RESTRICTED REF: IKED SROCC SERIAL 30/2021 COMPA THE CONCEPT OF UAV INTEGRATION WITH EXISTING NETWORK CENTRIC OPERATION (NCO) AND ELECTRONIC WARFARE (EW) PLATFORMS FOR MILITARY OPERATIONS IN MALAYSIAN ARMED FORCES (MAF). Reference: A. MAFJP 0.01 - Chapter 4 (Service Paper). B. Malaysian Armed Forces Joint Procedural (MAFJP 0.01) 2012. C. The Admin Instructions of Commandant Paper Writing for Signal Regiment Officer Communication Course Serial 30/2020 on 09 Aug 21. INTRODUCTION 1. Geographically Malaysia is divided into two land masses by South China Sea (SCS), with Peninsular Malaysia on the West while Sabah and Sarawak states in the East. Protecting and defending the national interest has become the ultimate aim for Malaysia and this task mainly carried out by Malaysian Armed Forces (MAF). Territorial incursion has been identified as a new critical threat that could interface with national capacity development in the long run. If the nation fails to address this threat accordingly, it will leave a catastrophic effect on the Malaysian’s sovereignty and national interest (Gettinger, 2020). 2. This geographical demarcation into two distinctive regions makes it rather unique as well as challenging for the Malaysian Armed Forces (herein referred to as the MAF) to conduct its operations efficiently and effectively. In order to achieve this, the MAF needs a robust, secure and extensive defence capability that ultimately ensures ‘mission effectiveness’. To this regard, the MAF has identified Network Centric Operations (NCO) as a critical element in the MAF’s Joint Operational capability enhancement and a prime mover in the MAF capability development efforts to reach beyond the boundaries of the land and maritime border (as well as to survive outside these areas). In order to fully appreciate the importance of this NCO ‘Value Chain’, it is crucial to have a clear understanding of the operational battlespace, the 1 RESTRICTED RESTRICTED strategic considerations influencing this domain and the threat assessments affecting the country as a whole. Besides this, it also complements the way the MAF goes about carrying out its business of war fighting. This section will also provide a brief introduction to all of these elements. 3. Presently, MAF is taking vigorous action monitoring our national border regardless on land, sea and air. Due to vast coverage, the fastest way of providing Intelligence, Surveillance and Reconnaissance (ISR) to those areas is by conducting maritime patrol from air using Royal Malaysia Air Force (RMAF) existing platform. ISR is defined as all systems and personnel which gain data from the enemy, terrain and environment by reconnaissance and surveillance through visual, aural, electronic, photographic or other means and develop the intelligence that is needed for the planning and conduct of operations (Malaysian Army Doctrine MD 3.0 TD Operations (Provisional), 2005). 4. Therefore, to minimize the capability gap, MAF should be eyeing for a high impact, low risk to human, low cost and long endurance ISR platform as the solution. The UAV is an acronym for Unmanned Aerial Vehicle also known as UAV, which is an aircraft with no pilot on board had been used by the military since the World War I (Elizabeth, 2018). UAV is an important part of the Unmanned Aerial System which incorporates UAV, contact link and ground control stations. The emergence of technology not only removed the limits of UAV activities in the military but widened their wings in industrial uses related to agriculture, scientific activities, social activity, servile, delivery of goods, image recognition and much more (Singhal et al., 2018) 5. Unmanned Aerial Vehicle (UAV) are used for both defensive and offensive purposes. Different sizes and capabilities of UAV support a variety of different applications. Improved networking capabilities have enlarged the boundaries of UAV operations. We know that it is cheaper and less dangerous to use UAV in many missions formerly reserved for manned aircraft. 6. EW is the use of the Electromagnetic Spectrum (EMS) to deny the use of this medium by an enemy, while optimizing its use by friendly forces. It can be also defined as a military 2 RESTRICTED RESTRICTED action whose objective is control of the EMS. The three main subdivisions are Electronic Attack (EA), Electronic Protection (EP) and Electronic Warfare Support (ES). Figure 1: Operational Concept for UAV 7. The NCO environment exhibits merging points between UAV and EW, and using this relationship we can improve the effectiveness of both. Employment of UAV for EW is not new, and in fact is becoming more common. AIM 8. The aim of this paper is to study the concept of UAV integration with existing NCO and electronic warfare EW platforms for military operations in MAF. 3 RESTRICTED RESTRICTED SIGNIFICANT OF STUDY 9. This study enhances to study on the concept how to integration UAV with existing NCO and electronic warfare EW platforms for military operations in MAF. The Final outcome would contribute a precise study is to identify the concepts for employment of UAV for Electronic Warfare and examines how they have changed, and will continue to change strategies and combat tactics. SCOPE 10. This study will examine the application on the importance role of UAVs in MAF. It will also highlight how UAV implementation in ISR may increase the effectiveness of MAF operation. The scope of this paper as follows a. History of UAV. b. History of NCO. c. History of EW. d. UAV Categories. e. UAV classification on defence strategies. f. Concept of UAV IN MAF. g. Integration concept of NCO and EW with UAV. h. Discussion and Analysis. i. Conclusion. j. Recommendation. 4 RESTRICTED RESTRICTED LITERATURE REVIEW HISTORY OF UAV 11. The idea of using an unmanned aircraft against enemies has been in the mind of humans since long before the Wright brothers invented the airplane. This concept is present in ancient history. Winged weapons being used by gods to gain an advantage over their enemies were illustrated in Chinese writings, which mention a warlord using large kites to carry explosives over the walls of a city and fortress nearly 2,000 years ago. This allowed him to attack his enemy while keeping his own troops out of range. 12. An aerial balloon that would use a time delay to float over enemies and launch rockets down on top of them was designed by a French scholar in 1818. An aerial photography system hanging from a large kite was experimented with by U.S. Army researchers as early as the 1890s during the Spanish American War. William Eddy took hundreds of photographs from kites, which may have been one of the first uses of UAV in combat. 