Anda di halaman 1dari 16

RESTRICTED

ABSTRACTS The Science and technology sector, specially computer and telecommunication sector was developing in an accelerating rate during last two hundred years. Presently these two systems had been integrated to manipulating stored information. Thus the term Information Technology came into being. Presently, organisations without this technology are considered backdated and not cost effective. Bangladesh Army has introduced computers in its various organisations. But it is yet to attain desired functional state of information technology in various areas of its military or administrative application. It is therefore needed to find out the likely causes of this drawbacks in order to suggest measures for effective application of Information Technology at brigade/ unit level in particular and army as a whole. A detail study of existing system of information management is made by studying various reference materials and own experiences based on my service in unit and Information Technology Directorate of Army Headquarters in order to suggest measures accordingly. The subject requires more detailed research to determine the extent and effects of information technology in the wider horizon of Bangladesh Army.

i RESTRICTED

RESTRICTED TABLE OF CONTENTS Ser (a) 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Introduction Aim Overview of Related Information Technology Terminologies Analysis of Existing Information Management System Limitations / Constraints of the Present system of Information Management Likely Fields for Application of IT Based System Including Benefits Organisational Shortcomings in Applying IT Based System Suggestions for the Best Application of IT Based System Recommendations Conclusions Heading (b) Pages (c) 1 2 2 3 4 5 7 8 10 10 Remarks (d)

Annexes:

A. B. C.

Graphical Illustration of Different LAN System. List of Suggested Software for a Brigade Group. Security Control Measures

A-1 B-1 C-1

ii RESTRICTED

RESTRICTED LIST OF ABBREVIATIONS USED Serial (a) 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20 21. 22. 23. 24. 25. 26. 27. Abbreviation (b) AAS AQ Br Admin AMS ATD AHQ BD Army BM Comd DARPA DQ DAC GS Br HQ ID IT ITAA IMS LAN MAC MT MTAS PIN PIMS RDS TO&E WMS Meaning (c) Accounts Automation System Adjutant and Quarter Master Branch Administrator Ammunition Management System Annual Training Diary Army Headquarters Bangladesh Army Brigade Major Commander Defence Advanced Research Project Agency Deputy Assistant Adjutant and Quarter Master General Discretionary Access Control General Staff Branch Headquarter (s) Identity Cards Information Technology Information Technology Association of America Inventory Management System Local Area Network Mandatory Access Control Mechanical Transport Mechanical Transport Automation System Personal Identification Number Personal Information Management System Ration Distribution System Table of Organisation and Equipment Weapon Management System

iii RESTRICTED

RESTRICTED

PF/4836/Commandants Paper APPLICATION OF INFORMATION TECHNOLOGY (IT) AT BRIGADE/UNIT LEVEL DURING PEACE TIME They are called computers, simply because computation is the only significant job that has so far been given to them. The name has somewhat obscured the fact that they are capable of much greater generalityTo describe its potentialities, the computer needs a new name. Perhaps as good a name as any is information machine. -Louis Ridenour, 19521 INTRODUCTION 1. The history of computer technology has been an evolutionary process in which inventors have built on past work at an accelerating rate of technological growth. Abacus was used in ancient time and subsequently from mid 16 th Century, many mechanical devices were invented such as Napier bones, slide rule2 etc. A British scientist named Charles Babbage was credited as the Father of computers since in mid 19th century as he conceptualized the system of storing data to be used later3. Lady Augusta was titled World first programmer as she wrote a demonstration program for the Babbages Analytical Engine at that time4. The theory of programmable computer was materialized in August 1944, when Hathaway Aiken and a team at Harvard completed the Mark I, the first fully programmable computer5. 2. Besides developments in the fields of computer technology, there took a great progress in the fields of telecommunications. The satellite technology and microwave system brought revolution in this field. It was early 1940s when data transfer requirement was felt and in 1940 it could be successfully transmitted. However, the inability to share information or to inexpensively recreate such systems pushed the Defence Advanced Research Project Agency (DARPA) to fund research into creating a system to link the computing centres and allow researchers to share information which completed in 1969 by successfully connecting University of California of Los Angeles, the University of Utah and few more government research centres in United States6. This integration of computer, network, telecommunication and data storage system gave birth to IT. 3. Military organisations around the world have adopted computer based simulators and war games to compensate ever decreasing training ground for their men. Many advanced armies have even gone too far to the level of conducting warfare through the use of IT. For example, in recent Iraq war it was found that the so called Allied Forces used IT system extensively to acquire real time intelligence. That intelligence was readily used by the war planners to conduct operations without having to engage in a close combat. 4. Bangladesh (BD) Army started making effort to computerize its various offices since mid eighties. But the organisational setup was not modified to cope with the technological changes and requirements. Therefore, fostering benefits from the technological developments around the world remained at large. However, during late 1 RESTRICTED

