<

AI-enabled ISR planning and training emulation

Decision-ready ISR staffs without heavyweight simulation overhead.

A secure, human-in-the-loop environment that turns complex mission scenarios into ISR Coordination Cards, confidence tracking, PED/fusion workflows and AAR evidence.

TrainingOperator-gated tabletop emulation for ISR, JISR, fusion and collection-management teams.
PlanningStructured mission rehearsal and staff-product generation for decision-driven ISR workflows.
Operational supportControlled deployment model for human-led mission support under dedicated agreement.

The gap: realistic ISR practice without simulator weight.

Defence organisations need to train and rehearse the staff processes that turn uncertainty into commander-ready decisions. Traditional simulators can be costly, slow to configure and disconnected from the products operators actually need to produce: DSRs, NAIs, asset/PED plans, Coordination Cards, confidence assessments and AAR evidence.

What the environment does

1ScenarioMission context, actors, injects and constraints
2DecisionsCommander decisions, thresholds and risk
3DSRsNAIs, PIRs, indicators and staff actions
4AssetsCollection, PED and fusion allocation
5Coord CardStaff-ready planning product
6CockpitConfidence, injects and staleness tracking
7AAR PackEvidence, gaps and lessons exported

Core modules

Scenario import

Structured exercise or mission context with protected instructor/control material.

Decision mapping

Commander decisions, thresholds, confidence bands, LTIOV and ALoR logic.

DSR builder

NAIs, PIRs, indicators, staff actions, evidence gaps and decision outputs.

Asset and PED planner

Sensor-to-NAI allocation, PED demand, fusion-team assignment and reporting cadence.

Coord Card generator

Mission intent, ISR CONOPS, synchronisation, risks, contracts and checklist.

Confidence Cockpit

Tracked confidence movement, inject feed, staleness warnings and decision posture.

AAR evidence pack

Gate history, confidence shifts, unresolved gaps, audit log and lessons export.

Controller layer

Scenario truth separation, protected facilitation material and student-safe outputs.

Built for training, rehearsal and controlled planning support

Training teams

Run repeatable tabletop and command-post exercises with operator gates, scenario injects, protected instructor material and AAR-ready evidence.

ISR and J2 staffs

Rehearse decision-driven ISR planning, collection management, PED/fusion workflows and commander-ready reporting under time pressure.

Innovation programmes

Demonstrate human-machine teaming, explainable confidence tracking and AI-supported planning without autonomous targeting or unsupervised tasking.

Demonstrated through VALKYRIE and JOSHUA scenario architectures

VALKYRIE demonstrates a NATO-facing peace-operations scenario architecture for JISR, decision thresholds, coalition fusion and Coordination Card production. JOSHUA demonstrates ISR support-to-targeting training with operator gates, DSR generation, confidence tracking and AAR capture.

Human-led by design

The environment supports staff judgement. It does not conduct autonomous targeting, autonomous engagement or unsupervised operational tasking.

Licence pathways

Training Licence

Controlled access for training schools, mobile training teams and exercise-control staffs. Includes approved scenarios, Coord Card outputs, Confidence Cockpit and AAR export.

Planning Licence

For headquarters and ISR planning teams. Supports client scenario import, staff planning products, controlled exports and audit logs.

Operational Support Licence

Dedicated agreement, secure deployment model, data handling terms, role-based access and human decision accountability controls.

Security and IP posture

The capability is delivered through controlled access, not as downloadable source code. The operating model protects methodology, scenario content, templates and outputs while preserving client ownership of authorised operational data.

  • Role-based login and tenant separation
  • Server-side generation logic
  • Watermarked exports
  • Audit logs for imports, edits and exports
  • Protected instructor/control material
  • Licence expiry and access revocation
  • No raw prompt or source-code release
  • No autonomous targeting claims

Request a secure demonstration

For defence, government and allied innovation users, the recommended first step is a controlled demonstration using an approved training scenario and non-sensitive data.