Developed by the California based AeroVironment Inc. the remote-controlled hummingbird plane is inspired by biology — such as the hummingbird — and is equipped with video and audio equipment that can record sights and sounds. Such devices can be used for spying purposes and also for attacking remotely located targets
Anyone who watches what is going on in tech should not be surprised by the fact that defence forces around the world are racing to keep up with the blazing pace of ICT advances
Anoop Verma, Elets News Network (ENN)
The top new military trend is one that is known for its economy of scale. It consists of systems that are packed with cutting edge innovations from ICT, and are smaller, remote-controlled and brimful of intelligence. This is indeed, a new era. The era of rather small and unmanned drones. The Indian Air Force is currently flying the Israeli-made Searcher II and Heron for reconnaissance and surveillance purposes. About 100 Searchers are in operation on Indian borders in western, northern and eastern regions. According to a senior IAF official, “IAF is ready to induct more drones in view of their capability of using high-technology to perform specific tasks on the borders.”
The ICT technology being used in modern drones has come so far that basic computer knowledge is no longer essential for remotely flying an UAV. In many cases, military personnel are able to control the drones and direct their deadly payload from thousands of miles away by using just a mouse, joystick and ergonomic pad. “ICT is the single most important factor for the success of military operations in air, ground or water. Access to real-time, authentic and secure information is necessary for enabling the military commander to take the most crucial decisions. In net-centric world, commanders at all levels must be integrated through ICT so that they can have a common picture of the operation being carried out,” says Major General R C Padhi.
Drones – hi-tech and deadly
A wide array of drones are being manufactured by the Israeli defence establishment, including one of world’s largest and most technologically advanced drones, the Heron TP Eitan, which costs an estimated $35 million. With a wingspan of 26 meters (85 ft.), the Heron TP Eitan is of the size of a Boeing 737 passenger jet and can reach an altitude of 12,000 meters. But the biggest manufacturer and user of high-tech drones is the United States. A recently released Congressional report states that drones now account for more than 31 percent of all military craft in USA. This means that one in three aircrafts in USA are drones. We can only imagine the kind of cutting edge ICT that goes into these drones. The technology is a classified secret.
Equipped with sensors and micro-cameras to detect enemies, nuclear weapons or victims in rubble, these remotely piloted drones are capable of transmitting live video, audio and other data from hostile territory in all kinds of weather conditions, they are also capable shooting at targets with flawless accuracy. Military technicians sitting in the other side of the world can control the Predator drones by using a computer and a joystick. Only two miles from the cow pasture in Ohio, where the Wright Brothers learned to fly, there is the Wright-Patterson Air Force Base. There researchers are working at a project on miniature unmanned drones, which are of the size of insects and birds, but are capable of spying and even firing missiles from air.
These miniature drones are inspired by nature, in the sense that they replicate the flight mechanics of different insects and birds. Some of the drones even look like the inhabitants of the natural world. For good reason, the base’s indoor flight lab is called “micro-aviary.” The micro-aviary is equipped with 60 motion-capture cameras to track every movement made by the tiny robots. The drones themselves are programmed by a computer to fly and they can execute all kinds of acrobatics in the air.
ICT for security & surveillance
P J Nath
CEO, Nelco Ltd. spoke to eGov on the role that Nelco, a TATA Group company, is playing in Indian defence sector
Give us an overview of the role that Nelco is playing in the defence sector.
Nelco serves the Indian defence sector in key areas of integrated security and surveillance, and in satellite communication. Nelco started with providing Multi Sensor Intruder Detector Systems, including High Voltage Electric fencing, along with intrusion detection system, covering a length of 160 Kms, along the North West Indian border. We are now looking at providing next generation solutions in fencing, which includes non-intrusive infrared and unattended ground sensors (UGS) that send alerts to computerised command control systems for advance detection of intrusion even before the fence.
Tells us about your perimeter security and surveillance solutions.
We have also implemented high tech ICT project involving Integrated Perimeter Security, CCTV Surveillance and Access monitoring & Fire alarm systems for DGOS. The project involved 5 locations spanning across three states. This integrated supply of 17 different systems has connectivity on a single OFC (optic fibre cabling) network for monitoring and centralised Command & Control centre. Our engineering teams have now gained strong expertise in implementing C3i & C4i (Control, Communications, Computers, and Intelligence) projects over the last decade.
