The Future Airman Is A Hacker

Forget the flight suit. The ideal airman of the future has serious tech chops in programming, signals intelligence, or some other core technological capability and isn’t afraid to break things. The Air Force is looking to begin recruiting more intensively for these core competencies, in anticipation of the ways artificial intelligence will change the nature of air war.

“At what point do we give airmen credit for things that they’ve already done or expertise that they may already have — instead of a recruitment system that is focused on, ‘We have to fill certain skill sets’?” Chief Master Sgt. Mark Allen, the service’s senior enlisted adviser for intelligence, surveillance and reconnaissance, said at an Air Force Association event last Thursday. “If I have an airman coming in that has a computer engineering degree, or has machine language capability, or has some other type of experience, we have to make sure that we are identifying that and that we are purposely placing that airman in something where we can benefit off of that.”

Allen added that recruiters were also increasingly looking for language proficiency and cryptography skills.

He said that re-examination will go both ways. As the Air Force looks to recruit programmers, they’ll also do more continuous evaluation on current airmen, to make sure that the fit is still good. You might read that to mean that they will work to ensure that some people already in key spots are keeping up with best practices and new technologies. “There are certain career fields that we bring in where there are only one or two tests that kind of give us a baseline assessment,” he said. “Those are all pretty old now. We have to look at how we modernize that.”

That’s all linked to how the Air Force expects artificial intelligence to change core aspects of intelligence and reconnaissance. For instance, airmen traditionally spend a lot of time on processing, exploitation, and dissemination, or PED. Those tasks will increasingly go to machines, said Lt. Gen. VeraLinn “Crash” Jamieson, deputy chief of staff for intelligence, surveillance and reconnaissance.

Jamieson said airmen’s future holds less PED and more SIAS: “sense, identify, attribute, share.”

“What machine intelligence is going to do is remove the airmen from actually identifying objects. What our airmen have to do is critically think, not just code but use a variety of different skill sets,” she said.

A lot of that sensing, attributing, and sharing will happen through innovative use of digital tools and, in many cases, customizing open-source or consumer software.

In a separate recent appearance, Jamieson made the point that she’s not exactly looking for industry to hand the service neat new software suites and gadgets for airmen. Rather, she wants to harness good ideas and solutions that are emerging from the ranks. Industry can play a collaborative role or they can get the hell out of the way.

“We’ve met airmen who have coded and developed tools to streamline collection between various platforms,” said Jamieson. “Airmen at the 480th ISR wing realized that the software in their favorite video game… allowed for coordination between approximately 55 users in real time. The software that they were using could be used for training. We have a weapons system, a [distributed common ground weapon system] and we have no trainer for that weapons system… The weapons system is called the Sentinel. These airmen went, ‘Oh my gosh, this video game could be used to train us.’ The team built their own version called Sentinel Sim with a handful of computers and $60 worth of additional expenses. If we had put that out [with a formal call to industry] it probably would have cost millions to institutionalize,” she said. (She declined to name the game that the airmen built Sentinel Sim out of, citing potential copyright issues.)

“This is what I’m talking about when I say we have to have a paradigm shift,” she told the largely industry crowd. “We want them to solve their problems but we want them to partner with all of you in doing so.”

Defense One:

You Might Also Read:

What Does The US Air Force Want From AI?

« How Hackers Target Critical Infrastructure
Cybersecurity Professionals Enticed By The Dark Side »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ECSC Group

ECSC Group

ECSC is a full-service information security provider, specialising in 24/7/365 security breach detection and Artificial Intelligence (AI).

CyberPoint

CyberPoint

CyberPoint delivers innovative, leading-edge cyber security products, solutions, and services to customers worldwide.

CNA Insurance

CNA Insurance

CNA offers a market-leading suite of cyber liability insurance products and risk control resources for businesses of all sizes.

International Cybersecurity Institute (ICSI)

International Cybersecurity Institute (ICSI)

ICSI is a UK company offering specialized and accredited professional qualifications in cybersecurity for young IT graduates as well as mature professionals.

US Cyber Range

US Cyber Range

US Cyber Range is a scalable, cloud-hosted infrastructure providing students with virtual environments for realistic, hands-on cybersecurity labs and exercises.

CyberCX

CyberCX

CyberCX provides services from strategic consulting, security testing and training to world-class managed services and engineering solutions.

Duality Technologies

Duality Technologies

Duality Technologies combine Advanced Cryptography with Data Science to deliver High-Performance Privacy-Protecting Computing to Regulated Industries.

Towerwall

Towerwall

Towerwall offers a comprehensive suite of security services and solutions using best-of-breed tools and information security services.

Anxinsec

Anxinsec

Anxinsec Technology is a security solution and service provider with a focus on new technology and innovations in cybersecurity.

Somerville

Somerville

Somerville are a full service IT partner with over 40 years experience delivering exceptional service and value to our customers.

Box

Box

Box is the Cloud Content Management company that empowers enterprises to revolutionize how they work by securely connecting their people, information and applications.

ConvergePoint

ConvergePoint

ConvergePoint is the leading compliance software provider on the Microsoft Office 365 SharePoint platform.

Zafran

Zafran

Zafran is a Risk & Mitigation Platform that defuses threat exploitation by mobilizing existing security tools.

IDCARE

IDCARE

IDCARE is Australia and New Zealand’s national identity & cyber support service. Our service is the only one of its type in the world.

Velstadt Cybersecurity

Velstadt Cybersecurity

Velstadt's team of experienced professionals works on identifying vulnerabilities, analyzing threats, and developing strategies to ensure the highest level of security.

Seers

Seers

Seers is the world’s leading privacy & consent management platform for companies worldwide. Trusted by over 50,000+ businesses.