Naval ISR Fusion Principles, Operations, and Technologies
Naval ISR Fusion Principles, Operations, and Technologies
Jim Scrofani
Will Williamson
Jihane Mimih
Ed Waltz
Library of Congress Cataloging-in-Publication Data
A catalog record for this book is available from the U.S. Library of Congress.
All rights reserved. Printed and bound in the United States of America. No part of this book
may be reproduced or utilized in any form or by any means, electronic or mechanical, including
photocopying, recording, or by any information storage and retrieval system, without permission
in writing from the publisher.
All terms mentioned in this book that are known to be trademarks or service marks have been
appropriately capitalized. Artech House cannot attest to the accuracy of this information. Use of
a term in this book should not be regarded as affecting the validity of any trademark or service
mark.
The views expressed in this publication are our own and do not imply endorsement by the
Office of the Director of National Intelligence, the Department of Defense, or any other U.S.
government agency.
10 9 8 7 6 5 4 3 2 1
We dedicate this book to the men and women of the United States Navy; we
admire their foresight and leadership in developing, testing, evaluating, and
deploying new technologies to expand the horizons of intelligence, surveillance, and
reconnaissance. We wish them fair winds and following seas
Contents
Foreword xi
Preface xv
vii
viii Naval ISR Fusion Principles, Operations, and Technologies
6.1 The JDL Model for Organizing Naval ISR Fusion 109
Contents ix
Index 229
Foreword
As professional naval intelligence officers with keen interests in emergent dy-
namic intelligence, surveillance, and reconnaissance (ISR) processes, we needed
to develop a significant appreciation for the challenge of integrating informa-
tion from many sources, and the potential role of technology to contribute
automation to achieve speed and accuracy. Working with a team of engineers in
the 1980s, what came to be known as the Joint Directors of DoD Labs (JDL)
Data Fusion model was developed—a reference architecture that remains today
as a standard for integrating information in intelligence applications. Through-
out the 1980s and 1990s, the model guided the development of many naval
data fusion capabilities as new sensor and digital links enabled even more in-
formation to be fused to provide situation awareness to combat information
centers across operating forces. Our requirement in those days was to integrate
and derive threat information from the seabed to space.
By the early 2000s, it was known that the U.S. Navy had a sound vision
in Network Centric Operations (NCO) and an implementation concept in
FORCEnet, but to achieve enterprise transformation, we needed to solve many
challenges. The first was acquisition reform and transformation to enable rapid
change at large scale—a continuing problem and issue in the DoD to this day.
We needed a level of system-of-system (SoS) enterprise level systems engineer-
ing that was significantly more expansive than prior DoD projects—the closest
was the air traffic network developed by the Federal Aviation Administration
(FAA). We needed the highest level of continuous industry-government col-
laboration at both the enterprise and system/program level to accomplish net-
working and integration at the naval force scale. So, we had to apply software
xi
xii Naval ISR Fusion Principles, Operations, and Technologies
This is an important book for the naval officer, developer, or system im-
plementer in advanced ISR, and for those seeking a deeper understanding of the
challenges, operations, and methods of advanced naval ISR systems.
xv
xvi Naval ISR Fusion Principles, Operations, and Technologies
The U.S. Navy also emphasizes the close relation of ISR to command
and control (C2), and computers (C4) that direct operations by applying the
1
2 Naval ISR Fusion Principles, Operations, and Technologies
Table 1.1
Layers and Waters of the Maritime Domain
The Maritime Domain
Cyberspace Domain Within the Global Information Environment
Space Communication, Navigation, and Intelligence Collection
The Airspace Above
Brown The Littorals Green Blue
Water Landward Seaward Water Water
Navigable Area inland from Area from the Area of coastal The open ocean
rivers and their the shore that can open ocean to the waters, ports, and and the deep
estuaries be supported and shore that must harbors seabed below
defended directly be controlled
from the sea to support
operations ashore
The shallow water floor, waves, currents, vegetation The seabed below
The Naval Intelligence Reconnaissance and Surveillance Mission 3
• Seabed: The deep ocean (6,000–36,000 ft) is the newest potential do-
main of warfare where undersea cables, undersea infrastructure (oil and
gas), mines, and future deeply hidden weapon systems reside and pro-
vide targets in conflict. This is the realm of deep submersible remotely
operated and autonomous systems.
• Undersea: Traditional undersea warfare depths to 6,000 ft are the oper-
ating areas of manned and unmanned submersible weapons and sens-
ing systems; this is the realm of submarine and antisubmarine warfare
(ASW).
• Surface: Surface ships and unattended sensors (buoys, autonomous sta-
tion–keeping sensor nets, etc.) provide surface level, overt, and covert
maritime sensing.
• Information and cyber: This nonphysical domain has a presence across all
of the physical domains. The U.S. DoD defines the information envi-
ronment (IE) as the aggregate of individuals, organizations, and systems
that collect, process, disseminate, or act on information, a heterogeneous
4 Naval ISR Fusion Principles, Operations, and Technologies
and its related land, sea, and air forces at a given time and place without
prohibitive interference by the opposing force.
• Maritime domain awareness is the effective understanding of anything
associated with the maritime domain that could impact the security,
safety, economy, or environment [5].
• Information dominance is the operational advantage gained from fully in-
tegrating the Navy’s information functions, capabilities, and resources to
optimize decision-making and maximize warfighting effects. It provides
the ability to seize and control the information domain high ground
when, where, and however required for decisive competitive advantage
across the range of Navy missions [6].
• Sea control is the employment of naval forces, supported by land and
air forces as appropriate, in order to achieve military objectives in vital
sea areas. Such operations include destruction of enemy naval forces,
suppression of enemy sea commerce, protection of vital sea lanes, and
establishment of local military superiority in areas of naval operations.
See also land control operations (U.S. DoD) [7].
• Distributed maritime operations (DMO) is an operational concept that
enables widely dispersed naval units to perform sensing, command, and
control, and weapon activities such that the distributed platforms act as
a coherent whole. This is related to:
• Distributed lethality is an operational concept to more widely distrib-
ute lethal weapon systems across surface ships (“if it floats, it fights”)
allowing all surface units to contribute to coordinated and indepen-
dent surface strike actions.
• Dynamic force employment (DFE) is an operational concept that de-
ploys naval forces over wider and more diverse sets of environments,
rather than establishing regular maritime patterns of operation.
• All-domain ISR is an ISR that encompasses and integrates information
from all domains of the maritime environment; sensors and sources
from seabed to space to provide commanders with the most complete
picture of adversary activities.
Russia and China are increasingly turning to these tactics to pursue ob-
jectives on their periphery without reaching the level of violence that could
provoke a United States or allied response. In gray zone operations, an aggressor
denies its adversary physical access to contested areas at sea or ashore using ci-
vilian or paramilitary forces, spreads disinformation via social media to foment
protests and insurgencies, and degrades the defender’s computer networks and
sensors through cyber and electronic warfare attacks. For China, these gray
zone tactics represent an attempt to pursue its interests in the near-term with-
out drawing a full-scale response by the United States, its allies, and others. In
contrast, gray zone approaches are a long-standing component of Soviet and
Russian military and intelligence operations [9].
Table 1.2
Key Operational Objectives of Maritime Superiority
Aspect Operational Objectives
Awareness by ·· Assure knowledge of status of distributed Blue forces;
all-domain ISR ·· Reduce uncertainty, locate, and track maritime objects (Red and neutral);
·· Know the maritime situation and predict feasible next situations;
·· Enable timely, accurate, and decisive command decisions.
Defense ·· Protect, defend, and recover own IE;
·· Increase the enemy’s friction by creating uncertainty.
Offense ·· Degrade, disrupt, deceive, deny, and exploit enemy’s IE to introduce fog;
·· Mass distributed forces decisively engage the enemy’s critical vulnerabilities
to degrade and remove the enemy’s center of gravity.
The Naval Intelligence Reconnaissance and Surveillance Mission 9
Table 1.3
ISR Demands Across Representative Maritime Operations
Operations Operational Role ISR Role
Surface Plan and direct surveillance of the ·· Conduct surface surveillance from
warfare maritime domain, interdict and conduct space, air, or surface sensing.
(SUW) strikes by aircraft and missiles to ·· Perform over-the-horizon target
destroy or neutralize enemy naval acquisition, tracking, and targeting.
surface forces and merchant vessels.
Air and Counter both air and missile threats ·· Perform air surveillance in moving
missile by directing a combination of theater missile engagement zone (MEZ);
defense counterair and integrated air and missile ·· Acquire, track, and handoff high-speed
(AMD) defense (IAMD) weapons. targets.
Antisubmarine Find, fix, track, target, and engage ·· Conduct broad-area maritime
warfare enemy submarines; monitor, track, and surveillance.
(ASW) engage enemy submarines in port or ·· Apply persistent, national, and joint
transiting to operating areas as well as air, space (e.g., EO, IR, radar), surface,
conduct active searches in operating and subsurface (e.g., acoustic,
areas. nonacoustic) intelligence collection
systems.
Mine Identify engagement opportunities ·· Apply ISR to detect mining ops,
warfare to employ friendly mining capability, localize threat areas, and plan safe
(MIW) preclude adversaries from effectively transit Q routes.
employing maritime mining, and defeat ·· Apply ISR to guide mine-sweeping
the minefield. operations.
Strike Destroy or neutralize targets ashore, ·· Apply space, air, human, or other
operations including attacks against strategic or sources to localize ashore activities
tactical targets, from which the enemy and targets.
is capable of conducting or supporting ·· Track movements (e.g., convoys) and
air, surface, or subsurface operations processes (e.g., fueling, weapon
against friendly forces. basing) that pose threats.
·· Identify noncombatant activities.
Amphibious Embarkation and debarkation of landing ·· Perform overwatch ISR to identify
operations forces from/to ships to land. threats complex amphibious ops.
Maritime Monitor, query, and board merchant ·· Obtain departure and in-transit
intercept vessels in international waters to intelligence to track and identify
operations enforce sanctions. suspicious vessels.
(MIO)
Maritime Establish conditions for security and ·· Coordinate with foreign intelligence
security protection of sovereignty in the maritime partners to identify activities, routes,
operations domain (e.g., counterpiracy, counter and vessels.
(MSO) maritime-related terrorism, counter ·· Obtain departure and in-transit
proliferation, transnational crime, illegal intelligence to track suspicious
seaborne migration, or trafficking). vessels.
·· Provide intelligence for visit, board,
search, and seizure (VBSS) activities.
Sea-based Establish an at-sea base for ships or ·· Provide supporting ISR for the seabase
operations platforms to provide a scalable and and all operations from the base to
mobile capability to exercise C2 or ashore and afloat activities.
provide strike, power projection, fire ·· Provide intelligence to seabase
support, and logistic capabilities. commanders on foreign responses.
The Naval Intelligence Reconnaissance and Surveillance Mission 11
Distribution
The first attribute describes the structure of advanced MDA ISR systems. As
DMOs move away from concentrated battle groups and MDA drives the need
for extended surveillance coverage, sensors and weapons are distributed across
a wide maritime area. Following the principles of network centric warfare
(NCW), developed in the 1990s, sensors and weapons across all naval platforms
operate on a network to provide an organic response to threats. The network
concept is built on four fundamental principles that are applied to MDA [17]:
Automation
The scope and scale of MDA drives the need for higher automation in the ISR
process. The scope, difficulty, and range of tasks requires higher dimensionality
of sources and often requires MultiINT sources to be associated and combined
to locate and identify targets such as vessels of interest. The global scale of MDA
demands large areas of coverage and numbers of target vessels. These factors
drive that need for increased automation and the orchestration of sensors and
processing of information and deliver timely intelligence.
Automation and autonomy offer two primary benefits: (1) improved safe-
ty, efficiency, and cost, and (2) expanded coverage beyond what human teams
can accomplish, and increased speed, often beyond human performance for
complex tasks. The MDA ISR challenge requires the latter to rapidly assimilate
MultiINT maritime data, track and identify targets, identify threatening activi-
ties, and nominate targets.
Speed
While the first two attributes dealt with the ISR structure, scope, and scale,
this attribute deals with the need to operate at a speed faster than the adver-
sary’s observe-orient-decide-act (OODA) loop—creating a lag in the adversary
response. The distribution of sensors and introduction of a network increases
the latency from sensing to fusion; this effect of distribution to achieve greater
coverage must be overcome to maintain coverage and speed. “How much speed
is required?” is the dominant operational question to implement distributed
MDA and to conduct DMO. Speed is a relative requirement, and it is relative
to operational sensing, network, and weapons performance, as well as the ad-
versary speed of operations. Therefore, latency from sensor-to-decision maker
(or shooter) is a key factor in the success of highly automated MDA systems.
• Observe is the ISR process by which ISR sensors and sources collect
information about the maritime environment. The observation process
is guided by direction from the act process to collect information to
improve the orientation and decision processes.
• Orientation is the process that places the observed information in con-
text, cross-correlating information, comparing information to mental
models of maritime behavior, and projecting behavior into possible fu-
tures. Here, intuition and deliberate reasoning enable a situation to be
estimated and alternatives to be considered.
• Decide is the process of applying judgment to choose actions from al-
ternative views of the situation, alternative actions, and the range of
outcomes of those choices. Contextual factors (weather, geopolitical,
logistics, etc.) and experience come to play in this process of judgment.
14 Naval ISR Fusion Principles, Operations, and Technologies
The results of actions are observed and the cycle reorients and makes new
decisions. The detailed functions of the manual MDA ISR process are depicted
in the OODA loop in Figure 1.4 to illustrate the use of the model as an organiz-
ing framework to describe the command-and-control functions and relation-
ships of the MDA process. The example MSO activity receives tips about a
suspicious vessel of interest (VOI) and creates a VBSS mission. The flow begins
with observe and orient as a tip is received at the Maritime Operations Center
(MOC) about a specific VOI. The tip information is assessed to determine
credibility and the VOI is located (if possible) in the current and historical track
knowledge base (SEALINK). In the decide phase, the MOC director guides the
decision-making process that involves requests for information (RFIs) to assess
the availability of resources (e.g., ships or aircraft to perform reconnaissance to
locate the vessel, and ships available along the projected track to intercept and
board).
The MOC director develops the course of action (COA) and issues the
orders to conduct reconnaissance, intercept, and board. The act phase carries
out the COA and boards the ship, collecting biometric data from those onboard
and sending the data ashore for crew identification and VOI analysis. Results
can feed back to the decide phase causing additional actions. If the VOI remains
suspect, it may be placed on the watchlist database for subsequent tracking.
Figure 1.4 Top-level MDA functions for VBSS mission in the OODA loop model [23].
Figure 1.5 compares a simple cognition model and the closed-loop JDL
model.
The robotics discipline has adopted a similar model, of course, because
this is quite fundamental, and represents the fundamental elements of thinking
and autonomy. The cognitive functions focus sensing and processing to reduce
uncertainty about the situation and threats.
More recent revisits to the model have added new functions: (1) a level
0 (signal/feature assessment) that precedes level 1 and combines raw signals or
features from multiple sources to detect and identify objects and their states, (2)
a level (or function) 5 (user refinement) that is the human machine interface
(HMI), and (3) a function 6 (mission management) that includes the mis-
sion actions beyond sensing and collection [26]. Waltz introduced the comple-
mentary nature of machine learning (or ML, referred to as data mining in the
1990s) and data fusion to illustrate how inductive ML processes discover and
refine models of targets for deductive fusion processes to detect those targets in
operational data (Figure 1.6) [27].
The JDL model has provided a basis for distinguishing the processing
stages and implementing algorithms for five decades and remains the standard
for those in the ISR discipline. The JDL model is adopted as the framework
used throughout this book as the common reference for ISR processes.
Figure 1.6 Complementary ML and data fusion processes. (From: [28]. Figure reprinted with
permission from IEEE.)
18 Naval ISR Fusion Principles, Operations, and Technologies
Figure 1.7 Organization of the chapters move from mission to ISR fusion technologies.
The Naval Intelligence Reconnaissance and Surveillance Mission 19
enable rapid and accurate information to enable decisive action. The chapter
concludes with a DMO scenario to illustrate the functions and operations in
the concept.
Chapter 4 provides an overview of the current U.S. Navy ISR fusion ar-
chitecture as a baseline reference and then projects the C2 challenges that drive
the ISR requirements. The chapter provides an introduction to maritime ISR
systems and a baseline architecture for a more centralized sensor and informa-
tion fusion.
Chapter 5 explains the challenges to perform all-domain ISR, focusing on
three challenge areas. The first challenge is reconciling the spatial distribution
of platforms, associating observations and latency across distributed networks.
The second is utilizing sensor observations with low temporal sample rates and
highly dynamic targets (e.g., fleeting, hypersonic, and swarming). The third
challenge is achieving the persistence required for surveillance and the accuracy
required for C2 and fire control.
The second section of the book details the systems and technologies nec-
essary to enable more distributed operations.
Chapter 6 introduces the functional requirements for naval MultiINT
fusion systems and the technologies that implement them. The chapter briefly
introduces the JDL model for organizing naval ISR functions. Then the core
functions of object and situation refinement, threat refinement, and resource
orchestration are explained. The chapter focuses on the necessity for orchestrat-
ing distributed resources to effectively support DMO.
Chapter 7 explains the necessity of adaptive networks to route sensor data
across a grid of nodes to users: other sensors, fusion nodes, and command nodes
that perform operational decision-making. The principles of network operation
and security are detailed for the grid.
Chapter 8 introduces the emerging role of AI, automation, and autonomy
in naval ISR systems. The rationale and elements of automation of the ISR
network are explained, focusing on automation and intelligence in sensing and
sensemaking. An all-domain automated operation scenario illustrates the con-
tributions of automation and autonomy to DMO.
Chapter 9 focuses on the new global maritime reconnaissance and sur-
veillance opportunities provided by distributed space sensing by constellations
of smallsat constellations, particularly the revolutionary changes in maritime
transparency. The chapter illustrates the game-changing contribution of persis-
tent maritime surveillance and its impact on DMO.
Chapter 10 concludes the book with an overview of future technologies
that will enable even more advanced capabilities in all-domain ISR.
20 Naval ISR Fusion Principles, Operations, and Technologies
Endnotes
[1] Joint Publication 2-01, Joint and National Intelligence Support to Military Operations,
U.S. DoD Joint Chiefs of Staff, July 5, 2017.
[2] Law of the Sea: A Policy Primer, “Maritime Zones” The Fletcher School of Law and Di-
plomacy, 2017, Chapter 2, https://sites.tufts.edu/lawofthesea/chapter-two/.
[3] The IE and its subset and cyberspace are defined by the DoD in Joint Publication (JP)
1-02, the Department of Defense Dictionary of Military and Associated Terms. Notice
that the definitions distinguish between three fundamental domains: the physical domain,
an information domain (which includes cyber), and the human cognitive domain. See the
“DoD Strategy for Operations in the Information Environment,” June 2016.
[4] “A Design for Maintaining Maritime Superiority,” Version 2.0, U.S. Navy, December
2018, p. 6.
[5] Defined in “Amendments to the International Aeronautical and Maritime Search and
Rescue (IAMSAR) Manual,” International Maritime Organization, T2-OSS/1.4 MSC.1/
Circ.1367, May 24, 2010.
[6] “Navy Strategy for Achieving Information Dominance, 2013; The U.S. Navy’s Vision for
Information Dominance,” 2010. See also “Information Superiority Vision,” Department
of the Navy, February 2020.
[7] “Surface Force Strategy: Return to Sea Control,” Surface Force Command, 2018.
[8] The concept of great power competition is articulated in the U.S. Department of Defense,
“National Security Strategy of the United States of America,” Washington, D.C., Decem-
ber 2017.
[9] Clark, B., et al., “Restoring American Seapower: A New Fleet Architecture for the United
States Navy,” Center for Strategic and Budgetary Assessments, 2017, p. 12, https://csba-
online.org/uploads/documents/CSBA6292-Fleet_Architecture_Study_REPRINT_web.
pdf.
[10] Krepinevich, A. F., “The Military-Technical Revolution: A Preliminary Assessment,”
Center for Strategic and Budgetary Assessments (CSBA), 2002, p. 1.
[11] Congressional Research Service, Hypersonic Weapons: Background and Issues for
Congress, R45811, updated March 17, 2020.
[12] Above these Navy documents, the United States has Presidential Policy Directive 18,
“Maritime Security,” (August 2012). From this directive derives a National Security Policy
Document (NSPD-41) and a Homeland Security Policy document (HSPD-13) that define
U.S. maritime security policy (open-ocean and homeland coastal-ports, respectively).
These national policy level documents then flow to a National Maritime Security
strategy that guides Navy goals, operational objectives, and implementing strategies. The
Department of Defense Directive 2005.02E, “Maritime Domain Awareness (MDA) in
the Department of Defense,” defines DoD policy and assigns responsibilities.
[13] For example, see the Department of Defense, Joint Publication 3-0: Joint Operations,
Washington, D.C., 2006, p. IV–26.
The Naval Intelligence Reconnaissance and Surveillance Mission 21
[14] National technical means (NTM) referred to overhead satellite technical collection systems
in the 1970s though they can be applied to other special collection capabilities. See Smith,
C. E., “Watching the Bear: Essays on CIA’s Analysis of the Soviet Union,” Chapter IV, G.
K. Haines, and R. E. Leggett (eds.), “CIA’s Analysis of Soviet Science and Technology,”
CIA Center for the Study of Intelligence, 2007.
[15] Navy Tactical Exploitation of National Capabilities (TENCAP) Unclassified Solicitations
(FY 2015–2020) DISC Working Documents (2020). Naval Digital Integration Support
Cell.
[16] Operations in the table are based on Maritime Operations Joint Pub 3-32, Department of
Defense, June 8, 2018.
[17] Cebrowski, A. K., and John H. Garstka, “Network Centric Warfare: Its Origin and
Future,” Proc. Naval Institute, Vol. 124/1/1,139, January 1998. See the fundamental
literature on NCO at http://www.dodccrp.org.
[18] Garstka, J., F. P. Stein, and D. S. Alberts, “Network Centric Warfare: Developing and
Leveraging Information Superiority,” Washington, D.C.: DOD C41SR Cooperative
Research Program, February 2000, p. 2.
[19] See “National Strategy for Maritime Security,” September 2005, and “National Plan to
Achieve Maritime Domain Awareness for the National Strategy for Maritime Security,”
United States, October 2005.
[20] “Navy Maritime Domain Awareness Concept,” U.S. Navy Chief of Naval Operations,
May 2009.
[21] In addition to the two models described, two other models should be noted: (1) The sense-
hypothesize-option-respond (SHOR) model was introduced in 1981 by Joseph Wohl
(Wohl, F. G., Force Management Decision Requirements for Air Force Tactical Command
& Control, IEEE Transactions in Systems, Man and Cybernetics, SMC11, 9, pp. 618–639
(September 1981)), and (2) the task-collect-process-exploit-disseminate (TCPED) model
that describes the sequence of activities performed in intelligence collection-to-reporting
(TCPED is a technical representation of the more general intelligence cycle model).
[22] Osinga, F., “Science, Strategy and War: The Strategic Theory of John Boyd,” Netherlands:
Eburon Academic Publishers, 2005.
[23] Adapted from the VBSS example provided in Hutchins, S. G., et al. “Enhancing Maritime
Domain Awareness,” Proc. of 13th ICCRTS: C2 for Complex Endeavors, 2008. See also
“Maritime Domain Awareness: Assessment of Current Status,” Proc. of 14th ICCRTS: C2
and Agility, 2009.
[24] “Functional Description of the Data Fusion Process,” Joint Directors of Laboratories,
1991.
[25] Readers familiar with the Kahneman-Tversky cognition models distinguish between two
models, or systems of thought: fast (intuitive) reaction and slow (deliberative analysis).
Kahneman, D., Thinking, Fast and Slow, NY: Farrar, Straus and Giroux, 2011. Kahneman,
D., “A Perspective on Judgment and Choice,” American Psychologist, Vol. 58, No. 9,
September 2003, pp. 697–720.
22 Naval ISR Fusion Principles, Operations, and Technologies
[26] Llinas, J., C. Bowman, G. Rogova, A. Steinberg, E. Waltz, and F. White, “Revisiting the
JDL Data Fusion Model II” International Data Fusion Conference, July 2004. For a more
recent view, see Blasch, E. P., É. Bossé, and D. A. Lambert, High-Level Information Fusion
Management and System Design, Norwood, MA: Artech House, 2012.
[27] Waltz, E. L., “Information Understanding: Integrating Data Fusion and Data Mining
Processes,” Proceedings of the 1998 IEEE International Symposium on Circuits and Systems,
Vol. 6, 1998, pp. 553–556.
2
Principles of Operations from Seabed to
Space
Although the concept of DMO represents a new thrust in today’s naval warf-
ighting scenario, the idea has developed over several decades following techno-
logical advances and historical events. In the 1950s, the first tactical data link
was developed and deployed in the United States in response to the develop-
ment of Soviet antiship cruise missiles. The data link had the advantage of
reducing latency as well as the time to observe, orient, decide, and act, thereby
enabling the warfighters a quick reaction time [1]. In the late 1970s, the Aegis
Combat System, an advanced C2 and weapon control system, was developed
which enabled combat systems onboard a ship to work together to track and
guide weapons. In the 1990s, a cooperative engagement capability (CEC) was
developed to enable raw sensor data to be shared in real time with other combat
units. This sensor data sharing was a transformative step that allowed ships to
respond to a threat based on data detected by another ship’s radar if they were
part of the CEC network. Former Rear Admiral Rodney P. Rempt, director of
theater air and missile defense on the Navy staff, envisioned a future tactical
grid as an agnostic network of weapons and sensors, controlled by a specific
number of nodes, with no restrictions on the location or deployment site of the
weapons, sensors, or controlling nodes [2]. The former chief of naval operations
(CNO), Admiral John M. Richardson emphasizes in the 2016 report “A Design
for Maintaining Maritime Superiority” the need to “adopt a strategy that allows
sea control and maritime superiority to address the threat rising from Russia
and China and also to address ‘blue-water’ scenarios far from land and power
projection ashore in a highly ‘informationalized’ and contested environment”
[3]. Although this event did not directly call for DMO, it has certainly set the
23
24 Naval ISR Fusion Principles, Operations, and Technologies
stage and presented a challenging problem to which DMO is the only solution.
The CNO was confident that even though tough choices were made due to
budget restrictions, innovative and inspiring ideas would emerge as a result of
these choices. Indeed, in 2017, former Vice Admiral Thomas S. Rowden from
the Naval Surface Forces presented his “Surface Force Strategy, Return to Sea
Control” document that discussed the concept of distributed lethality (DL)
that aims at achieving sea control especially in the surface domain. The DL
concept is based on the following pillars:
In 2018, the U.S. Harry S. Truman Carrier Strike Group presented the
concept of DFE whose goal was to “more flexibly use ready forces to shape
proactively the strategic environment while maintaining readiness to respond to
contingencies and ensure long-term warfighting readiness” [5]. The chairman
of the Joint Chiefs of Staff, General Joe Dunford, and Defense Secretary Jim
Mattis pushed implementation of DFE to allow the military to quickly deploy
forces while ensuring that the military infrastructure remained agile and less
predictable [6].
The DMO concept shares the key tenets with DL and carries the prin-
ciples that form the basis of DFE, except that it extends the maritime domain
to encompass all domains including air, subsurface, space, and cyber warfare.
A primary goal of DMO is allowing operational commanders the ability
to treat the entire fleet assets under their control as a single weaponized system.
The individual systems of varying capabilities are integrated to provide both a
unit defense and a collective defense. The integrated package unites diverse and
disparate weapons, technologies, sensors, platforms, and systems into a single
system with capabilities exceeding the sum of the parts. In addition to engaging
and defeating multidimensional threats across all domains in the maritime en-
vironment, the single united weapons system can also conduct offensive strikes
and other fleet engagements [4].
While the U.S. Navy has been open about its conceptual strategies and
operations over the past decades, the needs and technical solutions described
throughout this book are of interest to navies of the world that subscribe to
the conventions of international security on the seas. These nations partici-
pate in organizations and alliances that cooperate, establish standards, and ex-
change thought on maritime security. The interested reader should monitor
Principles of Operations from Seabed to Space 25
Figure 2.1 Conceptual model of the elements of the intelligence process [14].
Principles of Operations from Seabed to Space 27
ISR is a military operation that plays a pivotal role across all domains (air,
land, seas, space, and cyberspace) and enables the execution of MDA functions.
Its goal is not only to help decision makers and stakeholders “anticipate change,
mitigate risk, and shape outcomes,” [15] but it also has a great influence on how
missions and operational exercises are planned to defeat the adversary across all
domains. The U.S. DoD defines ISR as “an integrated operations and intel-
ligence activity that synchronizes and integrates the planning and operation
of sensors, assets, and processing, exploitation, and dissemination systems in
direct support of current and future operations” [16]. ISR platforms, that in-
cludes satellites, ships, humans, UAVs, UUVs, and planes, collect specific in-
formation using a wide range of sensors about an area of interest. The collected
data is analyzed with the help of AI and ML algorithms to not only produce
intelligence reports that support operational needs to defeat the adversaries but
also to protect the nation and its forces. Figure 2.2 illustrates the breadth of
ISR across all domains from seabed to space, including the cyber domain, to
detect objects of interest and predict their behavior within a battlespace. This
effort necessitates the fusion of all types of information (SIGINT, GEOINT,
MASINT, PAI, and HUMINT) across all domains and requires the collabora-
tion of all forces operating across the domains as well as working with allies to
ensure timely information flow from one service agency to another for a suc-
cessful execution of missions.