Tell us about the work that you are doing in the satellite communications solutions sector.
Nelco acted as an implementation partner in Satcom projects in 2010, which provides satellite based connectivity to 179 Indian Air Force user establishments. The company has also handled niche projects like implementation of Integrated Weather Monitoring Systems at Air Force Base Stations and Integration of high power Electronics Warfare (EW) equipment into EMI shelters & mobile platforms for one of our OEM partners.
What are your plans for the future?
We continue to pursue specific niche areas in high tech perimeter security systems, mobile VSAT communication systems (COTM) and computerised command control systems. We also make efforts in educating our defence agencies in the art of applying latest ICT technologies.
The rapid miniaturisation of the aerial drones due to new advancements in IT technologies is transforming the way we address our security related concerns and fight wars. Presently we are having drones that can loiter in the sky for more than 24 hours and provide real-time all-weather surveillance and reconnaissance over entire cities. The California based AeroVironment Inc. had unveiled the hummingbird drone in February this year. This drone can fly at 11 miles per hour; it can hover and perch on a windowsill. However, the bird is still a prototype. Mostly operators use radio-controlled devices to control such small drones. But newer systems are being developed that can be controlled through commands send by tablet computers.
Developed by the California based AeroVironment Inc. the remote-controlled hummingbird plane is inspired by biology — such as the hummingbird — and is equipped with video and audio equipment that can record sights and sounds. Such devices can be used for spying purposes and also for attacking remotely located targets
It has been in the reports that India is developing solar-powered spy drones, which can cruise in the sky for several days at a time. Once they become operation these high-altitude, long endurance (HALE) solar-powered UAV will provide a cost-effective and flexible 24×7 ISTAR (intelligence, surveillance, target acquisition and reconnaissance) platform. These HALE drones can easily be compared to a satellite that orbits closer to the ground. “Solar efficiency is low but we are looking at a payload of around 50 kg (sensors, cameras etc). We will seek some collaboration from either US or European companies,” says Dr Prahlada, DRDO’s chief controller R&D (aeronautics).
Major General R C Padhi
Additional Surveyor General
Surveyor General’s Office
“The country must start focussing on having indigenous war equipments. Import of weapons is an expensive proposition. At times it is difficult to manage the upgrades of high technology imported systems”
Last year the Cabinet Committee on Security cleared an Rs 1,500 crore DRDO project to develop the Rustom-H MALE (medium-altitude, long-endurance) drone. Being developed for the three services, Indian Army, Indian Navy and the Indian Air Force, the Rustom is capable of operating for 24 hours with a 350 kg payload. Its first flight is expected to take place in 2013. Once it becomes operational, the Rustom will replace or supplement the Heron UAVs, which are currently in service with the Indian Air Force. Then there is the Unmanned Aerial Vehicle (UAV) called DRDO Nishant, which is meant to carry electro-optical, electronic intelligence and communication intelligence payloads. Nishant has already been developed and is currently undergoing field-testing. Once it becomes operation, Nishant will be used for intelligence gathering over enemy territory and also for recon, training, surveillance, target designation, artillery fire correction and damage assessment.
Ground based defence and offence
Recently NIIT Technologies Ltd. implemented ‘Intranet Prahari Project’ for Border Security Force (BSF) personnel. This project enables BSF personnel in 237 locations to access their personal data from wherever they are posted. Under this project state-of-the-art data centres have been established; the Main Data Centre; a Disaster Recovery Data Centre (in a different seismic zone) and Mini Data Centres at Frontier HQrs for data storage. Sufficient cyber security measures to ensure network security and to prevent data loss or pilferage have been incorporated. Network connectivity has been extended to brigade level.
Regarding the safety features installed in the Data Centres built for the Intranet Prahari Project, Venkat Patnaik says, “The systems are based in structures with state of the art Building Management System including fire alarm and extinguishing capability. There are CCTV cameras, bio-metric access control, Intrusion Prevention System, multiple firewalls, Central Anti-Virus deployment. Additionally there is MAC based authentication of desktops/laptops connecting into the network. Also there is closed network with no internet browsing/ external email.”
