College of Aerospace Doctrine, Research, and Education New & Emerging Technologies IW-270 Overview • Changing Environment • New & Emerging Technologies • Air Force Battle Lab(s) • Conclusion Changing Environment • Accomplish mission • Minimum of injuries and loss of life • Three distinct environments – Earth – Space – Cyberspace • Need for information is driving technology The Future • Data rates increasing exponentially • Knowledge of the universe increasing • Pace is increasing • Cost is staying down • Commercial needs drive technology New & Emerging Technologies • Quantum Computers • Intelligent Software • Virtual Reality • Intelligent Materials • Radiation Weapons • Bio-technology • Human/Computer Interfaces • • • • Mind Control Micro-technology Lasers Millimeter-wave Cameras • Video Insertion • Non-Lethal Weapons Quantum Computers RSA129 1987654321098765432109876543210987654 3210987654321098765432109876543210987 6543210987654321098765432109876543210 987654321098765432 1987654321098765432109876543210987654 3210987654321098765432109876543210987 6543210987654321098765432109876543210 98765432109876543210987654321 Quantum Computers 198765432109876543210987654321098765432109876543210987654321098 765432109876543210987654321098765432119876543210987654321098765 432109876543210987654321098765432109876543210987654321098765432 109876543211987654321098765432109876543210987654321098765432109 876543210987654321098765432109876543210987654321198765432109876 543210987654321098765432109876543210987654321098765432109876543 210987654321098765432119876543210987654321098765432109876543210 987654321098765432109876543210987654321098765432109876543211987 654321098765432109876543210987654321098765432109876543210987654 321098765432109876543210987654321198765432109876543210987654321 098765432109876543210987654321098765432109876543210987654321098 765432119876543210987654321098765432109876543210987654321098765 432109876543210987654321098765432109876543211987654321098765432 109876543210987654321098765432109876543210987654321098765432109 876543210987654321198765432109876543210987654321098765432109876 5432109876543210987654321098765432109876543210987654321 Quantum Computers vs Artificial Intelligence Software Agents/Munitions • • • • Really Smart Weapons Intelligence Collection Indications & Warning Information Overload • Bad Decisions • Loss of valuable information • Too much reliance • Lack of bandwidth Virtual Reality • Unlimited training scenarios • Almost realistic • Increase readiness • Lower cost • Safer • Environmentally friendly • Still not reality Intelligent Materials • Battle damage repair • Equipment inspection • Camouflage • May lose desirable characteristics (stealth) • Susceptible to other threats Radiation Weapons High Energy Radio Frequency (HERF) Gun Radiation Weapons • Little or no loss of life • No physical collateral damage • We use electronic devices too • Distinguishing between targets • Collateral effects Bio-technology • Give the human • Susceptible to other body more capability threats – Stronger • Expensive – Faster • Maintenance – Better eyesight – Better hearing Human/Computer Interfaces • Eliminate interfaces • Faster reaction times • Increase productivity • Susceptible to other threats Mind Control • Bloodless battles • Affect friendly or neutral population • Used for malicious purposes Micro-technology • • • • • • • Reconnaissance Surveillance Tagging Targeting Communications Weapon system Security • Communication links • Power limitations • Denial of service Lasers • • • • • • • • • Retinal displays • Widely proliferated Weapons Communications Rangefinder Designator Chem/Bio agent detection EO/IR countermeasures Laser radar Laser propulsion Millimeter-wave Cameras • Situational awareness • 24-hour coverage of the battlefield • Better view of the