This concept is referred to as the Joint All-Domain Operations (JADO)
which is defined as “operations conducted across multiple domains and contest-
ed spaces to overcome an adversary’s (or enemy’s) strengths by presenting them
Principles of Operations from Seabed to Space 29
with several operational and/or tactical dilemmas through the combined ap-
plication of calibrated force posture; employment of multi-domain formations;
and convergence of capabilities across domains, environments, and functions in
time and spaces to achieve operational and tactical objectives” [18]. One of the
challenges that faces this concept is data handling. Standardizing the data across
services or even within each service can be challenging because each type of data
is stored in a specific format. Data is also stored at different classification levels
which makes data sharing a challenging task. The lack of a standard taxono-
my renders information exchange between different military and intelligence
services difficult unless a translation software is used to present the data to a
specific agency in its own lexicon. The availability of large amounts of data gen-
erated across all ISR domains necessitates the use of AI/ML algorithms where
humans and machines work together to process all this information. However,
one challenge in using AI/ML technology is the ability for decision makers to
trust the performance of the developed algorithms, which can only be gained
after long periods of test and development. This trust is further enhanced with
the algorithm’s demonstrated ability to detect drift, deception, and black swans.
On September 30, 2020, the deputy secretary of defense, Mr. David L.
Norquist, presented a DoD data strategy document that focuses on the need
to work with stakeholders in the operational domain and to “…treat data as a
weapon system and manage, secure, and use data for operational effect” [19].
Data needs to be:
• Accessible: Users should understand the content of the data and the con-
text in which it was taken;
• Linked: Users should understand the relationships between different
data elements;
• Trustworthy: Users should trust the data in making decisions;
• Interoperable: Users across all domains should possess a common under-
standing of the data;
• Secure: Users should have confidence that the data is only available to
authorized users.
To ensure that the data satisfies the abovementioned goals, the following
capabilities need to be developed:
Table 2.1
Typical Attack Submarine ISR Capabilities
ISR System Phenomenology Mission Examples
SONAR system Propagation of Detection, acquisition, Thales UMS-3000 (UK),
(active, passive) sound energy identification, and localization AN/BQQ-10 A-RCI (U.S.),
of acoustic emissions and SONARtech Atlas
AI&R (Germany)
Electronic warfare Propagation of Detection, acquisition, AN/BLQ-10 (V) (U.S.)
system, electronic radio frequency identification, and localization
support measures (RF) energy of RF emissions
(ESM)
Table 2.2
Classes of UUV, Their Nominal Levels of Performance, and ISR Applicability
Endurance Endurance
Diameter Displacement High Hotel Hotel Load Payload ISR
Class (inches) (lbs) Load (hours) (hours) (ft3) Application
Man- 3–9 <100 <10 10–20 <0.25 Special
portable purpose
LWV 12.75 ~500 10–20 20–40 1–3 Harbor
HWV 21 <3,000 20–50 40–80 4–6 Tactical
Large >36 ~20,000 100–300 >>400 15–30 with Persistent
external
stores
From: [23].
Principles of Operations from Seabed to Space 33
Table 2.3
Active and Passive SONAR Systems that Contribute to ISR
System Description Example
Surface ship A passive acoustic surveillance system towed U.S. Navy UQQ-2
surveillance towed from T-AGOS surface platforms. It provides passive
array sensor system detection of nuclear and diesel-electric powered
(SURTASS) submarines, and real-time reporting to theater
commanders and operational units [24].
Surface ship Active adjunct to the SURTASS SONAR system U.S. Navy WQT-2
SURTASS / low [26]. Also compact low-frequency active (CLFA) for
frequency active (LFA) SURTASS.
Surface and SONAR arrays (active and passive) mounted on ship Various
submarine hull- and subhull SONAR domes.
mounted arrays
Surface air-deployed Patrol aircraft drop short-lived (hours) SONAR AN/SSQ-36B, AN/
expendable buoys (active and passive) in grid patterns that SSQ-53G, AN/SSQ-
sonobuoys locate submarine (and surface ship) signatures and 62F [25]
transmit data back to the aircraft. The sonobuoy
deploys a cable-suspended hydrophone sensor.
Advanced multisensor units may employ e-field and
magnetic sensors.
Surface advanced Massive arrays of station-keeping and floating In development by
sensor grids sensors are networked and transmit processed Defense Advanced
reports when needed via satellite. Sensors collect Research Projects
environmental data (ocean temperature, sea state, Agency (DARPA)
and location) as well as acoustic activity data about Ocean of Things
vessels and aircraft. (OoT) [26]
Seabed fixed A network of hydrophone arrays mounted on the U.S. sound
surveillance system seafloor that provides to ashore centers threat surveillance system
(FSS) location information to provide an accurate (SOSUS), fixed
operational maritime picture of submarine and distributed system
surface traffic. (FDS), and FDS-
commercial (FDS-C)
Seabed advanced Rapidly deployable undersea surveillance system Lockheed ADS [27]
deployable system that uses distributed passive acoustic bottom
(ADS) mounted arrays wirelessly linked to an analysis and
reporting system to provide continuous acoustic
coverage over large areas of the ocean.
From: [28, 29].
34 Naval ISR Fusion Principles, Operations, and Technologies
Table 2.4
Typical Naval Airborne ISR Capabilities
Aircraft Class Description Example
Multi-intelligence Multi-intelligence mission employing radar, EP-3E Aries II (U.S.)
reconnaissance sonobuoys signals intelligence and other sensors
integrated with offboard systems
Maritime patrol Maritime missions, roles include search and rescue, P-8 Poseidon (U.S.),
antisurface, and antisubmarine missions Tupolev Tu-142 (RUS)
Fighter Multirole attack and fighter aircraft F-35 Lightning (U.S.),
Sukhoi Su-27 (RUS)
Electronic warfare Electronic attack mission with onboard signals EA-18G Growler (U.S.)
collection
Early warning and Airborne command and control, battle space E2-HawkEye (U.S.),
control management Beriev A-50 (RUS),
KL-2000 (PRK)
Rotary wing ASW, anti-surface warfare (SUW), and SH-60 Seahawk (U.S.)
electromagnetic warfare (EW), combat search and
rescue (CSAR), organic airborne mine countermeasure
(AMCM), and combat support missions
UAV Persistent maritime ISR MQ-4C Triton (Triton)
Small UAS Over-the-hill short range ISR RQ-11B Raven (U.S.)
High altitude and Manned and unmanned high-altitude platforms with U-2, Global Hawk [35]
endurance imaging radar, EO, and signals intelligence sensors
From: [33].
Principles of Operations from Seabed to Space 35
Figure 2.3 shows the different altitudes at which satellites orbit, along
with domains that are most useful for naval ISR.
The use of space for military operations began towards the end of World
War II when Germany used ballistic missiles to strike England [39]. With the
advancement of space capabilities and the decrease of their relative cost, space
capabilities now provide a major support to military forces around the globe.
This includes providing warnings against missile attacks, the ability to geolocate
and identify objects of interest, precise navigation, and tracking of adversary
activities. When satellites are launched into space, they are assigned a specific
task to achieve. Therefore, one can classify satellites based on their functions.
36 Naval ISR Fusion Principles, Operations, and Technologies
Table 2.5 provides a summary of the major categories and functions of satellites
along with a few examples [18, 19, 37].
The advancement of space-based capabilities is making it very challeng-
ing for nations and groups to hide their military operations from competing
nations. As a result, there are multiple threats associated with space [18, 38]:
Table 2.5
Major Satellite Functional Categories to Support Naval Missions
Satellite Functions Function Explanation
Communication Communication satellites allow for:
satellites ·· Voice communication;
·· Broadband internet;
·· Data transfer.
Positioning, Constellations of navigation satellites allow for the determination of
navigation, and timing location as well as time using global or regional satellite navigation
satellites systems.
Remote sensing Remote sensing satellites monitor the Earth to track resources that are
satellites essential to human wellbeing. This includes weather monitoring and
prediction, natural disaster damage assessment, animal migration, and
agricultural monitoring.
ISR satellites ISR satellites provide signal intelligence, imagery intelligence, and an
overall global situational awareness about an area of interest. There are
four types of ISR satellites:
·· Electro-optical imaging;
·· Radar imaging;
·· Signal intelligence;
·· Communication relay satellites.
Weapon delivery Satellites are used to track missiles and hypersonic weapons to ensure a
satellites fast and precise weapon delivery.
Search and rescue These satellites have the capability to detect and locate vessels, aircraft,
satellites and individuals when in dangerous situations or in remote places by
receiving beacon transmissions from a small transmitter.
Space sensors provide a broad view of the oceans, ports, and canals that
vessels traverse and provide the potential to contribute persistent monitoring
38 Naval ISR Fusion Principles, Operations, and Technologies
of individual vessels and fleets in blue water as well as the littorals. Space con-
stellations are groups of multiple satellites (similar or diverse) that operate as a
system to perform a designated mission, such as maritime surveillance. Naval
ISR requirements that are fulfilled by space constellations include:
Table 2.6
Representative Commercial Spaceborne Maritime Surveillance Systems
Capability Example System Constellation Parameters Sensor Parameters
SAR Radarsat ·· 3 SAR satellite vehicles ·· C-band;
Constellation ~600-km LEO; ·· High-resolution 1m × 3m
Mission [44] ·· 4-day exact revisit time; (spotlight mode);
·· 30-minute data latency from ·· Medium resolution ship
acquisition to delivery; detection mode resolution
·· 15 minutes of imaging time 50m × 50m; swath width
per orbit per satellite. 350 km.
IceEye [45] SAR ·· 18 SAR satellite vehicles ·· X-band;
(planned 2022) ~600 km LEO; ·· Resolution in modes strip =
·· 1- to 22-day revisit time 3m, spot = 1m, and scan =
depending on satellite and 15m.
target location.
Capella SAR ·· 36 SAR satellite vehicles ·· X-band;
(planned 2023) ~600 km LEO; ·· Highest resolution 50 cm.
·· 2- to 4-hour revisit time
depending on satellite and
target location.
Electro- MAXAR ·· 2 satellites; ·· High-resolution 30–50 cm
optical (EO) Worldview ·· 617-km LEO sun synchronous; optical imagery.
·· 2-day revisit.
Planet Skybox [46] ·· 15 satellites; ·· Color and near-infrared (NIR)
·· LEO. imagery;
·· 90-cm resolution.
Planet Dove [47] ·· 88 satellites; ·· Bayer-masked charged-
·· International Space Station couple device (CCD) camera;
orbit, sun synchronous. ·· Ground sampling distance
(Nadir) ranges between 2.7m
to 4.9m;
·· Spectral band: red, green,
blue, NIR;
·· 3m multispectral image
resolution.
RF signal ORBCOM (AIS) ·· >30 satellites; AIS receivers are aggregated
cooperative ·· LEO; sun synchronous evenly to provide continuous vessel
vessel tracking spaced vehicles. tracking via subscription
service
Spire (AIS; ADS-B) ·· >100 nanosatellite vehicles; SDRs for maritime AIS and
cooperative ·· LEO; 500-km sun aviation ADS-B tracking.
vessel tracking synchronous.
HawkEye 360 (RF) ·· >6 clusters of 3 formation- SDRs geolocate VHF marine
noncooperative flying satellites; radios, UHF push-to-talk radios,
geolocation of ·· LEO, 575 km. maritime radar systems, AIS
emitters beacons, and L-band satellite
devices.
Note: SDR is software defined radio; ADS-B is automatic dependent surveillance-broadcast.
that operates in the very high frequency (VHF) mobile maritime band.
The data provided by AIS is spatiotemporal data that consists of lati-
tude, longitude, course-over-ground, speed-over-ground, vessel identi-
fier number, navigational status, time stamp, and so on. AIS reporting
contributes to vessel tracking for MDA as well as for collision avoid-
ance, and search and rescue. AIS is a cooperative system that requires the
cooperation of vessels and therefore does not account for dark vessels.
Those are vessels that evade tracking by turning off the AIS transponder
or by providing incorrect ID codes or locations. Of course, maritime ra-
dars and other emitters on ships provide potential sources for detection
and location by RF constellations that use interferometric methods to
localize the emitter location [43].
3. The information layer: This is the layer that acts as persona part of cy-
berspace and includes examples from the internet, such as websites,
chats, emails, photos, documents, and apps. It represents individuals
and organizations, both real and fictitious. Without the previous two
layers, the information layer cannot function.
• Offers the ability to perform offensive operations, the ability to gain
information with high intelligence value by:
1. Attacking the cyberspace by performing actions or manipulations
that create noticeable denial effects;
2. Exploiting the cyber domain of adversaries to gain intelligence.
• Background and situation are the starting geopolitical and military (na-
val) events that drive the need for naval operations;
Principles of Operations from Seabed to Space 43
Table 2.7
The Categories of Naval Cyber Operations
Preparation and ISR Defensive Offensive
·· C-OPE; ·· Defensive counter cyber ·· Offensive cyberspace
·· Network ISR. (DCC); operations (OCO);
·· Proactive NetOps, defensive ·· Offensive counter cyber
countermeasures. (OCC).
·· Map target networks; ·· Follow established defense ·· Apply offensive tools, tactics,
·· Assess adversary cyber order policies, techniques, tactics, and procedures;
of battle; and procedures (TTPs); ·· Conduct offensive operations
·· Monitor threatening conduct operations to: as required under proper
activities; ·· Monitor and guard authorities;
·· Provide indications and processes to prevent and ·· Synchronize ashore-afloat
warning; delay attackers. cyber ops with other noncyber
·· Develop targeting ·· Report and restore cyber operations;
information, perform strategic incidents. ·· Perform effects assessment;
target development. ·· Establish persistent presence
as required on threat
networks.
From: [50].
terrain suitable for a military air strip enabling a strategic placement for air
surveillance and strike [52]. Green island nation has been the historical owner
of the islands and has been concerned about losing sovereignty over the chain
within its declared sovereign territorial waters.
This scenario takes place over a 4-day period. Red nation political rhetoric
and air reconnaissance over the first 2 days (days –2, –1) provide indications
and warnings (I&W) of potential Red nation intent to annex one or more of
the islands in the chain. This warning allows Blue forward presence naval forces
to move toward the area and to use air capabilities to deploy unattended subsur-
face and seabed sensors. The Blue Surface Action Group (SAG) is conducting
maritime security operations (MSO) and is immediately called to move toward
the crisis [53]. The Blue force may be called upon to conduct littoral operations
in a contested environment (LOCE) if nonkinetic operations cannot mitigate
the aggression. Commanders’ intents, based on strategic orders are:
• Red force commander’s intent: Swiftly position sufficient land forces and
weapons to secure two strategic islands (Kandigan A and Kandigan B)
before military, diplomatic, and regional pressures can dislodge the force
and require a retreat to port. Defend the landing forces with SUW by
denying defending forces access to the straits, and only resort to land-
based strategic antiship missiles as a last recourse.
• Blue force commander’s intent: Respond quickly to support treaty ally
and economic partner Green nation in repelling Red nation aggression.
Move to position and stall annexation landing operations by presenting
a military threat sufficient to allow regional political powers to force
Red nation to cease landings and return to base. Threaten long-range
counter-naval operations and the ability to perform expeditionary ad-
vanced base operations (EABO) if necessary, to blunt any attempted
annexation of the island chain [54]. (This intent requires immediate
ISRT to identify and track the Red SAG to prepare for surface action
and expeditionary landings if necessary.)
quire several hours to arrive at the straits, and in-range to conduct organic ISRT
and kinetic operations [55]. The Blue force of 10 vessels will remain distributed
across the straits and back into the blue water to avoid the Red force advantages:
numerical at-sea vessel superiority, seabed sensor networks to Red ashore C2
centers, likely ISR assets on the island chain, and land-based missile threats.
Order of Battle
Red and Blue have SAGs (temporary or standing organization of combat-
ant ships, other than carriers, tailored for a specific tactical mission) that are
equipped as compared in Table 2.8.
Scenario Progression
Over a 2-day period (days –2, –1) Red nation provides I&W of the Red nation
intent to annex one or more of the islands in the chain. Political rhetoric ratch-
eted up the accusations of Green nation’s over-fishing the straits and unfounded
territorial claims. This warning causes regional partnership nations to call on
Blue nation to prepare to move Blue forward presence naval forces toward the
straits.
The implication for ISRT activities is that the Blue SAG and supporting
Blue nation capabilities must rapidly move from peacetime intelligence prepa-
ration of the operating environment to surveillance-reconnaissance (Table 2.9).
This rapid shift requires the immediate refocus of space and other sources to the
Blue port, SAG platforms, and potential targets of the aggression. As the SAG
moves to the area of operations, it deploys organic ISR capabilities to focus on
the threatening SAG. Reconnaissance is performed by unmanned and manned
Table 2.8
Order of Battle
Red Naval Forces (Aggressors) Blue Naval Forces (Defenders)
Land Force: Land Force: None
3 batteries, medium range (400 km) tactical
antiship missiles.
·· 5 DDG guided missile destroyers (1 additional ·· 3 DDG guided missile destroyers in SAG, 1
in reserve in port); Helo each;
·· 4 landing ships with 3 Helo each, and small ·· 2 expeditionary sea base ships with EABO
vessels (2 in reserve in port); marine battalion, 4 Helo, and small vessels;
·· 2 FFG-guided missile frigate; ·· 2 FFG-guided missile frigate;
·· 3 aux support ships; ·· 2 auxiliary support ships;
·· 2 tactical attack submarines. ·· 1 tactical attack submarine.
Air Capability: Air Capability:
·· 12 long-range patrol aircraft with antiship ·· 5 UAV reconnaissance drones (long range);
missiles. ·· 12 UAV reconnaissance drones (short range).
Principles of Operations from Seabed to Space 47
Table 2.9
Activities Across the Phases of ISRT Operations
ISRT JIPOE Situation Surveil
Phase Intelligence Awareness Recon Targeting Fire Control
Cyber Cyber monitoring and initiate target access Coordinated cyber node attack
Space Orchestrate for aggregate Focus Focus on Support
coverage per maritime collection orchestration
target coordinated fires
priorities on combatants
priorities
Air Normal fleet coordination of manned and Coordinated Coordinated air-
unmanned sensor assets; air-surface surface fires
Surface Adapt deployed sensors, relay comms, to target
predicted threats, threat axis. tracking
nomination
Subsurface Coordinate manned, unmanned, and relay comms ASW and SUW operations
for sensing, maneuvering
Seabed Monitor-report early precursor Focus seabed Issue and relay commands
adversary activities sensors; move to enable sensors and target
deep UUVs to mines, torpedoes
position
DAYS → HOURS → MINUTES
1. Exploit commercial and national space imagery to locate the Red SAG
force; identify ships moved from port and hull numbers. Prepare for
the challenge of tracking, losing, and re-acquiring the SAG as it moves
across dense commercial ship lanes to its targets. Task commercial
SAR satellites to collect on areas that traverse the shipping lanes.
48 Naval ISR Fusion Principles, Operations, and Technologies
Table 2.10
Day 1 Actions
Period Red Actions Blue ISRT Actions
0000–0600 Order to execute plan KANDIGAN Receive ISR report—Red assembling SAG;
45; Monitor ISR reporting, plan organic ISR upon
Move ships from port; assemble arrival.
SAG to move.
0600–1200 Begin movement to target islands; Monitor cyber (social media) and EW channels;
Initiate EMCON (emission control); Heighten cyber alert status to prosecute and
Disable AIS transponders. respond to potential Red cyber incidents or
events;
Launch organic UAV ISR to monitor Red SAG.
1200–1800 Arrive and loiter 10 km off-islands: Arrive in standoff position 40 km off islands;
·· Issue warnings via radio and Monitor cyber and EW Channels, jam selected
social media. comm. channels, and coordinate with ashore
SAG ready to make land at 2400. cyber operators.
1800–2400 Stand by to move to 3 km for Maneuver to demonstrate ready-for-surface
landing ships; engagement;
Insert special landing recon Launch UAV aircraft to monitor Red landing
personnel; activities with IR night vision full motion video
Await 1200 attack orders. sensors.
Blue due to political blowback; its objective is to quickly complete and secure
its landing mission before Blue can disrupt the operation.)
Day 2. Through the night of day 2 (Table 2.11), Blue forces maneuver to
increase their ISR footprint and defensive posture, Blue submarine and UUVs
are maneuvered to detect and hunt the Red submarine threat. Red forces initi-
ate landing operations for A and B at 0530 with the objective of securing the
two islands by 1500 to enable a Red press conference announcing annexation of
“Restored National Lands to Protect Fishing” by 1600. At 0730, Red initiates a
social media campaign propagating the meme that Green mainland fishermen
have stepped up the harassment of the fishing villages of “Red National Lands
on the Islands.” The message is picked up and propagated by Red regional
news sources for morning news reports. By 1000, the situation escalates as Red
landing forces are headed ashore, but are hampered by precision electronic war-
fare jamming of their communication network and cyber disruption of their
afloat networks. Blue has maneuvered DDGs to coordinate unmanned air, sur-
face, and subsurface vehicles while poising a potential threat to Red DDGs by
long-range cooperative engagement if necessary. Blue increases cyber and EW
activities to slow the C2 of the landing effort and feigning the landing of the
EABO Marine battalion by helicopter and small vessels on island B to cause
Red to consider implications of a regional conflict. By 1300, the landing is only
Table 2.11
Day 2 Actions
Period Red Actions Blue ISRT Actions
0000–0600 Initiate landing on schedule; Maneuver DDGs to coordinate unmanned
Track Blue force maneuvering. air, surface, and subsurface vehicles;
Prepare for long-range cooperative
engagement of Red DDGs if necessary;
Increase cyber and EW denial, disruption
activities.
0600–1200 Provide C2 for landing, supply, and Feign the landing of the EABO Marine
defensive support DDG vessels; battalion by helicopter and small vessels
Incur stiff jamming environment and on island B;
reduced comms. Receive approval to expand offensive
cyber actions against Red port facilities
and Red patrol aircraft.
1200–1800 C2 unable to fully coordinate and monitor Reduce active engagement of cyber and
forces; RF channels to monitor withdrawal.
C2 detect imminent Blue marine force
arrival;
Withdraw forces.
1800–2400 Continue disinformation campaign that Maintain unmanned vehicles on station
Red forces protected island fishermen to provide ISR of Red forces returning
from Green harassment, while Blue to port;
forces carelessly aggravated the Monitor social media information
situation by threatening Coast Guard campaigns and measure effectiveness.
operations.
50 Naval ISR Fusion Principles, Operations, and Technologies
Scenario Conclusion
This contrived scenario provides a basic insight into the large number of vari-
ables, the range of alternatives, and the complexity of choosing naval tactics and
applying ISRT to achieve operational objectives. The role of ISRT is shown to
be a critical component to enable maritime awareness, insightful choice of op-
Principles of Operations from Seabed to Space 51
Endnotes
[1] Feng, W., Y. Li, X. Yang, Z. Yan, and L. Chen, “Blockchain-Based Data Transmission
Control for Tactical Data Link,” Digital Communications and Networks, 2020.
[2] Eyer, K., and S. McJessy, “Operationalizing Distributed Maritime Operations,” March 5,
2019, https://cimsec.org/operationalizing-distributed-maritime-operations/.
[3] Richardson, J. M., “A Design for Maintaining Maritime Superiority,” Naval War College
Review, Vol. 69, 2016.
[4] Popa, C. H., et al., “Distributed Maritime Operations and Unmanned Systems Tactical
Employment,” Monterey, CA, 2018.
[5] Mattis, J., “Summary of the 2018 National Defense Strategy of the United States of Amer-
ica,” 2018.
[6] Larter, D. B., “Jim Mattis’ ‘Dynamic Force Employment’ Concept Just Got Real for the US
Navy,” Defense News, July 16, 2018, https://www.defensenews.com/naval/2018/07/16/
jim-mattis-dynamic-force-employment-just-got-real-for-the-us-navy/.
[7] Article 1(a) of the IMO Convention. For the IMO Focus on security, see https://www.
imo.org/en/OurWork/Security/Pages/Default.aspx.
[8] https://mc.nato.int/.
[9] https://www.nato.int/cps/en/natohq/topics_88745.htm.
[10] https://www.dst.defence.gov.au/.
[11] “National Plan to Achieve Maritime Domain Awareness, The National Strategy for
Maritime Security,” U.S. Coast Guard, 2005.
[12] Nimmich, J. L., and D. A. Goward, “Maritime Domain Awareness: The Key to Maritime
Security,” International Law Studies, Vol. 83, 2007.
[13] Bueger, C., and T. Edmunds, “Beyond Seablindness: A New Agenda for Maritime Security
Studies,” International Affairs, Vol. 93, No. 6, 2017.
[14] U.S. Government, “Joint Publication 2-0 Joint Intelligence,” 2013, Figure I-3. The
Intelligence Process, p. I-6.
[15] Brown, J., “Strategy for Intelligence, Surveillance, and Reconnaissance,” Air University
Press, 2014.
[16] Smagh, N. S., “Intelligence, Surveillance, and Reconnaissance Design for Great Power
Competition, Congressional Research Service,” Congressional Research Service, 2020.
[17] Hoehn, J. R., and N. S. Smagh, “Intelligence, Surveillance, and Reconnaissance Design
for Great Power Competition,” Congressional Research Service, June 4, 2020, p. 17,
https://crsreports.congress.gov/.
52 Naval ISR Fusion Principles, Operations, and Technologies
[40] Van Etten, A., “Object Detection in Satellite Imagery, a Low Overhead Approach, Part
I,” August 30, 2016, https://medium.com/the-downlinq/object-detection-in-satellite-
imagery-a-low-overhead-approach-part-i-cbd96154a1b7.
[41] Millhouse, P., “Next-Gen Persistent Maritime Security with Commercial Space Assets,”
WEST 2020, March 2, 2020.
[42] The AIS is a maritime ship identification and location system that was mandated in
December 2004 by the IMO. All commercial vessels that travel in international waters
are required to transmit ship identification and location (derived from GPS) that can
be received by AIS receivers ashore, on other ships, or from satellites. AIS transponders
broadcast messages at regular intervals over two designated VHF channels.
[43] HawkEye typical geolocation performance for a trio of satellites varies between 0.1 to 0.2
km depending on satellite-to-target geometry at the time of measurement. The geolocation
is provided by: (1) Measuring and comparing time-of-arrival (TOA) and frequency-of-
arrival (FOA) of a signal between 2 or all 3 satellite receivers, (2) using GPS to maintain
precise estimates for the position and velocity of the spacecraft and their receive, and (3)
performing multilateration to estimate the signal emitter location. See Sarda, K., N. Roth,
R. E. Zee, Dan CaJacob, Nathan G. Orr, “Making the Invisible Visible: Precision RF-
Emitter Geolocation from Space by the HawkEye 360 Pathfinder Mission,” Proc. 32nd
Annual AIAA/USU Conference on Small Satellites, Paper SSC18-II-06, 2018.
[44] https://www.asc-csa.gc.ca/eng/satellites/radarsat/technical-features/radarsat-comparison.
asp.
[45] https://www.iceye.com/hubfs/Downloadables/ICEYE_SAR_Product_Guide_2021_
V4.0.pdf.
[46] https://www.newspace.im/constellations/planet-skybox.
[47] https://www.satimagingcorp.com/satellite-sensors/other-satellite-sensors/dove-3m/.
[48] “The National Military Strategy for Cyberspace Operations,” U.S. Government, 2006.
[49] Thiele, R. D., “Game Changer – Cyber Security in the Naval Domain,” ISPSW Strategy
Series: Focus on Defense and International Security, No. 530, 2018.
[50] Based on Joint Chiefs of Staff, Joint Terminology for Cyberspace Operations Memorandum,
Attachment 1 Cyberspace Operations Lexicon, November 2010.
[51] Joint Publication 3-32 Joint Maritime Operations, June 8, 2018, validated on
December 16, 2020.
[52] In naval tactics, a strategically placed island can be considered to be an unsinkable carrier
that provides maritime power projection from a hardened location. See Hughes, W. P., Jr.,
and R. P. Girrier, Fleet Tactics and Naval Operations, Third Edition, U.S. Naval Institute
Press, 2018.
[53] MSO are operations to protect maritime sovereignty and resources and to counter
maritime-related terrorism, weapons proliferation, transnational crime, piracy,
environmental destruction, and illegal seaborne migration.
[54] “Expeditionary Advanced Base Operations (EABO) Handbook Considerations for Force
Development and Employment,” Marine Corps Warfighting Lab, Concepts & Plans
Division, June 1, 2018.
54 Naval ISR Fusion Principles, Operations, and Technologies
[55] Cruise ships can traverse 10 km (at about 30 knots) in 10 minutes; it is reasonable for the
Blue fleet to traverse 100 km within several hours to arrive on station.
3
Distributed Maritime Operations
The concept of distributing naval forces is relatively new because the fleet has
traditionally spaced surface assets to provide massed defense while enabling pre-
cisely coordinated attacks. The entire subject of naval tactics (the techniques
of action) is focused on protecting the fleet while enabling it to effect decisive
strikes. Esteemed naval tacticians, Captain Wayne Hughes (USN Ret.) and
coauthor Rear Admiral (RADM) Robert Girrier (USN Ret.) have cautioned:
“Today, missiles of various ranges and homing characteristics can be placed in
manned and unmanned ships and aircraft at a relatively low cost. With the
onset of information warfare concepts, this looks like the beginning of a lasting
change in naval warfare” [1].
Indeed, DMO introduces the wide distribution of forces, the arming of
every vessel, the introduction of weapons on unmanned vessels (surface and
subsurface) and aircraft, and a lasting change in naval warfare. With new na-
val concepts come new tactics, technologies, and operations that offer oppor-
tunities and risks that must be addressed. DMO introduces a drastic shift in
operations and tactics, and an increased dependence on technologies: sensors,
networks, computation, and decision support.