RESTRICTED 2003 a separate IT Directorate was established at Army Headquarters (AHQ) to implement IT based systems in BD Army. 5. Presently, out of IT applications, units are the base structures which are directly responsible for maintaining all information concerning their men, stores and accounts etc. Generally, the information are maintained manually which is time consuming, erroneous and laborious. But, application of IT based system in managing such information can reduce the time needed for their processing and errors. Therefore, it is important to study the existing system of information management at unit level in order to suggest best possible application of IT at brigade/unit level. 6. The paper will briefly analyse the existing information management system with its limitations and identify likely fields for applying IT based system including its possible benefits. Before that related terms will be discussed for the logical understanding of the paper. The paper will also highlight the organisational shortcomings in applying IT based system. Thereafter, efforts will be made to suggest effective organisational changes required for application of IT based system in BD Army specially at brigade/unit level. AIM 7. The aim of this paper is to analyse and identify possible application of IT based system at brigade/unit level during peace time. OVERVIEW OF RELATED IT TERMINOLOGIES 8. Followings are the related terms which will be used in the paper: a. IT. IT as defined by the Information Technology Association of America (ITAA), is, "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware." IT deals with the use of electronic computers and computer software to convert, store, protect, process, transmit, and securely retrieve information.7. b. Customised Software. These are the type of software that is developed either for a specific organization or function that differs from other available software. It is generally not targeted to the mass market, but usually created for companies, business entities, and organizations8. c. Local Area Network (LAN). LANs are computer networks ranging in size from a few computers in a single office to hundreds or even thousands of devices spread across several buildings. They function to link computers together and provide shared access to printers, file servers, and other services9. There are different techniques of LAN setting which are graphically illustrated at Annex A. d. Server. In information technology, a server is an application or device that performs services for connected clients as part of client-server architecture. A server application is defined as, "an application program that accepts connections in order to service requests by sending back responses." Server computers are 2 RESTRICTED

RESTRICTED devices designed to run such an application or applications, often for extended periods with minimal human direction10. e. Database. A computer database is a structured collection of records or data that is stored in a computer system. A database relies upon software to organize the storage of the data and to enable a person or program to extract desired information11. f. Hardware. In the electronics and especially computer industries, computer hardware specifically means the physical or tangible parts of the equipment, such as circuit boards, keyboards, monitors etc., in contrast to non-physical software running on the computer or other device12. g. Software. Computer software is a general term used to describe a collection of computer programs, procedures and documentation that perform some tasks on a computer system. The term includes application software such as word processors which perform productive tasks for users, system software such as operating systems, which interface with hardware to provide the necessary services for application software, and middleware which controls and co-ordinates distributed systems13. ANALYSIS OF EXISTING INFORMATION MANAGEMENT SYSTEM 9. Information Flow. In BD Army, the information flows from top to bottom and vice versa. It also flows parallel between unit and headquarters (HQ). Besides, the units are responsible to maintain information concerning their men, equipment, vehicles, stores, arms and ammunitions etc. These are maintained through different ledgers, registers and prescribed military forms. The exchange of information requires authorized signatures of staffs/commanders. Therefore, the information flow occurs within the unit as well. 10. System of Record Keeping. One of the very important aspects of military correspondence and exchange of stores is record keeping. Records of personnel, activities, training, operations, incidents, procurement, distribution etc are kept for sound administration and future planning. It is done in many ways such as keeping and maintaining files, books, pamphlets, photographs and other related materials. Some of the records are destroyed after certain periods as laid down in Official Secrets Act-1923 and other standing instructions. Others are kept until there is a specific instruction either to return those to the authority concerned or to destroy them by burning. Whatever may be the case, keeping records of such a huge amount of documents and functions are certainly a cumbersome job. They require storage, protection from damage and security. Keeping paper-based records is a costly affair too. 11. Handling of Classified Information. Classified information is maintained according to the Official Secrets Act 1923. These are the documents which require special care in their handling and despatch. In all the circumstances, the classified documents are endorsed in a register while kept under custody of the Commanding Officers/Commanders or staffs directly. These documents are maintained for longer periods than routine correspondence and returned to the originators or require the holding brigade/units to obtain permission for their destruction/disposal. 3 RESTRICTED