KPM Das, Vice President, National Security and Defence, Cisco Systems says, “Convergence is here and now- networks carry voice, video and data with equal assurance. Combat signalers design, and build tactical networks to enable mobility – the network components are on the move, so are the platforms like battle tanks and ICVs and so are the soldiers with tablets and hand-held devices. This three-fold challenge is met by engineering architectures based on IP and use of protocols which are hardened for the battlefield conditions of impairment and disruption. Corps of Signals, around the world, has to be a step ahead of the general staff and commanders in ensuring that paradigms stay current and enable tactical-doctrinal shifts.”
Surely the evidence of cutting edge ICT is not confined only to aerial tools. Even the ground-based systems are incorporated with the best from the world of ICT. Platforms for conducting land-based battles, the heavy battle tank (MBT), infantry fighting vehicle (IFV), tactical vehicle, etc. are carry all kinds of hardware and software to enable night vision, navigation in all kinds of terrain, communication, remote sensing and accurately aiming at distant targets. In water we have ships such as patrol craft, corvette, frigate, destroyer, multi-purposes support ship, and aircraft carrier. The radars that are used by military for detecting intrusions on land, sea and air are basically software based devices.
Lt Gen AKS Chandele, PVSM, AVSM (Retd), Former Director General EME, says, “Effective utilisation of the electromagnetic spectrum and denial of the same to the adversary would be the centre of gravity in future warfare. Along with other cyber security measures, cyber warfare will include ICT based early warning systems for real time detection of enemy’s intrusions and their neutralization.”
Senior Vice President & Head India Govt.
Business, NIIT Technologies
“Intranet Prahari Project will bring a culture of electronic exchange of information through emails, e-notesheets, etc. It will reduce workload of paperwork and free up manpower for field operations”
All modern militaries make use of some kind of Battlefield Management System (BMS), which is the software that lets top military leaders plan their strategies. Sections, platoons, companies, regiments, brigades, divisions, as well as corps make use of communication technology that is in some cases far more advanced than what is available for civilian use. The telecommunications equipment and the electronic countermeasures equipment are again software-based tools. These tools are used to develop seamless linkages between sensors, weapon systems, commanders and their personnel in a networked environment. The power and the efficiency of the force is enhanced, as networking leads to new cohesion between maritime, land, aerospace and intelligence, surveillance and reconnaissance (ISR) domains.
Lt Gen AKS Chandele
PVSM, AVSM (Retd),
Former Director General EME
“We are in the Information Age and the future combat space will be the electronic battlefield. Information dominance over the adversary is of critical importance”
Lt Gen AKS Chandele adds, “Battlefield management is becoming network centric, with sensors, shooters and command and control systems being linked. Military relies on ICT to coordinate their forces and control their weapon systems. However, the battlefield will always remain people centric, since beyond the network is ultimately the human being.”
The transformation that ICT has made in the field of battle is glaringly obvious. Once the defence forces used to be armed with so called “dumb bombs,” which being bereft of intelligent software were completely incapable of accurately choosing or selecting targets. They could not differentiate between high-value targets and the unimportant ones. So the collateral damage on usage of dumb bombs would be fairly high. With ICT powered weaponry, the defence establishments around the world have a way of ensuring that there is minimum collateral damage. Instead of steel, microchips have started symbolising the new sinews of war.
The defence industry has for many years been producing surface-to-air and air-to-air missiles that can adjust their trajectory while speeding towards an enemy target. While there are remotely controlled missiles and drones in the air, on the ground there are unmanned armoured vehicles. Cutting edge ICT is being used to develop deep sea mines that can identify a ship by analysing the vibration caused by the ship’s hull. This means that the mine will have no difficulty in differentiating between a military and a civilian target. The Ministry of Defence, in India, established Centre for Artificial Intelligence and Robotics (CAIR) in Oct 1986. During the initial years, the research focus of this organisation was in the areas of Artificial Intelligence (AI), Robotics, and Control systems. In November 2000, R & D groups working in the areas of Command Control Communication and Intelligence (C3I) systems, Communication and Networking, and Communication Secrecy in Electronics and Radar Development Establishment (LRDE) were merged with CAIR.
Country GM – Products & Marketing,
Emerson Network Power
“Security remains the biggest concern for our online systems. Virtualisation has added extra security capabilities to the data centres, owned by defence departments or civilian sectors, in the form of closer management of virtual systems”
Today CAIR is regarded as the premier laboratory for R&D in different areas in Information and Communication Technology (ICT) as applicable to defence. Out of 300 personnel employed in the organisation 150 are well qualified scientists. During more than two decades of its existence, CAIR has developed a number of Information Systems, Communication Systems and Security Solutions. The organisation is also being credited with doing quality R&D work in Intelligent Systems technologies.
