Category Archives: Military

SWaP – It’s bigger than ‘the box’

If you have not read our post about Low-SWaP, be sure to check it out for some great information about why Size, Weight and Power are critically important to consider with deployable communications.

When most people think about low SWaP, they tend to focus solely on the size of the box itself, without thinking about everything that comes with it. In this post, we will take a more holistic approach to Low SWaP and address things such as batteries, generators, peripherals, transportation, and support personnel.

Looks can be deceiving, and the size of any given device is only a small part of the big picture. In a forward-operating environment, each function performed by a device has a logistical trail that follows. Today, it is commonplace to utilize virtualization to bundle multiple capabilities on a single device — adding complexity. Let’s take a closer look at the bigger picture:

Power

A forward-deployed communications network typically relies on locally-generated power. This could be a combination of generators, batteries, or solar. It is critical to plan for maximum draw (kilowatts) and minimum runtime – i.e. how many batteries, what size generator, and how much fuel will be required. In many cases, a locally-generated power source is shared with others, and communicators may not have control over the power source, so consider how will you handle brownouts, surges, or hard power-off situations. Is a UPS required? Ensure that equipment can operate repeatedly and reliably on the planned power source.

SWaP- there's more to consider when it comes to Low-SWaP

Environmental

Consider the environmental requirements. Can a device operate under full load in the desert sun, or will it require air conditioning? If a device requires significant power, then it is also generating significant amounts of heat. How will it be cooled? If you plan on air conditioning, you will need power for air conditioners. Can the hardware sustain operations through a sandstorm, pouring rain, and freezing temperatures or does it need to be in a shelter with heat? Can the device sustain a drop out of the back of a vehicle? Does it need to be mounted in a rugged transit case?

REDCOM Slice 2100 in rugged transit case- SWaP

Peripheral equipment

Consider the devices will you need to provide for the end users; i.e. Radios, Phones, Encryptors, Notebooks/tablets, Batteries & Chargers. How will these devices be powered, and how will they attach to the network? Wired Ethernet, phone wire, fiber, wireless? If you plan to connect to an upstream network via Satellite, LMR, Microwave, etc, what equipment is needed for those connections? Make sure you have access for administration of key components – i.e. laptop, monitor/keyboard, serial connection, etc. Consider bringing spares for critical components. Consider how you will work with coalition partners and other agencies in the field – will you need to bring extra gateways and converters, or is your solution natively flexible?  Interoperability is key.

Support Personnel

Deployed networks continue to grow in complexity, and communicators often have responsibilities outside the realm of communications. This leaves little time for training, creating a knowledge gap often addressed by third-party field support. Civilian contractors deploy alongside military personnel, and manufacturer’s reps deploy alongside first responders and public safety personnel to situations in the field. This is costly and can place civilian personnel at risk in the field. When identifying components of your forward-deployed communications network, seek solutions that are easy to use and intuitive. These will empower communicators to quickly establish communications in the field without on-site assistance from third parties.

Transportation

To bring all this together, let’s consider how to move everything. Equipment, Peripherals, Spares, Shelters, Power, Air Conditioning, Vehicles, Personnel, Lodging, Food and Fuel. Consider how often to restock food and other supplies. How much fuel is needed, and how often?  Can you get fuel delivered regularly and on time, or do you need a surplus reserve? U.S. Army Logistics estimates that in Operation Iraqi Freedom, fuel convoys pictured below constituted 70% of vehicular traffic on attack-prone main routes.

fuel convoys constituted 70% of vehicular traffic on attack-prone main routes

Generic Server vs SLICE 2100

Let’s look at a use case involving two call controllers. On the left is a small form factor server running a software-based IP call controller; on the right is a REDCOM SLICE® 2100. The SLICE 2100 is equipped with T1s, analog lines, radio interface, VoIP and conference capability. While both platforms share some common features, they clearly serve very different purposes.

