Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Maritime Force Protection Operations Analysis Methodology Development Analysis Techniques for Defeating Threats to Naval Assets International Maritime.

Similar presentations


Presentation on theme: "1 Maritime Force Protection Operations Analysis Methodology Development Analysis Techniques for Defeating Threats to Naval Assets International Maritime."— Presentation transcript:

1 1 Maritime Force Protection Operations Analysis Methodology Development Analysis Techniques for Defeating Threats to Naval Assets International Maritime Protection Symposium December 2005 Presented by Dr Darren J. Sutton Navy Scientific Adviser Defence Science and Technology Organisation – Australia

2 2 Presentation Outline  Maritime Force Protection  Scope the Problem Multiple views Risk Analysis Attribute Analysis Threat Analysis Functional Decomposition  Quantify The Problem Modelling Solution Options Evaluation Requirements Determination Examples Solution Options - Weapons Performance Requirement for defence against suicide light aircraft  Conclusion

3 3 TTCP MAR AG-5 Small Boat Swarm Attack Suicide Attack on Berthed or Anchored Ship Surface Craft Truck Bomb Swimmer or SDV Attack on Berthed or Anchored Ship Attack by Asymmetric Air Threats on Berthed or Anchored Ship

4 4 Introduction Maritime Force Protection {closely related to security of commercial ships, ports and harbour installations} Maritime Force Protection To conserve the fighting potential of the force by countering the wider threat to all its elements from adversary, natural and human hazards, and fratricide. Harbour Protection To protect critical waterfront and floating assets by providing area security (defence) of the harbour or port. In-Harbour Force Protection To secure ships and naval assets while anchored or alongside in a port or harbour by offboard or onboard means. Ship-Based Force Protection To protect naval vessels berthed, anchored or underway, close-to-shore, at home or away with onboard means.

5 5 RISK ANALYSIS Comparative Risk [after Bhattracharya et al]

6 6 Effects based approach Seek publicity as effects-multiplier (political damage) Flexibility and Improvising ability Opportunistic (initiative seizing / offensive) Cellular Local or Tactical Organisation (Network or Hierarchy Command Structure) Dispersed operations Low cost relative to Military Force Civilian - Non-compliant with UN, Laws of Armed Conflict, national or local legislation Hardening (deterrence/survivability) Intelligence /surveillance/reconnaissance Preparedness (alertness/response capability) Flexibility (defences need to be as flexible and adaptable as the threat!) Flatter Command and Control (more autonomous smaller forces) Affordability (Realistic cost) Freer legal operational environment (maintain minimal collateral damage and avoid fratricide) Anti-terrorist Requirements Terrorist Attributes Attribute Analysis View

7 7 Threat Analysis View Maritime Terrorist Threats Threats may be characterised by mission or intent harassment or attention-seeking non-lethal attacks lethal weapon attacks suicidal explosive attacks effector delivery method Surface, sub-surface, air; Manned, unmanned physical features of the threat platform form, material, dimensions speed, agility stability signatures. cross platform features manning strategy (recruitment, training, practicing, command and control) interoperability and tactical skill strategy radical unpredictability opportunistic employ quantity versus quality of forces

8 8 Force Protection Functional Chain DetectDefeatDeterClassifyMitigate Next Map Functions to Capability Components and then Enablers

9 9 Detect Intelligence CBRN sensor packages* (air, sea, undersea) EO/IR/acoustic* Sniper/Mortar Detection* Swimmer Detection (passive acoustic and non-acoustic)* *Potential Technology - Find Terrorists before they strike - Recognize terrorist targeting - Hold defensive posture Sensors Data fusion* Pattern/Anomaly recognition* Early warning Information dissemination* Intelligent agents/Data Mining* Detect potential threats approaching or entering protected areas or in areas of interest to the warfighter such as straits, anchorages, ports,

10 10 Classify Classification (provoke intent) Remote Explosive Detection* Standoff imaging* Firearm Detection* Biometrics* Sensor Integration *Potential Technology Determine: Friend / Enemy / Neutral? Mission? Authorized / Unauthorized? Armed or Unarmed? With What?

