Cyber keeps the F-22 safe and sexy
The Air Force is working closely with industry partners to strengthen cybersecurity for larger service platforms such as an F-22 or F-35 fighters.
“We have to understand that today’s weapons systems are not operating in isolation. They are operating as part of a netted enterprise. Each weapons system will interface with a broader DOD network,” Allan Ballenger, vice president of the Air Force division at Engility Corp, told Scout Warrior.
Engility was recently awarded a $31 million task order deal from the Air Force Life Cycle Management Center, at Hanscom AFB, Mass.
The F-22, often referred to by Air Force developers as an “aerial quarterback,” relies upon data link technology connecting to other aircraft and ground stations as more of the F-22’s technologies and avionics–such as radar warning receivers, mission data files, navigation and target mapping systems–are computer based.
The emerging F-35’s “sensor fusion” is entirely contingent upon modernized computer algorithms able to help gather, organize and present combat-relevant information to a pilot by synthesizing otherwise disparate data such as targeting, mapping and sensor data onto a single screen.
“The real focus is on the cyber vulnerability assessments across many Air Force platforms, such as command-and-control and battle management systems,” Ballenger said.
Engility’s focus is closely aligned with cybersecurity priorities recently articulated by senior Air Force leaders.
Air Force Chief Information Security Officer, Peter Kim, recently told Scout Warrior that the service was vigorously invovled in expanding cyber security beyond IT to inlcude larger platforms.
Gen. Ellen Pawlikowski, Commander of Air Force Material Command, has articulated seven lines of attack that are essential to better securing networks, data and command-and-control systems. One of the key intiatives informing this effort is an attempt to “bake-in” cyber security provisions into the earliest phases of weapons development.
Part of the focus, Ballenger explained, is to examine trends and current security controls with a mind to the kinds of attacks likely to emerge in the future against IT systems, platforms and networked weapons.
While increased interoperability among networks, weapons and platforms vastly expedites combat efficacy in a wide range of scenarios, Ballenger emphasized that greater connectivity can also increase vulnerability to malicious penetration and server attacks, among other problems.
“We are looking much earlier in the life cycle of these systems with a concern not just about their security but how they interface with other elements of the network. We want to embed cybersecurity earlier in the process,” Ballenger added.
Seeking to emulate threat vectors and anticipate potential methods of attack — such as how a web-based application could be exploited or the extent to which a trap door may interact with other elements – is an important ingredient in establishing the most effective security protocols.
Also, much of this begins and ends with network IP protocol–codes which can both further enable interoperability between networks and systems while also possibly exposing networks to additional vulnerabilities
“When you have an IP address that is assigned to you, you need to have the appropriate controls in place to reduce that vulnerability,” Ballenger added.
The need for better information security extends from larger systems down to an individual soldier or airmen on a particular combat mission. Tactical Air Controllers are an instance cited where ground targeting technology is used to identify and secure targets for nearby air assets. This kind of air-ground synergy is itself reliant upon computer networking technologies, he explained.“You do not want someone to manipulate data going from airmen on the ground to a shooter in the air,” Ballenger said.
F-22 and Air Superiority
As a fifth-generation stealth fighter, the F-22 is specifically engineered for air supremacy and air dominance missions, meaning its radar-evading technology is designed to elude and destroy enemy air defenses. The aircraft is also configured to function as the world’s premier air-to-air fighter able to “dogfight” and readily destroy enemy aircraft.
“Air superiority, using stealth characteristics is our primary role. The air dominance mission is what we will always do first. Once we are comfortable operating in that battlespace, our airmen are going to find ways to contribute,” Col. Larry Broadwell, the Commander of the 1st Operations Group at Joint Base Langley-Eustis, Virginia, told Scout Warrior in a special pilot interview last year.
The F-22’s command and control sensors and avionics help other coalition aircraft identify and destroy targets. While some of the aircraft’s technologies are not “publically discussable,” Broadwell did say that the F-22’s active and passive sensors allow it to function as an “aerial quarterback” allowing the mission to unfold.
Drawing upon information from a ground-based command and control center or nearby surveillance plane – such as a Joint Surveillance and Target Attack Radar System – the F-22 can receive information or target coordinates from nearby drones, Broadwell explained.
At the moment, targeting information from drones is relayed from the ground station back up to an F-22. However, computer algorithms and technology is fast evolving such that aircraft like an F-22s will soon be able to quickly view drone video feeds in the cockpit without needing a ground station — and eventually be able to control nearby drones from the air. These developments were highlighted in a special Scout Warrior interview with Air Force Chief Scientist Greg Zacharias last year.
Zacharias explained that fifth generation fighters such as the F-35 and F-22 are quickly approaching an ability to command-and-control nearby drones from the air. This would allow unmanned systems to deliver payload, test enemy air defenses and potentially extend the reach of ISR misisons.
“Because of its sensors, the F-22 is uniquely able to improve the battlefield awareness – not just for airborne F-22s but the other platforms that are airborne as well,” he said. The Raptor has an F-22-specific data link to share information with other F-22s and also has the ability to use a known data link called LINK 16 which enables it to communicate with other aircraft in the coalition, Broadwell explained in an interview last year.