RESTRICTED 12. Personal Document Management. Personal documents are maintained for the entire length of service of each individual. These are paper based documents which are maintained at sub-unit level. Their entries are validated through different orders. The entries in the documents are inserted manually. Same copy of the document is also maintained at respective centres/records. 13. Management of Inventories. The different inventories of the brigade/units are maintained in different prescribed registers and ledgers. Each of the transactions of issue/receipt is endorsed in those registers/ledgers which are countersigned by staffs/officers. Issue/receipt vouchers are maintained against each issue/receipt as supporting documents. 14. Updating of Information. In most of the cases it has been observed that the documents/registers/ledgers are maintained by the inexperienced and unqualified persons as qualified personnel are not always available in the unit/sub-units. Though the registers of arms, ammunition, and other items are updated during each issue/receipt, but the personal documents are maintained periodically. Each update of information is made manually. LIMITATIONS/CONSTRAINTS OF THE PRESENT SYSTEM OF INFORMATION MANAGEMENT 15. The limitations of present system of information management at brigade/ unit level are discussed as under: a. Unreliable. Most of the manual systems of recording are highly dependent on the accuracy of the individual who are in most cases unreliable. Moreover, there are no clerks given to the sub-units. Thus, the endorsement/entry of data is primarily done by inexperienced and unqualified members of the sub-unit. It has been observed that they remain mostly unaware about the rules and regulations of data entry. Thus, the data entered by them in various documents, remains unreliable in many occasion. b. Time Consuming. Update of information and endorsement normally take longer time as those are to be handwritten. Paper based system necessitates additional time for drafting, printing, signing, filing, registering and dispatching etc. This causes more time to be spent for keeping the information updated in different documents. c. Duplication of Work. In many occasion, the same work of data entry are repeated such as daily books. The daily parade states are initially entered in the sub-unit books while the same needs to be written when updating the battalion daily book. The case is similar in case of such registers which are maintained subunit wise such as, ration consumption registers, training store registers etc. d. Laborious. Conventional data handling system involves manpower to prepare papers and to physically carry them from one place to another. Besides, most of the information is manually inserted. This requires the involvement of more manpower at brigade/unit level. Therefore, the existing system of information management at brigade/unit level is laborious. 4 RESTRICTED

