al sciarretta cns technologies, inc [email protected] network embedded systems...

14
Al Sciarretta CNS Technologies, Inc CNS Technologies, Inc [email protected] [email protected] Network Embedded Systems Network Embedded Systems Technology Technology (NEST) (NEST) Extreme Scaling Extreme Scaling CONOPS & Sites CONOPS & Sites

Upload: barbra-cannon

Post on 13-Jan-2016

213 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Al Sciarretta CNS Technologies, Inc asciarretta@unconventional-inc.com Network Embedded Systems Technology (NEST) Extreme Scaling CONOPS & Sites Extreme

Al SciarrettaCNS Technologies, IncCNS Technologies, Inc

[email protected]@unconventional-inc.com

Network Embedded Systems Network Embedded Systems TechnologyTechnology

(NEST)(NEST)

Network Embedded Systems Network Embedded Systems TechnologyTechnology

(NEST)(NEST)

Extreme ScalingExtreme Scaling

CONOPS & SitesCONOPS & Sites

Extreme ScalingExtreme Scaling

CONOPS & SitesCONOPS & Sites

Page 2: Al Sciarretta CNS Technologies, Inc asciarretta@unconventional-inc.com Network Embedded Systems Technology (NEST) Extreme Scaling CONOPS & Sites Extreme

2

Focus Problem: Colombian Oil Pipeline

ELN (National Liberation Army)

FARC (Revolutionary ArmedForces of Colombia)

Cano – Limon Pipeline

500 miles

Page 3: Al Sciarretta CNS Technologies, Inc asciarretta@unconventional-inc.com Network Embedded Systems Technology (NEST) Extreme Scaling CONOPS & Sites Extreme

3

1990 1995 2000

260

100

200

18087

160

128

300

1990 1995 2000

260

100

200

18087

160

128

300

Year

Incidents/Year

350% Growth from ‘97 to ‘01

Year

Incidents/Year

Page 4: Al Sciarretta CNS Technologies, Inc asciarretta@unconventional-inc.com Network Embedded Systems Technology (NEST) Extreme Scaling CONOPS & Sites Extreme

4

Page 5: Al Sciarretta CNS Technologies, Inc asciarretta@unconventional-inc.com Network Embedded Systems Technology (NEST) Extreme Scaling CONOPS & Sites Extreme

5

CONOPSPrimary Effort

Surveillance of Long, Linear, Static Structures

PipelineProblem: Too vast an area for limited personnel

resources (e.g., mobile guards) Hostile actions:

• Destruction (including explosives)• Damage to pumps and transformers• Stripping of copper power lines

Operational Need: Reliable automated surveillance to

detect movement in security zone

FY04 Experiment: Sense movement of personnel and/or

vehicles toward the pipeline Track the movement and the stop/start

of movement

Damage in Iraq

Page 6: Al Sciarretta CNS Technologies, Inc asciarretta@unconventional-inc.com Network Embedded Systems Technology (NEST) Extreme Scaling CONOPS & Sites Extreme

6

CONOPSPrimary Effort

Pipeline

Pump Station

Security Zone

20 km

1 km

Detection and tracking of personnel

Detection and tracking of vehicles

Detection of unknowns

? Guard Force Alerted

Mobile Patrol

Reaction Force

Pipeline

Page 7: Al Sciarretta CNS Technologies, Inc asciarretta@unconventional-inc.com Network Embedded Systems Technology (NEST) Extreme Scaling CONOPS & Sites Extreme

7

CONOPSRelated Efforts

"The use of small-arms fire and RPG attacks, command detonated IED's, and mortar rounds continues to increase; especially the frequency of attacks which utilize command detonated IED's daisy chained together, buried or hidden along roads and highways,"

L. Paul Bremer III

NEWS RELEASEHEADQUARTERS UNITED STATES CENTRAL COMMAND

7115 South Boundary BoulevardMacDill AFB, Fla. 33621-5101

Phone: (813) 827-5894; FAX: (813) 827-2211; DSN 651-5894

November 24, 2003

FOR IMMEDIATE RELEASE

TASK FORCE “ALL AMERICAN” SOLDIERS DISRUPT ATTEMPTS TO EMPLACE IED

AL FALLUJAH, Iraq—Soldiers from 1st Battalion, 16th Mechanized Infantry Regiment, 1st Infantry Division, attached to 82nd Airborne Division, killed three enemy personnel emplacing an improvised explosive device last night at approximately 8:30 p.m.

