SlideShare a Scribd company logo
1 of 14
Wait, did I forget my network?
Analyzing the Role of Weapons in
the Precision Engagement Pillar
of Network Centric Warfare
J. Bryan Lail, 520-794-2727
jblail@raytheon.com
Raytheon Missile Systems
What is Network Centric Warfare?
An information superiority-enabled concept of
operations that generates increased combat
power by networking sensors, decision makers,
and shooters to achieve shared awareness,
increased speed of command, higher tempo of
operations, greater lethality, increased
survivability, and a degree of self-synchronization
• C4ISR Cooperative Research Program, Sep 02
NCW translates information superiority into
“effects-based” combat power by effectively
linking knowledgeable entities in the battlespace
and enabling a new way of fighting wars
Whither Weapons?
Precision Engagement is a
component of achieving NCW,
requiring thorough tradeoffs
& study across the kill chain
A Concept of Operations is how the whole
warfighting kill chain can viably work, where
analysis can help determine the best CONOPS
Definitions
Network Centric Warfare is a method for performing
the whole kill chain with a completely new C2
doctrine, resulting in staying inside the enemy’s
OODA loop and therefore more efficient warfighting
Effects-Based Warfare focuses on military applications for shaping
behavior (friend and foe), where network centric warfare (the means)
combined with technology (the enabler) can provide incredible new
ways to provide that shaping quickly and overwhelmingly.
Time-Sensitive Targeting Process*
* JP 3-60 Joint Doctrine for Targeting, 17 Jan 02 Ŧ i.e. Army Company size
DETECT
DECIDE
STRIKE IDENTIFY
LOCATE
TARGET
RESTRIKE
ASSESS
Allocation to lower C2 units with shared battlespace awareness
• Perform manned/unmanned strike missions more like ground unitsŦ,
with authority to prosecute a battlespace within doctrinal/ROE limits
• A critical component of achieving self-synchronization
Toolset for Warfighter-focused Capability
• Assist in configuring/implementing joint battlespace
• Provide a tactics development/experiment capability
– Provide operator-in-the-loop by linking platform, BM/C2,
communications, mission planning, and weapon centers
– Represent varying levels of ROE, decision nodes and
timelines, sensor fusion, and effects of synchronization
• Demonstrate and test how Doctrine, Organization, and
Training (DOT) changes are enabled by new weapon
system concepts
DOT = Tech ?
DOT ≥ Tech ?
What are the roles of weapons in NCW?
• Destroy/Disable critical enemy information age capabilities
– Enemy’s ability to coordinate between nodes and/or hit us
asymmetrically through attacking our networks/comms
• Contribute to knowledge on the warfighter network*
- “L5”
– Long range (anti-access), Loitering (persistence), Linked (data from
weapon), Looking (searching seeker), Labeling (identification)
• Respond to improvements in the warfighter network
– Agile design and employment capability (retargeting weapon)
– Enable tactics improvements by warfighter through flexibility
• Provide cost effective inventory that mitigates the concerns
about “overlap” with shared battlespace awareness
– Given greatly reduced fratricide, assess trade between “wasted
weapons” vs. “better target prosecution” and IOC date
• Weapon Data Terminals (WDT), Searching Seekers, and such
technologies are the infostructure “entry fee” for weapon
systems to enter into the Information Age, not the final effect!
* Further enabled by “S3” – Speed, Survivability, and Sensor-linked cueing
What functionality/tools do we need?
• Finding the “right” C2 solution is very challenging
– Represent the varying functionality and effect of future
