Kompa Hidayat Paling Latest Edit PDF
Kompa Hidayat Paling Latest Edit PDF
Kompa Hidayat Paling Latest Edit PDF
INTRODUCTION
1. In Malaysian Armed Forces (MAF), the system plays an important role in order
to support the operational of the organization. So that, the system have make the work
easier then before. There is many system that have been developed by our Subject
Matter Expert (SME) and being outsources from the outside for our organizational use.
In aspect of security, the system must be secured in order to prevent the information is
being leakage to the outsider especially from adversary. In this paperwork, we are
more focused on secure system that is commonly used which is Automated Messaging
Switching System (AMSS) and Command, Control, Communication and Intelligence
(C3I).
2. The idea of integration for both of the system is started from our Chief Defense
Forces (CDF), which he want the research is to be done to see whether it is good for
the MAF and our government especially in term of integration, financial and security.
From that our Assistant Chief Of Staff Defense Communication and Electronic Division
also have been being task to do a research for the better communication for the next
MAF generation. The idea of converging the network also being discuss in MAF ICT
Council Meeting serial 1/2017 dated 15th Jan 16 decided that the network of the system
have been integrate by using same IP VPN which can save the money without
additional cost. Now the overall system is being converged by using NWC but there is
some of the placement is still in standalone. The expansion of AMSS and C3I also have
been determine and include in Malaysia 2015 until 2017 budget which is focused on the
development and integration of the system1. Beside that, Information Technology
Strategic Planning MinDef 2016 - 2020 also focused on the integration of the system in
future MAF.2
1
https://www.treasury.gov.my/pdf/bajet/maklumat_bajet_kerajaan/2017/b60.pdf
2
Information Technology Strategic Planning 2016 – 2020.
1
RESTRICTED
RESTRICTED
OBJECTIVES
3. In order to fulfill the requirement for this topic of Commandant Research Paper,
several objectives have been outlined which are:
SCOPES
PROBLEM STATEMENT
RESTRICTED
RESTRICTED
7. The digital technology is now have been replace the analog system. Before that
the system is used by every COMCEN and now the system is already used by every
unit. They are used DEMS PKI software to send a message followed procedure that is
set by Allied Communication Publication (ACP 123). The message can be send based
on priority and security classification. The enstablishment of AMSS is as followed:
a. Phase 1 - Improve and increase the placement of AMSS with the total
of 185 placement in year 2004 - 2005.
b. Phase 2 and 3 - Improve and increase 302 placement in year 2009 -
2010.
c. Additional placement - In year 2011 - 2017 there is increase to 34
placement.
d. Total placement is consist of 521 placement with 900 terminal
(Consist of Supervisor Terminal (ST), Message Terminal (MT) and Crypto
Terminal (CT).
3
RESTRICTED
RESTRICTED
8. 91 RSR. The unit which support the operational of AMSS is 91 RSR. It is started
operate in year 1999 consist of 32 Officers and 972 other ranks. The organization is
shown in Appendix B. The roles and task of 91 RSR are as followed:
9. History of Command, Control, Communication and Intelligent (C3I). The C3I ATM
system was first developed by GEC Marconi Company in 1990 and handed over to the
ATM in 1996. In the beginning of 1997, the improvement initiative was taken with the
appointment of System Consultancy Services (SCS) Sdn Bhd to implement
maintenance on the system. Due to the rapid increase in technological factors and the
increasing need, the C3I MAF system requires changes and improvements. This
involves changes to organizations and functions, dubious system security issues,
hardware and software interrupts caused by Y2K and software structures that have
limitations to changes. Therefore, the action taken by taking a cost effective approach
for the long term is by developing the software in total and replacing the existing
hardware. The PX2000 software was later developed by the cooperation of SCS Sdn
Bhd and the ATM before the system evolved into the NC2 System as it applies today.
Connection contract extension was implemented in 2001 until now.
