New & Emerging Technologies IW-270 College of Aerospace

advertisement
College of Aerospace
Doctrine, Research, and
Education
New & Emerging
Technologies
IW-270
Overview
• Changing Environment
• New & Emerging Technologies
• Air Force Battle Lab(s)
• Conclusion
Changing
Environment
• Accomplish mission
• Minimum of injuries and loss of life
• Three distinct environments
– Earth
– Space
– Cyberspace
• Need for information is driving technology
The Future
• Data rates increasing exponentially
• Knowledge of the universe
increasing
• Pace is increasing
• Cost is staying down
• Commercial needs drive technology
New & Emerging
Technologies
• Quantum
Computers
• Intelligent Software
• Virtual Reality
• Intelligent Materials
• Radiation Weapons
• Bio-technology
• Human/Computer
Interfaces
•
•
•
•
Mind Control
Micro-technology
Lasers
Millimeter-wave
Cameras
• Video Insertion
• Non-Lethal
Weapons
Quantum Computers
RSA129
1987654321098765432109876543210987654
3210987654321098765432109876543210987
6543210987654321098765432109876543210
987654321098765432
1987654321098765432109876543210987654
3210987654321098765432109876543210987
6543210987654321098765432109876543210
98765432109876543210987654321
Quantum Computers
198765432109876543210987654321098765432109876543210987654321098
765432109876543210987654321098765432119876543210987654321098765
432109876543210987654321098765432109876543210987654321098765432
109876543211987654321098765432109876543210987654321098765432109
876543210987654321098765432109876543210987654321198765432109876
543210987654321098765432109876543210987654321098765432109876543
210987654321098765432119876543210987654321098765432109876543210
987654321098765432109876543210987654321098765432109876543211987
654321098765432109876543210987654321098765432109876543210987654
321098765432109876543210987654321198765432109876543210987654321
098765432109876543210987654321098765432109876543210987654321098
765432119876543210987654321098765432109876543210987654321098765
432109876543210987654321098765432109876543211987654321098765432
109876543210987654321098765432109876543210987654321098765432109
876543210987654321198765432109876543210987654321098765432109876
5432109876543210987654321098765432109876543210987654321
Quantum Computers
vs
Artificial Intelligence
Software Agents/Munitions
•
•
•
•
Really Smart Weapons
Intelligence Collection
Indications & Warning
Information Overload
• Bad Decisions
• Loss of valuable
information
• Too much reliance
• Lack of bandwidth
Virtual Reality
• Unlimited training
scenarios
• Almost realistic
• Increase readiness
• Lower cost
• Safer
• Environmentally
friendly
• Still not reality
Intelligent Materials
• Battle damage
repair
• Equipment
inspection
• Camouflage
• May lose desirable
characteristics
(stealth)
• Susceptible to other
threats
Radiation Weapons
High Energy Radio Frequency (HERF)
Gun
Radiation Weapons
• Little or no loss of
life
• No physical
collateral damage
• We use electronic
devices too
• Distinguishing
between targets
• Collateral effects
Bio-technology
• Give the human
• Susceptible to other
body more capability
threats
– Stronger
• Expensive
– Faster
• Maintenance
– Better eyesight
– Better hearing
Human/Computer Interfaces
• Eliminate interfaces
• Faster reaction
times
• Increase productivity
• Susceptible to other
threats
Mind Control
• Bloodless battles
• Affect friendly or
neutral population
• Used for malicious
purposes
Micro-technology
•
•
•
•
•
•
•
Reconnaissance
Surveillance
Tagging
Targeting
Communications
Weapon system
Security
• Communication
links
• Power limitations
• Denial of service
Lasers
•
•
•
•
•
•
•
•
•
Retinal displays
• Widely proliferated
Weapons
Communications
Rangefinder
Designator
Chem/Bio agent detection
EO/IR countermeasures
Laser radar
Laser propulsion
Millimeter-wave Cameras
• Situational
awareness
• 24-hour coverage of
the battlefield
• Better view of the
enemy
• Situational
awareness
• 24-hour coverage of
the battlefield
• Better view of the
enemy
Video Insertion
• Alter enemy’s
broadcasts
• Deception
• Public perception
• What’s real? What’s
not?
