Accelerator Enduring Competition Challenge - Session 2
Security and defence perspectives of what the Enduring Challenge will bring to the front line.
Includes views from -
* UK security engagement expert
* Navy military adviser
* Maritime technology expert
* Army military adviser
* Land technology expert
* RAF military adviser
* air technology expert
Launch of the Accelerator Enduring Challenge Competition
26 January 2017, Chelsea Harbour Hotel, London UK
Includes
- Introduction to the Defence and Security Accelerator
- What's the difference between CDE and the Accelerator
- How the Accelerator will stimulate small and medium size enterprise.
Launch of the Accelerator Enduring Challenge Competition
26 January 2017, Chelsea Harbour Hotel, London UK
Includes
- Introduction to the Defence and Security Accelerator
- What's the difference between CDE and the Accelerator
- How the Accelerator will stimulate small and medium size enterprise.
ISCF Subsea Autonomous Systems: Next Generation Technologies - Competition Br...KTN
The Industrial Strategy Challenge Fund’s Robotics and AI challenge, through Innovate UK, (as part of UK Research and Innovation), is collaborating with The Royal Navy, Oil & Gas Technology Centre, BP, and the Oil & Gas Authority. Together they will invest up to £6 million, from a cross government and industry joint fund, in collaborative business led projects.
Individuals can apply to join a 5-day collaborative workshop to develop proposals for autonomous subsea systems that can significantly improve mission duration, sensing and communications.
Participants are sought to develop collaborative projects in next generation autonomous subsea systems which improve levels of autonomy, sensor miniaturisation, mission planning, monitoring, communications, navigation, data management, and operations together with improved endurance in the water column up to 3000 metres deep.
The challenge is to develop Next Generation Subsea Autonomous System technologies which are modular in design with common interfaces and open architectures that make trusted unmanned operations the standard approach in areas such as off-shore energy, aquafarming, deep sea mineral exploration and maritime defensive security operations.
Find out more: https://ktn-uk.co.uk/news/webcast-subsea-autonomous-systems-next-generation-technologies-iscf-competition-briefing-event
3rd Future Armoured Vehicles Survivability Tâm Leclancher
As the only event purely dedicated to the area of vehicle protection, Future Armoured Vehicles Survivability aims to deliver a strong focus on the relationship between current requirements, emerging technologies and how these might be leveraged to enhance force protection.
Importantly, a key differentiator this year will be a dedicated pre-conference focus day on Active Protection System covering soft/hard kill active protection in detail. The three-day programme will cover the core areas of survivability in detail, exploring the latest platforms, vehicle architectures, passive/active protection, mobility, counter-IED, EW, un-manned/autonomous solutions, signature management and much more!
Featured speakers will include: Advanced Blast and Ballistic Systems, ARTEC GmbH, British Army, Bundeswehr Technical Centre for Protective and Special Technologies , Czech Military Research Institute, Danish Defence and Acquisition Organisation, DSTL, German Army, IMI Systems, IMP Castle Associates Limited, Israeli MoD, Krauss Maffei Wegmann, Lockheed Martin UK, NATO, Pearson Engineering, SOUCY DEFENSE, Swedish Defence Research Agency, TNO, United States Army, United States Marine Corps, US Army, UTC Aerospace Systems and Vetronics Research Centre
What’s new for 2017:
• National capability development updates from the British Army, DSTL, US Army, German Army, US Marine Corps and many more
• A key focus on the technology that goes into providing enhanced protection. Hear from industry leaders, including ARTEC, IMI Systems, KMW and Lockheed Martin,
• A pre-conference focus day exploring the development and integration of hard/soft kill active protection systems (APS)
Early bird offers and special military rates available. Register online at http://www.favsurvivability.com/li
Trustworthy Computational Science: A Multi-decade PerspectiveVon Welch
Trust is critical to the process of science. Two decades ago the Internet and World Wide Web fostered a new age in computational science with the emergence of accessible and high performance computing, storage, software, and networking. More recent paradigms, including virtual organizations, federated identity, big data, and global-scale operations continue to evolve the way computing for science is performed.