13. In the following discussion of the historical development of unmanned aerial systems, I will periodically refer to the progress made in these three areas. Where numerous similar systems were being developed at the same time, I will describe how we reached the current level of UAS technology. 5 RESTRICTED RESTRICTED Figure 2: Artistic Depiction of The Aerial Bombardment of Venice in 1849. Artwork from Aerostation - Aviation (1911) by Max de Nansouty (Cyprian Aleksander, 2018). 14. The issue of UAV for MAF has been discussed and demonstrated since 2013. Due to enhance the role and task of Battalion 165 Army Intelligent, assets procurement of UAV has been discussed to improve the air intelligent for this unit. UAV assets procurement was in line with current and future technology development. On 27 September 2013, UAV demonstration conducted to test and adapt to the needs of Battalion 165 Army Intelligent operation (Jubli Emas KRD Ke-50, 2020). 15. History establishment of MAF UAV Squadron start on 15 November 2015 with formation of the nucleus team that consist of 5 officers and 8 other rank from Army and Air Force lead by Leftenan Kolonel Abdul Razak bin Sipit. UAV team organic to GEOINT Branch for admin and operation (Jubli Emas KRD Ke-50, 2020). 6 RESTRICTED RESTRICTED Figure 3: UAV Demonstration at 165 Battalion Army Intelligent (Jubli Emas KRD Ke-50, 2020). 16. UAV is a key component in MAF planning for transformation of the military. UAV mainly focuses on ISR mission, Battlefield Damage Assessment (BDA), Boarder Maritime and Coastal Monitoring, Aerial Mapping, Search and Rescue (SAR), Target Acquisition and assist in Humanitarian Assistance and Disaster (HADR) missions (Airspace, 2008). 7 RESTRICTED RESTRICTED 17. UAVs are important for the MAF as they provide a cost effective platform to conduct surveillance operations. Malaysian development of UAVs over the past decade has been dominated by two companies, Unmanned Systems Technology Sdn. Bhd. (UST), a subsidiary of Composites Technology Research Malaysia Sdn. Bhd. (CTRM), and Sapura (Defence Review Asia, 2009). 18. UST’s Aludra Mk2 is currently being tested by the MAF as part of the Ops Pasir surveillance operation off the resort islands of Pandanan and Sipadan,. As it is still being tested, the government has no intention to procure it yet. An alternative version of the Aludra Mk2 is currently being developed for deployment from ship decks. UST has also developed a handheld UAV, known as the Aludra SR-08, for in FIEeld deployment. 19. SCS, in collaboration with USM and Dian Kreatif Sdn. Bhd., developed the Nyamok UAV, one of the ¿ rst Malaysan UAVs. SCS has also a produced a handheld UAV, known as Agas. Despite its relatively short endurance time (30 minutes), it was reported that the Agas UAV was being considered for as a surveillance & reconnaissance tool for the Ops Fajar operation in the Gulf of Aden, in addition to the Fennec and Super Lynx helicopters. This was due to the fact that the Agas UAV is easy and quick to launch, by hand or using a bungee. 8 RESTRICTED RESTRICTED Name: Aludra Mk2 Altitude: 3,700 m Endurance: 6 hours Range: 150 km Name: Yabhon Aludra Altitude: 4,500 m Endurance: 30 hours Range: 500 km Name: Aludra SR-08 Altitude: 4,000m Endurance: 100 minutes Range: 15 km Name: Cyber Eye II Altitude: 4,000 m Endurance: 10 hours Range: 150 km Name: Agas Altitude: 900 m Endurance: 30 minutes Range: 5 km Name: Cyber Quad Altitude: 1,000 m Endurance: 40 minutes Range: 1 km Figure 4: Malaysian made UAVs. (Adapted from Military Photos (2009)) 9 RESTRICTED RESTRICTED HISTORY OF NCO 20. Network centric warfare can trace its immediate origins to 1996 when Admiral William Owens introduced the concept of a 'system of systems' in a paper published by the Institute for National Security Studies. Owens described the serendipitous evolution of a system of intelligence sensors, command and control systems, and precision weapons that enabled enhanced situational awareness, rapid target assessment, and distributed weapon assignment. In 1996, the Joint Chiefs of Staff released Joint Vision 2010, which introduced the military concept of full-spectrum dominance. Full Spectrum Dominance described the ability of the US military to dominate the battlespace from peace operations through to the outright application of military power that stemmed from the advantages of information superiority. 21. The development and application of information technology has greatly changed the pattern and rhythm of human life, especially from the industrial age to information. Therefore, the effort to dominate information is very critical in the effort to maintain state sovereignty. This includes information at the strategic, operational and tactical levels. The use of ICT has become a must to ensure the mastery of information at every level. With the superiority of information, the ability to defend the country can be doubled and the ability of mush can be easily weakened. This effort involves infrastructure construction and related application development. Efforts to complement the requirements of Network Centric Operations (NCOs) that have comprehensive collection and analysis applications should be given priority to enable every element of defence in a network of unlimited communication systems. It was followed by the development of a database centralized regulated by each agency involved in defending national sovereignty. This infrastructure should be shared with the NCO. 22. The MAF NCO is a concept which utilizes the application of ICT in the Information Age to speed up communications and increase situational awareness through networking, thus improving both the efficiency and effectiveness of MAF operations. This acquired capability allows the MAF combat units to be smaller in size, able to operate more independently and effectively, and undertake a different range of missions compared to non-networked forces. In the MAF NCO environment, data from networked sensors will be processed into information. It is intended to increase collaboration through enabling the free flow of information across the 10 RESTRICTED RESTRICTED battlespace so that acquired data is shared, processed into information and then provided quickly to the personnel or system that requires it. The EJTF of the MAF is the premier organization that has been designed, organized and structured to meet the requirements of this NCO ‘Blueprint’. Figure 5: The implementation of NCO can allow for integrated communications and information sharing between various military assets, for air, sea and land, which employ varying communications platforms and protocols. 