enemy • Situational awareness • 24-hour coverage of the battlefield • Better view of the enemy Video Insertion • Alter enemy’s broadcasts • Deception • Public perception • What’s real? What’s not? Non-Lethal Weapons • Little or no loss of life • No physical collateral damage • Distinguishing between targets • Collateral effects Air Force Battle Labs AEFB Mt Home, ID UAVB SB Eglin, FL Schriever, CO C2B Hurlburt, FL FPB Lackland, TX IWB Kelly, TX • Small groups--focused on operational and tactical issues IW BL Mission MAJCOMs NAFs Ops Units Customers Information Rapid Global Superiority Global Mobility Attack Air & Space Precision Air and Space Power Engagement Superiority Agile Combat Support PSYOP Deception Destruction EW Security Info Attack IW Disciplines Industry MAJCOMs Doctrine Ctr Battlelabs Ops Units Suppliers What the IWB IS: A capability for innovations in IW to be rapidly discovered, developed, and/or demonstrated through warfighter interaction with new tactics, techniques, procedures and technologies that may affect AF doctrine and strategy; focused at operational and tactical levels of war. O B J E C T I V E S • • • • • Enable operator feedback Accelerate fielding of IW advancements and technologies Select “best of breed” concepts and capabilities Exploit opportunities for technology insertion Propose new capabilities, architectures, tactics and doctrine Principal Customers: AF Warfighters -- MAJCOMs, NAFs, IW Flights, Network Control Centers, and Doctrine Center IW Data Support for Remote Users (IW Reachback) • Connect remote users with SCI data using existing low-cost satellite relay • Army incorporated system into Miniature Data Acquisition System (MIDAS) • Electronic System Center evolved system into S-band Tactical Automated Receive terminal (STAR) • Migrated into the Tactical Data Processing System (TDPS) Sensor Guard • Secret and SCI level intelligence reachback capability for globally deployed force protect units via existing networks • Electronic mail, message traffic, voice connectivity • Standard office automation software and hardware IW Visualization & Integration IW Visualization & Integration Platform (Cyberwarrior) Impact – Increase situational awareness for AOC CC – Rapidly Identify IW opportunities – Determine most efficient use of assets – Protect most critical friendly nodes Network Attack Visualization STATUS Aalborg University (Denmark) Spangdahlem AB Bitburg AB RAMSTEIN AB Elmendorf University of Toronto LO CA TIO N PRO FILE LOCATION PROFILE DATA Cannon Robins ADMIN LAN PRO BE (e) RSCAN CA MS CAMS PRO BE (e) ELMEN D O RF A F B ELMENDORF AFB SA TA N v .2 ASIM v.2 CA MS PRO BE (e) LA N G LEY A FB SA TA N v .2 CA MS PRO BE (e) M.H O ME A FB SA TA N v .2 UNK PRO BE (e) RO BIN S A FB CO P S COPS W CCS PRO BE (e) SH A W A F B SA TA N v .2 CA MS PRO BE (e) SPANGDAHLEM AB A SP A N G D A H LEM A FB CO P S PERS O N N EL D B PRO BE (e) TRA V IS A FB SA TA N v .2 CA MS PRO BE (i) CANNON AFB ASIM v.2 ASIM v.2 Tyndall SHAW AFB TRAVIS AFB Shaw STATUS A D MIN LA N ROBINS AFB Travis STA TU S ASIM v.2 RS CA N M.HOME AFB Langley ASSESSED TARGET SA TA N v .2 CA N N O N A F B LANGLEY AFB Mountain Home A SS ESS ED TA RG ET BI TBU RG A F B RAMSTEIN AB AB RAMSTEIN SH O W SHOW ASIM v.2 B COPS ASIM v.2 A LL ALL CAMS CAMS UNK WCCS CAMS PERSONNEL DB CAMS PRO BES PROBES PROBE (e) PROBE (e) PROBE (e) PROBE (e) PROBE (e) PROBE (e) PROBE (e) DATA PROBE (e) PROBE (i) A TTA CK S ATTACKS Electronic Point of Origin (EPO) Abnormal Activity (10) Standard Operation(1) CDS ASIM Monitoring Screen huge amounts of data Correlate similar information Discover similarities between events Easy viewing techniques Advanced analysis visually depicted SPIRE or STARLIGHT Data Visualization Network Attack Visualization Network Early Warning System (NEWS) IMPACT STATUS T = T 