Category Archives: Military

REDCOM Webinar: Zero Trust Architectures for the Tactical Edge

REDCOM is a leading voice in the conversation on actualizing a working Zero Trust Architecture for the tactical edge. We hosted a webinar in conjunction with AFCEA where REDCOM’s Collin Sweeney and Kal Baumwart discussed the state of ZTA today along with some of the challenges in bringing this technology to the edge. They then introduced REDCOM’s answer to this problem: a seamless, lightweight, easy-to-deploy authentication solution built from the bottom up to meet the needs of users in the tactical domain called ZKX.

Instead of driving the ZTA solely from the top-down, REDCOM is seeing an operational benefit in constructing the enterprise ZTA from the bottom-up. There is a lack of conversation surrounding down-echelon and cross-echelon zero-trust interoperability is troubling, especially for those operating in the tactical environment. Our product aims to increase interoperability at the tactical edge. Click below to watch the full webinar and reach out to us with any questions.

The importance of low SWaP C2 for the U.S. Air Force

The United States Air Force is going all-in on Agile Combat Employment (ACE), a concept of operations that relies less on large overseas airfield “hubs” and more on smaller “spokes” —tiny, nimble airstrips that enable the Air Force to launch aircraft from anywhere and maneuver faster than ever before. 

To see ACE in action, one needs to look no further than the Air Force’s Operation Pacific Iron 2021, an exercise where 800 airmen and 35 aircraft from bases around the Pacific gathered around Guam and Tinian to simulate a large-scale air operation thousands of miles from the nearest continent. The airfield on Tinian was small, manned by just dozens of multi-capable airmen, versus the thousands that populate large hubs such as Pearl Harbor in Hawaii. 

The idea of dispersed air operations in austere environments is nothing new. The U.S. operated from numerous improvised airfields during World War II, but Command and Control was always a challenge. Even today, these remote, dispersed forces operate in contested environments where communications are likely to be disrupted or denied altogether. 

According to Dr. Mulgund, senior advisor to the Air Force Deputy Chief of Staff for Operations, “tactical level ACE playbook approaches and capabilities must enable dispersed forces to adapt and prevail despite uncertainty, using the best available information to local commanders. This will necessitate shifting the balance between offensive and defensive operations in response to what is achievable in light of available connectivity and logistical support.” 

Low SWaP 

To rapidly deploy, disperse, and maneuver, the Air Force needs full Command and Control capabilities in all areas of operation in air and on land. Larger C-series aircraft (i.e. a C-17 or C-5) may not be feasible in these small, distributed bases. Therefore, essential C2 capabilities must fit into a smaller C-130 or a CV-22. Additionally, airmen must be able to quickly ruck C2 capabilities and jump them out of an aircraft in the transition to land operations. 

REDCOM meets these requirements with Sigma XRI, a small form factor C2 platform that can be mounted in aircraft, packed, hand-carried, or added to an existing data/comms rack to support all areas of operations.  

Interoperability 

Airfield ops are joint in nature and will always grapple with the complexities of the combined joint environment. Whether you are conducting a large-scale airfield seizure or inserting a small SOF team into an austere airfield, interoperability with joint forces is critical. 

By connecting up to four donor radios directly to the Sigma XRI box, you can instantly bridge the gap between disparate radio networks, endpoints, or frequencies, allowing for seamless communications between Joint and Coalition forces. Additionally, Sigma XRI allows radio users to communicate directly with users on any SIP end device and can even participate in voice conferences. 

Resilient Communications 

Once an airfield is discovered it is only a matter of time before it is targeted, not only by long-range weapon systems but also directed electronic attacks. Sigma XRI allows the Air Force to leverage multiple communications lines, which is especially critical in scenarios where using whatever means available is crucial to the mission. If one line of communication is compromised the next down the line can be used from IP to Wi-Fi, LTE, SATCOM, UHF, VHF, HF, and TSM. 

