The Future Airman Is A Hacker

Forget the flight suit. The ideal airman of the future has serious tech chops in programming, signals intelligence, or some other core technological capability and isn’t afraid to break things. The Air Force is looking to begin recruiting more intensively for these core competencies, in anticipation of the ways artificial intelligence will change the nature of air war.

“At what point do we give airmen credit for things that they’ve already done or expertise that they may already have — instead of a recruitment system that is focused on, ‘We have to fill certain skill sets’?” Chief Master Sgt. Mark Allen, the service’s senior enlisted adviser for intelligence, surveillance and reconnaissance, said at an Air Force Association event last Thursday. “If I have an airman coming in that has a computer engineering degree, or has machine language capability, or has some other type of experience, we have to make sure that we are identifying that and that we are purposely placing that airman in something where we can benefit off of that.”

Allen added that recruiters were also increasingly looking for language proficiency and cryptography skills.

He said that re-examination will go both ways. As the Air Force looks to recruit programmers, they’ll also do more continuous evaluation on current airmen, to make sure that the fit is still good. You might read that to mean that they will work to ensure that some people already in key spots are keeping up with best practices and new technologies. “There are certain career fields that we bring in where there are only one or two tests that kind of give us a baseline assessment,” he said. “Those are all pretty old now. We have to look at how we modernize that.”

That’s all linked to how the Air Force expects artificial intelligence to change core aspects of intelligence and reconnaissance. For instance, airmen traditionally spend a lot of time on processing, exploitation, and dissemination, or PED. Those tasks will increasingly go to machines, said Lt. Gen. VeraLinn “Crash” Jamieson, deputy chief of staff for intelligence, surveillance and reconnaissance.

Jamieson said airmen’s future holds less PED and more SIAS: “sense, identify, attribute, share.”

“What machine intelligence is going to do is remove the airmen from actually identifying objects. What our airmen have to do is critically think, not just code but use a variety of different skill sets,” she said.

A lot of that sensing, attributing, and sharing will happen through innovative use of digital tools and, in many cases, customizing open-source or consumer software.

In a separate recent appearance, Jamieson made the point that she’s not exactly looking for industry to hand the service neat new software suites and gadgets for airmen. Rather, she wants to harness good ideas and solutions that are emerging from the ranks. Industry can play a collaborative role or they can get the hell out of the way.

“We’ve met airmen who have coded and developed tools to streamline collection between various platforms,” said Jamieson. “Airmen at the 480th ISR wing realized that the software in their favorite video game… allowed for coordination between approximately 55 users in real time. The software that they were using could be used for training. We have a weapons system, a [distributed common ground weapon system] and we have no trainer for that weapons system… The weapons system is called the Sentinel. These airmen went, ‘Oh my gosh, this video game could be used to train us.’ The team built their own version called Sentinel Sim with a handful of computers and $60 worth of additional expenses. If we had put that out [with a formal call to industry] it probably would have cost millions to institutionalize,” she said. (She declined to name the game that the airmen built Sentinel Sim out of, citing potential copyright issues.)

“This is what I’m talking about when I say we have to have a paradigm shift,” she told the largely industry crowd. “We want them to solve their problems but we want them to partner with all of you in doing so.”

Defense One:

You Might Also Read:

What Does The US Air Force Want From AI?

« How Hackers Target Critical Infrastructure
Cybersecurity Professionals Enticed By The Dark Side »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Open Networking Foundation (ONF)

Open Networking Foundation (ONF)

The Open Networking Foundation (ONF) is a non-profit operator led consortium driving transformation of network infrastructure and carrier business models.

Bittium

Bittium

Bittium provides proven information security solutions for mobile devices and portable computers.

Automation & Cyber Solutions (ACS)

Automation & Cyber Solutions (ACS)

Automation & Cyber Solutions delivers a range of Industrial Automation and Cyber solutions & services to sectors including Oil & Gas, Chemicals & Petrochemicals, Power and others.

Secure Soft

Secure Soft

Secure Soft are experts in Computer and Information Security with a presence in Peru, Colombia and Ecuador.

CMMI Institute

CMMI Institute

CMMI Institute enables organizations to elevate and benchmark performance across a range of critical business capabilities, including product development, data management and cybersecurity.

Tutamantic

Tutamantic

Tutamantic develops software that reduces security risks and weaknesses during the architectural and design stages.

Yellow Brand Protection

Yellow Brand Protection

Yellow Brand Protection operates 24/7 to protect brands' Intellectual Property (IP) from infringements on all kinds of online distribution channels.

Berkeley Varitronic Systems (BVS)

Berkeley Varitronic Systems (BVS)

Berkeley Varitronics Systems is an engineering think tank delivering custom wireless RF engineering products and solutions including cyber security.

DNX Ventures

DNX Ventures

Based in Silicon Valley and Tokyo, DNX Ventures is an early stage VC for B2B startups in sectors including Cybersecurity.

Raiven Capital

Raiven Capital

Raiven Capital is a global early-stage technology venture capital fund. We focus on founder-led, driven companies on the leading edge of disruption.

Nerds On Site

Nerds On Site

Nerds On Site provide on-site & in-home IT and technical support, managed IT services, and cyber security through our collaborative team of highly-trained IT and Security professionals.

PingSafe

PingSafe

PingSafe is creating the next-generation cloud security platform powered by attackers' intelligence, providing coverage for vulnerabilities that traditional security solutions would otherwise overlook

Flow Security

Flow Security

Enterprises run on data, Flow secures it at runtime. With a runtime-first approach, Flow is a game-changer in the data security space, securing data itself, beyond the infrastructure it resides in.

PDI Technologies

PDI Technologies

PDI Technologies helps convenience retail and petroleum wholesale businesses around the globe increase efficiency and profitability by securely connecting their data and operations.

Odaseva

Odaseva

Odaseva delivers the strongest data security solution for enterprises running on Salesforce, safeguarding confidentiality and integrity of critical business information.

Bell Canada

Bell Canada

Bell is the leading provider of network and communications services for Canadian businesses and the partner for delivering network, IoT, cloud, voice, collaboration and security solutions.