Ground based robots
A document from Department of Defence in USA states that by 2030, up to a third of the fighting force in USA would comprise of robots. The Virginia based, Defence Advanced Research Projects Agency (DARPA) has started testing a quadruped robot that can traverse all sorts of terrain and act as a pack mule for soldiers. Known as Legged Squad Support System (LS3), this semi-autonomous robot is developed from Boston Dynamic’s Big Dog and Alpha Dog robots. Packed with advanced sensory systems, for vision and sound, the LS3 prototype is fully capable of distinguishing between trees, rocks, soldiers, and other obstacles. The LS3 is still going through a testing phase; ultimately it must be able to carry 400lbs for 20 miles without refuelling within 24 hours. The system can also serve as an auxiliary power source that soldiers can use to recharge batteries for handheld devices. As the LS3 shows, the design of the military robots is not necessarily human-looking. Basically, their design element is based on the kind of tasks that they are expected to perform.
Advanced armies are already using robots that are equipped with radar vision and supersensitive sensors and can handle broader range of tasks, ranging from picking off snipers to serving as indefatigable night sentries. Nothing can escape detection from an unblinking digital eye. The Israeli army has been using robots for assisting troops in combat for tasks such as surveillance, reconnaissance, anti-mine and anti-IED role, urban area combat, casualty extraction etc.
Unmanned Ground Vehicles (UGVs) and Long Distance Tele-Operation (LDTO) robots can be controlled through the secure Internet connection or even by cellular signals. They serve the purpose of keeping soldiers out of harm’s way. The CEO of iRobot, Colin Angle, says, “One of the great arguments for armed robots is they don’t panic under fire.” In some quarters fears have been expressed about robots taking over. But Colin Angle finds such fears to be completely unfounded. “There is no question of robots taking over,” Colin Angle says. “People taking robot and sensing technology and incorporating them into their own bodies is much more imminent.”
Dr Gulshan Rai
Director General, Computer Emergency
Response Team – India (CERT-In)
“CERT-In’s mandate includes the collection of information pertaining to cyber incidents, issue vulnerability notes, advisories, white papers and the analysis of those incidents”
ICT is also leading to seminal improvements in the performance of soldiers. Soldiers are equipped with high tech communication equipment and sensors that allows them to keep track of large areas in the battlefield. Even the Internet was first developed with a military objective in mind. The grandfather of today’s Internet, the ARPAnet, came into life in 1969. Funded by the Defence Advanced Research Projects Agency (DARPA) of the United States Department of Defence, the network was initially meant for defence related projects at universities and research laboratories in the USA. ARPA stands for the Advanced Research Projects Agency, which is a branch of the military that developed top-secret systems and weapons during the Cold War.
Finally the Internet evolved out of the ARPAnet and today we are having the Twitter and Facebook revolution. The Internet could only happen because four major innovations happened under the ARPAnet. These were: in 1971, the system of email or electronic mail got developed; in 1972, the telnet, a remote connection service for controlling a computer came into being; in 1973, the file transfer protocol (FTP), which allows information to be sent from one computer to another in bulk, was developed. The ARPAnet is just one example of how military technology has transmogrified into something that has proved to be seminally beneficial for the world. Many other modern tools from ICT that we are using in civilian space today were first developed for military purposes.
Director, Xgen Plus
“The threat of cyber terrorism is haunting the world. The Internet of the year 2012 has become so diversified that it now dominates terror circles. These groups will continue to use the internet as a prime medium for recruitment and communication”
“The period of the world wars is replete with examples of technologies being first developed for military and then being put to civilian use as well. Military technology has always been transferred for civilian uses where possible. ARPANET of DARPA morphed into the internet. Composites used in tanks etc. are now used in utensils. Similarly, today’s cutting edge technology such as recognition systems can be used in home security systems in future. Navigation systems in aircraft can give direction to GPS used in civilian fields, including in cars. Such possibilities are endless,” says Lt Gen AKS Chandele, PVSM, AVSM (Retd), Former Director General EME.
