Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to...

20
J O T N I S T A F F C H I E F S O F

Transcript of Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to...

Page 1: Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to integrate processes Result: JV2010 Vision shall.

JO TNI

S TA FFCH IE FS OF

Page 2: Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to integrate processes Result: JV2010 Vision shall.

JO TNI

S TA FFCH IE FS OF

Page 3: Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to integrate processes Result: JV2010 Vision shall.

JO TNI

S TA FFCH IE FS OF

Import of New Security Environment

Keys to Transformation:

• Exploit Technology

• Exploit DOD ability to integrate processes

Result: JV2010 Vision shall be realized

Page 4: Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to integrate processes Result: JV2010 Vision shall.

JO TNI

S TA FFCH IE FS OF

Fundamental Change in how anEnterprise Conducts Business

RBADriven by technologyFocused on PROFITSubject to external forcesInformation integrates systemsInformation reduces input

RMADriven by technologyFocused on MISSIONSubject to external forcesInformation integrates systems Information maximizes output

RMA + RBA = DOD Transformation

Transformation

Page 5: Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to integrate processes Result: JV2010 Vision shall.

JO TNI

S TA FFCH IE FS OF

ShapeShape

RespondRespond

Prepare NowPrepare Now

Peacetime Engagement Activities

Deterrence

Smaller Scale Contingencies

Major Theater Wars

Nuclear/WMD Threats

Meet shape/respond challenges while transforming future forceMeet shape/respond challenges while transforming future force

JV 2010JV 2010 Future Challenges

National Military Strategy

Page 6: Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to integrate processes Result: JV2010 Vision shall.

JO TNI

S TA FFCH IE FS OF

Leveraging technological opportunities to achieve new levels of effectiveness in joint warfighting

Exploiting Technology

INFORMATION

INFORMATION

D0MINANCED0MINANCE

Page 7: Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to integrate processes Result: JV2010 Vision shall.

JO TNI

S TA FFCH IE FS OF

Service/Core Integration

Joint/DOD Integration

Allied Integration

Interagency Integration

Industry Integration

Exploiting Integration

Future Challenges(As defined by Strategic Documents)

Leads to...

New Levels ofEffectiveness

in Joint Warfighting

Page 8: Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to integrate processes Result: JV2010 Vision shall.

JO TNI

S TA FFCH IE FS OF

America’s military preparing for tomorrow: Quality People Trained, Equipped and Ready for Joint operations

Persuasive in Peace Decisive in War

Preeminent in Any Form of Conflict

America’s military preparing for tomorrow: Quality People Trained, Equipped and Ready for Joint operations

Persuasive in Peace Decisive in War

Preeminent in Any Form of Conflict

“Joint Vision 2010 is the conceptual template for how America’s Armed Forces will channel the vitality and innovation of our people and leverage technological opportunities to achieve new levels of effectiveness in joint warfighting.”

Joint Vision 2010

Why a Joint Vision? CJCS Title 10 responsibility to assist

NCA “in providing for the strategic direction of the armed forces

Provide a common direction to harmonize Service views and guide their force development efforts

Advance joint warfighting capability as intended by the Goldwater-Nichols Defense Reorganization Act

Joint Vision 2010

Page 9: Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to integrate processes Result: JV2010 Vision shall.

JO TNI

S TA FFCH IE FS OF

Emerging Operational ConceptsEnabled By Information Superiority

And Technological Innovation ...

Fused Through Co-evolution ofFused Through Co-evolution ofDOTMLPDOTMLP

PrecisionEngagement

DominantManeuver

Full DimensionalProtection

Focused Logistics

FullFull SpectrumSpectrumDominanceDominance

Synergism achieved only through co-evolution of: Joint Doctrine Agile Organizations Joint Training & Education Enhanced Materiel Innovative Leadership, and High Quality People

D OTM L P

Full Spectrum Dominance

Page 10: Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to integrate processes Result: JV2010 Vision shall.

