The Future Airman Is A Hacker

Forget the flight suit. The ideal airman of the future has serious tech chops in programming, signals intelligence, or some other core technological capability and isn’t afraid to break things. The Air Force is looking to begin recruiting more intensively for these core competencies, in anticipation of the ways artificial intelligence will change the nature of air war.

“At what point do we give airmen credit for things that they’ve already done or expertise that they may already have — instead of a recruitment system that is focused on, ‘We have to fill certain skill sets’?” Chief Master Sgt. Mark Allen, the service’s senior enlisted adviser for intelligence, surveillance and reconnaissance, said at an Air Force Association event last Thursday. “If I have an airman coming in that has a computer engineering degree, or has machine language capability, or has some other type of experience, we have to make sure that we are identifying that and that we are purposely placing that airman in something where we can benefit off of that.”

Allen added that recruiters were also increasingly looking for language proficiency and cryptography skills.

He said that re-examination will go both ways. As the Air Force looks to recruit programmers, they’ll also do more continuous evaluation on current airmen, to make sure that the fit is still good. You might read that to mean that they will work to ensure that some people already in key spots are keeping up with best practices and new technologies. “There are certain career fields that we bring in where there are only one or two tests that kind of give us a baseline assessment,” he said. “Those are all pretty old now. We have to look at how we modernize that.”

That’s all linked to how the Air Force expects artificial intelligence to change core aspects of intelligence and reconnaissance. For instance, airmen traditionally spend a lot of time on processing, exploitation, and dissemination, or PED. Those tasks will increasingly go to machines, said Lt. Gen. VeraLinn “Crash” Jamieson, deputy chief of staff for intelligence, surveillance and reconnaissance.

Jamieson said airmen’s future holds less PED and more SIAS: “sense, identify, attribute, share.”

“What machine intelligence is going to do is remove the airmen from actually identifying objects. What our airmen have to do is critically think, not just code but use a variety of different skill sets,” she said.

A lot of that sensing, attributing, and sharing will happen through innovative use of digital tools and, in many cases, customizing open-source or consumer software.

In a separate recent appearance, Jamieson made the point that she’s not exactly looking for industry to hand the service neat new software suites and gadgets for airmen. Rather, she wants to harness good ideas and solutions that are emerging from the ranks. Industry can play a collaborative role or they can get the hell out of the way.

“We’ve met airmen who have coded and developed tools to streamline collection between various platforms,” said Jamieson. “Airmen at the 480th ISR wing realized that the software in their favorite video game… allowed for coordination between approximately 55 users in real time. The software that they were using could be used for training. We have a weapons system, a [distributed common ground weapon system] and we have no trainer for that weapons system… The weapons system is called the Sentinel. These airmen went, ‘Oh my gosh, this video game could be used to train us.’ The team built their own version called Sentinel Sim with a handful of computers and $60 worth of additional expenses. If we had put that out [with a formal call to industry] it probably would have cost millions to institutionalize,” she said. (She declined to name the game that the airmen built Sentinel Sim out of, citing potential copyright issues.)

“This is what I’m talking about when I say we have to have a paradigm shift,” she told the largely industry crowd. “We want them to solve their problems but we want them to partner with all of you in doing so.”

Defense One:

You Might Also Read:

What Does The US Air Force Want From AI?

« How Hackers Target Critical Infrastructure
Cybersecurity Professionals Enticed By The Dark Side »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Charlton Networks

Charlton Networks

Charlton Networks provide a complete range of IT infrastructure, network and security solutions aimed at SME companies.

Computer Laboratory - University of Cambridge

Computer Laboratory - University of Cambridge

Computer security has been among the Laboratory’s research interests for many years, along with related topics such as cryptology

Cast Software

Cast Software

CAST is a pioneer in Software Analysis and Measurement (SAM) to capture and quantify the reliability and security of business applications.

US Cyber Command (USCYBERCOM)

US Cyber Command (USCYBERCOM)

USCYBERCOM conducts activities to ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.

Silicon:SAFE

Silicon:SAFE

Silicon:SAFE develops impenetrable hardware solutions that prevent bulk data theft during a cyber-attack.

RedSeal

RedSeal

RedSeal’s network modeling and risk scoring platform is the foundation for enabling enterprise networks to be resilient to cyber events.

BooleBox

BooleBox

BooleBox is the cloud for business data security that allows to share sensitive files by reducing the risk of external attacks or insider theft.

KIOS Center of Excellence (KIOS CoE)

KIOS Center of Excellence (KIOS CoE)

KIOS carries out top level research in the area of Information and Communication Technologies (ICT) with emphasis on the Monitoring, Control and Security of Critical Infrastructures.

e-Lock

e-Lock

e-Lock services include IT security consulting and training, security systems integration, managed security and technical support.

Metrarc

Metrarc

Metrarc has developed a ground-breaking technology called ICMetrics™ for deriving secure encryption keys from the properties of digital systems without the need to store any of the encryption keys.

ISMS Accreditation Center (ISMS-AC)

ISMS Accreditation Center (ISMS-AC)

ISMS-AC is the national accreditation body for Japan. The directory of members provides details of organisations offering certification services for ISO 27001.

Data Security Inc

Data Security Inc

Data Security, Inc. is the leading American manufacturer and supplier of hard drive degaussers, magnetic tape degaussers as well as hard drive and solid state destruction devices.

Tugboat Logic

Tugboat Logic

Tugboat Logic was created to address the skills and expertise gap in the security and compliance industry. Our goal is to simplify and automate information security management for every enterprise.

Cynalytica

Cynalytica

Cynalytica deliver pioneering cybersecurity and machine analytics technologies that help protect critical infrastructure, securely enable Industry 4.0 and help accelerate digital transformation.

TachTech

TachTech

TachTech is passionate about trust, security and privacy in the digital world. We create tailored security and compliance solutions to improve your business.

Automotive Information Sharing & Analysis Center (Auto-ISAC)

Automotive Information Sharing & Analysis Center (Auto-ISAC)

Auto-ISAC provides a forum for companies to analyze and identify threats sooner and share solutions that enhance vehicle cybersecurity.