11 11 Deter Show of force Perimeter Security Area denial (water, USW, air, shore) Quick passage for “authorized good guys” Barriers – Physical and Virtual*, Chemical Unambiguous warning devices/system Vehicle and vessel stoppers* (at range) Vehicle and personnel matching systems* Integration/Automation of surveillance systems* Light/Audio Psychological Effects* Deception Obscurants* Automated active response* UCAV, UCGV, UUCV *Potential Technology - Deny access to protected areas - Facilitate access for authorized persons and platforms - Improve capabilities while also reducing manpower - Hide weaknesses - Show strength - Improve response time of both personnel and “actions”

12 12 Deny Defeat Non-Lethal Directed Energy Weapons* Stand-off vehicle/ vessel disablement* Anti-Swimmer disablement* Automated active response* UCAV, UCGV, UUCV Lethal Remote explosive detonation* Automated counter fire weapon* *Potential Technology Interdict or influence potential threats when ROE or uncertainty precludes lethal force Rapidly and accurately neutralize threats at range Minimize collateral effects

13 13 Mitigate Reduce damage and casualties during threat strike Recover rapidly to full operations / capability Hardening/Blast Mitigation Recovery Systems - rapid decontamination* - rapid temporary perimeters* - self forming networks* Active armor / countermeasures* *Potential Technology

14 14 Quantify the Problem Variables Constraints Inclusions Exclusions Measures of Performance Derive mathematical relationship between Variables Temporal Spacial Spectral Develop Model Exploratory (parametric) Deterministic

15 15 Heirarchy of Mathematical Models Tactical Operational Platform Sub-system/ technical System Scenarios

16 16 Probability of success Ranges (detect, open fire, intercept) Weapon Probability of Hit & Kill Time Delays Threat Number Speed, Separation Engagement Scheduling Firing rate, Burst, Magazine Size Platform-Level Modelling

17 17 Weapon Performance Study Aim – to compare general classes of gun based weapons against surface threats Options 30mm stabilised 25 mm stabilised 20mm Close in Weapon System 50 cal (stabilised or unstabilised) 7.26 mm gun 5.56mm Deconstruction Single Gun vs single target Platform vs multiple targets Swarm Annihilation Tools Gun Operational Analysis Model (GOAT), Ship weapons scheduling model, Target kill rate model.

18 18 Weapon Study Ship physical, targeting data Threat data 1 on 1 effectiveness System issues. e.g. how many, timing, no fire zones. System model Overall effectiveness. 1 on 1 effectiveness Gun data

19 19 Terrorist Aircraft Attack Keep-Out-Range Requirement Study Scenario: Vessel attacked by low slow aircraft Problem: Survive the Attack Engage the target Avoid debris damage Questions : What is Close-in Weapons System effectiveness ? What distance must the aircraft be defeated so heavy debris does not hit the ship ? What are the effects of wind on collateral damage ?

20 20 Example: Given Aircraft speed of 300 m/s at altitude of 200 ft. Results: Debris spread is between m High R-value falls between 300 and 600 m, depending on the initial angle of the aircraft A keep-out-range of 600 m would be chosen to avoid being hit by the most damaging material A keep-out-range of up to 1000 m would be chosen to avoid being hit by all material down to an R-value of 2. Debris Pattern

21 21 Suicide Aircraft Attack In Port or at Anchor Weapon Solution Options Guns, Missiles Variables Effective Range Lethality Magazine capacity Measure of Performance Probability of hit Conditional Probability of kill / hit Salvo probability of kill

22 22 Conclusion Summarising Methodology Define Top level Requirements Propose S&T development Functions required Propose non-tech change Strategic/Legal/Operational/Tactical Maritime Operational Analysis Studies Contribution Determine Capability Gaps Assess S&T Component of Solution Set Identify Potential Solutions – compare options Map function required to capability

23 23 Finally Continuing Research Operations Analysis Methodology Development Analysis Techniques for Maritime Force Protection Applications to the Royal Australian Navy capability analysis for development and acquisition of ship and harbour force protection improvements. Eileen Moran Defence Science and Technology Organisation Maritime Operations Division Wharf 17, Pirrama Road Pyrmont NSW 2009 Australia.

24 24 SPARES

25 25 Functions - Deter, Deny, Defeat Graded Responses Avoidance/deterrence Persistent Situational Awareness Interrogations (IFF) Warnings (illuminators, acoustic, pyrotechnics) Non-lethal effectors (floodlights, water hose, flash-bang, acoustic blast) Lethal Weapons (guns, missiles, torpedos ) Mitigation - Survivability, Recovery

26 26 Non - lethal Options Acoustic (LRAD) Electrical (Stun Gun) Mechanical/Kinetic (Water cannon, nets) Electromagnetic (Active Denial system) Optical (Laser dazzle, spotlights) Bio/Chemical (Foam, Smoke)

27 27 Measures of Performance for the Defender Prob uncovering plans to attack Prob detection outside restricted zone Prob determining hostile intent outside restricted zone Prob warning-off/dissuading outside a keep-out-zone Prob destroying/disabling by keep-out-zone Or Prob halting attack at outer layer boundary Prob halting attack at inner layer boundary


Download ppt "1 Maritime Force Protection Operations Analysis Methodology Development Analysis Techniques for Defeating Threats to Naval Assets International Maritime."

Similar presentations


Ads by Google