In this chapter, we introduce the tactical considerations for distributing
operations and the implications for C2ISR architecture and battle management.
In subsequent chapters we detail the technology considerations to provide the
ISR capabilities necessary for DMO.
55
56 Naval ISR Fusion Principles, Operations, and Technologies
Enhanced surface ship lethality would allow smaller ships such as cruisers,
destroyers, and littoral combat ships to operate in hunter/killer SAGs that
could function autonomously, screen larger formations, and/or hold land
targets and sea lanes of communication/commerce at risk. To succeed,
it is imperative to distribute anti-air, ASW, and ant-surface fires. Future
weapons such as long range ASW weapons, rail guns, and new classes of
missiles may be needed to realize this level of lethality [11].
A future in which the Navy’s tactical grid would one day be understood
as, simply put, an agnostic network of weapons and sensors, controllable
by any number of nodes, and without regard to where those weapons or
sensors or controlling nodes might be deployed or even in which unit
they existed. In the future, if an inbound threat were to be detected, this
agnostic, dispersed grid would determine which sensor(s) would be most
appropriate, and then, when necessary, the system would pair the most
capable and best located weapon with that sensor(s) in order to efficiently
engage the threat [16].
…The offence might use a mix of crewed and uncrewed vessels. One
option is to use three ship types: a large, well-defended crewed ship that
carries considerable numbers of various types of long-range missiles but
which remains remote to the high-threat areas; a smaller crewed warship
pushed forward into the area where adversary ships are believed to be both
for reconnaissance and to provide targeting for the larger ship’s long-range
missiles; and an uncrewed stealthy ship operating still further forward in the
highest risk area primarily collecting crucial time-sensitive intelligence and
passing this back through the smaller crewed warship onto the larger ship
in the rear… An alternative concept is to have a large crewed vessel at the
center of a networked constellation of small and medium-sized uncrewed
air, surface and subsurface systems. A large ship offers potential advantages
in being able to incorporate advanced power generation to support
emerging defensive systems like high energy lasers or rail guns. In this, the
large crewed ship would need good survivability features, suitable defensive
systems, an excellent command and control system to operate its multitude
of diverse uncrewed systems and a high bandwidth communication system
linking back to shore-based facilities and data storage services [19].
tems. The next major evolution was the Aegis system, which matured through
the 1970s and allowed coordination of all of an Aegis-capable battle groups
weapon systems. Aegis originally was envisioned as a defensive system coordi-
nating disparate weapons systems such as the Phalanx® close in weapon system
(CIWS)—a 20-mm gatling gun for short-range missile defense—and the Mk-
41 vertical launch system (VLS) capable of deploying a variety of missiles for
self-defense and strike. The primary sensor for Aegis is the AN/SPY-1 radar
which is capable of search, track, and midcourse missile guidance functions but
other short-range sensors and terminal guidance radars are integrated as well.
The latest evolution, made publicly known in the early 1990s, is the CEC,
which allows for sensors to share raw data, as opposed to high-level symbolic
information about the situation. This allows for a combatant vessel to view
another vessel’s radar as its own and develop actual targeting solutions for its
weapon system based on the other vessel’s sensor feed [16].
DMO would take CEC a step further and would leverage AI to imple-
ment decision nodes that are tightly coupled and support high-level human
decision making in the presence of the chaos of battle. The AI could provide de-
cision support logic to determine which vessels were in the best position to fire
upon an enemy, what weapons they should employ, and which sensors should
support the engagement. At the same time, defensive decisions will also be
made, such as which vessels are at risk of attack and what countermeasures they
should employ. Georeferenced data, automated situation recognition, machine
learned detection of activities, knowledge of observed and models of antici-
pated adversary TTPs, may all be employed to recognize threatening behaviors
[21]. Using this prior knowledge and applying multisensor fusion analysis can
all be processed within the DMO context to provide decision support by AI at
speeds far greater than humans alone could accomplish. The resulting decision
superiority (timely and effective decision making) is a critical combat multiplier
in the DMO paradigm.
The various nodes to be integrated into the tactical grid include not only
the traditional set of sensors and weapons that already exist in the fleet, but
also the emerging technologies, platforms, and weapon systems that will enable
DMO [22]. This could include USVs of various types, such as large USVs that
serve as weapons platforms, perhaps deploying the proposed long-range anti-
ship missile (LRASM), and medium-sized USVs that would function primarily
as sensor platforms.
Unmanned air platforms will also be key nodes in DMO. The MQ-8B
Firehawk can be deployed from a variety of ships since it requires only a small
helipad to launch. Having trained operators and maintenance personnel is still
necessary, however. The MQ-8B Firehawk can serve as both a sensor and a weap-
ons system. Firehawk is equipped with an RDR-1700B X-band radar capable
of all-weather search and targeting and can share that targeting information
62 Naval ISR Fusion Principles, Operations, and Technologies
• Surface warfare;
• Air and missile defense;
• Antisubmarine warfare;
• Mine warfare;
• Strike warfare;
• Amphibious operations.
as a battle force manager (BFM) [16]. The entire BFM functionality would
need to be replicated on each ship that would be capable of assuming the mari-
time operational commander (MOC) role. BFM capabilities would include at
a minimum:
1. In this case, Red nation will attack the approaching Blue naval fleet
with hypersonic glide missiles from two ground batteries located on
the coast. The flight time of these Mach 7 missiles is less than 5 min-
utes from coastal launch to the Blue fleet 350 km away.
2. In this agnostic grid, the launch is detected by multiple, mutually re-
inforcing methods, including (1) a constellation of IR sensing satel-
lites and (2) a constellation of relay satellites that relay the IR signature
Distributed Maritime Operations
65
of missiles to the fleet and to other satellites to enable rapid missile ac-
quisition, handoff between satellites, and enable the fleet to establish
a track. The sensing satellites coordinate a combination of wide and
medium field-of-view sensors to detect, track, and then handoff track
custody to close-in defensive weapon systems in the Blue fleet [33].
3. The Blue fleet shipboard phased array radars are automatically changed
to maximize its tracking capability. As more sensors are automatically
brought to bear, a precise track, including origin and aim point, is
generated.
4. At the same time, decisions are made at the strategic and operation-
al levels, decisions dramatically aided by the application of artificial
intelligence: Is the threat real? What asset(s) are under threat? What
hard- and soft-kill techniques and systems are best employed? What
systems are both in position and possess the capability and capacity
necessary for engagement? What is the optimal engagement timeline?
What additional sensors should be brought to bear, and when? Jam-
ming? Chaff? Decoys? From whom and when? Who shoots? When do
they shoot? What ordinance do they shoot? How many rounds?
5. Orders are automatically issued to concerned units, yet the entire
network, including other decision nodes, remains fully cognizant of
the larger picture. The battle management system has built-in redun-
dancies so that if one node is destroyed, another automatically and
seamlessly steps in. All of these decisions can be automated, if desired,
in order to maximize speed and the optimal response, provided that
commanders allow for that automation.
Ultimately, only the necessary and best systems are matched to the threat,
at only the right time, maximizing effect and minimizing the waste of lim-
ited resources. The most effective and efficient method of engagement becomes
routine.
Note the diversity of sensors implied, in type and capability, their disper-
sion, their seamless integration, and the orchestration provided by AI-enabled
decision support agents that can reason on timelines appropriate for the find,
fix, and finish process necessary to defeat a sophisticated threat. Also of note, is
the resilience that is offered by DMO-enabled forces, in particular their seam-
less integration. In the event one node is destroyed, other nodes with an identi-
cal operational picture and firing solution readily step in.
Distributed Maritime Operations 67
Endnotes
[1] Hughes, W. and R. Girrier, Fleet Tactics and Naval Operations, Annapolis, MD: Naval
Institute Press, 2018, p. 132.
[2] “U.S. Ship Force Levels,” Naval History and Heritage Command, https://www.history.
navy.mil/research/histories/ship-histories/us-ship-force-levels.html
[3] Cancian, M., “Stormy Waters Ahead for Amphibious Shipbuilding Plan,” July 1, 2021, https://
breakingdefense.com/2021/07/stormy-waters-ahead-for-amphibious-shipbuilding-plan/.
[4] Torvold, W. D., Defending the Aircraft Carrier: Doctrine and Technology for Survival. New-
port, RI: Naval War College, 2000.
[5] Isenberg, D., “Cato Institute Policy Analysis No. 134: The Illusion of Power: Aircraft Car-
riers and US Military Strategy,” 1990.
[6] Grant, R., “The Carrier Myth,” Air Force Magazine, Vol. 82, Issue 3, 1999.
[7] Richardson, J. M., “A Design for Maintaining Maritime Superiority. Version 1.0.,” Chief
of Naval Operations Washington United States, 2016.
[8] O’Rourke, R., “Navy Force Structure and Shipbuilding Plans: Issues for Congress,” Con-
gressional Research Service Report 19, 2018.
[9] Richardson, J. M., “A Design for Maintaining Maritime Superiority,” Washington D.C.:
U.S. Navy, 2018.
[10] Jensen, B., “Distributed Maritime Operations: Back to the Future?” April 9, 2015, https://
warontherocks.com/2015/04/distributed-maritime-operations-an-emerging-paradigm/.
[11] Rowden, T., P. Gumataotao, and P. Fanta, “Distributed Lethality,” Proceedings Magazine
Vol. 141, No. 1, 2015, 1343.
[12] Gilday, M., CNO NAVPLAN, Washington, D.C.: United States Navy, 2021.
[13] Freedberg, S. J., “‘If It Floats, It Fights’: Navy Seeks ‘Distributed Lethality’,” Retrieved from
Breaking Defense, January 14, 2015: https://breakingdefense.com/2015/01/if-it-floats-it-
fights-navy-seeks-distributed-lethality/.
[14] Hughes, W. P., Fleet Tactics and Coastal Combat, Annapolis, MD: Naval Institute Press,
1999.
[15] Braithwaite, K. J., “Advantage at Sea Prevailing with Integrated All-Domain Naval Power,”
Washington D.C.: Department of the Navy, 2020.
[16] Eyer, K., and S. McJessy, “Operationalizing Distributed Maritime Operations,” Center
for International Maritime Security, 2019, http://cimsec.org/operationalizing-distributed-
maritime-operations/39831.
[17] Jensen, B., “Distributed Maritime Operations: Back to the Future?,” War on the
Rocks, 2015, https://warontherocks.com/2015/04/distributed-maritime-operations-an-
emerging-paradigm/.
[18] Wilson, G. I., “The ‘Manuever Warfare’ Concept,” Gazette Magazine, Marine Corps
Association, July 17, 2019, https://mca-marines.org/blog/gazette/the-maneuver-warfare-
concept/.
68 Naval ISR Fusion Principles, Operations, and Technologies
[19] Layton, P., “Fighting Artificial Intelligence Battles: Operational Concepts for Future AI-
Enabled Wars,” 2021.
[20] Williamson, W., “From Battleship to Chess,” U.S. Naval Institute Proceedings, July 2020,
Vol. 146, No. 7, https://www.usni.org/magazines/proceedings/2020/july/battleship-chess.
[21] TTPs refer to three categories of adversary behaviors:
Tactics: The employment and ordered arrangement of forces in relation to each other;
Techniques: Nonprescriptive ways or methods used to perform missions, functions, or
tasks;
Procedures: Standard, detailed steps that prescribe how to perform specific tasks.
[22] 2019 Surface Navy Symposium in Washington D.C.
[23] “Fire Scout Unmanned Aircraft System,” https://www.northropgrumman.com/what-we-
do/air/fire-scout/.
[24] ScanEagle, https://www.boeing.com/defense/autonomous-systems/scaneagle/index.page.
[25] Erwin, S., “Space Force Finalizing Plan to Procure Broadband from Low-Orbit
Satellites,” March 27, 2021, https://spacenews.com/space-force-finalizing-plan-to-
procure-broadband-from-low-orbit-satellites/.
[26] Hitchens, T., “Griffin: DoD Can’t Rely on Commercial Satellite Communications,”
December 3, 2019, https://breakingdefense.com/2019/12/griffin-dod-cant-rely-on-
commercial-satellite-communications/.
[27] Miller, A., “Powered by Satellite, Link 16 Military Radio Set to Get a Huge Boost,”
June 27, 2019, https://www.viasat.com/about/newsroom/blog/xvi/.
[28] Carr, D. F., “Communications Relay Grows with Expansion of UAV Missions,”
August 3, 2009, https://defensesystems.com/articles/2009/07/29/c4isr-1-uav-relay.aspx.
[29] “Unmanned Multirotor Aerial Relay (UMAR),” https://www.dragonflypictures.com/
products/umar-tethered-uas/.
[30] Joint Publication 3-32, Joint Maritime Operations, June 8, 2018.
[31] Rowden, T. S., “Surface Force Strategy: Return to Sea Control,” San Diego, CA: Naval
Surface Force Pacific Fleet, 2016.
[32] Swift, S., “Master the Art of Command and Control,” Proceedings of the U.S. Naval Institute,
Vol. 144/2/1,380, February 2018, https://www.usni.org/magazines/proceedings/2018/
february/master-art-command-and-control.
[33] This is based on the U.S. Space Development Agency constellation concept. See
Erwin, S., “The Pentagon’s Hyperfocus on Hypersonic Missile Threat,” Space News,
August 25, 2012, https://spacenews.com/the-pentagons-hyperfocus-on-hypersonic-
missile-threat/.
4
Naval Information Fusion Systems
Navies have traditionally partitioned sensor systems into stovepipes in the mis-
sion areas of air warfare, surface warfare, antisubmarine warfare, electronic war-
fare, and missile defense. Despite the criticisms of stovepipes, this approach
simplified acquisition of independent systems and enabled development and
procurement to be focused on mission effectiveness in each area. TDLs inter-
connected these systems to the Combat Information Center (CIC), and the
CIC to shooters (weapon systems) to engage targets. Integration of information
from each mission area occurred at the centralized CIC and a common operat-
ing picture could be distributed to all participants that had access via TDLs or
broader satellite communications.
This portioning made sense and has been efficient to perform any auto-
mated fusion of sensor data just within, but not across, these mission domains.
These functions merged their respective information about threats (objects,
tracks, events, and activities) in the CIC where the commander and staff ap-
plied the current context to understand the situation presented to them.
The desire to perform all-domain sensing brings the need to expand the
domain coverage, increase the speed of sensing and fusion, and cause ISR to de-
liver targeting-quality information is a new factor driving significantly expand-
ed automation. We now use the term ISRT to refer to this close integration of
ISR to C2 and targeting. The desire for increased networking, NCW, and joint
all-domain ISR-C2, requires even greater integration of systems.
In this chapter, we examine a baseline of the current categories of naval
sensing and fusion systems and information integration to perform joint ISR
and C2, using, as an example, general U.S. naval systems that are representative
of advanced international systems. We also introduce the computing and net-
working concepts and technologies that are enablers to extend the integration
69
70 Naval ISR Fusion Principles, Operations, and Technologies
Table 4.1
Elements of the Naval Information Enterprise
Afloat Ashore
·· Task force command; ·· National command centers;
·· Strike group command(s); ·· Intelligence centers (national, services);
·· Organic sensors (seabed-to-air); ·· Naval fleet commands;
·· Organic TDLs (seabed-to-air); ·· Space sensing systems;
·· Space communication links. ·· Space communication, navigation centers;
·· Meteorological and oceanographic systems (METOC) centers.
Naval Information Fusion Systems 71
Table 4.2
Major Categories of ISR and Information Operations (IO) Sensing,
Processing, and Exploitation Subsystems
Comparable USN
ISR Areas ISR Subsystems Capabilities Systems
ISR Enterprise Common computing environment with service-oriented Consolidated afloat
architecture to enable ISR and C2 services to share networks and
information, maintain a common understanding of the enterprise devices
battlespace, and coordinate sensing across all services. (CANES), integrated
shipboard network
system (ISNS)
Maritime domain ISR aggregating, correlating, and fusing all source Defense common,
awareness intelligence in real-time and near real-time processing ground system
(combat analysis for tracking, targeting, and exploitation. DCGS-N
capability all Coordination of both afloat and ashore elements.
source data)
Maritime domain Visualize vessel positions and tracks on a map SeaVision data,
awareness (terrestrial and satellite AIS, coastal radar, and satellite fusion service
(unclassified imagery based positions in time (POSITS)). Complex
for commercial searches, alerting, and vessel risk scoring. Multiple
vessels) source correlation.
Air surveillance Detect and visualize air tracks (commercial, combat) AEGIS Combat
and air defense from all sources (radar, IFF, and AIS) and identify tracks; System; surface
designate for challenges and engagement. search radar systems
Detect and track surface vessels and identify tracks;
designate tracks for engagement.
Missile defense Detect and track ballistic missiles near midcourse (post- AEGIS Ballistic
boost and pre-reentry) to relay track data to land-based Missile Defense
interceptors or to engage with ship based terminal System
phase interceptor missiles.
Signals Signals intelligence sensing and emitter location Ships signal
intelligence/ and identification, apply electronic disruption, denial, exploitation
electronic exploitation, deception, and attack mechanisms. equipment (SSEE)
warfare/ Monitor adversary IO activities (MILCOMM, broadcast,
information social media, etc.) and issue approved IO responses.
operations
Antisubmarine Perform surveillance, search, detection, track, and Undersea warfare-
warfare (ASW) localization of submarines for attack. Systems can be decision support
and seabed deployed on or from individual platforms (surface, air, system (USW-DSS)
warfare underwater, space) and ASW operations are carried out
by individuals or coordinated groups of platforms.
Cyber and Protect cyberspace and the electromagnetic spectrum CANES SIEM
network defense from adversary attack, detect attacks, locate threat(security information
vectors, respond, and mitigate effects. and event
management)
Meteorological Acquire, analyze, and predict the elements of the Global command and
and physical environment that affect naval warfare, acquire, control system-
oceanographic analyze, and predict the elements of the physical maritime (GCCS-M)
systems (METOC) environment that affect naval warfare.
72 Naval ISR Fusion Principles, Operations, and Technologies
Information Environment
A robust and secure network infrastructure, from seabed-to-space, is required to
realize comprehensive ISR across distributed maritime assets. In the U.S. DoD
this is referred to as the global information grid (GIG), then the DoD informa-
tion network (DoDIN) and more recently has been referred to as a component
of DoD cyberspace in Joint Publication 3-12, Cyberspace Operations, June 8,
2018. The network is formally defined as:
• The information itself (e.g., sensor data, processed data, fused intelli-
gence, sensor, and process management data);
• The processes associated with managing information to accomplish the
mission and functions (e.g., ISR sensor processing, sensor management,
fusion, visualization);
• Activities related to designing, building, populating, acquiring, manag-
ing, operating, protecting, and defending the information enterprise;
• Related information resources such as personnel, funds, equipment, and
IT, including internal use software and national security systems.
Service-Oriented Architecture
In modern navies, the evolution of such enterprise-level ISR systems has re-
sulted in the adoption of service-oriented architecture (SOA). With a SOA, the
Table 4.3
Main Features and Benefits of SOA
Features Characteristics and Benefits to ISR Processing Workflows
Service ·· Service provision provided by a federation of common resources;
·· Services enable improved information flow in distributed computing environment;
·· Ability to expose internal functionality;
·· Workflow flexibility as one process of an ISR workflow may be executed in
resource (Service A) while another process may be executed in a different one
(Service B).
Service reuse ·· Lower software development and management cost as common services are
reused by many workflows;
·· Commercial service providers act in an open market by advertising their services;
end users select providers based on their offerings.
Service ·· Ability to develop and integrate new ISR functional capabilities rapidly by
composition defining new service sequences using a set of exiting services.
Service ·· Ability to optimize performance, functionality, and cost by a simpler introduction
discovery of system upgrades (new services).
Service ·· Services communicate by message passing and are therefore loosely coupled
interaction (operating systems and programming languages are hidden to other services);
·· Loosely couple interaction provides flexibility, replaceability, scalability, risk
mitigation, and fault tolerance;
·· Web services provide a messaging between distributed software services using
a common platform and language independent standards (e.g., HTTP, Web
Services Definition Language (WSDL), Simple Object Access Protocol (SOAP), and
Extensible Markup Language (XML)) [6].
Asset ·· Services can integrate (wrap) existing code assets to apply legacy functionality.
wrapping
Message ·· Performance measurement measured by message efficiency;
monitoring ·· Security attack detection can be performed by message activity monitoring.
Message ·· Message management policy can control message throughput, routing;
control ·· Application of security policy can prevent message attacks and provide data
confidentiality and integrity.
Virtualization ·· Improved reliability by implementing services in virtual machines (VMs);
·· Ability to scale operations to meet different demand levels.
Naval Information Fusion Systems 75
Table 4.4
Key Commander’s Questions at Three JDL Levels
All-Domain Situation and
Warfare Object (Target) Domain Situation Threat Assessment (JDL L2
Domain Refinement (JDL L1) Assessment (JDL L2) and L3)
Space ·· Commercial and ·· Which Blue force Threat:
adversary overhead vessels may be ·· What access does Red have
tracks and next observable by Red? to space assets (commercial,
observations ·· What is the maritime allied partners, national
windows (EO, IR, RF); coverage of space technical capabilities) that
·· Blue critical Comm. assets by Blue? expose Blue operations?
and nav. space ·· Are Blue space assets What are the limitations of
assets; at-risk, and what would Red space access?
·· Adversary counter- be the impact? ·· What comms are red
space assets (land dependent on for space ISR?
and space) [8].
Air ·· Aircraft at Red ·· What is the Red air All-domain situation:
military airfields and force composition, ·· What is the Red COA?
use of commercial readiness, and ·· What is the timing of the
airfields; operations? COA and what are their
·· Red military aircraft ·· What are potential critical decision points, their
tracks; red air operations and vulnerabilities to achieving
·· Potential supporting abilities to support objectives?
air tracks. maritime COAs? ·· Does ISR support and
describe the range of
anticipated COAs?
All-domain threat:
·· Is there a coordinated
offensive?
·· When will they likely attack?
·· Where is the deception?
·· Which domain is at the
greatest risk?
·· Is the air and surface
maneuver coordinated for
a first-strike engagement
window?
·· Are the media and military
operations coordinated?
To what end? How can the
public media influence be
countered?
·· Why is the cyber-attack
occurring now? What is the
timeline?
·· What do all domains of
activities tell us about the
COA?
Human/ ·· Locate major ashore ·· Is Red exploiting media
social media influencers to influence Green
and sources of public public; how?
opinion. ·· What are the main
channels used?
Naval Information Fusion Systems 77
• Ashore nodes include networked MOCs, big data centers, major analyt-
ic centers, and METOC centers. These nodes communicate to deployed
afloat naval units via satellite communications. The nodes interface with
the U.S. Intelligence Community collection sources by the ashore fa-
cilities. The Primary Ocean Prediction System (POPS) combines world-
wide METOC data to provide weather prediction and environmental
models to deployed fleets.
• Afloat fully capable nodes provide afloat force units with an organic
node with maneuver command, battle management, track manage-
ment and effects analysis capabilities. These nodes maintain computing,
analytics, and network distribution management capabilities. They are
maintained on major force units (carrier or expeditionary strike groups,
Joint Force Maritime Component Command groups (JFMCC)).
• Afloat limited nodes are local computing services that include effects
analysis, track management, and battle management capabilities for
their mission (e.g., CG or DDGs on independent operations or missile
defense operations).
• The afloat node uses a common core, the CANES, to provide ISR ser-
vices with plug-ins (application programming interfaces (APIs)) for
DCGS-N, as well as cyber situational awareness (NCSA), Maritime Tac-
tical Command and Control (MTC2), Navy Integrated Tactical Envi-
ronmental System (NITES2), and Naval Operational Business Logistics
Enterprise (NOBLE). The NOBLE family of systems is composed of
the Naval Operational Supply System (NOSS), Naval Aviation Mainte-
nance System (NAMS), and Naval Operational Maintenance Environ-
ment. These capabilities illustrate the breadth of integration of systems
using common services that are cyber secure and auditable.
• CANES provides common hardware and software services in a SOA
architecture across these mission capabilities; all benefit from common
data strategy, standards, and information security.
• The Distributed Common Ground System-Navy (DCGS-N) is a family
of intelligence systems (FOS) that is interoperable with the other service
and agency DCGS systems and provides multilevel security. It includes
collection management, geospatial and signals intelligence analytics,
display, fusion, and dissemination services. It also provides reach-back
capabilities to MOC support centers.
• Closely associated with DCGS services are battle management systems
dependent on precision target locations derived from multiple sensors.
Battle management encompasses many combat systems, for example:
Naval Information Fusion Systems 79
Aegis Combat System, Joint Land Attack Cruise Missile Defense Elevat-
ed Netted Sensor System (JLENS) services, air operations battle man-
agement services, IO and electromagnetic warfare (EMW) services that
provide the rapid-response capability to integrate kinetic and nonkinetic
(electronic warfare, directed energy) fires.
1. New source data from ISR sensors (a batch from a single sensor, or
multiple sources) is presented to the data aggregator service. In this
example, the batch contains objects (surface vessels observed by sen-
sors) and extracted from surface search radars on ships and aircraft,
and RF signal intercepts of maritime radars, as well as EO and SAR
ship detections from commercial satellites. The data aggregator sends
the batch to the object refine service. Figure 4.3 illustrates how just
Naval Information Fusion Systems 81
the first message may be relayed from the ISR aggregator service to
the object refinement service through the standard internet using the
TCP/IP Protocol network to reach the object refine service.
2. The object refine service aligns the object observations to a common
time and space reference. It also requests (GET_Obj) the current ob-
jects in the area of coverage of the new objects from the object-situa-
tion storage.
3. Those objects are retuned (RTN_Obj) from the storage and a correla-
tion measurement is computed to determine if the new objects can
update the current objects in time or location and identify or track
dynamics. This service may also update the track of objects (a mov-
ing ship) using a tracking algorithm to associate a new object with an
existing track, and update the track. If an RF ellipse can be uniquely
associated with an object or track, the ID can also be updated. If satel-
lite observations can be associated with any tracks, identity may also
be updated for the tracks. The updated object data message (Update_
Obj) is then sent to the object-situation store to update its state. Note
that the object-situation storage is the source of the common operat-
ing picture presented to commanders, and it is used by C2 simulations
(explained in Chapter 8) to assess alternative COAs.
4. The completion of object updating from this batch is reported to the
data aggregator service; and it requests and update of the situation as-
sessment, based on the new state.
5. Next, the situation assessment service requests the current situation
(GET_Sit) and, when retrieved, estimates the change in situation
based on the new objects, updated tracks, and their relationships.
(This process is described in greater detail in Chapter 6.) The updated
situation is sent to the object-situation store (RTN_Sit).
82 Naval ISR Fusion Principles, Operations, and Technologies
6. Once the situation is updated and reported to the ISR data aggrega-
tor, a REQ_Thrt is issued to the threat assess service to determine if
changes to the situation pose a threat (or offensive opportunity) to
the fleet or its mission. After issuing a GET_Sit and receiving the
newly updated situation (RT_Sit) the threat assess service assesses
the implications of the maritime situation and projected outcomes
from alternative COAs. By requesting a maritime surface simulation
(REQ_SIM) from the simulate service.
7. The simulation service explores the space of current and possible fu-
ture situations over a defined time horizon (e.g., 12 hours) and returns
results (RTN_SIM) to the threat assess service.
8. The threat assess service evaluates (a self-request loop) the potential
threats and issues an Update_Thrt report message to the object-situa-
tion store, as well as the ISR aggregator service.
9. The aggregator service finally requests an update to sensor tasking
(REQ_Tasking) based on the new situation and identified threats that
may change priorities in the ISR network. The resource management
service requests the current situation/threat profile (GET_S/T) and
then computes an updated ISR strategy, sensor allocation, and collec-
tion schedule (tasking) based on the updated situation. The updated
tasking (Update_Tasking) is sent to the object-situation store and to
the ISR aggregator, which forwards it to the appropriate ISR sensor
systems.
Note that this simple example sequence of services only maintained cus-
tody of surface ship threats; a complete seabed-to-space process would maintain
an object-situation store of the complete domain of objects, the full domain
situation, and the threat imposed by the aggregate behavior of all objects.
• Investment and planning for transition. Of course, any navy with a large
investment in legacy ISR stovepipes must develop a transition strategy
with incremental delivery milestones, migration paths, and budgets.
These must guide the introduction of new IT infrastructure, hardware,
software, and translation of legacy capabilities into services (breaking
apart, wrapping, expanding to a shared service useful across ISR mission
threads, etc.).
• Governance policies and standards for data and services. These must be es-
tablished, configuration managed, and adhered to by all components. In
addition, methods must be developed to continually audit SOA systems
to assure compliance.
• Services sequence profiles and metadata management. Methods must be
established to design, document, manage, and test the large number of
messages exchanged between service for all ISR workflows. Profiles must
be developed to enforce compatibility with standards.
• Bandwidth management. The asynchronous and message-passing char-
acteristic of SOA also requires monitoring and management of the ca-
pacity-limited channels in the network.
• Security. Information assurance and security standards must be estab-
lished to support all services; application-level security alone is not ap-
propriate in the SOA environment which is reliant on message passing
across applications using many layers of the computing stack.
The following chapters move toward the implementation of the ISR pro-
cess providing more detail on the required data fusion functions.
Endnotes
[1] NATO is developing ISR technologies similar to those described in this chapter. See
NATO Science and Technology Organization 2021 Highlights, “Interoperability
and Networking of Disparate Sensors and Platforms for Tactical ISR Applications,”
pp. 39–40, and “Data Environmental Knowledge and Operational Effectiveness
(D-EKOE)” pp. 41–42, https://www.nato.int/nato_static_fl2014/assets/pdf/2022/4/
pdf/2021-NATO-STO-Highlights-web.pdf.
