1 / 12

Air Force ISR Reach Back Distributed Common Ground Systems

Air Force ISR Reach Back Distributed Common Ground Systems. Col Mike Shortsleeve Commander 497 th Intelligence, Surveillance and Reconnaissance Group (DGS-1). A Lesson From The Great One. J.D. Cuban Getty Images. Intelligence, Surveillance and Reconnaissance.

amalie
Download Presentation

Air Force ISR Reach Back Distributed Common Ground Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Air Force ISR Reach Back Distributed Common Ground Systems Col Mike Shortsleeve Commander 497th Intelligence, Surveillance and Reconnaissance Group (DGS-1)

  2. A Lesson From The Great One J.D. Cuban Getty Images

  3. Intelligence, Surveillance and Reconnaissance …in today’s world, intelligence is…the single most effective weapon in our national security arsenal…The intelligence we collect, analyze and deliver to policymakers, diplomats, law enforcement and military commanders is the basis for decision and action every day. General (Ret) Michael V. Hayden Former DIRNSA, Deputy DNI, DCI

  4. Air Force Distributed Common Ground Systems (DCGS) Executing 24/7, 365 day, ISR Ops for Component and Combatant Commanders Providing Actionable ISR Across Multiple Operations

  5. AF DCGS Operations HOW WHO WHAT Predictive Analytical Reporting DCGS ISRCAPABILITIES Fusion 1st Phase and Multi-Int Exploitation Target Development C2 & Collaboration Positive Identification ISR COLLECTORS… I & W BDA Pattern of Life Initial Prep of Environment EO / IR / SAR / FMV / SIGINT Time Sensitive Targeting FUSED WITH… Persistent Surveillance Tipping/Cueing other ISR Assets Infrastructure Precision Geo-Location

  6. AF DCGS Collaborative Enterprise Regionally Focused, Globally Networked ISR Ops Provide Higher Confidence Reporting to Warfighters and 1st Responders

  7. AF DCGS Mission Set Air Force DCGS Airmen are the Eyes and Ears for Our Deployed Forces • AF DCGS Airmen Facing Unique Moral, Ethical, Psychological and Physiological Challenges Daily

  8. Moving AF DCGS Data Ability to Store and Move AF DCGS Data is Absolutely Critical to Warfighting

  9. Growth in Mission/Data • Massive Growth in ISR • Manned ISR grew 1,901% • Unmanned ISR grew 6,811% • Exploitation requirements growth • 3 msns per day (2001) to 75+ msns (today) • Data processing rates • 255 Terabytes per month (2001) • 1.28 Petabytes per month (2012) • Analysis & exploitation tools need to keep pace with sensor development and deployment Leveraging Advances in Technology Vice Increasing ISR Personnel

  10. Real World Comparisons The Enterprise in One Day: = 7+ Terabytes of motion imagery/day 1600 hours of video/day 2 seasons worth of NFL game video At DGS-1: = 1,000 miles of fiber throughout the building 8,000 iPad 2s (16GB) 139 Servers / 125 Terabytes

  11. Beyond Reach Back • USAF is taking a holistic approach to developing capabilities that harness information • AF ISR enterprise of the future: • Seamless, open architecture, all-domain, sensor-agnostic “go-to” information source • Areas of focus • Improve communication and architecture • ISR in denied/contested airspace • Development of PED tools Focusing Efforts on Priorities that Best Enable Future ISR Ops

  12. Parting Thoughts • ISR demand growing • Witnessing a rapid evolution of distributed ISR operations • Sensor technology rapidly expanding ISR capacity • Distributed ISR operational concept allows us to project power and create desired effects without projecting vulnerabilities forward

More Related