solutions, allowing the insertion of high fidelity C2 sims
– Assess Command and “Coordination” instead of “Control”
• Tools must be capable of assessing tactics changes
– Network-enabled tactics changes are the real effects boost
– Operator-in-the-loop tactics development
• Tools for future weapon concept representation
– Weapon systems as contributors to PBA
– L5, Speed, and Smaller weapons to “carry more”
– Impact of varying SA on weapon effectiveness
– Operator-in-the-loop for C2 and other MITL functions
Smart Autonomous w/2-way WDT, Searching Seeker,
Provide RT SA during Loiter, Decide to Attack, BDI
Dumb Weapon with
forward link terminal
Trade
Space
Modeling Requirements
Priority #1 – Analyst-friendly requirements analysis tool
• Parameterize sensor/launcher placement, timelines, connectivity
• Provide visual interface to alter parameters, automated results
SAG
CAP
SAG
CAP
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
0 50 100 150 200 250 300 350 400
Range from CAP (nm)
Percent
of
Targets
TBM
CM
SAM
0
10
20
30
40
50
60
70
80
90
100
0 5 10 15 20 25 30
Total Delay (min)
Percent
Targets
Engagable
2000ft/s
3000ft/s
4000ft/s
5000ft/s
Constructive Modeling
Priority #2 – Campaign model improvements for NCW
• Requires a model that can be easily modified/upgraded
• Scenario development fed from requirements analysis tool
0.0
2.0
4.0
6.0
8.0
Weapon Battle Aircraft TBMD
Campaign
Cost
($B)
0.0
2.0
4.0
6.0
8.0
Weapon Battle Aircraft TBMD
Campaign
Cost
($B)
Architecture Analysis
-2000
-1500
-1000
-500
0
500
1000
Attack Mobiles
Attack Relocatables
Increase
In
Weapon
Cost
$Million
Decrease
in
Battle
and
Aircraft
Cost
$Million
BLU-97
Seeker
BLU-97
BAT
BLU-108
NRT Update
Seeker-
BLU-108
BLU-108
CAIV Analysis
0
1
2
3
4
5
6
7
8
9
10
0% 20% 40% 60% 80% 100%
Shared Battlespace Awareness
Loiter
Persistence
(hrs)
Simulation Interoperability Tool Kit
HLA / DIS
Exercise
Management
System
Visualization
Global
Hi - Res 3D
Scenario
Development
Data Collection
Reduction
Generic
Missile Server
External Links
- to anywhere
required, given
compatible
protocols
Force on Force Models
Engineering Models (6 Dof)
Hardware in the Loop
Test Beds
Strike Test Bed
Air-to-Air Test Bed
Land Combat Test Bed
BMD/SNADS Test Bed
Distributed Testbeds
Live Test Events
• Distributed testbeds are a method to simulate the
breadth of the strike kill chain with each “piece”
coming from anywhere and in any compatible form
(Live test event, HITL, Engineering Simulation)
• Distributed testbed applications include:
– CONOPS Demonstration and Development
– Kill Chain Analysis at any level of fidelity required
– Simulation-Based Acquisition (Warfighter/ITL Testing)
– Training the warfighter to help them develop requirements
• Same core capability is used for demonstration,
experimentation, concept proof, and DT/OT
– System Analysis/Experiment, OFP Testing/Deployment
• A distributed testbed is not a campaign tool or a
replacement for specialized constructive models
Distributed Testbeds
See Interactive Visualization from Distributed Simulation Run (Strike_Testbed_Mar03.mov)
Testbed Performance Prediction
Movie Demo – Future of Testbeds
See Unmanned Airborne Weapon System Movie Demonstration (Strike_Testbed_Future.mov)
Are you SURE the target is
20ft below sea level?
• Most of the right basic tools exist
− They aren’t yet being used efficiently and directed for
growth towards supporting the warfighter in experimenting
and defining requirements for netcentric operations
• The future of net-centric toolsets is in distributed
testbeds linked to models with capability to assess
NCW “means” to effects-based warfare “ends”
• Weapon systems will play a larger role in enabling
net-centric operations than has been acknowledged

