1 / 14

Lt Col Don Wussler Director Force Protection C2 Systems ESC/FD 781-377-5845 June 2003

Force Protection Technology. Lt Col Don Wussler Director Force Protection C2 Systems ESC/FD 781-377-5845 June 2003. Overview. Integrated Base Defense System Effectiveness Assessment Force Protection Technology Integrated Base Defense Security System

paul2
Download Presentation

Lt Col Don Wussler Director Force Protection C2 Systems ESC/FD 781-377-5845 June 2003

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Force Protection Technology Lt Col Don Wussler Director Force Protection C2 Systems ESC/FD 781-377-5845 June 2003

  2. Overview • Integrated Base Defense • System Effectiveness Assessment • Force Protection Technology • Integrated Base Defense Security System • Force Protection Common Operating Picture

  3. Integrated Base Defense • The integrated application of security systems taken across the Force Protection (FP) battlespace and extending beyond the physical perimeter into an area of influence and interest • Involves the integrated use of tactics, techniques, procedures, and technology • Includes Transformational “Leap Ahead” Technologies • IBD Security System (IBDSS) requirements identified in the (draft) IBDSS ORD • Area intrusion detection, access control, alarm assessment and reporting, integrated C2 and display, delay/denial “See First, Understand First, Act First”

  4. New Approach - Effects Based Analyze Threat Define Threat Identify Vulnerabilities Cost-Effective Solution Analysis of Alternatives Identify Alternatives (Solutions) • Performance vice compliance based physical security system design and evaluation methodology • Systems approach based on risk, consequence, & performance • Identifies effectiveness of existing and conceptual systems • Identifies risk to resources • Treats all aspects of an area as one system • Technology, equipment, manpower, policy, procedures • Modeling & Simulation • Employs teaming approach • Right people at right time

  5. Physical Security System Functions Physical Security System Functions Detection Delay Response • Passive Barriers • Active Barriers • Interruption: • Intrusion Sensing • Alarm Communication – Communication to Response Force • Alarm Assessment – Deployment of Response Force • Entry Control • Neutralization

  6. Systems Effectiveness Assessment • Detection • Delay • Response Probability of Success = Effectiveness PE • Force on Force Probability of a “Gunfight” = PI Probability of “winning” the Gunfight = PN The Model

  7. Force Protection Technology F-4 P-51 F-22 F-15 COMMON PICTURE • Integrated Base Defense 2005 • StandoffDetection • Track • Classify • IFF • Non-lethal Denial • IBD C2 Effects-Based • MK1 Eyeballs • Close-In • Close Boundary • Preventive Perimeter • Distant Support 1.0 Pd (Assumed) .2 Pd (Reality) • Electrons in Close Formation • SPCDS • Fence Sensor • Buried Line Sensor • CCTV .95 Pd @ 90 Fixed • Integrated Circuits • TASS • AECS .90 Pd @ 90 Deployable “The F-22 will give us a leap in capability over the F-15 as the F-15 gave us over the F-4.” Gen John P. Jumper

  8. 10000 8000 6000 4000 2000 0 Aug- Oct- Dec- FY 2- FY 1- FY FY FY FY FY FY 02 02 02 03 04 04 05 06 07 08 09 ARC Mobilized Manpower Savings From Tech Freed-up AD From Contracting AGR Volunteer Core Comp Conv (AD) Core Comp Conv (Civ) “The Pathfinder Project” Description • “Pathfinder Bases” are benchmarks to determine effects and cost of technology • Andrews AFB selected as first “Pathfinder • Pathfinder consists of tailored and scalable tactics, techniques, procedures and transformational technologies • Focused on reducing the current reliance on manpower Today Tomorrow Technology & Manpower Technology & Manpower Effectiveness Effectiveness

  9. Why IBDSS? • Integrated Base Defense (IBD) CONOPS 2020: “…emergent needs demand an accelerated effort to adopt the integrated base defense mindset and incorporate advanced technology into our tactics, techniques, and procedures.” • Directions from BGen Shamess, USAF/XOF: -- The key to optimization of manpower associated with base defense is the integration of security systems to remove stovepipes and provide the defender with the ability to “See First, Understand First, and Act First.” IBDSS will be the enabler for this vision

  10. Effects-Based IBD Physical Security System Acquisition and Integration People IBD Physical/ Electronic Security System I N T E G R A T I O N Performance Based IBD Technology Acquisition Required IBD Elements IBD Plan • Design • Engineer • Procure • Install / Integrate • Test • [OPERATE] • Sustain • Dispose • Anticipate • Deny • Detect • Assess • Delay • Neutralize AC2ISR Firepower TTP SYSTEM OBJECTIVE (AFI 31-101) • “greatest possible deterrence” • “maximum means to achieve: • detection • interception, and • defeat of a hostile force before it is able to seize, damage, or destroy resources”

  11. Acquisition Strategy Logistics Tactical Systems Delay/ Denial Tech Standards Test Strategic Nuclear Technology Fixed Sites Integration IBDSS Architecture IBDSS CONTRACT

  12. Building the Force Protection Common Operating Picture

  13. How to “Connect the Dots” Translates to Output Force Protection Common Operating Picture Chemical TIB Picture Biological TIB Picture Environmental Picture Radiological/Nuclear/TIR Picture Fire Picture Medical Picture High Yield Explosive Picture Full Spectrum Threat Response Common Interface Standard: XML/XLS <?XML version="1.0" encoding="UTF-8"?> <!DOCTYPE DOCUMENT SYSTEM "simple.dtd"> <DOCUMENT trackNum="1234"> <TITLE> Sample Document </TITLE> <AUTHOR> <FIRSTNAME> USAF </FIRSTNAME> <LASTNAME> ETASS </LASTNAME> <COMPANY> The XML Pages </COMPANY> </AUTHOR> <SUMMARY> This is element text and an entity follows:&Description; </SUMMARY> </DOCUMENT> Security Forces Picture Threat Management Access Management Delay/Denial/Response Smart Sensors Plug into the Force Protection Picture

  14. Dominate The Battlespace SEE FIRST • Relentless Data Capture • Detect/Identify Threat • Predict Threat COAs UNDERSTAND FIRST • Tailor Defense Plans • Identify Vulnerabilities • Know and Manage Risks ACT FIRST • Determine Options • Decide First • Act to Remove Threat

More Related