RESTRICTED e. Expensive. The existing system of information management at brigade/unit level requires the procurement of stationeries such as papers, printers, ink, duplicators, copier etc. Procurement of these items require brigade/units to spent more money. If the expenditures of personnel involved in the process is taken into consideration then the system is quite costly. f. Wear and Tear. There are many documents which are required to be maintained for longer period such as sheet rolls, pay books, history books for weapons/equipment, ration returns etc. Again, most of the documents are stockpiled/ maintained into shelves which are not moisture proof. Thus, the condition of the documents deteriorates due to natural wear and tear over the period they are maintained. This causes the documents to be replaced and many data re-entered. g. Difficulty in Data Retrieval. As the information retrieval is completely dependent on the ability of the clerks to remember, therefore, their retrieval is difficult and time consuming. Thus, in most cases the information is not readily available and in many occasion incomplete. h. Requirements of Extra Space. Since the documents are maintained for longer duration, therefore, the stockpiles of documents gets heavy every day. Thus they require more space for shelving/maintaining these documents. j. Erroneous. Information endorsed into any document/ vouchers/ registers/ correspondence increases the workload of the officers as they require more time to verify those. Many a times, verifying those information are overlooked or avoided which increase the chances of errors in data entry. k. Audit Objections. As most of the accounts and inventories are manually maintained and in many occasion not adequately verified, therefore more chances of errors in data entry remains. As a result of such errors, brigade/ units faces number of audit objections. For example, it had been experienced that many audit objections related to soldiers condemnation of items were raised due to faulty data entry or lack of verification and awareness. l. Difficulty in Handling. The documents are destroyed after a specific period which requires thorough scrutiny before destruction. This causes great inconvenience for overall office management. The danger of loosing or misplacement of documents during handling or storage poses considerable risk. The risk is manifold during shifting of units from one place to another. LIKELY FIELDS FOR APPLICATION OF IT BASED SYSTEM INCLUDING BENEFITS 16. Personal Information Management. Presently personal information of each individual is maintained in different prescribed forms. As discussed earlier that their update is made manually. But, introducing customized software for data entry and their manipulation would have reduced much of the work of any unit/sub-units. Moreover, using this IT based customized software would also ensure regular update of each document and readily retrievable. In modern days, organisations have found it most cost effective and easy to use for managing their employees records. This will also assist unit 5 RESTRICTED

RESTRICTED commanders to evaluate the records of individuals for planning their effective employment. The Artillery Centre and School have developed customized software to be used by all other centres/records of BD Army14. The same if used at brigade/unit level then the personal data management in these organisations can be done more efficiently. 17. Account Management. There are number of accounts maintained at brigade/unit level. The procedure for their handling differs from one to another. There are set policies for handling of each account. If customized software is used for the preparation of note sheets and expenditure then much of the paperwork related to accounts could be avoided. It will also reduce the chances of errors in calculation and pilferages. More over, units and brigades will be able to avoid many audit objections. Besides, a commander/commanding officer will be aware of the statistics of the accounts at any time. 18. Inventory Management. There are many types of equipment/stores that a unit holds. The procedure of their maintenance and issue/receipt differs from store to store. In each unit/sub-unit the history sheets for arms and control equipment are maintained. The storekeeper is to endorse same data many a times in different history books. So is the case with other stores and equipment. To reduce such work, if a server with appropriate customized software is centrally managed with client privileges for each of the store keeper then the task would have been much easy. This will also reduce the duplication of data entry. This will not only ensure central control but will also allow regular update of the information. As such, the unit commanders/staffs would be more confident in performing their routine tasks related to store management. 19. Ration Management. One of the most troubled sectors of any unit/brigade is ration. Each of the unit has to maintain different vouchers and ledgers/registers for its accountability. Besides, the ration consumption of each month is calculated manually and recorded in monthly ration return. This ration return is an auditable document. Experience shows that the units/brigades faces many audit objections in this ration return alone than any other sector. It has been observed that a customized software used by AHQ, Administration Wing have reduced much of the hassle of manual calculations. It also has enhanced their record keeping of issue/receipt of rations15. Similar software, suiting the brigade/unit requirements can also help them from many worries. 20. Mechanical Transport (MT) Management. IT based system can best be used for managing the MT sector of any unit. As there are number of different data those are needed to be maintained by the units/brigades, which can be effectively manipulated through the use of database. While working with a project of MT management, it was observed that the units face lot of difficulties in managing their MT sector. It was not due to the sector is difficult to manage but due to the fact that the sector have many things to manage. Such as, vehicle daily running account, petroleum, oil and lubricate account, state of different parts changes, changing of different lubricating oils and many more. These can effectively be done by two men if customized software is used. It was also found that there were many audit objections occurred due to different breach of laws. These laws can be superimposed in the customized software which will restrict units/brigades from breaching any rules/regulation. 21. Training. Training is the daily routine for any military organisations. Units are the centre of all training activities during peace time. Most of the training is repetitive in every year. Candidates for each of the training events are also selected based on some 6 RESTRICTED

