140 likes | 282 Views
NATO CIS Symposium Sofia 18 Oct 06. Adam Boothby Director Strategic Development Europe adam.boothby@l-3com.com. Prosecuting Difficult Targets. Time Sensitive Targeting. The problem-space Threat profile Politics Weapons The solution-space Enabling technology Coalition operations FE@R.
E N D
NATO CIS SymposiumSofia18 Oct 06 Adam Boothby Director Strategic Development Europe adam.boothby@l-3com.com
Time Sensitive Targeting • The problem-space • Threat profile • Politics • Weapons • The solution-space • Enabling technology • Coalition operations • FE@R
TRIDENT WARRIOR – HEADLINE LESSONS • Large Joint and Combined ISTAR networks at high maturity • Networks better than stovepipes • Commanders can have actionable target data in low order timescales • Target resolution is highly accurate • Networks find what single platforms miss
HOWEVER….KEY ISSUES • Conceptual • Security • Architectures • Procurement processes
CONCEPTS Its not about the technology…stupid! • Aligning Concepts and TTPs • Policies • Rules of Engagement • Inter-Service issues • Sequencing network assets with tactical events • Networks have an optimal configuration • Geometry • Electro-magnetic coverage • Time
SECURITY The desire to share… • Security is on critical path • Security gatekeepers need to recognise strategies such as NEC • Long lead times • Strategic to tactical domains • TSTs = JFC priority targets
ARCHITECTURES ELINT GMTI IMINT HUMINT AMTI OSCINT MASINT Network Configuration Control Mission Monitoring Correlation & Data Fusion Collection Steerage (retask) Mission Management System protection Collaborative Mission Planning Electronic Picture Compilation Target ID Service Synchronisation Virtual Communication Path (Dynamic Path Creation) Distributed Database Meta-Data Catalogue “An architect is the drawer of dreams…” Grace McGarvie • Turning Dreams into Capability • Focus on operational Analysis • Bring work strands together • Project managers role • Service Orientation • Business processes • Solution not a concept • Central role • Technology road-maps • Standards and protocols
Procurement Processes • Spiral Acquisition • Proof • Financial straight jacket • Reciprocal altruism • Newtonian cause and effect vs organic modification • Approvals processes • Balancing experimentation with exploitation • Appropriate sovereignty
What next? • Portfolio manage existing programmes • Be more financially transparent • Stop talking about SOA until we have defined what is meant by it • Align coalition business processes • Architectures • Use as a business tool • Understand how to fight as a network • Exploit already mature technologies
Time Sensitive Targeting • Additional and expanded target set available to the Commander • Robust C2 procedures required • Rupert Smith’s vision of ‘ …fighting amongst the people…’ • Precision • Timeliness • Decision-making • Future balance between time-sensitive and routine targets • Does EBO make everything a TST? • Why drop a bridge until you need to? • Event triggers effect