The Royal Australian Navy (RAN) is studying robotics, autonomous systems, and AI
(RAS-AI) technologies directly applicable to naval ISR applications. See Slapakova, L., P.
Fusaro, J. Black, and P. Dortmans, “Supporting the Royal Australian Navy’s Campaign
Plan for Robotics and Autonomous Systems: Emerging Missions and Technology Trends,”
Santa Monica, CA: RAND Corporation, 2022, https://www.rand.org/pubs/research_re-
ports/RRA1377-1.html.
[2] Here, we only introduce the SOA concept as an enabler for ISR fusion; for more depth,
see Erl, T., Service-Oriented Architecture: Analysis and Design for Services and Microservices,
Pearson, Dec. 2016.
[3] Joint Publication 1-02.
[4] Management of the Department of Defense Information Enterprise (DoD IE), Depart-
ment of Defense Directive 8000.01, March 17, 2016.
[5] By core fusion services, we refer to the most elemental functions that make up each of the
fusion levels. For example, level 1 fusion refines individual objects from raw data (e.g.,
targets in imagery). The core functions of level 1 for a single source include object detec-
Naval Information Fusion Systems 85
tion in raw data, object extraction from raw data, alignment of the extracted object in
space and time to a common reference, correlation of the object with other objects and
association of the object measurement with other object measurements, combination of
data from associated measurements, dynamic tracking of object kinematics, and more.
[6] “Web Services Description Language (WSDL) Version 2.0 Part 1: Core Language,” W3C
Recommendation June 26, 2007, http://www.w3.org/TR/wsdl20.
[7] Joint intelligence preparation is a continuous process. See JP 3-0, Joint Operations, 17
January 2017, Incorporating Change 1; October 22, 2018, p. xiv. See also Cross-Domain
Synergy in Joint Operations Planners Guide, Joint Staff Force Development J7; January
14, 2016; https://www.jcs.mil/Portals/36/Documents/Doctrine/concepts/cross_domain_
planning_guide.pdf?ver=2017-12-28-161956-230.
[8] See “Challenges to Security in Space,” Defense Intelligence Agency, January 2019, https://
media.defense.gov/2019/Feb/11/2002088710/-1/-1/1/SPACE-SECURITY-CHAL-
LENGES.PDF.
[9] Tim Anderson, Battlespace Awareness, and Information Operations Program Office
(PMW-12) for Intelligence Analytics 2018 Meeting (Brief ), PEO C4I, Approved for Pub-
lic Release unlimited, February 7, 2018.
[10] The historical background to NCW and ForceNet is provided in the introduction to
Chapter 7.
[11] The Unified Modeling Language (UML) specifies diagrams that represent SOA service
sequences and messages to aid in design and analysis. The sequence diagram is a model
(abstract representation) that is used in model-based engineering. The example is a very
simple, but illustrative, description of the basic data fusion process. See Unified Modeling
Language (UML) Specification Version 2.5.1, OMG, December 2017.
[12] For an Air Force perspective of this challenge, see Lingel, S., et.al., “Joint All-Domain
Command and Control for Modern Warfare: An Analytic Framework for Identifying and
Developing Artificial Intelligence Applications,” RAND Report RR-4408/1-AF, 2020.
5
All-Domain Fusion and Operation
Challenges
The introduction of the term all-domain has created the vision of integration
of technical and operational activities across several domains—spheres of ac-
tivity or influence with common and distinct characteristics in which a force
can conduct joint functions [1]. The term multidomain also exists to describe
systems that operate across multiple domains, but all-domain emphasizes full
integration and synchronization across the entire spectrum of conflict. At the
U.S. DoD level the broadest application is in a joint all-domain operations con-
cept that is comprised of air, land, maritime, cyberspace, and space domains,
plus the electromagnetic spectrum [2]. Actions by the joint force in multiple
domains integrated in planning and synchronized in execution, at speed and
scale needed to gain advantage and accomplish the mission [3]. Ultimately,
all-domain seeks the coordination and optimization of everything, everywhere.
In this book, our focus is on naval maritime and littoral operations; the
emphasis is on integrating and orchestrating the ISRT sensor and C2 opera-
tions for naval and marine forces. While these forces must coordinate with air,
space, and land forces as well as intelligence services, the focus here remains on
naval operations [4]. Coordination of sensing (ISRT), command and action
(C2) across all of the domains of naval operations is envisioned to enable sur-
prise, the simultaneous and sequential application of force at enemy centers of
gravity, and the ability to gain both physical and psychological control over the
operational environment. The key domains we focus on in this chapter include
maritime, air, space, and cyber.
The all-domain concept requires a significant degree of technical and op-
erational requirements to achieve the desired superiority in information across
87
88 Naval ISR Fusion Principles, Operations, and Technologies
the domains, the effectiveness of decision making across those domains and
the impact of coordinated force application. The driving requirements include:
The challenges all relate to the ability to carry out the maritime ISRT
sequence that moves from surveillance-to-targeting that follows a typical se-
quence of states [5]:
Detection: The wide area surveillance process performs area scanning and
directed area searches (often based on cues from other sources such as a
port-departure notice) with the objective of detecting targets. For surface
search, vessels are detected by zone of operation, and are categorized as
cooperative (reporting ID by declared ID on the AIS per international
law), or dark (detected but not emitting or identified—unknown vessel).
For air search, aircraft targets on radar or targets emitting radar or other
signals detected by ELINT are detected.
Identification: Once detected, surface vessel must be classified by vessel
type and uniquely identified (e.g., by hull, name) to declutter the surface
picture. If cooperative AIS data is not associated with a vessel, other non-
cooperative methods such as vessel RF signal fingerprints (specific emit-
ter identification (SEI)) must be used. For aircraft, efforts are made to
identify the target by commercial track and transponder reporting, iden-
tification friend or foe (IFF) interrogation, flight behavior, flight path,
point-of-departure (airfield), or other noncooperative means. Identifica-
tion is critical to understand both the surface and air picture, and the po-
tential implications of an adversary’s combined air-surface maneuvering.
The ISR system must assess the risk of target behaviors, including the
All-Domain Fusion and Operation Challenges 89
vessel history and particulars (ownership, cargo) for identified vessels and
unidentified vessels. This state involves performing follow-up tasking to
sensor systems to resolve identification and initiate tracking.
Track: The next state of surface or subsurface vessel ISR is to maintain a
track throughout passage in an area of interest—also known as maintain-
ing custody of the vessel. This requires the sustained observation of the
target by continuous or periodic sampling to assure the target is not lost
in clutter. An emitting AIS target, easily tracked, may go dark, causing
the ISR system to lose track if it cannot switch to another sensor mode
to regain custody. Targets in-track are correlated across sensors and inte-
grated to provide a common operating picture (COP). Air targets likewise
require a sensor (e.g., radar) to sustain periodic observations (e.g., radar
returns) of the target at a higher rate than search to maintain a track of
the aircraft trajectory. The track can be represented by a series of observed
POSITs or a computational tracking model (e.g., a Kalman filter) that
smooths the POSITs, estimates the trajectory parameters, and predicts the
expected location of the next sample observation. Throughout tracking,
the ISR system monitors track behavior for anomalies to alert to unusual
or threat-like behaviors, or maneuvers to risk loss of track.
Targeting and engagement: The nomination of a target for targeting refers
to the selection of a target for action. This action may be to intercept
a vessel for reconnaissance or boarding-inspection, or for committing a
weapon to engage an air or surface target.
of fire control systems to deliver physical and cyber weapons. The fourth area
addresses the need for integration of cyber capabilities to assure commanders
understand adversary coordination of attacks in this domain with the physical
domain.
These challenges in the following sections inherently call for speed and
precision, and in turn, may necessitate degrees of automation and augmented
cognition to achieve high levels of performance. The potential contributions
of automaton and augmentation are further described in Chapters 6, 7, and 8.
Hughes points out that naval warfare is so destructive and decisive that
the avoidance of it altogether weighs heavily on strategists. For this reason, fleets
are dynamic and maneuvering at peace and war to avoid detection and tracking
and to prepare for immediate action.
Therefore, a pillar of naval strategy is the necessity that ISR capabilities
maintain continual custody of the location, movement, and activities of op-
posing naval forces (in-port, maneuvering at-sea, hiding on-station, and in-
maintenance). For the naval fleet conducting DMO operations this demands a
persistent tracking of adversary fleets and knowledge of the commercial mari-
time clutter in which they operate.
By tracking, we refer to the ability to maintain a record of the successive
positions of a moving object. We distinguish the course that may be planned by
the object (e.g., a commercial shipping route) and the track that is the actual
path or trajectory followed by the object. It is helpful to further distinguish two
primary methods of performing the tracking process (Figure 5.3):
1. A time series of POSITS records the track of a ship, for example. The
common maritime track produced by a series of AIS POSITS can plot,
in near real-time, the trajectory of a ship. AIS Class A transponders
typically provide a new location update every 2 to 10 seconds while
94 Naval ISR Fusion Principles, Operations, and Technologies
Table 5.1
Relative Speeds of Targets to be Tracked
Desired Sample
Max Velocity Rate to Track
Target Max Velocity (ft/sec) (samples/min)
Container, commercial ship 20–25 kts 33–42 fps 1
CVN (nuclear aircraft carrier) 30 kts 50 fps 2
DDG (guided missile destroyer) 35 kts 60 fps 3
Submarine (submerged) 30–40 kts 50–68 fps 3
Fast missile corvette 30–60 kts 50–116 fps 5
Aircraft (patrol) 350 kts 600 fps 20
Cruise missile (subsonic) 550–700 mph 800–1,000 fps 30
Aircraft (fighter) 1,500 mph 2,200 fps 60
Hypersonic missile (Mach 7) 3,800 mph 5,575 fps 60–120
ASM cruise missiles such as Excoct or Harpoon.
Hypersonic boost-glide vehicle and cruise missiles range from 5 to 7 Mach.
96 Naval ISR Fusion Principles, Operations, and Technologies
the operational area. Once the FFG and submarine are ready, the FFG departs,
crossing the offshore shipping lanes and performing maneuvers close to mer-
chant traffic behaviors tracks to confuse efforts to track the vessel (3). Once
outside of the shipping lanes, the FFG proceeds at 30 kts to the operational area
to prepare for intercept and engagement with an opposing force. In the process
of that operation, the FFG and other combatant vessels joining the operation
make several tight and crossing maneuvers (4) to evade tracking.
Tracking the FFG in this scenario requires, first the detection of the ship
departure (1) from the port (by AIS signal, seabed or surface sensors, or other
ship, air, or space radar sensors) and initiation of a track process that requests
persistent sequential sensing to sample the track at a sufficient rate to maintain
initial custody. As the FFG loiters for rendezvous (2) the tracking may require
increased sampling to keep up with the turns. As the FFG enters the ship lanes
(3) and maneuvers back and forth to blend with merchant traffic to cause any
tracker to follow a merchant ship and lose the combatant FFG. (This is also
a period that the AIS may be turned off to cause the FFG to go dark, to AIS
tracking.) Finally, after proceeding to the operational intercept point, the FFG
may again perform sharp maneuvers (4) to cause a tracking process to break
lock and lose custody.
AIS reporting rates at 6–30 samples per minute provide excellent sampling
and a high-altitude UAV may provide a similar sampling rate on this target, but
OTH radars and satellite sensors may provide much lower sampling rates. Dis-
tributed sensor systems that integrate observations from multiple sensors, con-
tributing at different times, may provide uneven sampling further complicating
track custody. The relation between target separation and sampling interval on
tracking performance for the FFG track in Figure 5.4 is illustrated in Figure 5.5
[10]. The ability to correlate samples is unambiguous when the ship is widely
separated from ship traffic and is broadcasting a high-rate AIS signal. As the
ship conducts loitering maneuvers in low density areas (Region 1) the perfor-
mance diminishes if the sample rate cannot distinguish the maneuvering rate,
and in high maneuvering at lower sample rates (due to AIS being turned off and
observation rates from air and space sensors are reduced). In Region 4 the track
All-Domain Fusion and Operation Challenges 97
maintaining track of the remote target; it is provided the launch and target data.
The remote sensor network detects the target, and the command vessel receives
data and completely manages the fusion of data, sensor tasking, and engage-
ment by the remote firing unit. Missile updates are provided by the remote
sensors (e.g., UAV or USV) as directed by the control unit.
As missile speeds move from subsonic cruise missiles to supersonic cruise
and even hypersonic, the much shorter missile time-of-flight allows much less
time for surface targets to maneuver (Table 5.2) and reduces the predicted track
location at the time of missile arrival. For example, a ship traveling at 30 kts can
traverse almost 10 miles in the time it takes a 700-mph cruise missile to traverse
a 200-mi range-to-target. On arrival, the missile sensor (seeker) searches for the
target and verifies signature attributes before guiding to impact. The accuracy
of the inflight track updates is critical to enable the missile seeker to acquire the
target in the endgame—the final 10s of seconds of flight.
Demonstrations of long-range CEC surface-surface engagements in early
2021 by the U.S. and Russian navies were conducted to attack targets over 300
km by ship-launched missiles using cooperative engagement strategies [13].
The U.S. experiment used a blend of remote sensor data from manned and
unmanned ships and aircraft to provide fire control information to a guided
missile destroyer, enabling the launch of an antisurface missile from OTH to
hit a target more than 250 miles distant [14]. Rear Admiral James Aiken (U.S.
Navy) said of the demonstration, “We teamed manned and unmanned vessels
together. We also used the fusing capability… It was totally passive where we
didn’t have active sensors on target …We also look for space as well to identify
the target and then once we found the target, we were able to track it because
of the [electromagnetic signal] that was coming off the target, develop lines of
bearing, then launched the missile” [14].
The implementation of these concepts requires the consideration of two
additional complexities for operational applications. First is the challenge of
Table 5.2
SSM Time-of-Flight at Long-Range Engagements
Missile Time-of-Flight to Target (Minutes)
Engagement Distance (nm)
Missile
Missile Type Speed (Mph) 100 200 400 600
Cruise 500 12.0 24.0 48.0 72.0
Cruise 600 10.0 20.0 40.0 60.0
Cruise 700 8.6 17.1 34.3 51.4
Supersonic 1,000 6.0 12.0 24.0 36.0
Hypersonic Mach 5 3,000 2.0 4.0 8.0 12.0
Hypersonic Mach 7 5,000 1.2 2.4 4.8 7.2
102 Naval ISR Fusion Principles, Operations, and Technologies
hypersonic weapons that pose severe requirements for tracking that are required
by the defender. Sensors must track the maneuvering boost-glide weapons
through a plasma sheath and provide sustained high accuracy tracking to enable
intercept. The time-to-intercept is very short and national efforts are required
to develop intercept capabilities.
The second complexity is the operational need for missile salvo analysis to
determine the appropriate number of fires (a salvo) necessary to achieve target
destruction. Typical operational analyses must consider at least the following
factors to determine salvo sizes [15]:
These operational factors introduce two key challenges that must be ad-
dressed by technical solutions:
• Ad hoc and continuous threats are continual external cyber activities that
probe, test, and attempt to disrupt the network through any point of ac-
cess on communication links or computer nodes afloat or ashore.
• Advanced persistent threats (APT) that “…possesses sophisticated levels
of expertise and significant resources which allow it to create opportuni-
ties to achieve its objectives by using multiple attack vectors (e.g., cyber,
physical, and deception). These objectives typically include establishing
and extending footholds within the information technology infrastruc-
ture of the targeted organizations for purposes of exfiltrating informa-
tion, undermining or impeding critical aspects of a mission, program, or
organization; or positioning itself to carry out these objectives in the fu-
ture. The advanced persistent threat: (i) pursues its objectives repeatedly
over an extended period of time, (ii) adapts to defenders’ efforts to resist
it, and (iii) is determined to maintain the level of interaction needed to
execute its objectives” [17]. Will the fleet go to sea with a covert APT
present? In spite of all the security processes in place, it must be prepared
for just such an eventuality.
Consider just a small set of the attack surfaces (categories of attack entry)
and vectors (specific targets of access to the network) that must be protected
by the fleet cyber team (Table 5.3). The threats are diverse (ranging from per-
inserted malware in the supply chain to real-time targeted service denial) and
dynamic as attacks may change throughout an engagement period. The cyber-
attacks can be expected to be coordinated with attacks in other domains to
stress the use of the network for ISR and C2 activities.
104 Naval ISR Fusion Principles, Operations, and Technologies
Table 5.3
Example Naval Cyber Attack Categories
Cyber Attack Attack Vectors Employed
Surfaces by Adversaries Description/Example
Network Network probing and Probe network to map the architecture and
Computing mapping properties of any aspect of the fleet nets
Access leapfrog from open Exploit bridge vulnerability between networks,
internet to secure maintain an advanced persistent threat
mechanism
Denial of service (DoS) by Insert large numbers of targets electronically or
overwhelming input physically (e.g., decoy small vessels, and UAVs)
Malware insertion Insert malware via exploited access channel or
(electronic) persistent
Malware insertion (physical; Insert malware into commercial components
supply chain) (hardware, firmware, software) in the supply
chain
Network Comm link disruption/denial Jam network links (e.g., low signal satellite links)
Communications (jamming)
Links Comm link denial (relay Attack or jam physical relays (e.g., satellite, UAS
destruction) nodes)
Comm link exploitation Analyze network traffic to exploit comm patterns
(traffic analysis)
Network- Network personnel social Social engineer cyber administrator personnel to
Related engineering inadvertently expose information
Personnel Spear phishing attack on Broadcast dedicated spear phishing attacks to
ashore admins seduce low-level net personnel to ingest malware
Error-inducing attacks on net Induce an error in configuration by inserting
personnel controlled instructions to net administration
personnel
False data insertion across Insert data to reduce network or ISR (user)
network personnel confidence in the network and its
application
Physical Attack Confusion-inducing attacks Create critical network conditions (e.g., physical
on net personnel node attack or electrical power disruption),
induce network actions that expose the net to
exploitation
While the fleet conducts cyber defense against such threats, it also con-
ducts cyber ISR to explore the adversary cyber operating environment that
poses threats [18]. The mechanisms of computer network exploitation (CNE)
are employed to passively and actively engage adversary networks to understand
the cyber operating environment. The concept of persistent engagement is where
cyber interactions with adversaries are ongoing, at a level below armed con-
flict, but not simply responsive. It embraces forward defense where a persistent
contest (detect, parry, counter-prob, etc.) is ongoing between cyber adversaries
[19].
All-Domain Fusion and Operation Challenges 105
Because of the ubiquitous presence of the cyber domain, ashore cyber an-
alysts support this activity from afar as well as afloat analysts that are physically
close-in to threats and may have greater access to aspects of adversary networks.
Ashore-afloat coordination of cyber analysis and attack is critical to achieve an
integrated response to all levels of an adversary organization structure.
But cyber cannot be considered an independent domain—adversaries
may compound cyber-attacks with assaults in other domains. Defensive counter-
cyber operations refer to those activities that prepare for and respond to adversary
attacks across all surfaces. For example, an adversary may coordinate network
denial actions (jamming comm links) with a network computing disruption
(denial of service (DoS)) to limit ISR the ability to observe a critical Red fleet
maneuver. The adversary may further enhance the effect by coordination with
a SIGINT deception that produces distracting decoy signals that will cause ISR
assets to focus away from the critical Red maneuvering. Cyber awareness, in
this case, must be fully coordinated with SIGINT and other sources to detect
the actions, infer the denial/disruption and deception intentions, and respond
with countermeasures.
Endnotes
[1] Joint Publication (JP) 3-0, Joint Operations, describes the operational environment as en-
compassing the physical domains of air, land, maritime, and space, the IE, which includes
the cyberspace domain, and the electromagnetic spectrum. It also describes the joint func-
tions as related capabilities grouped to help commanders integrate, synchronize, and direct
operations. The joint functions are C2, information, intelligence, fires, movement and
maneuver, protection, and sustainment.
[2] The U.S. DoD envisions a Joint All-Domain Command and Control (JADC2) archi-
tecture to enable commanders to (1) rapidly understand the battlespace, (2) direct forces
faster than the enemy, and (3) deliver synchronized combat effects across all domains.
See Hoehn, J. R., Joint All-Domain Command and Control (JADC2), Congressional
Research Service, IF11493, updated July 1, 2021.
[3] Air Force Doctrine Note 1-20, USAF Role in Joint All-Domain Operations.
[4] Each service has a unique role and perspective on its own contribution to all-domain
operations, for example, see the U.S. Air Force perspective in Air Force Doctrine Publica-
tion (AFDP) 3-99, Department of the Air Force Role in Joint All Domain Operations
(JADO), October 8, 2020.
[5] Galdorisi G., and R. Goshorn, “Maritime Domain Awareness: The Key to Maritime Secu-
rity Operational Challenges and Technical Solutions,” in Proc. 11th ICCRTS, September
2006.
[6] For reference, the South China Sea is a marginal sea that is part of the Pacific Ocean,
encompassing an area from the Karimata and Malacca straits to the Strait of Taiwan of
around 3,500,000 km2 (1,400,000 mi2). The China Sea Basin has a maximum depth of
5,016m.
106 Naval ISR Fusion Principles, Operations, and Technologies
[7] In data fusion terminology, we define correlation as the process of measuring quantitatively
the similarity between two measurements (e.g., same lace, same time, same observed at-
tributes) and association as the decision process of assigning two or more measurements to
a comm on target. Correlation precedes association, and association preceded combining
attributes or fusion of data.
[8] Hughes, W., and R. Girrier, Fleet Tactics and Naval Operations, Annapolis, MD: Naval
Institute Press, 2018, pp. 18–19.
[9] See Blackman, S., and R. Popoli, Design and Analysis of Modern Tracking Systems, Nor-
wood, MA: Artech House, 1999.
[10] This figure is adapted from the fundamental regions of tracking performance developed in
the classic textbook on tracking. See Blackman, S. S., Multiple-Target Tracking with Radar
Applications, Dedham, MA: Artech House, 1986, pp. 12–13.
[11] The CEC and integrated fire control capabilities have been evaluated in experiments since
the 1990s. The descriptions are based on the following relevant documents: Grant, C. J.,
“CEC: Sensor Netting with Integrated Fire Control,” Johns Hopkins APL Technical Digest,
Vol. 23, No. 2 and 3, 2002, pp. 149–161. Young, B. W., “Future Integrated Fire Control,”
Proc. 10th International Command and Control Research and Technology Symposium, June
2005. Deering, V., et al., “Open Architecture as an Enabler for FORCEnet,” NPS-
SE-06-002, Naval Postgraduate School, September 2006.
[12] Young, B. W., “Future Integrated Fire Control,” Proc. 10th International Command and
Control Research and Technology Symposium, June 2005.
[13] “Russia says it successfully tested hypersonic missile praised by Putin,” Reuters, July 19,
2021, https://www.reuters.com/world/europe/russia-conducts-ship-based-hypersonic-
missile-test-ifax-cites-defence-ministry-2021-07-19/.
[14] LaGrone, S., “Unmanned Systems, Passive Sensors Help USS John Finn Bullseye Target
with SM-6,” U.S. Naval Institute, April 26, 2021, https://news.usni.org/2021/04/26/
unmanned-systems-passive-sensors-help-uss-john-finn-bullseye-target-with-sm-6.
[15] For a complete discussion of missile salvo and fleet exchange equations. See Hughes, W.,
and R. Girrier, Fleet Tactics and Naval Operations, Annapolis, MD: Naval Institute Press,
2018, Chapter 13.
[16] Boothby, W., “Some Legal Challenges Posed by Remote Attack,” International Review of
the Red Cross, Humanitarian Debate: Law, Policy, Action, New technologies and Warfare,
Vol. 94, No. 886, 2012, pp. 575–595.
[17] NIST. Managing Information Security Risk: Organization, Mission, and Information
System View. SP 800-39 (2011).
[18] Votipka, D., et al., “ISR and Cyberspace,” Air University, 6 July 2017, https://www.
airuniversity.af.edu/CyberCollege/Portal/Article/Article/1238539/isr-and-cyberspace/.
[19] Nakasone, P. M., “A Cyber Force for Persistent Operations,” Joint Forces Quarterly 92,
2019, pp. 10–14. See also Healey, J., and S. Caudill, “Success of Persistent Engagement in
Cyberspace,” Strategic Studies Quarterly, Spring 2020, pp. 9–15.
6
Maritime MultiINT Fusion Processes
In Chapter 4 we enumerated the many state-of-the-art systems applied across
advanced navies to integrate organic and nonorganic sensors and sources, gen-
erally integrated by ISR mission (antisubmarine warfare, surface warfare, antiair
warfare, etc.). In this chapter we introduce concepts and technologies to signifi-
cantly extend the integration and automation to a greater degree beyond what
we described in Chapter 4—including processes to estimate the entire maritime
situation across the missions and the domains of space, air, surface, subsurface,
and the seabed.
The concepts of conducting ISR from seabed to space and performing
joint all-domain operations anticipates a level of integration that provides
“commanders access to information to allow for simultaneous and sequential
operations using surprise and the rapid and continuous integration of capabili-
ties across all domains—to try to gain physical and psychological advantages
and influence and control over the operational environment” [1]. For example,
the Air and Space Force perspective is that, “In JADO, intelligence must de-
velop, maintain, and share an awareness of the operational environment that
spans geographic, functional, domain, classification, and organizational bound-
aries. The scope of awareness should include intelligence on ongoing opera-
tions, adversary forces, indications, and warnings (I&W), target information,
and account for military, political, and environmental considerations” [2]. The
high level of integration of information requires technology to provide broad
coverage, rapid access to collected information, and responsive control of the
collection network.
It is important to distinguish the terms that we use and explain the nu-
ances in terminology regarding the integration of diverse sources of intelligence:
107
108 Naval ISR Fusion Principles, Operations, and Technologies
Data fusion is a broad term that refers to the process of combining data or
information to estimate or predict entity states. The terms multisensory
and multisource data fusion, and information fusion all refer to technical
processes that perform data fusion. The term “process” can refer to human
activities (e.g., analysis) or to computational algorithms, but it is most ap-
plied to refer to the latter [3].
MultiINT refers to the automated processing of multiple shared sources
of raw or preprocessed intelligence to derive integrated intelligence prod-
ucts. The study of MultiINT processes is an interdisciplinary field seeking
to understand how integrating intelligence across the intelligence cycle
can vastly improve tactical and strategic decision-making. This is achieved
by using processes, algorithms, and systems to extract knowledge and in-
sights from data that ranges from being abundant to being sparse and
unstructured [4].
All-source intelligence analysis refers to the analytic process performed by
human analysts with access to all available intelligence sources. This term
was originally intended to distinguish all-source from single-source dis-
ciplines (e.g., SIGINT, GEOINT, HUMINT, and OSINT analysis) [5].
This section provides a brief overview of the model related to naval ISR;
established texts provide a through treatment of the mature model [9]. The
most basic JDL model (Figure 1.6) represents the flow of analysis and, as an
abstract model, can refer to a process performed by humans, machines, or both.
It is similar to a fundamental model of human cognition that has the stages (or
levels) of sensation, perception of objects, perception of situations of objects
over time, and reasoning that construct meaning, followed by action. The Kah-
neman research in human cognition has distinguished between two modes, or
systems of thought: fast (intuitive, emotional) reaction, and slow (deliberative
and logical analysis); these feedback loops to response are indicated by the (1)
and (2) arrows in the model, respectively [10]. The fast loop includes immedi-
ate actions in response to a detection (e.g., new vessel appears in threatening po-
sition) and reactive tasking to identify the vessel. The full JDL loop includes the
110 Naval ISR Fusion Principles, Operations, and Technologies
complete deliberative reasoning through all levels of the process. The SHOR
(sense, hypothesize, orient, respond), OODA, TCPED (task, collect, process,
exploit, disseminate), and other C2 models are similar efforts to represent the
fundamental elements of observing, thinking, and response.
The benefit of the JDL model is that it provides an organizing scheme for
distinguishing the stages or levels of abstraction at which cognition, analysis,
or automated fusion is performed. The levels of processing (or, cognition) are
distinguishable, each with a definable role in moving from raw sensation to
perception, comprehension, meaning (relative to a mission goals), and intuitive
reaction and reasoned response.
From the basic model we can organize a more detailed naval ISR model
(Figure 6.1) that distinguishes the four most basic JDL levels of processing in
the maritime context [11].
Level 0. In some cases, it may be possible to combine raw data from mul-
tiple sensors prior to the detection in each individual sensor. This upstream fu-
sion can be particularly valuable when the signals in both sensors are weak and
even undetectable independently. The process minimizes information loss that
results from the detection process in each sensor that may reject weak signals;
the combination of correlated weak signals across both sensors may result in a
confident detection [12]. The process occurs upstream, and sensors must pass
the predetection data to the level 0 fusion processor.
Level 1. Object refinement performs the detection of objects, and refines
the estimate of state (location, identity, track behavior, etc.) and maintains cus-
tody of the object over time as sensing data allows. Sensor data must be cor-
related (measure the degree of similarity of two observations) and associated
(decision to assign observations across sensors to a single object). Once associ-
ated, the sensor data is used to refine the state and then predict the next state at
the next collection opportunity. In the maritime case, for example, a ship’s radar
track may be correlated, then associated with a commercial satellite’s AIS track
of the ship to identify the vessel. The specific processes performed here include:
• Alignment: First, the data from different sources must be aligned with
a common time and space reference system (as well as common scale of
confidence, probability, and other measurements).
• Correlation: Observations must be compared by some measure of simi-
larity or closeness in time, space, or attributes.
• Association: Once the correlation measurement between observations
meets a likelihood criterion for similarity, the observations may make an
association decision to assign the observations to the same target object.