THE RAVEN B Small Unmanned Aircraft system
Developed by California based AeroVironment Inc. the Raven B system is a lightweight solution designed for rapid deployment and high mobility for both military and commercial applications. The system requires low-altitude surveillance and reconnaissance intelligence. The Raven B can be operated manually or programmed for autonomous operations.
The drone comes with advanced avionics and precise GPS navigation system. With a wingspan of 4.5 feet and a weight of 4.2 pounds, the drone is hand-launched. Its advanced sensors are capable of providing aerial observation, day or night, at line-of-sight ranges of up to 10 kilometres. The ground control and the remote viewing stations have access to real-time colour or infrared imagery.
Strategies for cyber warfare
“Security of information is non-negotiable. Hardware systems like desktop, laptop, PDA and hand held systems in use have to undergo security checks before it is commissioned for defence related activities. The systems are integrated into secured defence communication network for all types of communication,” says Major General R C Padhi. Defence forces have to pay lot of attention to securing their data. On the issue of using handheld devices in defence forces, General Ajay Chandele says, “ICT services must move to handheld devices from desktops. Security protocols need to be re-worked for the revised environments. There are security protocols for hand held data. If banks can manage confidential data on handhelds/mobiles, there is no reason defence forces can’t. As ICT systems will proliferate, handheld devices are the future. For example, even the F-INSAS (Futuristic Infantry Soldier As a System) will require handheld ICT devices for individual soldiers.”
In the conflicts of 21st century, computer specialists may become central. Cyber warfare is a growing threat and militaries around the world are racing to recruit computer specialists. For military strategists, the idea of cyber warfare is particularly dispiriting. This is the kind of warfare where the enemy has all the tactical advantages. He has the advantage of stealth, of anonymity and of unpredictability. In many cases, the defence establishments find it difficult to pinpoint the nation or area from which the attack has originated. When the location from which the attack has originated is not known, it becomes impossible to develop an effective strategy for deterring further damage by the threat of retaliation. Even if the location becomes known, the targeted nation might not have the legal or moral authority to respond, as it can never be conclusively proved if the cyber attack was a case of vandalism, of commercial theft or an effort to cripple a nation before launching a conventional war.
“The threat of cyber terrorism is something that has been haunting not only India but the rest of the world too. The Internet of the year 2012 has become so diversified that it now dominates terror circles. These groups will continue to use the internet as a prime medium for recruitment and communication. The security agencies have to upgrade their defences to prevent such groups from dominating the web,” Nitin Walia, Director, Xgen Plus Technologies.
A creation of Defence Research and Development Organisation (DRDO), Daksh is an electrically powered and remotely controlled robot used for locating, handling and destroying hazardous objects safely. The primary function of this battery powered remotely controlled robot on wheels is to recover improvised explosive devices (IEDs).
The IEDs get located by Daksh’s X-ray vision. Once the target has been identified, the robot picks it up using gripper arm before finally diffusing them with a jet of water. The robot also has a high-calibre shotgun, with which can it can take out targets, or break open locked doors. Its high-calibre sensors can be used to scan cars for explosives.
Daksh can climb staircases, negotiate steep slopes, navigate narrow corridors and tow vehicles.
The advent of the ICT age has given us the new domain of cyberspace and transformed how individuals, businesses and governments interact, but the tools from ICT can also be misused to launch cyber attacks on organisations and even on nations. The Cyberspace essentially comprises of the networks, computers, software, hardware, servers, and other devices including cell phones, tablets, radios, etc. By 2020 there are going to be more than 3 billion net users, maximum growth is expected in India and China. With such a large section of the global population conducting the business of their life in the cyber arena, there is bound to be an increase in vulnerabilities. Few months ago, Google had reported that its services had been targeted in an attack that originated from China. Later on Washington had moved in to classify that attack as an act of war.
‘’The fact of the matter,’’ a senior intelligence official in India says, ‘’is that unless Google had told the world about the attack on it and other companies, we probably never would have seen it. Many such attacks go unreported. Our economy, our government and our civil society is constantly being threatened by those who seek to disrupt the free flow of information. It is really scary.’’ When the Stuxnet worm first made its appearance, the world’s top software-security experts were panicked. This drone-like computer virus was radically different from and far more sophisticated than any that the world had seen. Till today there is not enough clarity about the Stuxnet payload, and the entities that were behind it. But according to some reports the Stuxnet worm appears to have attacked Iran’s nuclear programme. The worm was probably built by an advanced attacker with plentiful resources. The attacker could be a nation-state. The purpose of the Stuxnet was not espionage, it was built for sabotage.