23. The program involves integration with the MAF’s existing systems and assets, and enhances platform capabilities in addressing both traditional and non-traditional threats. It is also an MAF capacity development plan to provide more credibility to the armed forces and versatility to carry out their roles and responsibilities to meet the challenges of the changing geostrategic security environment, technological innovations and the concept of the operation of the present and future military organization. 11 RESTRICTED RESTRICTED 24. A significant part of the implementation of 4D MAF plan involves the development of the MAF’s C4ISR capabilities. At present, existing C4ISR capabilities are adequate for the MAF to conduct its operations. However, the MAF is in the process of embracing the concept of network centric operations (NCO) (also commonly known as network centric warfare (NCW)) to improve its C4ISR capabilities into a more effective war fighting capability. 25. NCO allows for a robustly networked force to share information by means of secure infrastructure that enables self-synchronization and, ultimately, more effective military. The implementation of NCO is based on four tenets: a robustly networked force improves information sharing; information sharing enhances the quality of information and shared situational awareness; shared situational awareness enables collaboration and selfsynchronization, and enhances sustainability and speed of command; and these, in turn, dramatically increase mission effectiveness. HISTORY OF EW 26. Contrary to common perceptions, the history of EW actually begins earlier than the Second World War. In fact, we can see the use of electronic warfare as early as 1861 in the U.S. Civil War. After the invention of the telegraph by Samuel F.B. Morse in 1837, telegraphy became the primary means of communication; overland cables became widespread. With the coming of the Civil War in 1861, therefore, telegraph wires became one of the most important targets for cavalry. Because Union forces used the telegraph extensively, they had more problems with these cavalry raids than the Confederate forces. Confederate cavalry switched military telegraph traffic to the wrong destinations, transmitted false orders to Union commanders, and cut the wires to deny information to Union forces. The cavalry of both sides tried to disrupt the other side’s ability to employ effective communication. These tactics are the first examples of signals intelligence, jamming, and deception. 27. EW is one of the elements of warfare whose main objective is the domination of the use of the EMS by one's own team and allies while hindering the effectiveness of its use by the enemy. The use of spectrum is increasing with the increasing level of microwave electronic technology and computerized data processing technology, especially in terms of its use in the 12 RESTRICTED RESTRICTED military field. These developments have made ATM aware of the importance of the role of EW in conventional warfare in modern times. Therefore, ATMs need to take steps to enhance EW capabilities. 28. Military operations are executed in an information environment increasingly complicated by the electromagnetic spectrum. The electromagnetic spectrum portion of the information environment is referred to as the electromagnetic environment (EME). The recognized need for military forces to have unimpeded access to and use of the electromagnetic environment creates vulnerabilities and opportunities for electronic warfare in support of military operations. Within the information operations construct, EW is an element of information warfare; more specifically, it is an element of offensive and defensive counter information. 29. NATO has a different and arguably more encompassing and comprehensive approach to EW. A military committee conceptual document from 2007 (MCM_0142 Nov 2007 Military Committee Transformation Concept for Future NATO Electronic Warfare) recognised the EME as an operational manoeuvre space and war fighting environment/domain. In NATO, EW is considered to be warfare in the EME. NATO has adopted simplified language which parallels those used in the other war fighting environments like maritime, land and air/space. Primary EW activities have been developed over time to exploit the opportunities and vulnerabilities that are inherent in the physics of EM energy. Activities used in EW include: electro-optical, infrared and radio deception; radio jamming, radar frequency countermeasures; jamming and EM compatibility deception and electronic and counter- countermeasures (or anti-jamming); electronic masking, probing, reconnaissance, and intelligence; electronic security; EW reprogramming; emission control; spectrum management; and wartime reserve modes. 30. On the 15 July, 14 Malaysian personnel, from the Airforce, Army and Navy and industry graduated from the AMS Dundridge College. Since February they have received a full range of EW courses and completed their training by undergoing the Instructional Techniques course which will give them the necessary skills to teach their new-found knowledge to other students in Malaysia. The school will be fitted with state-of-the-art laboratories and classrooms 13 RESTRICTED RESTRICTED for teaching a wide range of EW operations and procedures. The laboratories will be furnished with an extensive equipment suite including the AMS Elusion EW Trainer, a radar simulator and a communications trainer. All classrooms will be networked and Dundridge College will provide courseware and lesson material. 31. MAF keep a veil of secrecy over the EW unit and its equipment and its strenght are unknown. Although it is rumoured that already MAF have 2 units of Fuchs (Fox) electronic warfare (EW) vehicles and three mobile analysis containers. Allegedly MAF EW force will use the vehicles' sensor stations locate electromagnetic signals. They will also be able to quickly decode intercepted messages and send them to the containers for analysis by signals specialists before being sent to higher command levels. UAV CATEGORIES 32. UAV generally is a powered vehicle that does not carry a human operator, can be operated autonomously or remotely, can be expendable or recoverable, and can carry a lethal or nonlethal payload. Ballistic or emiballistic vehicles, cruise missiles, artillery projectiles, torpedoes, mines, satellites, and unattended sensors (with no form of propulsion) are not considered unmanned vehicles. Unmanned vehicles are the primary component of unmanned systems. 