SlideShare a Scribd company logo
1 of 21
Battlefield Communication Technology



                   by
              Ricky Sacra



               COMM. 303
Purpose


• Describe multiple communication technologies and their
  battlefield applications.


• Explain various theories of dispersion regarding selected
  communication technologies.


• Predict future technological advancements and uses for
  selected battlefied communication technologies.
Battlefield Assessment
 As communication
  technology advances in
  the civilian world.

 It must also advance on the
  battlefield.

 U.S. technology is vastly
  superior to many of our
  current “enemies”

 Most dangerous threat to
  our forces now is not
  enemy soldiers, but a fairly
  simple technology known
  as an I.E.D.
Improvised Explosive Device


• Most common “communication technology” used for detonation
  is cell phone

• Other “trigger methods” can be wire, radio, victim operate,
  infrared and pressure plate

• Most common detonation method is pressure plate

• Commonly used in unconventional warfare

• Delivery methods: person, car, roadside, animal,
  and boat to name a few.

• Technological countermeasures exist but are
  very inconsistent.
IED Countermeasures


• Includes but not limited to:

    • IED Countermeasures Equipment (ICE) and the Warlock

        • use low-power radio frequency to block signals of initiators

    • Neutralizing Improvised Explosive Devices with Radio
      Frequency (NIRF)

        • produces high frequency field to neutralize IED electronics


    • Laser-Induced Breakdown Spectroscopy (LIBS)

        • Detects traces of explosives up to 30 meters away
“Friendly” Fire



                            M982 Excalibur



•   “Smart” round, designed to minimize collateral damage
•   155 mm extended range guided artillery shell
•   Precise GPS guided munition and capable of close support
•   Can be used within 490 feet of friendly forces
•   Range- 25-35 miles
•   Cost- $50,000 per

M982 “communicates” with GPS to locate target. Has ability to point
straight down once target acquired. Meaning, only target/building
destroyed is the one intended. No surrounding collateral damage or
personnel or structures. (Theoretically)
Uncle Sam’s GPS



           Force XXI Battle Force Brigade and Below
                            (FBCB2)

• Linux based communication platform designed for
  commanders to track friendly and hostile forces on battlefield
• Information gathered by satellite, near real time
• Viewed graphically, and exchanged via both free and fixed text
• Mounts inside tactical vehicles
Component and Uses of FBCB2



                                 Components

•   Computer, monitor, satellite antenna, satellite receiver, keyboard and GPS

                                      Uses

•   Provides commanders and ground forces with friendly and hostile locations
•   Send / receive battlefield instructions
•   Send / receive battlefield updates and reports
•   Send / receive battlefield evacuation and/or support requests
•   Locate and determine route
The “Commander’s Voice”


         Single Channel Ground and Airborne Radio System
                           (SINCGARS)

•   Combat Net Radio (CNR) system currently used by allied forces
•   Radios, which handle voice and data communication
•   Reliable, secure and easily maintained
•   Vehicle mount, handheld, backpack, and airborne factors available
•   Has single frequency and frequency hopping modes
•   Frequency-hopping mode “hops” 111 times per second
Theories
 Umbrella Perspective on Communication
  Technology
 Roger’s Diffusion of Innovations
 Moore’s Innovation Adoption Rate
 Critical Mass Theory
 Uses and Gratification Theory
 Media System Dependency Theory
 Social Learning Theory/ Social Cognitive
  Theory
 The Theory of the Long Tail
 The Principle of Relative Constancy
Umbrella Perspective on
   Communication Technology


• Stems from writings of Everett M. Rogers and Sandra J. Ball-Rokeach
• Rogers defined communication technology as “The hardware equipment,
  organizational structures and social values by which individuals collect,
  process and exchange information with other individuals(Grant and Meadows
  2008).” Ball-Rokeach suggests that “communication media can be understood
  by analyzing dependency relations within and across levels of analysis,
  including the individual, organizational and system levels.” She also identifies
  “three systems for analysis: the media system, the political system and the
  economic system (Grant and Meadows 2008).”