There have been many instances in the past, when sensitive installations in India have come under cyber attack. “Today’s threat landscape has changed and point protection solutions may not be sufficient to secure from these complex attacks,” says Samir Sayed, Vice President- Sales, AGC Networks Ltd. Operational since 2004, CERT-In is the national nodal agency for responding to computer security related incidents as and when they occur.
|Strategies for War and Peace
The Takshashila Institution is a non-partisan, non-profit organisation registered in Chennai, Tamil Nadu. The representatives of the institution spoke to eGov on strategic affairs.
How real is the prospect of cyberwarfare?
.Should India invest more in enhancing its capabilities in the unmanned aircraft?
How are the Indian Armed Forces placed in terms of preparedness for cyber war?
Dr Gulshan Rai, Director General, Computer Emergency Response Team – India (CERT-In), says, “CERT-In draws its mandate from Section 70 (B) of the Information Technology Act, 2000. The mandate includes the collection of information pertaining to cyber incidents, issue vulnerability notes, advisories, White Papers, the analysis of those incidents and then advising to the users all over the country about the security breaches and what threat is persisting, what threats are likely to come there. These are the basic mandates and are carried out through different modes, different ways, by interacting with the public parties, by interacting with the users group be it public, private, govt. or academia. We take their help and they report a lot of incidents. We analyse threats ourselves and also take their help. We also take help from the international agencies who are in touch with us. The prime responsibility of CERT-In is to analyse the incidents and to provide emergency response to the users, organizations in the country and outside.”
ICT in logistical management
“Digital signatures are the way for authentication. They should be used more extensively to reduce paperwork, particularly in procurement processes, for RFIs, RFPs, tenders, supply orders, much else,” says Lt Gen AKS Chandele.
The revolution that ICT has brought in the field of military logistics is as momentous as the one in the field of armaments and cyber security. With the use ICT tools the military planners have a way of marrying the power of information with modern identification, transportation and electronic commerce systems. Defence forces have been able to develop seamless logistics systems that tie the entire chain of command into one network of shared situational awareness and unified action. Such digital systems help the defence forces to bring efficiency in their internal management of the manpower, the equipment and the armament related resources. The typical ICT systems being used by defence forces encompass all levels of security and they ensure that the right person has the right authority to access the right information.
Vice President- Sales, AGC Networks Ltd.
“If the data is classified as confidential then it must be encrypted in transit or at rest. Multiple technologies can be deployed for encryption during transit and for data at rest”
KPM Das, Vice President, National Security and Defence, Cisco Systems, says, “Over military networks, both in peace and war, digital identities are used online as a way to identify personnel and to provide access to various services and military applications offered by the defence agencies. While many aspects of the online eco-system have been improved through IT Policy, Information Assurance SOPs(Standard Operating Procedures) and innovations in technology, assurances of digital identity and managing those identities over the network with credence to privacy, security and ease of use remains a complex problem.”
The authorised defence staffs are able to manage and aggregate finance, payroll and personnel information in easy and efficient manner. Automation of procurement, personnel and pay administration, vetting, recruitment, estate management and performance reporting becomes easy to implement when with ICT based systems. Even the management of canteen supplies and medical stores being used by the defence forces is being streamlined through ICT. Technology can also help in creating systems more agile procurement and adaptation cycles that are required for preventing obsolescence and to maintaining interoperability. In a world where warning times are often getting reduced, defence needs to take a holistic approach to ICT capability for integrating both war and management related functions. Improvements in automation are exploited to provide better unity of command and reduced logistical footprint.
With knowledge provided by ICT systems, leaders have the necessary awareness. Precise, real-time knowledge of the disposition of their assets allows commanders to manoeuvre CSS assets as quickly as they manoeuvre combat elements, thereby shaping the battle. The Indian defence establishment is making extensive use of ICT based systems for things like readiness management, distribution management, asset management, and other logistical interventions. One important part of the entire logistical management exercise of defence forces consists of maintenance of all the equipments in operational worthy condition at all times. To look after this aspect, this there is always a dedicated branch/division. The management solutions the defence forces use are somewhat similar to that used by many world-class commercial companies for reducing inventories significantly through real-time information, coupled with rapid transportation.
for feedback contact: firstname.lastname@example.org