• Tracking: The state of sensor observations over time may be computa-
tionally modeled to create a track—a state model of the object initiated
Maritime MultiINT Fusion Processes
111
and updated over time. The track model may be used to predict the
future position of an object for comparison (correlation and association)
with a future observation.
• Identification: Identification is the process to determine the type of a
target (e.g., a surface vessel), the classification (e.g., a merchant ship or
a guided missile destroyer model 55), and identity (e.g., hull number
047).
Figure 6.2 is a basic example to illustrate just one possible fusion archi-
tecture that allocates processing at different JDL levels across different naval
platforms. Note that we only included one of each type of platform to simplify;
a fleet architecture will include scores of platforms and hundreds of potential
fusion nodes. The figure points out three implementation issues that are impor-
tant for distributed naval implementations:
• Central fusion: Major nodes will perform all levels of fusion and distrib-
ute results (common operating picture) to other nodes. It is critical to
retain pedigree of data and fused results to avoid multiple counting of
objects, events, or activities.
• Distributed fusion process distribution: Fusion processes may occur at all
nodes in the naval network (sensor nodes, relay nodes, and C2 nodes).
Even a sensor node, for example, may receive data from other sensors
(e.g., tips to focus on a target) and may perform some form of fusion
for its own functions (e.g., to evade threats or to adapt processing and
sensing). We discuss this further in Chapter 7.
• All-domain fusion: While the JDL model was initially applied to physical
objects (ships, submarines, and maritime aircraft) it has also been ap-
plied to represent the processing of sensor and source data on nonphysi-
cal objects of interest to naval intelligence: signal contents, cyber-attack
processes, social media messages, social attitudes of ashore populations,
and networks of adversarial naval organizations. Naval ISR must con-
sider the integration of all these domains to assess the overall situation
and understand a coordinate multidomain activity.
114 Naval ISR Fusion Principles, Operations, and Technologies
The preceding example illustrated the processes for levels 0, 1, and 2 for
the traditional naval maritime domain awareness mission, focusing on physical
objects of military interest. It is necessary to point out that the fusion process
is also applied to discover, understand, and model the dynamics of entities that
are nonphysical (social networks, populations, economies, etc.). Nonphysical
entities are the objects (targets) of information operations and special opera-
tions focused on organizations whose dynamics do not follow the kinematic
behaviors of the physical world. Navies have ISR tasks that require monitoring
social influence in ashore populations, civilian ashore social networks, criminal
human networks, adversary command organizations and their human decision-
making, and more. Activity based intelligence (ABI) is a MultiINT discipline
characterized by analysis of human activity and transactional data to resolve un-
knowns using contextual knowledge of activities and transactions. The analytic
focus is on entities (people and their organizations), their relationships (net-
works of entities), their activities, and patterns of behavior. ABI is contrasted
with traditional target-based intelligence because of its focus on discovering the
relationships and behavior (activities) of networks (target systems) [22].
The contrast in the JDL levels between the physical and nonphysical tar-
get systems (Figure 6.4) shows the mapping between JDL target-based fusion
notions and nonphysical networks that are represented as graphs where objects
are referred to as entities, groups or units are referred to as networks or systems,
and target tracking is more generally referred to as behavior (kinematic track-
ing is replaced by social dynamics or network dynamics and modeled appro-
priately). The general term for a generic person, place, or thing is object, as we
Maritime MultiINT Fusion Processes 119
have used throughout. A specific named or labeled object (e.g., John A., Farris
Building, homemade explosive) becomes an entity, in some parlance.
The steps in Figure 6.4 applied to ISR of foreign ashore terrorist networks
resolves the individual human objects (generally called actors because they are
socially interacting humans) at level 1, then discovers the relationships (com-
munications, financial, influence, etc.) between actors to form networks at level
2. The structure can be studied by social network analysis (SNA) to derive the
importance and influence of the individual actors in the net; the timeline of
events of the network helps to explore behavior, patterns of life, and potential
future courses of action at level 3. Unique to complex human systems, the
feedback (level 4) actions not only include sensor management to refine the
network, but the use of probing actions to influence the complex adaptive net-
work to reveal information. Probes include any action designed to produce a
response that reveals new properties of the network. (The analogy in dynamic
systems is the injection of an impulse to measure the output impulse response
function that reveals properties of the system.) For example, the analyst refining
a terrorist network that is messaging on social media may send a set of mes-
sages designed to elicit a response to determine how (and who in the network)
responds to a meme or concept.
Example sources and analytic targets of nonphysical (or human) systems
of interest in the maritime domain include:
• Fishing fleets. Source: radio traffic in fishing fleet. Analytic targets: radio
network, legitimate and illegitimate activities, communicating parties;
120 Naval ISR Fusion Principles, Operations, and Technologies
Table 6.1
Maritime Superiority Opportunities and Threats
Area Maritime Opportunity (O) Maritime Threat (T)
Objective Offense: Degrade, disrupt, deceive, deny, Defense: Protect, defend, recover own
and exploit enemy’s IE to introduce fog; IE, and increase the enemy’s friction by
mass distributed forces decisively engage creating uncertainty.
the enemy’s critical vulnerabilities to
degrade and remove the enemy’s center
of gravity.
Example Opportunity situations for Blue: Threatening situations to Blue:
T/O ·· Red vessel or aircraft position, ·· Red vessels have successfully
Behaviors electronic state, sensor positioning, maneuvered (electronic, cyber, physical)
communication ability, or other such that Blue loses custody;
condition degrades its situation ·· Red forces (surface, air) are massing
awareness; and maneuvering in the direction of Blue
·· Red sensor gap enables a deceptive forces;
maneuver or EM action; ·· Red platforms are surveilling distributed
·· Red network degradation, even if Blue forces to the degree they have
temporary; near-full custody of Blue;
·· Red vessel positions are such that a ·· Red raises intensity of offensive
sensor ambush can be induced by Blue cyber operations coordinated with
actions; or preceding threatening physical
·· Red forces are dispersed to a high behaviors;
degree of vulnerability to electronic ·· Red forces exhibit coordinated denial
attack to disrupt networking. (e.g., go AIS dark) and deceptive (e.g.,
AIS spoofing) behaviors.
Table 6.2
Computational Steps in the Level 3 JIPOE Process
Representative Level 3 Fusion Computational Modeling Activities (with JP
JIPOE Step 2-10.3 References)
Step 1: 1. Model the commander’s intent for the JIPOE effort (JP2-10.3; II-4).
Define the 2. Identify and model key effects relevant to the commander’s intent and the
Operational systems within the environment that must be represented.
Environment 3. Maintain a model library of the environment (JP2-10.3; II-5); identify the
appropriate models and data required to instantiate component models and meta
model for the environment (geospatial, weather, naval behavior, etc.).
4. Compose a baseline model, calibrate and validate behavior compared to prior
months as appropriate for the environment and current situation.
Step 2: 1. Update by ISR the current situation in the operational environment (JP2-10.3;
Describe the II-11e Information Domain; II-12 Systems Perspective). For human social cultural
Effects of the behavior issues, evaluate policy leaders, political parties, key population groups,
Operational spoilers (e.g., terrorist groups), and their relations, positions, and relative political-
Environment social power. For the operational context, assess economics, corruption, security and
terrorist trends, and media influences.
2. Accept and update information from current intel systems to establish model
initial conditions and parameters.
3. Consider future outlook and impact of Op environment on adversary (Red) and
Blue COAs. Using baseline simulation, project effects if no Red actions are taken
and explain the dynamics of the environment (JP2-10.3; II-13 Systems Perspective).
Step 3: 1. Review the modeled information about the adversaries and their relationships
Evaluate the with other groups (JP2-10.3; II-14-16); identify uncertainties and sensitivities.
Adversary 2. Identify sources of power and relative effects of alternative positions (JP2-10.3;
II-17).
3. Identify relevant centers of gravity (JP2-10.3; II-18) across the Red and Blue
systems.
Step 4: 1. Perform analytic simulations to identify potential adversary objectives and
Determine endstates (JP2-10.3; II-19-20).
Adversary 2. Perform a range of exploratory simulations to evaluate potential effects of
COAs adversary activities (e.g., maritime expeditionary campaigns, all-domain coordinated
campaigns, political action, and media campaigns) to achieve their desired Red
objectives and endstates (JP2-10.3; II-21).
3. Develop and evaluate the effectiveness of alternative adversary COAs (e.g., media
campaigns, adverse influence-economic actions, maritime piracy, and maritime
expeditionary campaigns).
Maritime MultiINT Fusion Processes 123
Table 6.3
Levels of Sensor Systems Allocation
Level Description and References
1. Strategic ISR force Allocation of the ISR platforms across fleets to prioritize coverage
management. of multiple operating areas [26].
2. Operational force ISR Allocation of ISR platforms to multiple AOIs within a fleet [27].
allocation.
3. Tactical dynamic ISR sensor Dynamic allocation of sensors-to-targets on individual ISR
management. platforms in near real-time in a networked sensor environment [28].
Table 6.4
Orchestration Architecture Elements
Sensor Orchestration Network Orchestration
MultiINT Sensor Planning Based on Target Value Route Planning Based on Message Priority
Target Sensor Aggregate Value Network Routing Message Priority Based
Valuation Collection Optimization Prediction on Current Projected
Feasibility ISRT State
Prediction
·· Coordination of multiple sensors to sustain ·· Network instantaneous performance
continuity of surface, subsurface, or air target management priority message stream
custody; assurance (e.g., weapon inflight; target
·· Prediction and valuation of each feasible sensor in-track).
collection;
·· Assignment of values for priority targets-in-track.
When optimizing sensor orchestration for a value there are two contribu-
tors to the value of a candidate target (or area) for collection.
6.5 Conclusion
The subject of distributed sensor management is complex and the scholarly
materials on algorithms for determining feasible solutions, selecting objective
functions, and applying optimization methods is vast. Greater depth in this
subject is beyond the scope and level of this book, but we recommend the fol-
lowing keys sources that address this challenge from different perspectives:
This chapter introduced the key functions, as if the fusion functions are
performed in a centralized process; this may indeed be true on some platforms.
But across the DMO fleet, there may be many fusion processors that share data
and products across the fleet network. This network sharing and network fu-
sion poses new changes. In the next chapter, we move to describe approaches to
implement these fusion functions across networks where the fusion functional-
ity is distributed and shared.
Endnotes
[1] Congressional Research Service, Joint All-Domain Command and Control (JADC2),
IF11493, Version 16, January 21, 2022.
[2] Air Force Doctrine Publication 3-99 and Space Force Doctrine Publication 3-99, Depart-
ment of the Air Force Role in Joint All-Domain Operations, November 19, 2021, p. 13.
[3] Steinberg, A. N., C. L. Bowman, and F. E., White, “Revisions to the JDL Data Fusion
Model,” Proc. Third NATO/IRIS Conference, Quebec City, Canada, 1998.
[4] Center for MultiINT Studies, Naval Postgraduate School, https://nps.edu/web/cmis.
[5] Fingar, T., “A Guide to All-Source Analysis,” The Intelligencer, Journal of U.S. Intelligence
Studies, Vol. 19, No. 1, Winter/Spring 2012.
[6] IMO definitions. See definition in “Executive Order on Promoting American Seafood
Competitiveness and Economic Growth,” White House, May 7, 2020, https://www.
wpcouncil.org/wp-content/uploads/2021/05/Executive-Order-on-Promoting-American-
Seafood-Competitiveness-and-Economic-Growth-_-The-White-House.pdf.
[7] Joint Staff, Joint Tactics, Techniques, and Procedures for Joint Intelligence Preparation of
the Battlespace, Joint Publication 2-01.3, May 2020, pp. 24, II-4.5. Earlier doctrine in
the period from 2003 to 2020 included distinct domains (air, land, maritime, and space),
the IE (which includes cyberspace), and political, military, economic, social, information,
and infrastructure (PMESII) systems and subsystems. Joint Staff, Joint Intelligence Prepa-
ration of the Operational Environment Joint Publication 2-01. 3, May 21, 2014, p. 1-1.
For a critique of the PMESII elements, see Ducote, B. M., “Challenging the Application
of PMESII-PT in a Complex Environment,” Fort Leavenworth, Kansas: School of Ad-
vanced Military Studies United States Army Command and General Staff College, April
26, 2010.
[8] White, F. E., Jr., Data Fusion Lexicon, Joint Directors of Laboratories, Technical Panel
for C3, Data Fusion Sub-Panel, Naval Ocean Systems Center, San Diego, 1987. See also
128 Naval ISR Fusion Principles, Operations, and Technologies
White, F. E., Jr., “A Model for Data Fusion,” Proc. 1st National Symposium on Sensor Fu-
sion, Vol. 2, 1988.
[9] The following texts provide more depth on the data fusion model and process:
Handbook of Multisensor Data Fusion: Theory and Practice, Second Edition, M. Liggins, II,
D. Hall, and J. Llinas (eds.), Electrical Engineering & Applied Signal Processing Series,
CRC Press, 2008.
Hall, D., and S. McMullen, Mathematical Techniques in Multisensor Fusion, Norwood,
MA: Artech House, 2004.
Antony, R., Principles of Data Fusion Automation, Norwood, MA: Artech House, 1995.
Waltz, E., and J. Llinas, Multisensor Data Fusion, Norwood, MA: Artech House, 1990.
[10] We introduced this comparison earlier in Section 1.4. See Kahneman, D., Thinking, Fast
and Slow, Farrar, Straus and Giroux, 2011.
[11] In this brief introduction we include the four basic levels. Level 0 was added for
predetection fusion, or fusion at level of raw signals across multiple sensors. For additional
changes and considerations, see [3] and Chapter 3 in Handbook of Multisensor Data Fusion:
Theory and Practice, Second Edition, M. Liggins, II, D. Hall, and J. Llinas (eds.), Electrical
Engineering & Applied Signal Processing Series, CRC Press, 2008.
[12] Newman, A. J., and G. E. Mitzel, “Upstream Data Fusion: History, Technical Overview,
and Applications to Critical Challenges,” Johns Hopkins APL Technical Digest, Vol. 31, No.
3, 2013, pp. 215–233.
[13] Alan N. Steinberg, “Foundations of Situation and Threat Assessment,” in: Handbook of
Multisensor Data Fusion: Theory and Practice, Second Ed., M. Liggins II, D. Hall, and
James Llinas (eds), Chapter 18, 2009.
[14] For an example of a Level 3 implementation for a complex land scenario, see Chen, G., et
al., “Game Theoretic Approach to Threat Prediction and Situation Awareness,” Journal of
Advances in Information Fusion, Vol. 2, No. 1, June 2007, pp. 35–48.
[15] GEOINT CONOP 2022, National Geospatial Intelligence Agency, April 1, 2016.
[16] Endsley, M. R., “Toward a Theory of Situation Awareness in Dynamic Systems,” Human
Factors Journal 37 (1): 32–64.
[17] Report of the Joint Defense Science Board-Intelligence Science Board Task Force on
Integrating Sensor-Collected Intelligence Office of the Under Secretary of Defense for
Acquisition, Technology, and Logistics, November 2008, pp. 49–53.
[18] Johnston, C., “Modernizing Defense Intelligence: Object Based Production and Activity
Based Intelligence,” Briefing, June 27, 2013.
[19] The term structured observation (or systemic observation) is a method of collecting and
recording data used in numerous scientific disciplines. The structured procedures guide
the method of observation and encoding of the observations for subsequent study. The
terminology is adopted to refer to methods of structuring information from geospatial
analysis for entry into object-based production systems.
[20] See the example that uses AIS and satellite imagery: Štepec, D., T. Martincic, and D.
Skoaj, “Automated System for Ship Detection from Medium Resolution Satellite Optical
Imagery,” Proc. IEEE Oceans 2019, October 1, 2019.
Maritime MultiINT Fusion Processes 129
[21] Callaghan, C., R. Schroeder, and W. Porter, “Mapping Gray Maritime Networks for
Hybrid Warfare,” COMSEC, July 1, 2020, https://cimsec.org/mapping-gray-maritime-
networks-for-hybrid-warfare/.
[22] Biltgen, P. and S. Ryan, Activity Based Intelligence, Norwood, MA: Artech House, 2015,
and Antony, R., Data Fusion Support to Activity-Based Intelligence, Norwood, MA: Artech
House, 2015. See also the GEOINT perspective in Long, L., “Activity Based Intelligence:
Understanding the Unknown,” The Intelligencer: Journal of U.S. Intelligence Studies, Vol.
20, No. 2, Fall/Winter 2013, pp. 7–15.
[23] The integration of intelligence simulations and operations planning is introduced in
Waltz, E., Quantitative Intelligence Analysis: Applied Analytic Models, Simulations, and
Games, Rowman Littlefield, 2014.
[24] In addition to AI technologies, AI-enabled commercial data sources can contribute to
assessment. For example, geopolitical context may be aided by the open-source Global
Database of Events, Language, and Tone (GDELT) that monitors “the world’s broadcast,
print, and web news from nearly every corner of every country in over 100 languages and
identifies the people, locations, organizations, themes, sources, emotions, counts, quotes,
images and events.” See The GDELT Project, https://www.gdeltproject.org/.
[25] Joint Chiefs of Staff, Joint Publications (JP) 2-01.3, Joint Intelligence Preparation of the
Operational Environment, Joint Chiefs of Staff, Washington D.C., May 21, 2014.
[26] For an explanation of the high-level process to allocate ISR assets at the platform level,
see Carrillo, G. I., “Optimization Case Study: ISR Allocation in the Global Force
Management Process,” Naval Postgraduate School, September 2016.
[27] Ranjeev Mittu et al., “Optimization of ISR Platforms for Improved Collection in Maritime
Environments,” Washington D.C.: Naval Research Laboratory, August 2009.
[28] Johnson, B. W., and Green, J. M., Naval Network-Centric Sensor Resource Management,
2002, http://hdl.handle.net/10945/37809.
[29] Scrofani, J. W., and Miller, D. L., “All-Domain Sensor Network Orchestration from
Seabed-to-Space,” Monterey, California: Naval Postgraduate School, http://hdl.handle.
net/10945/69752.
7
Sensor Distribution and Adaptation
Navies have always relied on distributed communication because of the dis-
tances between vessels at sea. Line of sight (LOS) coded signaling by flag sema-
phores and nighttime signal lights preceded LOS radio communications be-
tween vessels and ship-to-shore communications. As ships conducted dispersed
operations in the second world war, the use of the electromagnetic spectrum
expanded, using VHF communications for two-way voice and coded messag-
ing between ships and to communicate with aircraft. By the 1960s, oscillator
technology enabled widespread move to longer range high frequency (HF) and
ultrahigh frequencies (UHF) for fleet communications. Satellite communica-
tions and navigation systems then enhanced the ability to communicate and
navigate worldwide, giving fleets significant gains in the coordination of battle
groups. The adoption of narrow beam extremely high frequency (EHF) com-
munications even allowed wideband communication from satellite to subma-
rines with EHF antennas mounted atop periscopes. The full use of the spectrum
for communication and fleet-wide access to satellite communications advanced
the ability to network and coordinate distributed vessels. TDLs and submarine
acoustic communications extended coordination with antiair and antisubma-
rine warfare platforms. The recent adoption of digital networking via TCP/IP
protocols has enabled standardization for adaptive, self-synchronizing, and ad
hoc networks—enabling global ashore-afloat communication of secure voice,
data, and control of unmanned platforms.
To distribute ISR and perform the fusion of sensors we must distinguish
several key technical elements of the distribution processing as distributed sen-
sor network (DSN):
131
132 Naval ISR Fusion Principles, Operations, and Technologies
The architecture of the networks (Table 7.1) that interconnect the sensors and
their users refers to the topology of the links between communication nodes:
Table 7.1
Link and Network Topology Structures
Structure Description of Use in Data Fusion Applications Example Naval Uses
Point-to-point The most basic link between 2 nodes (e.g., a sensor Sensor node to a sensor
and fusion processor, or between 2 data fusion processor.
processors).
Table 7.2
Major Categories of Naval Optical and RF Communication Links
Communication
Links Capability Comments
VHF/HF fleet ·· Secure voice (analog and digital) and ·· STANAG4691 jam resistant
communications data modes; communications;
·· LOS surface-to-surface and long range ·· LOS comm to manned,
surface-to-air; unmanned air and surface
·· Data rates up to 1 mbps. vehicles.
HF long range ·· Long range extended line of sight (ELOS) ·· Viable alternative to
capability to 4,000 km; SATCOM when outside the
·· 3-kHz narrowband and 48-kHz wideband footprint of SATCOM (e.g.,
channels with 4G HF waveforms; northern latitudes);
·· Data rates of up to 240 mbps. ·· Mil-Std-188-110C/D &
STANAG 4539 App H provide
IP networking.
TDL heterogeneous ·· NATO Link 16; ·· Time-division multiple
HF/UHF networks ·· Data rates up to 2 mbps; access (TDMA) tactical data,
·· NATO Link 22; C2, mission, and weapons;
·· Data rates up to 12.7 mbps in UHF ·· Provides theater-level
mode. connectivity.
Ground to subsurface ·· Low bandwidth one-way instructions to ·· VLF (3–30 kHz) penetrates
UHF/ELF RF data submarine to establish a different form water to a few tens of
links (one-way to of two-way communication link (<10 bps) meters, EHF (3–300 Hz) to
submarine) hundreds of meters.
Subsurface RF, optical ·· Short-range 30–100m optical links >1 ·· Underwater links between
and acoustic data mbps submarines, arrays, and
links ·· Fiber optical links up to 10 km, >2 gbps; UUVs.
·· Acoustic com (ACOMM) links are
not covert but can achieve ranges
of 30–40 mi.
TDL over P-LEO for ·· Provides beyond LOS (BLOS) ·· Satellite-based TDMA
BLOS data link experimental TDL; terminal [8] with global
·· Link 16 terminals on P-LEO constellation coverage.
to enable persistent overhead access.
Geostationary (GEO) ·· Multiband (X, Ka) channels on geo- ·· GEO satellites orbit at
SATCOM to very small to-surface beams; geo satellites have altitudes of 35,786 km
aperture terminal multiple beams to provide shaped with an orbital period of 24
(VSAT) coverage areas; hours; round-trip latency is
·· Round-trip latency <550 ms; approximately 477 ms;
·· Data rates up to 250 Mbps down/20 ·· MEO satellites orbit at
Mbps up. altitudes of 2,000–35,786
P-LEO and medium ·· Near global coverage Internet Protocol; km with orbital periods
MEO SATCOM ·· Low round-trip latency <50 ms; between 127 minutes to
·· Data rates of up to 100 Mbps down/3 24 hours; RT latency is
Mbps up. 27–477 ms;
·· LEO satellites orbit at
Optical LaserCom ·· Very narrow beams, with minimal altitudes of 160–2,000
links satellite-to- divergence reducing ability to intercept; km with orbital period of
satellite crosslinks, ·· More power can be delivered to the 88–127 min; RT latency is
satellite-to-airborne, receiver compared with RF; approximately 2–27 ms.
and ground ·· Very high data rates >5 Gbps.
Sensor Distribution and Adaptation 137
Note that the two categories of satellite links (GEO and P-LEO SAT-
COM) provide alternative channels in which bandwidth, latency, capacity
(data rates), and footprint (coverage) must be traded off to properly apply each
application. In addition, both military (e.g., MILSATCOM) and commercial
(COMSATCOM) capabilities, may be appropriately applied to provide SAT-
COM diversity for operation in contested, degraded, and operationally limited
(CDO) environments [10].
Table 7.3
Key Characteristics of Wireless Technology Generations
Generation Download Data Rate; Link Latency Density (Links)
4G Download 1 Mbps; latency 60 ms to 98 ms 105 devices/km2
5G Download 10 Mbps; latency under 5 ms 106 devices/km2
6G Download 95 Gbps; latency 1 ms 107 devices/km2
138 Naval ISR Fusion Principles, Operations, and Technologies
From these use cases, a set of derivative requirements were postulated; the
general use cases can be compared to DMO maritime applications (Table 7.4).
In the DoD Digital Modernization Strategy, 5G is highlighted as a key
enabling technology, with several of the benefits identified, including the “abil-
ity to deliver fiber-like speeds to end-user devices, improved performance at
network cell edge, low-latency performance (<2ms radio latency), and greater
spectral efficiency” [12]. The strategy further identifies foundational technolo-
gies including: “improved beamforming via smart antennas, network densifica-
tion via small cells, native support for diverse spectrum types (licensed and un-
licensed), and increased network intelligence via software defined networking
(SDN)” [12]. In the DoD 5G Strategy Implementation Plan, the Department
also promotes a 5G-enabled concept of operations to leverage the “transforma-
tional speed and connectivity of 5G” [13] and early adoption of the capabilities
associated with the EMBB, URLLC, and MMC use cases.
From a maritime perspective, 5G offers ubiquitous coverage benefits to
the maritime transportation industry [14], and to the naval deployment and
adoption of autonomous vessels, air vehicles, and unattended sensor networks.
Unmanned or remotely piloted commercial vessels enable extended at-sea
availability, and thus greater transport volume than currently achievable with
traditional cargo ships. Inventory control and monitoring aboard such vessels
enabled by 5G’s MMC capabilities is another area where 5G benefit can be
realized. With IoT sensor-equipped containers, this dense onboard network of
assets, can be accurately located, tracked for chain of custody, and monitored
for health and wellness. Additionally, with IoT-connected sensors aboard, vessel
performance can be used for route and speed optimization and for predictive
maintenance.
These maritime benefits extend to DMO applications when ubiquitous
coverage integrates satellite constellation networks into 5G networks. This
requirement is addressed by 3GPP in its global satellite overlay use case that
Sensor Distribution and Adaptation 139
Table 7.4
Summary of Operating Characteristics for 5G Use Cases
Naval Maritime
Use Case Data Rate, Latency Traffic Density Applications
EMBB: Very high data rate (e.g., High traffic density Real-time sensor and
Characterized by very up to 10 Gbps) when the (Tbps/km2) imagery data transfers
high traffic, high bitmobile user is moving High connection Air-air, air-satellite, and
rate with moderate slowly density of user air-ground real-time
reliability and Very low latency, reliable equipment: communications
accuracy low latency for high- 200–2,500 devices/
speed connections (e.g., km2
aircraft)
Ultrareliable Real-time ultrahigh High traffic density Critical targeting
low-latency reliability real-time with distribution (e.g., information transfers;
communications high availability for 10,000 sensor target locations, tracks,
(URLLC): mission critical traffic devices /10 km2) and targeting data
Characterized by low Low latency (delay) in updates in real time
latency, ultrahigh some dense cases 1–10
reliability, and ms and full round-
precise position trip latency less than
centimeter 100–150 ms
MMC: No low latency High traffic density Unattended sea surface
High positioning requirement, but efficient massive connections and other sensors
accuracy (e.g., 0.5m) resource and signaling to up to 1 million reporting data
support low power with connections per km2; Autonomous surface
limited communication appropriate for large and air vehicle
requirements numbers of locally environmental and
dense devices noncritical data
reporting
Figure 7.1 Nonterrestrial network featuring an access network serving UEs and based on a
satellite with a spaceborne base transceiver station on board [15].
Table 7.5
ISRT Major Functional Nodes
Node Description Naval Example
Sensor or source A node that produces sensor data Radar, IFF, sonar, EW, sensors;
or source (e.g., HUMINT, or OSINT) Imagery, SAR, SIGINT sensors;
information for distribution HUMINT sources, force trackers.
Relay Node that only relays information from Satellite relay (GEO, LEO);
node-to-node across a communication Tactical data link TDMA protocol;
network; information is not processed Any TCP/IP router in a WAN.
Processing-fusion A node that receives sensor and Sensor processing and data fusion
source information from multiple nodes on any platform;
nodes to process (detect, track, ID) All-source analyst units data fusion
and fuse (combine, control sensor/ nodes that combine multiple INT
sources), then forwards results to sources;
other nodes MultiINT processors.
C2 A consumer node that accepts C2 processors, common operating
information to support C2 functions picture display processors;
C2 units that direct ops and weapons.
Weapon A consumer node that receives Weapon system (e.g., missiles,
information to influence the operating guns, mines) and supporting weapon
environment platforms.
track and ship class data are through the LEO relay constellation to the
afloat command ship and ashore fusion processors F3 and F4.
• LEO remote sensing satellites with SAR S5, and EO S6, sensors are
directed to observe and collect on the target (command link not shown)
142 Naval ISR Fusion Principles, Operations, and Technologies
and report imagery through the LEO relay constellation to the afloat
command F3 ship and the forward destroyer F2.
• The ashore and afloat ships F2, F3, and F4, coordinate the common
operating picture and fusion processes through the geospatial relay sat-
ellite R4. The issue fusion processor integrates information from other
maritime sources in fusion processor F5. The result is that the command
ship and the forward destroyer have the combined information about
the target.
This simple example of a mesh network has 18 links and 16 nodes, and
only describes the most minimal set of sensor-reporting transactions that would
occur in such an activity; in an actual scenario repeated and continuous sensor
observations to maintain custody of the target would significantly increase the
transactions. Sensor control, platform maneuver guidance, C2, and weapon
command transactions have also not been included in this simple example.
The mesh network of even a moderate DMO naval unit can become
complicated, and its adaptive transactions can become complex. Consider the
network example (Figure 7.3) for a moderate surface action group. The distrib-
uted force covers an area of 500,000 mi2 with a surface to-seafloor blue-water
depth 5,000 ft with littorals (shallow water areas) [18]. The DMO Force is
distributed over 62,500 sq nautical miles (250 × 250 nm area) and includes a
carrier strike group comprised of:
Figure 7.3 distinguishes the network nodes with the carrier (solid node
at center) encircled by widely distributed destroyers (double circle nodes) and
the forward deployed air assets. The example net includes 157 links but notably
does not include numerous other nodes and links: USVs, undersea links be-
tween undersea vehicles, multiple RF links available to undersea vessels, buoys
and deployed surface sensors, and seabed sensors. The net also simplifies the
dynamic persistent LEO relay constellation as a single node, when, in fact, it is
a continually changing set of nodes and relay nodes. It is important to note that
this included only the functional communication links, but did not distinguish
Sensor Distribution and Adaptation 143
sensor, fusion process, and relay nodes as in Figure 7.2. The figure illustrates the
complexity of the most basic set of nodes for a DMO strike force.
