Loading
08:45
  1. Combined
    15 mins
09:00
  1. Combined
    30 mins
09:30
  1. Combined
    30 mins
10:00
  1. Combined
    20 mins
10:40
  1. Stage 1
    45 mins
    • Survivable or attritable logistics platforms
    • Operationalising advanced manufacturing at the tactical edge
    • Assured command and control of logistic network nodes
  2. Stage 2
    45 mins
    • Enabling ad-hoc interoperability between disparate systems
    • Synchronizing cross-domain command and control
    • Managing cyber and EW threats
12:10
  1. Combined
    20 mins
12:50
  1. 55 mins
13:45
  1. Stage 2
    45 mins
    • Using autonomous systems for control rather than just denial
    • Sustaining autonomous system operations
    • Improving autonomous system lethality and reliability
  2. Stage 1
    45 mins
    • Detection and discrimination of small, low signature threats
    • Balancing layered and cost-effective defeat mechanisms
    • Attritable and mobile C-UxS capabilities
15:15
  1. Mission Control
    30 mins
15:45
  1. Stage 2
    20 mins
  2. Stage 1
    20 mins
16:50
  1. Stage 1
    60 mins
  2. Stage 2
    60 mins
18:00
  1. Mission Control
    90 mins
08:45
  1. Combined
    15 mins
09:00
  1. Combined
    30 mins
09:30
  1. Combined
    30 mins
10:20
  1. Stage 2
    40 mins
    • Detection and defeat of autonomous undersea vehicles
    • Surveillance and protection of deep-sea infrastructure
    • Using the seabed for military advantage
  2. Stage 1
    40 mins
    • Equipping and fielding edge/stand-in forces/mission area 1 forces in contested environments
    • C3 of forces in highly contested environments
    • Use of concealment, camouflage, deception, and EW (Electronic Warfare) to survive inside the WEZ (Weapon Engagement Zone)
11:45
  1. Combined
    30 mins
12:15
  1. 60 mins
13:20
  1. Stage 1
    50 mins
  2. Stage 2
    50 mins
14:15
  1. Stage 1
    45 mins
    • Spectrum management in an increasingly contested and congested EMS (Electromagnetic Spectrum)
    • Building cyber and EW (Electronic Warfare) effects at scale
    • Exploiting and sustaining access to space for C3 and targeting
  2. Stage 2
    45 mins
    • Real time threat identification and boost-phase engagement
    • Implications and challenges of spaced based interceptors
    • Interoperability across all domains to enhance detection, tracking, interception and defeat