RESTRICTED set criterion. But, the missing fact is that, units face lots of difficulties in selecting candidates for these trainings as they have to be found out manually. This also causes huge increase in workload of sub-units/units. Therefore, the personal information related database together with career planning modules could be most suitable for the units. This will allow the staffs/commanding officers to select the right persons for the right job/training. Besides, there are many simulating software for firing and other military activities. If those are introduced/ developed for the brigades/units then they can effectively train their men indoor. 22. Handling of Classified Documents. In present days, the web based applications of different types have made the document management an easy task. The brigade and units need to develop a customised database which would allow them to scan the hard copy of the document and store it into the database for future reference. This database may be accessed by commanding officers/ commanders/ authorised staffs. The provisioning of appropriate access control can ensure best possible security. For instance, customised software was developed for Personal Services Directorate at AHQ which will be able to keep the scanned copy of all the letters/reports stockpiled since 1972. It has the provision of indexing the documents which facilitates the selected users to find any document using web browser16. ORGANISATIONAL SHORTCOMINGS IN APPLYING IT BASED SYSTEM 23. BD Army as a whole and brigade/units in particular have many shortcomings in its existing organisation for which IT based system can not be applied effectively. Some of the shortcomings are discussed as under: a. Policy Coverage. Though there was a separate directorate for IT at AHQ, but there are no policies for brigades/units to avail the benefit from IT based system. IT Directorate made one DRAFT policy which does not give any specific guideline about the means and ways of adopting IT based system by brigades/units. Besides, the publications related to correspondence/documents were not updated or reviewed to allow brigades/units to venturing IT based system for their offices. The government policy for public procurement also restricts spending more funds for something when cheaper offer is available. Experience suggests that the IT based companies hikes more prices provides quality software and after sales service than those of the companies offering cheaper software. Therefore, under existing regulation maximum benefit from civilian resources can not be obtained. b. Infrastructure. Though the brigades/units are having number of computers in their inventories, but there is no network. Computers have been authorised against the Table of Organisation and Equipment (TO&E) of each unit but no networking equipment had been authorised. Though, some units established intranet within their offices but those could not bring any fruitful results as it could not have required software. c. Skilled Manpower. The units in particular are deficient of their authorised clerks. Besides, most of the clerks do not posses any knowledge on working in a network environment. The officers are somewhat experienced in using webs but not working in a network. As such, the units are facing serious shortage of 7 RESTRICTED

RESTRICTED workforce for working in a network environment. Though there is good number of officers who had been imparted with the university level education on Computer Science and Engineering but were not properly utilized or under utilized. Besides, there is no training arrangement for developing general duty soldiers skills in computer. Therefore computer awareness among the soldiers could not be raised. Thus, the organisation could not achieve the desired standard of skilled manpower. Therefore, without such skilled manpower it is unfeasible to establishing and working under network system. d. Lack of Interest. It has been observed in many units that the users do not have adequate interest in using IT based system. Even in the School of Infantry and Tactics, the intranet was established back in 2000, but the system did not gain popularity because of the lack of users interest. The case is almost similar to the brigade/units in BD army. There are few other reasons such as the persons knows the work in computer, are to work extra time than that of his colleagues. It is not done intentionally but due to the paucity of persons to replace him. This reduces interest among others to learn computer or networking. e. Inadequacy of Training Facilities. There are computer clubs in almost every cantonment of BD Army. But because of the paucity of instructors, the training is only limited to the development of the typing skill of officers and clerks rather than IT. f. Lack of Patronisation. There were few initiatives taken by some unit commanders to automate their offices. But the fact is that, they did not receive any timely patronisation from the hierarchy. As a result, the initiative died down and now a day IT based office is a least talked about subject. g. Security Threat. BD Army is yet to develop any skilled manpower to effectively managing any IT based system. Therefore, introducing IT based system immediately may be against the interest of the organisation. Besides, if the network system is connected to the internet, the system becomes susceptible to hackers intrusion in it. This will cause a serious threat to the information management system. This security threat also restricts the brigades/units from using such IT based system for their information management. SUGGESTIONS FOR BEST APPLICATION OF IT BASED SYSTEM 24. To make an effective IT based office network within a brigade group following are the suggested measures: a. Provision of Equipment. For the purpose of IT based office system, the brigades/units must be authorised with the required equipment in their TO&E. This will not only ensure that the units are capable of establishing network but will encourage them to use it when established. Besides, there is some hardware like firewall hardware which is used to prevent intrusion into the network by unauthorised persons/hackers. b. Provision of Skilled Personnel in TO&E. The TO&E of the units and brigades requires modification to effectively adopt IT based office system. A 8 RESTRICTED