The network figures (Figures 7.2 and 7.3) also illustrate the challenge
of designing the structure by which multiple sensor nodes and fusion nodes
relay and combine information. This consideration is important for maritime
networks and well as wireless and mobile ad hoc networks. We introduce this
distribution of sensors and fusion processes in Section 7.4.
144 Naval ISR Fusion Principles, Operations, and Technologies
best theoretical performance regarding minimizing errors. There are many dis-
advantages though. Obviously, the single fusion node represents a single point
of failure. In addition, the convergence of all sensor feeds to the central node
creates a communications bottleneck, which limits scalability to the bandwidth
and computational capacity of the central node and network links.
Decentralized/distributed fusion is the opposite end of the spectrum; ev-
ery node in a mesh can share its sensor data directly with every other node.
Each node then performs its own fusion based on its own local sensor mea-
surements and the measurements of all other nodes. This obviously maximizes
redundancy, which increases resilience, but redundancy has other costs. In this
architecture, the tracks formulated at each node may contain redundant infor-
mation as nodes may have access to common sensors. The most salient informa-
tion influences track formation and as those tracks are shared, not as additional
measurements, but as the conclusions of the fusion process at EACH node they
may result in double-counting—using a sensor measurement more than once as
if the two observations were independent. Furthermore, the ideal of a perfectly
Sensor Distribution and Adaptation 147
object (e.g., a ship) in physical space while the dynamic state includes
the associated velocities. Commonly, the kinematic state of a ship or
aircraft, for example, includes the location in a coordinate system (e.g.,
x, y, z) and the velocity vector.
• Measurement is an observation recorded by a particular sensor at a par-
ticular time. Metadata for each observation should be available; particu-
larly important is the time at which the observation was made as we shall
see later in this section, in Figure 7.6.
• Track is a history of measurements associated with a single entity of in-
terest and stored in a time ordered sequence. Tracks can be maintained
at the sensor level or the system level.
• Sensor track is a track maintained by a single modality sensor, even
though multiple sensors may exist on a single platform like a UAV,
the sensor track would refer to just one of those sensors. The sensor
algorithms determine how to associate the individual measurements
into a track.
• System track is a track of a single entity that is formed at a fusion node
by fusing data from more than one sensor and/or other fusion nodes.
• Tracklet is a short subset of measurements representing a finite time
series segment of an ongoing track.
• Process noise is noise that is inherent in the behavior of the observed en-
tity. This could be due to environmental clutter or other nearby entities.
An example would be incorrectly including a measurement on entity B
in a track associated with entity A, corrupting the estimate of the state
of A.
• Covariance matrix contains elements quantifying the measurement un-
certainty associated with a measurement due to process noise and obser-
vation noise.
The most common statistical tracking models are based on some form
of the Kalman filter [22]. The basic Kalman filter (Figure 7.5) seeks to make a
prediction of a state at time k, xˆk based on a series of measurements, or at least
the most recent measurement at time k–1, zk–1. The filter assumes that the true
state can be modeled by a state transition matrix, F operating on the current
state, plus some process noise, wk:
x k = Fk x k −1 + w k (7.1)
Sensor Distribution and Adaptation 149
Of course, the actual state is not known to the ISR system which is pas-
sively monitoring an uncooperative target. All that can be known is the observa-
tions that it makes, where the observation is given as:
z k = H k z k −1 + v k (7.2)
where H is the observation model and v is the observation noise. The role of the
observation model is to map observations to derived states. From an observa-
tion, or more often from a series of observations, the Kalman filter computes
the predicted state, and the estimated covariance matrix, P as follows:
where Q is the covariance of the process noise. These predictions can be used to
keep targets in track for weapons engagement or could inform the ISR system
where to look next if resources are scarce. If a track prediction seems relatively
nonvolatile, less resources need to be used to track it than a target which ex-
hibits highly dynamic behavior with large, forecasted covariance. Later in this
section, we will explore how variations on the Kalman filter are used in DDF
and will consider a few other algorithms as well.
Before discussing algorithms, we need to consider where and at what level
the different kinds of information can be fused. A single sensor only has access
to its own measurements, thus the only option it has is to fuse the measurements
it collects over time into a set of tracks. A single sensor platform with multiple
sensors has more options. It is in theory possible to fuse the measurements of
each sensor together and then form a track from the fused measurements. In
150 Naval ISR Fusion Principles, Operations, and Technologies
practice, however, sensors may collect data on different time scales and in many
different formats, so it is much more common to let each sensor to form its
own tracks and then fuse those tracks. Sensor-to-sensor direct fusion is pos-
sible, however, in this example, the platform functions as a central fusion node
producing system tracks by sensor-to-sensor fusion.
A variety of combinations of system-to-system and sensor-to-system fu-
sion become possible as systems get larger. For instance, consider the shore node
(F4) in Figure 7.2 which receives system tracks from F2, F3, and F5 and sensor
tracks from satellites S5 and S6.
Finally, we need to understand the concept of information flow and how
that affects fusion algorithms. Information flow diagrams, like that depicted
in Figure 7.6 show a series of measurements from two sensor systems, each
maintaining a track on the same target, which are periodically fused into a
system track. Obviously to construct an information flow, measurements must
be source-labeled and time-tagged (pedigree, as introduced in Chapter 6) to
be processed in correct order. Information flow is used to decide how many
measurements to collect into a tracklet before fusing with other tracks. It can
also be used to avoid the data double-counting (or recycling) issue mentioned
earlier in this section. This diagram (Figure 7.6) illustrates how dependencies
arise when measurements are used to generate a track estimate and that (system)
track estimate is used to fuse with another (sensor) track containing the same
measurements, resulting in overconfidence placed on those measurements.
Notice in Figure 7.6 that both sensors experience dropouts in coverage,
but the system track maintains a combined track estimate in the presence of
intermittent data. This example could represent two radars, one on a ship and
one on a distant aircraft tracking an aircraft or ship but experiencing dropout
periods; the system track provides sustained custody of the target in this simple
example.
We are now able to discuss some of the more important fusion algo-
rithms applied in DDF and the situations in which they are applicable. The
simplest fusion algorithm we may consider is a centralized Kalman filter, where
Figure 7.6 Sequence of sensor measurements, sensor tracks, and a combined system track
for two sensors (figure based on [23]).
Sensor Distribution and Adaptation 151
all observations are sent to a single fusion node. We can treat these observa-
tions as a single observation vector and the fusion equation then reduces to the
simple Kalman filter in (7.3) and (7.4). In the more realistic case of a hybrid
or hierarchical architecture, a decentralized version of the Kalman filter needs
to be employed. Each fusion node would employ a centralized Kalman filter
at the local level. If we can assume that the tracks do not interact, then the
overall state of the situation can be represented by the naïve combination of
the tracks produced by the local filters. However, if more than one sensor or
fusion node is observing the same track, then the shared information must be
communicated and reconciled. Consensus based versions of the Kalman filter
can be used in this case, with variations building consensus on measurements
or on the magnitude of shared information [24]. A simple way of reconciling
tracks is to compute a linear combination of the reported tracks. The weighting
of the linear components can be as simple as weighted least squares fit if the
track observation errors are independent or could be complicated if shared error
sources are present, in which case the cross covariance must be computed [23].
Earlier in this section we mentioned the problem of data recycling, which
can lead to overconfidence in estimates because some observations are effec-
tively counted multiple times. One way to deal with this problem is to re-
construct the data input and remove the double counted data. This is easy to
visualize if one considers the information flow diagram in Figure 7.2. Another
approach would be to restart filters after information is fused. For instance, a
sensor would compute a track until m measurements are received and the track-
let is fused with the system track. The sensor tracker then begins anew and com-
putes another tracklet based only on the measurements m + 1 through m + n,
and that tracklet—containing all ‘fresh’ information—is fused with the system
track. Conversely, the sensor tracks could continue to build upon all available
measurements and the system track could be reset at each fusion event [23].
We caution that these considerations assume a high, continuous sampling
rate on the target (relative to target velocity)—for example, multiple radars
observing a common target, or multiple satellites revising the target area very
often. But this is not always the case, particularly in DMO scenarios where
ships, aircraft, and their radars are widely dispersed, and the target is OTH.
DMO data fusion designers must consider the combined effects of sample rate
and latency (Figure 7.7). Delayed tracking (measured in seconds to minutes)
may be acceptable, but the combination of slow or irregular sample and high
latency may render data fusion infeasible.
We can see that there are many architectures and algorithms to support a
variety of fusions schemes. Selecting the appropriate tools will depend on the
topology of the problem—the distribution of sensors and entities in time and
space, the overlap between sensors, the connectivity and latency in the commu-
152 Naval ISR Fusion Principles, Operations, and Technologies
nications infrastructure, and the ability to properly account for and correct data
recycling and out of sequence data.
Two implementations of DDF for dense maritime applications (both
dense harbor monitoring with multiple sensor feeds) have been published with
explanation of the practical design considerations employed [25]. Both papers
explain the alternative architectures described previously and the considerations
in selecting an approach for their specific problem; one paper describes the ap-
proach to simulating alternative approaches and provides a comparison of the
results.
Endnotes
[1] Chong, C-Y, et al., “Distributed Tracking in Distributed Sensor Networks,” American
Control Conference, 1986, 1863-1868.
[2] Adapted from Cebrowski, A. K., and J. J. Garstka, “Network-Centric Warfare: Its Origins
and Future,” U.S. Naval Institute Proceedings, January 1998, pp. 28–35.
[3] Network Centric Warfare, Department of Defense Report to Congress, July 27, 2001.
[4] Cebrowski, A. K., “Defense Transformation and Network Centric Operations,” NDIA
Network Centric Operations Conference, April 2003.
[5] Though the NCW concept seems intuitive and was backed by analyses, it was not without
criticism. See, for example: Hammes, T. X., “War Isn’t a Rational Business,” Proceedings
of the U.S. Naval Institute, July 1998. Borgu, A., “The Challenges and Limitations of
‘Network Centric Warfare’: The initial views of an NCW sceptic,” Australian Strategic
Policy Institute (ASPI), 17 September 17, 2003. Giffin, R., and D. Reid, “A Woven Web
of Guesses, Canto One: Network Centric Warfare and the Myth of the New Economy,”
Proc. 8th International Command and Control Research and Technology Symposium, 2003.
Giffin, R. and D. Reid, “A Woven Web of Guesses, Canto Two: Network Centric Warfare
Sensor Distribution and Adaptation 153
and the Myth of Inductivism,” Proc. 8th International Command and Control Research and
Technology Symposium, 2003.
[6] See key publications, such as Alberts, D. S., J. J. Garstka, and F. P. Stein, Network Centric
Warfare: Developing and Leveraging Information Superiority, Command and Control in the
Information Age, DoD Command and Control Research Program, CCRP Publication
Series, 1999. Alberts, S., and R. E. Hayes, Power to the Edge: Command and Control in
the Information Age, DoD Command and Control Research Program, CCRP Publication
Series, 2003. Moffat, J., Complexity Theory and Network Centric Warfare, DoD Command
and Control Research Program, CCRP Publication Series, 2003.
[7] Definition from July 22, 2002 CNO Briefing.
[8] Erwin, S., Viasat to Begin Integration of Long-Delayed Link 16 Military Com-
munications Satellite, Space News, April 21, 2022, https://spacenews.com/
viasat-to-begin-integration-of-long-delayed-link-16-military-communications-satellite/.
[9] National Research Council of the National Academies, Distributed Remote Sensing for Na-
val Undersea Warfare: Abbreviated Version, Washington, D.C.: The National Academies
Press, 2007, https://doi.org/10.17226/11927.
[10] “United States Space Force Vision for Satellite Communications (SATCOM),” United
States Space Command (USSPACECOM), January 23, 2020. See also “Proliferated-Low
Earth Orbit (P-LEO) COMSATCOM Services Request for Information (RFI),” United
States Space Force (USSF) Commercial Satellite Communications Office (CSCO), March
2021.
[11] “3rd Generation Partnership Project; Technical Specification Group Services and System
Aspects; Feasibility Study on New Services and Markets Technology Enablers; Stage 1
(Release 14),” European Telecommunications Standards, Institute 2017.
[12] Department of Defense Digital Modernization Strategy, July 12, 2019.
[13] Department of Defense 5G Strategy Implementation Plan, 2020.
[14] Harris, S., “Ship Ahoy: All at Sea with 5G,” Orange Business Services, February 05, 2021,
https://www.orange-business.com/en/blogs/ship-ahoy-all-sea-5g.
[15] 3rd Generation Partnership Project Specification 3GPP TR 38.811 V15.4.0 (2020-09).
[16] Porche, I. R., III, et al., “Data Flood: Helping the Navy Address the Rising Tide of Sensor
Information,” Report RR315, Santa Monica, CA: RAND, 2014, p. 14.
[17] These designations are based on Cares, J. R., et al., “Fundamentals of Distributed,
Networked Military Forces and the Engineering of Distributed Systems,” Naval Undersea
Warfare Center, NUWC-NPT Technical Report 11366, May 9, 2002. See also the earlier
work: Cares, J., Distributed Networked Operations: The Foundations of Network Centric
Warfare, Newport, RI: Alidade Press, 2021.
[18] For reference, the South China Sea is a marginal sea that is part of the Pacific Ocean,
encompassing an area from the Karimata and Malacca straits to the Strait of Taiwan of
around 3,500,000 km2 (1,400,000 mi2). The China Sea Basin, has a maximum depth of
5,016m.
154 Naval ISR Fusion Principles, Operations, and Technologies
[19] For a complete treatment of the applications for NCW, see: Distributed Data Fusion for
Network-Centric Operations, Hall, D., C-Y Chong, J. Llinas, and M. Liggins (eds), Boca
Raton: CRC Press, 2012.
[20] Based on examples in Chong, C. Y., “Distributed Architectures for Data Fusion,” Proc. 1st
Int. Conf. on Multisource-Multisensor Information Fusion, Las Vegas, NV, 1998.
[21] Jevti, M., N. Zogovi, and S. Graovac, “Multi-Sensor Data Fusion Architectures Revisited,
Information Society of Serbia,” 2019.
[22] For an in-depth treatment of tracking, see: Bar-Shalom, Y., Multitarget multisensor tracking:
Applications and Advances, Vol. I and II, Academic Press, 1990, 1992. Bar-Shalom, Y.,
L. Campo, “The Effect of the Common Process Noise on the Two-Sensor Fused Track
Covariance,” IEEE Trans. Aerospace and Electronic Systems, Vol. 22, pp. 803–805, 1986.
Bar-Shalom Y., and D. Blair, Multitarget Multisensor Tracking: Applications and Advances,
Vol. 3, Norwood, MA: Artech House, 2000.
[23] Chong, C-Y, S. Mori, K. C. Chang, and W. H. Barker, “Architectures and Algorithms for
Track Association and Fusion,” IEEE System Magazine, January 2000.
[24] Chong, C-Y, “Forty Years of Distributed Estimation: A Review of Noteworthy
Developments,” Proc. 11th Symposium Sensor Data Fusion, Bonn, Germany, 2017.
[25] See Ng, J., “A Distributed Sensor Network Architecture for Defense Against the Ship as
a Weapon in the Maritime Domain,” Monterey, CA: Naval Postgraduate School, 2011,
http://hdl.handle.net/10945/5698. Juliera, S. J., and R. Mittub, “Distributed Data Fusion
and Maritime Domain Awareness for Harbor Protection,” Naval Research Laboratory,
October 2006.
8
The Role of AI, Automation, and
Autonomy
While the applications of AI, automation, and autonomy are broad, in this
chapter we focus on the roles of these capabilities in ISR and its companion
process, C2 [1]. In addition, we must recognize that many automated ISR fu-
sion functions (especially correlation, association, combination, inference, and
estimation) have been applied in naval systems for decades and are now consid-
ered elements of AI.
For purposes of this chapter, we distinguish several key terms that refer to
a machine, a process, or a system [2]:
155
156 Naval ISR Fusion Principles, Operations, and Technologies
Table 8.1
Categories of Major AI Functions Related to the ISR OODA Loop
Sensing and
Knowledge Planning,
Representation Machine Learning Machine Reasoning Scheduling, Action
images, maritime shipping routes, loitering patterns, and more, the ML algo-
rithm can identify and classify a specific instance based on the learned char-
acteristics of the many examples. This was enabled by significantly improved
computation that enable neural networks to be massively expanded in nodes
and connections to represent classes or patterns in data.
Machine reasoning. Using sensed information about a current situation,
and a priori knowledge about the world (maritime routes, ports, adversary and
commercial ships, normal situations, threats, etc.) a machine can reason about
(or infer) the implication of the situation. The reasoning may be: (1) deduc-
tive—inferring a specific case (i.e., ships and aircraft converging on a target)
from a set of certain conditions (ship and aircraft tracks), or (2) abductive (rea-
soning to the best explanation of uncertain data) using probabilistic or other
uncertain representations.
Planning, scheduling, and action. Planning involves the representation of
environments, goals, constraints, objective (or utility) functions, and actions.
The planner computes the space of alternative actions and the relative utility
of each, then reasons about the effects and utility of those actions to choose
the optimal plan (or set of plans, since several could be of similar utility) and
schedule or sequence of actions that achieves the highest utility value. Planning
can be represented as a graph search problem where the graph nodes are system
states (current state, desired end state, and intermediate states) and the arcs are
actions. Each action has a cost and each path from desired to end state has a
plan cost and utility (for example, the time to archive the goal). The plan solu-
tion is the best path from the initial state to the end state that satisfies the goal
under constraints. The machine planner applies techniques to efficiently search
the space of a possible plan’s schedules. Even a simple plan problem, such as
choosing among seabed-to-space sensors (or sets of sensors) to select a best sens-
ing sequence to track a maritime target, creates a vast search space. Representa-
tion and search methods seek to apply compact representations and efficient
search methods. The ability to integrate these capabilities provide automation
for a range of naval applications (Table 8.2) that increase the volume, coverage,
speed, and completeness of ISR reporting.
While many of the mathematical and software functions listed earlier in
Table 8.1 have existed for decades (not under the label AI), it is the integration
of these capabilities into a learning, reasoning, planning, and adaptive system
that earns the status of an AI system. In maritime ISR and C2 systems, it is the
ability to automate the process to sense (observe), perceive and reason to assess
the situation (orient), conceive and weigh alternatives in the context of naval
tactics (decide), and then to execute C2 (act).
An example of such an automated ISR process was illustrated by the U.S.
National Reconnaissance Office (Figure 8.1) where an ISR collection system
(in this case a set of MultiINT satellites, as described in Chapter 9) is given a
160 Naval ISR Fusion Principles, Operations, and Technologies
Table 8.2
Automation Opportunities in Naval ISR and C2
Intelligence Example AI Automation Opportunities
Area Description/Functions for Maritime Fleet
Intelligence ·· Dynamically translate ·· Translate commander’s intent (qualitative)
strategy-to- intelligence strategy to to dynamic values to prioritize ISR
collection priorities based on changing collection.
planning, maritime situations. ·· Translate priorities to quantitative values to
tasking optimize ISR collection alternatives.
ISR Sensor ·· Dynamically coordinate focus ·· Automate the networking of unmanned
Collection of collection attention on high- collection vehicles (space, air, surface, or
priority emergent events and undersea) and seabed sensor networks.
activities. ·· Automatically coordinate sensing across all
·· Adapt to plan and reschedule domains (and with other elements of joint
an entire network of collection all-domain forces).
systems to reconstitute after ·· Increase autonomy in high-risk, high-payoff
network disruption. automated cyber protection and collection.
·· Optimize or conserve resources ·· Autonomous, miniature robotic systems
based on intelligence value. are being applied in maritime surveillance,
·· Autonomous sensors reconnaissance, and comm relay (air
and actuators capable of vehicles, surface vessels, and undersea
evasion, deception, resource vessels) [9]. Autonomously respond to
optimization, and self- threats to collection systems (e.g., UAVs
preservation. or UUVs).
·· Autonomous surface and seabed sensor
networks report on relevant and anomalous
activities [10].
ISR Processing, ·· Screen and classify massive ·· Screen massive maritime data for naval
Analysis, and data for objects, events, and vessel vs merchant ships and enhance
Dissemination activities. automated ship OBP.
·· Correlate spatially, temporally, ·· Cloud-based correlation of maritime object
or causally related data across reports across all INTs.
all INTs. ·· Cue analysts to suspicious objects, events,
·· Anticipate future activities and activities.
based on ML activity models. ·· Screen open-source media and social
·· Automated natural language media to anticipate civil population
generation and report writing. sentiment, social events, and disruptions
·· Dynamically adapt processing [11].
resources based on current
situation.
C2 for Naval ·· Automate elements of scenario ·· Conduct human-machine assessment,
Operations analysis, planning, and machine generates potential adversary
decision-making. maneuvers;
·· Automate continuous real-time ·· Human-machine decision-making support;
contingency assessment. ·· Machine-based counterdeception cueing
to adversary AI, EW, or other deception
moves.
psychology and management science in the early 1990s [14], and has now ex-
panded to fields as diverse as business, law, medicine, law enforcement, and
of course military and intelligence analysis. Sensemaking goes beyond the de-
velopment of situational awareness and seeks to inform the selection of COAs
which may be taken in response to the developing situation.
In a naval warfare context, sensemaking involves correctly assessing the
situation both afloat and ashore in the region of interest. The data considered
could include object location and identity obtained by two categories of data:
The timeframe for hard and soft data can be quite different—hard sen-
sors operate in the moment, while soft sensors may accumulate data relevant to
a maritime situation over a course of days or even months. Sensemaking must
consider data that informs the location and disposition of friendly and allied
forces; neutral forces must be considered as well as enemy forces. Not surpris-
ingly, it is the disposition of enemy forces, and the feasibility and benefit of
one’s own various COAs that naval officers state they find most beneficial to
sensemaking [15]. The geographic extent of naval engagements can be huge,
which leads to large volumes of data that feed into the sensemaking process. Au-
tomation will be required to organize and analyze the information in a timely
manner. This is also true for relatively small areas where naval activity levels are
high [16].
A traditional view of the ISR data gathering process begins with an under-
standing of the concepts of sensing and discovery as they relate to sensemaking.
By sensing we mean the act of applying a system to an area of physical space
or cyberspace over a period of time to collect information. Discovery involves
sensing an area where the entities in the area are not known to exist. The sens-
ing in this case can reveal new entities—examples might include a search radar
discovering aircraft entering its search area, or a web-scraping tool turning up
several keyword hits on a heretofore unknown website. Sensing can be applied
in a more targeted sense as well, seeking to add to or clarify the status of an
entity or location already discovered.
Any strategy for gathering data for sensemaking must first reconcile with
whether sensemaking is viewed as a top-down process or a bottom-up process.
Some argue that sensemaking begins with data—data is collected, processed,
The Role of AI, Automation, and Autonomy 163
Table 8.3
Comparison of Sensemaking Models
Pirolli & Card
Outer Loop Sensemaking Data Fusion Sensemaking Example Methods
Data (Klein), Data Collection, Observation Radar, imaging,
foraging (Pirolli sensing collection schedule
& Card) optimization
Shoebox of Entity resolution Objects resolved Correlation and
potentially where objects association, OBP
relevant data are distinguished
Evidence Track association, Object relations, Kalman filter,
grouping relational graphs multihypothesis
tracking
Frame (Klein), Schema Spatial grid, Situation Concept diagrams,
sensemaking the maritime recognition geospatial, graphs
(Pirolli & Card) situation (relational, entity-
assessment relationship, social
networks), temporal
event sequence,
causal graphs
Hypothesis Alternative Situation projection Storytelling
situations
Reality/policy Search for Collection tasking Multihypothesis Evidence-based
loop (Pirolli & support reasoning reasoning
Card) Revaluate Ideation: The Hypothesis generation
process of idea
creation
Such nets can directly represent the structure of input evidence variables, rela-
tions between evidence and hypotheses (inferences represented as conditional
probabilities), and the output hypotheses [21]. As evidence nodes in a Bayes net
are adjusted, the change in probability of belief for each hypothesis is adjusted.
Similarly, a Dempster-Schaeffer representation of the hypothesis could explic-
itly account for the uncertainty in the situation, which each potential sensing
action could reduce accordingly [22]. The second consideration is the value
that resolving a given situation has in the eyes of the decision makers. This can
often be somewhat subjective, but once high-level objectives are assigned rela-
tive value, it is possible to flow down values to the information related to the
branches of each situation. One formulation of these is the goal lattice approach
proposed by Hintz [22].
In extreme cases, decision makers may find themselves facing a situation
where no existing hypothesis fits the situation that is unfolding. In such cases,
a new hypothesis must be generated. Analysts must often then attempt to orga-
nize data according to different clustering strategies and attempt to discover and
The Role of AI, Automation, and Autonomy 165
8.3 C2 Automation
The previous section considered AI applications in ISR systems where collec-
tion efficiency and effectiveness are paramount. We now briefly consider the
application of these methods to command where the commander issues orders
for the purpose of bringing about a particular action and control to organize
and employ forces to achieve the effects of command decisions. Specifically, we
address the automation in C2 systems—the facilities, equipment, communica-
tions, procedures, and personnel essential for a commander to plan, direct, and
control operations of forces pursuant to the missions assigned [38].
NATO explored C2 systems anticipating network centric distribution of
forces and developed a basic reference model of the elements of C2 (Figure 8.2,
adapted for this chapter) [39]. Figure 8.2 highlights the areas that will benefit
from A technologies that may include automated functions and human-ma-
chine automation. The figure distinguishes the fundamental elements in both
ISR sensemaking and C2 decision-making with the areas of automation labeled.
The emphasis in the NATO model was on distinguishing an individual unit’s
awareness and shared awareness, and the value chain measured by the quality of
information provided by ISR (e.g., detection, identification, and tracking) and
the quality of decisions that result from informed decision-making (measured
by effect on naval outcomes).
The model recognized the ISR-C2 control loop could be implemented
on a network, and that introduces three fundamental dimensions that must be
considered:
Figure 8.2 NATO C2 reference model with opportunities for automation. (Figure adapted from [39].)
The Role of AI, Automation, and Autonomy 169
Table 8.4
Five Conceptual Levels of C2 Distinguished by Degrees of Distribution
Level of Allocation of Patterns of Interaction Distribution of
Maturity Command Among Participants Information
5. Edge C2, full Not explicit, self-Unlimited interaction All receive shared
DMO allocated (emergent,
as required to achieve awareness information,
tailored, dynamic) objective shared effects information
4. Collaborative Collaborative process
Significant Info distributed on
C2, collab DMO and shared plan collaboration areas-
functions
3. Coordinated C2, Coordination process Limited and focused Info distributed on
DMO and linked plans interaction as required coordination areas-
functions
2. Deconflicted C2 Establish Very limited and focused Information distributed to
deconfliction to achieve command constrain and close gaps
constraints
1. Conflicted C2 Centralized, no None, follow command Only organic information
allocation
From: [41].
Table 8.5
Practices for Representing ISR and C2 Objectives and Tradeoffs
Key Practices Naval Op Application Example
1. Consider and ·· For automated sensemaking, specify and document all operating
document value thresholds that have implications for performance (e.g., precision and
considerations in recall).
AI systems and ·· Specify and document all decision tradeoffs and methods of managing
components. uncertainty (measuring, codifying, and combining uncertainty).
·· Specify and define rationale for all acceptable thresholds for false
positives and false negatives (for detection, identification, and
classification).
2. Consider and ·· For ISR collection optimization processes, particularly specify goals,
document value objective functions, weighting criteria for each, and trades.
considerations in AI ·· For C2 decision-making support, specify and document logical limits
systems that rely on based on disallowed outcomes, and constraints on allowed performance.
representations of Also define and document out-of-bound areas where the automated
objective functions. system cannot perform properly (disallowed operating regimes).
3. Conduct ·· For C2 planning systems, identify context-specific changes in goals or
documentation, objectives that would require a revision of parameters on settings or
reviews, and set limits weightings on factors.
based on disallowed ·· Test sensemaking and C2 systems on specific use cases over a wide
outcomes. range of conditions, including out-of-bound conditions, and adversarial AI
deception conditions.
From: [47].
The Role of AI, Automation, and Autonomy 171
Table 8.6
Candidates for Automated Processes in the Kandigan Straits Scenario
Day Activity Candidates for Automated Processes
Day 1. Exploit space EO imagery ·· Satellite onboard screening of ship objects and cross-
1 and SAR to locate the Red SAG satellite cueing to enable reacquisition and high revisit
force; track the SAG. key targets.
·· Red ship classification by EO-SAR fusion.
2. Estimate likely target island(s) ·· Using previously machine-learned patterns of behavior of
and landing sites. Direct the Red fleet, staff-machine teams perform C2 planning;
available ISR to identify any Red run exploratory simulations of alternative Red scenarios
mining operations. and alternative Blue COAs.
·· Initiate ISR task planning simulations to prioritize space
and coordinated unmanned autonomous collection
missions.
3. Deploy USVs, UUVs, and ·· Deploy unmanned reconnaissance air vehicles, surface
persistent UAVs and task vessels on autonomous reconnaissance, and relay
submarines to predeployed missions.
seabed sonar sensors. Track ·· Autoallocate seabed-to-space space sensing to track high-
Red SAG, submarines, and air priority vessels, monitor air activity, and missile sites.
support.