Advancing technologies, the need to coordinate across organizations and nations, and an evolving threat landscape are sources of ongoing challenges in maintaining the trustworthy nature of computational infrastructure and the science it supports. To address these challenges, a number of projects have focused on improving the cybersecurity and trustworthiness of scientific computing. Recent examples include the Center for Trustworthy Scientific Cyberinfrastructure funded by NSF, the Software Assurance Marketplace funded by DHS, and the Extreme Scale Identity Management for Science project funded by DOE.
This presentation will give a 20 year retrospective together with a vision for the future of cybersecurity for computational science. It will describe the state of trust and cybersecurity for scientific computing, its evolution over the past twenty years, challenges it is facing today, how the exemplar projects are addressing those challenges, and a vision of cybersecurity for research and higher education in general augmenting each other in the future.
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
We asked LinkedIn members worldwide about their levels of interest in the latest wave of technology: whether they’re using wearables, and whether they intend to buy self-driving cars and VR headsets as they become available. We asked them too about their attitudes to technology and to the growing role of Artificial Intelligence (AI) in the devices that they use. The answers were fascinating – and in many cases, surprising.
This SlideShare explores the full results of this study, including detailed market-by-market breakdowns of intention levels for each technology – and how attitudes change with age, location and seniority level. If you’re marketing a tech brand – or planning to use VR and wearables to reach a professional audience – then these are insights you won’t want to miss.
Artificial intelligence (AI) is everywhere, promising self-driving cars, medical breakthroughs, and new ways of working. But how do you separate hype from reality? How can your company apply AI to solve real business problems?
Here’s what AI learnings your business should keep in mind for 2017.
ISCF Subsea Autonomous Systems: Next Generation Technologies - Competition Br...KTN
The Industrial Strategy Challenge Fund’s Robotics and AI challenge, through Innovate UK, (as part of UK Research and Innovation), is collaborating with The Royal Navy, Oil & Gas Technology Centre, BP, and the Oil & Gas Authority. Together they will invest up to £6 million, from a cross government and industry joint fund, in collaborative business led projects.
Individuals can apply to join a 5-day collaborative workshop to develop proposals for autonomous subsea systems that can significantly improve mission duration, sensing and communications.
Participants are sought to develop collaborative projects in next generation autonomous subsea systems which improve levels of autonomy, sensor miniaturisation, mission planning, monitoring, communications, navigation, data management, and operations together with improved endurance in the water column up to 3000 metres deep.
The challenge is to develop Next Generation Subsea Autonomous System technologies which are modular in design with common interfaces and open architectures that make trusted unmanned operations the standard approach in areas such as off-shore energy, aquafarming, deep sea mineral exploration and maritime defensive security operations.
Find out more: https://ktn-uk.co.uk/news/webcast-subsea-autonomous-systems-next-generation-technologies-iscf-competition-briefing-event
3rd Future Armoured Vehicles Survivability Tâm Leclancher
As the only event purely dedicated to the area of vehicle protection, Future Armoured Vehicles Survivability aims to deliver a strong focus on the relationship between current requirements, emerging technologies and how these might be leveraged to enhance force protection.
Importantly, a key differentiator this year will be a dedicated pre-conference focus day on Active Protection System covering soft/hard kill active protection in detail. The three-day programme will cover the core areas of survivability in detail, exploring the latest platforms, vehicle architectures, passive/active protection, mobility, counter-IED, EW, un-manned/autonomous solutions, signature management and much more!
Featured speakers will include: Advanced Blast and Ballistic Systems, ARTEC GmbH, British Army, Bundeswehr Technical Centre for Protective and Special Technologies , Czech Military Research Institute, Danish Defence and Acquisition Organisation, DSTL, German Army, IMI Systems, IMP Castle Associates Limited, Israeli MoD, Krauss Maffei Wegmann, Lockheed Martin UK, NATO, Pearson Engineering, SOUCY DEFENSE, Swedish Defence Research Agency, TNO, United States Army, United States Marine Corps, US Army, UTC Aerospace Systems and Vetronics Research Centre
What’s new for 2017:
• National capability development updates from the British Army, DSTL, US Army, German Army, US Marine Corps and many more
• A key focus on the technology that goes into providing enhanced protection. Hear from industry leaders, including ARTEC, IMI Systems, KMW and Lockheed Martin,
• A pre-conference focus day exploring the development and integration of hard/soft kill active protection systems (APS)
Early bird offers and special military rates available. Register online at http://www.favsurvivability.com/li
Trustworthy Computational Science: A Multi-decade PerspectiveVon Welch
Trust is critical to the process of science. Two decades ago the Internet and World Wide Web fostered a new age in computational science with the emergence of accessible and high performance computing, storage, software, and networking. More recent paradigms, including virtual organizations, federated identity, big data, and global-scale operations continue to evolve the way computing for science is performed.