• Levels to consider -Hardware, software, organizational infrastructure, social
  system, and individual users

• Factors to consider –enabling, limiting, motivating, inhibiting
Diffusion of Innovations Theory


Diffusion is the process by which an innovation is communicated through certain
channels over time among the members of a social system .Given that decisions
are not authoritative or collective, each member of the social system faces his/her
own innovation-decision that follows a 5-step process

1)    Knowledge – person becomes aware of an innovation and has some idea
of how it functions,
2)    Persuasion – person forms a favorable or unfavorable attitude toward the
innovation,
3)    Decision – person engages in activities that lead to a choice to adopt or
reject the innovation,
4)    Implementation – person puts an innovation into use,
5)    Confirmation – person evaluates the results of an innovation-decision
already made.                                                 -Rogers
Critical Mass Theory




a theory to describe the existence of a
sufficient amount of adopters of an
innovation in a social system such that
the rate of adoption becomes self-
sustaining and creates further growth.
Uses and Gratifications Theory


An approach to understanding why people actively seek out specific
media outlets and content for gratification purposes. The theory
discusses how users proactively search for media that will not only meet
a given need but enhance knowledge, social interactions and diversion .

It assumes that members of the audience are not passive but take an
active role in interpreting and integrating media into their own lives. The
theory also holds that audiences are responsible for choosing media to
meet their needs. The approach suggests that people use the media to
fulfill specific gratifications.

This theory would then imply that the media compete against other
information sources for viewers' gratification.
Media Systems Dependency Theory


 The basic dependency hypothesis states that the
 more a person depends on media to meet needs, the
 more important media will be in a person's life, and
 therefore the more effects media will have on a
 person.
Social Learning Theory


            Theory derived from the work of Albert Bandura that states people learn through
            a social context. The theory proposed three “models” and each modeling process
            could involve several steps.
                                                      Models
•   Live model – in which an actual person is demonstrating the desired behavior
•   Verbal instruction – in which an individual describes the desired behavior in detail, and instructs the participant in how
    to engage in the behavior
•   Symbolic – in which modeling occurs by means of the media, including movies, television, Internet, literature, and
    radio. This type of modeling involves a real or fictional character demonstrating the behavior

                                                         Steps
•   Attention – in order for an individual to learn something, they must pay attention to the features of the modeled
    behavior.
•   Retention – humans need to be able to remember details of the behavior in order to learn and later reproduce the
    behavior.
•   Reproduction – in reproducing a behavior, an individual must organize his or her responses in accordance with the
    model behavior. This ability can improve with practice.
•   Motivation – there must be an incentive or motivation driving the individual’s reproduction of the behavior. Even if all
    of the above factors are present, the person will not engage in the behavior without motivation.
The Theory of the Long Tail


Compared to a “normal” curve or bell shaped curve of
distribution…

“What is unusual about a long-tailed distribution is that the most
frequently-occurring 20% of items represent less than 50% of
occurrences; or in other words, the least-frequently-occurring
80% of items are more important as a proportion of the total
population.”
Principle of Relative Constancy


“In it’s simplest form, The
Principal of Relative Constancy
suggests that a relatively
constant proportion of national
wealth (usually approximated
using Gross Domestic Product)
is spent on media every year.”
Theoretical Influences



Many of the theories described would not have the exact effect’s
of dispersion, popularity or use on battlefield communication
technologies as they would regarding civilian communication
technology. Defense department contracts are often times sold
to the cheapest bidder with a product that will get the job done
efficiently, accurately and correctly. A soldier doesn’t usually
have the option to choose what is hip or cool. He chooses what
he is issued and trained to use.

However, with that said, communication technologies are
improving everyday. The enemies of America have access to the
same websites, social networks and technologies that we do. As
our abilities improve, so does theirs.
2022 Battlefield Communication
             Technology
As the battlefield seem to regress back to more traditional
warfare, the soldier, the enemy and the technology will
continue to progress and advance.

We already have unmanned aerial vehicles. We have
prototypes of body armor that will help the soldier stay cool or
warm, and built in systems that can help to stop bleeding if
wounded.

We have kevlar helmets with built in radios and night vision.
We have satellite guided weapons systems. We have all the
communication technology needed to exact warfare on a
direct location.