At first glance, it would appear that the small server is the more efficient solution. After all, it’s a lot more compact than the SLICE 2100. In an IP-only environment, this is likely true.

Low SWaP needs more consideration than just the size of the box

However, as we discussed, the concept of Low SWaP needs to take into account everything around the main box. A forward-deployed communications environment is rarely IP-only. There is typically a mix of LMR, TDM, analog and VoIP – particularly in coalition and inter-agency deployments. The REDCOM SLICE 2100 natively supports these on a single platform and can be managed by a single communicator. If you want to be able to connect with these various network types on the small server, you will need to add a REDCOM SLICE/HDX or third-party gateways. The more third-party gateway devices are added, the less value there is with having a smaller initial box – and even more importantly, the increased complexity may require additional field support and delay setup time.

Conclusion

At the end of the day, the size of ‘the box’ is only as important as the trail that follows it. An ideal deployable solution will not only be low SWaP, but it will also minimize dependence on third-party field support, maximize interoperability, and enable the communicator to rapidly establish service with minimal training. When looking at all the pieces of the puzzle, we can have a better understanding of the true cost and scale of a proposed deployable solution.

The importance of resiliency and redundancy on the battlefield

A recent article on the Breaking Defense website reports that the U.S. keeps losing — hard — in simulated wars with Russia and China. In these simulations, our enemies don’t just sink ships and burn bases. They knock out America’s nerve center by hacking, jamming, or ultimately destroying our communications satellites, wireless networks, data networks, and command-and-control systems. The U.S. spends more on defense than the next seven countries combined, and yet knocking out our communications network effectively cripples our ability to respond.

The answer isn’t necessarily the development of more new technology; rather, we need to look at redeploying and optimizing the systems we already have.

Survival in the cyber domain against a peer competitor will require the ability to leverage multiple communication paths while retaining resiliency and redundancy that support command and control in distributed and disruptive operating environments.

At REDCOM, we engineer our solutions to do just that. Incorporating the newest technology into our product set while retaining our ability to seamlessly move between various communication systems (IP, TDM, Analog, & RF) provides the operational flexibility our formations will need on tomorrow’s battlefields. This approach also allows us to solve interoperability challenges at the tactical level while providing cyber-related offsets that support multiple communication options when operating in the  denied, limited, and intermittent communications environment.

What is Low-SWaP?

What is Low-SWaP?

SWaP stands for Size, Weight, and Power – it is typically used in the context of reducing the overall dimensions and weight of a device while increasing its efficiency and lowering the overall footprint. The prominence of the acronym has been primarily driven by military requirements and industry trends toward smaller more powerful devices.

Low-SWaP in a Military Context

The use of low-SWaP has increased in military literature and requirements over the past decade. As modern strategies and tactical environments demand more mobile and flexible forces, the need for low-SWaP equipment has risen.

In fact, with the size of Rifle squads and Fireteams shrinking, fighter’s packs have increased in weight to account for fewer bodies, making the development of low SWaP equipment even more critical.

From use in Fireteams to the Battalion level, optimizing all mission-critical equipment for SWaP is a current priority of today’s armed forces.

Low-SWaP in Communications

REDCOM has a history of delivering essential communications in a compact footprint. As we develop each new generation of REDCOM products, we bear in mind the SWaP requirements of warfighters and first responders.

Our latest call control software product is the epitome of “Low SWaP”. Our Sigma® software runs on any industry-standard server with as little as 2GB/1 core.

Virtual Netcom's Low SWaP VNC RAID™ with REDCOM Sigma

We’ve been working with many partners on integrating REDCOM Sigma onto their platforms. The latest concept is our partnership with Virtualnetcom, where our software runs on a tiny server housed into a lightweight backpack that also integrates LTE functionality. The nature of REDCOM Sigma lends it to various platforms and can be installed on virtually any device that meets the low processing requirements.

To stay up-to-date on the latest from REDCOM, including where Sigma may be installed next, register for our quarterly newsletter in the footer of this page.