Non-Lethal Weapons
• Little or no loss of
life
• No physical
collateral damage
• Distinguishing
between targets
• Collateral effects
Air Force Battle Labs
AEFB
Mt Home, ID
UAVB
SB
Eglin, FL
Schriever, CO
C2B
Hurlburt, FL
FPB
Lackland, TX
IWB
Kelly, TX
• Small groups--focused on operational and tactical issues
IW BL Mission
MAJCOMs
NAFs
Ops Units
Customers
Information
Rapid Global Superiority Global
Mobility
Attack
Air & Space
Precision
Air and Space Power
Engagement
Superiority
Agile Combat
Support
PSYOP
Deception
Destruction
EW
Security
Info Attack
IW
Disciplines
Industry
MAJCOMs
Doctrine Ctr
Battlelabs
Ops Units
Suppliers
What the IWB IS:
A capability for innovations in IW to be rapidly discovered,
developed, and/or demonstrated through warfighter interaction
with new tactics, techniques, procedures and technologies that
may affect AF doctrine and strategy; focused at operational and
tactical levels of war.
O
B
J
E
C
T
I
V
E
S
•
•
•
•
•
Enable operator feedback
Accelerate fielding of IW advancements and technologies
Select “best of breed” concepts and capabilities
Exploit opportunities for technology insertion
Propose new capabilities, architectures, tactics and doctrine
Principal Customers: AF Warfighters -- MAJCOMs, NAFs,
IW Flights, Network Control Centers, and Doctrine Center
IW Data Support for Remote Users
(IW Reachback)
• Connect remote users with SCI data
using existing low-cost satellite relay
• Army incorporated system into
Miniature Data Acquisition System
(MIDAS)
• Electronic System Center evolved
system into S-band Tactical
Automated Receive terminal (STAR)
• Migrated into the Tactical Data
Processing System (TDPS)
Sensor Guard
• Secret and SCI level intelligence reachback
capability for globally deployed force protect
units via existing networks
• Electronic mail, message traffic, voice
connectivity
• Standard office automation software and
hardware
IW Visualization & Integration
IW Visualization & Integration Platform
(Cyberwarrior)
 Impact
– Increase situational awareness for AOC CC
– Rapidly Identify IW opportunities
– Determine most efficient use of assets
– Protect most critical friendly nodes
Network Attack
Visualization
STATUS
Aalborg University (Denmark)
Spangdahlem AB
Bitburg AB
RAMSTEIN
AB
Elmendorf
University of Toronto
LO CA TIO N
PRO FILE
LOCATION
PROFILE
DATA
Cannon
Robins
ADMIN LAN
PRO BE (e)
RSCAN
CA MS
CAMS
PRO BE (e)
ELMEN D O RF A F B
ELMENDORF
AFB
SA TA N v .2
ASIM v.2
CA MS
PRO BE (e)
LA N G LEY A FB
SA TA N v .2
CA MS
PRO BE (e)
M.H O ME A FB
SA TA N v .2
UNK
PRO BE (e)
RO BIN S A FB
CO P S
COPS
W CCS
PRO BE (e)
SH A W A F B
SA TA N v .2
CA MS
PRO BE (e)
SPANGDAHLEM AB
A
SP A N G D A H LEM A FB
CO P S
PERS O N N EL D B
PRO BE (e)
TRA V IS A FB
SA TA N v .2
CA MS
PRO BE (i)
CANNON AFB
ASIM v.2
ASIM v.2
Tyndall
SHAW AFB
TRAVIS AFB
Shaw
STATUS
A D MIN LA N
ROBINS AFB
Travis
STA TU S
ASIM v.2
RS CA N
M.HOME AFB
Langley
ASSESSED TARGET
SA TA N v .2
CA N N O N A F B
LANGLEY AFB
Mountain Home
A SS ESS ED TA RG ET
BI TBU RG A F B
RAMSTEIN
AB AB
RAMSTEIN
SH O W
SHOW
ASIM v.2
B
COPS
ASIM v.2
A LL
ALL
CAMS
CAMS
UNK
WCCS
CAMS
PERSONNEL DB
CAMS
PRO BES
PROBES
PROBE (e)
PROBE (e)
PROBE (e)
PROBE (e)
PROBE (e)
PROBE (e)
PROBE (e)
DATA
PROBE (e)
PROBE (i)
A TTA CK S
ATTACKS
Electronic Point of Origin
(EPO)
Abnormal Activity (10)
Standard Operation(1)
CDS
ASIM Monitoring
Screen huge amounts of data
Correlate similar information
Discover similarities between events
Easy viewing techniques
Advanced analysis visually depicted
SPIRE or STARLIGHT
Data Visualization
Network Attack Visualization
Network Early Warning System (NEWS)
IMPACT
STATUS
T = T 0 + 4 8 ho u rs
B itb u rg AB
RAMSTEIN AB
Sp an g d ah lem AB
Aalborg University (Denmark)
Spangdahlem AB
Elmen d o rf
Bitburg AB
RAMSTEIN
AB
University of Toronto
Mountain Home
Langley
Cannon
Robins
Shaw
Ty ndall
L OCAT ION
LOCATION
RAMSTEIN
AB AB
RAMSTEIN
CANNON
AFBAFB
E
L ME NDORF
ELMENDORF
AFB
L
ANGL E Y AFB
LANGLEY
AFB
M.