33. UAVs were originally developed through the twentieth century for military missions too "dull, dirty or dangerous for humans, and by the twenty-first they had become essential assets to most militaries. As control technologies improved and costs fell, their use expanded to many non-military deliveries, agriculture, applications. policing and These include aerial surveillance, photography, product infrastructure inspections, science, smuggling, and drone racing. 34. UAVs use a radio for control and exchange of video and other data. Early UAVs had only narrowband uplink. Downlinks came later. These bi-directional narrowband radio links carried command and control (C&C) and telemetry data about the status of aircraft systems to the remote operator. 14 RESTRICTED RESTRICTED 35. In most modern UAV applications, video transmission is required. So instead of having separate links for C&C, telemetry and video traffic, a broadband link is used to carry all types of data. These broadband links can leverage quality of service techniques and carry TCP/IP traffic that can be routed over the Internet. Table 1: Representative Classification Matrix of UAV. 36. UAV categories are imperative for segregation of the roles and UAV acquisition program to ensure standardization for UAV types across throughout MAF. Categories can improve MAF operational training and command and control by providing a common reference for grouping UAV. UAV group in a number of ways based on vehicle features such as aircraft type (fixed wing or rotorcraft), flight altitude (high, medium, low), weight and speed. Essentially larger plane use larger engines that offer higher speed, greater endurance and higher payload power than smaller vehicles. Maintenance and operation cost, and therefore research budgets often scale with size. The grouping methodology like assets serves to assist MAF and civil authorities define standard such for machinery, airworthiness and skills development. A representative classification matrix as per shown in Table 1. 15 RESTRICTED RESTRICTED Figure 6: UAV Classification UAV CLASSIFICATION ON DEFENSE STRATEGIES 37. UCAV stands for unmanned combat aerial vehicles. This category contains aircraft that are highly maneuverable and are able to engage in air to air combat and also provide precision weapon delivery to surface targets, see Figure 6. Figure 7: UCAV – MQ1 B Predator 16 RESTRICTED RESTRICTED 38. UAV are one of the biggest threats that war fighters face. They can be flown manually, but these days, many are flown by a remote operator, or even autonomously by onboard computers. UAV also include an operator or computer and a communication system that allows the two pieces to work together. The wide variety of UAVs can be classified accordingly based on role, range, weight, endurance, maximum altitude, wing loading and engine type. It can be categorized for better defence strategies: a. Information (ISTAR). Surveillance Target Acquisition and Reconnaissance ISTAR stands for information, surveillance, target acquisition, and reconnaissance. ISTAR is a practice that links sensors functions together in order to enhance battlefield functions in order to assist the combat force and manage the information collected. UAVs enhance the ISTAR scheme through IMINT, which provide comprehensive display of the battlefield. UAVs have proved their importance in ISTAR system in all the modern wars. The UAVs have reduced significantly the risks of collecting imagery from the battlefield, excluding the human pilot from the equation. b. Unmanned Combat Aerial Vehicle (UCAV). An unmanned combat aerial vehicle is an UAV equipped for striking targets. It was develop in order to reduce the risk of the human pilots being behind enemy lines. The combat UAVs are capable of neutralizing targets deep in the battlefield with extreme precision and minimal collateral damage. Combat UAVs have been successfully used in battle in Afghanistan, Pakistan, Yemen and many other battlefields. It has proved efficient and precise and the use of combat UAVs it’s widespread along modern operational environments. c. Multi-Purpose UAV. Multi-purpose UAVs are a combination of ISTAR and Combat UAVs. The complexity of the system is an engineering challenge that was launched in 2002 by the US army. The challenge was to equip the aircraft with a high sensitivity imagery sensor and to make it capable of carrying a large amount of ammunition. General Atomics Aeronautical Systems has answered the challenge with MQ-1C Gray Eagle. 17 RESTRICTED RESTRICTED d. Radar and Communication Relay. UAVs are essentially an aerodynamic balloon filled with helium and air and are used for low-level surveillance system that uses aerostats as radar platforms, provide low-level trafficking or also provide television and radio signals. e. Aerial Delivery and Resupply. The UAV in aerial/supply delivery category are manufactured for pin-point transmission of small cargo items such as ammunition and food supplies to Special Forces. The only UAV in this category is the CQ-10 Snow Goose. CONCEPT OF UAV IN MAF 39. The technology that is being incorporated into the UAV systems is continually advancing. State-of-the-art technologies such as Synthetic Aperture Radars, increasingly capable microprocessors, increased datalink rates, radar-absorbing materials, the use of high bandwidth communications, and SATCOM equipped navigation systems, are being integrated onto the platforms making them a key asset to militaries worldwide. Another key reason for UAV mission success is the UAVs’ low flying altitude and slow speed that makes them difficult for traditional enemy sensors to detect or recognize. UAVs may not be limited to the operating restrictions placed on manned aircraft – they have been sent on missions over enemy territory, against sophisticated integrated air defence systems – missions that would have to be thought twice about for manned aircraft due to cost or liability. With UAV operations, loss of human life is not a consideration making the decision to perform a high-risk mission easier. 