About Me

My photo
MILITARY TECHNOLOGY (MILTECH) is the world's leading international tri-service defence monthly magazine in the English language. MILITARY TECHNOLOGY is "Required Reading for Defence Professionals". Follow us on Twitter: MILTECH1

27 November 2015

I/ITSEC 2015: Operation Blended Warrior at a Glance

Operation Blended Warrior (OBW) is a Live, Virtual and Constructive (LVC) event conducted between the US Department and Defence (DoD) and industry to showcase new capabilities while documenting LVC integration and execution challenges.

Live, Virtual, and Constructive (LVC) Simulation - A broadly used taxonomy describing a mixture of live, virtual, and constructive simulation. Live Simulation - Live simulation involves real people operating real systems. Military training events using real equipment are live simulations. They are considered simulations because they are not conducted against a live enemy.

Virtual Simulation - A simulation involving real people operating simulated systems. Virtual simulations inject human-in-the-loop in a central role by exercising motor control skills (i.e., flying an airplane), decision skills (i.e., committing fire control resources to action) or communication skills (i.e., as members of a C4I team).

Constructive Simulation - A constructive simulation includes simulated people operating simulated systems. Real people stimulate (make inputs) to such simulations, but are not involved in determining the outcomes. A constructive simulation is a computer program. For example, a military user may input data instructing a unit to move and to engage an enemy target. The constructive simulation determines the speed of movement, the effect ofthe engagement with the enemy and any battle damage that may occur.

In the age of shrinking budgets and ever increasingadversary capabilities/complexities, it is becoming more difficult and expensive to conduct realistic, effective and flexible training. LVC can be used to increase the fidelity of training and the number of people trained while simultaneously reducing the cost. Additional progress can be made as integration of LVC assets is a lengthy and resource intensive effort. OBW is a representative LVC event. While the objectives are different, OBW was planned and its technologies integrated similar to the real world. The challenges uncovered will be addressed through LVC communities. The goal is to reduce the time and resources to employ this important capability. LVC is the future of readiness. The soldier and their platforms need LVC. The taxpayerdeserves a fiscally prudent LVC. OBW is designed to improve LVC.

The Set-Up

The United States’ ally, the country of Balboa, is surrounded by countries and militant groups that are openly hostile to both the US and Balboa. The US routinely conducts exercises, as well as deploys forces to Balboa, so it is not uncommon to have any particular mix of assets in theater at any given time.

On Day 1 of the OBW exercise, Balboa will experience a “black swan” event requiring Humanitarian Assistance/Disaster Response that will both cause great infrastructure damage as well as encourage the surrounding unfriendly forces to take advantage of the situation.

Throughout the exercise, numerous injects, scenarios and missions consistent with real-world possibilities will be introduced such as Embassy requests to DoD, news coverage, military-civilian interactions, joint operations, HA/DR operations, and force escalation.
All simulations will be conducted at the Unclassified level, and during the daylight/visible hours to facilitate the widest dissemination/demonstration. Vignette operations and capabilities are notional in nature and will be unclassified—please remember to keep discussions/questions of the demonstrations unclassified as well.

All events will be viewable and narrated in the NTSA booth (339). Each event is also viewable in the individual booths in which each participant company is operating their simulators. Each Vignette will be 30 minutes long including any needed introduction/scene setter and closeout/summary. 

Schedule  


Monday 30 November 2015, 1430-1500, Booths 339, 1463

Disaster & Humanitarian Relief - Start Exercise

The world is shocked as it watches the country of Balboa endure a natural disaster. Relief organizations, and a coalition force lead by the United States, stream to the area in support. C4I Consultants (339) and Engineering & Computer Simulations, Inc. (1463) provide the narrative and background for this foundation to Operation Blended Warrior.
 
---

Monday 30 November 2015, 1500-1530, Booths 339, 2435, 2201, 1463, 1449, 1901

Command and Control

With regional threats to security and the need to protect relief efforts, the US Military establishes an overwatch and begins to coordinate efforts of military and civilian agencies. PLEXSYS Interface Products, Inc. (2435) is providing an AWACS simulation, led the organisation of assets provided by Rockwell Collins (2201), Engineering & Computer Simulations, Inc. (ECS - 1463), L-3 Communications (1449), and AEgis Technologies Group, Inc. (1901).
 