More Related Content

Similar to Network Centric Warfare

Fostering MBSE in Engineering Culture
Fostering MBSE in Engineering CultureFostering MBSE in Engineering Culture
Fostering MBSE in Engineering CultureObeo
 
16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSNDhaya kanthavel
 
DSD-INT 2014 - OpenMI Symposium - Federated modelling of Critical Infrastruct...
DSD-INT 2014 - OpenMI Symposium - Federated modelling of Critical Infrastruct...DSD-INT 2014 - OpenMI Symposium - Federated modelling of Critical Infrastruct...
DSD-INT 2014 - OpenMI Symposium - Federated modelling of Critical Infrastruct...Deltares
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420Steve Goeringer
 
Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comPawan Sharma
 
Non-Functional Requirements Description Language
Non-Functional Requirements Description LanguageNon-Functional Requirements Description Language
Non-Functional Requirements Description LanguageYasir Karam
 
Systems Engineering Architecture - Vitech.pptx
Systems Engineering Architecture - Vitech.pptxSystems Engineering Architecture - Vitech.pptx
Systems Engineering Architecture - Vitech.pptxBarananKamal
 
Transaction Based Verification Methodology - 2000
Transaction Based Verification Methodology - 2000Transaction Based Verification Methodology - 2000
Transaction Based Verification Methodology - 2000Steve Cox
 
An intro to building an architecture repository meta model and modeling frame...
An intro to building an architecture repository meta model and modeling frame...An intro to building an architecture repository meta model and modeling frame...
An intro to building an architecture repository meta model and modeling frame...wweinmeyer79
 
Cloud data management
Cloud data managementCloud data management
Cloud data managementambitlick
 
System Architecture Exploration Training Class
System Architecture Exploration Training ClassSystem Architecture Exploration Training Class
System Architecture Exploration Training ClassDeepak Shankar
 
IRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding Schemes
IRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding SchemesIRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding Schemes
IRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding SchemesIRJET Journal
 
IRJET- A Review of the Concept of Smart Grid
IRJET- A Review of the Concept of Smart GridIRJET- A Review of the Concept of Smart Grid
IRJET- A Review of the Concept of Smart GridIRJET Journal
 
A Unique Test Bench for Various System-on-a-Chip
A Unique Test Bench for Various System-on-a-Chip A Unique Test Bench for Various System-on-a-Chip
A Unique Test Bench for Various System-on-a-Chip IJECEIAES
 
Spirent Accelerating SDN and NFV Deployments
Spirent Accelerating SDN and NFV DeploymentsSpirent Accelerating SDN and NFV Deployments
Spirent Accelerating SDN and NFV DeploymentsSailaja Tennati
 

Similar to Network Centric Warfare (20)

Fostering MBSE in Engineering Culture
Fostering MBSE in Engineering CultureFostering MBSE in Engineering Culture
Fostering MBSE in Engineering Culture
 
16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN
 
DSD-INT 2014 - OpenMI Symposium - Federated modelling of Critical Infrastruct...
DSD-INT 2014 - OpenMI Symposium - Federated modelling of Critical Infrastruct...DSD-INT 2014 - OpenMI Symposium - Federated modelling of Critical Infrastruct...
DSD-INT 2014 - OpenMI Symposium - Federated modelling of Critical Infrastruct...
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420
 
Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.com
 
Non-Functional Requirements Description Language
Non-Functional Requirements Description LanguageNon-Functional Requirements Description Language
Non-Functional Requirements Description Language
 
Systems Engineering Architecture - Vitech.pptx
Systems Engineering Architecture - Vitech.pptxSystems Engineering Architecture - Vitech.pptx
Systems Engineering Architecture - Vitech.pptx
 
Transaction Based Verification Methodology - 2000
Transaction Based Verification Methodology - 2000Transaction Based Verification Methodology - 2000
Transaction Based Verification Methodology - 2000
 
An intro to building an architecture repository meta model and modeling frame...
An intro to building an architecture repository meta model and modeling frame...An intro to building an architecture repository meta model and modeling frame...
An intro to building an architecture repository meta model and modeling frame...
 
