-UNCLASSIFIED- Missile Defense Exercise Planning Presented By: Mr. Ohad Elbahar Israel Missile Defense Organization May 5 2010 First Annual Israel Multinational.

Slides:



Advertisements
Similar presentations
UJTL Ontology Effort TMCM Nelson And Marti Hall. Overview Vision for the UJTL and METLs Scenario Mapping Findings Proposed POA&M outline.
Advertisements

Brought to you by GOVERNANCE AND LOCAL GROUPS ORGANISATION IN THE US.
How to Conduct an After Action Review
Evaluating the Benefit of Networked EW Systems
Convene Planning Workshop with Key Stakeholders to Develop TMM Educate Stakeholders Select Exercise Planning Team from Stakeholders Conduct Facilitator.
Live, Virtual, Constructive – Integrating Architecture
Joint Worldwide Training and Scheduling Conference Can Be A Mechanism For Joint Force Development.
Saudi War Course End of Course Capstone Exercise UNCLASSIFIED THIS DOCUMENT IS FOR WARGAME AND EDUCATIONAL USE ONLY AND DOES NOT REFLECT REAL WORLD OPERATIONS.
Exercise Swaps Community Emergency Response Team.
Modelling the Aerospace Aftermarket with Multi-agents Systems Ken Woghiren Technical Director - Lost Wax.
Pacific Warfighting Center (PWC)
PHILLIPS 66 Yellowstone Pipeline Idaho Worst Case Discharge TTX Kellogg, Idaho September 11 & 12, 2013.
Systems Analysis and Design for Electronic Commerce, Networked Business Processes, and Virtual Enterprises Walt Scacchi, Ph.D. GSM 271 and FEMBA 271 Spring.
Unit 8: Tests, Training, and Exercises Unit Introduction and Overview Unit objectives:  Define and explain the terms tests, training, and exercises. 
Mid-Term Planning Conference [Date]
PROJECT MANAGEMENT FUNDAMENTALS. Nowadays, Project Management is not just for technical people or for people who handle technical projects. Executives.
© 2006, Cognizant Technology Solutions. All Rights Reserved. The information contained herein is subject to change without notice. Automation – How to.
Navigating uncertainty JTLS User Conference 2011 Monterey, CA EXONAUT – MASTERING CHAOS 1 Mikael Edqvist Vice President, Business Development
Midterm Planning Conference (MPC)
Annual SERC Research Review - Student Presentation, October 5-6, Extending Model Based System Engineering to Utilize 3D Virtual Environments Peter.
Effective Methods for Software and Systems Integration
2009 M&S LEADERSHIP SUMMIT REGIONAL INITIATIVES IN MODELING & SIMULATION FAR WEST John Illgen Sector Director, Modeling & Simulation Northrop Grumman Information.
System Implementation. System Implementation and Seven major activities Coding Testing Installation Documentation Training Support Purpose To convert.
Tyson’s Approach to Organizational Change Management
Integrating COIN and Full Spectrum Training LtCol M. B. Barry 23 Sep 2010.
Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS) Cyber Metrics Brief Mr. Ross Roley PACOM Energy Innovation.
Air Force Doctrine Document 2-1: Air Warfare
Dstl is part of the Ministry of Defence © Crown Copyright Dstl 2012 Anticipating the Insurgent Response Fiona Browning Land Battlespace Systems Department.
Randy Scott USSTRATCOM/J72 Dep Chief, Modeling & Simulations and Intel Scenario Development Div MDST WARFIGHTER SUPPORT ISSUE UNCLASSIFIED.
WHY REGIONAL DEFENSE? WALES, Ltd. Prepared By: Mr. A. Hermetz WALES, Ltd., Israel 1 st Annual Israel Multinational BMD Conference & Exhibition UNCLASSIFIED.
School-wide Facilitator Training September 15, 2010 School-Wide Positive Behavior Support.
Government Procurement Simulation (GPSim) Overview.