Advancing technologies, the need to coordinate across organizations and nations, and an evolving threat landscape are sources of ongoing challenges in maintaining the trustworthy nature of computational infrastructure and the science it supports. To address these challenges, a number of projects have focused on improving the cybersecurity and trustworthiness of scientific computing. Recent examples include the Center for Trustworthy Scientific Cyberinfrastructure funded by NSF, the Software Assurance Marketplace funded by DHS, and the Extreme Scale Identity Management for Science project funded by DOE.
This presentation will give a 20 year retrospective together with a vision for the future of cybersecurity for computational science. It will describe the state of trust and cybersecurity for scientific computing, its evolution over the past twenty years, challenges it is facing today, how the exemplar projects are addressing those challenges, and a vision of cybersecurity for research and higher education in general augmenting each other in the future.
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
We asked LinkedIn members worldwide about their levels of interest in the latest wave of technology: whether they’re using wearables, and whether they intend to buy self-driving cars and VR headsets as they become available. We asked them too about their attitudes to technology and to the growing role of Artificial Intelligence (AI) in the devices that they use. The answers were fascinating – and in many cases, surprising.
This SlideShare explores the full results of this study, including detailed market-by-market breakdowns of intention levels for each technology – and how attitudes change with age, location and seniority level. If you’re marketing a tech brand – or planning to use VR and wearables to reach a professional audience – then these are insights you won’t want to miss.
Artificial intelligence (AI) is everywhere, promising self-driving cars, medical breakthroughs, and new ways of working. But how do you separate hype from reality? How can your company apply AI to solve real business problems?
Here’s what AI learnings your business should keep in mind for 2017.
The Holographic future is now! - Cloud Day @PoliBa 27 May 2016Clemente Giorio
An Overview on:
Virtual Reality, Augmented Reality, Mixed Reality, Holograms and Microsoft HoloLens
during the Cloud Day @PoliBa event
( https://www.eventbrite.it/e/biglietti-cloud-day-poliba-24742689049 )
During a meetup I introduced the concept of Mixed Reality comparing to Augmented Reality and Virtual Reality.
After the introduction of Windows Mixed Reality I talked about: HoloLens, Holograms and Gestures.
L'intervento su "infrastrutture critiche e cybersicurezza nel settore dei trasporti" tenuto da Andrea Chiappetta al workshop "Critical Infrastructure protection against hybrid warfare security related challenges" svoltosi a Stoccolma lo scorso maggio.
This 3-day experience combines independent learning, group exercises and instructor lead discussions to provide those considering a career in cybersecurity with an opportunity to explore the various occupations and certifications available. If you are looking to pivot your career…this course is for you!
Soldiers Five event as an adaption of the Pecha Kucha Style!Five sponsor-speakers share details of their business/ organisation and speak for five minutes each. 20min general panel Q&A session with similar precision time limits with questions and answers.
Sponsor-speakers included:
- Mark Pezaro, Micreo
- Jeff Bugden, KoBold
- Tony Scott, QinetiQ
- Tyson Young, Zero Blink
- David McGovern, DAS Consulting
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...EnergySec
In our modern world, we’ve learned to take for granted the universal availability of things like running water and electricity, and more recently, the Internet. As technology progresses, we are rapidly approaching a future in which nearly everything is digitally connected to nearly everything else. At the same time, we are learning to accept that all digital devices are broken from a security perspective. How we respond and adapt to this reality could well determine whether our future is utopian or dystopian. In In this interactive session, we will explore novel avenues of attack using digital “soft-targets”, and discuss how we might hold things together in the face of persistent vulnerability.