Perhaps in 2022 we will be “advanced” enough to not need
anymore battlefield communication technologies.
References


•   http://en.wikipedia.org/wiki/Improvised_explosive_device
•   http://fpc.state.gov/documents/organization/57512.pdf
•   http://www.hmmwvinscale.com/warlockcounteried.htm
•   http://en.wikipedia.org/wiki/M982_Excalibur
•   http://en.wikipedia.org/wiki/FBCB2
•   http://en.wikipedia.org/wiki/Blue_Force_Tracking
•   http://wikicommedia.wikispaces.com/Umbrella+Perspective#f1
•   http://www.stanford.edu/class/symbsys205/Diffusion%20of%20Inno
    vations.htm
•   http://en.wikipedia.org/wiki/Critical_mass_(sociodynamics)
•   http://en.wikipedia.org/wiki/Uses_and_gratifications_theory
•   http://en.wikipedia.org/wiki/Social_learning_theory
•   http://en.wikipedia.org/wiki/Long_Tail
•   http://economicsofadvertising.com/?page_id=76

More Related Content

Viewers also liked

March Newsletter
March NewsletterMarch Newsletter
March Newslettermjcunny
 
Greece Presentation EMGOLDEX
Greece Presentation EMGOLDEXGreece Presentation EMGOLDEX
Greece Presentation EMGOLDEXStudio1542
 
ネット選挙でできることって何? 先生:江口 晋太朗
ネット選挙でできることって何? 先生:江口 晋太朗ネット選挙でできることって何? 先生:江口 晋太朗
ネット選挙でできることって何? 先生:江口 晋太朗schoowebcampus
 
Gn archives eps 1 lab_rats sample
Gn archives eps 1 lab_rats sampleGn archives eps 1 lab_rats sample
Gn archives eps 1 lab_rats sampleDaniel Ruke
 
《昨年は1万社が合格!》創業時に知っておきたい、経済産業省から700万円の補助金を獲得する方法とは?
《昨年は1万社が合格!》創業時に知っておきたい、経済産業省から700万円の補助金を獲得する方法とは?《昨年は1万社が合格!》創業時に知っておきたい、経済産業省から700万円の補助金を獲得する方法とは?
《昨年は1万社が合格!》創業時に知っておきたい、経済産業省から700万円の補助金を獲得する方法とは?schoowebcampus
 
2015 Toyota Sienna Dealer Serving Wilkes-Barre | Toyota of Scranton
2015 Toyota Sienna Dealer Serving Wilkes-Barre | Toyota of Scranton2015 Toyota Sienna Dealer Serving Wilkes-Barre | Toyota of Scranton
2015 Toyota Sienna Dealer Serving Wilkes-Barre | Toyota of Scrantonscranton toyota
 
Gestor de proyecto educativo tic editable
Gestor de proyecto educativo tic editableGestor de proyecto educativo tic editable
Gestor de proyecto educativo tic editableErika Montes
 

Viewers also liked (11)

March Newsletter
March NewsletterMarch Newsletter
March Newsletter
 
Greece Presentation EMGOLDEX
Greece Presentation EMGOLDEXGreece Presentation EMGOLDEX
Greece Presentation EMGOLDEX
 
Chapter 8, objective
Chapter 8, objectiveChapter 8, objective
Chapter 8, objective
 
ネット選挙でできることって何? 先生:江口 晋太朗
ネット選挙でできることって何? 先生:江口 晋太朗ネット選挙でできることって何? 先生:江口 晋太朗
ネット選挙でできることって何? 先生:江口 晋太朗
 
Gn archives eps 1 lab_rats sample
Gn archives eps 1 lab_rats sampleGn archives eps 1 lab_rats sample
Gn archives eps 1 lab_rats sample
 
Cooperation and competition
Cooperation and competitionCooperation and competition
Cooperation and competition
 
《昨年は1万社が合格!》創業時に知っておきたい、経済産業省から700万円の補助金を獲得する方法とは?
《昨年は1万社が合格!》創業時に知っておきたい、経済産業省から700万円の補助金を獲得する方法とは?《昨年は1万社が合格!》創業時に知っておきたい、経済産業省から700万円の補助金を獲得する方法とは?
《昨年は1万社が合格!》創業時に知っておきたい、経済産業省から700万円の補助金を獲得する方法とは?
 
