the amphibious task force move from the
points of embarkation to the amphibious objective area.
c. Rehearsal. During this stage, the plans, including the Signal support plan, are
tested and practiced.
d. Embarkation. This covers the period during which troops and their equipment
are embarked in assigned shipping.
e. The Planning Stage. This covers the period from the issue of the initiating
directive by a higher commander to the embarkation of forces.
a. An amphibious task force is a joint operation and it will usually be led by a naval
officer.
(1) the amphibious task force Sig O plans Signal support for the task force as
a whole and coordinates requirements for communication between
components and between the task force and external supporting forces,
6-18 B-GL-351-001/FP-001
Signals Tactics in Support of Land Operations
(2) the landing force Sig O plans Signal support for the land component and
coordinates all Signal requirements for operations once the force is
landed, and
(3) the air force communications-electronics officer will plan the Signal
support for air force elements integral to the task force.
d. The critical Signal planning element is in providing the amphibious Task Force
Commander and the LF Commander the required Signal support afloat and
ashore, and to effect an orderly transfer of the Landing Force Commander's CP
from sea to shore without discontinuity. Signal planners must be aware of Joint
Operations doctrine.
a. The formulation of an assault concept of operations is the first step in the overall
planning process. The landing force Sig O must participate in this process and
cooperate closely with the task force communication officer to ascertain whether
the concept can be supported by communications ashore and afloat.
(2) provide for an orderly transfer of C2 of the landing force from afloat to the
beachhead,
(3) provide for the LF Commander to command initially from a joint CP afloat
with the Task Force Commander,
(4) provide a communications capability between naval and land CIS on the
initial stages of the assault when all systems are operated from ships,
(5) integrate the requirement to operate rear and lateral links from shore to
the naval task force CP afloat and to supporting air force elements afloat
or on land beyond the objective area, this includes complex landing ship
and beach control communications,
(6) where link-up with other ground forces is planned, include the
requirement for communication during link-up,
(7) where extraction by sea is planned, include the reverse of the process
explained in (1) to (5) above, and
(8) when subsequent operations on land are planned, include the provisions
for a forward passage of lines by follow-on forces.
B-GL-351-001/FP-001 6-19
SILO — Principles and Fundamentals
3. During the movement stage of an amphibious landing the landing force TacComms
should be silent. Naval force communications must be used when necessary if the naval
EMCON policy allows.
4. Rehearsals are a necessity for amphibious operations due to their extreme complexity.
Supporting Sig Os must ensure that all aspects of the Signal plan are rehearsed and
adjustments made where necessary. This provides an opportunity to test the understanding of
the plan by all concerned. Rehearsal requirements must be foreseen in the distribution of
TacComms equipment and personnel among ships during embarkation.
6. Planning. Unlike other types of operations, the Landing Force Commander, one of the
subordinate commanders, assumes a pre-eminent role during this phase. The amphibious Task
Force Commander merely acts as a coordinator to ensure all other elements of the task force
take effective measures to support the Landing Force Commander's concept of operations.
This relationship ceases upon the start of embarkation when the Task Force Commander
assumes overall command responsibility. It is the Sig Os responsibility to be intimately familiar
with the overall concept of operations in order to effectively plan and coordinate the various
aspects of CIS support to the amphibious operation.
b. Link-up Operations. This occurs when a force joins another friendly force in
enemy controlled territory.
6-20 B-GL-351-001/FP-001
Signals Tactics in Support of Land Operations
a. Encirclement is not normally a planned activity but one with which military
commanders may have to cope. Once a force has been encircled, the first
priority is to re-establish the integrity of the TacC2IS in the pocket including its
Signal element in order to plan and direct the immediate defence of the forces
encircled.
b. Once the defence is organized, the Sig O must attempt to lower the electronic
profile of the TacComms in order to avoid enemy EW attack and avoid DF of
critical C2 elements. If at all possible, line and SDS should be used in
preference to radio during the defensive stage of the encirclement. However, in
the event of an attack, CNR may have to be used especially by the
reserve/countermoves force.
c. The Sig O must also try to re-establish communications with the higher
commander outside the pocket so that relief, break out, combat support and
combat service support may be coordinated. If it is not possible electronically,
the use of a messenger, DR or LO should be considered.
d. If a break out is planned, the Sig O must ensure that absolute Signal security is
maintained until H-hour in order to achieve surprise; this may conflict with the
need for coordination with external forces. A decision to coordinate by radio will
depend on the relative importance of surprise and support from external forces,
and on the quality of Signal security procedures (crypto systems and traffic
patterns). Once the break out starts, all TacComms means available are used
to ensure immediacy of control and maintenance of the momentum. If at all
possible, the Sig O must coordinate frequencies, crypto and recognition signals
between the encircled troop lead elements and the external friendly forces with
which it is planned to establish contact.
