IDF continues to implement digital communication

The largest communication battalion in the army, Channel, has implemented state-of-the-art communication devices in its recent maneuvers as a part of the Digital Ground Forces program

Date: 14/10/2012, 8:03 PM     Author: Florit Shoihet

Without communication an Army cannot move. This month, the largest communication battalion in the IDF (Zahal), Channel, took part in complex exercise helping troops maneuver and communicate with each other. The exercise was held in conjunction with forces from the Steel Division, Central Command, and the IAF. The exercise emphasized Channel’s main advantage: mobility. Forces of the communication battalion were able to hop between battalion headquarters with digitally outfitted, self-propelled cars.

“The battalion exercise is the end of a long process of technological operations and implementation that took place in recent months,” said the Commander of the Channel Battalion, Lt. Col. David Zriam. “This was accomplished with many platforms.” Among the devices included is system that has upgraded nearly all of the previous communication devices: The DGR 600 (Digital Ground Forces), the new state-of-the-art command and control system of the ground forces. “The upgrade enhances our abilities in nearly all or combat efforts, for example on the battlefield,” said Lt. Col. Zriam.

In terms of intelligence and logistics, the system brings a significant upgrade. “It has the ability to centralize all the logistics data from the level of an individual tank all the way up to battalion headquarters. The amount of data available to the battalion has grown,” said Lt. Col. Zriam. “In the past, the intelligence officer was sliding a red marker along a map, today there is a fast and efficient influx of intelligence and tactical data.”

The current exercise had a special focus on the security of information. There are three levels of information security, with the last level being implemented recently. Security measures include hardened external storage of data, heavy compartmentalization of information, and complex systems of permissions to limit the data to relevant parties. The latest security measures added personal identification required via security IDs, enabling the use of smart cards to operate military computers and compartmentalize the exposure of sensitive information.