RESTRICTED brigade group may have an IT cell comprised of 10-12 personnel. This manpower may be made up from the existing authorised strength of the units. The brigade education Junior Commissioned Officer may be utilized for the cell as an added responsibility to him and supervised by Brigade Major (BM). c. Establishment of LAN. The first requirement of adopting IT based system for any organisation is to have its offices inter connected. This can be done through LAN which is comparatively durable and easy to establish. There are many techniques of setting up a LAN. However, a suggested LAN system for a brigade group is at Annex A. d. Customised Software. Customised software is to be developed according to the need of the brigade/units. Though there had been some individual effort to develop customised software for units but no centralised one. As such, those could not gain success in allowing brigades/units to effectively use IT based system. Therefore, centralised efforts must be taken to develop customised database software for brigade/units keeping in consideration their needs. Once prepared, the database should be installed in the server which should be kept at Brigade HQ. Units shall use the same through the network. A list of suggested software for the units including their purposes is at Annex B. e. Establish Policies. To implement IT based system at units or brigade level clear directive from higher HQ is needed. Though there is a draft IT policy at AHQ but that does not address all the legal aspects for units/brigades. That also did not state clearly about the means to attain the aim. As such, a clear visionary policy needs to be enacted for the effective and product based IT system at brigade/unit level in BD Army. Besides, the publications like Official Secrets Act 1923 need to be reviewed so as to meet present days security threat as well as redefine security of information. The Public Procurement Regulation also needs to be revised to enact fresh policies for IT based resource procurement. f. Security Measures17. There are many security arrangements in IT sector such as operational control, management security and technical security control etc. These control measures may be implemented to ensure proper security of any IT based system. The different types of these security controls are elaborated in Annex C. RECOMMENDATIONS 25. Based on the discourse of the paper following recommendations are made: a. A clear and functional policy should be formulated for adopting IT based system at unit/brigade level. b. Unit TO&E should be modified keeping in mind the necessities of the units for maintaining IT based system. c. Adequate training arrangement for developing skilled manpower should be made using existing computer clubs at formation level. Civilian specialists help may be sought in this regards. 9 RESTRICTED