2. A link-up operation is planned much like a normal attack or advance to contact, but
specific aspects of C2 between the two converging forces need explanation. The guiding
principles for the planning and conduct of link-up operations are security to achieve surprise,
speed to prevent timely enemy reaction and coordination of manoeuvre and control measures to
prevent needless friendly casualties. The Signal considerations for link-up operations in enemy
controlled territory are as follows:
3. Signals considerations for special operations conducted in enemy controlled territory are
as follows:
a. Special operations teams operating behind enemy lines are equipped with
special, long range, secure radio or satellite communications equipment to
contact their controlling HQ.
B-GL-351-001/FP-001 6-21
SILO — Principles and Fundamentals
SECTION 3
TACTICAL OPERATIONS IN SPECIFIC ENVIRONMENTS
1. Formations will conduct operations on what can be termed “complex terrain” most of the
time. This is not to say that there will not be conflict on open terrain nor does it imply that all
complex terrain is the same. Each type of terrain presents particular challenges and engenders
specific Signal doctrinal methods for dealing with the characteristics of the terrain in question.
This section provides guidance to Sig Os supporting forces operating in specific environments.
The following specific environments will be discussed:
1. Continuity of C2 is essential during periods of gas or chemical attacks. Signals will play
a vital role in:
2. Biological and chemical agents are primarily anti-personnel weapons. The survivability
of TacComms and TacC2IS is therefore dependent on the ability of personnel to survive and to
operate and maintain these systems in a reliable manner. Survival of personnel is dependent
on:
6-22 B-GL-351-001/FP-001
Signals Tactics in Support of Land Operations
1. Aside from the devastating results of a nuclear explosion, there are other effects that
could have an impact on TacComms equipment even at great distances away from ground
zero. These are:
a. Radio. The first protective measure is to disconnect the antenna if the threat is
imminent. Further, equipment, power and antenna connectors should be
disconnected when the radios are not in use or during periods of electronic
silence. Equipments should be shielded from direct penetration of EMP
whenever possible.
B-GL-351-001/FP-001 6-23
SILO — Principles and Fundamentals
6-24 B-GL-351-001/FP-001
Signals Tactics in Support of Land Operations
5. Radio Waves Interactions. The basic interactions of radio waves with the nuclear
fireball and the dust created by the blast are refraction, absorption and scattering. As a result,
signals arriving at the receiver will vary rapidly in phase, strength and in direction of arrival. The
three phenomena may occur singly or concurrently. In addition, the fireball will radiate thermal
noise. In the case of tactical radio systems, HF to SHF may be catastrophically affected by
these radio wave interactions.
a. High altitude blasts with the resulting disabling of all but the most rigorously
hardened communications satellite relays.
7. Remedial Actions. When blackout occurs, the following actions may reduce
communication outage time:
a. Line communications that have not been affected by EMP may be used.
B-GL-351-001/FP-001 6-25
SILO — Principles and Fundamentals
3. Since even a small unit may be spread over a large area, retransmission and
rebroadcast sites may be needed to maintain radio communications and to increase range.
These sites require extensive preparation and support to ensure the survival of personnel and
the continued maintenance of TacComms equipment. Retransmission systems are often
placed on the highest accessible terrain to afford them the best LOS; however, through simple
analysis, these locations are often predictable and make them more vulnerable to enemy
interdiction.
6-26 B-GL-351-001/FP-001
Signals Tactics in Support of Land Operations
7. Ground rods and guy wires are often difficult to drive into rocky and frozen earth.
Mountain pitons are excellent anchors for antenna guys in this type of soil. Adequate grounding
is also difficult to obtain on frozen or rocky surfaces due to high electrical resistance. Where it is
possible to install a grounding rod, it should be driven into the earth as deeply as possible or
through the ice on frozen lakes or rivers. Grounding in rocky soil may be improved by adding
salt solutions to improve electrical flow. In many instances it will be impracticable to secure a
ground and it will be necessary to install a counterpoise antenna.