Sectera Wireline Terminal (SWT) Alternative

Maintain Secure Voice Communications with a proven replacement

REDCOM acknowledges recent industry statements regarding end of support for General Dynamics’ Sectéra® Wireline Terminal (SWT). We’d like to take this time to reaffirm our support for secure voice communications. REDCOM continues to support a proven solution using the L3 Secure Terminal Equipment – Remote (STE-R) that is ACC capable.

See our blog post, Sectera Wireline Terminal (SWT) Replacement: REDCOM Secure Device Interface, for the latest information on SWT replacement.

Learn more about the REDCOM Secure Device Interface



Sectera Wireline Terminal (SWT) Alternative - the L3 Secure Terminal Equipment – Remote (STE-R)

What is the ACC program?

ACC stands for Advanced Cryptographic Capabilities. This program is a National Security Agency (NSA) Information Assurance initiative to build and roll out evolving encryption standards that can withstand future vulnerabilities. It includes users from the Department of Defense, government agencies, and partners from around the globe. Because secure communications is so important to REDCOM, we will be carefully monitoring these NSA initiatives.

REDCOM Call Control Portfolio and REDCOM Secure Client Recertified by DoD’s Joint Interoperability Test Command

REDCOM, a leading provider of advanced tactical and strategic communications solutions, proudly announces that three of its products focused on Cyber Security (CS) and Interoperable (I/O) communications have been officially recertified by the Joint Interoperability Test Command (JITC) and placed on the Department of Defense Information Network Approved Products List (APL).

HDX V4.0AR5P1, SLICE® V4.0AR5P1, and REDCOM Sigma® 2.1.1 have all been carefully evaluated and approved as Local Session Controllers (LSC). All three products deliver powerful capabilities highly relevant to the military, including support for the Assured Services Session Initiation Protocol (AS-SIP), IPv4/IPv6 dual stack, Multi-Level Precedence and Preemption (MLPP), conferencing, and secure communications.

HDX and SLICE® are REDCOM’s hybrid hardware platforms that enable seamless interoperability between IP, TDM, and radio networks. Sigma is REDCOM’s flagship military-grade software call control platform that delivers robust call control, media handling, and encrypted communications. REDCOM systems can function as a stand-alone Local Session Controller (LSC) or as an adjunct to an existing Enterprise Session Controller (ESC) to deliver advanced voice services such as transcoding and conferencing for red and black networks.

As part of the testing, the REDCOM Secure Client for Windows® 4.1.2 has been certified with REDCOM Sigma, REDCOM HDX, and REDCOM SLICE. The REDCOM Secure Client has features and capabilities particularly useful for government and military users including MLPP, FIPS 140-2 validated encryption and dual registration for survivability.

REDCOM’s JITC-approved products deliver military-grade resiliency designed for deployments to the tactical edge. All REDCOM technology is based on open SIP standards, which eliminates proprietary endpoints and applications.

About REDCOM

REDCOM Laboratories, Inc. is a woman-owned small business that specializes in the design and manufacture of advanced tactical and strategic communications solutions with a focus on security, reliability, and interoperability. REDCOM’s MIL-spec products are optimized for low size, weight, and power (SWaP), making them the ideal communications core for denied environments or deployments to the tactical edge. REDCOM’s customers include all branches of the military, government agencies, emergency responders, integrators, and enterprises. For additional information, please visit the REDCOM website at www.redcom.com.

When is the network not really the network?

DISA is moving forward with the idea of using remote browser technologies to provide isolation between DoD networks and the Internet. The logic behind the move stems from the notion that if most attacks on the network come in through the web browser, why not disconnect the browser from the network? While this cyber strategy won’t eliminate the risk altogether, the new architecture will increase security posture.

Similarly, in the next fight, the U.S. military will need to build resiliency into the network to be ready for cyber threats. REDCOM communication solutions provide the military with the operational flexibility needed for secure communications throughout the competition continuum and backup solutions for when networks have been compromised using well-integrated, low-SWaP solutions.

