The Future Airman Is A Hacker

Forget the flight suit. The ideal airman of the future has serious tech chops in programming, signals intelligence, or some other core technological capability and isn’t afraid to break things. The Air Force is looking to begin recruiting more intensively for these core competencies, in anticipation of the ways artificial intelligence will change the nature of air war.

“At what point do we give airmen credit for things that they’ve already done or expertise that they may already have — instead of a recruitment system that is focused on, ‘We have to fill certain skill sets’?” Chief Master Sgt. Mark Allen, the service’s senior enlisted adviser for intelligence, surveillance and reconnaissance, said at an Air Force Association event last Thursday. “If I have an airman coming in that has a computer engineering degree, or has machine language capability, or has some other type of experience, we have to make sure that we are identifying that and that we are purposely placing that airman in something where we can benefit off of that.”

Allen added that recruiters were also increasingly looking for language proficiency and cryptography skills.

He said that re-examination will go both ways. As the Air Force looks to recruit programmers, they’ll also do more continuous evaluation on current airmen, to make sure that the fit is still good. You might read that to mean that they will work to ensure that some people already in key spots are keeping up with best practices and new technologies. “There are certain career fields that we bring in where there are only one or two tests that kind of give us a baseline assessment,” he said. “Those are all pretty old now. We have to look at how we modernize that.”

That’s all linked to how the Air Force expects artificial intelligence to change core aspects of intelligence and reconnaissance. For instance, airmen traditionally spend a lot of time on processing, exploitation, and dissemination, or PED. Those tasks will increasingly go to machines, said Lt. Gen. VeraLinn “Crash” Jamieson, deputy chief of staff for intelligence, surveillance and reconnaissance.

Jamieson said airmen’s future holds less PED and more SIAS: “sense, identify, attribute, share.”

“What machine intelligence is going to do is remove the airmen from actually identifying objects. What our airmen have to do is critically think, not just code but use a variety of different skill sets,” she said.

A lot of that sensing, attributing, and sharing will happen through innovative use of digital tools and, in many cases, customizing open-source or consumer software.

In a separate recent appearance, Jamieson made the point that she’s not exactly looking for industry to hand the service neat new software suites and gadgets for airmen. Rather, she wants to harness good ideas and solutions that are emerging from the ranks. Industry can play a collaborative role or they can get the hell out of the way.

“We’ve met airmen who have coded and developed tools to streamline collection between various platforms,” said Jamieson. “Airmen at the 480th ISR wing realized that the software in their favorite video game… allowed for coordination between approximately 55 users in real time. The software that they were using could be used for training. We have a weapons system, a [distributed common ground weapon system] and we have no trainer for that weapons system… The weapons system is called the Sentinel. These airmen went, ‘Oh my gosh, this video game could be used to train us.’ The team built their own version called Sentinel Sim with a handful of computers and $60 worth of additional expenses. If we had put that out [with a formal call to industry] it probably would have cost millions to institutionalize,” she said. (She declined to name the game that the airmen built Sentinel Sim out of, citing potential copyright issues.)

“This is what I’m talking about when I say we have to have a paradigm shift,” she told the largely industry crowd. “We want them to solve their problems but we want them to partner with all of you in doing so.”

Defense One:

You Might Also Read:

What Does The US Air Force Want From AI?

« How Hackers Target Critical Infrastructure
Cybersecurity Professionals Enticed By The Dark Side »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Security Affairs

Security Affairs

Security Affairs is a blog covering all aspects of cyber security.

CERT.LV

CERT.LV

CERT.LV is the national Computer Emergency Response Team for Latvia.

Subgraph

Subgraph

Subgraph is an open source security company, committed to making secure and usable open source computing available to everyone.

WeSecureApp (WSA)

WeSecureApp (WSA)

WeSecureApp is specialized in providing Cyber Security Solutions to safeguard your applications and networks.

AppTec

AppTec

AppTec is a leading software vendor in the field of Unified Endpoint Management and Mobile Security.

ThirdWatch

ThirdWatch

ThirdWatch is a Data Science company with real-time automated fraud prevention solutions.

National Cybersecurity Society (NCSS) - USA

National Cybersecurity Society (NCSS) - USA

The National Cybersecurity Society is a non-profit organization focused on providing cybersecurity education, awareness and advocacy to small businesses.

CyberSAFE Malaysia

CyberSAFE Malaysia

CyberSAFE Malaysia is an initiative to educate and enhance the awareness of the general public on the technological and social issues and risks facing internet users.

Visium Technologies

Visium Technologies

Visium Analytics provides innovative data visualization, cybersecurity technologies and solutions to businesses to protect and secure their data assets.

Mindsight

Mindsight

Mindsight is a technology consulting firm with expertise from cybersecurity to cloud, disaster recovery to infrastructure, and collaboration to contact center.

British Security Industry Association - CySPAG

British Security Industry Association - CySPAG

CySPAG is a special interest group within the British Security Industry Association (BSIA) focused on reducing the risk of product related cybercrime.

Presidio Identity

Presidio Identity

Presidio Identity offers a digital-native approach that brings security, privacy, and simplicity to user authentication and digital interactions.

Astrill VPN

Astrill VPN

Astrill VPN is a Seychelles based Virtual Private Network(VPN) Company.

Chestnut Hill Technologies (CHT)

Chestnut Hill Technologies (CHT)

CHT provide Best Practices IT Cybersecurity and Technology Solutions and Consulting Support to the Mid Cap through Fortune 1000 Nationwide.

SUCCESS Computer Consulting

SUCCESS Computer Consulting

SUCCESS Computer Consulting is a leader in managed IT and security services for small and medium-sized businesses in Minneapolis, St. Paul, and the surrounding Twin Cities Metro area.

Hive Systems

Hive Systems

Hive Systems specialize in tailored solutions that unify risk assessments, IT, security awareness, and cybersecurity operations for businesses of all sizes.