Parallel and Distributed Simulation Introduction and Motivation.
Working in the Virtual Environment Practical Experience
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
23 July 2003 PM-ITTS TSMOTSMO Information Assessment Test Tool (IATT) for IO/IW Briefing by: Darrell L Quarles Program Director U.S. Army Threat Systems.
“Missile Defence Factor in Establishing a New Security Environment” International BMD Conference “Missile Defence Factor in Establishing a New Security.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Implementation: Results from the Using Your Regional ITS Architecture Peer Exchange Network Workshop Mac Lister FHWA Resource Center ITS America Annual.
ABSTRACT When it comes to unsecured networks, robbers and thieves no longer need weapons to gain access to valuable information and financial assets. Despite.
Plan Enhancement Through Exercise Steps to Building a Successful Exercise North Central Region.
8th CGF & BR Conference May 1999 Copyright 1999 Institute for Simulation & Training Synthetic Forces Behavioral Architecture Ian Page
Welcoming Address David C. Smith, Director of Implementation Integrated Public Safety Commission Interoperable Communications Adopted by resolution of.
JNTC Joint Management Office
Cyber Storm Overview Wednesday 2/1/ PT. Cyber Storm Cyber Storm National Cyberspace Security Exercise Mandated in National Strategy to Secure Cyberspace.
14 June, 2013 CENTER for APPLIED STRATEGIC LEARNING Doing More With Less: Can Your Game Multi-task? Elizabeth Bartels, Research Analyst
Measure of System Effectiveness Missile Defense System By Alfred Terris UNCL:ASSIFIED1.
[Exercise Name] Initial Planning Conference [Date] Initial Planning Conference [Date]
After Action Review. 2 AGENDAAGENDA AAR ROEAAR ROE GOALSGOALS OBJECTIVESOBJECTIVES SUSTAINMENT / IMPROVEMENT AREASSUSTAINMENT / IMPROVEMENT AREAS THEMESTHEMES.
JAEC Assessment Initiatives and Implications Julia Loughran ThoughtLink, Inc Presented to: NDIA’s Training Transformation.
© 2003 Six Sigma Academy0 The Roles of Six Sigma Champion Workshop.
Managing a functional exercise for the first time Graham Leonard, Business Continuity Manager Insights and lessons 17 June 2014.
FFC NCAGS CHARLIE Operational Readiness, Effectiveness, Primacy UNCLASSIFIED PACIO SWG Bell Buoy 2006 US Fleet Forces Command NCAGS Charlie.
Corrective Action Programs. 2 HSEEP Homeland Security Exercise and Evaluation Program Provides a common exercise policy and program guidance that constitutes.
Hunter Trainers & Assessors Network (HTAN) Facilitator HTAN Recognition Network – Sue Flindell.
Avivim TA’s Mobility management system. Urban Mobility Management Concept Transportation objectives often conflict  Accessibility Vs. Mobility  Efficiency.
© 2016 Rockwell Collins. All rights reserved. Rockwell Collins Wellness Overview.
The value of Cyber Defense Exercises 1. Purpose and objectives The aim is to improve information assurance in critical infrastructure by :  Better understanding.
Information Technology Planning
Air Force Institute of Technology
Special Operations Command Joint Forces Command
Michigan National Guard CBRN Response Exercise NORTHERN EXPOSURE 17 Overview June 2017.
Presentation Title September 9, 2018
Threat Systems Management Office (TSMO)
Combining the best of Audit and Penetration Testing
Joint Warfare Training Center (JWTC)
Optimising Capacity and Competence ISMOR August 2002
How to Use this Template
OPERATIONAL READINESS
Technical and Operational Centre
Presentation transcript:

-UNCLASSIFIED- Missile Defense Exercise Planning Presented By: Mr. Ohad Elbahar Israel Missile Defense Organization May First Annual Israel Multinational Ballistic Missile Defense Conference

-UNCLASSIFIED- Mr. Ohad Elbahar: B.Sc. In Engineering from the TECHNION Israel Institute of Technology. MBA from Ben-Gurion University of the Negev. Served as an officer in the IAF Test Range to conduct the Arrow Flight Tests. Served as an officer in the Israeli Missile Defense Organization (IMDO). Active consultant at IMDO for Interoperability. About the Speaker

-UNCLASSIFIED- Exercises of missile defense can easily become very complicated. Defining the proper Training Audience, the proper Trainer, the proper systems etc. is very difficult. Building the exercise infrastructure, the simulation systems, the Intel for the exercise etc. is a real art. Getting most of the exercise in an organized After Action Review (AAR). Abstract

-UNCLASSIFIED- The Command Structure is defined Each officer/unit knows who is his commander and who he is commanding Introduction and basic assumption

-UNCLASSIFIED- The Decision Making Process is defined Who is making what decision, when, with what data and who is providing data. Introduction and basic assumption TIME VECTOR

-UNCLASSIFIED- The System Architecture and Connectivity are defined Each system/officer knows how and who to connect and communicate to. Introduction and basic assumption

-UNCLASSIFIED- How to build the exercise environment? Command Structure How to build the exercise environment? Command Structure Deciding who are the exercise players : Systems, commands, Headquarters etc. Deciding who is simulated? Some Friendly (Not all systems are playing) External – Public pressure, politics,

-UNCLASSIFIED- How to build the exercise environment? Command Structure How to build the exercise environment? Command Structure SIM

-UNCLASSIFIED- SIM How to build the exercise environment? Command Structure How to build the exercise environment? Command Structure Deciding what events to exercise: Missile attacks, Intel, Logistic, Medicine etc. Building the Exercise Control Group (ECG): All Simulated participants Red envelops of events Events are handled by the operational Command Structure. Documentation and data capture Subjects to Exercise: How the Command structure behaves? Information flow between Training audience Force efficiency utilization. etc. Dilemmas: What events to exercise What units and forces to include What is the Intel and threats to include in the events Etc.

-UNCLASSIFIED- How to build the exercise environment? Weapon Systems How to build the exercise environment? Weapon Systems Deciding who are the exercise players : Systems, Units, officers etc. Building the simulation system / network:

-UNCLASSIFIED- How to build the exercise environment? Weapon Systems How to build the exercise environment? Weapon Systems Building the simulation system / network Each system implements a Tactical Driver One Exercise Driver stimulate all threats Systems handle the threats with operational assets. TD Exercise Driver TD

-UNCLASSIFIED- TD Exercise Driver TD How to build the exercise environment? Weapon Systems How to build the exercise environment? Weapon Systems

-UNCLASSIFIED- TD Exercise Driver TD How to build the exercise environment? Weapon Systems How to build the exercise environment? Weapon Systems Exercise Driver: Stimulate a real time threats Standard Format DIS/HLA Simulate all enemy threats Simulate some friendly units (Not all systems are playing) Each Tactical Driver receives the threats Tactical Drivers stimulate the adjacent weapon systems Each system can engage threats and report to the exercise driver

-UNCLASSIFIED- TD Exercise Driver TD How to build the exercise environment? Weapon Systems How to build the exercise environment? Weapon Systems Deciding what events to exercise: Missile attacks. Building the White Cell Exercise Driver. Handle by the operational system (and TD). Documentation and data capture Objectives of Simulation: Operators training CONOPS and TTP Communication systems and architecture Force efficiency utilization. etc. Dilemmas: What simulation to use? Exercise Intel Integration of simulation What ifs? Etc.

-UNCLASSIFIED- Two Analysis teams work during the exercise: Operational Team. Exercise Team. The operational team work with operational data to derive operational decision making. The exercise team have all the data (God’s view) and is examining the operation activities for later AAR. On a schedule exercise break, the two teams meet to exchange insights and lessons learned to improve the exercise Data Analysis and AAR

-UNCLASSIFIED- Concept Concept Develop Exercise life cycle Participants Participants Training audience Training audience Events and simulation Events and simulation Simulation tools Simulation tools Decision Decision Decision Decision AAR tools AAR tools Develop Integration Integration Execution Execution AAR AAR

-UNCLASSIFIED- Scenario Scenario Typical Execution Flow Implementation Implementation Decision Operational AAR Operational AAR 24 Hours Event Event Operational AAR Operational AAR Decision Command Simulation Exercise AAR

-UNCLASSIFIED- Scenario Scenario Exception 1 Execution Flow Simulation & command together Exception 1 Execution Flow Simulation & command together Implementation Implementation Operational AAR Operational AAR 24 Hours Decision Simulation & command Exercise AAR

-UNCLASSIFIED- Exception 2 Execution Flow Exercise and Operational AAR meet Exception 2 Execution Flow Exercise and Operational AAR meet Scenario Scenario Implementation Implementation Decision Operational AAR Operational AAR 24 Hours Event Event Operational AAR Operational AAR Decision Command Simulation Exercise AAR AAR Meeting

-UNCLASSIFIED- Not all exercise issues can be discussed here: Benefit of real deployment of assets Vs. centralized exercise. Exercise together with real life. Operational Real assets in the exercise need real life handling. Applying lessons learned. Summary