40. The Malaysian Armed Forces (MAF) is in the process of embarking to implement the Fourth Dimension MAF (4D MAF) capability plan in order to be able to meet modern security challenges. The 4D plan is aimed at transforming the MAF into a fully integrated and balanced force, giving emphasis on jointness and interoperability among the triservices; the Malaysian Army, the Royal Malaysian Navy (RMN) and the Royal Malaysian Air Force (RMAF). This will ensure that the MAF has the necessary assets, resources and capabilities to defend the nation and its strategic interests against external aggressions, and to support civil authorities in maintaining internal security. 18 RESTRICTED RESTRICTED 41. The primary role of the UAV is to conduct ISR mission which can produce consistent, relevant and timely intelligence to higher commander. Therefore, in the joint operation environment, the UAV is capable of supporting and providing a valuable contribution at all levels of ISR operation: a. Strategic Level. Provide intelligence required by senior government and military leader to formulate national strategy, policy and plans. UAV is capable of providing precise, timely and predictive intelligence to enable decision makers to take appropriate action before crisis occur or unfold. b. Operational Level. Produce intelligence important to implement and planning theatre wide operation to fulfil the commander intent. Intelligence analysis helps to detect or discover, identify, locate and describe the vulnerable, vital elements of an adversary’s physical and virtual structure. c. Tactical Level. The tactical UAVs are specially designed to be used in the organic battalion level or in Special Forces. These UAVs are great assets for purposes of medium range surveillance. They have a vital role in filling the gap between the range of functions of the short-range micro-UAVs and the strategic UAVS, which comprise of the MALE and HALE. These drones achieve this by having a combination of flexibility, endurance as well as ruggedness. Basically, they are a good middle ground between small drones and strategic drones. 42. The Mission Commander is responsible for the safety of the UA, whether AV is in the air or on the ground from the time he accepts the UAV until such time that the flight or series of flights are completed and the UAV has been secured. PIC who is not flying as Mission Commander is responsible to assist the Mission Commander in the safe operation of the UAV. The degree of responsibility given to a second pilot will vary according to the UAV type and the qualification of the second pilot. Normally, the second pilot is responsible to the Mission Commander for the safe navigation of the UAV, and it is his duty to inform the Mission Commander whenever he considers that the safe navigation of the UAV is being jeopardised. 19 RESTRICTED RESTRICTED 43. UAV deemed to be crucial in fulfilling its duties as a tool for intelligence gathering. Intelligence is an exhaustive process in which required high degree of information’s accuracy and the ability to disseminate the information in the fastest manner. Figure 8: UAVs Concept (I. Ibrahim, 2019).) 20 RESTRICTED RESTRICTED INTEGRATION CONCEPT OF NCO AND EW WITH UAV 44. In the previous chapters, I gave general information about EW and UAV, and also discussed the historical perspective in both areas. It is clear that UAV have been used in the battle area for electronic warfare purposes since the Vietnam War. With improving technology, UAV become more involved in the EW arena. EW systems have become a vital aspect of modern combat, leveraged by another recent newcomer to the battlefield, advanced Remotely Piloted Vehicles (RPV) and drones. RPV and drones can employ a variety of electronic countermeasures, in addition to implementing their own jamming, intercept, and other SIGINT attacks. 45. The operational concept of NCO was initially developed for military operations, it has been, directly and indirectly, employed in various commercial areas with great success, such as banking, public transportation coordination and commercial fight ticket booking. The military implementation of NCO can allow for integrated communications and information sharing between various military assets, for air, sea and land, which employ varying communications platforms and protocols (Figure 1). This will enable effective command and control of all assets, ranging from individual troops and units to the division, battle¿ eld and theatre levels. 46. Developing Drone and RPV systems are extremely complex, especially in a government and military context, due to the complexity of the development stages, and systems integration complexity. Project management and technical challenges present themselves in terms of resource management, power management, security, communications, and other challenges related to testing, simulation, and regulatory compliance. 47. A typical platform consists of systems involving control, monitoring, and data processing, as well as the physical parts of the take-off and landing system. Beyond creation issues, factors that affect the maintenance performed on RPV and drones include the repair of defects incorporated in the software during the development process or because of changes in the agreed-upon requirements, or a desire to improve performance. 21 RESTRICTED RESTRICTED 48. There are also many things to consider when developing electronic warfare solutions to put into these platforms. Modern radio intercept involves real-time spectrum analysis, to see and evaluate everything that’s out there, with the ability to navigate complex and crowded RF environments. Modern countermeasures not only require agile RF systems, but also advanced software suites to perform the actual work involved. 49. Payloads are the determining factor for the role of UAV on the battlefield. With recent developments, EW payloads are getting smaller so that they can be inserted in mini or even micro UAS. This has a major effect on the planning process for UAV employment. We can classify five general payload types that account for the majority of current and projected UAV applications: information collection (sensing), communications support, navigation support, weapons delivery and electronic warfare. While the first three are used for both military and civilian applications, the last two are limited mainly to military purposes. GENERALIZED UAV AVIONICS ARCHITECTURE 50. In Figure 9, the elements of a modern UAV avionics suite are shown, deliberately drawn to emphasize similarity to the modular, integrated avionics of complex manned aircraft. Only the most advanced multifunction UAV will incorporate all of these avionics elements as depicted. “The basic features of modular fault tolerant hardware, high capacity fiber optic interconnects, and shared high performance digital signal and data processing are characteristics of any design that seeks to take maximum advantage of available technology to achieve high performance, reliability, and affordability.” 