Skip to main content

Currently Skimming:

2 Architecture and Data
Pages 36-77

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 36...
... -- Preston Dunlap, Chief Architect, U.S. Department of the Air Force1 ARCHITECTURE OVERVIEW The architecture of the Advanced Battle Management System (ABMS)
From page 37...
... 2  R Walden, 2021, "ABMS Perspectives from the Air Force Rapid Capabilities Office," Presentation to the Air Force ABMS Committee, January 22.
From page 38...
... FINDING 2: An open, modular design is needed to support evolution of ABMS and JADC2. RECOMMENDATION 1: The Department of the Air Force Chief Architect's Office and the Department of the Air Force Rapid Capabilities Office should define the Advanced Battle Management System (ABMS)
From page 39...
... RECOMMENDATION 3: The Department of the Air Force Chief Architect's Office and the Department of the Air Force Rapid Capabilities Office should design the Advanced Battle Management System architecture to be modular and include open standards and interfaces that would enable configuration with other Service variants. The ABMS architecture should include the ability to achieve integrity, avail ability, and confidentiality for all communications, data, and computation across all applications.
From page 40...
... Data and data management; 3. Secure processing that involves both cybersecurity and the ability to transmit and process data across all classifications while allowing broad access to data products; UNCLASSIFIED Advanced Battle Management System Architecture Space Cyber Air Airborne Ground Joint - Sea Joint - Ground Coalition Applications Data Management (DM)
From page 41...
... ;6 • crossDomainONE, which enables the transmission of data across classifica tion levels; • omniaONE, a common operating picture of the all-domain battlefield using multiple feeds merged through a system called fuseONE, which is a cloud based fusion environment; • AI/smartONE, which layers on top of omniaONE and uses artificial intel ligence to cue the user to potentially useful information; • feedONE, cloud-based data feeds from all sources; • commandONE, a battle management command and control system using the Link16e network;7 and • gatewayONE, a communications gateway designed to secure two-way data path across multiple platforms and domains.8 5  W Roper, 2020, "Advanced Battle Management System Management Construct." 6  UDL is "a collection of space objects that integrates data from commercial and government sources." See S
From page 42...
... 11  J Valenzia, 2020, "JADC2 and ABMS," Presentation to the Air Force ABMS Committee, Decem ber 18.
From page 43...
... 13  E Bryant, 2021, "Cybersecurity in JADC2 and Contested Environments," Presentation to the Air Force ABMS Committee, April 16.
From page 44...
... technologies become ever more pervasive and capable, machine-to-machine data sharing -- at scale within accept 18  J.C. Stenbit, 2021, "DoD C3I Perspectives," Presentation to the Air Force ABMS Committee, February 24.
From page 45...
... However, as adversaries rapidly advance their own use of AI/ML, the DoD and the DAF need to implement advanced AI capabilities that would improve C2 and time-sensitive decision-making from the range of tac tical operations to the strategic planning level.21 Implementing a robust machine to-machine data sharing capability will require, at a minimum: • Appropriate placement of data storage and computing to facilitate timely access to -- and availability of -- data to support military operations; • Security and synchronization of data storage; and • Redundancy to support operations in degraded environments and to enable reconstitution; among others. RECOMMENDATION 5: The Department of the Air Force Rapid Capabili ties Office should adopt an array of data-exchange technologies that could support the entire spectrum of capabilities, from tactical to strategic.
From page 46...
... Accordingly, this approach requires massive manpower, is prone to human error, and significantly delays decisions owing to the sheer volume of complex data being communicated.23 To address this deficiency, the DAF Chief Architect and the Air Force Rapid Capabilities Office are using AI as an enabler and have recruited commercial com panies to provide AI/ML-based analytics to transform ABMS's C2 capabilities. They have incorporated AI as part of ABMS's smartONE capability to develop algorithms for sensing and synthesizing data.
From page 47...
... For more on hyperautomation, see IBM Cloud Education, "What Is Hyperautomation? " IBM Cloud Learn Hub, https://www.ibm.com/cloud/learn/hyperautomation, April 15, 2021, and D
From page 48...
... RECOMMENDATION 6: To the maximum extent possible, the Department of the Air Force Chief Architect's Office and the Department of the Air Force Rapid Capabilities Office should design and execute a comprehensive artificial intelligence strategy that would encompass all elements, to include doctrine, chain of command, policy, authorization for weapon release in a joint environment, interfaces to Joint All-Domain Command and Control, and not just select capabilities of the Advanced Battle Management System. Data and Data Standards As highlighted in the DoD's Data Strategy, data is a strategic asset.29 Within ABMS, data constitutes the intelligence, indications, warnings, signals, status, situ ation, commands, controls, and other multimodal information needed to under stand the situation and command, control, and operate military forces.
From page 49...
... Wellman, 2021, "Joint All Domain Command and Control (JADC2) ," Presentation to the Air Force ABMS Committee, February 5.
From page 50...
... RECOMMENDATION 7: The Joint All-Domain Command and Control cross functional team should reach immediate agreement on a common data fabric and security levels of the data with data standards and tools defined at the Joint level. Without a common set of agreed upon open standards with known interface exchange requirements that do not limit innovation, the military Services risk developing incompatible and stove piped solutions.
