Close

See How Your Peers Are Moving Forward in the Cloud

New research from CDW can help you build on your success and take the next step.

Mar 21 2025
Data Analytics

DDIL Environments: Managing Cloud Edge Computing for Defense Agencies

The Department of Defense must test capabilities at the tactical edge or in a simulation before deployment.

Defense agencies need to test capabilities they’re considering providing warfighters to ensure they can deliver in denied, disrupted, intermittent and limited-impact (DDIL) environments.

Warfighters must communicate securely at the tactical edge, so defense agencies require a comprehensive understanding of the necessary technologies.

Adversaries at the tactical edge may look to deny or disrupt communications, and soldiers or their commanders may lack access to telecom infrastructure. Both of these things are problematic.

“DDIL environments can restrict real-time communication, limit data transfer and make it difficult to coordinate across military units and systems,” according to an announcement from the Army’s xTech program, which connects with small businesses to spur innovation.

Click the banner below to begin building modern IT architectures.

 

Edge Computing for Real-Time Decision-Making

Agencies can either deploy capabilities in DDIL settings or simulate those environments for testing. The latter approach has logistical advantages.

“It’s a lot easier to simulate this stuff than to take a big kit out to the desert and figure out what happens when sunspots affect transmission,” says Derek Strausbaugh, Department of Defense mission team leader at Microsoft.

The military is increasingly looking to edge computing to accelerate tactical decision-making.

The closer you can push compute and applications to the actual operation itself, the better the fidelity of the mission,” Strausbaugh says.

 

Todd Matsler
The tactical edge must be resilient to transient platforms, autonomous to execute missions when human oversight is unavailable and adaptive to change.”

Todd Matsler Senior Director and General Manager of the Federal, Aerospace and Energy Edge Computing Group, Intel

Several technologies come together in support of this goal.

“Performant, tactical edge decision-making integrates secure, scalable computational power with multiple local sensors and edge analytics processing,” says Todd Matsler, senior director and general manager of the federal, aerospace and energy edge computing group at Intel.

Single or multiple clustered edge platforms provide different sensor types — electro-optical/infrared or lidar — to deliver relevant, timely information and context, while connected edge data centers provide greater computational power. All of this processing at the edge also reduces latency.

“It reduces your dependency on having centralized data centers,” Strausbaugh says.

That’s important, given all of the potential ways that communications can be disrupted, from weather events to adversarial actions.

DISCOVER: Is end-to-end encryption a defense against Salt Typhoon and other persistent threats?

Secure Communications in DDIL Environments

Securing communications starts with basic block-and-tackle best practices.

"For example, using Type 1 encryption for data at rest, in flight and during compute,” Strausbaugh says. “Not having a critical dependency on any one particular means of communication.”

That may involve a mix of satellites and secure, terrestrial 5G.

“Blending is key,” Strausbaugh says. “It’s a lot easier to snoop and target when you know exactly what you’re looking at and where it’s coming from, so being able to prioritize traffic over different modalities is important.”

Agencies must also employ an array of strategies to secure communications in DDIL environments.

“Security is a function of encrypting techniques, obfuscation of data packets, clever use of spectrum to hide or avoid interception, and proper techniques for establishing provenance of the data’s source and chain of trust,” Matsler says.

LEARN: Artificial intelligence-powered threat detection takes the burden off cyber analysts.

Best Practices for Testing and Deploying Technology in DDIL Conditions

Testing new capabilities in a simulated DDIL environment helps the military ensure they’ll deploy effectively.

“In general, simulations of technical approaches come before field testing, and having access to or creating a simulation environment for testing saves time and money and allows for frequent testing to occur prior to live exercises,” Matsler says.

Adversarial trials help to make the most of that testing environment.

“One best practice is to have a red team action in a simulation, and during live tests exercise the blue system’s agility and responsiveness” against human and autonomous attackers, Matsler says.

RELATED: The Navy is improving real-time threat analysis.

Planning is essential to successful testing.

“You need an actual strategy for how much you can do at the edge,” as well as how much latency and potential data loss will likely occur, Strausbaugh says.

Planners can also look to manage their digital workloads to test successfully in a DDIL setting.

“There are lots of different techniques you can apply to low-bandwidth types of situations, reducing the size of the things that you’re trying to send over the wire,” Strausbaugh says. “If you only have a cocktail-size straw, don’t try to send full motion video over that.”

It’s also important to utilize disruption-tolerant networking techniques. With software-defined networks “you can look at what spectrum’s available, what’s most performant right now, what has the least latency on it and choose to use that modality at a particular time, for particular data,” Strausbaugh says.

MORE FROM FEDTECH: Ransomware attacks require improved information sharing.

The Future of Tactical Edge Computing in Military Operations

Tactical edge computing is on the rise as the military shifts away from a centralized cloud model.

“There used to be this sense of the cloud as the epicenter, with the tactical environments hanging off of it,” Strausbaugh says. “Now there are a lot more interesting patterns emerging, if you look at things like the Advanced Battle Management System in the Air Force or the Army’s next-generation command and control effort.”

The growing role of battlefield artificial intelligence is accelerating that shift to computing at the tactical edge.

“Due to AI and autonomous guided systems, the time available for humans to observe, orient, decide and act is shrinking,” Matsler says. The military “will rely increasingly upon a performant, situationally aware edge.”

This, in turn, will drive the military toward an increased focus on the security and resiliency of operations in DDIL environments, because communications suppression and cyberattacks are on the rise there.

“The tactical edge must be resilient to transient platforms, autonomous to execute missions when human oversight is unavailable and adaptive to change,” Matsler says.

UP NEXT: Cyber resilience hinges on user intelligence in the zero-trust era.

christophe_cerisier/Getty Images