Military computers

From Wikipedia, the free encyclopedia

This article specifically addresses US armed forces military computers and their use.

History

Some of the earliest computers were military computers. Military requirements for portability and ruggedness led to some of the earliest transistorized computers, such as the 1959 AN/MYK-1 (MOBIDIC), the 1960 M18 FADAC, and the 1962 D-17B; the earliest integrated-circuit based computer, the 1964 D-37C; as well as one of the earliest laptop computers, the 1982 Grid Compass. Military requirements for a computer small enough to fit through a submarine's hatch led to the AN/UYK-1.

MIL standards and specifications

The Armed Forces have many numerical designations for computers or other equipment, to guide the military buyer's choice of appropriate technology for their application. For instance, MIL-STD-901D[1] would indicate that the computer passed shock and vibration requirements of specific tests for Navy installation. Some of these tests are specific to application usage, such as barge explosion testing, which simulates a torpedo hit and subsequent high peak shock to a ship on which the computer is installed.

MIL-STD-901D is divided into Grade A for "Items which are essential to the safety and continued combat capability of the ship" and Grade B for "items whose operation is not essential to the safety and combat capability of the ship but which could become a hazard to personnel, to Grade A items, of the ship as a whole as a result of exposure to shock".

In this way, a computer may have a rating of MIL-STD-901D Grade A, which would tell a buyer which shock tests the computer survived, what level of shock resistance the unit has, and that this piece of equipment will continue to normally operate in the event of a specific shock level.

Other MIL Standards and MIL Specs (Specifications) include testing for resistance to EMI/RFI bursts, environmental contaminants such as dust and gas, or temperature extremes. More on MIL Standards and Specifications at Defense Standard.

Barge Explosion Test Preparation
Actual Barge Explosion Test

The "gold standard" of testing for compliance with 901D is the Barge Test. A Barge Test is performed four times, each time placing 60 lbs HBX-1 explosive 24 feet under water, starting at 40 feet away, then at 30, 25 and finally 20 feet. In addition, the tests are performed in a fore-and-aft orientation to simulate an explosion at the bow or stern of the ship and athwartship to simulate an explosion by the side of the ship. A video of a barge test can be viewed.

Typically a military computer is much more robust than an industrial computer enclosure. There will be more structure inside to support the components, the plug-in cards will be individually supported and secured to assure they do not pop out of their sockets, the processor and heat sink will be secured, memory will be glued into their sockets, and so forth. This is to assure nothing moves during the shock events.

Security Standards & Specifications

To meet the challenges of defending the U.S. cyber network, the U.S. military has taken steps to improve the security of devices connected to Department of Defense information networks. According to United States Cyber Command, "Cyber threats demand new approaches to managing information, securing information, and ensuring our ability to operate."[2]

All military computers must conform to the latest FIPS 140 standards (FIPS 140-2) which specify the latest requirements for cryptography modules on devices used throughout the U.S. government.[3] FIPS 140-3, currently under development, will address new requirements to face existing threats, including software security and an additional level of security.

To address the risks associated with the increasing prevalence of commercial mobile devices (CMDs), a DoD Inspector General report from March 2013 identifies improvements necessary to track and configure commercial mobile devices to meet Army compliance standards. The report identifies existing gaps in tracking and sanitization for over 14,000 CMDs, recommending a "clear and comprehensive policy to include requirements for reporting and tracking all commercial mobile devices purchased under pilot and non-pilot programs."[4]

Field risks

The progress of small-scale computer technology in military applications was initially slow due to concerns about security and the ability to survive rugged environments and enemy weaponry. PC-based technology in the 20th century was not robust enough to withstand combat conditions and severe environments.

Hazards in the field include water and corrosives, sand and wind, extreme temperatures, high shock and vibration, power interruptions, susceptibility to EMI/RFI radiation, etc. Also, operator interface was complex, and most operating systems were not fast in operation, or easy to learn and use in pressure situations.

In the last decade, improvements in design and operator interface have resulted in new mandates for the use of small computer technology in the military. Some of the improvements have migrated over from home and business computing. Others have migrated over from industrial computing, where designs for environments such as Zone 1 hazardous areas in oil & gas exploration have been modified for army and navy environments.

  • Sealed enclosures using materials such as cast aluminum with magnesium have improved environmental resistance to contaminants and hazards, including EMI-burst weaponry.
  • Low-heat CPU designs have made sealed enclosures possible even for environments like the desert or naval bridge wing display under the open sun.
  • Advances like flash memory have eliminated moving parts and reduced mechanical failures.
  • Simpler, effective OS software has improved the operator interface and speed of execution, while reducing OS failures.

Applications and computer type

Bridge of the French stealth frigate Surcouf; a reinforced laptop computer is strapped on a rack to serve as a navigation aid.

There are many types of small computers used in the military. Recently there has been an increase in the implementation of thin client and rugged tablet PC technology in many applications that don't require full computing capability. Thin client technology reduces costs and eliminates some of the risks of placing more complex computers in rugged situations.

Embedded computers are being integrated into more applications. These computers are generally fixed-function computers that are robust and bring additional capabilities to machines or complex equipment.

Notebooks and laptops have become more rugged since the turn of the century, and more portable computers are being placed into warfighter's hands than ever before. A number of manufacturers are specializing in creating ultra-rugged notebooks for the military. Now, some of these advances created for the military are finding their way backward into the home and business markets.

Wireless communications technology has also improved in recent years. High-speed data transferral over secure, encrypted frequencies is consider a new standard for standard-security-level communications. The new wireless radio networking devices can establish a link between systems that could otherwise not physically communicate or be involved in command and control. Some thin clients and portable computers employ these recent advances.

Future computer use in the military

In the last 20 years, wide acceptance of small-scale computer technology in the military has occurred, and is likely to increase greatly. Confidence has improved in the ability of equipment to withstand combat and extreme environment conditions. Most importantly, modern combat has become a duel of speed. Faster and more technologically advanced weaponry demonstrates first-strike capability in current combat situations, which is likely only to encourage further implementation of computer technology into systems used in the US Armed Forces in the future.

See also

References

  1. MIL-Std-901D
  2. "United States Cyber Command". arcyber.army.mil. Retrieved on 25 September, 2013.
  3. "FIPS PUB 140-2: Security Requirements For Cryptographic Modules". 25 May, 2001. Retrieved on 25 September, 2013.
  4. "Improvements Needed With Tracking and Configuring Army Commercial Mobile Devices". 26 March, 2013. Retrieved on 25 September, 2013.
This article is issued from Wikipedia. The text is available under the Creative Commons Attribution/Share Alike; additional terms may apply for the media files.