Cloud data management
Cloud data managementCloud data management
Cloud data management
 
System Architecture Exploration Training Class
System Architecture Exploration Training ClassSystem Architecture Exploration Training Class
System Architecture Exploration Training Class
 
Microservices.pdf
Microservices.pdfMicroservices.pdf
Microservices.pdf
 
SEAS Space Surveillance Study
SEAS Space Surveillance StudySEAS Space Surveillance Study
SEAS Space Surveillance Study
 
IRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding Schemes
IRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding SchemesIRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding Schemes
IRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding Schemes
 
IRJET- A Review of the Concept of Smart Grid
IRJET- A Review of the Concept of Smart GridIRJET- A Review of the Concept of Smart Grid
IRJET- A Review of the Concept of Smart Grid
 
Chapter1
Chapter1Chapter1
Chapter1
 
A Unique Test Bench for Various System-on-a-Chip
A Unique Test Bench for Various System-on-a-Chip A Unique Test Bench for Various System-on-a-Chip
A Unique Test Bench for Various System-on-a-Chip
 
Netkit
NetkitNetkit
Netkit
 
SOSCOE Overview
SOSCOE OverviewSOSCOE Overview
SOSCOE Overview
 
Spirent Accelerating SDN and NFV Deployments
Spirent Accelerating SDN and NFV DeploymentsSpirent Accelerating SDN and NFV Deployments
Spirent Accelerating SDN and NFV Deployments
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Network Centric Warfare