Command & Control  

Regardless of interoperability challenges that arise from joint operations, at all times the crew on the ground must be able to maintain positive control of an active runway. Additionally, they must be able to communicate back to higher C2 nodes so they can receive updates on what’s coming to them and relay back time-sensitive updates that may pose a threat to inbound aircraft. 

REDCOM Sigma XRI allows ground forces to maintain a connection with higher command as well as other ground units, all without microwave antennas or satellite shots. In the event a remote airfield becomes a DIL environment, Sigma XRI can act as a stand-alone C2 comms system.  

Ease of Use 

As demonstrated in the recent Pacific Iron exercise, Air Force personnel are already being tasked with taking on responsibilities that may not be in their primary scope of expertise. Multi-capable airmen will be required to reduce the size of the force required to operate on these small, austere airfields. If a loadmaster with no technical training is going to be asked to run comms, the system must be simple to learn and easy to use. To accommodate, the admin interface on REDCOM Sigma XRI was built intuitively for today’s warfighter — the platform is incredibly easy to learn and operate without the need for field service reps and IT experts. 

Conclusion 

Effective Command and Control is critical for the Air Force to successfully realize the ACE vision. REDCOM can play an important role in delivering proven C2 solutions to not just the Air Force, but also all branches of our military and coalition partners. 

Killing the CAC

Since 1999 the Common Access Card (CAC) has been the norm for service members. They use this to get onto the base, use military computers, access the chow hall, and do various other activities. The CAC works by inserting the card into a reader and entering the user’s PIN between six and eight digits long. This, in turn, unlocks the privacy key used for attestation, simultaneously authenticating and identifying the user. Granted, there are a few fail-safes, such as the card locking after three incorrect PIN entries, but at the end of the day, the CAC is on the verge of not meeting DoD or federal standards.

Issues with the CAC

The CAC is an example of basic two-factor authentication, but as the industry works towards multi-factor authentication, the CAC has clearly fallen behind the times. While adding an extra authenticator to the CAC might work for people in day-to-day office settings, it creates a longer authentication process for those in the tactical domain, a process we are, in the end, trying to simplify.

The CAC has been the standard for so long that the industry has now created technology that far surpasses the CAC. The industry is moving from a net-centric to a data-centric approach. This shift is part of the call to “Kill the CAC.” This new approach emphasizes protecting data, rather than just the network that it lives on. With cyber adversaries advancing their technology as well, protecting the network is no longer enough. Zero Trust has become front and center for authentication by always acting as though the network has been hacked. As technology continues to advance, issues with the CAC are becoming more evident:

  • The card can be lost
  • The card can be stolen
  • Not true multi-factor authentication
  • Personal information is at risk of being stored on the card
  • CAC not fulfilling DoD requirements for authentication
  • Is an all or nothing authenticator, “yes” it’s correct, or “no”, it’s not
  • Malware exists that can compromise card-based authentication

How REDCOM Can Solve These Problems

REDCOM’s new disruptive authentication technology, ZKX, offers seamless and frictionless multi-factor authentication designed to embody the foundational principles of zero trust. ZKX is designed atop a foundation of zero-knowledge proofs — longstanding mathematical functions which are used to prove one’s knowledge of secret information without revealing what that secret information is. REDCOM has taken these functions and applied them to the complex issue of multi-factor authentication in zero-trust regimes and has created a ZTA-friendly authentication solution that eliminates the network’s need to trust its users and also the users’ need to inherently trust the host network. Zero Trust Architecture - Never Trust Always Verify

ZKX relies primarily on public data to authenticate users, enabling dynamic and rigid authentication even in environments surveilled by the adversary. Secret authenticating information is stored neither on the user’s endpoint nor a network’s data storage system, making ZKX impervious to endpoint breaches, data theft, or information leaks. ZKX solves the issues of the CAC in the following ways:

  • Protects personal data by not storing personal information
  • No data is at risk if the endpoint device is compromised
  • Interoperable with various network mediums such as satellite, RF radio frequency, and IP networks
  • Can adapt to policy requirements
  • Deployed following policies already outlined
  • Confidence levels can be enhanced simply by continued challenging of a user’s identity, it is not all or nothing
  • Authenticates user and their device simultaneously

Air Force Lt. Gen. Robert Skinner said, “We have to have something better. The industry has been, I’ll say, using other authentication mechanisms — other things for leveraging identity management, access control. I want to leverage that. We want to leverage that technology to be able to provide greater options, so it’s not just two-factor authentication, but it’s truly multi-factor — and it’s with the individual, it’s with the device.”

