Current Trends in International Defense and Security Procurement Lecture (Bachelors Degree)
-
Upload
kristina-soukupova-phd -
Category
Documents
-
view
196 -
download
2
description
Transcript of Current Trends in International Defense and Security Procurement Lecture (Bachelors Degree)
Current Trends in International Defense
and Security Procurement
Kristina Soukupova, BA, MA, PhDKAP/MB
November, PlzenWinter 2012 Session
Introduction
Where are We Now?
Technologies in Focus
Conclusion
Content
• Procurement •Legal •Official •Main focus on NATO countries
• Lecture does not cover illicit arms trade
Introduction
Introduction
•Defence – traditionally involves only military (national defence against enemies outside borders)
•Security – protection of citizens inside state orders (Homeland Security), but war on terror?
We can only prepare for yesterday‘s
WARS
• Decreasing defence expenditure/budget since
the end of Cold War
• Post-Cold War conduct of warfare - different
enemy, new threats
• War on Terror, Counterterrorism operations,
Information Age
• Post-9/11 increasing market share of
Homeland Security
Where are we now?
Most militaries aim for smaller, more agile networked forces
Moving away from platform centric procurement to capability or information centric procurement
Changing role of traditional defence suppliers and the role of military R&D
Where are we now?
Crucial Question for all Stakeholders::
• Fragmented international market and dominant
position of the defence industry within states
• Coordination initiatives - Smart Defence (NATO),
Pooling and Sharing (EU)
• Interoperability standards – EU v. NATO
• Lack of joined conceptual and doctrinal framework
Mirror 21st century battle space – mostly populated urban and unpredictable
• Counter Improvised Explosive Devices (IODs) measures
• Interoperability, Situational Awareness, Networks, system integration
• Soldier Modernization Programs – 21st century warrior
• Cyber Defence
• Homeland Security/National Resilience
Areas of Biggest Focus
• Cyber
• Simulation
• Satellite systems
• UAVs
• Smart Bombs
• C4ISTAR
• Homeland Security
• NEC / NCW
Technologies in focus
• Command and Control (C2) socio-technical system, through which a commander
exercises authority over designated forces to accomplish mission
• Communications (C3)
• Computers (C4)
• Intelligence, Surveillance, Target acquisition, Reconnaissance (ISTAR)
methods of observing the enemy and one's area of operations – the eyes and ears. Cameras, radars, sonar, UAVs, intelligence input (HUMINT, SIGINT)
C4ISTAR
• Connect sensors to provide better situational awareness and operational picture
• Across traditional military stovepipes
• Faster decision making
C4ISTAR
• Network Enabled Capability
• Network Centric Warfare
• Everything and everyone is connected through a network
• Requires changes to organization, mindset, training
NEC / NCW
NEC Video
•SAAB NEC
•Northrop Grumman NCW
• Synthetic simulation environment
• Advanced graphics to simulate real environment
• Flight simulators
• Battlefield simulators
• Ratytheon Virtsim
Computer Simulation
• Various types for different missions
• Capabilities depend on payload (sensors and systems the UAV carries)
• Can be armed with missiles
• Fixed wing or rotary wing
• HALE – High Altitude Long Endurance (Global Hawk)
• MALE – Medium Altitude Long Endurance (Predator)
• Mini/Micro UAVs (Parrot AR Drone)
UAVsUnmanned Area Vehicles
•State-of-the-art communication technologies
•Voice•Data
Soldier Modernization Programs
•Advanced sensors•nigh vision goggles•Infrared
Soldier Modernization Programs
Soldier Modernization Programs
Soldier Modernization Programs
• Enhanced camouflage
• US ‘invention’ post 9/11 attacks, most visible at airports
• Efforts and technologies aimed at protecting citizens mainly from terrorist attacks
• Dual use technologies
Homeland Security
• Precision guided weapons
• Joint Direct Attack Munition
Smart Bombs
• Rapidly evolving
• Based on our dependency on technologies
• Critical infrastructure – water, electricity, banks, health systems, etc.
• There are no borders in cyberspace, so how can we defend it?
• Attacks by individuals and states on military and civilian targets
Cyber
Focus mainly on deployed units or those with international exposure
• C4ISTAR – core program OTS – Operačně taktický systém velení a řízení
• NEC – now discontinued
• Cyber – new initiative, now under NBU
• UAVs – local SOJKA, Raven,
• Homeland Security – IZS, but not so comprihensive as in the US
Czech Republic
•Concept / doctrine development
•Interoperability
•Standard setting
•Procurement co-ordination
•Market unification
Immediate Chalenges
Decreasing defence budgets
Focus on interoperability of systems (vertical and horizontal)
Main trends
Conclusion
Procurement of capabilities, not platforms
Changing role of traditional defence contractors
Closing civil-military gap