22 RESTRICTED RESTRICTED Figure 9: Generalized UAV Avionics Architecture a. Radio Frequency (RF) Payload Apertures. Radar, spectral surveillance functions that include RF radiometry and signal monitoring, and specialized apertures such as interferometers that are used in order to make an accurate determination of the direction of the coming signal use payload antennas. Broadband data links for SATCOM, line of sight (LOS) or relayed data communications required by the payload are also found in this area. b. RF Support Electronics. This is associated transmit and receive electronics, communicating via a high speed digital typically fiber optic network. These are placed behind the antennas. 23 RESTRICTED RESTRICTED c. Vehicle Management. Highly reliable flight, propulsion, and utility controls with the capacity to execute sophisticated adaptive control. Signals from flight data sensors are also processed here. d. Navigation. Used for obtaining vehicle position. Accuracy of this application is vital. One highly accurate and popular solution is an Inertial Navigation Unit (INU) integrated with a Global Positioning System (GPS) receiver. e. EO/IR Apertures. Sensors like optical or IR cameras, multi- or hyper-spectral sensors, and active devices. f. EO/IR Support Electronics. Signal conditioning, preprocessing, and analog- to digital conversion support The EO/IR apertures. Figure 10: UAV wave data communication concept 24 RESTRICTED RESTRICTED Figure 11: UAV satellite data communication concept 51. The main focus of this chapter is the EW and EW related payloads. UAS can contribute in all aspects of Electronic Warfare, from jamming and Suppression of Enemy Air Defence (SEAD) to Electronic Warfare Support (ES), and Signals Intelligence (SIGINT). The inherent range advantages enjoyed by EW/ES payloads make them the natural sensor of choice for cross-cueing payloads with shorter ranges and/or more restricted fields of view such as SAR or EO/IR sensors. EW fits for UAS can also include SIGINT payloads, or defensive sensors that can perform a SIGINT role. For example, a radar warning receiver (RWR) can be a source of vital information, particularly when related to imagery information to form a more complete or accurate situational awareness picture or when updating the electronic order of battle. The key is the integration of the inputs from all of the vehicle's sensors, or in the case of smaller more distributed systems that use a heterogeneous mix of sensors, all of the sensors on all of the vehicles. 25 RESTRICTED RESTRICTED ELECTRONIC WARFARE SUPPORT (ES) AND SIGINT PAYLOADS 52. ES and SIGINT sensors can supply very valuable information, especially when this information is a part of or related to imagery information used for forming a trustworthy situational awareness picture or for updating the electronic order of battle. Integration of the inputs from all of the sensors is the key to success. Furthermore, these sensors require less power because they do not transmit, but just receive and process signals. ES payloads are appropriate considering the constraints of mini UAV. 53. Studies, research and flight demonstrations prove that UVA can be utilized successfully for EW and SIGINT missions. “SIGINT sensors, for example, could be used to cue other sensors on a UAV, and they offered much longer detection ranges than EO/IR and SAR sensors.” UAV are an ideal platform for carrying EA payloads. The UAV can approach closer to the target emitters compared with aircraft because of their smaller RCS; therefore they need less power for effective jamming. 54. UAV can play a very important role in the prosecution of EW campaigns. In this case EW has a vital role in the protection of UAS. To exploit this relationship, small sized but effective EW equipment is needed. For example, a communications jammer or an electronic surveillance (ES) receiver can be used as the main payload. A RWR can be used as a UAV payload for threat warning. 55. There is a great variety of payloads that can be used on UAV. Communications and electronic intelligence payloads; communications and radar jammers; electro-optic, infra-red, and MAW sensors; MTI and SAR radars; BDA sensors; communications relays; EW selfprotection suites; chemical, biological, and nuclear detectors; target designators; and “horizon extenders” are some of the payloads that can be mounted on UAV for EW purposes 26 RESTRICTED RESTRICTED Figure 12: Geolocation error ellipses for 0.5 deg. rms DF sensors onboard 2 platforms with stand-off range of 100km. AOI (100km x 100km) is bounded by blue line. Figure 13: Geolocation error ellipses for 5 deg. rms DF sensors onboard 8 platforms with stand-in capability. AOI (100km x 100km) is bounded by blue line. 27 RESTRICTED RESTRICTED MERGING CONCEPT UAV WTH MAF EQUIPMENT 56. UAV and unmanned vehicle SATCOM is primarily used for providing BVLOS (beyond visual line of sight) capabilities. Standard line-of-sight datalinks will be rendered unworkable at great distances due to the curvature of the earth, and drones may also fly out of range of ground networks such as 4G and other cellular services. A satellite can be used to relay and amplify radio or microwave frequency signals between the vehicle and its base station. 