Ο κ. Νικήτας Νικητάκος, Καθηγητής Πανεπιστημίου Αιγαίου,
στην Ομιλία «Επαναστατικές Τεχνολογίες στις Ε.Δ. και Νέες Μορφές Στρατιωτικής Ηγεσίας»
στις 8/11/2018, στο ΕΛΙΣΜΕ.
https://www.facebook.com/events/2098992030122707/
Today, I was lucky enough to participate in the CIGRE Canada panel on Network Resiliency. The presentations were thoughtful and led to interesting questions from the floor. Here is the presentation I delivered, let me know if you would to talk about how your organisation should grapple with Resiliency.
Strategic Leadership for Managing Evolving Cybersecurity RisksMatthew Rosenquist
2014 NSF Cybersecurity Summit keynote presentation from Matthew Rosenquist, Cybersecurity Strategist for Intel Corp.
Cybersecurity is difficult. It is a serious endeavor which strives to find a balance in managing the security of computing capabilities to protect the technology which connects and enriches the lives of everyone. Characteristics of cyber risk have matured and expanded on the successes of technology innovation, integration, and adoption. It is no longer a game of tactics, but rather a professional discipline, continuous in nature, where to be effective strategic leadership must establish effective and efficient structures for evolving controls to sustain an optimal level of security.
This presentation will discuss the challenges, organizational opportunities, and explore best practices to align investments in security to the risk appetite of an organization.
DASA: FASS 2: How to submit an excellent accelerator proposal Heather-Fiona Egan
Defence and Security Accelerator (DASA)
Future Aviation Security Solutions - competition 2 (FASS 2)
Finding explosives hidden in electrical items
Innovation Network Event
How to create a great proposal presentation
London, 28 November 2017
DASA: FASS 2 Innovation Network Event: How the competition will work Heather-Fiona Egan
Defence and Security Accelerator
Future Aviation Security Solutions - competition 2
Finding explosives hidden in electrical items themed competition
How the competition will work
London, 28 November 2017
Defence and Security Accelerator
Finding, funding and exploiting innovative ideas to meet UK defence and security challenges
Lucy Mason, Head of Defence and Security Accelerator
DSEI 2017
Role of dual-use programmes to accelerate innovation and competitivenessHeather-Fiona Egan
Presentation given by Dr Lucy Mason, Head of Defence and Security Accelerator
4 April 2017
Maritime Dual use maritime conference, Southampton University.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
3. +
JSaRC : Joint Security
and Resilience Centre
Supporting the Accelerator and
putting the SECURITY in
“Defence and Security”
Jane Cannon, MBE
Director,
Security Industry Engagement,
Office for Security and Counter Terrorism
4. +UK Industry Landscapes : Differences between Defence and Security…
CustomerIndustry
MOD
Borders SIA CNI
Police OSCT DfT
Defence Security
Clear
Requirements
Solutions&
Products
Multiple
Requirements
Multiple
Solutions/
Products
Specialists
Academia
Consultancies
Services Cos
Defence Primes IT Primes
< 10
Primes &
Tier 1’s
Tier 2
Tier 3 & Below
1000s SMEs
6. +The problem : Security Suppliers’ View…..
Private security market?
UK or export?
7. +Security Industry Working Together: RISC
650 companies
security and
Resilience
Industry
Suppliers
Community
ADS
TechUK
BSIA
security technologies
protective security
cyber security
signals intelligence
private security
man guarding & Electronic equipment
19 Sectors
900+ companies
900+ companies
RISC represents thousands of security companies
FIA
Shaping standards
Promoting best practice
fire industry
NDI
supply chain sourcing
and development
180 members
other… Academic RISC
Other trade bodies
8. +Government working together for Security & Resilience
Security
Industry
Engagement
Directorate
HMG
Home
Office
OSCT
11. +JSaRC - Key points
+ More than Science & Tech. – COTS / services / other sectors / commercial
+ 50:50 Government / security sector (industry and academia) collaboration
(50:50 funded, secondees and civil servants - HMG £11m over 4 years)
+ Industry shaping - Supporting SMEs, protecting IP, promoting consortia
+ Improving procurement processes.
