use of technology in national security - presentation

42
“Use of Technology in National Security”

Upload: shaunak-de

Post on 12-Nov-2014

1.231 views

Category:

Documents


1 download

DESCRIPTION

A presentation on role of technology in the defense of a nation.

TRANSCRIPT

Page 1: Use of Technology in National Security - Presentation

“Use of Technology in National Security”

Page 2: Use of Technology in National Security - Presentation
Page 3: Use of Technology in National Security - Presentation

DRDO-- Defense Research and Development Organization

• DRDO was formed in 1958.

• It has grown multi-directionally over the years.

• Engaged in developing defense technologies.

• Undertakes several major projects for the development of arms and ammunition.

DRDO HEAD QUARTERS - NEW DELH

DRDO LOGO

Page 4: Use of Technology in National Security - Presentation

Armored Fighting Vehicle [AFV] An armored fighting

vehicle (AFV) is a military vehicle, protected by Armour and armed with weapons.

AFV's can be wheeled or tracked, depending on terrain and service conditions.

Page 5: Use of Technology in National Security - Presentation

Research and Development Increased detection capability such

as thermal imagery, automated fire control systems

Increased muzzle energy from the gun to improve range, accuracy and armor penetration.

The most mature future gun technology is the electrothermal-chemical gun.

An electrothermal-chemical gun uses a plasma cartridge to ignite and control the ammunition's propellant, using electrical energy as a catalyst to begin the process.

Page 6: Use of Technology in National Security - Presentation

Arjuna MBT DRDO's indigenous battle tank. The futuristic technology

systems include: automatic target tracking. defensive aids. Laser warning. They are looking at

developing robotic vehicles that would work

Always on tele-link.

Page 7: Use of Technology in National Security - Presentation
Page 8: Use of Technology in National Security - Presentation

Military Armor With so many soldiers killed or injured

by roadside bombs and IEDs over the past half-decade, intensive research has been devoted to improving the body armor worn by troops sent into harm’s way.

Nanoparticle armor to protect not only soldiers, but the vehicles they ride in.

By infusing nanoparticles into ceramic materials used in military armor, both porosity and structural strength are increased.

It is hoped that the improved armor is perfected and introduced as soon as possible.

Page 9: Use of Technology in National Security - Presentation
Page 10: Use of Technology in National Security - Presentation

Bionic Hornet Israeli Defense Forces are drawing on

the latest breakthroughs in nanotechnology to update their weapons.

One notable application is known colloquially as the Bionic Hornet.

No bigger than an average wasp, the flying device is designed to seek out, follow, photograph and even kill selected opponents.

According to Israel’s Deputy Prime Minister Shimon Peres, “It’s illogical to send a plane worth $100 million against a suicidal terrorist.”

Page 11: Use of Technology in National Security - Presentation

Artificial DNA DNA is the very stuff of life itself, so

when reports surfaced of artificial DNA, a few people pushed the panic button.

Not to worry, the purpose of the project was not to play God, but to play with data - store data, actually.

Biological DNA stores the entire genome of any particular plant, animal or person very efficiently in a surprisingly small space.

Artificial DNA, on the other hand, could not only be used to store non-biological data but would be immune to the degrading effects of the naturally occurring DNase enzyme.

The impact on any device that stores data will be tremendous.

Page 12: Use of Technology in National Security - Presentation
Page 13: Use of Technology in National Security - Presentation

Nuclear submarines A nuclear submarine is a submarine

powered by a nuclear reactor. The performance advantages of

nuclear submarines over "conventional" (typically diesel-electric) submarines are considerable: nuclear propulsion, being completely independent of air, frees the submarine from the need to surface frequently, as is necessary for conventional submarines.

The large amount of power generated by a nuclear reactor allows nuclear submarines to operate at high speed for long durations.

Page 14: Use of Technology in National Security - Presentation

Armament Nuclear submarines carry

a wide range of armaments. Cruise Missiles [ Agni-II ] Ballistic Missiles [ Prithvi ] Torpedoes [ Mark 48 torpedo ]

Serve to intimidate opposition and deliver large fire-power nearly anywhere in the world.

Page 15: Use of Technology in National Security - Presentation

INS Arihant

Page 16: Use of Technology in National Security - Presentation
Page 17: Use of Technology in National Security - Presentation

The Hovercraft A hovercraft (air-cushion

vehicle, ACV) is a craft capable of traveling over relatively smooth surfaces supported by a cushion of slow moving, high-pressure air, ejected against the surface below, and contained within a "skirt."