REDCOM’s ZKX is the new technology that can be leveraged to authenticate the user and the device. We are ready to work with the industry to solve current authentication problems and continue to improve the technology. If you would like to talk about ZKX, reach out to sales@redcom.com

Current State of Chat at the Tactical Edge

Communications at the tactical edge are constantly evolving. During OIF, OEF, OIR, and OND, chat grew exponentially as a primary form of communication, proving its place as an essential component of the Command and Control toolkit.

Key Challenges

Chat is a vital form of communication; however, it is not without its challenges. Chat takes time away from the mission to type out the message, and while this might only take a minute, that minute could matter at the tactical edge. Issues with chat include:

  • Not efficient in all environments.
  • The urgency of messages. When a message is urgent or needs an immediate response, there is no current way to flag it so the recipient knows it needs to be handled ASAP.
  • Cognitive overload. Operators must be watching multiple chat rooms at once, creating a high-stress work environment. They should be focused on the job instead of managing software.
  • Slow. Taking the time to stop moving and type out a message is ultimately slower than jumping on a radio net and communicating via voice.

Benefits of Chat

While we all agree chat is not as quick as radio transmissions, it makes up for this by the fact that it frees up radio nets and can get the message out to multiple personnel simultaneously, essentially cutting out the “middle man” of relaying voice messages through the radios. Other vital benefits of chat include:

  • Increase the amount of space on radio networks. Chat reduces the volume of communication over radio networks, keeping them open for more critical and time-sensitive requirements.
  • Improved situational awareness. By relaying information to warfighters at all levels of the mission, everyone is on the same page. There is no need for a support aircraft to transmit a radio message.
  • Improved speed of communications. Users are receiving, sending, and requesting real-time information. Not only is this information transmitted quickly, but it reaches a wider audience than most radio communications.

How REDCOM handles chat at the tactical edge

Tactical chat has been proven in multiple missions, and its usage is projected to increase in future engagements. In chaotic and contested environments, enterprise-level chat programs have demonstrated they are overly complex, inefficient, slow, and hard to use. That’s why REDCOM built the Secure Client from the ground up specifically for the tactical edge.

REDCOM Secure Client - Tactical ChatThe REDCOM Secure Client is our universal C2 application that supports voice, video, and chat in a single pane of glass. The software is available for both Windows and Android devices, and REDCOM’s Windows client is the only softphone on the DISA Approved Products List (APL). Other benefits include:

  • Built on open standards
  • Intuitive user interface
  • Discussions are color-coded by the user
  • Integrated push-to-talk (PTT)
  • Modular design – can undock unused or unnecessary features
    • Can hide the phone feature if only using chat
    • Reduces cognitive overload — empowers the end-user to focus on the communication method most beneficial for the current mission or job function

REDCOM is always focused on building solutions that are highly flexible, easy to use, and interoperable. We are currently hard at work on the next generation of our Secure Client and Sigma software that will vastly improve the speed and user experience for tactical chat. For example, the REDCOM Secure Client currently supports the XMPP chat protocol, but we understand the importance of interoperability with other protocols such as IRC. Numerous other enhancements are currently in development, and we’ll be excited to share these with you soon.

REDCOM to exhibit integrated tactical and strategic communications solutions at SITDEF Peru 2021

REDCOM Laboratories, Inc., the leading supplier of advanced tactical and strategic communications solutions, is pleased to be attending SITDEF Peru 2021 in booth #93 from Thursday, October 28 – Sunday, October 31. 