Newer F-22s have a technology called Synthetic Aperture Radar, or SAR, which uses electromagnetic signals or “pings” to deliver a picture or rendering of the terrain below, allow for better target identification.
The SAR technology sends a ping to the ground and then analyzes the return signal to calculate the contours, distance and characteristics of the ground below.
“The addition of SAR mapping has certainly enhanced our air-to-ground capability. Previously, we would have to take off with pre-determined target coordinates. Now, we have an ability to more dynamically use the SAR to pinpoint a target while airborne,” Broadwell added.
“The F-35 is needed because it is to global precision attack what the F-22 is to air superiority,” he added. “These two aircrafts were built to work together in concert. It is unfortunate that we have so few F-22s. We are going to ask the F-35 to contribute to the air superiority mission,” he said.
The F-22 is known for a range of technologies including an ability called “super cruise” which enables the fighter to reach speeds of Mach 1.5 without needing to turn on its after burners.
“The F-22 engines produce more thrust than any current fighter engine. The combination of sleek aerodynamic design and increased thrust allows the F-22 to cruise at supersonic airspeeds. Super Cruise greatly expands the F-22’s operating envelope in both speed and range over current fighters, which must use fuel-consuming afterburner to operate at supersonic speeds,” Broadwell explained.
The fighter jet fires a 20mm cannon and has the ability to carry and fire all the air-to-air and air-to-ground weapons including precision-guided ground bombs, such Joint Direct Attack Munitions called the GBU 32 and GBU 39, Broadwell explained. In the air-to-air configuration the Raptor carries six AIM-120 AMRAAMs and two AIM-9 Sidewinders, he added.
“The F-22 possesses a sophisticated sensor suite allowing the pilot to track, identify, shoot and kill air-to-air threats before being detected. Significant advances in cockpit design and sensor fusion improve the pilot’s situational awareness,” he said.
It also uses what’s called a radar-warning receiver – a technology which uses an updateable data base called “mission data files” to recognize a wide-range of enemy fighters, Broadwell said.
Made by Lockheed Martin and Boeing, the F-22 uses two Pratt & Whitney F119-PW-100 turbofan engines with afterburners and two-dimensional thrust vectoring nozzles, an Air Force statement said. It is 16-feet tall, 62-feet long and weighs 43,340 pounds. Its maximum take-off weight is 83,500.
The aircraft was first introduced in December of 2005, and each plane costs $143 million, Air Force statements say.
“Its greatest asset is the ability to target attack and kill an enemy without the enemy ever being aware they are there,” Broadwell added.
The Air Force’s stealthy F-22 Raptor fighter jet delivered some of the first strikes in the U.S.-led attacks on the Islamic State in Iraq and Syria, when aerial bombing began in 2014, service officials told Scout Warrior.
After delivering some of the first strikes in the U.S. Coalition-led military action against ISIS, the F-22 began to shift its focus from an air-dominance mission to one more focused on supporting attacks on the ground.
“An F-22 squadron led the first strike in OIR (Operation Inherent Resolve). The aircraft made historic contributions in the air-to-ground regime,”
Even though ISIS does not have sophisticated air defenses or fighter jets of their own to challenge the F-22, there are still impactful ways in which the F-22 continues to greatly help the ongoing attacks, Broadwell said.
“There are no issues with the air superiority mission. That is the first thing they focus on. After that, they can transition to what they have been doing over the last several months and that has been figuring out innovative ways to contribute in the air-to-ground regime to support the coalition,” Broadwell said.
Follow @warrior_mag on Twitter .
This is what Iran will do if the US pulls out of the nuke deal
President Trump is threatening to back out of the Iran nuclear deal — in direct opposition of the other five countries involved. Here is what Iran thinks.
5 military movies you should look out for in 2018
These are some of the handful of military-related movies hitting the screens next year that look like they could be worth the price of admission.
Why Hollywood prescribes pot to its veteran characters with PTS
A new Netflix comedy takes a lighthearted look at the growing use of medical marijuana to treat veterans who suffer from post-traumatic stress.
Does this picture show the US covertly moving SEALs into Korea?
The USS Michigan stopped in Busan for a "routine port visit," but pictures of the event suggest a more clandestine purpose that may involve US Navy SEALs.
How ISIS became a 'pathetic and a lost cause' after the fall of Raqqa
Special presidential envoy for the Global Coalition to Defeat ISIS, Brett McGurk tweeted photos of a mass ISIS surrender.
Here is how the MLRS became a 44-mile sniper
The M31 Guided Unitary Rocket can put 200 pounds of high explosive within 30 feet of its aimpoint. That'll ruin a bad guy's day.
These 10 letters kids sent to deployed troops will make you smile
From moms who drink wine to soldier kitties saying 'meow,' these hilarious letters to troops will warm your heart.
This robotic Kobra bites IEDs and can move an NFL lineman
The life-saving bite of this Kobra isn't its only impressive feature.
This is how a dress code change won us Guadalcanal
At a critical stage in the War of the Pacific, Vice Admiral William "Bull" Halsey returned to action ripping open his dress shirt like a sailor Hulk.