Although supported by the air, they are not usually considered to be aircraft.

Page 18: Use of Technology in National Security - Presentation

Advantages of the Hovercraft Hovercraft are used

throughout the world as specialized transports.

Because they are supported by a cushion of air, hovercraft are unique among forms of ground transportation in their ability to travel equally well over land, ice, and water.

Page 19: Use of Technology in National Security - Presentation

Application of the Hovercraft Small hovercraft are

used for sport, or passenger service, while giant hovercraft have civilian and military applications, and are used to transport cars, tanks, and large equipment in hostile environments and terrain.

Page 20: Use of Technology in National Security - Presentation
Page 21: Use of Technology in National Security - Presentation

Navy of the Future The Zumwalt-class destroyer

(DDG-1000) is a planned class of United States Navy destroyers, designed as multi-mission ships with a focus on land attack.

Provide land attack support for ground forces as well as perform antiair, antisurface and undersea warfare.

Page 22: Use of Technology in National Security - Presentation
Page 23: Use of Technology in National Security - Presentation

Armament Dual Band Radar

Accurate tracking and targeting Peripheral Launch System

Intelligent weaponry, controlled by computers.

Weaponry under development High-powered microwaves utilizing

radio frequency energy Electromagnetic rail guns utilizing

electricity and magnetic fields

Page 24: Use of Technology in National Security - Presentation
Page 25: Use of Technology in National Security - Presentation

Border Security The nation security mainly involves in the

following areas: Land Border Security Waterfront Security Aerial security

Technology has revolutionized each of these fronts, creating secure and safer international borders.

Page 26: Use of Technology in National Security - Presentation

Land Border Security The most commonly used instrument

for land border security is visual sensor network.

It is a network of smart camera devices capable of processing images of a scene from a variety of viewpoints into some form more useful than the individual images.

The network generally consists of the cameras themselves and possibly one or more central computers, where image data from multiple cameras is further processed.

Visual sensor networks are most useful in applications involving area surveillance, tracking, and environmental monitoring.

Page 27: Use of Technology in National Security - Presentation

Aerial security Missile Defense Program is an initiative

to develop and deploy a multi-layered missile defense system to protect nation from missile attacks.

It is a two tiered system consisting of: Interceptor missiles for high

altitude interception [Eg. Prithvi Air Defense]

Short range missile for lower altitude interception. [Advanced Air Defence Missile]

Such two-tiered shields are able to intercept any incoming missile launched 5,000 kilometers away.

Page 28: Use of Technology in National Security - Presentation

Naval Security Underwater sensor networks form the

basic shield. A towed underwater sensor device

comprises of: A towed cable. A fiber optic cable placed within and

running the length of said towed cable.

Electric circuitry and network device. When a disturbance is reported on the

sensor cable, the network alerts a computer in the Command center which then can use data from other sensors to gauge the type of threat and effective response.

Page 29: Use of Technology in National Security - Presentation
Page 30: Use of Technology in National Security - Presentation

Introduction :• Established on 8 October 1932• First ac flight came into being on 01 Apr 1933• Remarkable services during World War 2• Widely famous as Royal Indian Air Force

• नभ� स�र द�पम• Nabha Sparsham Deeptam• Major Operations : 1. Operation Vijay, 2. Operation Meghdoot 3. Operation Cactus and 4. China War

•3rd most powerful service after US army and Air Force of China

Page 31: Use of Technology in National Security - Presentation

Operation Vijay Battle of Goa 451 years of Portuguese

colonial rule in Goa 36 Hours of constant

Bomb-Attack was the key point in this operation

Operation Manager Wing Commander N.B. Menon

Canberra TT18 as a 'Primary element' by IFA

Page 32: Use of Technology in National Security - Presentation

Heroics of Canberra TT18

• High altitude range• Can drop 63,000 pounds of

explosives within minutes, rendering the runway unusable.

• Designed to fly fast and high enough to avoid air-to-air combat entirely

• Highly adaptable, serving in such varied roles for tactical bombing, photographic, electronic, and meteorological reconnaissance

Page 33: Use of Technology in National Security - Presentation

• Operation Meghdoot

Engine power 2 x 1 500 hp.

Cruise speed 225 km/h

Flight range (with normal load) 465 km Flight range (with additional fuel tanks)

950 km

• World's highest battlefield• Indian Army and Pakistani Army actively deployed in altitudes up to 21,000 feet• The Siachen Glacier is located in the eastern Karakoram range in the Himalaya Mountains just east of the Line of Control between India-Pakistan• Mi-8 was highly used during this battle

Mi-8 :• Medium twin-turbine transport helicopter that can also act as a gunship.