---

Monday 30 November 2015, 1530-1600 Booths 339, 249, 2248, 827, 1101, 1734

Supply Convoy

A group of refugees and residents in a remote area have been isolated from their normal supplies of food and water. A supply convoy, protected by the military, is sent in response and comes under attack. Cubic (249) has provided simulations of the convoy and led the development of the operation, which highlights behaviors and imagery from Bohemia Interactive Simulations (BISim - 2248), VT MÄK (827), TRU Simulation + Training (1101), and CAE (1734).
 

---

Tuesday 1 December 2015, 1530-1600; Booths 339, 1463, 1734, 249, 1101, 1401, 243

MEDECAV Operations

With the supply convoy trapped and taking fire, a rescuemission is mounted to retrieve casualties. Medics performbattlefield triage prior to evacuation, and field hospitals demonstrate critical care skills for the wounded. ECS (1463) led the effort and integrated their Tactical Combat Casualty Care (TC3) simulator with CAE’s (1734) Aeromedical Evacuation Training System, including human patient simulators, and convoy and air assets from Cubic (249), TRU (1101), FlightSafety International (1401) and PLEXSYS (2435).
 

---

Tuesday 1 December 2015, 1600-1630; Booths 339, 2435, 2201, 1463, 1901

Cyber Degraded Operations

While continuing the convoy rescue effort, critical communications are interrupted. Eventually, the source of the interference is traced to a proxy force being employed by a near-peer threat to the north. The effectiveness of the cyber operation leads to an increased threat posture by the military. USPACOM J81 (1539) and NAWCTSD (339), in conjunction with Camber (1225), SOAR Technology, Inc. (2200) and Alion Science & Technology (835), demonstrate the transference of cyber effects from a cyber engagement into demonstrable effects within the broader LVC environment.
 

---

Tuesday 1 December 2015, 1630-1700; Booths 339, 827, 2435, 2248, 439, 1273, 2200

Maritime Threat

Validating the threats posed by the neighboring country, small boats and fishing vessels, loaded with munitions, begin to make the trip south in an attempt to supply militants operating in the northern hills. Using maritime surveillance and a limited surface force, suspected arms shipments are intercepted. VT MÄK (827) partnered with Zedasoft (2435), BISim (2248), NAWCTSD (439), SAIC (1273) and SOAR (2200) to demonstrate their respective maritime capabilities working together.
 

---

Wednesday 2 December 2015, 1030-1100, Booths 339, 2201, 439, 2200, 429

Airlift Protection

The world begins to respond with additional aid through an airlift operation. Tensions mount as flights are threatened by hostile aircraft. A US carrier patrols a no-fly zone, and protects the flights in and out of a resupply airfield. Rockwell Collins (2201), NAVAIR 5.4 (439), and SOAR (2200), teamed up with ONR (439) and NAWCTSD (439) in this air-centric engagement; BGI (439) and Aptima (429) provide performance measurement capabilities.
 

---

Wednesday 2 December 2015, 1100-1130, Booths 339, 1539, 1225, 2200, 835

Integrated Cyber Operations

The proxy forces interfering with US operations force a military response. A cyber attack on the remainder of the convoy seems to be a prelude to an attack. The US forces respond with a military intervention, and active operations against the militants are underway. USPACOM J81 (1539) and NAWCTSD (339), again in conjunction with Camber (1225), SOAR (2200) and Alion Science & Technology (835), demonstrate a different way of transferring cyber effects from a cyber engagement into effects within the broader LVC environment culminating with a kinetic response.
 

---

Wednesday 2 December 2015, 1130-1200 Booths 339, 439, 1700, 1449, 2435, 2201, 2200, 429

Air-to-Air Operations

Knowing that the northern neighbor has vowed to support the militants, the US sets up an exclusion zone to protect the ground operations. The wisdom of that decision is validated when several sets of attack aircraft are intercepted. This 8v8 Defensive Counter Air vignette led by NAVAIR 5.4 (439) and their Next Generation Threat System, incorporates air assets from Boeing (1700), L-3 Communications (1449), PLEXSYS (2435), Rockwell Collins (2201), SOAR (2200) and USAF DTOC (339); BGI (439) and Aptima (429) provide performance measurement capabilities.
 