At the show, REDCOM will be exhibiting Sigma® XRI-400, a small form factor C2 platform that bridges the gap between disparate radio systems used by military units, government agencies, and public safety organizations. By leveraging existing radio assets, Sigma XRI-400 enables these organizations to seamlessly connect to each other, regardless of radio network, endpoint, or frequency used. Because Sigma XRI-400 is a full-featured C2 platform, radio users can communicate directly with users on any SIP end device and can participate in the same voice conferences.  

At the core of the Sigma XRI-400 is REDCOM Sigma®, a complete software-based Command & Control solution with voice, video, chat, and conferencing. REDCOM Sigma increases operational flexibility while reducing size, weight, and power (SWaP) requirements in military and humanitarian aid scenarios. REDCOM Sigma is based on open standards with a focus on interoperability, flexibility, and ease of use. 

At their core, both of these communications solutions were built with a sophisticated simplicity approach. This means REDCOM software is designed from the start to be intuitive and seamless, making it easy for each user to learn and master the technology in hours or days – not weeks.  

REDCOM’s Jose Pardo, Director of International Sales, is looking forward to attending SITDEF Peru, remarking: “SITDEF Peru is a great way for REDCOM to build new partnerships and reach new customers in a market where we haven’t had a large presence before. With communication solutions for both military and first responder environments, customers would be able to leverage REDCOM’s portfolio of communications hardware and software to meet their unique requirements.”  

JADC2 at the Tactical Edge

Command. Control. Communications.

Command and Control systems are fundamental to all military operations, delivering the critical information necessary to plan, coordinate, and control forces and operations across the full range of Department of Defense (DoD) missions. In late 2020, the U.S. Department of Defense released a document outlining the strategy to modernize Command, control, and communications (C3) systems. In this document, the DoD describes the current architecture as one with “multiple data formats, non-interoperable system interfaces, serial and stove-piped data flows that limit data discovery and analytics, and incompatible data-links requiring complicated relays to communicate between platforms, mission types, and operational domains.” The effort of translating decisions rapidly into action while leveraging capabilities across all domains is an attempt to fix this current architecture. It is referred to as Joint All-Domain Command and Control (JADC2).

JADC2 objectives

JADC2In the C3 modernization effort, the concept of Joint All Domain Command and Control (JADC2) has become front and center. JADC2 is the DoD’s proposal to connect sensors from all the military services — Air Force, Army, Marine Corps, Navy, and Space Force — into a single network. The overall benefits of JADC2 are ease of use and interoperability.

According to David L. Norquist, the Deputy Secretary of Defense, “future conflicts could well be decided by information advantage, success going to the side that transforms vast amounts of data from distributed sensors and weapons systems across multiple domains into actionable information for better, faster decision making and precision effects.” While this is true, this level of interoperability runs the risk of increased complexity and friction from multiple vendors involved in the operation.

Effective force employment begins with effective C2

This idealized concept of JADC2 as envisioned by the DoD is highly ambitious and may still be years away from actualization. REDCOM is already meeting many of the JADC2 goals today within the tactical environment. Our product, Sigma, is the chosen C2 platform of the United States Army for this reason.

At the tactical edge, we are seeing a shift towards RF and blended RF/IP networks. REDCOM Sigma XRI can pull that RF traffic directly into the IP network, even when connectivity to the larger IP networks or higher headquarters is not established. REDCOM’s C2 Console app provides a single pane of glass for monitoring, controlling, and patching together multiple radio nets and SIP endpoints. This allows warfighters to rapidly tie into other networks, such as a coalition radio network, to maintain Command and Control at all times. Thus, JADC2 can be accomplished at the most basic level through voice communications without all of the complexity introduced by sensor-to-shooter technology.