• World's most-produced helicopter

Page 34: Use of Technology in National Security - Presentation

• Operation Cactus :• Battle against People's Liberation

Organisation of Tamil Eelam (PLOTE)• Indian forces were invited by the Maldivian

government to intervene• operation gave fame to a new model

Ilyushin Il-76

• Ilyushin Il-76• A 4-engined strategic airlifter designed in

the Soviet Union• Originally built for the military• Now used for the delivery of outsized or

very heavy cargo• carry a payload of 40 tons (88,000 lb) over

a range of 5,000 km (2,700 nmi; 3,100 mi)

• Ilyushin Il-76 in the top picture and the Maldives area where it was used extensively for millitary actions

Page 35: Use of Technology in National Security - Presentation

Reliable Air ForceCommand and structure:• Five operational and two functional commands headed by the rank of Air Marshal• Primary flight training is located at the Air Force Academy in Hyderabad – Key

Academy• The current Chief of the Air Staff is Air Chief Marshal P.V.Naik• IAF operates over sixty air bases• Superb support of 47 Wings and 19 FBSUs• Strength of 170,000 personnel• Nearly 60 U.S built Helicopters and over 500 French, Indian and Soviet built types• Latest Crown – Cheetah Helicopter - max cruise speed of 121 km/hr can climb to 1

km in 4 minutes

Page 36: Use of Technology in National Security - Presentation
Page 37: Use of Technology in National Security - Presentation

NLOS Combat Technology today has made it possible

to eliminate OP FOR without even seeing them.

NLOS weapons are making their presence felt in all theaters of combat.

The Navy extensively uses SONAR based platforms for navigation and offense.

The ARMY has a myriad of Surface to Air and Surface to Surface armaments.

NLOS-C Canon BrahMOS missiles

But the effectiveness of NLOS weapons is most evident in air combat.

Page 38: Use of Technology in National Security - Presentation

Smart Missiles and Bombs In the early days of aerial combat, the two

pilots would pit their machines into long and turning 'dogfights'

Today a pilot can engage and eliminate OP-FOR even before he can see him. This is called BVR combat.

The major types of 'Smart Missiles':

Infra-Red: AIM-8 Sidewinder [Vietnam]

Radar: AGM-88 HARM [Gulf]

Laser: Armement Air-Sol Modulaire (AASM) [NATO peacekeeping]

The main types of guidance system used in 'Smart bombs' are:

GPS: Joint Direct Attack Munition (JDAM) [Afghanistan]

Parameter Sensing: GB-28 "Bunker-buster" [Iraq]

Page 39: Use of Technology in National Security - Presentation

Reconnaissance One of the most important roles of

the air-force is intelligence gathering and RECON.

Technology has made great advancements in RECON and INTEL gathering.

Specialized Recon planes with inboard super computers can rapidly scan the battlefield and send the gathered information to a central information network.

E-3 Sentry airborne warning and control system (AWACS)

RQ-4 Global Hawk UAV

Page 40: Use of Technology in National Security - Presentation

Airframe Modern combat planes integrate a wide

array of technologies.

Autonomously Detect Threats Target Eliminate

Only need human confirmation.

Fifth Generation Fighters Medium Combat Aircraft Sukhoi/HAL FGFA MiG 35 LMFS Sukhoi Su-47 'Firkin' Lockheed Martin X-35

Page 41: Use of Technology in National Security - Presentation

F-35 LightningLockheed Martin F-35 Lightning II

Cockpit: The F-35 features a full-panel-width "panoramic cockpit display" (PCD), and a cockpit speech-recognition system.

Sensors: AN/APG-81 AESA-radar Electro-Optical Targeting System (EOTS) Infra-Red distributed aperture system (DAS) Multifunction Advanced Data Link (MADL).

Fly by Wire: "Maneuvering is irrelevant"

Radio frequency and infrared situational awareness (SAIRST) to track all nearby aircraft continually

The pilot's helmet-mounted display system (HMDS) to display and select targets and High Off-Boresight (HOBS) weapons to eliminate them.

Page 42: Use of Technology in National Security - Presentation

“I come bearing an olive branch in one hand, and the freedom fighter's gun in the other. Do not let the olive

branch fall from my hand.”

Yasser Arafat