10. C4ISR Cell and RPS. The organization of C4ISR Cell (KOMLEK) is shown in
Appendix C. The RPS which is a unit that support C3I operation is operated in 1997
RESTRICTED
RESTRICTED
with the strength 88 officers and 850 other ranks. The organization is shown in
Appendix D. The roles of RPS are as followed:
OVERVIEW
11. AMSS. AMSS also known as Automatic Messaging Services System is a system
that provide the communication for messaging using Allied Communication Publication
procedure (ACP 123). The message that is sent are based on security classification and
priority of the message. This system have two encryption way which is encryption using
message encryption and secure network. The system also include with security which
have biometric device and smart card for multi authentication.
RESTRICTED
RESTRICTED
12. C3I. C3I also known as Command, Control, Communication and Intelligence is a
system which provide the secret information to the commander in order to do a
decision. It also provide command and control among the commander and COPS
through the network. This system is now used in a formation in order to provide
command, control and act as decision maker from an appointment military commander.
It is developed by using Local Area Network (LAN) concept and Wide Area Network
(WAN). This system is integrate with all three services including Joint Services. Now
there is about 103 C3I placement in Malaysia. This system also provide Strategic
Communication Network, ADP, Communication System and Video Conference.
13. This system using distributed database and update by the local user from time to
time. Although the system is integrate with all services but the database is used by own
services. The system can support for Joined Forces, Military Operation Other Than War
(MOOTW), Human Assistant Disaster Relief (HADR) and public operation. This system
is also design to allow the user to get the data based on user access control (user role).
RPS is responsible to maintain and technical advisor to all C3I placement. If the system
is failure, user can submit the report through Help Desk Online System that’s operate
for 24 hours.
6
RESTRICTED
RESTRICTED
14. The integration of the database is happen for MAF which is located at Defense
Operating Room (DOR). Joint C3I can get the data from 3 database by services and
own database. The use of this system is able to provide and disseminate accurate
information thoroughly using a secure system. It also helps the government to give
direction and control in war, threats, riots and natural disasters based on existing
information. Since the C3I system is capable of supporting current and future operating
needs, the system's capabilities need to be enhanced to meet the need to support the
Network Centric Operation (NCO) system during 2015 - 2020.
NETWORK
15. The network diagram of the system is different each other depend on the need
for basis. The AMSS diagram is can be refer in Figure 3. The diagram below also show
the conceptual and the link towards each node. The way it connect each other are
directly using secured IP VPN.
7
RESTRICTED
RESTRICTED
16. The C3I diagram before it is converged with AMSS system are as followed:
17. From the diagram, we can summarize that the flow of the network started from IP
VPN, CE router, IP Encryption (Only allow the registered IP to go through the network),
riverbed (Act as Quality of Services (QOS)) and distribute from the switch to the
application.
8
RESTRICTED
RESTRICTED
19. AMSS. Node and location of the system is different but some of the line is
converged together and standalone. The AMSS have 8 nodes and consist of about 521
location. There is about 901 terminal and 75 supervisor terminal are being issued for the
system. The terminal for sending message the terminal UU consist of about 685 and for
Terminal HH is 141 terminal.
RESTRICTED
RESTRICTED
10
RESTRICTED
RESTRICTED
21. C3I. The C3I system have about 103 location consist of 69 static location and 34
mobile location. The terminal that have being issued is about 1160 terminal.
11
RESTRICTED
RESTRICTED
CRYPTO SYSTEM
22. The crypto system also have different for each of the system. The crypto is act as
to secure data in appropriate way to unable the adversary or outsider to read the
message. The different are as followed:
AMSS C3I
Method Message encryption - The message Network encryption - Will allow
is encrypted. registered IP to enter the
Using secure network which is IP network using crypto. Using
VPN. secure network which is IP VPN.