Solutions that function in remote, highly contested locations or denied environments — with equipment that is device agnostic and able to switch among several transmission types — are critical to the JADC2 mission. The true power of REDCOM solutions comes from the ability to easily conference together any combination of devices or waveforms simultaneously.

Jump-start the transition to JADC2 today with REDCOM technology

Deploying REDCOM Sigma or REDCOM Sigma XRI today instantly delivers the following benefits that are directly aligned with JADC2 concepts:

Ease of use: REDCOM systems are so intuitive that new users can be trained and up to speed in minutes or hours — not days or weeks.

Interoperability with coalition partners: REDCOM technology bridges the gap between multiple disparate SIP and RF networks.

No rip and replace: REDCOM technology works with the existing deployed base of handsets and endpoints. Inserting REDCOM Sigma or Sigma XRI into existing architectures is seamless while enabling an upgrade path to future technology.

Improved tooth-to-tail ratio: REDCOM greatly reduces the complexity and bulk at the tactical edge and reduces the need for IT experts. This allows the military to further improve its force design by allowing for smaller geographically dispersed teams without extra field service representatives.

Continuity of ops in DIL environments: REDCOM enables command and control across all echelons, even in the denied environment. This enables warfighters to sustain communications at all times, regardless of transport medium.

Built for mobility: REDCOM systems thrive in the shoot, move, communicate environment. Our low SWaP platforms are resilient to hard shutdowns and power up extremely fast. Communications can be fully operational within minutes, enabling warfighters to secure a tactical advantage by maintaining mobility at all times.

Conclusion

JADC2 is a complex future operating concept, however, REDCOM has the ability to address the key goals today at the tactical edge. REDCOM’s current products can provide a clear path to these future operating concepts by placing powerful and easy-to-use C2 solutions in the hands of the warfighter.

Cybersecurity and Radio Interoperability at the Tactical Edge

In today’s technological climate, cybersecurity is becoming more important to mission success by the day. As our near-peer adversaries continue to invest in cyber capabilities for protection as well as aggression, it is critical that we secure our technological assets across all echelons. Such security is equally important to both the strategic decision-maker and tactical warfighter. REDCOM Sigma XRI is designed with these considerations in mind and is rigidly purpose-built for even the most intense cyber operations.

REDCOM Sigma XRI-400

REDCOM Sigma® XRI is a small form factor C2 platform designed for all echelons of the tactical environment. Sigma XRI delivers voice, video, chat, and Radio over IP (RoIP) in a single ruggedized, low-SWaP box.

Sigma XRI is powered by REDCOM’s flagship software, REDCOM Sigma. Because Sigma XRI is a full-featured C2 platform, radio users can communicate directly with users on any SIP endpoint, and can be controlled and patched together on-the-fly via the REDCOM C2 Console app.

Even the most disparate parts of your radio network can be bridged together with the XRI to facilitate encompassing and effective command and control. The XRI also integrates with analog technologies for interoperability between cutting-edge and legacy architectures. With its modular and flexible design, Sigma XRI can drop into any network architecture. Multiple XRI configurations are available to match your deployment scenario such as the XRI-M4K module specifically designed for the Klas Voyager.

The CIA Triad

The CIA Triad is a fundamental concept in the field of modern cybersecurity. As a cornerstone of current cybersecurity practice, adherence to the CIA Triad guides security practitioners to consider the practical safety of the design and use of critical mission resources. Security of your mission is of critical importance, which is why the XRI is built to encompass and execute these defining cybersecurity principles both at home and in the field.

Availability – When your system architectures become staggeringly complex, availability of your critical C2 becomes a game of interoperability. XRI is all about interoperability. In fact, it is what the “I” stands for. There is a reason why this concept is the foundation of the CIA triad; without availability, nothing else matters. The XRI is constructed to reflect this. Its agnosticism to host radios, enhanced and versatile C2 platform driven by REDCOM Sigma software, and ability to thrive in latent or disconnected environments make the XRI a critical tool for communication availability. Similarly, XRI capabilities are available in other domains, most notably the Combined Joint All Domain Command & Control (CJADC2) theatre. With an easy-to-learn and easy-to-use interface, complete with rapid startup and teardown times, the availability of your command, control, and critical communication capabilities to your necessary recipients is fluid, rapid, and assured, even in contested battlefronts.