  • 1. Wait, did I forget my network? Analyzing the Role of Weapons in the Precision Engagement Pillar of Network Centric Warfare J. Bryan Lail, 520-794-2727 jblail@raytheon.com Raytheon Missile Systems
  • 2. What is Network Centric Warfare? An information superiority-enabled concept of operations that generates increased combat power by networking sensors, decision makers, and shooters to achieve shared awareness, increased speed of command, higher tempo of operations, greater lethality, increased survivability, and a degree of self-synchronization • C4ISR Cooperative Research Program, Sep 02 NCW translates information superiority into “effects-based” combat power by effectively linking knowledgeable entities in the battlespace and enabling a new way of fighting wars Whither Weapons?
  • 3. Precision Engagement is a component of achieving NCW, requiring thorough tradeoffs & study across the kill chain A Concept of Operations is how the whole warfighting kill chain can viably work, where analysis can help determine the best CONOPS Definitions Network Centric Warfare is a method for performing the whole kill chain with a completely new C2 doctrine, resulting in staying inside the enemy’s OODA loop and therefore more efficient warfighting Effects-Based Warfare focuses on military applications for shaping behavior (friend and foe), where network centric warfare (the means) combined with technology (the enabler) can provide incredible new ways to provide that shaping quickly and overwhelmingly.
  • 4. Time-Sensitive Targeting Process* * JP 3-60 Joint Doctrine for Targeting, 17 Jan 02 Ŧ i.e. Army Company size DETECT DECIDE STRIKE IDENTIFY LOCATE TARGET RESTRIKE ASSESS Allocation to lower C2 units with shared battlespace awareness • Perform manned/unmanned strike missions more like ground unitsŦ, with authority to prosecute a battlespace within doctrinal/ROE limits • A critical component of achieving self-synchronization
  • 5. Toolset for Warfighter-focused Capability • Assist in configuring/implementing joint battlespace • Provide a tactics development/experiment capability – Provide operator-in-the-loop by linking platform, BM/C2, communications, mission planning, and weapon centers – Represent varying levels of ROE, decision nodes and timelines, sensor fusion, and effects of synchronization • Demonstrate and test how Doctrine, Organization, and Training (DOT) changes are enabled by new weapon system concepts DOT = Tech ? DOT ≥ Tech ?
  • 6. What are the roles of weapons in NCW? • Destroy/Disable critical enemy information age capabilities – Enemy’s ability to coordinate between nodes and/or hit us asymmetrically through attacking our networks/comms • Contribute to knowledge on the warfighter network* - “L5” – Long range (anti-access), Loitering (persistence), Linked (data from weapon), Looking (searching seeker), Labeling (identification) • Respond to improvements in the warfighter network – Agile design and employment capability (retargeting weapon) – Enable tactics improvements by warfighter through flexibility • Provide cost effective inventory that mitigates the concerns about “overlap” with shared battlespace awareness – Given greatly reduced fratricide, assess trade between “wasted weapons” vs. “better target prosecution” and IOC date • Weapon Data Terminals (WDT), Searching Seekers, and such technologies are the infostructure “entry fee” for weapon systems to enter into the Information Age, not the final effect! * Further enabled by “S3” – Speed, Survivability, and Sensor-linked cueing
  • 7. What functionality/tools do we need? • Finding the “right” C2 solution is very challenging – Represent the varying functionality and effect of future solutions, allowing the insertion of high fidelity C2 sims – Assess Command and “Coordination” instead of “Control” • Tools must be capable of assessing tactics changes – Network-enabled tactics changes are the real effects boost – Operator-in-the-loop tactics development • Tools for future weapon concept representation – Weapon systems as contributors to PBA – L5, Speed, and Smaller weapons to “carry more” – Impact of varying SA on weapon effectiveness – Operator-in-the-loop for C2 and other MITL functions Smart Autonomous w/2-way WDT, Searching Seeker, Provide RT SA during Loiter, Decide to Attack, BDI Dumb Weapon with forward link terminal Trade Space
  • 8. Modeling Requirements Priority #1 – Analyst-friendly requirements analysis tool • Parameterize sensor/launcher placement, timelines, connectivity • Provide visual interface to alter parameters, automated results SAG CAP SAG CAP 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 0 50 100 150 200 250 300 350 400 Range from CAP (nm) Percent of Targets TBM CM SAM 0 10 20 30 40 50 60 70 80 90 100 0 5 10 15 20 25 30 Total Delay (min) Percent Targets Engagable 2000ft/s 3000ft/s 4000ft/s 5000ft/s
  • 9. Constructive Modeling Priority #2 – Campaign model improvements for NCW • Requires a model that can be easily modified/upgraded • Scenario development fed from requirements analysis tool 0.0 2.0 4.0 6.0 8.0 Weapon Battle Aircraft TBMD Campaign Cost ($B) 0.0 2.0 4.0 6.0 8.0 Weapon Battle Aircraft TBMD Campaign Cost ($B) Architecture Analysis -2000 -1500 -1000 -500 0 500 1000 Attack Mobiles Attack Relocatables Increase In Weapon Cost $Million Decrease in Battle and Aircraft Cost $Million BLU-97 Seeker BLU-97 BAT BLU-108 NRT Update Seeker- BLU-108 BLU-108 CAIV Analysis 0 1 2 3 4 5 6 7 8 9 10 0% 20% 40% 60% 80% 100% Shared Battlespace Awareness Loiter Persistence (hrs)
  • 10. Simulation Interoperability Tool Kit HLA / DIS Exercise Management System Visualization Global Hi - Res 3D Scenario Development Data Collection Reduction Generic Missile Server External Links - to anywhere required, given compatible protocols Force on Force Models Engineering Models (6 Dof) Hardware in the Loop Test Beds Strike Test Bed Air-to-Air Test Bed Land Combat Test Bed BMD/SNADS Test Bed Distributed Testbeds Live Test Events
  • 11. • Distributed testbeds are a method to simulate the breadth of the strike kill chain with each “piece” coming from anywhere and in any compatible form (Live test event, HITL, Engineering Simulation) • Distributed testbed applications include: – CONOPS Demonstration and Development – Kill Chain Analysis at any level of fidelity required – Simulation-Based Acquisition (Warfighter/ITL Testing) – Training the warfighter to help them develop requirements • Same core capability is used for demonstration, experimentation, concept proof, and DT/OT – System Analysis/Experiment, OFP Testing/Deployment • A distributed testbed is not a campaign tool or a replacement for specialized constructive models Distributed Testbeds
  • 12. See Interactive Visualization from Distributed Simulation Run (Strike_Testbed_Mar03.mov) Testbed Performance Prediction
  • 13. Movie Demo – Future of Testbeds See Unmanned Airborne Weapon System Movie Demonstration (Strike_Testbed_Future.mov)
  • 14. Are you SURE the target is 20ft below sea level? • Most of the right basic tools exist − They aren’t yet being used efficiently and directed for growth towards supporting the warfighter in experimenting and defining requirements for netcentric operations • The future of net-centric toolsets is in distributed testbeds linked to models with capability to assess NCW “means” to effects-based warfare “ends” • Weapon systems will play a larger role in enabling net-centric operations than has been acknowledged