JO TNI

S TA FFCH IE FS OF

EnablingConcept

Information Superiority

The Key Enabler

Seamless systemsIntegration

Enhanced C2

PreciseKnowledgeof FriendlyLocations

Fused,All-SourceIntelligence

Page 11: Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to integrate processes Result: JV2010 Vision shall.

JO TNI

S TA FFCH IE FS OF

EnablingConcepts

Technological Innovation

Improved Systems Integration between Sensors, C2, Shooters

Order of Magnitude Improvementin lethality

BroadRange

ofWeaponsEffects

GreaterPrecision,Invisibility,

Detectability

Page 12: Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to integrate processes Result: JV2010 Vision shall.

JO TNI

S TA FFCH IE FS OF

OperationalConcepts

DominantManeuver

Dominant Maneuver

Decisive Speed

& Tempo

Decisive Speed

& Tempo

Decisive advantage gained by controlling breadth, depth and height of the battlespace

Decisive advantage gained by controlling breadth, depth and height of the battlespace

Result:

Battlespace AwarenessBattlespace Awareness

PositionalAdvantagePositionalAdvantage

Page 13: Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to integrate processes Result: JV2010 Vision shall.

JO TNI

S TA FFCH IE FS OF

OperationalConcepts

DominantManeuver

PrecisionEngagement

Precision Engagement

Produce Desired Effect

Command & Control

Accurately Locate

Assess Success

Reengage Result:Wider Array of

Flexible & Accurate Options

Wider Array of Flexible & Accurate

Options

Page 14: Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to integrate processes Result: JV2010 Vision shall.

JO TNI

S TA FFCH IE FS OF

DominantManeuver

PrecisionEngagement

FocusedLogistics

OperationalConcepts

Focused Logistics

Tailored Logistics Packages

Tailored Logistics Packages

Information Fusion

Information Fusion

Total Asset Visibility and

Intransit Visibility

Total Asset Visibility and

Intransit Visibility Reduced Logistics

Inventory, Footprint & Response Time

Reduced Logistics Inventory, Footprint & Response Time

Result:Result:More capable deployed forces requiring less continuous support

More capable deployed forces requiring less continuous support

Page 15: Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to integrate processes Result: JV2010 Vision shall.

JO TNI

S TA FFCH IE FS OF

DominantManeuver

PrecisionEngagement

FocusedLogistics

Full DimensionalProtection

OperationalConcepts

Full Dimensional Protection

Result:Result: Protection from Theater to Individual

Protection from Theater to Individual

Aerospace Control

Aerospace Control

Sea ControlSea Control

Multidimensional Protection

Multidimensional Protection

Upper TierUpper Tier

Lower Tier

Lower Tier

Page 16: Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to integrate processes Result: JV2010 Vision shall.

JO TNI

S TA FFCH IE FS OF

JV 2010 - Full Spectrum Dominance

PrecisionEngagement

DominantManeuver

Full DimensionalProtection

Focused Logistics

FullFull SpectrumSpectrumDominanceDominance

Synergism achieved only through co-evolution of: Joint Doctrine Agile Organizations Joint Training & Education Enhanced Materiel Innovative Leadership, and High Quality People

D OTM L P

Coalition and Interagency

Page 17: Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to integrate processes Result: JV2010 Vision shall.

JO TNI

S TA FFCH IE FS OF

NetworkCentric

PrecisionEngagement

DominantManeuver

Full DimensionalProtection

Focused LogisticsFocused Logistics

DoctrineTraining &Exercises

Build Trust,Cooperation

TheaterEngagement

SharingVision

Leadership

Education

Coalition

Page 18: Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to integrate processes Result: JV2010 Vision shall.

JO TNI

S TA FFCH IE FS OF

Page 19: Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to integrate processes Result: JV2010 Vision shall.

JO TNI

S TA FFCH IE FS OF

Page 20: Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to integrate processes Result: JV2010 Vision shall.

JO TNI

S TA FFCH IE FS OF