+ Location - Cambridge
+ “Speed dating” …. “Sandpit” ….. “Gearbox” …..“Marriage guidance”
12. +JSaRC and the Defence & Security Accelerator
+ JSaRC and Home Office fully support the Accelerator
+ Home Office on Accelerator Board + staff in IRIS
+ Bring security and resilience challenges to Accelerator
+ Seek opportunities for joint Defence / Security collaboration…
14. +Defence & Security : work to identify synergies, e.g.
Security & ResilienceDefence
POWER
PLATFORMS CYBER CRIME
CHILD SEX EXPLOITATIONHUMAN PERFORMANCE
ADDITIVE MANUFACTURING
WEAPONS
EVIDENTIAL STANDARD
FORENSICS
BIOMETRICSCYBER
SECURITY
SOCIAL MEDIA
MONEY LAUNDERING
DISTRIBUTED LEDGER
TRAINING
DRUG DETECTION
INTEROPERABILITY
DATA ANALYTICS
COST OF OWNERSHIP
IMMIGRATION
AUTONOMOUS VEHICLES (USE AND COUNTERING)
NAVIGATION
MEDICAL
PROTECTION
MODERN SLAVERY
MATERIALS
30. Technical challenge
OFFICIAL
• How do we achieve effective situational awareness of
and within the maritime environment?
– Effective and affordable sensors and processing
• Particularly for difficult targets in complex environments
– Providing effective and timely information to operators
• Fusion
• Automation
• Patterns of life
– Understanding that allows us to introduce the right
technology early – and use it correctly
31. So what?
OFFICIAL
• Economy: Safe sea lanes are essential to the UK
– Trade is vital to UK interests with over 90% of world trade
travelling by sea
• Defence: UK defence and power projection relies on an
ability to control / influence within the maritime
environment
– Expeditionary operations
– UK deterrent
49. Land Integrated Survivability
OFFICIAL
• Aim: Use R&D to increase the overall survivability of the
mounted and dismounted User in the land domain.
– Increased Protection
– Increased Mobility / Terrain accessibility
– Increased Force projection
– Increased Situational awareness
– Lower Logistical burden
– Lower Cognitive burden
50. Programme Linkages
OFFICIAL
• Exploitation of technologies developed in other area.
– Materials (MAST programme)
– Synthetic Biology (Disruptive Capability Programme)
– Situational Awareness
– Logistics
52. Recoverability
Stabilise
(Damage Control & Fire Fighting)
Restore Functionality
(Repair, Reconfigure, Spares)
Vulnerability
Avoid Penetration
(Passive Armour,
Reactive Armour)
Damage Tolerant
(Materials, Robust Systems
Design, Redundancy, Separation)
Occupant Protection
(Casualty Analysis,
Personal Protection)
Susceptibility
Don’t Be There
(Intel / Planning)
Don’t Be Seen
(Low Observability /
Signature Managem’t)
Detect Threat
(Sensors &
Networks)
Avoid Being Hit
(ECM, Decoys, Flares,
Obscurants, Tactics)
OFFICIAL
53. The challenge to me?
• MOD has a requirement to protect ALL of its platforms in
ALL current operations at ALL times.
• This is a logistical burden.
• Protection systems need to be:
– Smaller
– Lighter
– Lower consumption of power
– Cheaper
– In general, they need to reduce the burden on MOD
OFFICIAL
54. The challenge to you?*
• Protection against new or non-conventional threats
• New physical mechanisms for protection
• Novel uses for modelling and simulation
• Techniques for predicting effects of technology insertion
• Novel sensing and switching technologies*
• Lower cost of ownership and disposal*
• Generic Vehicle Architectures
• Materials*
OFFICIAL
*CAVEAT: This includes technology pull through from other areas
55. • Hardening of components / sensors
• Novel Power generation & storage
• Active Protection Technologies
– Active signatures
– Sensing
– Effectors
The challenge to you?*
OFFICIAL
*CAVEAT: This includes technology pull through from other areas