Current Trends in International Defense and Security Procurement Lecture (Bachelors Degree)

Preview:

DESCRIPTION

Kristina Soukupova, BA, MA, PhD Lecture (Bachelor Degree)

Citation preview

Current Trends in International Defense

and Security Procurement

Kristina Soukupova, BA, MA, PhDKAP/MB

November, PlzenWinter 2012 Session

Introduction

Where are We Now?

Technologies in Focus

Conclusion

Content

• Procurement •Legal •Official •Main focus on NATO countries

• Lecture does not cover illicit arms trade

Introduction

Introduction

•Defence – traditionally involves only military (national defence against enemies outside borders)

•Security – protection of citizens inside state orders (Homeland Security), but war on terror?

We can only prepare for yesterday‘s

WARS

• Decreasing defence expenditure/budget since

the end of Cold War

• Post-Cold War conduct of warfare - different

enemy, new threats

• War on Terror, Counterterrorism operations,

Information Age

• Post-9/11 increasing market share of

Homeland Security

Where are we now?

Most militaries aim for smaller, more agile networked forces

Moving away from platform centric procurement to capability or information centric procurement

Changing role of traditional defence suppliers and the role of military R&D

Where are we now?

Crucial Question for all Stakeholders::

• Fragmented international market and dominant

position of the defence industry within states

• Coordination initiatives - Smart Defence (NATO),

Pooling and Sharing (EU)

• Interoperability standards – EU v. NATO

• Lack of joined conceptual and doctrinal framework

Mirror 21st century battle space – mostly populated urban and unpredictable

• Counter Improvised Explosive Devices (IODs) measures

• Interoperability, Situational Awareness, Networks, system integration

• Soldier Modernization Programs – 21st century warrior

• Cyber Defence

• Homeland Security/National Resilience

Areas of Biggest Focus

• Cyber

• Simulation

• Satellite systems

• UAVs

• Smart Bombs

• C4ISTAR

• Homeland Security

• NEC / NCW

Technologies in focus

• Command and Control (C2) socio-technical system, through which a commander

exercises authority over designated forces to accomplish mission

• Communications (C3)

• Computers (C4)

• Intelligence, Surveillance, Target acquisition, Reconnaissance (ISTAR)

methods of observing the enemy and one's area of operations – the eyes and ears. Cameras, radars, sonar, UAVs, intelligence input (HUMINT, SIGINT)

C4ISTAR

• Connect sensors to provide better situational awareness and operational picture

• Across traditional military stovepipes

• Faster decision making

C4ISTAR

• Network Enabled Capability

• Network Centric Warfare

• Everything and everyone is connected through a network

• Requires changes to organization, mindset, training

NEC / NCW

• Synthetic simulation environment

• Advanced graphics to simulate real environment

• Flight simulators

• Battlefield simulators

• Ratytheon Virtsim

Computer Simulation

• Various types for different missions

• Capabilities depend on payload (sensors and systems the UAV carries)

• Can be armed with missiles

• Fixed wing or rotary wing

• HALE – High Altitude Long Endurance (Global Hawk)

• MALE – Medium Altitude Long Endurance (Predator)

• Mini/Micro UAVs (Parrot AR Drone)

UAVsUnmanned Area Vehicles

•State-of-the-art communication technologies

•Voice•Data

Soldier Modernization Programs

•Advanced sensors•nigh vision goggles•Infrared

Soldier Modernization Programs

Soldier Modernization Programs

Soldier Modernization Programs

• Enhanced camouflage

• US ‘invention’ post 9/11 attacks, most visible at airports

• Efforts and technologies aimed at protecting citizens mainly from terrorist attacks

• Dual use technologies

Homeland Security

• Precision guided weapons

• Joint Direct Attack Munition

Smart Bombs

• Rapidly evolving

• Based on our dependency on technologies

• Critical infrastructure – water, electricity, banks, health systems, etc.

• There are no borders in cyberspace, so how can we defend it?

• Attacks by individuals and states on military and civilian targets

Cyber

Focus mainly on deployed units or those with international exposure

• C4ISTAR – core program OTS – Operačně taktický systém velení a řízení

• NEC – now discontinued

• Cyber – new initiative, now under NBU

• UAVs – local SOJKA, Raven,

• Homeland Security – IZS, but not so comprihensive as in the US

Czech Republic

•Concept / doctrine development

•Interoperability

•Standard setting

•Procurement co-ordination

•Market unification

Immediate Chalenges

Decreasing defence budgets

Focus on interoperability of systems (vertical and horizontal)

Main trends

Conclusion

Procurement of capabilities, not platforms

Changing role of traditional defence contractors

Closing civil-military gap

Thank youThank you

Contact details:Contact details:

Kristina.soukupova@i3cas.com

Recommended