---

Wednesday 2 December 2015, 1600-1630 Booths 339, 2201, 2248, 1700, 1449, 2435, 249, 827

Close Air Support Operations

Ground operations come under fire in an area too difficult to support by land. An embedded Tactical Air Control Party calls for air support, and uses a digital 9-line message to provide targeting. The effort, led by Rockwell Collins (2201), includes their own Joint Terminal Air Control simulation and various air assets from BISim (2248), Boeing (1700), L-3 Communications (1449) and PLEXSYS (2435), and ground assets from Cubic (249) and VT MÄK (827).
 

---

Wednesday 2 December 2015, 1630-1700 Booths 339, 439, 2435, 2201, 827

Hostile UAVs

In an ironic twist, unmanned vehicles launch from the north in large numbers and begin to fly towards the active operations area. Unsure whether they represent surveillance or offensive capability, manned aircraft are sent to intercept. Led by NAVAIR 5.4 (439) and their Next Generation Threat System, air assets from PLEXSYS (2435), Rockwell Collins (2201) and VT MÄK (827) integrate their systems to demonstrate this counter to an overwater threat. BGI (439) provides performance measurement.
 

---

Wednesday 2 December 2015, 1700-1730 Booths 339, 439, 1700, 1449, 2435, 2201, 2200, 429

Air-to-Air Operations

Additional air threats present themselves in an attempt to keep the US forces from increasing their presence or coming ashore. The air operations center responds decisively when it learns that the UAVs and attack aircraft are focused on a nuclear storage facility along the beach near the northern border. A different look at Defensive Counter Air led by NAVAIR 5.4 (439) and their Next Generation Threat System incorporates air assets from Boeing (1700), L-3 Communications (1449), PLEXSYS (2435), Rockwell Collins (2201), SOAR (2200) and USAF DTOC (339); BGI (439) and Aptima (429) provide performance measurement capabilities.
 
---

Thursday 3 December 2015, 1030-1100 Booths 339, 1273, 1734, 2248, 827, 249, 1101, 1533, 2435, 429

Amphibious Landing

Knowing that a show of force and physical presence is required to secure the area around the storage facility, the Marines are called in. Coming ashore in boats and aircraft, they quickly establish a beachhead and organize a defensive perimeter. SAIC (1273) led a strong grouping of surface, ground and air assets from CAE (1734), BISim (2248), VT MÄK (827), Cubic (249), TRU (1101), PM TRASYS (1533) and Zedasoft (2435); SAIC is showcasing their SIMaaS (Simulation as a Service) and Aptima (429) is a providing performance measurement capability.
 

---

Thursday 3 December 2015, 1100-1130 Booths 339, 1273, 1734, 2248, 827, 249, 1101, 1533, 2435, 429

Amphibious Assault

The on-scene commander assesses the situation and directs the units to establish blocking positions along the logical attack axes. Marines fight their way to these objectives and secure roads. SAIC (1273), CAE (1734), BISim (2248), VT MÄK (827), Cubic (249), TRU (1101), PM TRASYS (1533), Zedasoft (2435) and Aptima (429).
 

---

Thursday 3 December 2015, 1130-1200 Booths 339, 439, 1700, 249, 1449, 2435, 2200, 2201, 439, 429

Final Strike

With the relief effort secure, the northern neighbor bottled up and the storage facility protected, the militants are the last remaining threat to the area. A final strike is called in to eliminate the last thoroughfare from the hills, effectively ending their ability to interfere. Military offensive operations are successfully concluded. NAVAIR 5.4 (439) uses their Next Generation Threat System and teams up with Boeing (1700), Cubic (249), L-3 Communications (1449), PLEXSYS (2435), SOAR (2200) and Rockwell Collins (2201) for this Air to Ground vignette; BGI (439) and Aptima (429) provide performance measurement capabilities.

No comments:

Post a Comment