The Future Airman Is A Hacker

Forget the flight suit. The ideal airman of the future has serious tech chops in programming, signals intelligence, or some other core technological capability and isn’t afraid to break things. The Air Force is looking to begin recruiting more intensively for these core competencies, in anticipation of the ways artificial intelligence will change the nature of air war.

“At what point do we give airmen credit for things that they’ve already done or expertise that they may already have — instead of a recruitment system that is focused on, ‘We have to fill certain skill sets’?” Chief Master Sgt. Mark Allen, the service’s senior enlisted adviser for intelligence, surveillance and reconnaissance, said at an Air Force Association event last Thursday. “If I have an airman coming in that has a computer engineering degree, or has machine language capability, or has some other type of experience, we have to make sure that we are identifying that and that we are purposely placing that airman in something where we can benefit off of that.”

Allen added that recruiters were also increasingly looking for language proficiency and cryptography skills.

He said that re-examination will go both ways. As the Air Force looks to recruit programmers, they’ll also do more continuous evaluation on current airmen, to make sure that the fit is still good. You might read that to mean that they will work to ensure that some people already in key spots are keeping up with best practices and new technologies. “There are certain career fields that we bring in where there are only one or two tests that kind of give us a baseline assessment,” he said. “Those are all pretty old now. We have to look at how we modernize that.”

That’s all linked to how the Air Force expects artificial intelligence to change core aspects of intelligence and reconnaissance. For instance, airmen traditionally spend a lot of time on processing, exploitation, and dissemination, or PED. Those tasks will increasingly go to machines, said Lt. Gen. VeraLinn “Crash” Jamieson, deputy chief of staff for intelligence, surveillance and reconnaissance.

Jamieson said airmen’s future holds less PED and more SIAS: “sense, identify, attribute, share.”

“What machine intelligence is going to do is remove the airmen from actually identifying objects. What our airmen have to do is critically think, not just code but use a variety of different skill sets,” she said.

A lot of that sensing, attributing, and sharing will happen through innovative use of digital tools and, in many cases, customizing open-source or consumer software.

In a separate recent appearance, Jamieson made the point that she’s not exactly looking for industry to hand the service neat new software suites and gadgets for airmen. Rather, she wants to harness good ideas and solutions that are emerging from the ranks. Industry can play a collaborative role or they can get the hell out of the way.

“We’ve met airmen who have coded and developed tools to streamline collection between various platforms,” said Jamieson. “Airmen at the 480th ISR wing realized that the software in their favorite video game… allowed for coordination between approximately 55 users in real time. The software that they were using could be used for training. We have a weapons system, a [distributed common ground weapon system] and we have no trainer for that weapons system… The weapons system is called the Sentinel. These airmen went, ‘Oh my gosh, this video game could be used to train us.’ The team built their own version called Sentinel Sim with a handful of computers and $60 worth of additional expenses. If we had put that out [with a formal call to industry] it probably would have cost millions to institutionalize,” she said. (She declined to name the game that the airmen built Sentinel Sim out of, citing potential copyright issues.)

“This is what I’m talking about when I say we have to have a paradigm shift,” she told the largely industry crowd. “We want them to solve their problems but we want them to partner with all of you in doing so.”

Defense One:

You Might Also Read:

What Does The US Air Force Want From AI?

« How Hackers Target Critical Infrastructure
Cybersecurity Professionals Enticed By The Dark Side »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Pyramid Computer

Pyramid Computer

Pyramid Computer provides custom enterprise solutions for Industrial PC, Imaging, Network, Security, POS, Indoor Positioning and Automation.

Deltagon

Deltagon

Deltagon develops information security solutions to protect companies’ confidential information in e-communication and e-services.

National Association of State Chief Information Officers (NASCIO)

National Association of State Chief Information Officers (NASCIO)

NASCIO's Cybersecurity Committee focuses helps state CIOs to formulate high-level security and data protection policies and technical controls.

Ikarus Security Software

Ikarus Security Software

Ikarus focuses on antivirus and content-security solutions.

Assac Networks

Assac Networks

Assac Networks ShieldIT is an app that completely protects any BYOD smartphone from both tapping and hacking.

Verodin

Verodin

Verodin is a business platform that provides organizations with the evidence needed to measure, manage and improve their cybersecurity effectiveness.

Phosphorous Cybersecurity

Phosphorous Cybersecurity

Phosphorus has fully automated remediation of the two biggest IoT vulnerabilities, out of date firmware and default credentials.

Reed

Reed

reed.co.uk is a leading job site in the UK, providing a full online service for anyone looking for a new job.

Findcourses.com

Findcourses.com

Findcourses is a dedicated education search engine designed to make it easy for our learners to search and find exactly what they need from our community of trusted training providers.

Onfido

Onfido

Onfido is building the new identity standard for the internet. We digitally prove people’s real identities using a photo ID and facial biometrics.

IT-Seal

IT-Seal

IT-Seal GmbH specializes in sustainable security culture and awareness training.

Rimstorm

Rimstorm

Rimstorm’s mission is to significantly improve the security of your data using award-winning, state-of-the-art technology combined with cyber managed security services.

The CyberWire

The CyberWire

The CyberWire gets people up to speed on cyber quickly and keeps them a step ahead in a continually changing industry.

Commvault

Commvault

Commvault's data protection and information management solutions help companies protect, access and use all of their data, anywhere and anytime.

Project Cypher

Project Cypher

Project Cypher leverages the latest cybersecurity developments, a world class team of hackers and constant R&D to provide you with unparalleled cybersecurity offerings.

C5 Technology

C5 Technology

C5 Technology specialises in the provision of networking, security, and infrastructure services to enterprises and government agencies.