4. Monitor civilian channels ·· Using machine-learned RF traffic patterns, autoadapt
in social to estimate popular SIGINT and cyber monitors to exploit reporting and
support/opposition. estimate civilian sentient, and focus SIGINT on Red C2
actions.
5. Receive strategic guidance ·· Staff-machine teams update C2 and ISR planning based on
updates; position for new guidance; run exploratory simulations of alternative
surveillance. Red attack scenarios and effects of alternative Blue COAs.
Day 1. Receive strategic guidance ·· Update persistent space surveillance and air
2 and prepare C2 plans for reconnaissance tasking to assess readiness of shore-
engagement; focus ISR planning based missile sites.
to support cooperative long- ·· Update C2 planning for long-range engagement of Red
range missile engagement SAG.
supported by USVs and UAVs in ·· Reposition UAVs and USVs to preform relay for
terminal phase. cooperative engagement of Red SAGs.
2. Locate Red subsurface ·· Autoplan locations of UUVs to relay acoustic reporting to
threats; employ UUVs and Blue SAG; relay commands to task acoustic sensors to
seabed sensors to locate the autonomously report high-priority subsurface targets.
Red submarine threat. ·· Staff-machine teams simulate Red submarine maneuvers
and reallocate all subsurface sensing.
3. Track Red fleet; task satellite; ·· Staff-machine teams run battle management simulations
manage organic UAVs tracking to select COAs that support special forces operations.
and relay for cooperative ·· Autonomous UAVs and USVs position for strike support
surface-surface missile and endearment relay.
engagements.
4. Monitor Red C2 channels to ·· Plan and initiate coordinated and distributed counter C2
support jamming operations; disruption and deception; monitor effects and continuously
analyze the traffic patterns. Map adapt.
cyber network data to engage
Red cyber networks.
5. Monitor civilian channels; ·· Autoextract, filter major opposition sources and channels;
conduct counterinformation simulate effects of alternative counterinfo campaigns
campaign. and provide to IP Staff to counter misinformation and
opposition sources.
172 Naval ISR Fusion Principles, Operations, and Technologies
Endnotes
[1] For a wider consideration of naval applications, see Heller, C. H. (2019) “The Future
Navy—Near-Term Applications of Artificial Intelligence,” Naval War College Review,
Vol. 72, No. 4, Article 7, 2019, https://digital-commons.usnwc.edu/nwc-review/vol72/
iss4/7.
[2] Terms adapted from Shattuck, L. G., “Transitioning to Autonomy: A Human Systems
Integration Perspective,” Presentation at Transitioning to Autonomy: Changes in the Role
of Humans in Air Transportation, March 11, 2015, p. 5, human-factors.arc.nasa.gov/
workshop/autonomy/download/presentations/Shaddock%20.pdf.
[3] We adopt the very basic Merriam-Webster definition, then provide our own description
of human behaviors. The English Oxford Living Dictionary defines these behaviors as vi-
sual perception, speech recognition, decision-making, and translation between languages.
Different definitions of AI distinguish between whether a capability just thinks rationally,
thinks like a human, or externally appears to act like a human (or is indistinguishable
from a human).
[4] “Summer Study on Autonomy,” Defense Science Board, Office of the Under Secretary of
Defense for Acquisition, Technology and Logistics, Washington, D.C., June 2016.
The Role of AI, Automation, and Autonomy 173
[5] Hughes, W., and R. Girrier, Fleet Tactics and Naval Operations, Annapolis, MD: Naval
Institute Press, 2018, p. 191.
[6] “Establishment of an Algorithmic Warfare Cross-Functional Team (Project Maven)” Dep-
uty Secretary of Defense, DoD Memorandum, April 26, 2017.
[7] The OODA loop was developed by Col. John Warden and is a high-level model of the
military ISR and C2 loop that considers the human decision-making role and its depen-
dence on observation and orientation (orienting observations in a perceptual framework
for decision-making). The OODA model applies to ISR which provides the observe func-
tion and the C2 process (orientation to the mission, decision analysis, and decision). The
act process includes military actions, as well ISR collection tasking and sensor control. See
Boyd, J. R., “The Essence of Winning and Losing,” unpublished briefing, January 1996.
Also see Hammond, G. T., The Mind of War: John Boyd and American Security, Washing-
ton D.C.: Smithsonian Institute Press, 2001; and Coram, R., Boyd: The Fighter Pilot Who
Changed the Art of War, Boston, MA: Little, Brown, 2002.
[8] There exist many taxonomies of AI technology elements. For a comprehensive comput-
ing taxonomy see the ACM Computing Classification System (https://dl.acm.org/ccs).
See the categories and subcategories of AI topics in the ACM taxonomy at http://aima.
cs.berkeley.edu/topics.html.
[9] Department of the Navy, Unmanned Campaign Framework, March 16, 2021.
[10] Heidelmann, J., M. Stovanovic, and M. Zorz, “Underwater Sensor Networks: Applications,
Advances and Challenges,” Phil. Trans. Royal Society A (2012) 370, pp. 158–175, https://
royalsocietypublishing.org/doi/pdf/10.1098/rsta.2011.0214.
[11] Sathappan, M., et al., “EMBERS at 4 Years: Experiences Operating an Open Source
Indicators Forecasting System,” March 31, 2016, arXiv:1604.00033v1 [cs.CY].
[12] Figure adopted from the NRO Director’s comments at http://geointv.com/archive/geoint-
2013-keynote-betty-j-sapp/, “Future Ground Experiment Called Sentient” section at
12:36 in the video segment. The Figure is adopted from the graphic that Director Sapp is
describing in the transcript. April 2014.
[13] Bosch, J., H. H. Olsson, and I. Cmcovik, “Engineering AI Systems: A Research Agenda,”
June 3, 2020, https://arxiv.org/pdf/2001.07522.pdf.
[14] Weick, K. E., Sensemaking in Organizations, Vol. 3., Sage, 1995.
[15] Waldenström, C., “What is Difficult in Naval Sensemaking,” in Proceedings of the 13th
International Command and Control Research and Technology Symposium, 2008.
[16] Lim, N., and C. De Xian, “Maritime Sense-Making and The Role of Big Data Analytics
for Enhancing Maritime Security,” 2020.
[17] Moon, B. M., and R. R. Hoffman. “How Might ‘Transformational’ Technologies and
Concepts Be Barriers to Sensemaking in Intelligence Analysis,” in Presentation at the
Seventh International Conference on Naturalistic Decision Making, 2005.
[18] Klein, G., J. K. Phillips, E. L. Rall, and D. A. Peluso, “A Data-Frame Theory of
Sensemaking,” in Expertise Out of Context: Proceedings of the Sixth International Conference
on Naturalistic Decision Making, New York: Lawrence Erlbaum Associates, Vol. 113, 2007.
174 Naval ISR Fusion Principles, Operations, and Technologies
[19] Pirolli, P., and S. K. Card, “The Sensemaking Process and Leverage Points for Analyst
Technology,” paper presented at the International Conference on Intelligence Analysis,
McLean, VA, May 2005.
[20] Tecuci, G., D. Marcu, M. Boicu, and L. Kaiser, “Instructing a Cognitive Agent to Perform
Sensemaking in Intelligence, Surveillance and Reconnaissance,” in Proceedings of the Eight
Annual Conference on Advances in Cognitive Systems, 2020, pp. 10–12.
[21] The Bayes Network is a fundamental mechanism for probabilistic inference, is a mature
mathematical method, and has been employed since the earliest days of expert AI
system. For classic introduction, see J. Pearl, Probabilistic Reasoning in Intelligent Systems,
Burlington, MA: Morgan Kaufmann, 1998.
[22] Hintz, K. J., Sensor Management in ISR, Norwood, MA: Artech House, 2020.
[23] Hoffman, Robert R., Tom Eskridge, Simon Henderson, Jonathan Jenkins, and Brian
Moon. “Propositional Diagrams for Intelligence Sensemaking: Examples and Case
Studies,” American Intelligence Journal, Vol. 32, No. 1, 2015, pp. 122–135.
[24] Koopman, Bernard O, “A Theoretical Basis for Method of Search and Screening,”
Columbia University, New York, 1946.
[25] Biltgen, P., and S. Ryan, Activity-Based Intelligence: Principles and Applications, Norwood,
MA: Artech House, 2016.
[26] Antony, R. T., Data Fusion Support to Activity-Based Intelligence, Norwood, MA: Artech
House, 2015.
[27] Pitsikalis, M., and A. Artikis, “Composite Maritime Event Recognition,” in Guide to
Maritime Informatics, Springer, Cham, 2021, pp. 233–260.
[28] Gingrass, C., D. I. Singham, and M. P. Atkinson. “Shape Analysis of Flight Trajectories
Using Neural Networks,” Journal of Aerospace Information Systems, Vol. 18, No. 11, 2021,
pp. 762–773.
[29] Vouros, G. A., et al. “Increasing Maritime Situation Awareness Via Trajectory Detection,
Enrichment and Recognition of Events,” in International Symposium on Web and Wireless
Geographical Information Systems, Springer, Cham, 2018, pp. 130–140.
[30] Casas, S., C. Gulino, R. Liao, and R. Urtasun. “SpAGNN: Spatially-Aware Graph Neural
Networks for Relational Behavior Forecasting from Sensor Data,” in IEEE International
Conference on Robotics and Automation (ICRA), 2020, pp. 9491–9497.
[31] Marié, V., I. Bechar, and F. Bouchara, “Real-time maritime situation awareness based on
deep learning with dynamic anchors,” in 15th IEEE International Conference on Advanced
Video and Signal Based Surveillance (AVSS), 2018, pp. 1–6.
[32] Hoffman, R. R., T. Eskridge, S. Henderson, J. Jenkins, and B. Moon. “Propositional
Diagrams for Intelligence Sensemaking: Examples and Case Studies,” American Intelligence
Journal, Vol. 32, No. 1, 2015, pp. 122–135.
[33] Chan, J., S. Dang, and S. P. Dow. “Comparing Different Sensemaking Approaches for
Large-Scale Ideation,” in Proceedings of the 2016 CHI Conference on Human Factors in
Computing Systems, 2016, pp. 2717–2728.
[34] Ancona, D., “Framing and Acting in the Unknown,” S. Snook, N. Nohria, & R. Khurana
(eds), The Handbook for Teaching Leadership, 2012, pp. 3–19.
The Role of AI, Automation, and Autonomy 175
Defense Law of War Manual, U.S. Department of Defense (Dec. 2016), https://dod.
defense.gov/Portals/1/Documents/pubs/DoD%20Law%20of%20War%20Manual%20
-%20June%202015%20Updated%20Dec%202016.pdf?ver=2016-12-13-172036-190.
[47] “Key Considerations for the Responsible Development and Fielding of Artificial
Intelligence,” National Security Commission on Artificial Intelligence (NSCAI), April 26,
2021.
[48] Department of Defense Directive 3000.09 on Autonomy in Weapons Systems, U.S.
Department of Defense November 21, 2012, p. 2, https://www.esd.whs.mil/Portals/54/
Documents/DD/issuances/dodd/300009p.pdf.
9
Distributed Space Maritime Surveillance
The importance of space in naval reconnaissance was recognized early in the
twentieth century. Aerial surveillance had proved its utility as early as the Amer-
ican Civil War via the use of manned lighter-than-air balloons and continued
to mature as powered aircraft took on patrol roles during World War I, the
interwar years, and World War II. Indeed, aerial reconnaissance was often the
decisive factor in the carrier battles in the Pacific Theater, the Battle of Mid-
way being a prime example. Although the technology to gain a foothold in
space would not be available until the mid–twentieth century, writers had been
speculating about it in the nineteenth century and fanciful and serious science
fiction addressed the topic throughout the early twentieth century. It is no sur-
prise then that strategic thinkers in the U.S. Navy were poised to act when space
technology came within reach shortly after World War II, forming a Commit-
tee for Evaluating the Feasibility of Space Rocketry on October 9, 1945 [1].
Throughout the late 1940s, the U.S. Navy continued to develop con-
cepts for reconnaissance and communication relay satellites. By 1955 the White
House announced that the United States would launch an Earth-orbiting satel-
lite in the International Geophysical Year 1957–1958. Much to the embarrass-
ment of the United States, the Soviet Union was first to space with Sputnik in
October 1957. The effect was to prompt U.S. politicians to accelerate the U.S.
space programs, both military and civilian [2]. In 1958 the Navy conceived of
using a satellite to “raise the periscope” of a submarine-based ELINT system by
placing it on a satellite. The resulting program, DYNO, was a highly classified
program at the time, and was given cover as an unclassified scientific research
mission known as GRAB (Galactic Radiation and Background). The GRAB/
DYNO satellites launched beginning in June 1960 and were capable of collect-
ing ELINT on Soviet intercontinental ballistic missiles (ICMB) early warning
177
178 Naval ISR Fusion Principles, Operations, and Technologies
radars, making them the world’s first reconnaissance satellites. Although the
program was short-lived (ending in 1962), it was followed by a similar program
(POPPY), and by the mid-1960s satellite reconnaissance had become a perma-
nent strategic priority [3].
The vital need for space-based photographic reconnaissance was made
evident when Gary Powers’ U-2 reconnaissance aircraft was shot down over the
Soviet Union in May 1960. Manned overflights were discontinued, and the
launch of the CORONA satellite system only 3 months later became the only
realistic means of monitoring the USSR’s nuclear arsenal [3]. Even with early
photoreconnaissance technology (40-ft spatial resolution and a requirement to
drop film canisters to a recovery aircraft) CORONA proved how invaluable sat-
ellite reconnaissance could be in surveilling targets deep within denied enemy
territory [4].
By the early 2000s most modern naval forces have become reliant on their
own space assets or leveraged assets for communications, C2, ISR, navigation,
and METOC services. Furthermore, even nations that have invested heavily in
space technology must continually upgrade and replace aging systems, a task
that has traditionally been challenging considering the multi–billion dollar
costs and multiyear design times that have until the last 5-10 years been typi-
cal for satellite systems. In 2005 the U.S. Navy articulated its needs for space
capabilities as shown in Table 9.1. These needs are expected to continue to be
relevant for many decades into the future.
Table 9.1
Navy Space Mission Areas
Capabilities Required for Navy Strike
Space Mission Area Missions
ISR: Responsive persistent ISR (imagery and signals) Target identification, location, and tracking,
of static and moving targets ELINT-enabled target identification
Meteorology and oceanography: Continuous tactical Steaming direction for carrier aircraft
weather prediction, cue appropriate ISR assets launch, maximum steaming speed
depending upon acoustic/thermal modeling of the
littorals, weather
Communications: All information must be moved, Air tasking orders, precision weapon target
often at BLOS ranges, sensor-analysis-decisions- coordinates, intelligence coordination,
shooter-weapon links mission plans
Theater and ballistic missile defense: Defense- Fleet defense rom ballistic and hypersonic
enabled freedom of maneuver missiles
Position, navigation, and timing: Global Positioning Precision target location, GPS-guided
System (GPS) location information, GPS-timing munitions
enables communications coordination
Space control: Ensure access to national space assets Information operations via space links
and provide protection from detection by hostile enabled
assets
From: [5].
Distributed Space Maritime Surveillance 179
Throughout the Cold War and into the early twenty-first century, the
U.S. Navy led the world in application of undersea and space technology to
surveillance in the maritime domain. However, in the last decade changes in the
economics of Earth observation services have enabled other nations to have ac-
cess to improved maritime surveillance. The current availability of commercial
spacecraft individually and in constellations for all international navies increases
the contribution of space collection and communication to all international na-
vies. This capability is very significant and is a disruptive technology, enabling
new and rapid ISR capabilities and rendering the oceans nearly transparent
under some circumstances. This chapter introduces the disruption that large
sensing and communication constellations enable.
Table 9.2
2022 Major U.S. Commercial Earth Observation Constellations (At the Time of This Book)
Constellation Approximate Revisit Rate of Full
Vendor Description Constellation
Planet Dove EO more than 150 Dove 3U CubeSats Up to 12 visits per day (daytime
at medium res, and 21 SkySats at imagery) or once per hour
high-resolution. Dove provides daily
imaging of the Earth
Blacksky EO 24 satellites inclined orbit full Peak of 15 hourly visits per day over
constellation certain locations with 12 satellites
Capella SAR full constellation 36 vehicles Less than 1 hour revisit with full
constellation
HawkEye 360 RF emissions location by a cluster Average global revisit rate will be
of three spacecraft that geolocate less than 1 hour
signals: Plan 7 3-satellite clusters
Maxar Maxar WorldView-1, -2,-3 and GeoEye-1 Average revisit time of <1 day
pan and multispectral imagers, (WorldView-3)
imaging 5-cm class resolution
Legion EO constellation 6 satellite, Up to 15 revisits per day
planned operations begin with first
2 satellites in 2023 [16] 30-cm class
resolution
Distributed Space Maritime Surveillance 181
Sats called Doves, weighing only 11 lbs, and (2) augment the low-resolution
Dove constellation with a smaller number of high-resolution SkySat smallsats
(purchased from Google, who launched them with the name SkyBox). The
SkySat craft are still small, but much larger than the Dove’s, measuring 80
cm in length and weighing 220 lbs [18]. Most of the mission use cases that
Planet is marketing do not require exquisite spatial resolution. For municipal
planning, energy use prediction, agricultural monitoring, and mapping mining
activity, a resolution of 1m to 3m is sufficient to estimate the size of areas being
monitored.
Daily coverage is probably adequate for frequency of industrial/agricul-
tural updates, but for other use cases, such as naval fleet monitoring and disaster
management where wildfires and floodwaters need to be tracked, daily coverage
is barely enough. Planet seems to have made a compromise here. No doubt, this
is tied to the goal of providing daily change detection. For visible and thermal
imaging applications, changes in time of day can make significant differences
in the image interpretation due to changes in shadow length, contrast, reflec-
tivity, and thermal variations. For this reason, it is desirable to perform change
detection on images taken at the same time of day. Planet accordingly chose a
450-km high sun-synchronous orbit (SSO) at a 97-deg inclination for the set of
spacecrafts known as the Flock 3p constellation (Doves fly in Flocks).
Finally, though most customers would be satisfied with visible-band im-
agery, the agricultural customers need more information. For monitoring crop
health, it is essential to also have the NIR spectrum available, so Planet has se-
lected sensors that enable them to capture the four bands in the visible-to-NIR
spectral range in a single camera with a 90-mm aperture, fixed pointing straight
down (nadir).
In order to meet the daily revisit requirement, the constellation design
called for 150 satellites in SSO, each taking an image once per second. Planet
accomplished this over several launches, the largest launch taking place on Feb-
ruary 14, 2017 when the Flock 3p constellation of 88 Dove 3U CubeSats was
launched on a single vehicle, India’s ISRO PSLV-C37. Planet currently has over
180 satellites in operation and their products generated $113M in revenue in
2020 while they estimate a future market potential of $75B [19].
[20]. The X-band radar used by Capella can provide resolution as fine as 35 cm
in high-res spot mode. There are also sliding spotlight (50-cm resolution) and
stripmap (2m resolution) modes [21]. While Capella can reach a good portion
of the Earth’s surface, the 220-lb smallsat design is somewhat limited in power
and can only provide 9 minutes of collection each orbit [21].
Capella’s initial commercial constellation, known as Sequoia, had six sat-
ellites in a 535-km, 45-degree inclination orbit, with a total of 40 satellites
planned. This will allow customers to schedule collections from 1 to 7 days
in advance. Sequoia checks for schedule updates every 15 min but maintains
a strict “no-bump” policy, manning that scheduled tasks will not be cancelled
to accommodate newer requests [22]. The 40 satellites will provide daily revisit
rates in the coverage area. Note that daily coverage is obtained with far fewer
satellites than required for the Planet Labs constellation. There are two factors
contributing to this: (1) a smaller coverage area, extending only to −48.9°S to
+48.9°N, and (2) the ability to point the sensor 45 degrees from nadir [21],
compared to Dove’s 97-degree angle of inclination and fixed nadir sensor.
It is important to notice that the Dove and Capella imaging capabilities
are quite different. The Dove SSO and fixed nadir-pointing sensor is purpose-
fully designed to achieve a change detection capability, comparing identical
day-day images. Dove was never designed for target surveillance of the open
ocean, though its imaging does collect images that provide vessel-detection
quality products. On the other hand, Capella offers taskable SAR collection
which seems of potential utility to maritime surveillance mission. Several fac-
tors that distinguish the utility of SAR versus EO sensors include the fact that
SAR does not require separate illumination and can therefore create images at
night and through weather; EO imagery is daytime only and is occluded by
clouds. We use these commercial imaging satellites for illustrative purposes, and
do not imply that in their current form they are immediately suitable for the
maritime mission.
example, AIS is a required navigation signal on all vessels above a given size.
AIS was originally intended for use from ship-to-shore and ship-to-ship use for
safety of navigation [25]. In this capacity, AIS is limited to a range of about 20
nautical miles. With the capability of monitoring AIS continually from space,
nefarious activities such as illegal fishing, smuggling, and even piracy can be
detected. For example, analytics have been developed to detect illegal fishing
based on the tendency of vessels to turn off their AIS beacons when approach-
ing restricted fishing areas [26, 27]. Detecting these activities is only practical
when space-based observation makes it possible to continually observe patterns
of vessel activity in the open ocean, far beyond the range of shore-based sensors.
The HawkEye constellation will consist of seven clusters of three satellites
per cluster and will provide a revisit time of only 40 minutes virtually anywhere
on the Earth. Three clusters were launched by the end of 2021 [28]. The 15-kg
satellites measure 40 × 27 × 20 cm. By operating in a cluster of three, they can
accurately geolocate signals to within a few hundred meters [29].
• A space transport layer is a global mesh network providing 24/7 data and
communications. The key technology required is an optical intersatel-
lite link (OISL) to provide reconfigurable, multiprotocol, intersatellite
optical communications with the ability to connect heterogeneous con-
stellations that operate on different OISL specifications, operating on
platforms in LEO.
• A tracking layer: Provides tracking, targeting, and advanced warning of
missile threats.
• A custody layer: Provides “all-weather custody of all identified time-crit-
ical targets” [33].
• A deterrence layer: Provides space situational awareness—detecting and
tracking objects in space to help satellites avoid collisions.
Figure 9.2 A top-level constellation mission and system design process [48].
establish the effectiveness of the system to meet the mission of monitoring di-
verse sites and activities in the Kandigan Straits mainland (Red), island country
(Green), and contested island areas:
Figure 9.3 Derivation of ISR observation requirements from mission objectives O3 and O4.
190 Naval ISR Fusion Principles, Operations, and Technologies
Table 9.3
Summary of the Constellation and Space Vehicle Design Steps
Resulting
Analysis Steps Tradeoffs Considered Products
1. Select orbital ·· Apogee-Perigee, circular? ·· ISR coverage,
options for one ·· Inclination, orbit type, (e.g., SSO) in which the revisit, target
spacecraft satellite passes over any given point of the capacity.
planet’s surface at the same local time.
·· Revisit and coverage per spacecraft.
·· Trades between coverage, revisit, access.
·· Sensitivity to altitude, inclination.
2. Select constellation ·· Constellation revisit and coverage; ·· Constellation size,
type and size [STK] ·· Constellation type (e.g., Walker constellation configuration,
that consists of a set of satellites (t) that are and achieved
in circular orbits and have the same period and coverage.
inclination). Satellites (s) are evenly spaced in
each of the orbital planes (p) specified so that t
= sp.
3. Assess sensor ·· FOV access; ·· ISR sensor access
accesses to target for ·· Expected performance (GSD); performance.
sensor FOV ·· Sensor aperture vs performance.
4. Communication to ·· Downlink data volume from sensor for targets; ·· Communication
downlink data ·· Data rate and storage configuration;
·· Relay capability hypothesized; ·· Threat analysis.
·· Data link trades and impact on sensing capability;
·· Consider benefits of relay, cross-satellite links to
meet requirements.
5. Baseline ·· Orbital dynamics, geometry, maneuver needs ·· Spacecraft
analysis; velocity change
·· Estimate overall ∆V demands for lifetime. (∆V) demands.
6. ISR sensor ·· Assess altitude and elevation angles to ·· Optical design.
payload—optics investigate the impact of these decisions on the
design of the payload.
7. ISR sensor ·· Evaluate alternative sensor payloads, sensor ·· Sensor,
payload—physical pointing, slewing, and integration; processing, and
sizing and data rate ·· Analyze data rate, onboard store-forward, and downlink.
downlink requirements.
8. System sizing ·· Analyze, select type of attitude control; ·· Spacecraft
summary [SMAD] ·· Analyze, select primary power source; baseline design.
·· Analyze, select type of structure;
·· Analyze, select type of communications;
·· Analyze, select type of propulsion system
evaluate the baseline SC bus—preliminary sizing;
·· Assess deviations and compare to reference
example.
9. Communications ·· Evaluate mission data download strategy and ·· Downlink budget
analysis: effect on data rate, storage, power, and so on; and margin;
Downlink; ·· Assess downlink strategy impact on coverage and ·· Uplink budget and
Uplink. latency; margin.
·· Assess downlink and uplink parameters and link
margins.
10. Launch vehicle ·· Assess alternative launch options. ·· Launch method,
information schedule.
Distributed Space Maritime Surveillance 191
Step 5 and Step 6: Perform constellation cost modeling. The spacecraft and
ground costs are estimated, as well as launch and operational costs to develop
a lifecycle cost. These estimates are compared to comparable prior systems and
established cost models. This step establishes the baseline design (constellation,
spacecraft, links, ground enterprise) and cost models.
Step 7: Effectiveness assessment. Throughout the design process, assess the
degree to which the entire system achieves the mission goals and refine the base-
line. While Figure 9.3 illustrates a single end-of-cycle assessment, the process
is performed throughout the design process to understand how design changes
(e.g., changes in spacecraft performance, number of spacecrafts, and ground
station coverage) impact the effectiveness to meet mission goals. This process
may include the use of simulations that represent the dynamic constellation
and its access to the Kandigan Straits and a simulation of dynamic naval forces
(of varying sizes and compositions in different scenarios) to determine the ISR
performance and contribution to fleet mission effectiveness.
Table 9.4
EO Constellation Options Considered
1. Planet’s initial Flock 3P 2. Big Flock—triple the 3. Modified Orbit Flock (88
(88 3U CubeSats): number of CubeSats in 3U CubeSats):
·· Spatial resolution of 3m; abovementioned example (264 ·· Same constellation of 88
·· Polar orbit, 97-deg 3U CubeSats): DOVE’s but incline orbit
inclination; ·· Orbit and resolution are to 23 degrees. Inclining
·· Nadir pointing only; unchanged; the orbit eliminates the
·· Revisit rate: 5.7 hrs. ·· Revisit rate improves to 2 wasted time that the
hrs. satellites are not focused
on our specific area.
·· Revisit time: 2.7 hours.
4. Modified Dove design (22 6U CubeSats):
·· Use a 6U CubeSat that improves on the 3U Dove in two important ways;
·· Larger aperture (90 mm) for sub 2m resolution imager;
·· Ability to point up to 30 degrees off-nadir axis;
·· Maintain 88 satellites in 23-degree orbit, revisit rate: 2.2 hours.
5. Best solution: optimal modified Dove (22 6U CubeSats):
·· Since the pointing capability did not substantially improve the revisit rate in the 88
satellite, inclined orbit constellation, we can deduce that we could reduce the number of
satellites and still meet our coverage goals; 22-satellite constellation was optimal;
·· Revisit rate 2.3 hrs.
Table 9.5
SAR Constellation Options Considered
1. Single Capella-like satellite 2. Capella 12 satellites: 3. Capella 36 satellites (Capella
in 97-deg SSO: ·· 1.3-hr revisit rate. full constellation):
·· 14-hr revisit time. ·· 0.8-hr revisit time.
4. Best solution: 2 satellites in 18-degree inclined orbit:
·· Same principle as inclining orbit of the Dove-like CubeSats, but the wider search swath allows for
a lower inclination;
·· Revisit rate: 2.6 hr.
Distributed Space Maritime Surveillance 193
hour between one or the other sensing modalities. The interval between SAR
and EO/IR will not be constant because the constellations are in different or-
bital inclinations. Still, the gaps in coverage will be at most about 2 to 2.5 hours
and will average around 1 hour.
The advantage of the MultiINT constellation is that the wide area search
capability of the SAR can be used to identify potential targets of interest over
large areas of open ocean. In this mode the resolution is low (perhaps many 10s
of meters), but objects of interest thus detected can be handed off to the next
available EO imager. The EO imager, with its 1m to 2m resolution will have
a good chance of identifying a ship type. If cloud cover or darkness prevents
collecting EO imagery, the next SAR pass would be able to focus on a narrower
spot mode with higher resolution. Of course, to perform these handoffs prop-
erly requires a rapid transport layer to exchange cues, and an effective prediction
model for ship’s motion; we addressed such modeling in Chapter 8.
This example analysis did not address the performance of adding a sig-
nal capability such as HawkEye 360, but unless ships are operating completely
EMCON, then any RF emission (including navigation radar) can be used as an
initial list of locations for subsequent SAR or EO searches.
9.6 Conclusions
The prior sections provided a most basic introduction to the process of identify-
ing a maritime intelligence need, translating it to collection requirements, and
developing a suitable constellation of small satellites to perform the collection.
The analysis was intended to demonstrate the mission development process and
explain feasibility using commercial satellites. But it is important to consider
several factors in the process:
Endnotes
[1] https://www.history.navy.mil/research/library/online-reading-room/title-list-
alphabetically/f/from-sea-stars.html#bookmark7.