Confidentiality – No matter the make, model, settings, or configurations of your tactical radios, the XRI can accommodate them and facilitate communication to other radio nets. This extends to the radios’ waveforms and encryption packages, ensuring that communication traffic is shielded from prying eyes, no matter its destination. This reduces the need to communicate “in the clear” between two parties who might be inconsistent on any one of these fronts, let alone multiple. Similarly, with the XRI’s minimized attack surface, it boasts operational security even in the face of sophisticated cyber adversaries. Combined with Sigma software, which is validated in accordance with FIPS 140-2 and certified through JITC, confidential communications passed through the XRI will remain confidential.

Integrity – When emergencies arise, the integrity of your communications is of utmost importance. With XRI, the integrity of your communications stays intact between different radio networks or when radio networks communicate with the rest of the C2 network. This is possible due to the XRI’s ability to retain the use of radio waveforms and encryption, even between two radio systems that utilize different packages. XRI also affords added integrity to the less technical aspects of completing the mission through the use of REDCOM Sigma, which enables powerful and complex operations through an intuitive and easy-to-learn interface. When seconds matter, consulting the manual is not an option. Features like Audio Monitoring provide higher assurance that communication ports are being used legitimately and communicating accurately.

Sigma XRI radio interop

What does this mean for you?

By incorporating the CIA Triad into the fundamental construction of the XRI, a platform for rigid, accessible, and expansive C2 capability becomes available at the tactical edge. Coupled with its simple and easy-to-use interface, the execution of complex operations is performed with a logical GUI and easily learned commands. This ease of use combined with the XRI’s core principle of interoperability allows even the most disparate communication structures to successfully communicate.

As cyber threats increase in frequency and complexity, cybersecurity becomes less of a feature and more of a necessity. To those on the strategic and tactical edges of defending the United States, it is clear that the next significant conflicts will take place on two fronts: kinetic and cyber. Despite these fronts being physically separate, they are one and the same for those actualizing the mission out in the field. REDCOM recognizes these emerging trends in our national defense and is working to produce equipment, solutions, and services which reflect these evolving factors. We understand that success of the mission begins and ends with the warfighter. By incorporating fundamental tenets of cybersecurity into REDCOM Sigma XRI, REDCOM brings enhanced C2, voice, video, and chat to even the most latent and disconnected tactical environments.

As our continued dedication to strategic and tactical goals focusing on cybersecurity, REDCOM has developed a cybersecurity business unit, ZKX Solutions.

Establishing Battlefield Superiority with Core Command and Control functions

What is Command and Control?

Command and Control is one of REDCOM’s core tenets. From REDCOM’s perspective, Command and Control (C2) refers to the strategic, operational, and tactical communications systems used to manage the mission and synchronize situational awareness. Our C2 solutions include the core functionality — voice, video, and chat — required in all environments, from the network operations center out to the tactical edge. These C2 solutions enable warfighters to sustain communications across the echelons, including in denied environments.

Command and Control: the foundation

Command and Control is the foundation upon which expanded C4ISR and C5ISR functions are built. C4ISR adds Computers, Communications, Intelligence, Surveillance, and Reconnaissance, while C5ISR adds extremely important Cyber considerations into the equation. Together, C5ISR capabilities “enable information dominance and decisive lethality for the networked Soldier”, according to the United States Army. Read more about C5ISR on our blog.

Before commanders add additional technology, features, and functions into the mix, it’s essential that they first have a strong C2 platform as a baseline. This is where REDCOM excels.

Command and Control Communications

Command and Control solutions from REDCOM

Unit leaders need access to a command and control suite that provides consistent access to mission-critical information in order to maintain continuity of operations, maneuverability, and superiority within the battlespace.