Equipment Different model and requirement
Company Different company
Sites Different sites
23. Access level is the level of capability and the system which is located. It can be
conclude that the AMSS and C3I facilities are different for each level. It is also based on
each services. The access level are as followed:
AMSS C3I
Army ➢ Every level until unit in field ➢ DOR
➢ DOR, MK Formation, Div Inf, ➢ Army Field Command West, Army Field
Bde Inf and unit Command East,
➢ Placement of static and mobile ➢ Div Inf Fmn and Bde Formation
(Planning to buy for this year) ➢ Placement of static and mobile
Navy ➢ DOR until ship (Basement) ➢ DOR until ship (Basement and operation)
➢ C4 I Tacx (Medium X-Band)
Air force ➢ DOR until squadron ➢ DOR until squadron
12
RESTRICTED
RESTRICTED
STRATEGIC PARTNER
24. The strategic partner is a part of the development of the system. It is backbone to
the whole system. The two strategic partner for each system is as followed:
25. AMSS. The cost of the operational for 1997 until 2020 is over RM 60 million. The
spending of renting of NWC have save over RM 1,200,000 per year. Line capacity of
AMSS stand-alone that provide by Telekom Malaysia (TM) are as followed:
13
RESTRICTED
RESTRICTED
26. C3I. The history of procurement is as followed. Fixed line capacity that is provide
by Telekom Malaysia for the C3I are as followed:
14
RESTRICTED
RESTRICTED
ST ND RD TH
1 2 3 4
GENERATION GENERATION GENERATION GENERATION
System
Command GEC Marconi Redeveloped With integration With integration
and Control OEM version. Software. to tactical units to tactical units
Software Further - current (ships), GIS, (ships), GIS,
Ops requirement SFS. SFS.
Platform Unix Windows Windows, Open Windows, Open
Source, Java, Source, Java,
C++ C++
User TOTE, text- With multimedia, With multimedia, With multimedia,
Interface based, limited GIS video, GIS video, GIS
map
Application Without With 3 exercise Enhanced MAB, NC2, Tac-X,
modules Exercise, JIC, environment, JIC, Tactical Ship- UAV Feed
JTF MAB Shore, UAV feed
Security User Access 50 Security Dalil, VPN, IDS, File VPN (Ciku), IDS,
Control only 7 layer embedded Change Detect, File Change
security SANs compliance Detect, SANs
compliance
Map `Tellus MapInfo MapInfo ESRI
OA Uniplex Microsoft Office Microsoft Office Microsoft Office
(OWA)
E-Mail Uniplex Microsoft Microsoft Zimbra
Exchange Exchange
OS HP-UX Windows NT Windows Windows 7
2000/XP
Database Ingress MS SQL MS SQL MS SQL / ESRI
Geodatabase
Application Client- Server Client - Server Hybrid Web-Based
Database Centralised Distributed Centralized Centralized
Portal No Portal HTML HTML Sharepoint
Development Ingress - 4GL VB VB/ASP/C++ Silverlight/C++/T
elerik
Login No Standard Military number Military number Appointment
Admin Tools HP-UX Utilities PXM PXM AdminUtil
Database 1 Database – 3 Databases – 3 Databases – 1 Database –
Ops Ops/Trg1/Trg2 Ops/Trg1/Trg2 Ops/Trg1/Trg2
Deployment Server and Server and Server and Server
Workstation Workstation Workstation
15
RESTRICTED
RESTRICTED
SERVICE PROVIDER
29. AMSS. AMSS system is using Local Area Network (LAN) and Wide Area
Network (WAN) allow the user to send and receive message using ACP 123 standard. It
can send the message to the specific address and now using commonly in
administration of the unit. For message that is classified as secret, the message will be
sending using crypto. There is also certain procedure in order to send corrected
message, cancellation of message, request message that is receiving, readdress and
related procedure to ensure the message can be corrected, readdress and receive to
the user.
30. C3I. The C3I system is using Local Area Network (LAN) and Wide Area Network
(WAN). It is distribute information using secure system. It is to support the commander
in order to do a decision guided by Common Operating Picture (COP). In the C3I
system, there is many functionalities such as e-mail, Geographic Information System
Mapping (GIS), Asset Management, Microsoft Sharepoint, Chatting, Document
Management and report in order to support the operational, administration and logistic
support. It will provide the data from the responsible unit to the appointment military
commander in order to do a good planning and decision.
AMSS C3I
Service Sending mail and military letter
Data
Provider as an online. Situation awareness, Common Operation
File attachment. Picture System (COPS), Map, Document
- Text - doc, xls, ppt and pdf).
