360 likes | 524 Views
Welcome. Defence Technology & Innovation Centre Weapons Integrated Technology Team CDE theme day. Countering Difficult Air Targets (C-DAT). Mr Robin Horne Maj Michelle Crawford Dr Philip Smith Mr Andrew Burles. PL 4 DTIC SO2 J3 Ops - Jt GBAD HQ Dstl Dstl. Today’s presenters. Agenda.
E N D
Welcome Defence Technology & Innovation CentreWeapons Integrated Technology TeamCDE theme day Countering Difficult Air Targets (C-DAT)
Mr Robin Horne Maj Michelle Crawford Dr Philip Smith Mr Andrew Burles PL 4 DTIC SO2 J3 Ops - Jt GBAD HQ Dstl Dstl Today’s presenters
Agenda • Define objectives, scope, boundaries
Agenda • Define objectives, scope, boundaries • Introduce C-DAT
Agenda • Define objectives, scope, boundaries • Introduce C-DAT • Introduce current capability & operational perspective
Agenda • Define objectives, scope, boundaries • Introduce C-DAT • Introduce current capability & operational perspective • Coffee
Agenda • Define objectives, scope, boundaries • Introduce C-DAT • Introduce current capability & operational perspective • Coffee • Introduce Maritime perspective
Agenda • Define objectives, scope, boundaries • Introduce C-DAT • Introduce current capability & operational perspective • Coffee • Introduce Maritime perspective • A glimpse into the future
Agenda • Define objectives, scope, boundaries • Introduce C-DAT • Introduce current capability & operational perspective • Coffee • Introduce Maritime perspective • A glimpse into the future • Wash-up
Agenda • Define objectives, scope, boundaries • Introduce C-DAT • Introduce current capability & operational perspective • Coffee • Introduce Maritime perspective • A glimpse into the future • Wash-up • How & what to submit
Objective • Reduce or eliminate threat caused by difficult air targets
Scope • We want to improve our ability to counter: • Rockets, artillery & mortars (C-RAM) • Tactical Uninhabited Aerial Vehicles • We are concerned about: • Non-state actors • Asymmetric/homemade threats • The proliferation of sophisticated kit
What is covered by this call • DRIT • Detection • Recognition • Identification • Track • Air Situational Awareness • Command and control • Dynamic Air Defence Resource Allocation • Deny enemy capability through • Interception (prior to firing) • Effectors (once in flight)
Definitions - RAM • Rockets Artillery & Mortars (RAM) • Indirect Fire weapons (IDF)
Definitions - TUAV • Tactical Uninhabited Aerial Vehicles (TUAV) • Micro UAV • Mini UAV • MALE
Non-State Threat - RAM • 240mm • Homemade 65MM
Non-State Threat – TUAV • Hezbollah UAVs over Lebanon/Israel • Hezbollah UAV post flight
Asymmetric – TUAV Model aircraft
Asymmetric – TUAV Model aircraft + GPS/Autopilot
Asymmetric – TUAV Model aircraft + GPS/Autopilot + Payload = Threat
Asymmetric – Light Aircraft Tamil Tigers modified ZLIN 143
Definitions – threat credibility • Threat credibility depends on: • Readiness to use • Practical readiness of the target weapons system • Political will • Ability to use • Detection capability • Targeting • Availability/capability/survivability of launch • Probability of encounter • May not be through direct confrontation with country of origin
Future Effectors • Kinetic effectors: • Rapid integration onto platform • Improved Lethality at range • Ability to take out Difficult Air Targets • Reduced collateral damage • Low cost seeker trade-offs • Rapid system upgrade • Missile commonality • Non-Kinetic effectors: • Directed Energy Weapons • Soft-Kill • ?
Kill chain • The kill chain is made up of a number of discrete events. • Each event has a time penalty: • Time to detect (Td) + Time to inform (Ti) + Time to launch (Tl) + Time to cue (Tc) + Time to kill (Tk) • Anything that can reduce these time penalties improves the chances of success • We need a networked whole kill chain approach to optimise response time and: • Integrate available ABAD, GBAD and MFAD assets • Maximise enabler system effectiveness • Ensure that we engage targets in effector probability-of-kill priority. Within this we need to improve, develop and integrate: • Air target ID and tracking concepts and technology • Air Situational Awareness • Command and control • Dynamic AD Resource Allocation
Things to think about • Defeat or disrupt • Troops must want to use it • Cost of use V’s cost of threat • The target signature • Your signature • SWaP • Manning levels • Operational environment
Things to think about • Defeat or disrupt • Troops must want to use it • Cost of use V’s cost of threat • The target signature • Your signature • SWaP • Manning levels • Operational environment
Bid hints Reasonable GFA demands Give tangible deliverables Identify subcontractor relationship Implications to exploitation route Identify the innovation Clearly identify IPR ownership One step at a time