Download presentation
Presentation is loading. Please wait.
Published byKaley Alleyne Modified over 9 years ago
1
NATO CIS Symposium Sofia 18 Oct 06 Adam Boothby Director Strategic Development Europe adam.boothby@l-3com.com
2
Prosecuting Difficult Targets
3
Time Sensitive Targeting The problem-space Threat profile Politics Weapons The solution-space Enabling technology Coalition operations FE@R
4
TRIDENT WARRIOR 2005 - Architecture
5
TRIDENT WARRIOR – HEADLINE LESSONS Large Joint and Combined ISTAR networks at high maturity Networks better than stovepipes Commanders can have actionable target data in low order timescales Target resolution is highly accurate Networks find what single platforms miss
6
HOWEVER….KEY ISSUES Conceptual Security Architectures Procurement processes
7
CONCEPTS Aligning Concepts and TTPs Policies Rules of Engagement Inter-Service issues Sequencing network assets with tactical events Networks have an optimal configuration Geometry Electro-magnetic coverage Time Its not about the technology…stupid!
8
SECURITY Security is on critical path Security gatekeepers need to recognise strategies such as NEC Long lead times Strategic to tactical domains TSTs = JFC priority targets The desire to share…
9
ARCHITECTURES “An architect is the drawer of dreams…” Grace McGarvie Turning Dreams into Capability Focus on operational Analysis Bring work strands together Project managers role Service Orientation Business processes Solution not a concept Central role Technology road-maps Standards and protocols Virtual Communication Path (Dynamic Path Creation) Target ID Service Network Configuration Control Electronic Picture Compilation Mission Management Correlation & Data Fusion Mission Monitoring Collection Steerage (retask) Synchronisation Collaborative Mission Planning System protection Distributed Database Meta-Data Catalogue GMTIIMINTHUMINTAMTIOSCINTMASINTELINT
10
Procurement Processes Spiral Acquisition Proof Financial straight jacket Reciprocal altruism Newtonian cause and effect vs organic modification Approvals processes Balancing experimentation with exploitation Appropriate sovereignty
11
What next? Portfolio manage existing programmes Be more financially transparent Stop talking about SOA until we have defined what is meant by it Align coalition business processes Architectures Use as a business tool Understand how to fight as a network Exploit already mature technologies
12
Time Sensitive Targeting Additional and expanded target set available to the Commander Robust C2 procedures required Rupert Smith’s vision of ‘ …fighting amongst the people…’ Precision Timeliness Decision-making Future balance between time-sensitive and routine targets Does EBO make everything a TST? Why drop a bridge until you need to? Event triggers effect
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.