The soldiers were conducting a patrol along the intersection of Highway 1 and Highway 10 when they observed two individuals digging a hole in the median. A sedan arrived shortly after. Three personnel exited the car and began walking towards the two individuals digging. One of the individuals from the sedan was carrying a large object to the hole.

IED = Improvised Explosive Device

Page 8: Al Sciarretta CNS Technologies, Inc asciarretta@unconventional-inc.com Network Embedded Systems Technology (NEST) Extreme Scaling CONOPS & Sites Extreme
Page 9: Al Sciarretta CNS Technologies, Inc asciarretta@unconventional-inc.com Network Embedded Systems Technology (NEST) Extreme Scaling CONOPS & Sites Extreme

9

CONOPSRelated Efforts

IED

Enemy Observation Point

(OP)

IED

Similar Long, Linear, Static Structures

Surveillance of Supply Routes: Detect potential ambush sites:

• Personnel w/shoulder fired weapons (e.g., RPGs)• IEDs

FY04 Experiment: Sense movement of

personnel/vehicles toward supply route, and then:

They remain near a point They remain for a while and then leave

Sense suspicious movement on the road

Wire to OP

Page 10: Al Sciarretta CNS Technologies, Inc asciarretta@unconventional-inc.com Network Embedded Systems Technology (NEST) Extreme Scaling CONOPS & Sites Extreme

10

CONOPSRelated Efforts

Similar Long, Linear, Static Structures

Border Surveillance:

Detect illegal border crossings:

• U.S. Customs

• Military operations in Iraq

FY04 Experiment:

Detect movement of personnel/vehicles across area adjacent to a border

Page 11: Al Sciarretta CNS Technologies, Inc asciarretta@unconventional-inc.com Network Embedded Systems Technology (NEST) Extreme Scaling CONOPS & Sites Extreme

11

Experiment Sites

Characteristics Relatively flat, open area

• Easier to survey/mark off 1 km x 20 km site

• Easier to deploy/recover sensors

• Easier for observers to see large section of experiment site

No forests No large physical obstructions (e.g., buildings) to line-of-site communications

• Small obstructions (e.g., small rocks) okay

Relatively good weather (little rain, light winds, etc.)• Sensors can stay out for days

Military base• Site can be guarded

• Sensors deployed on day 1 and remain in place until end of experiment (days later)

• Potential for personnel to support deployment/recovery of sensors

Page 12: Al Sciarretta CNS Technologies, Inc asciarretta@unconventional-inc.com Network Embedded Systems Technology (NEST) Extreme Scaling CONOPS & Sites Extreme

12

Experiment Sites

Candidate Sites Naval Air Weapons Facility,

China Lake• Being used for DARPA SensIT effort (Feb 04)

• 150 miles NE of Los Angeles

• Encompasses 1.1 million acres of land in California's upper Mojave Desert, ranging in altitude from 2,100 to 8,900 feet

• Varies from flat dry lake beds to rugged piñon pine covered mountains.

• Weather should be consistent Summer will be hot

Page 13: Al Sciarretta CNS Technologies, Inc asciarretta@unconventional-inc.com Network Embedded Systems Technology (NEST) Extreme Scaling CONOPS & Sites Extreme

13

Experiment Sites

Candidate Sites Other Sites

• Fort Bliss, TX (near El Paso, TX)

• Nellis AFB (near Las Vegas, NV)

• NAS Fallon (near Reno, NV)

• Marine Corps Air to Ground Combat Center, 29Palms, California

• Eglin AFB (near Pensacola, FL)

Page 14: Al Sciarretta CNS Technologies, Inc asciarretta@unconventional-inc.com Network Embedded Systems Technology (NEST) Extreme Scaling CONOPS & Sites Extreme

14

Next Steps(not in sequential order)

Discuss CONOPS with potential users Determine metrics

• Technical

• Operational

Identify experiment data collection and logistical needs

Develop Extreme Scaling Experiment Plan• Ensure compliance with Extreme Scaling Integration Plan

Conduct experiment site assessment Select site and coordinate/schedule resource

needs Implement experiment plan