Gn the first 24
Gn the first 24Gn the first 24
Gn the first 24
 
2015 Toyota Sienna Dealer Serving Wilkes-Barre | Toyota of Scranton
2015 Toyota Sienna Dealer Serving Wilkes-Barre | Toyota of Scranton2015 Toyota Sienna Dealer Serving Wilkes-Barre | Toyota of Scranton
2015 Toyota Sienna Dealer Serving Wilkes-Barre | Toyota of Scranton
 
Gestor de proyecto educativo tic editable
Gestor de proyecto educativo tic editableGestor de proyecto educativo tic editable
Gestor de proyecto educativo tic editable
 
Polozhenia uom
Polozhenia uomPolozhenia uom
Polozhenia uom
 

Similar to Battlefield Communication Technology

Sensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceSensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceRui M. Barreira
 
Carly and erin additions (1) final draft
Carly and erin additions (1) final draftCarly and erin additions (1) final draft
Carly and erin additions (1) final draftcjsaha01
 
2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copySara-Jayne Terp
 
Geographies of Surveillance
Geographies of SurveillanceGeographies of Surveillance
Geographies of SurveillanceStephen Graham
 
Business hub aero see and drone journalism
Business hub   aero see and drone journalismBusiness hub   aero see and drone journalism
Business hub aero see and drone journalismJohnMillsonline
 
Ubiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesUbiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesHongseok Kim
 
Carly finalproject
Carly finalprojectCarly finalproject
Carly finalprojectchanvinson
 
Carly finalproject 1
Carly finalproject 1Carly finalproject 1
Carly finalproject 1cjsaha01
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologiesRufa Laguit
 
A case study analysis on digital convergent design: Skynet Platform
A case study analysis on digital convergent design: Skynet PlatformA case study analysis on digital convergent design: Skynet Platform
A case study analysis on digital convergent design: Skynet Platformdi8it
 
AMSWMC MV NPD.pptx
AMSWMC MV NPD.pptxAMSWMC MV NPD.pptx
AMSWMC MV NPD.pptxAna Canhoto
 
Final Project
Final ProjectFinal Project
Final Projectsvetleto
 
Being human (Human Computer Interaction)
Being human (Human Computer Interaction)Being human (Human Computer Interaction)
Being human (Human Computer Interaction)Rahul Singh
 
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingCiarán Mc Mahon
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeleySara-Jayne Terp
 
Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Sara-Jayne Terp
 

Similar to Battlefield Communication Technology (20)

Sensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceSensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente Intelligence
 
Carly and erin additions (1) final draft
Carly and erin additions (1) final draftCarly and erin additions (1) final draft
Carly and erin additions (1) final draft
 
2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy
 
Geographies of Surveillance
Geographies of SurveillanceGeographies of Surveillance
Geographies of Surveillance
 
Business hub aero see and drone journalism
Business hub   aero see and drone journalismBusiness hub   aero see and drone journalism
Business hub aero see and drone journalism
 
Ubiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesUbiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy Issues
 
Carly finalproject
Carly finalprojectCarly finalproject
Carly finalproject
 
Carly finalproject 1
Carly finalproject 1Carly finalproject 1
Carly finalproject 1
 
Isr in coin cadd
Isr in coin caddIsr in coin cadd
Isr in coin cadd
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
 
The_Docs
The_DocsThe_Docs
The_Docs
 
A case study analysis on digital convergent design: Skynet Platform
A case study analysis on digital convergent design: Skynet PlatformA case study analysis on digital convergent design: Skynet Platform
A case study analysis on digital convergent design: Skynet Platform
 
About Cyber.pptx
About Cyber.pptxAbout Cyber.pptx
About Cyber.pptx
 
ΕΛΙΣΜΕ 20181108 Νικήτας Νικητάκος «Επαναστατικές Τεχνολογίες στις Ε.Δ. και Νέ...
ΕΛΙΣΜΕ 20181108 Νικήτας Νικητάκος «Επαναστατικές Τεχνολογίες στις Ε.Δ. και Νέ...ΕΛΙΣΜΕ 20181108 Νικήτας Νικητάκος «Επαναστατικές Τεχνολογίες στις Ε.Δ. και Νέ...
ΕΛΙΣΜΕ 20181108 Νικήτας Νικητάκος «Επαναστατικές Τεχνολογίες στις Ε.Δ. και Νέ...
 