HOME AFB
M.HOMEAFB
AFB
ROBINS
ROBINS
AFB
SHAW
AFB
SHAW AFB E M AFB
SPANGDAHL
SPANGDAHLEM
AB
A
T
RAVIS AFB
TRAVIS AFB
B
PROFIL E
PROFILE
ASIM v.2
RSCAN
SAT
AN v. 2
ASIM
v.2
SAT
AN
v. 2
ASIM
v.2
SAT
AN
v. 2
ASIM v.2
COPS
COPS
SAT
AN v. 2
ASIM v.2
COPS
COPS
SAT
AN v. 2
ASIM v.2
BIT BURG AFB
SAT AN v. 2
CANNON AFB
RSCAN
ASSE SSE D T ARGE T
ASSESSED
TARGET
ADMIN L AN
ADMIN LAN
CAMS
CAMS
CAMS
CAMS
CAMS
CAMS
UNK
UNK
W
CCS
WCCS
CAMS
CAMS
PE
RSONNE L DB
PERSONNEL DB
CAMS
CAMS
Mo u n tain Ho me (3 6 6 th W in g )
ST AT US
STATUS
PROBE (e)
PROBE (e
(e))
PROBE
PROBE (e
(e))
PROBE
PROBE (e
(e))
PROBE
PROBE (e
(e))
PROBE
PROBE (e
(e))
PROBE
PROBE (e
(e))
PROBE
PROBE(i(e)
PROBE
)
PROBE (i)
PROBE (e )
PROBE (e )
SHOW
AL L
PROBE S
AT T ACKS
SHOW
ALL
PROBES
ATTACKS
Trav is
Lan g ley
C an n o n
R o b in s
Sh aw
Ty n d all
Electronic P oint of Origin
(EP O)
Abnormal Activity (10)
Standard Operation(1)
 Concept Demonstration:
 Identify unusual network activities at each AF site
 Determine correlation between unusual events
 Provide list of indicators of potential IW attacks
 Impact:
 Detect onset of a potential IW attack
 Allow for development of better security measures,
intrusion detection methods, and recovery techniques
Reconfigurable Electronic
Warfare Avionics Parts
(REWRAP)
Multi purpose re-configurable cards
EXPECTED RESULTS:
- Increased deployability
- Single logistics trail
- Fewer types of spares needed
- Reduced cost per unit
- Possible common use of parts (within a system or systems)
Software Agents for OPSEC
UNCLASSIFIED
Related systems
throughout the World
UNCLASSIFIED
UNCLASSIFIED
on
UNCLASSIFIED
Discussion
System A
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
THREAT SYSTEM
DISCUSSIONS
UNCLASSIFIED
UNCLASSIFIED
CHAT ROOM
UNCLASSIFIED
Technology
Developments
UNCLASSIFIED
UNCLASSIFIED
System A Developments
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
 Use Intelligent Agents to collect, analyze and
correlate web data
 Identify possible OPSEC problems
 Continuous monitoring
More Concepts
• Miniaturized Global Positioning System Jammer
– GPS jamming of our adversaries from a low cost,
easily deployed and concealed battery-power unit
• Signal Analysis Mapping (SAM)
– An anomaly prediction system that allows aircrews to
better discriminate between threat and non-threat
emitters
• Voice Optimal Interrogation and Characterization
Environment (VOICE)
– Rapidly digitize, translate, visualize voice
communication collections
Experiments
• Information Assurance (IA) Tools experiment to synchronize
planning and development efforts among CINCs, Services,
and Agencies
• Participants:
– Joint Battle Center
– Army, Navy, and AF IW Battlelabs
– JIOC
– DISA
• Benefits:
– Identified IA tools for the near term
– Described standard IA toolkit for the JTF
– Preparation for Expeditionary Force Experiment
Future Challenges
•
•
•
•
Increase Information and System Protection
Greater play in Joint Exercises/Experiments
Integrate Information Attack functions
Seek Opportunities to Make the IO Force More
Effective and Lethal
• Improve Information Available to Customers
• Explore Initiatives With
Broader Operational Impact
Bottom Line
•
•
•
•
High-tech tools are readily available
We have to stay ahead of our adversaries
Information Warfare is not about technology
Information Warfare is about exploiting
technology
“Dominating the information spectrum is as critical
to conflict now as occupying the land or controlling
the air has been in the past.”
Gen Fogleman, AF Chief of Staff
Download