recommended reading

Army Needs More Uniformed Personnel to Maintain Tactical Network Gear

U.S. Army Pfc. Robert Tucker talks on his radio while providing rooftop security for the customs checkpoint at Torkham Gate in Afghanistan's Nangarhar province, April 24, 2013.

U.S. Army Pfc. Robert Tucker talks on his radio while providing rooftop security for the customs checkpoint at Torkham Gate in Afghanistan's Nangarhar province, April 24, 2013. // U.S. Army

The Army needs to raise the number of uniformed personnel managing and maintaining its increasingly complex battlefield communications networks, the Pentagon’s test organization urged in its annual report to Congress.

J. Michael Gilmore, director of operational test and evaluation for the Defense Department, evaluated two Army exercises conducted last year at Ft. Bliss, Texas, and White Sands Missile Range, N.M., by the 2nd Brigade, 1st Armored Division. Gilmore determined that unit lacked the personnel to support a wide range of sophisticated radios and satellite communications gear.

The Army has added a large number of new network components without a corresponding increase in signal soldiers to manage and maintain these components, the report said, a situation that “has considerably increased the demands upon the signal soldiers who are available.”

There are currently insufficient signal soldiers assigned to the 2nd brigade to effectively operate and maintain the increased number of network components, the report said, noting implications for fielding of new tactical communications systems across the Army.

The Army should “evaluate the force structure implications of adding a large amount of new communications equipment into tactical units without a corresponding increase in support personnel,” the report said. 

New Army radios which use software to define frequency, bandwidth and security impose a heavy load on uniformed network support personnel, Gilmore reported.  It took 25 minutes to load software on a single manpack radio during a network test in 2012, and “it took two soldiers 2 to 3 days to set up and load all 46 Manpack radios and 96 Rifleman Radios in the test company.”

Due the lack of uniformed signal personnel, Army units remain “overly dependent”  on civilian field service representatives  “to establish and maintain the integrated network.  This dependency corresponds directly to the excessive complexity of use of network components,” the report said.

The Army has focused on fielding its new network equipment on Humvees and Mine-Resistant Ambush Protected vehicles over the past three years and now faces “the challenge of integrating network components into tracked combat vehicles [which] remains unresolved,” the report said.

“Due to vehicle space and power constraints, the Army has yet to successfully integrate desired network capabilities into Abrams tanks and Bradley infantry fighting vehicles. It is not clear how the desired tactical network will be incorporated into heavy brigades,” the report warned.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.