We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published bySydnee Croke
Modified over 2 years ago
1 © 2011 LOCKHEED MARTIN CORPORATION. All rights reserved. Russell Chan Lockheed Martin Corporate Engineering & Technology Last Tactical Mile Perspective Last Tactical Mile Perspective July 19, 2011
2 © 2011 LOCKHEED MARTIN CORPORATION. All rights reserved. NTM/ Tactical Products GEOINT SIGINT MASINT …. INTs Governance Networks JWICS SIPRNET NIPRNET NATO Coalition Organizations Everybody has a Role Department of Defense Air Force Army Navy Marines SOCOM ODNI CIA NGA NRO NSA FBI DoJ DoE DHS DoS DoT AF Intel Army Intel Coast Guard Intel Marine Corps Intel Navy Intel Intelligence Community NATO NGO Coalition Advantaged Users Disadvantage Users Executive Order U.S. Code Title 10 U.S. Code Title 50 Intelligence Community Directives ICD 503 DoD Doctrine Tactics/Techniques/Procedures Security/Classification UCDMO NIST SP Executive Order U.S. Code Title 10 U.S. Code Title 50 Intelligence Community Directives ICD 503 DoD Doctrine Tactics/Techniques/Procedures Security/Classification UCDMO NIST SP For Military and Humanitarian Assistance & Disaster Relief Missions
3 © 2011 LOCKHEED MARTIN CORPORATION. All rights reserved. Intelligence Information Data Sensors Knowledge NationalTactical Task Collect Process Exploit Disseminate The Wheels of Progress National Tactical Sensors Data Information Intelligence Knowledge Relevant TCPED Cycle Decision Cycle Data/Info/Intel/Knowledge must be available within the Decision Cycle Reachback
4 © 2011 LOCKHEED MARTIN CORPORATION. All rights reserved. Role Based Needs Data Information Intelligence Knowledge Metadata Multi-INT Fusion Policy/Doctrine Networks JWICS SIPRNET NIPRNET NATO Coalition Multi-Level Security/Guards DoD NATO Coalition Access/Authentication Users Advantaged Disadvantaged Decision superiority Mission Success TCPED Cycle Missions Roles (Individual roles have different needs) IC, DoD, NATO, Coalition, NGO, etc. Commander, squad leader, Intel analyst (theater/CONUS), operator Roles (Individual roles have different needs) IC, DoD, NATO, Coalition, NGO, etc. Commander, squad leader, Intel analyst (theater/CONUS), operator
5 © 2011 LOCKHEED MARTIN CORPORATION. All rights reserved. What is the right information? Bandwidth priority/availability? Access/authentication? Security/classification? Challenge – Leverage Commercial Technology Now
6 © 2011 LOCKHEED MARTIN CORPORATION. All rights reserved. Mission Need and Approach Need Approach Value Information sharing – National to/from Tactical – Multiple security domains Information discovery – Right information (Relevant) – Right people (Commanders, Operators, Analysts, Policy makers, First Responders, etc.) – Right time (Minimal latency) Attributes – Interoperable IP based networks (3G/4G wireless) – Legacy tactical radio interoperability (SINCGARS, MBITR, LMR) – National Security Agency Suite B (up to Secret level) – Metadata standards (Cursor on Target) – Data fusion/Data discovery (augmented reality [AR]) – Commercial Technologies (Smartphones, Tablets, 3G/4G wireless) Operational – National Technical Means and Tactical product relevancy – New technology insertion (3G/4G, metadata framework, AR) – System interoperability with enhanced capabilities
7 © 2011 LOCKHEED MARTIN CORPORATION. All rights reserved. Communications Content Content Delivery Consumer Information Needs Role based (commander, squad leader, operator, analyst, planner, etc.) Governance Secure 2 nd generation RIPRNET IP based 2 nd generation RIPRNET Legacy radios COTS 3G/4G Wireless Fused Multi-INT Fusion engine, KML Quick Cache Data discovery Semantics, augmented reality User interface/interaction Smartphone/Tablet NSA Suite B Trusted guards Access/Authentication Technology Readily Available – Policy and Governance ? Leverage technologies available to the general public
8 © 2011 LOCKHEED MARTIN CORPORATION. All rights reserved. Vision Location and Temporal Based Services Images, video Cursor on Target messages Signals Reports Open Source Collaborative applications Cloud/Grid Computing Data Repository Metatdata Framework Interoperable IP Communications NIPRNET SIPRNET Augmented Reality (AR) National Databases Tactical Databases Type 1 Secure Comms National Security Agency Suite B or Advanced Encryption Standard Cursor on Target (CoT) compliant data Images Video Signals Target Waypoint Video compression Information discovery Tactical Unmanned Aircraft System Laptop 2D Geospatial Information System (GIS) Visualization Analysis / Exploitation Open Source Fused Multi-INT JWICS SME PED Coalition NATO 2D Geospatial Information System (GIS) Visualization Today (Simulated) Secure Mobile Environment – Portable Electronic Device Clip Art used with permission from Microsoft
9 © 2011 LOCKHEED MARTIN CORPORATION. All rights reserved. Last Tactical Mile with Reachback Clip Art used with permission from Microsoft
10 © 2011 LOCKHEED MARTIN CORPORATION. All rights reserved. Tactical Communications Architecture Architecture supports KG implementation Demonstrated Capabilities in Field Experimentation Clip Art used with permission from Microsoft
11 © 2011 LOCKHEED MARTIN CORPORATION. All rights reserved. One Architecture SATCOM 2G/3G/4G Wireless (NSA Suite B) Mobile Command Tactical Radio (Type 1) First Responder Radio Tactical Operations Center First Responder Warfighter – Multiple Missions and Users Emergency Operations Center Clip Art used with permission from Microsoft
12 © 2011 LOCKHEED MARTIN CORPORATION. All rights reserved. Thank You
Reference Architecture Track Terry Hagle, Office of DoD CIO/AS&I EA Conference.