57. SATCOM satellites are usually in geostationary orbit, where they appear at a constant position in the sky, or in Low Earth Orbit (LEO), where they appear to move. LEO satellites are at a lower altitude than geostationary satellites, meaning that they will provide less latency, but geostationary satellites have the advantage of not needing to be tracked. Figure 13: UAV network and connectivity architecture in MAF 28 RESTRICTED RESTRICTED 58. Satellite communications are split into different frequency bands. In increasing order of frequency and decreasing order of wavelength, these are L-band, S-band, C-band, X-band, Ku-band and Ka-band. Higher frequency bands usually provide greater bandwidth, but are also more susceptible to signal degradation due to signals being absorbed by atmospheric rain, snow or ice. X-band is typically used by the military as a compromise between these two factors. DISCUSSION AND ANALYSIS 59. This section will discuss and analyse on the UAV development. It will discuss about the factors that influence the importance of UAV to integrate with NCO and EW in MAF operation, challenges of UAV and how UAV may contribute in overcoming the problems 60. In any military operation, precise battlefield intelligence is important to know the enemy weaknesses at every level of command. This UAV is required to obtain real time and accurate intelligence information especially in area of operation and hostile territories that are difficult to be accessed by troops on the ground. The real time information provided by the UAV is essential for the commander to plan and execute mission effectively, day and night operations. (Akcesme, 2014). ELECTRONIC WARFARE CONSIDERATIONS 61. There are also many things to consider when developing electronic warfare solutions to put into these platforms. Modern radio intercept involves real-time spectrum analysis, to see and evaluate everything that’s out there, with the ability to navigate complex and crowded RF environments. Modern countermeasures not only require agile RF systems, but also advanced software suites to perform the actual work involved. a. Electromagnetic Jamming. Jamming payloads for UAS are being produced and integrated into a variety of UAS. Stand-in capability by UAS should be considered 29 RESTRICTED RESTRICTED as a very important advantage. The closer the point of transmission, the less power required. Getting closer to the target will provide a more effective capability using the same amount of power. All kinds of jamming tactics can be used, depending on the size of the payload. Range gate pull-off velocity gate pull-off, and multiple false targets are some of the techniques that can be offered. Another possible EA payload might be a GPS jammer. Jamming adversary GPS systems would help protect high value targets. Considering that most of the new technology weapon systems use GPS as the primary guidance system, deceiving them can prevent friendly force losses. b. Electromagnetic Deception. While attacking a target, deploying decoys is a way of using deception. Another technique would be sending decoys prior to the real attack force, as was done during Bekaa Valley, Operation Desert Storm and Operation Iraqi Freedom. While the adversary is reloading weapons, a very well-planned attack would bring victory with no or little loss of friendly forces. Repeaters can be used as a means of EA. They can provide a target of selectable RCS to validate the masking performance of the jammer against a number of radars. With the false target indication on the radar, other more important assets can be protected. c. Directed Energy. Today, there are ongoing research and test programs concerning Directed Energy Weapons (DEW). The latest known development is mounting a DEW on a C-130H aircraft. The directed-energy weapon is designed to fire through a rotating belly turret in the aircraft, known as the Advanced Tactical Laser (ATL). d. Anti-Radiation Missiles. SEAD has already been conducted by UAV. For more effective SEAD missions, miniaturization of the weapons with the necessary destructive power, so that they fit onto the UAV, is a vital need. For example, the HARM missile, which can be deployed from a Predator B, may change the total concept of SEAD operations in the future. 30 RESTRICTED RESTRICTED e. Expendables (Flares and Active Decoys). Even though there is no known application of UAS carrying chaff or flares, or being used as an active decoy, it seems possible. In particular, using UAS as an active decoy is very possible to provide protection for slow flying aircraft. This section will discuss and analyze on the UAV development. It will discuss about the factors that influence the importance of UAV in MAF operation, challenges of UAV and how UAV may contribute in overcoming the problems 22. In any military operation, precise battlefield intelligence is important to the know the enemy weaknesses at every level of command. This UAV is required to obtain real time and accurate intelligence information especially in area of operation and hostile territories that are difficult to be accessed by troops on the ground. The real time information provided by the UAS is essential for the commander to plan and execute mission effectively, day and night operations. (Akcesme, 2014). 23. In order to make the UAV operational success, there are several factor that need to be consider: a. Airspace Management. UAV operate in both national and international airspace would be under full military control either under military or civilian control airspace. A well coordinated management by Joint Airspace Management and Coordination Centre (JAMCC) and RMAF Operation Centre is required prior to any UAV mission. The airspace management remains one of the top factor impacting the UAV integration with other airspace users. In peace time, mission planner must consider airspace management conflicts. Therefore, for UAV operation in Malaysian Airspace, JAMCC will work in hand with the RMAF Control Reporting Centre (CRC) and civilian aviation authority to record, coordinate and allocate airspace segments and monitor any UAV flying activities. b. Sector Covered by MAF Services. The roles are not limited but expected to grow in the future. Hence, the operation must not limit the capability of UAV to a specific role to support the multi-environment tasks. (1) Army Roles. Malaysian Army primary Area of Operation (AO) is at core area. The UAV is to produce tactical level imagery and intelligence to tactical and 31 RESTRICTED RESTRICTED RESTRICTED 14 RESTRICTED operational commanders in the land environment. (2) Navy Roles. In naval application, the primary AO is off shore economic interest and core area. The UAV can provide accurate intelligence information in NRT to support the maritime operation and national territorial water. (3) Air Force Roles. Air Force AO is entire Malaysia’s Strategic Area of Interest including airspace, off shore and core area. The UAV should conduct ISTAR role and capable of providing NRT data to commanders and intelligence specialist at tactical, operational and strategic levels. c. Airworthiness. UAVs operating in Malaysia must obey Department of Civil Aviation, Malaysia (DCA) security and operational standards as those for airplane. Airworthiness certification takes into the