Sharing, E-mail and Image.
- Graphic - jpeg and bitmap. Telephone/Fax
- Text and graphic send/receive
IP Telephone, Analog Telephone, Faxmile
40 MB maximum and Hotlines.
Video Conference
Less used Video, image and audio (Limited Comms Strategic Extension (Fixed Sites
by user Bandwidth). and Transportable)
RESTRICTED
RESTRICTED
WEAKNESS
AMSS C3I
There is an equipment that is still used more There is an equipment that is used more
then 10 years (Ageing). The equipment is then 10 years (Ageing). The equipment is
ageing due to contract that is aggreed by ageing due to contract that is aggreed by
both of the govt and company. both of the govt and company.
There is no backup line/system. The line that There is no backup line. The line that is used
is used by the system by using one line and by the system is using one line and there is a
there is no backup system once the system Disaster Recovery Centre (DRC) that is
or server have a problem. stated and act for the system.
Many unit that is include. The AMSS can be Access until Bde Formation only. The system
used for many of the unit. is now more focus on Bde formation only. It
is usually used by Bde staff in order to
provide information and command and
control for the commander.
No backup for storage. The AMSS system is
also no included backup storage once the
system is down.
Contract less comprehensive. The contract is
sub to many of the company and not
comprehensive.
Less bandwidth (Stand - alone). The system
is used by the application doesn’t need a lot
of data.
17
RESTRICTED
RESTRICTED
Focus Daily GAQ. The system is used for Operational. The system used for
administration for daily used. It focus on command and control. It will
message to be sent to unit and required stored the data of every unit in a
action or info to the unit. server to convert into smart data
for the commander to do a
decision.
User Use by other rank (Clerk). Those who Use usually by an officer. Need to
have attend the course at 91 RSR for 1 attend the course at RPS.
until 2 weeks. The course is related
about procedure related for AMSS.
Bandwidth Does not need large bandwidth. It send Need large bandwidth. It also
only a message and image. consist of sending message,
image, audio, situational
awareness and video conference.
Tonner and Tonner and paper provide by supplier. Tonner is provide by supplier.
paper Many of the model use is Hewlett Many of the model used is Brother
Packard (HP) brand. brand.
Asset The terminal is for static place only. The The terminal is for static and
mobile terminal will be used in the mobile.
future.
Crypto / System crypto and software is different System crypto and software is
Software Using message encryption and IP VPN. different. Using IP crypto and IP
AMSS using software DEMS (PKI). VPN. C3I using PX 2000 and
using a browser as a platform.
Management Manage in regional. Manage by officer in each
of the system placement.
18
RESTRICTED
RESTRICTED
CONSTRAINTS
a. There is 156x AMSS placement and 3x C3I line that is still standalone.
b. Many of AMSS line have maximum speed 512 and 256 Kbps.
c. The software of both system is different.
d. Will increase the initial cost for convergence system and rate of rent will
be increase.
e. Use 2 different equipment and crypto software.
35. The integration of the system is become crucial to the highest commander. It is
also to ensure all the system is parallel and to ensure all the system integrate each
other. It can provide command and control to the organization. Now both system have
to integrate the line by using IP VPN. However certain location is integrate and certain
places is still standalone because some of the place does not have C3I.
36. In NCO there is an integration between all system. By using C3I as a backbone
and the other system to support the operation, It can provide all data in order to give to
the higher commander to do a decision. The system is still in different use because of
roles and task of the system is different each other.
19
RESTRICTED
RESTRICTED
20
RESTRICTED
RESTRICTED
ADVANTAGES DISADVANTAGES
Make the maintenance procedure is easier Make the one company monopoly to the
which is one company. The maintenance can contract.
be easier because the maintenance will be
centralize.
Using the same software and crypto system. There is no warranty if the system being hack
or down in security aspect.
Using one terminal for operation of both There is no backup for the system if there is a
system. problem in a formation/unit.
Larger bandwidth for all site. Line rent cost will be increases.
The system operational will be problem
especially in a unit – Combine both of the
system.
