Force Protection Technology
Advertisement
This presentation is the property of its rightful owner.
1 / 14

Lt Col Don Wussler Director Force Protection C2 Systems ESC/FD 781-377-5845 June 2003 PowerPoint PPT Presentation

Force Protection Technology. Lt Col Don Wussler Director Force Protection C2 Systems ESC/FD 781-377-5845 June 2003. Overview. Integrated Base Defense System Effectiveness Assessment Force Protection Technology Integrated Base Defense Security System

Related searches for Lt Col Don Wussler Director Force Protection C2 Systems ESC/FD 781-377-5845 June 2003

Download Presentation

Lt Col Don Wussler Director Force Protection C2 Systems ESC/FD 781-377-5845 June 2003

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Force protection technology

Force Protection Technology

Lt Col Don Wussler

Director

Force Protection C2 Systems

ESC/FD

781-377-5845

June 2003


Overview

Overview

  • Integrated Base Defense

  • System Effectiveness Assessment

  • Force Protection Technology

  • Integrated Base Defense Security System

  • Force Protection Common Operating Picture


Integrated base defense

Integrated Base Defense

  • The integrated application of security systems taken across the Force Protection (FP) battlespace and extending beyond the physical perimeter into an area of influence and interest

  • Involves the integrated use of tactics, techniques, procedures, and technology

    • Includes Transformational “Leap Ahead” Technologies

  • IBD Security System (IBDSS) requirements identified in the (draft) IBDSS ORD

    • Area intrusion detection, access control, alarm assessment and reporting, integrated C2 and display, delay/denial

“See First, Understand First, Act First”


New approach effects based

New Approach - Effects Based

Analyze Threat

Define Threat

Identify

Vulnerabilities

Cost-Effective

Solution

Analysis of

Alternatives

Identify

Alternatives

(Solutions)

  • Performance vice compliance based physical security system design and evaluation methodology

    • Systems approach based on risk, consequence, & performance

    • Identifies effectiveness of existing and conceptual systems

    • Identifies risk to resources

    • Treats all aspects of an area as one system

      • Technology, equipment, manpower, policy, procedures

    • Modeling & Simulation

    • Employs teaming approach

      • Right people at right time


Physical security system functions

Physical Security System Functions

Physical Security System Functions

Detection

Delay

Response

• Passive Barriers

• Active Barriers

• Interruption:

• Intrusion Sensing

• Alarm Communication

– Communication to Response Force

• Alarm Assessment

– Deployment of Response Force

• Entry Control

• Neutralization


Systems effectiveness assessment

Systems Effectiveness Assessment

  • Detection

  • Delay

  • Response

Probability of Success = Effectiveness PE

  • Force on Force

Probability of a

“Gunfight” = PI

Probability of “winning” the

Gunfight = PN

The Model


Force protection technology

Force Protection Technology

F-4

P-51

F-22

F-15

COMMON PICTURE

  • Integrated Base Defense 2005

  • StandoffDetection

  • Track

  • Classify

  • IFF

  • Non-lethal Denial

  • IBD C2

    Effects-Based

  • MK1 Eyeballs

  • Close-In

  • Close Boundary

  • Preventive Perimeter

  • Distant Support

    1.0 Pd (Assumed)

    .2 Pd (Reality)

  • Electrons in Close Formation

  • SPCDS

  • Fence Sensor

  • Buried Line Sensor

  • CCTV

    .95 Pd @ 90

    Fixed

  • Integrated Circuits

  • TASS

  • AECS

    .90 Pd @ 90

    Deployable

“The F-22 will give us a leap in capability over the F-15 as the F-15 gave us over the F-4.”

Gen John P. Jumper


Force protection technology

10000

8000

6000

4000

2000

0

Aug-

Oct-

Dec-

FY 2-

FY 1-

FY

FY

FY

FY

FY

FY

02

02

02

03

04

04

05

06

07

08

09

ARC Mobilized

Manpower Savings From Tech

Freed-up AD From Contracting

AGR

Volunteer

Core Comp Conv (AD)

Core Comp Conv (Civ)

“The Pathfinder Project”

Description

  • “Pathfinder Bases” are benchmarks to determine effects and cost of technology

    • Andrews AFB selected as first “Pathfinder

  • Pathfinder consists of tailored and scalable tactics, techniques, procedures and transformational technologies

  • Focused on reducing the current reliance on manpower

Today

Tomorrow

Technology & Manpower

Technology & Manpower

Effectiveness

Effectiveness


Why ibdss

Why IBDSS?

  • Integrated Base Defense (IBD) CONOPS 2020:

    “…emergent needs demand an accelerated effort to adopt the integrated base defense mindset and incorporate advanced technology into our tactics, techniques, and procedures.”

  • Directions from BGen Shamess, USAF/XOF:

    -- The key to optimization of manpower associated with base defense is the integration of security systems to remove stovepipes and provide the defender with the ability to “See First, Understand First, and Act First.”

IBDSS will be the enabler for this vision


Effects based ibd physical security system acquisition and integration

Effects-Based IBD Physical Security System Acquisition and Integration

People

IBD

Physical/

Electronic Security

System

I

N

T

E

G

R

A

T

I

O

N

Performance Based IBD Technology Acquisition

Required

IBD Elements

IBD Plan

  • Design

  • Engineer

  • Procure

  • Install / Integrate

  • Test

  • [OPERATE]

  • Sustain

  • Dispose

  • Anticipate

  • Deny

  • Detect

  • Assess

  • Delay

  • Neutralize

AC2ISR

Firepower

TTP

SYSTEM OBJECTIVE (AFI 31-101)

  • “greatest possible deterrence”

  • “maximum means to achieve:

    • detection

    • interception, and

    • defeat of a hostile force

      before it is able to seize, damage, or destroy resources”


Acquisition strategy

Acquisition Strategy

Logistics

Tactical

Systems

Delay/

Denial

Tech

Standards

Test

Strategic

Nuclear

Technology

Fixed

Sites

Integration

IBDSS Architecture

IBDSS CONTRACT


Force protection technology

Building

the

Force Protection

Common Operating Picture


How to connect the dots

How to “Connect the Dots”

Translates to Output

Force Protection Common Operating Picture

Chemical TIB Picture

Biological TIB Picture

Environmental Picture

Radiological/Nuclear/TIR Picture

Fire Picture

Medical Picture

High Yield Explosive Picture

Full Spectrum Threat Response

Common Interface Standard: XML/XLS

<?XML version="1.0" encoding="UTF-8"?> <!DOCTYPE DOCUMENT SYSTEM "simple.dtd"> <DOCUMENT trackNum="1234"> <TITLE> Sample Document </TITLE> <AUTHOR> <FIRSTNAME> USAF </FIRSTNAME> <LASTNAME> ETASS </LASTNAME> <COMPANY> The XML Pages </COMPANY> </AUTHOR> <SUMMARY> This is element text and an entity follows:&Description; </SUMMARY> </DOCUMENT>

Security

Forces Picture

Threat Management

Access Management

Delay/Denial/Response

Smart Sensors

Plug into the Force Protection Picture


Dominate the battlespace

Dominate The Battlespace

SEE FIRST

  • Relentless Data Capture

  • Detect/Identify Threat

  • Predict Threat COAs

UNDERSTAND FIRST

  • Tailor Defense Plans

  • Identify Vulnerabilities

  • Know and Manage Risks

ACT FIRST

  • Determine Options

  • Decide First

  • Act to Remove Threat


  • Login