08:45
09:00
10:40
-
- Survivable or attritable logistics platforms
- Operationalising advanced manufacturing at the tactical edge
- Assured command and control of logistic network nodes
-
- Enabling ad-hoc interoperability between disparate systems
- Synchronizing cross-domain command and control
- Managing cyber and EW threats
12:50
13:45
-
- Using autonomous systems for control rather than just denial
- Sustaining autonomous system operations
- Improving autonomous system lethality and reliability
-
- Detection and discrimination of small, low signature threats
- Balancing layered and cost-effective defeat mechanisms
- Attritable and mobile C-UxS capabilities
16:05
18:00
08:45
09:00
10:20
-
- Detection and defeat of autonomous undersea vehicles
- Surveillance and protection of deep-sea infrastructure
- Using the seabed for military advantage
-
- Equipping and fielding edge/stand-in forces/mission area 1 forces in contested environments
- C3 of forces in highly contested environments
- Use of concealment, camouflage, deception, and EW (Electronic Warfare) to survive inside the WEZ (Weapon Engagement Zone)
12:15
14:15
-
- Spectrum management in an increasingly contested and congested EMS (Electromagnetic Spectrum)
- Building cyber and EW (Electronic Warfare) effects at scale
- Exploiting and sustaining access to space for C3 and targeting
-
- Real time threat identification and boost-phase engagement
- Implications and challenges of spaced based interceptors
- Interoperability across all domains to enhance detection, tracking, interception and defeat
