Network technologies are just now emerging but are being driven at a frenzied pace in the commercial marketplace. A variety of advanced tools beyond "hot link" browsing are being introduced daily. Data browsers, brokers, gatherers, and network repositories are being released, as demonstrated by products like Harvester and Netscape's Catalog Server. Platform independent languages such as JAVA and their associated virtual computational engines promise the same network flexibility for programs that is now enjoyed by data.
Perhaps the most important area of technology development for Rapid Dominance is the development of practical object-oriented architectures and protocols. Protocols such as CORBA, OLE, ALSP, HLA and DIS[a]1] are changing the face of computing, making it much easier to link programs and databases, and access and correlate information that was previously "entombed" within its legacy application.
One interesting application area migrating toward an object-oriented approach is geospatial databases. In the past, geospatial data were stored as either raster-based or vector information, and significant processing was required for users to make queries regarding roads, areas, or objects such as building sites. A new approach, called a spatial database engine, creates intuitive objects from standard geospatial databases and uses commercial databases to add attributes to the objects. This is a very powerful technique that allows geospatial data, a key element of warfighting, to be managed quickly and efficiently using commercial-off-the-shelf (COTS) software. It is particularly useful for distributed databases such as one would find on a network.
Modeling and simulation is also benefiting from object-oriented technologies. Simulations were once stand-alone codes. If one wanted to simulate a joint battle, one began with an existing model (i.e., land combat) and then modified it to include other components (i.e., aircraft and ships). Similarly, if a new technology were to be modeled, new code normally had to be written, even in cases where good, validated, stand-alone technology models existed. The obvious drawbacks to this approach are that it is costly, often produces inferior simulations for the new additions, and quickly results in extremely large codes with commensurate large code management problems. Object-oriented approaches allow models and simulations to be linked to form a richer environment for examining new technologies and joint force structures.
Linking force-on-force simulations with design tools such as computer-aided design (CAD) programs and physics-based simulations presents a new type of tool referred to as simulation-based design. Once fully realized, this capability will allow new technologies to be much more easily evaluated, introducing a source for greater efficiency into today's somewhat haphazard acquisition system.
Simulations based on object-oriented architectures also promise more flexibility that will enable scenarios and unexpected situations to be made as inputs and simulated rapidly, forming the core for a battlefield visualization system capable of modeling "what if" situations. Outputs from these simulations could be used for mission rehearsal. Even today, pilots and special operations forces often "fly through" crude, three-dimensional renderings of a mission area to familiarize themselves with information such as surface-to-air missile (SAM) sites and landmarks.
The promise of computational technologies brings with it potential vulnerabilities that must be protected against threats. In a world where information plays a vital role in warfare, information collection and processing tools will become targets. Defenses against information warfare must be developed. The threat is real and is growing especially in the commercial and private sectors. Even today, malicious hackers devise data-destroying viruses and distribute them through a plethora of electronic media; numerous sites on the Net are dedicated to the discussion and development of offensive computer viruses, with ample tools for even the novice to download and employ. Moreover, computer crimes cost the world economy billions of dollars annually. Although information warfare poses serious threats, the realm of information is where operations underlying Rapid Dominance most reside, and the enemy will find himself fully engaged should he choose to fight on our terms. Rapid Dominance is essentially information warfare on a grand scale in all dimensions of offensive, defensive and leveraging effective use of available information.
Communication Technologies
One of the modern communication devices being fielded within U.S. forces today is the SINGCARS radio. With a data rate of somewhat less than 10 kbps, SINGCARS is woefully inadequate for supporting Rapid Dominance. However, more appropriate technologies are emerging:
- GBS and other satellite broadcast services
- Wider bandwidth, digital communication protocols
- Asynchronous transfer mode (ATM) switches
- Advanced comm relay platforms (UAV, Lightsat, Iridium, etc.)