8. Field cable is normally one of the most reliable means of communication. Unfortunately,
in rugged mountains and particularly during the winter months, field cable is more difficult and
time consuming to install, maintain and protect.
9. Snow-covered cables and line can cause the loss of many man-days in recovering or
maintaining circuits. Allowances must be made for drifting snow when determining the height
above ground at which to support the lines. If long-distance line communications are required,
the integration of radio relay systems must be considered.
10. Computers and computer based systems, as well as the peripheral equipment, are
sensitive to extreme cold or heat. Operating temperatures fall within the range of -40 to 70 C for
TacComms and Tac C2IS equipment based on Military Standards but COTS items are
significantly less. Consideration must be taken into account to ensure that the equipment
environment meets the optimum temperature requirements.
1. Operations in arctic and cold weather conditions demand special techniques, training
and equipment. This section concentrates on outlining the communications considerations for
such operations during the winter season but also gives some guidance on operations
conducted during arctic summer conditions.
3. Tactical radio (i.e. VHF/UHF) equipment operating in the LOS frequency band (30 MHz
and upwards; the frequency modulated series of tactical radio sets are included in this band) is
not affected adversely by auroral activity. In fact, the greater ionization of the upper atmosphere
that takes place during auroral activity will, on occasion, increase the range of the tactical VHF
radios. The use of VHF and microwave radio relay equipment will provide the greatest degree
B-GL-351-001/FP-001 6-27
SILO — Principles and Fundamentals
4. High frequency (HF) radio transmission and reception, while capable of spanning the
extended distances dictated by tactical requirements, are subject to interference by magnetic
storms, aurora borealis and ionospheric disturbances, which may completely black out reception
for hours or even days. Transmission and reception under most conditions is possible providing
proper installation and operation procedures are followed.
5. Line communication has the same capabilities and limitations in northern latitudes as in
temperate zones. Due to the distances involved and the difficulty of overland movement, wire
communications may be limited to serving local installations. If long distance wire
communication trunks (telephone and data transmission) are required, radio relay systems that
can be integrated into the wire system must be considered because of relative ease of
installation, economy of transport and other logistical factors.
6. Batteries of all types show decreased power capacity at low temperatures; however,
some (such as Lithium Ion) are better than others in cold weather. Batteries should be stored at
supply facilities between temperature ranges of -12°C to 2°C. Upon removal from storage, and
prior to use, the batteries should be heated slowly to a temperature of 20°C. Warm batteries will
give good results if used promptly upon exposure to cold. The conventional dry cell type battery
loses efficiency rapidly at low temperatures and decreases in capacity as the temperature drops
below 21° C. (The terminal voltage of the battery is not affected by cold, but its capacity, life, or
effectiveness to supply operating voltage over a period of time is affected.) At -17°C. it is 40
percent effective; at -23°C., 20 percent; and at -34°C., only 8 percent effective.
8. Computers and computer based systems, as well as the peripheral equipment, are
sensitive to extreme cold or heat. Operating temperatures fall within the range of -40°C to 70°C
for equipment based on Military Standards but COTS items are significantly less. Consideration
must be taken into account to ensure that the equipment environment meets the optimum
temperature requirements.
9. Auroral effects are considered the reflecting properties of the ionosphere and are directly
related to the position and radiation activity of the sun. The sun's bombardment of the earth's
atmosphere coupled with strong magnetic activity concentrated near the poles causes a visual
effect that is called the aurora borealis in northern latitudes. Ionization of atmospheric particles
is increased and radio waves reaching distant receiving points by means of sky wave
propagation are reduced in intensity by increased absorption. This absorption becomes more
6-28 B-GL-351-001/FP-001
Signals Tactics in Support of Land Operations
pronounced during violent eruptions of the sun's surface that is visible in the form of sunspots.
During such a period, a radio blackout may occur on nets crossing or passing through the
auroral zone. The greatest auroral activity occurs between 60°C and 70°C North latitude and
occurs at intervals of 27 to 28 days. Signals from distant stations are usually much stronger
prior to such periods. Monthly predictions of expected sunspot conditions are published by the
National Bureau of Standards and are available to signal staff officers at all levels of command.