AMSWMC MV NPD.pptx
AMSWMC MV NPD.pptxAMSWMC MV NPD.pptx
AMSWMC MV NPD.pptx
 
Final Project
Final ProjectFinal Project
Final Project
 
Being human (Human Computer Interaction)
Being human (Human Computer Interaction)Being human (Human Computer Interaction)
Being human (Human Computer Interaction)
 
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley
 
Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...Distributed defense against disinformation: disinformation risk management an...
Distributed defense against disinformation: disinformation risk management an...
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Battlefield Communication Technology

  • 1. Battlefield Communication Technology by Ricky Sacra COMM. 303
  • 2. Purpose • Describe multiple communication technologies and their battlefield applications. • Explain various theories of dispersion regarding selected communication technologies. • Predict future technological advancements and uses for selected battlefied communication technologies.
  • 3. Battlefield Assessment  As communication technology advances in the civilian world.  It must also advance on the battlefield.  U.S. technology is vastly superior to many of our current “enemies”  Most dangerous threat to our forces now is not enemy soldiers, but a fairly simple technology known as an I.E.D.
  • 4. Improvised Explosive Device • Most common “communication technology” used for detonation is cell phone • Other “trigger methods” can be wire, radio, victim operate, infrared and pressure plate • Most common detonation method is pressure plate • Commonly used in unconventional warfare • Delivery methods: person, car, roadside, animal, and boat to name a few. • Technological countermeasures exist but are very inconsistent.
  • 5. IED Countermeasures • Includes but not limited to: • IED Countermeasures Equipment (ICE) and the Warlock • use low-power radio frequency to block signals of initiators • Neutralizing Improvised Explosive Devices with Radio Frequency (NIRF) • produces high frequency field to neutralize IED electronics • Laser-Induced Breakdown Spectroscopy (LIBS) • Detects traces of explosives up to 30 meters away
  • 6. “Friendly” Fire M982 Excalibur • “Smart” round, designed to minimize collateral damage • 155 mm extended range guided artillery shell • Precise GPS guided munition and capable of close support • Can be used within 490 feet of friendly forces • Range- 25-35 miles • Cost- $50,000 per M982 “communicates” with GPS to locate target. Has ability to point straight down once target acquired. Meaning, only target/building destroyed is the one intended. No surrounding collateral damage or personnel or structures. (Theoretically)
  • 7. Uncle Sam’s GPS Force XXI Battle Force Brigade and Below (FBCB2) • Linux based communication platform designed for commanders to track friendly and hostile forces on battlefield • Information gathered by satellite, near real time • Viewed graphically, and exchanged via both free and fixed text • Mounts inside tactical vehicles
  • 8. Component and Uses of FBCB2 Components • Computer, monitor, satellite antenna, satellite receiver, keyboard and GPS Uses • Provides commanders and ground forces with friendly and hostile locations • Send / receive battlefield instructions • Send / receive battlefield updates and reports • Send / receive battlefield evacuation and/or support requests • Locate and determine route
  • 9. The “Commander’s Voice” Single Channel Ground and Airborne Radio System (SINCGARS) • Combat Net Radio (CNR) system currently used by allied forces • Radios, which handle voice and data communication • Reliable, secure and easily maintained • Vehicle mount, handheld, backpack, and airborne factors available • Has single frequency and frequency hopping modes • Frequency-hopping mode “hops” 111 times per second
  • 10. Theories  Umbrella Perspective on Communication Technology  Roger’s Diffusion of Innovations  Moore’s Innovation Adoption Rate  Critical Mass Theory  Uses and Gratification Theory  Media System Dependency Theory  Social Learning Theory/ Social Cognitive Theory  The Theory of the Long Tail  The Principle of Relative Constancy
  • 11. Umbrella Perspective on Communication Technology • Stems from writings of Everett M. Rogers and Sandra J. Ball-Rokeach • Rogers defined communication technology as “The hardware equipment, organizational structures and social values by which individuals collect, process and exchange information with other individuals(Grant and Meadows 2008).” Ball-Rokeach suggests that “communication media can be understood by analyzing dependency relations within and across levels of analysis, including the individual, organizational and system levels.” She also identifies “three systems for analysis: the media system, the political system and the economic system (Grant and Meadows 2008).” • Levels to consider -Hardware, software, organizational infrastructure, social system, and individual users • Factors to consider –enabling, limiting, motivating, inhibiting
  • 12. Diffusion of Innovations Theory Diffusion is the process by which an innovation is communicated through certain channels over time among the members of a social system .Given that decisions are not authoritative or collective, each member of the social system faces his/her own innovation-decision that follows a 5-step process 1) Knowledge – person becomes aware of an innovation and has some idea of how it functions, 2) Persuasion – person forms a favorable or unfavorable attitude toward the innovation, 3) Decision – person engages in activities that lead to a choice to adopt or reject the innovation, 4) Implementation – person puts an innovation into use, 5) Confirmation – person evaluates the results of an innovation-decision already made. -Rogers