REDCOM’s C2 solutions enable warfighters and commanders to sustain communications, regardless of endpoint, environment, or technology used.

REDCOM Sigma

REDCOM Sigma at the tactical edgeAt the heart of REDCOM’s C2 product family is REDCOM Sigma, a lightweight but powerful command and control software platform.

REDCOM Sigma was selected by the United States Army Program Executive Office Command, Control, Communications-Tactical and is being deployed to multiple programs within the U.S. Army at the battalion level and below.

Sigma benefits:

  • Improves operational flexibility – Low-SWaP software can be deployed on any Intel-based appliance
  • Endpoint agnostic – enables just about any endpoint to talk to each other (IP, RF, TSM, analog).
  • Interoperable – works with existing equipment; no need to rip and replace.
  • Incredibly easy to use – Sigma’s intuitive UI reduces training and ramp-up time.

REDCOM Sigma XRI

Sigma XRI expands on Sigma by combining our C2 software with a ruggedized, low-SWaP, purpose-built C2 hardware platform. Sigma XRI empowers warfighters with the capability to talk across the spectrum to disparate communications devices, while also reducing manpower, lowering end item cost, and conserving training resources. REDCOM Sigma XRI is now available in multiple platforms: the stand-alone XRI-400 and the XRI-M4K module for the Klas Voyager. 

Sigma XRI benefits:REDCOM Sigma XRI-400

  • Fast deployment time – the entire solution can be set up and operational within minutes.
  • Built for contested environments – enables warfighters to maintain situational awareness for troop and equipment maneuverability.
  • Solves Joint/Coalition interoperability challenges – bridges the gap between disparate IP devices and radio nets on different frequencies.
  • Radio over IP (RoIP) – integrates multiple disparate radio networks into a SIP-based C2 network

REDCOM Sigma C2 Console

REDCOM Sigma C2 Console is an app within our Command and Control software solution, Sigma. The C2 Console provides operators with a single pane of glass to monitor and control all communications within the tactical C2 network, including SIP endpoint, radio endpoints, and TSM talk groups. The REDCOM C2 Console is browser-based and runs on any PC, laptop, or tablet.  

C2 Console benefits: 

  • Unified interface for controlling all comms on the C2 network
  • Instantly patch together disparate endpoints 
  • Operators can communicate (listen/talk) to any connection
  • Optimized UX built for warfighters at the tactical edge 
  • Drastically reduces cost, infrastructure, & complexity 

What is CMOSS?

The U.S. Army defined a suite of open architecture standards to reduce C5ISR (command, control, computers, communications, cyber-defense, intelligence, surveillance, and reconnaissance) demands. These standards will address SWaP (System Size, Weight, and Power) requirements and provide commonality across multiple platforms by sharing hardware and software components. This architecture defines CMOSS, (C5ISR Modular Open Suite of Standards), driving a change in how hardware and software interact.

Existing networks and systems work through multiple types of hardware and software running on different systems, which are often unable to communicate with one another. If one component or subcomponent fails, it would need to be replaced manually to continue communication. CMOSS will allow for all resources to be shared and swapped, usually in real-time. This would lead to a consolidation of hardware such as radio boards, GPS, control boards, and computer boards into one box. CMOSS will continue to push industry innovation with a standards-based approach, instead of relying on proprietary standards.

Key Benefits and Advantages of CMOSS

CMOSS has the potential to revolutionize communications at the tactical edge:

  • Initial implementation costs will prove to be more cost-effective as upgrade capabilities reduce the need for manual repair and replacement of failed or obsolete components.
  • It will be easier to keep pace with commercially available solutions, reducing integration challenges and costs. With the open architecture structure, multiple vendors can create boards for the CMOSS platform.
  • CMOSS dramatically reduces data stovepipes, making the sharing of hardware between systems simpler where appropriate. This enables optimized integration and utilization of all the communications, collection, and management information available across any platform.