A Look into the Future of Warfare: The Joint Battlespace Infosphere Harold W. Carter University of Cincinnati
© 2003, Open GIS Consortium, Inc. Open GIS: Helping the World Communicate Geographically April 16, 2003 Louis Hecht Chair, Open GIS Consortium (Europe)
IT & Wireless Convergence © 2011 IBM Corporation Policy-based Management Technologies Seraphin B. Calo.
Command and Control for Border Protection Johnny Chabalala Saab South Africa.
Warrior Knowledge Network and the Semantic Web: Building the Self-Aware, Adaptive Leaders of the Future; Transforming the Army into a Learning and Knowledge.
Sample U.S. Government Cryptography and Key Management Methods and Policies Information Security Management Spring 2005 Presented by Ling Wang.
1 Semantic Web for the Military User Progress Tom Martin Research Management Enterprises (571)
Cyber Security in Evolving Enterprise Environments TechNet International 09 Adrian R Hartman, PhD Senior Manager & Architect LGS Innovations, Bell Labs.
® The New Craft of Intelligence: Personal, Public, & Political Robert David Steele Truth Helps, But Only When You Listen….
Objectives to improve citizens awareness and comfort industrial competitiveness efficiency of public administrations by enhancing and supporting the use,
Next Generation – The Future for Emergency Communications.
Trusted Computing in Government Networks May 16, 2007 Richard C. (Dick) Schaeffer, Jr. Information Assurance Director National Security Agency.
Achieving Information Sharing in Federal Agencies via Data Services, SOA, and Controlled Vocabularies October 12, 2006 A Presentation for the Federal Data.
GMD German National Research Center for Information Technology Darmstadt University of Technology Perspectives and Priorities for Digital Libraries Research.
Commander-in-Chief United States Pacific Command JV2010 Initiative Virtual Information Center (VIC) J-08.
End Slide Format DO NOT place photos or additional text boxes on this slide. An ASSA ABLOY Group brand PROPRIETARY INFORMATION. © 2013 HID Global Corporation/ASSA.
DOJ Information Sharing Segment Architecture and NIEM 2.0 Update Presentation to the Data Architecture Subcommittee July 12, 2007 Kshemendra Paul Chief.
SOA for EGovernment 1 Emergency Services Enterprise Framework: A Service-Oriented Approach Sukumar Dwarkanath COMCARE Michael Daconta Oberon Associates.
UNCLASSIFIED DoD Metadata Registry Dr Glenda Hayes MITRE/DISA PEO-GES 9 Oct 2008 Presentation to Federal Data Architecture Subcommittee.
1 Grand Challenges in Achieving Dynamic Spectrum Access Preston Marshall Defense Advanced Research Projects Agency Advanced.
® The New Craft of Intelligence What Should the T Be Doing to the I in IT? Robert David Steele Federal Convention on Emerging Technologies A Forum on Homeland.
Copyright © OSS Open Access INFORMATION OPERATIONS: All Information, All Languages, All the Time The New Semantics of War & Peace, Wealth & Democracy Authors.
Towards an Infrastructure for Situation Awareness in Emergency Management CIMIC Center for Information Management, Integration, and Connectivity Vijay.
1 Copyright © 2010, Oracle. All rights reserved. Cyber Security / Cyber Warfare Hype or underestimated? Bert Oltmans Director Defence, Justice and Public.
Network Centric Operations 2/7/2014JCHsu 1 Introduction to Network Centric Operations John C. Hsu,Ph.D.,P.E.
Public/Private Partnership for Netcentric Engineering.ORG (o) (m) Presentation.
Manchester Computing Cross Council ICT Conference For e-Science & GRID May 2004 End to End Services to support an e-Science Community Professor M.
Multinational Intelligence Can CENTCOM Lead the Way? Reflections on OSINT & the Coalition Robert David STEELE Vivas Presentation to the Coalition Coordination.
Khadiga Eissa Ebead Abdalla Agricultural Research Corporation (ARC) Biotechnology and Biosafety Research Center BBRC)) Agricultural Biotechnology Knowledge.
© 2016 SlidePlayer.com Inc. All rights reserved.