0 + 4 8 ho u rs B itb u rg AB RAMSTEIN AB Sp an g d ah lem AB Aalborg University (Denmark) Spangdahlem AB Elmen d o rf Bitburg AB RAMSTEIN AB University of Toronto Mountain Home Langley Cannon Robins Shaw Ty ndall L OCAT ION LOCATION RAMSTEIN AB AB RAMSTEIN CANNON AFBAFB E L ME NDORF ELMENDORF AFB L ANGL E Y AFB LANGLEY AFB M. HOME AFB M.HOMEAFB AFB ROBINS ROBINS AFB SHAW AFB SHAW AFB E M AFB SPANGDAHL SPANGDAHLEM AB A T RAVIS AFB TRAVIS AFB B PROFIL E PROFILE ASIM v.2 RSCAN SAT AN v. 2 ASIM v.2 SAT AN v. 2 ASIM v.2 SAT AN v. 2 ASIM v.2 COPS COPS SAT AN v. 2 ASIM v.2 COPS COPS SAT AN v. 2 ASIM v.2 BIT BURG AFB SAT AN v. 2 CANNON AFB RSCAN ASSE SSE D T ARGE T ASSESSED TARGET ADMIN L AN ADMIN LAN CAMS CAMS CAMS CAMS CAMS CAMS UNK UNK W CCS WCCS CAMS CAMS PE RSONNE L DB PERSONNEL DB CAMS CAMS Mo u n tain Ho me (3 6 6 th W in g ) ST AT US STATUS PROBE (e) PROBE (e (e)) PROBE PROBE (e (e)) PROBE PROBE (e (e)) PROBE PROBE (e (e)) PROBE PROBE (e (e)) PROBE PROBE (e (e)) PROBE PROBE(i(e) PROBE ) PROBE (i) PROBE (e ) PROBE (e ) SHOW AL L PROBE S AT T ACKS SHOW ALL PROBES ATTACKS Trav is Lan g ley C an n o n R o b in s Sh aw Ty n d all Electronic P oint of Origin (EP O) Abnormal Activity (10) Standard Operation(1) Concept Demonstration: Identify unusual network activities at each AF site Determine correlation between unusual events Provide list of indicators of potential IW attacks Impact: Detect onset of a potential IW attack Allow for development of better security measures, intrusion detection methods, and recovery techniques Reconfigurable Electronic Warfare Avionics Parts (REWRAP) Multi purpose re-configurable cards EXPECTED RESULTS: - Increased deployability - Single logistics trail - Fewer types of spares needed - Reduced cost per unit - Possible common use of parts (within a system or systems) Software Agents for OPSEC UNCLASSIFIED Related systems throughout the World UNCLASSIFIED UNCLASSIFIED on UNCLASSIFIED Discussion System A UNCLASSIFIED UNCLASSIFIED UNCLASSIFIED THREAT SYSTEM DISCUSSIONS UNCLASSIFIED UNCLASSIFIED CHAT ROOM UNCLASSIFIED Technology Developments UNCLASSIFIED UNCLASSIFIED System A Developments UNCLASSIFIED UNCLASSIFIED UNCLASSIFIED UNCLASSIFIED Use Intelligent Agents to collect, analyze and correlate web data Identify possible OPSEC problems Continuous monitoring More Concepts • Miniaturized Global Positioning System Jammer – GPS jamming of our adversaries from a low cost, easily deployed and concealed battery-power unit • Signal Analysis Mapping (SAM) – An anomaly prediction system that allows aircrews to better discriminate between threat and non-threat emitters • Voice Optimal Interrogation and Characterization Environment (VOICE) – Rapidly digitize, translate, visualize voice communication collections Experiments • Information Assurance (IA) Tools experiment to synchronize planning and development efforts among CINCs, Services, and Agencies • Participants: – Joint Battle Center – Army, Navy, and AF IW Battlelabs – JIOC – DISA • Benefits: – Identified IA tools for the near term – Described standard IA toolkit for the JTF – Preparation for Expeditionary Force Experiment Future Challenges • • • • Increase Information and System Protection Greater play in Joint Exercises/Experiments Integrate Information Attack functions Seek Opportunities to Make the IO Force More Effective and Lethal • Improve Information Available to Customers • Explore Initiatives With Broader Operational Impact Bottom Line • • • • High-tech tools are readily available We have to stay ahead of our adversaries Information Warfare is not about technology Information Warfare is about exploiting technology “Dominating the information spectrum is as critical to conflict now as occupying the land or controlling the air has been in the past.” Gen Fogleman, AF Chief of Staff