REDCOM's path forward with CMOSS

While CMOSS has many benefits and advantages, there are still gaps that can be filled:

  • Low SWaP. The current systems in place are high in SWaP, and REDCOM Sigma will not only allow for voice and chat management, which current systems do not have, but it will reduce hardware and software footprint. REDCOM will provide a bridge between new CMOSS components and existing legacy components, obviating the need to integrate CMOSS gracefully into the data, and communications architecture.
  • Conferencing and patching capabilities. REDCOM provides important voice, chat, and video conference management software — services that are not on the near-term roadmap for CMOSS. Our conferencing engine is endpoint agnostic, which means any endpoint can be connected together, from SIP desk phones and smartphones to radios and satcom devices.
  • Ease of Use. REDCOM Sigma has a simplified user interface. Systems that are easy to learn will reduce time spent in training and reduce the need for direct involvement of vendors on the battlefield. Recently REDCOM visited Camp Lejeune and trained Marines in less than two days, a massive reduction of training commitment that allowed warfighters to attend to their primary objectives with minimal investment in training time. Not only was training quick, but the interface was so easy to use and understand that the Marines felt confident enough to train others.
  • Simultaneous Chat. Our Chat Manager allows management of multiple chat sessions simultaneously in an environment where multiple users need to touch base frequently and urgently. Simplified management translates into increased speed and safety.
  • Transcoding. REDCOM Sigma features the built-in ability to handle radio to VoIP transcoding. Sigma will be able to transcode between common radio codecs such as MELPe and GSM-AMR and VoIP CODECs such as G.729 and G.711. This reduces the need for having DSP resources or additional CPU boards for handling transcoding.
  • Authentication Service. REDCOM has been studying the principles of Zero Trust Architecture. REDCOM is looking to help produce a zero-trust network that is operationally secure at the enterprise level while prioritizing a zero-trust architecture in forward-deployed environments, bringing security to even the most fringe areas of the DoDs operations.

What is C5ISR?

C5ISR is an acronym for Command, Control, Computers, Communications, Cyber, Intelligence, Surveillance, and Reconnaissance.

Used primarily in the military and defense space, C5ISR is an extension to the overall Command and Control (C2) framework defined by the DoD as “the exercise of authority and direction by a properly designated commander over assigned and attached forces in the accomplishment of the mission.”

C5ISR expands on the term ‘C4ISR’ and is the basis for the term ‘C6ISR’. Each referring to specific capabilities required for mission success. C4ISR does not include ‘cyber’ as C5ISR does, while C6ISR adds ‘combat’ to the list. The main difference between the three at their core is the addition of computers, cyber, and combat resources.

What is a C5ISR System?

To enable Command and Control, warfighters need equipment that allows them to achieve ultimate situational awareness. This means commanders and their personnel must have reliable and secure access to communications and any form of intelligence that may aid them in their mission.

According to the United States Army, the purpose of C5ISR technologies is to, “enable information dominance and decisive lethality for the networked Soldier”. These technologies can range from radios, workstations, and smartphones to night vision and electronic sensors. These solutions pooled together are what make up a C5ISR system.

In addition to aiding C2, the equipment that makes up the system must be reliable in deployed environments, robust to withstand attack, flexible to maintain C2 as the mission evolves, interoperable to support coalition activities, and easy to use for warfighters under siege.

Enabling C5ISR

warfighter using a c5isr systemREDCOM supplies U.S. and coalition partners with proven and easy-to-use C2 solutions. Such solutions include REDCOM’s latest offering, Sigma XRI-400. This rugged, small form factor platform was designed to bridge disparate modes of communication (such as IP and RF) at the Tactical Edge without ripping and replacing existing equipment.

Sigma XRI-400 is powered by REDCOM Sigma, a DoDIN Approved solution and C2 platform of choice for the United States Army’s network modernization. The XRI has low SWaP making it the perfect support for C2 functions.

C2 Solutions from REDCOM