RESTRICTED d. Official Secrets Act 1923 and other legal documents may be reviewed for authorizing digital signature as authenticated signature to ensure secrecy and secured management of information in the brigades/units. e. When the brigade network will be established, all the computers connected to that network shall remain free from internet connection as this will increase security threat. Besides, different security control measures must be in effect when such system is installed. CONCLUSIONS 26. In BD Army, the information flows occurs between different units and organisations. But most important is the units which are generally responsible for maintaining the data of different stores, equipment, men, accounts etc. One of the most important aspects of this information flow is record keeping. This system requires the units to maintain different ledgers/ registers/ booklets for keeping the records of different correspondence and transaction/exchange of stores. Besides, hard copies of documents are also maintained for a considerable periods in accordance to the Official Secrets Act-1923. This causes huge stockpiles of documents over the period they are maintained. In most cases, the units are maintaining this information through manual means. Classified documents though maintained under the custody of the unit commanders/commanders/staffs, but the same manual means is employed in their handling and storage. The different inventories like ammunition ledger; signal equipment ledger, arms ledger, weapons history books etc are also maintained manually in paper based documents. The condition of such documents gets deteriorated over periods and once replaced many data needs to be reentered manually. This causes increase in workload and considerable time is elapsed in their re-entry. This way of record keeping is also a cumbersome and costly job. 27. As in most cases the records are maintained manually, it involves more work of individuals responsible for such record keeping. The accuracy of the information is highly dependent on the accuracy of the person entering the data. It is often difficult to verify all the data entry by an officer. As such the data remains unreliable and many a times erroneous. Many data/information entries are duplicated at different level such as daily books of companies and battalion. Therefore, it takes longer time and involvement of more manpower. Since the system is paper based as such the units are to spend money for the procurement of stationeries thus causing the system expensive. Data retrieval and handling of documents are difficult as documents stockpiles over the period. One of the most troubling things is that the unit faces lots of audit objections due to erroneous entry in different ledgers/registers. This is because, most of the persons maintaining such ledgers/registers are inexperienced/unqualified and difficulty in cross checking. This also causes units to spare extra spaces for their storage. There are also chances that a document getting lost while the units is shifting from one place to another and remains undetected. 28. The IT based system can reduce many difficulties of the units in their information management. This will also enhance their information management while reduce their work load to a great extent. This system can be applied in the fields like personal information management, account management, inventory management, ration management, MT management, training plan and to some extent classified document management etc. There are many organisational shortcomings for which this IT based 10 RESTRICTED

RESTRICTED system can not be applied at unit/brigade level. There are no policy guidelines available in our army for the units/brigades to avail IT based system. The IT infrastructure of our army is also not adequate or appropriate for units/brigades to adopt IT based system for their offices. Lack of patronisation, training facilities and interest are also discouraging factor. Besides, lack of skilled manpower and increased security threat to IT based system also discourages the brigade/unit commanders to adopt such system. 29. However, to be able to effectively implement the IT based system at unit/brigade level few things needs to be done immediately. The first and foremost is the provisioning of network equipment in the TO&E of the units/ brigades. This will not only encourage them to venture into this system but will be a duty for them. Thereafter, comes the provisioning of skilled manpower which can be done through existing computers lab in each garrison. LAN must be established and customised software must be prepared/ procures according to the requirements of the units/brigades. The customised software may include personal information management system, account automation system, ration management system etc. These would also necessitate that the policy books/ publications be reviewed to allow modern technology to be used effectively. However, adequate security measure must be taken at unit/brigade level to prevent any intrusion of unauthorised entry into their network. Technical security control is one of the suggested methods but there are many more methods. Units/brigades may use the one that suits their requirements. The best security of any network at unit/brigade level is that the network is kept out of the reach of internet.

Jalalabad Cantonment Date: March 08

SAIFUL ISLAM Major Student Officer

(Total Words in Computer Count - 5072) Annexes: A. B. C. Graphical Illustration of Different LAN System. List of Suggested Software for a Brigade Group. Security Control Measures.

Distribution: Commandant School of Infantry and Tactics Jalalabad Cantonment Sylhet

11 RESTRICTED

RESTRICTED

End Notes:

12 RESTRICTED

Kyle Aichen, Information Technology: History, Practice and Implications for Development, (Center for Global, International and Regional Studies, University of California, Santa Cruz, CA 95064, November 2000), p2.
1

http://www.computersciencelab.com/history http://www.kerryr.net/pioneers/babbage.htm Ibid/ada.htm Kyle Aichen, p12. Ibid, p18. http://en.wikipedia.org/wiki/Information_technology.htm Ibid/Custom_Software http://kb.iu.edu/data/aesx.html http://en.wikipedia.org/wiki/Server.htm Ibid/Database.htm Ibid/Hardware.htm Ibid/Software.htm

10

11

12

13

Telephone conversation between Major Saiful Islam, psc and Major Muzakkir, Signal Directorate (IT Cell), AHQ, dated 12 February 2008.
14 15

Ibid. Ibid.

16

17

Gary Stoneburner, Alice Goguen, and Alexis Feringa, Computer Security-Risk Management Guide for Information Technology System, (Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD 20899-8930, USA, July 2002), p32.

Anda mungkin juga menyukai