[2] Bateman, A., “Technological Wonder and Strategic Vulnerability: Satellite Recon-
naissance and American National Security during the Cold War,” International Jour-
nal of Intelligence and CounterIntelligence, Vol. 33, No. 2, 2020, pp. 328–353, DOI:
10.1080/08850607.2019.1703926.
[3] https://www.history.navy.mil/research/library/online-reading-room/title-list-
alphabetically/f/from-sea-stars.html#bookmark7.
[4] Carlson, B., “NRO’s Historical, Current, and Potential Future Use of Small Satellites,”
National Reconnaissance Office, 2011.
[5] Table adapted from “Navy’s Needs in Space for Providing Future Capabilities,” National
Academy Press, 2005, Table 2.2, p. 42.
[6] Swartwout, M., “Reliving 24 Years in the Next 12 Minutes: A Statistical and Personal His-
tory of University-Class Satellites,” Proc. 2018 Small Satellite Conf., SSC18-WKVIII-03.
[7] Halt, T., “Smallsats by The Numbers: A Discussion of the Smallsat Industry,” Sat Maga-
zine, April 2019, http://www.satmagazine.com/story.php?number=1604295635.
[8] Commercial Orbital Transportation Services: A New Era in Spaceflight, NASA SP-2014-
617, 2014.
[9] Selva, D., and D. Krejci, “A Survey and Assessment of the Capabilities of CubeSats for
Earth observation,” Acta Astronautica, Vol. 74, 2012, pp. 50–68.
[10] Newman, J., C. Racoosin, W. Lan, R. Begley, N. Crawford, J. McGowan, and R.
McClenning, “GEOINT Small Satellite Constellation Study for Maritime Domain
Awareness,” Naval Postgraduate School, 2018.
[11] Van Ryswyk, M., “Planet’s New Rapid Revisit Platform to Capture Up to 12 Images
per Day,” Planet Pulse, June 9, 2020, https://www.planet.com/pulse/12x-rapid-revisit-
announcement/. See also Mason, J., “What Is Rapid Revisit and Why Does It Matter?,”
Planet Pulse, September 16, 2019, https://www.planet.com/pulse/what-is-rapid-revisit-
and-why-does-it-matter/.
[12] Wulder, M. A., et al., “The Global Landsat Archive: Status, Consolidation, and Direction,”
Remote Sensing of Environment, Vol. 185, 2016, pp. 271–283.
[13] https://www.usgs.gov/faqs/what-are-acquisition-schedules-landsat-satellites.
[14] Hallex, M. A., and T. S. Cottom, “Proliferated Commercial Satellite Constellations:
Implications for National Security,” Joint Forces Quarterly, JFQ 97, 2nd Quarter, 2020,
pp. 20–29.
[15] Erwin, S., “NRO Begins Journey Toward Commercial Data Program of Record,” Space
News, October 7, 2021. Using optical inter-satellite links, commercial imaging companies
could send data directly from their constellations to SDAs’ satellites.
[16] Erwin, S., “Maxar Still Confident Legion Constellation will be in Orbit in 2022,” Space
News, October 7, 2021.
196 Naval ISR Fusion Principles, Operations, and Technologies
1%20-%20SDA%20Transport%20Statement%20of%20Work%20%28DRAFT%29.
pdf.
[36] https://irp.fas.org/program/collect/global_hawk.htm.
[37] https://en.wikipedia.org/wiki/Pacific_Ocean.
[38] Eriksen, T., G. Høye, B. Narheim, and B. J. Meland, “Maritime Traffic Monitoring Using
a Space-Based AIS Receiver,” Acta Astronautica, Vol. 58, No. 10, 2006, pp. 537–549.
[39] Davis, L. A., and L. Filip, “How Long Does It Take to Develop and Launch Government
Satellite Systems,” International Cost Estimating and Analysis Association, AEROSPACE
REPORT, 2015.
[40] https://cimsec.org/importance-of-space-in-maritime-security/.
[41] https://www.maxar.com/.
[42] https://apollomapping.com/imagery-dem-price-lists.
[43] https://www.cbsnews.com/news/iran-missle-strike-al-asad-airbase-60-
minutes-2021-02-28/.
[44] Dunlap, C., J. D., “Are Commercial Satellites Used for Intelligence-Gathering in Attack
Planning Targetable?” March 5, 2021, https://sites.duke.edu/lawfire/2021/03/05/are-
commercial-satellites-used-for-intelligence-gathering-in-attack-planning-targetabl.e/.
[45] https://www.aaas.org/resources/high-resolution-satellite-imagery-ordering-and-analysis
-handbook#VI.%20Image%20Ordering.
[46] Jones, A., “China Launches New Group of Classified Yaogan-30 Satellites” Space News,
June 18, 2021, https://spacenews.com/china-launches-new-group-of-classified-yaogan-
30-satellites/.
[47] https://en.wikipedia.org/wiki/Yaogan.
[48] For a more detailed example, see Ravanbakhsh, A., and S. Franchini, “System Engineering
Approach to Initial Design of LEO Remote Sensing Missions,” 2013 6th International
Conference on Recent Advances in Space Technologies (RAST), 2013, pp. 659–664, doi:
10.1109/RAST.2013.6581292.
[49] See the AGI description of this tool at https://www.agi.com/products/stk.
[50] Space Mission Engineering: The New SMAD, J. R. Wertz and W. J. Larson (eds.), Space
Technology Library, Vol. 28, 2011.
[51] For a similar analysis with HawkEye 360 see the presentation, Lowe, J., STK
Multi-Int Mission Planning, AGI, June 11, 2019, https://www.youtube.com/
watch?v=zhSGLNVyhVA.
[52] Erwin, S., “U.S. General: Starlink in Ukraine Showing What Megaconstellations Can
Do,” Space News, March 8, 2022, https://spacenews.com/u-s-general-starlink-in-ukraine-
showing-us-what-megaconstellations-can-do/.
[53] Erwin, S., “Lockheed Martin, Northrop Grumman, York Space Selected to Build DoD’s
Internet-in-Space Constellation,” Space News, February 28, 2022, https://spacenews.com/
lockheed-martin-northrop-grumman-york-space-selected-to-build-dods-internet-in-
space-constellation/.
198 Naval ISR Fusion Principles, Operations, and Technologies
[54] Williamson, W., III, “From Battleship to Chess,” Naval Institute Proceedings, Vol. 146,
No. 7, July 2020, p. 1409
10
Future Technologies to Enable All-
Domain
Naval officers have always been familiar with the concept of the watch—a pe-
riod during which a sailor is assigned a role to perform a duty or keep a watch
to persistently oversee an assignment. Of course, the traditional watchkeeper
assignment was what today we call ISR—to maintain constant surveillance of
the ocean’s horizon.
Today, we use the term technology watch to describe surveillance of sci-
ence and the resulting technologies that may disrupt naval strategy, operations,
and tactics. This chapter introduces the critical role of a naval ISR technology
watch, and example technologies that are under surveillance and being moni-
tored by major navies. Technology is monitored, for example, by organizations
such as the U.S. Office of Naval Research, the Australian DST-G Maritime
Division, and China’s Naval Research Academy [1].
But the concept of a technology watch is not new. It was R.V. Jones, the
head of British Scientific Intelligence in World War II, and recognized devel-
oper of methods of empirical technical intelligence, that articulated the concept
of watch. The watch required monitoring emerging technology and the basic
steps required by an adversary to introduce new technologies in warfare [2]:
Though writing about the process applied by the British and Americans
from the 1940s and 1950s, the process today adopts the following essential core
elements. Scientist and technologists perform analyses that include:
Figure 10.1 Disrupting technologies and strategic objectives of naval operations over time.
Future Technologies to Enable All-Domain 201
Our present information age illustrates the close coupling between tactics
and technology and portends a sharply increased power of tactics in
effecting operations and strategy. While strategy may seek to control the
scope, pace, and intensity of a conflict, tactics controls the very powerful
second derivative, that is, the rates of change that affect men’s minds where
wars are won and lost [3].
The following sections in this chapter describe the process used to scan
the (time) horizon for technologies that will change, disrupt, or otherwise im-
pact naval ISR and operations in the future (Section 10.1) and two specific
examples of emerging technologies that will certainly disrupt ISR in the near-
future (Sections 10.2–10.3).
Table 10.1
Defense Categories of Technology Surprise
Type 1: A major technological Example: Introduction of the atomic bomb at the end of
breakthrough in science or World War II. Introduction of Earth satellites for national
engineering. reconnaissance in the U.S. Corona program. Introduction
of stealth technology to defeat radar detection. (These are
generally rare events, enabled by experts within the field.)
Type 2: A revelation of secret Example: The successful testing of hypersonic missiles by
progress by a second party which Russia and China has changed the threat balance. These
may have an unanticipated impact. missiles, launched from naval vessels will enable prompt,
long-range engagement and change the balance of naval
fleets.
Type 3: Temporal surprise, Example: Progress in foreign nuclear weapon, ballistic, and
when a party makes more rapid hypersonic missile programs where surprise is facilitated
development or advancement by technology transfer that accelerates progress beyond a
in a particular technology than traditional linear development cycle.
anticipated.
Type 4: Innovative technology Example: Introduction of unmanned surface vessels and
application. Such innovations do underwater vehicles into naval operations to perform
not necessarily require technical operations deemed too risky for manned vehicles.
expertise, but rather the creativity
to use available resources in a new
way.
From: [5].
Figure 10.2 The five steps of the STREAM process applied to naval technologies [8].
The process proceeds in five steps from framing the problem to the iden-
tification of technologies that emerges from science and applying it to the
agency’s needs. Next, the technologies are characterized, defining the drivers,
204 Naval ISR Fusion Principles, Operations, and Technologies
risks, and barriers to adoption and costs. The tradeoffs between alternative ap-
proaches are conducted and reported to decision makers to select actions (e.g.,
commitment of resources to development of new capabilities). The process also
provides a basis to conduct a technology watch to observe adversary technolo-
gies with disruptive naval implications.
Following the scanning process, an assessment is performed to prepare
a strategy to deal with the emerging technology capability to avoid surprise
deployment. A 2008 Defense Science Board study identified five steps that,
integrated together, constitute a robust approach to managing surprise [9]:
• A scanning and sifting process that narrows the many possibilities to the
most worrisome few;
• A Red capability projection function that takes a deeper dive on the wor-
risome few through analysis, simulation, experimentation, and/or pro-
totyping;
• A net assessment process in which the deeper understanding of Red,
gained through capability projection, is played against Blue capabilities
in order to assess the degree to which the nation can address the threat
or adapt capabilities already in hand;
• An options analysis team to provide an unbiased evaluation—or “rack and
stack”—of the alternatives should Blue capabilities prove inadequate;
• An ability to produce a decision package that can be acted upon by senior
leadership.
In this book, our focus on naval maritime ISR is a subset of the wide range
of technologies surveilled by naval researchers [10]. Table 10.2 provides a cat-
egorized list of important technologies that navies have placed under watch in
the area of ISR impact because of their potentially disruptive effect. Of course,
these are also the areas of R&D investment and form the basis for research strat-
egies, development planning, and R&D portfolio management [11].
In the following sections we highlight just two of many critical technol-
ogy areas that will disrupt current naval operations when the technologies can
be scaled up, operationalized, and deployed. We have chosen these two, one
near-term and one long-term, to highlight the diversity and breadth of tech-
nologies that navies must consider. In addition to these two, we have previ-
ously introduced advanced wireless technologies (Section 7.2), AI and machine
learning technologies (Chapter 8), and small satellite constellation technologies
(Chapter 9).
Future Technologies to Enable All-Domain 205
Table 10.2
Basic List of Naval ISR Technology Watch Categories
ISR Area Technology Application Areas
ISR platforms Undersea sensing (EM, ·· Seabed, undersea surveillance nets;
acoustic, energy) and ·· Undersea-to-space communication.
communications
Autonomous unmanned ·· Close-in surveillance, sensor deployment, and
vehicles OTH relay.
Large satellite constellations ·· Persistent maritime surface vessel tracking.
Distributed ISR EO/IR, radar, MASINT ·· Distributed network sensing across traditional
sensors sensing manned and unmanned-autonomous
platforms. Enhanced target recognition and
situation assessment.
Acoustic, magnetic sensing
Quantum sensing
Distributed AI ·· Automated and independent sensing, fusion,
ISR networks, and reporting.
processing Secure, wireless advanced ·· Sensor networking above the ocean surface
generation communication and undersea wireless (acoustic, optical, RF)
comm nets.
Advanced cryptography, ·· Improved communication channel security:
blockchain custody confidentiality, integrity, and assurance.
High-performance, quantum ·· Advanced modeling and simulation;
computing ·· Cryptographic and optimal search solutions.
ISR human- Augmented reality ·· Operator immersion in high dimensional
machine information.
analysis-C2 Human-machine teaming ·· Optimal coordination of human and machine
learning, reasoning, and problem solving in
complex contexts.
Weapons for ISR Hypersonic aircraft, ·· Reduced time-to-target engagement and
targets missiles improved OTH selection of targets and
endgame guidance.
Autonomous target
identification, selection,
and aiming
Table 10.3
ISR Missions Supported by Unmanned Platforms
ISR-Related Mission Functions
Extended range surveillance Deploy or provide platform for sensors to extend surface,
subsurface sensing with relay to the fleet via satellite. Perform
endurance scouting and surveillance of high-risk transit routes.
Surveillance sensor deployment Deploy leave-behind acoustic arrays has been demonstrated by
the ADS, which uses autonomous underwater vehicles (AUVs) to
deploy its sensor arrays.
Near-land, harbor-monitoring UUVs deploy sensor packages at near-land locations: outside
ports, shipping channels, and naval installations. Deploy
protective warning sensors for special force operations.
Seabed warfare Monitor undersea infrastructure and vessels that threaten nodes
and links; provide targeting for adversary vessels.
ASW and antisurface warfare Apply USVs and UUVs with sensors to detect, cue other assets,
(ASUW) localize targets, and reduce detection-to-engagement time in
both deep and shallow waters.
Mine warfare; mine Denied area MCM operations deploy UUVs from nuclear attack
countermeasures (MCM) submarines (SSNs) within the denied areas or by launching
longer-endurance UUVs from surface ships.
From: [14].
Future Technologies to Enable All-Domain 207
is worthy to note that maritime ISR may also benefit from enhanced
environment sensing to support naval operations. Information that
characterizes such factors as temperature, depth (bathymetry), seabed
clutter, and more, may impact naval operations including the detec-
tion of targets. Advances in technology such as acoustic tomography
may impact the concept of DMO promoted in this book.
7. Unmanned surface gliders. Surface UUVs that capture the kinetic en-
ergy of wave motion to create electrical power provide the benefits of
endurance (although they may require periodic refueling), and of the
ability of the station keep, and even provide limited maneuverability.
Gliders have been applied to oceanographic sensing; these platforms
can also provide tactical ISR surveillance of littoral and far-forward,
areas. The application to ISR has long been studied to provide surveil-
lance of far-forward, littoral areas, using gliders to achieve persistence,
stealth, and OTH launch with rapid transit to distant operating area
[18].
are employed in region. The circle in Figure 10.4 shows the desired operating
range (0.1–1 Mbps and 1–10 km) for many naval applications to communicate
between buoys, UUVs, submarines, and seabed networks. The following lists
summarizes each of the three transmission methods in the figure:
• Wired cables: Fiber-optic cables (or tethers) are employed for towed sen-
sor systems, with cables as long as 1 to 5 km. But the use of these be-
tween undersea sensors and buoys, or even between UAVs and ships
or buoys to enable wideband communications have the obvious disad-
vantage for mobile sensors of physical connections, tangling risk, and
line-length. For this reason, mobile systems seek wireless (acoustic, RF,
or optical) solutions.
• Expendable buoys: For one-time seabed-to-surface (or submarine-to-
surface) store-and-forward communications, expendable buoys may be
floated to the surface to forward messages to satellites for relay to data
fusion nodes. Of course, the magazine of expendable buoys stored at the
seabed or in a UUV or submarine limits this mode of communication
to only the most critical messages. Such a solution is an engineering
solution rather than a new technology, but self-deploying smart buoys
could provide one engineering approach to realize a gateway interface
for seabed to space comms.
architecture needs to scale well such that the equipment required to make a
qubit cannot scale-up unreasonably with the number of qubits. Another chal-
lenge to the community is to demonstrate quantum supremacy, which is the
demonstration of a calculation that can be done either faster or even at all on
a quantum computer versus a classical computer. Once this has been achieved,
the applications to naval ISR can be significant, for example:
between the two paths can be measured with extremely high precision set by
the wavelength of the waves. This principle is at the heart of modern-day opti-
cal gyroscopes (which appear in the form of a ring laser gyroscope). The same
principle is at work in an atom interferometer except that the associated wave-
length scales with the mass of the atom. Since an atom weighs more than a
photon [36], an atom interferometer is far more sensitive per atom than an op-
tical gyroscope is per photon. Atom interferometers can be configured to very
sensitively measure forces that arise from gravitational, rotational, or magnetic
potentials. For example, they can be accelerometers, gyroscopes (useful for iner-
tial navigation), or magnetometers (useful for antisubmarine warfare, magnetic
navigation, or explosive detection). The basic operating principle of an atomic
clock (e.g., precision location and high-speed communication) is very similar
to an atom interferometer.
To explore the connection between quantum computers and quantum
sensors, we should discuss the so-called DiVincenzo criteria, which are the char-
acteristics required for a quantum computer, regardless of the architecture or
hardware implementation. Quoting from the original paper, the characteristics
are [37]:
• Qubits: An atom has very well-defined energy states that can easily be
measured to form the basis of 0s and 1s. These states are the different
218 Naval ISR Fusion Principles, Operations, and Technologies
orbitals that the electrons within an atom can reside in. Alternately, the
qubit can be thought of as the spin of the atom, where the spin is either
up or down (or anywhere in-between).
• Qubit initialization: Using properly constructed laser pulses, the states
of the atom can be manipulated to be initialized so that all the atoms are
in the same state (e.g., all spins down).
• Decoherence times: Different energy states can often decay very rapidly.
However, certain states (either the so-called ground states of the atom or
otherwise very long-lived states) can have long decay times. When atoms
are collected in very low-density samples, the rate of collisions is also
very low, so the decoherence time can be made very large.
• Quantum gates: The very manipulation of the waves as beam-splitters
and mirrors are the analogs of gates. By applying very specially tailored
light pulses, the atomic waves can be split and recombined.
• Measurement: At the end of the interferometer, the state of the atom can
be detected, often by an appropriately tuned laser pulse.
to the conference center in Beijing along a 280-km optical fiber link using
six trusted relay stations. The call used the Advanced Encryption Standard
(AES)-128 protocol which refreshed the 128-bit seed every second. During the
75-minute video conference, approximately a total of 2 GB were transmitted,
consuming approximately 70 kB of the quantum key that was generated be-
tween Austria and China. This experiment represents a promising demonstra-
tion of secure video (high bandwidth) transmission using quantum technology,
a feature that can certainly benefit ISR networks.
Endnotes
[1] Cited in the Australian Strategic Policy Institute China University Tracker at https://uni-
tracker.aspi.org.au/universities/naval-research-academy/. The Chinese website is https://
web.archive.org/web/20190724043226/http://navy.81.cn/content/2019-03/15/content_
9450788.htm.
[2] Jones, R.V., The Wizard War: British Scientific Intelligence 1939-1945, NY: Coward, Mc-
Cann & Copenhagen, 1978, p. 73.
[3] Cebrowski, A., Preface to Hughes, W. P., Jr., and R. P. Girrier, Fleet Tactics and Naval
Operations, Third Edition, U.S. Naval Institute Press, 2018.
[4] A similar definition is provided in Handel, M., War, Strategy, and Intelligence, London:
Frank Cass, 1989, p. 113: “a unilateral advantage gained by the introduction of a new
weapon (or by the use of a known weapon in an innovative way) in a war against and ad-
versary who is either unaware of its existence or not ready with effective countermeasures,
the development of which require time.”
[5] “Avoiding Technology Surprise for Tomorrow’s Warfighter: A Symposium Report,” Wash-
ington, D.C.: The National Academies Press, National Research Council, 2009, p. 10.
[6] See, for example, the following reports on technology surprise and reconnaissance-assess-
ment methods:
“Report of the Defense Science Board 2008 Summer Study on Capability Surprise Vol-
ume I: Main Report,” September 2009, Office of the Under Secretary of Defense for
Acquisition, Technology, and Logistics, Washington, D.C., 20301-3140.
“Avoiding Technology Surprise for Tomorrow’s Warfighter: A Symposium Report,” Wash-
ington, D.C.: The National Academies Press, National Research Council, 2009.
“Avoiding Surprise in an Era of Global Technology Advances,” Washington, D.C.: The
National Academies Press, NRC (National Research Council), 2005.
“Persistent Forecasting of Disruptive Technologies,” Washington, D.C.: The National
Academies Press, National Research Council, 2010.
“Technical Assessment: Data-Enabled Technology Watch and Horizon Scanning,” Office
of Technical Intelligence, OASD for R&E, October 2015.
Sylak-Glassman, E. J., S. R. Williams, and N. Gupta, “Current and Potential Use of Tech-
nology Forecasting Tools in the Federal Government,” IDA Document D-5735, Institute
for Defense Analysis.
222 Naval ISR Fusion Principles, Operations, and Technologies
[7] “Strategic Issues Facing Transportation, Volume 3: Expediting Future Technologies for
Enhancing Transportation System Performance,” Washington, D.C.: The National Acad-
emies Press, National Academies of Sciences, Engineering, and Medicine, 2013.
[8] Ibid, p. 2.
[9] Report of the Defense Science Board 2008 Summer Study on Capability Surprise, Volume
I: Main Report, pp. xii, 29.
[10] For example, the U.S. Office of Naval Research identifies its key unclassified technology
areas. See the list of over 100 categories at https://www.onr.navy.mil/our-research/
technology-areas.
[11] For an example, see: “Naval Research and Development: A Framework for Accelerating to
the Navy & Marine Corps After Next,” Department of the Navy, 2018, https://www.onr.
navy.mil/en/our-research/naval-research-framework.
[12] Clark, B., “The Emerging Era in Undersea Warfare,” Center for Strategic and Budgetary
Assessments (CSBA), https://csbaonline.org/uploads/documents/CSBA6117-New-Era-
Undersea-Warfare-Reportweb.pdf.
[13] For an overview of the U.S. Navy strategy and variety of unmanned vehicles, see
Department of the Navy, Unmanned Campaign Framework, March 16, 2021.
[14] “Autonomous Undersea Vehicle Requirements for 2025,” Chief of Naval Operations
Undersea Warfare Directorate, February 2016. See also the earlier RAND study, Button,
R. W., et al., “A Survey of Missions for Unmanned Undersea Vehicles,” RAND MG808,
2009, https://doi.org/10.17226/11927.
[15] Evans, K., “The Nation’s Fixed Undersea Surveillance Assets—A national Resource for the
Future,” The Journal of the Acoustical Society of America Vol. 95, 1994, p. 2852, https://
doi.org/10.1121/1.409559. See also “Origins of SOSUS,” Submarine Fleet Pacific,
Commander, Undersea Surveillance, https://www.csp.navy.mil/cus/About-IUSS/Origins-
of-SOSUS/.
[16] “Department of Defense Authorization for Appropriations for Fiscal Year 2003,”
Underwater Acoustics, pp. 203–204.
[17] Waterston, J., “Ocean of Things: Low-Cost Distributed Sensing with Scalable Analysis for
Maritime Situational Awareness,” DARPA, April 7, 2020. See also Waterston, J., J. Rhea,
S. Peterson, L. Bolick, J. Ayers, and J. Ellen, “Ocean of Things: Affordable Maritime
Sensors with Scalable Analysis,” OCEANS 2019, Marseille, France, 2019, pp. 1–6, doi:
10.1109/OCEANSE.2019.8867398.
The Ocean of Things program is a research and development effort that aims to provide
the expanded information capabilities associated with the Internet of Things to the
ocean in a cost-effective way, taking advantage of developments in cloud-based analytic
techniques to assess maritime conditions and contribute to oceanographic models in near
real-time. The objective of the program is to provide environmental sensing and maritime
surveillance missions by developing new low-cost methods for detection and tracking of
objects and characterization of oceanographic phenomena at a fine scale over broad areas.
The inputs for these data analytics over a large ocean area would be provided by deploying
thousands of small, low-cost smart floats to form a distributed sensor network. Source:
Ocean of Things Broad Agency Announcement, HR001118S0013, DARPA Strategic
Technology Office, December 19, 2017.
Future Technologies to Enable All-Domain 223
[34] Xiang, Z.-L., S. Ashhab, J. Q. You, and F. Nori, “Hybrid Quantum Circuits:
Superconducting Circuits Interacting with Other Quantum Systems,” Reviews of Modern
Physics, Vol. 85, 2013, p. 623.
[35] Grover, L. K., “Quantum Mechanics Helps in Searching for a Needle in a Haystack,”
Phys. Rev. Lett., Vol. 79, 1997, p. 325. See also Boyer, M., G. Brassard, P. Hoyer, and A.
Tapp, “Tight Bounds on Quantum Searching,” Fortsch. der Phys. Prog. of Phys., Vol. 46,
No. 493, 1998.
[36] Of course, a photon is massless, but it has an effective mass given by E = h c / l = mc2, where
l is the wavelength, c is the speed of light, h is Planck’s constant, and m is the effective
photon mass.
[37] DiVincenzo, D. P., “The Physical Implementation of Quantum Computation,” Fortschritte
der Physik, Vol. 48, No. 9-11, 2000 pp. 771–783.
[38] Narducci, F. A., A. T. Black, and J. H. Burke, “Advances Toward Fieldable Atom
Interferometers,” Advances in Physics: X, Vol. 7, No. 1, 2022, DOI: 10.1080/
23746149.2021.1946426.
[39] Ambedkar, B., and S. Bedi, “A New Factorization Method to Factorize RSA Public Key
Encryption,” IJCSI International Journal of Computer Science Issues, Vol. 8, No. 6, 2011
p. 1.
[40] Smith, D., “Notes from the Back Row: ‘Quantum Entanglement and Quantum
Computing’,” 2013, https://www.caltech.edu/about/news/notes-back-row-quantum-
entanglement-and-quantum-computing-39378.
[41] Stebila, D., M. Mosca, and N. Lutkenhaus, “Quantum Communication and Quantum
Networking: First International Conference,” Naples, Italy, 2009.
[42] Bennett, C. H., and G. Brassard, “Quantum Cryptography: Public Key Distribution and
Coin Tossing,” in Proceedings of IEEE International Conference on Computers, Systems, and
Signal Processing, 1984.
[43] Hiskett, P. A., D. Rosenberg, C. G. Peterson, R. J. Hughes, S. Nam, A. E. Lita, A. J.
Miller, and J. E. Nordholt, “Long-Distance Quantum Key Distribution in Optical Fibre,”
New Journal of Physics, Vol. 8, 2006, p. 193.
[44] Schmitt-Manderbach, T., et al., “Experimental Demonstration of Free-Space Decoy-State
Quantum Key Distribution over 144 km,” Phys. Rev. Lett., Vol. 98, 2007 p. 010504.
[45] Stebila, D., M. Mosca, and N. Lutkenhaus, ibid.
[46] https://www.quantiki.org/wiki/private-sector-quantum-information-science.
[47] Liao, S.-K., et al., “Satellite-Relayed Intercontinental Quantum Network,” Phys. Rev.
Lett., Vol. 120, 2018, p. 030501.
About the Authors
Jim Scrofani is the director of the Center for MultiINT Studies (CMIS) at the
Naval Postgraduate School (NPS) where he has worked as an associate professor
since 2011. A United States Navy Captain, he was previously responsible for
program management of an extensive research and development (R&D) port-
folio (2009–2011) at the National Reconnaissance Office, Advanced Systems
and Technologies directorate. He was also the senior naval space systems engi-
neering duty officer Space and Naval Warfare Systems Command (SPAWAR)
space field activity and served as senior community mentor and certifying of-
ficer for all space-qualified and designated naval engineering duty officers. His
prior Navy experience includes assignments with the Multi-National Security
Transition Command–Iraq as commander, operations chief; National Recon-
naissance Office, as advanced systems and technologies directorate, command-
er, and program manager responsible for the execution of classified space and
ground-based advanced technology demonstrations; and the Navy, Strategic
Systems Program, responsible for all in-factory rocket motor development, pro-
duction, and operational support of the Navy’s Trident II missile systems. In
addition, he has served as the assistant for arms control to the director, Strategic
Systems Programs, responsible for all aspects of implementation and compli-
ance with the Strategic Arms Reduction Treaty (START). From 1989 to 1994
he served as a submarine officer assigned to Commander, Submarine Group 10
(COMSUBGRU TEN), serving aboard the USS Spadefish (SSN-668). He has
earned four degrees: a PhD in electrical engineering from the Naval Postgradu-
ate School, 2005, an MS with distinction in electrical engineering from the
Naval Postgraduate School, 1997, an MBA from Brenau University in 1994,
and a BS in chemical engineering from the University of Florida, 1987.
225
226 Naval ISR Fusion Principles, Operations, and Technologies
229
230 Naval ISR Fusion Principles, Operations, and Technologies
Tactical data line (TDL), 23, 69, 131, 141 Vertical launch system (VLS), 61
Tactical intelligence (TACINTEL), 32, 77 Vessel of interest (VOI), 14
Target-based intelligence, 118 Visit, board, search, and seizure (VBSS), 10,
TechELINT, 27 14, 15
Technology scanning, 201–204
Technology watch, 199–201, 205 Web Ontology Language (OWL), 158
TENCAP, 9 Wireless networks, 137–139
Track, tracking, 10–12, 38–40, 88–89,
93–104, 110–126, 132, 164–166,
171, 184–186, 205–208