1 / 13

NATO CIS Symposium Sofia 18 Oct 06

NATO CIS Symposium Sofia 18 Oct 06. Adam Boothby Director Strategic Development Europe adam.boothby@l-3com.com. Prosecuting Difficult Targets. Time Sensitive Targeting. The problem-space Threat profile Politics Weapons The solution-space Enabling technology Coalition operations FE@R.

ross
Télécharger la présentation

NATO CIS Symposium Sofia 18 Oct 06

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. NATO CIS SymposiumSofia18 Oct 06 Adam Boothby Director Strategic Development Europe adam.boothby@l-3com.com

  2. Prosecuting Difficult Targets

  3. Time Sensitive Targeting • The problem-space • Threat profile • Politics • Weapons • The solution-space • Enabling technology • Coalition operations • FE@R

  4. TRIDENT WARRIOR 2005 - Architecture

  5. TRIDENT WARRIOR – HEADLINE LESSONS • Large Joint and Combined ISTAR networks at high maturity • Networks better than stovepipes • Commanders can have actionable target data in low order timescales • Target resolution is highly accurate • Networks find what single platforms miss

  6. HOWEVER….KEY ISSUES • Conceptual • Security • Architectures • Procurement processes

  7. CONCEPTS Its not about the technology…stupid! • Aligning Concepts and TTPs • Policies • Rules of Engagement • Inter-Service issues • Sequencing network assets with tactical events • Networks have an optimal configuration • Geometry • Electro-magnetic coverage • Time

  8. SECURITY The desire to share… • Security is on critical path • Security gatekeepers need to recognise strategies such as NEC • Long lead times • Strategic to tactical domains • TSTs = JFC priority targets

  9. ARCHITECTURES ELINT GMTI IMINT HUMINT AMTI OSCINT MASINT Network Configuration Control Mission Monitoring Correlation & Data Fusion Collection Steerage (retask) Mission Management System protection Collaborative Mission Planning Electronic Picture Compilation Target ID Service Synchronisation Virtual Communication Path (Dynamic Path Creation) Distributed Database Meta-Data Catalogue “An architect is the drawer of dreams…” Grace McGarvie • Turning Dreams into Capability • Focus on operational Analysis • Bring work strands together • Project managers role • Service Orientation • Business processes • Solution not a concept • Central role • Technology road-maps • Standards and protocols

  10. Procurement Processes • Spiral Acquisition • Proof • Financial straight jacket • Reciprocal altruism • Newtonian cause and effect vs organic modification • Approvals processes • Balancing experimentation with exploitation • Appropriate sovereignty

  11. What next? • Portfolio manage existing programmes • Be more financially transparent • Stop talking about SOA until we have defined what is meant by it • Align coalition business processes • Architectures • Use as a business tool • Understand how to fight as a network • Exploit already mature technologies

  12. Time Sensitive Targeting • Additional and expanded target set available to the Commander • Robust C2 procedures required • Rupert Smith’s vision of ‘ …fighting amongst the people…’ • Precision • Timeliness • Decision-making • Future balance between time-sensitive and routine targets • Does EBO make everything a TST? • Why drop a bridge until you need to? • Event triggers effect

More Related