  • 13. Critical Mass Theory a theory to describe the existence of a sufficient amount of adopters of an innovation in a social system such that the rate of adoption becomes self- sustaining and creates further growth.
  • 14. Uses and Gratifications Theory An approach to understanding why people actively seek out specific media outlets and content for gratification purposes. The theory discusses how users proactively search for media that will not only meet a given need but enhance knowledge, social interactions and diversion . It assumes that members of the audience are not passive but take an active role in interpreting and integrating media into their own lives. The theory also holds that audiences are responsible for choosing media to meet their needs. The approach suggests that people use the media to fulfill specific gratifications. This theory would then imply that the media compete against other information sources for viewers' gratification.
  • 15. Media Systems Dependency Theory The basic dependency hypothesis states that the more a person depends on media to meet needs, the more important media will be in a person's life, and therefore the more effects media will have on a person.
  • 16. Social Learning Theory Theory derived from the work of Albert Bandura that states people learn through a social context. The theory proposed three “models” and each modeling process could involve several steps. Models • Live model – in which an actual person is demonstrating the desired behavior • Verbal instruction – in which an individual describes the desired behavior in detail, and instructs the participant in how to engage in the behavior • Symbolic – in which modeling occurs by means of the media, including movies, television, Internet, literature, and radio. This type of modeling involves a real or fictional character demonstrating the behavior Steps • Attention – in order for an individual to learn something, they must pay attention to the features of the modeled behavior. • Retention – humans need to be able to remember details of the behavior in order to learn and later reproduce the behavior. • Reproduction – in reproducing a behavior, an individual must organize his or her responses in accordance with the model behavior. This ability can improve with practice. • Motivation – there must be an incentive or motivation driving the individual’s reproduction of the behavior. Even if all of the above factors are present, the person will not engage in the behavior without motivation.
  • 17. The Theory of the Long Tail Compared to a “normal” curve or bell shaped curve of distribution… “What is unusual about a long-tailed distribution is that the most frequently-occurring 20% of items represent less than 50% of occurrences; or in other words, the least-frequently-occurring 80% of items are more important as a proportion of the total population.”
  • 18. Principle of Relative Constancy “In it’s simplest form, The Principal of Relative Constancy suggests that a relatively constant proportion of national wealth (usually approximated using Gross Domestic Product) is spent on media every year.”
  • 19. Theoretical Influences Many of the theories described would not have the exact effect’s of dispersion, popularity or use on battlefield communication technologies as they would regarding civilian communication technology. Defense department contracts are often times sold to the cheapest bidder with a product that will get the job done efficiently, accurately and correctly. A soldier doesn’t usually have the option to choose what is hip or cool. He chooses what he is issued and trained to use. However, with that said, communication technologies are improving everyday. The enemies of America have access to the same websites, social networks and technologies that we do. As our abilities improve, so does theirs.
  • 20. 2022 Battlefield Communication Technology As the battlefield seem to regress back to more traditional warfare, the soldier, the enemy and the technology will continue to progress and advance. We already have unmanned aerial vehicles. We have prototypes of body armor that will help the soldier stay cool or warm, and built in systems that can help to stop bleeding if wounded. We have kevlar helmets with built in radios and night vision. We have satellite guided weapons systems. We have all the communication technology needed to exact warfare on a direct location. Perhaps in 2022 we will be “advanced” enough to not need anymore battlefield communication technologies.
  • 21. References • http://en.wikipedia.org/wiki/Improvised_explosive_device • http://fpc.state.gov/documents/organization/57512.pdf • http://www.hmmwvinscale.com/warlockcounteried.htm • http://en.wikipedia.org/wiki/M982_Excalibur • http://en.wikipedia.org/wiki/FBCB2 • http://en.wikipedia.org/wiki/Blue_Force_Tracking • http://wikicommedia.wikispaces.com/Umbrella+Perspective#f1 • http://www.stanford.edu/class/symbsys205/Diffusion%20of%20Inno vations.htm • http://en.wikipedia.org/wiki/Critical_mass_(sociodynamics) • http://en.wikipedia.org/wiki/Uses_and_gratifications_theory • http://en.wikipedia.org/wiki/Social_learning_theory • http://en.wikipedia.org/wiki/Long_Tail • http://economicsofadvertising.com/?page_id=76