account system configuration, usage, vicinity and the hardware and software on the entire system. Therefore, all UAV in MAF inventory will be registered under “State Aircraft” meaning they are subjected to operate according to existing Airworthiness Framework. Existing frameworks available are as follows: (1) Registration. Class I(a) to I(c) UAV is exempted from Director General of Technical Airworthiness (DGTA) registration, However, for class I(d), II and III UAV, each airframe shall be registered separately. (2) Operational Airworthiness. To ensure the safety and security of the airspace in maintained through a careful and detail management of all the flying craft in the airspace. The new UAV must be compliance with the operational airworthiness framework, especially when flying in a multi platform environment. (3) Technical Airworthiness. The UAV must be proven as fit to fly through phases of inspection and receive a Certificate of Airworthiness from DGTA office, which is the leading organization that monitors the standard of the flying aircraft. RESTRICTED 15 RESTRICTED Figure 8: Audit to Maintain Continuing Airworthiness d. Ground Crew Qualification. Malaysia took part in International Civil Aviation 32 RESTRICTED RESTRICTED Organization (ICAO) since 1958 and needs to comply with Chicago Convention 1944. Failure of the UAV can be fail if the operating staff lack of skill to the safety of the UAV during the operation (SZABOLCSI, 2016). Control, Pilot Command, Pilot in Command and second pilot must be certified to fly by Original Equipment Manufacture (OEM) and meet the currency requirements (Interview with SO3 Land Operations, Malaysian Army HQ dated 16 July 2020). e. Data Management. Nowadays, the requirement of tactical UAS to gather real time information is very critical. The UAS shall provide real time information gathering capability over an area of interest such as Exclusive Economic Zone (EEZ). The UAS shall be an autonomous system and shall capable of performing the following: (1) Provide capability to detect, identify, monitor, observe and record events or targets of interest for the purpose of analysis and action. RESTRICTED 16 RESTRICTED (2) Provide targeting information of sufficient accuracy or timeliness to adjust fires of artillery to at least accomplish second round fire-for-effect. (3) Conduct Battle Damage Assessment (BDA). (4) Perform coastal / maritime surveillance. (5) Perform borders surveillance. (6) Perform Search and Rescue / Combat Search and Rescue. (7) Target detection, recognition and tracking of vehicles. f. System Integration. The sensor images and data need to be received in real time from the AV to the Global Control System (GCS). The data from imaging and nonimaging sensor shall be collated and disseminated to relevant units or agencies. Modern operations derive from the concept of networked force C2, as well as information and data sharing in MAF operation, demand network-enable capabilities to achieve commanders’ desired effects. Therefore, the UAV should be able to communicate seamlessly with NCO through Satellite Communication, X-Band/Internet Protocol Virtual Private Network (IPVPN) and this data will be displayed into any NCO terminal at levels of command, including the joint office. g. Supportability. Each service is responsible to organize, train and equip assets and 33 RESTRICTED RESTRICTED ready to perform single service function while at the same time able to fulfill the MAF joint operation requirements. The elements of supportability that must be considered are: (1) Engineering Support. Each service should have the capacity to perform design integrity evaluation to produce a tolerable reliability, availability and maintainability (RAM) concept of the UAV life cycle. (2) Maintenance Support. UAV maintenance support should be able to RESTRICTED 17 RESTRICTED support on base and off base maintenance. Work scope to be undertaken by service in Organizational Level Maintenance (OLM), Intermediate Level Maintenance (ILM) and Depot Level Maintenance (DLM) should give more advantages to UAV in term of benefits and cost. (3) Logistic Support. Logistic support requirement focus on the repairing concept, which includes standard initial provisioning, refilling and maintenance service for the assets. Sufficient equipment must be available to support the annual UAV training and operational readiness requirement of each component unit and its personnel. (4) Training and Training Support. Specific mission essential task training, meeting established standards is critical if personnel are to provide the capabilities that support the commanders and set conditions for mission success. Training should address joint operation and concept across all phases of joint campaign and throughout the spectrum of service, joint, interagency and multinational operation. Specific mission essential task training, meeting established standards is critical if personnel are to provide the capabilities that support the commanders and set conditions for mission success. 62. Spectrum Monitoring over wide areas is one application for airborne RPVs and drones, as such activities used to require arrays of soldier-maintained antenna networks deployed 34 RESTRICTED RESTRICTED across the battlefield. Such systems are also useful in applications like radio direction finding, providing map data for battlefield planners, in addition to direct data for counter-battery artillery and airstrikes, sometimes also performed by drones. 63. These platforms must not only determine spectrum occupancy, they must also perform signal classification and often threat determination, capturing transient comms for deeper analysis, replay, regeneration, recording RF signals of interest, and providing alarms and alerts on signal detection. This requires the ability to determine signal characteristics, frequency occupancy, modulation types, and other identifying aspects of the signal captured. 64. One of the biggest challenges in developing any advanced autonomous system involves sensor integration. Optical sensors can range from infrared to ultraviolet, and every wavelength in-between. Wireless systems must cover significant portions of the radio spectrum, in both active and passive modes, temperature, humidity, and pressure sensors provide environmental data, and proximity, angle, motor encoder, and wheel-position sensors deliver critical information to the vehicle itself for self-awareness, maintenance alerts, and navigation. 65. 35 RESTRICTED