Procurement cost / new software and hardware
will become higher.
RESTRICTED
RESTRICTED
SECURITY
39. The security is a crucial part which is compulsory in every system. In AMSS and
C3I there is certain element of the security between them that should be considered.
The security element of the system must followed the principle below:
AMSS C3I
Authentication Multi authentication Authentication
- Using biometric card and - Using own username and
password. password.
Crypto (Both Encrypt message. The system Encrypt Network. It will encrypt
are mention in encrypt the message that is sent to the network and allow only
subtopic the user. registered IP to enter the
crypto) system.
Purpose Administration only. It is send daily Operational (GAQ). It is used
to send the message or info for for operational to ensure the
daily purposed used. command and control in a
formation.
3
MD 3.2.2A TD Manual Keselamatan Komunikasi dan Elektronik
22
RESTRICTED
RESTRICTED
RECOMMENDATIONS
40. The both system is already established from 1990 and above. Then, what we
have must be improvise from time to time due to the technology changes and industry
revolution 4.0, so that we can have the better system for our future use. From my
analysis, the system can be integrate as we considered the subject is as followed:
a. Strength of the Unit and Different Roles and Task. Based on my research
the unit itself have different roles and task. Both system are act as strategic and
operational communication which AMSS is only for admin and daily messaging
while C3I is for operational that includes all requirement and needed for the
commander. For future, we can consider a few thing is as followed:
(1) Maintain what we have now and just more focus on technical and
development part which one system can be used both of the unit which is
91 RSR and RPS.
(2) The one of the responsible for the AMSS Cell can be detached
from 91 RSR to RPS but certain thing must be consider and the
paperwork should be done and must be coordinate properly.
(3) Management of the system can be centralize or execute by a team
member.
RESTRICTED
RESTRICTED
do some improvise by using both of the crypto which one is the best. To
authenticate we can used and increase the aspect of security system used by
both of the system such as card and biometric authentication.
d. Technology and Software Development. The technology and software
have been unchanged and ageing. In order to suit with the latest technology we
suggested that the system can be integrate but must be design it very well and
user friendly. In the next contract we can suggest the research can be include in
the contract so that the development of the system and module can be improvise
very well. To save the cost of budget, we also can suggest that to create a team
member to develop the software. The team member should be Subject Matter
Expert (SME) and go to the course that are related such as software engineering
and focus to the development of the system.
e. Improvise the Wi-fi Infrastructure Network For Every Placement. The
system is already allocate to every formation and unit. In a worldwide of digital
and internet of things we also must consider the used of wi-fi internet and internet
for workstation. The used of the internet can improve daily work and make all the
information is can be access worldwide. We can suggest that wi-fi infrastructure
can be include for the next contract. For the first time, it required a high cost but
in future when we have an infrastructure we just have to maintain it and allocate
for maintenance.
f. Allocate the AMSS at Royal Malaysian Navy (RMN) Ship and C3I
placement until Unit Level. Based on the research both of the system is allocate
at certain placement for used and focus on the usage and roles and task. What
we can suggest is the used of AMSS is suggested to be link to the RMN ship that
is now operating. It is to ensure the information and admin part can be easily be
send. In C3I we can upgrade the allocation until the unit so that the commander
in Bde and Div level can command and control the unit under command itself.
24
RESTRICTED
RESTRICTED
CONCLUSION
41. Based on the research, we can conclude that in MAF the system is now are
converged the line without converged the system. We can recommended that in the
future the system can be integrate each other but it will affect to an organization, role
and task, cost and related as stated in this paper. If the system is integrate, the things
that should be considered is the cost and the usage of the system. We must consider
the utilization of the system to prevent us from wasteful. This paper also tell us about
the both system in term of capability, what we do now and planning in the future MAF.
(5217 words)
Sep 2019
25
RESTRICTED
RESTRICTED
BIBLIOGRAPHY
MD 6.0A TD Semboyan.
https://www.treasury.gov.my/pdf/bajet/maklumat_bajet_kerajaan/2017/b60.pdf
26
RESTRICTED