Anda di halaman 1dari 27

Kristina Soukupova, BA, MA, PhD KAP/MB November, Plzen Winter 2012 Session

Current Trends in International Defense and Security Procurement

Content

Introduction

Where are We Now?


Technologies in Focus Conclusion

Introduction
Procurement
Legal Official Main focus on NATO countries

Lecture does not cover illicit arms trade

Introduction
Defence traditionally involves only military (national defence against enemies outside borders) Security protection of citizens inside state orders (Homeland Security), but war on terror?

We can only prepare for yesterdays


WARS

Where are we now?


Decreasing defence expenditure/budget since

the end of Cold War


Post-Cold War conduct of warfare - different

enemy, new threats


War on Terror, Counterterrorism operations, Information Age Post-9/11 increasing market share of Homeland Security

Where are we now?


Most militaries aim for smaller, more agile networked forces Moving away from platform centric procurement to capability or information centric procurement Changing role of traditional defence suppliers and the role of military R&D

Crucial Question for all Stakeholders:


Fragmented international market and dominant position of the defence industry within states Coordination initiatives - Smart Defence (NATO), Pooling and Sharing (EU) Interoperability standards EU v. NATO

Lack of joined conceptual and doctrinal framework

Areas of Biggest Focus


Mirror 21st century battle space mostly populated urban and unpredictable Counter Improvised Explosive Devices (IODs) measures

Interoperability, Situational Awareness, Networks, system integration


Soldier Modernization Programs 21st century warrior Cyber Defence

Homeland Security/National Resilience

Technologies in focus
Cyber Simulation Satellite systems UAVs Smart Bombs C4ISTAR Homeland Security NEC / NCW

C4ISTAR
Command and Control (C2)
socio-technical system, through which a commander exercises authority over designated forces to accomplish mission

Communications Computers

(C3) (C4)

Intelligence, Surveillance, Target acquisition, Reconnaissance (ISTAR)


methods of observing the enemy and one's area of operations the eyes and ears. Cameras, radars, sonar, UAVs, intelligence input (HUMINT, SIGINT)

C4ISTAR
Connect sensors to provide better situational awareness and operational picture Across traditional military stovepipes Faster decision making

NEC / NCW
Network Enabled Capability Network Centric Warfare Everything and everyone is connected through a network Requires changes to organization, mindset, training

NEC Video

SAAB NEC Northrop Grumman NCW

Computer Simulation
Synthetic simulation environment Advanced graphics to simulate real environment

Flight simulators
Battlefield simulators Ratytheon Virtsim

UAVs

Unmanned Area Vehicles

Various types for different missions

Capabilities depend on payload (sensors and systems the UAV carries)


Can be armed with missiles Fixed wing or rotary wing HALE High Altitude Long Endurance (Global Hawk) MALE Medium Altitude Long Endurance (Predator)

Mini/Micro UAVs (Parrot AR Drone)

Soldier Modernization Programs Advanced sensors nigh vision goggles Infrared State-of-the-art communication technologies Voice Data

Soldier Modernization Programs

Soldier Modernization Programs

Soldier Modernization Programs Enhanced camouflage

Homeland Security
US invention post 9/11 attacks, most visible at airports Efforts and technologies aimed at protecting citizens mainly from terrorist attacks

Dual use technologies

Smart Bombs
Precision guided weapons

Joint Direct Attack Munition

Cyber
Rapidly evolving Based on our dependency on technologies Critical infrastructure water, electricity, banks, health systems, etc. There are no borders in cyberspace, so how can we defend it? Attacks by individuals and states on military and civilian targets

Czech Republic
Focus mainly on deployed units or those with international exposure

C4ISTAR core program OTS Operan taktick systm velen a zen

NEC now discontinued


Cyber new initiative, now under NBU

UAVs local SOJKA, Raven,


Homeland Security IZS, but not so comprihensive as in the US

Immediate Chalenges
Concept / doctrine development Interoperability Standard setting Procurement co-ordination Market unification

Conclusion
Main trends
Decreasing defence budgets Focus on interoperability of systems (vertical and horizontal) Procurement of capabilities, not platforms Changing role of traditional defence contractors Closing civil-military gap

Thank you
Contact details:

Kristina.soukupova@i3cas.com