Col Shortsleeve - March 2013

Report

Click to edit Master text styles
—
Second level
 Third level
—

Fourth level
2nd Bullet
Air Force ISR Reach Back
Distributed Common Ground Systems
Col Mike Shortsleeve
Commander
497th Intelligence, Surveillance and
Reconnaissance Group (DGS-1)
A Lesson From The Great One

Click to edit Master text styles
—
Second level
 Third level
—

Fourth level
2nd Bullet
J.D. Cuban Getty Images
2
Intelligence, Surveillance
and Reconnaissance
today’s
intelligence
is…the single most effective weapon in
 …in
Click
to editworld,
Master
text styles
our national security arsenal…The intelligence we collect, analyze and
— Second level
deliver to policymakers, diplomats, law enforcement and military
 Third level
commanders
is the basis for decision and action every day.
— Fourth level
General (Ret) Michael V. Hayden
 2nd Bullet
Former DIRNSA, Deputy DNI, DCI
3
Air Force Distributed Common
Ground Systems (DCGS)
Executing 24/7, 365 day, ISR Ops for Component and Combatant Commanders

Click to edit Master text styles
—
Second level
 Third level
—

Fourth level
2nd Bullet
Providing Actionable ISR Across Multiple Operations
AF DCGS Operations
WHO

Click to edit Master text
styles
Predictive
—
Second level
 Third level
—

HOW
WHAT
Fourth level
2nd Bullet
Analytical
Reporting
Target
Development
Positive
Identification
I&W
DCGS ISR CAPABILITIES
C2 &
Collaboration
1st Phase
and Multi-Int
Exploitation
Fusion
ISR COLLECTORS…
BDA
Pattern of Life
Initial Prep of
Environment
Time Sensitive
Targeting
Persistent
Surveillance
Tipping/Cueing
other ISR Assets
Infrastructure
Precision
Geo-Location
EO / IR / SAR / FMV / SIGINT
FUSED WITH…
AF DCGS Collaborative Enterprise

Regionally
Focused,
Globally Networked ISR Ops
Click
to edit Master
text styles
—
Second level
 Third level
—

Fourth level
2nd Bullet
Provide Higher Confidence Reporting to Warfighters and 1st Responders
6
AF DCGS Mission Set

Air Force DCGS Airmen are the Eyes and Ears
Click to edit Master text styles
for Our Deployed Forces
—
Second level
 Third level
—

Fourth level
2nd Bullet
AF DCGS Airmen Facing Unique Moral, Ethical, Psychological
and Physiological Challenges Daily
7
Moving AF DCGS Data

Click to edit Master text styles
—
Second level
 Third level
—

Fourth level
2nd Bullet
Ability to Store and Move AF DCGS Data is Absolutely Critical to Warfighting
8
Growth in Mission/Data

Click to edit
Massive
Growth
Master
in ISR
text styles
—
Manned level
Second
ISR grew 1,901%
— Unmanned
 Third level
ISR grew 6,811%

— Fourth level
Exploitation
requirements growth
2nd
— 3 Bullet
msns per day (2001) to 75+ msns (today)

Data processing rates

—
255 Terabytes per month (2001)
— 1.28 Petabytes per month (2012)

Analysis & exploitation tools need
to keep pace with sensor development
and deployment
Leveraging Advances in Technology Vice Increasing ISR Personnel9
Real World Comparisons

The Enterprise in One Day:
Click to edit Master text styles
—
Second level
 Third level
—

=
Fourth level
2nd Bullet
7+ Terabytes of motion
imagery/day
1600 hours of video/day
2 seasons worth of
NFL game video
At DGS-1:
=
1,000 miles of fiber
throughout the building
139 Servers / 125 Terabytes
8,000 iPad 2s (16GB)
Beyond Reach Back

USAFto
Click
is edit
taking
Master
a holistic
text styles
approach to
developing
capabilities that harness
— Second level
information
 Third level
—

2nd
Bullet
AF ISR
enterprise of the future:
—

Fourth level
Seamless, open architecture, all-domain,
sensor-agnostic “go-to” information source
Areas of focus
—
—
—
Improve communication and architecture
ISR in denied/contested airspace
Development of PED tools
Focusing Efforts on Priorities that Best Enable Future ISR Ops
11
Parting Thoughts

Click to edit Master text styles
—
Second level
 Third level
—

Fourth level
2nd Bullet

ISR demand growing

Witnessing a rapid evolution
of distributed ISR operations

Sensor technology rapidly
expanding ISR capacity

Distributed ISR operational
concept allows us to project
power and create desired
effects without projecting
vulnerabilities forward
12

similar documents