Read the article on C4ISR

Evaluating Encryption Schemes for Use in Secure Multi-Party VoIP Conferencing

Secure, real-time, n-party VoIP teleconferencing is an area of encrypted communication which the market has largely failed to actualize for private or commercial use. In this piece, we discuss different encryption schemes for potential use in a product developed for secure, multi-party VoIP conferencing. The encryption regimes are evaluated based on multiple different factors such […]

Quantum Computing and Secure Voice Encryption

Quantum Computing and Secure Voice Encryption

As new advancements are beginning to allow quantum computers to approach market-readiness, cybersecurity professionals are beginning to address their security frameworks and the potential for post-quantum resistant encryption schemes.

Since the “quantum-decryption apocalypse” is several years away, what is the big rush in switching our cryptographic schemes now? Are there any major benefits? Actually, there are several benefits to moving forward today.

If you’re interested in learning more, click the button below to get our white paper on Post-Quantum Encryption. The paper was authored by REDCOM’s Sal Ceravolo, Voice Product Security Program Manager. In this paper Sal takes a look at where quantum computers are in breaking the encryption schemes used today for secure voice communications. Sal also shows why companies should consider moving towards post-quantum encryption, and how the United States is competing against China in the fight for quantum computer supremacy.

Download the White Paper

An Introduction to Cryptography and the Public Key Infrastructure

A White Paper by Mike Gates, Sales Engineer, REDCOM

Like it or not, we are living in a virtual world and using the internet for everyday tasks has become commonplace. We can visit a virtual branch of our bank and pay our bills, stream the latest episode of our favorite television program, or even take our credit card on a spending spree at a virtual mall. The internet is a major component of our lives today and provides an extremely convenient service. We sometimes need to be cautious when using that service, however. What if your bank account or credit card information was available to others during your stroll through the virtual world?

While this document won’t provide specific details on protecting your bank account, the methods used to protect this type of information are applicable to protecting other types of data. Much like the security used by a web browser to protect your bank account information the same methods can be used to protect other types of information, such as the signaling and media transmitted during a voice over internet protocol (VoIP) call.

Without a doubt, the methods and tools used to secure information that is transmitted across a network are complex subjects. Entire textbooks are devoted to each of these areas. This document is not intended to provide a comprehensive study of these subjects. Rather, a brief overview with enough information to understand the fundamentals of the subject is the goal here. Sources of additional reading will be provided at the end of the document should you wish to dig deeper into these topics.

Download the White Paper

REDCOM lauded for work on Internal Communications System for Astute Class Submarines

REDCOM has recently received the L3 Communications/Henschel “Outstanding Supplier” Award for their ongoing work on the new Internal Communications System (ICS) for the Astute Class of Submarines of the Royal Navy. REDCOM has also been noted for their efforts on the ICS project by BAE Systems Submarine Solutions. BAE Systems is responsible for the overall development of the Astute Class submarines.

This is the second major class submarine project where REDCOM has teamed with L3 Communications/Henschel to deliver a high-quality internal communications system—the first being the Virginia Class submarines for the United States Navy.

Executives from L3 Communications/Henschel also awarded REDCOM a crystal Supplier Appreciation Award, citing REDCOM’s dedicated service and efforts. This award was presented during REDCOM’s 30th anniversary event in June 2008.

This further validates the superior quality of REDCOM products, known for their reliability, interoperability, and transportability. From tactical to strategic uses, in VoIP and TDM applications, REDCOM has the field-proven technology that a wide range of defense forces count on in operations around the world.

REDCOM is also the manufacturer of the TRANSip® technology suite that delivers VoIP through an integrated SIP Call Manager with IP Trunking, Media Gateway and Media Gateway Controller capabilities. REDCOM TRANSip connects multi-technology networks and provides the comprehensive solution for defense applications. TRANSip offers interoperability, legacy functionality, flexible and priority routing, data collection and protocol support for the international defense market.