It must be emphasized that “blackouts” occur throughout the HF spectrum and down to 26 KHz
and may last several days. In addition, HF sky wave transmissions are subject to sporadic
blackouts that are, at present, unpredictable and erratic as to duration and coverage. During
such periods, alternate means of communications, such as satellite or line, possibly integrated
with radio relay, must be available.
10. In the medium frequency band (300 to 3,000 KHz) very little continuous high level static
is experienced in northern latitudes, but steady rushes of high level noise are common and
signify an auroral blackout on the frequency being monitored. Flakes or pellets of highly
charged snow are occasionally experienced in the north just as rain and sand static are
encountered in many tropical and desert regions during periods of high winds. This
phenomenon is commonly called precipitation static. Charged particles of snow driven against
metal vehicles, antennas, and other objects usually discharge with a high pitched static roar that
can blanket all frequencies for several hours at a time. While these phenomena are uncommon
except in aircraft, they can take place just when communications are vital to some operations.
B-GL-351-001/FP-001 6-29
SILO — Principles and Fundamentals
6. Line based systems should be established whenever feasible. Field cable and line are
more secure than radio, hard to jam and their use allows for normal telephone (as opposed to
push-to-talk) conversations. The heavy rain and high humidity of the tropics reduces the range
(about 20 percent) and reliability of line communications. Line laying in the jungle requires more
time and suitable routes are limited. The increased cover and concealment make it easier for
the enemy to intercept or interrupt line communications and to ambush maintenance crews.
Wire laid by air on top of the jungle canopy is extremely difficult to maintain and recover;
however, it is less likely to be damaged by vehicles or weather.
7. The speed of surface messengers (i.e. SDS and runners) is severely limited by jungle
terrain and vegetation. The lack of roads restricts full use of motor vehicles. Foot messengers
may have difficulties with land navigation and natural obstacles. The use of air messengers
maybe a better alternative, but one that is limited by availability of aircraft, scarcity of good
landing zones, weather conditions and the fact that air activity aids the enemy in locating
friendly troop areas. When using a messenger, messages should be written or be transferred to
magnetic media. Their text must be clear, concise and complete.
8. Jungle climates (i.e. high temperatures, high humidity, and heavy rain) can have serious
effects on TacComms equipment. Frequent cleaning and more detailed inspection for mildew,
moisture and rot of TacComms equipment will mitigate the effects of the climate.
9. Computers and computer based systems as well, as the peripheral equipment are
sensitive to extreme cold or heat. Most TacComms equipments operating temperatures fall
within the range of -40 to +70 °C for equipment based on Military Standards although COTS
items are significantly less. Requirements exist for consideration of air conditioning as a means
to maintain the optimum equipment environment. Particular attention should be placed on
ensuring equipment fans and airflow paths are not restricted.
1. This section describes the effects that desert terrain and extremely hot conditions will
have on communications in the conduct of land operations and considerations Sig Os must take
into account. Operations in desert and extremely hot weather conditions demand special
techniques.
6-30 B-GL-351-001/FP-001
Signals Tactics in Support of Land Operations
4. It is essential that antennae be cut or adjusted to the length of the operating frequency.
Directional antennae must be faced exactly in the required direction; approximate azimuth
produced by guesswork will not do. A basic whip antenna relies on the capacitor effect between
itself and the ground for efficient propagation. The electrical ground may be very poor and the
antenna performance alone may be degraded by as much as one-third if the surface soil lacks
moisture, which is normally the case in the desert. If a ground-mounted antenna is not fitted
with a counterpoise, the ground around it should be dampened using any fluid available.
Vehicle-mounted antennae are more efficient if the mass of the vehicle is forward of the
antennae and is oriented towards the distant station.
5. Desert operations require dispersion, yet the environment is likely to degrade the
transmission range of radios, particularly VHF fitted with secure equipment. This degradation is
most likely to recur in the hottest part of the day, approximately 1200 to 1700 hours.
6. If stations start to lose contact, especially if the hotter part of the day is approaching,
alternative communication plans must be ready. Alternatives include the following:
a. Using RRB stations, including airborne RRB (the aircraft must remain at least
4,000 meters behind the FEBA) and deploying RR repeater detachments if the
area trunk system is in jeopardy.
c. Using alternative radio links such as HF satellite Single Side Band (SSB) voice
or data.
d. Using Line. Normally, line would not be used as operations will be fluid, but it
may be of some value in some static situations.
B-GL-351-001/FP-001 6-31