From page 51...
... Air Force Chief Software Officer, "Kubernetes," https://software.af.mil/training/ kubernetes/. The key difference between containers and Kubernetes is that containers are designed to code once and run anywhere, while Kubernetes provides the potential to orchestrate and manage all container resources from a single control plane.
From page 52...
... Air Force Chief Software Officer, https://software.af.mil/dsop/documents/, September 15. 46  Microservices (or microservices architecture)
From page 53...
... FINDING 6: Containerization and Kubernetes are mature open-source or chestration systems for enabling and securing agile development within a CI/ CD environment. RECOMMENDATION 8: In coordination with the Department of the Air Force Chief Software Officer, the Department of the Air Force Chief Archi tect's Office and the Department of the Air Force Rapid Capabilities Office should expand the use of containerization and Kubernetes for continuous Advanced Battle Management System development and for detecting and mitigating security vulnerabilities.
From page 54...
... that detailed "a combination of 49  DevSecOps -- short for development, security, and operations -- automates the integration of se curity at every phase of the software development life cycle, from initial design through integration, testing, deployment, and software delivery. IBM Cloud Education, 2020, "DevSecOps," IBM Cloud Learn Hub, https://www.ibm.com/cloud/learn/devsecops, July 30.
From page 55...
... Air Force Deployed Kubernetes and Istio on an F-16 in 45 Days," The New Stack, https://thenewstack.io/how-the-u-s-air-force-deployed-kubernetes-and-istio-on-an f-16-in-45-days/, December 24. 52  Office of the DAF Chief Software Officer, "DoD Enterprise DevSecOps Initiative (DSOP)
From page 56...
... SOURCE: Department of the U.S. Air Force Chief Software Officer.
From page 57...
... RECOMMENDATION 9: The Department of the Air Force Chief Architect's Office and the Department of the Air Force Rapid Capabilities Office should adopt development, security, and operations as the common development environment using containerization and continuous integration/continu ous delivery across all of the Advanced Battle Management System. 58  T.Hitchens, 2020, "The Key to All-Domain Warfare Is ‘Predictive Analysis;' Gen.
From page 58...
... 61  DISA (Defense Information Systems Agency) , "Data Rights," https://disa.mil/about/legal-and regulatory/datarights-ip/datarights, accessed September 18, 2021.
From page 59...
... "While any weapon system can potentially benefit from an OSA approach, sub-systems expected to contain proprietary technology, have frequent technology updates, or are available from multiple sources, are par ticularly strong candidates. Another reason to consider the modular/open system approach would be if the sub-system were expected to have data rights restric tions, which are not likely to be mitigated through the acquisition of additional data rights."65 RECOMMENDATION 10: For modular open system designs with robust interface specifications, the Department of the Air Force Rapid Capabilities Office should acquire performance and interface requirements instead of all intellectual property rights.
From page 60...
... Once defined, ABMS capabilities will be able to automatically adjust network capa bilities (e.g., using software defined networks and network functions virtualization) to maintain a minimum performance profile at all times.
From page 61...
... Irwin, 2016, "Unconventional Warfare in the Gray Zone," Joint Forces Quarterly, 80(1st quarter)
From page 62...
... See AFRL (Air Force Research Labora tory) , "Advanced Battle Management System (ABMS)
From page 63...
... A r c h i t e c t u r e a n d Data 63 FIGURE 2.7 ABMS DeviceOne SecureView®. SOURCE: Air Force Research Laboratory Information Directorate, SecureView Cross Domain Access Solution.
From page 64...
... Clark, 2020, "Dunlap on Zero Trust, Agility, and ADO Cybersecurity," Breaking Defense, https://breakingdefense.com/2020/11/dunlap-on-zero-trust-agility-ado-cybersecurity/, November 24.
From page 65...
... These systems are generally in compatible with security features surrounding access, including MFA, single-sign 75  For more on deperimeterization, see SC Staff, 2004, "Jericho Forum Brings Its Deperimeter Concept to U.S.," SC Media, https://www.scmagazine.com/news/-/jericho-forum-brings-its-depe rimeterization-concept-to-u-s, July 30, and J Kindervag, 2016, "No More Chewy Centers: The Zero Trust Model of Information Security," Forrester, https://crystaltechnologies.com/wp-content/ uploads/2017/12/forrester-zero-trust-model-information-security.pdf, March 23.
From page 66...
... Establishing connections with these legacy systems through the rubric of ABMS will require at a minimum, performing vulnerability scans to identify and address all vulnerability gaps, adopting cyber security controls for systems that are networked with ABMS components, and updating the latest system patches to minimize exposure.76 It is important to recognize that while ZT provides one layer of security pro tection, a comprehensive cybersecurity plan for the entire ABMS architecture is warranted.77 This requires both offensive and defense planning to include red team ing ABMS's cyber defenses to ensure their resiliency to protect against adversarial penetrations and attacks. The Air Force's Mission Defense Teams, specialized de fensive cyber teams tasked to protect critical Air Force missions and installations, should be leveraged.78 Additionally, Congress has recently directed and authorized defense cyber personnel to operate outside of U.S.
From page 67...
... in stages as technologies mature and integrate ZT services to include the use of multi-factor authentication across all of the Advanced Battle Management System. RECOMMENDATION 14: In addition to adopting zero trust, the Depart ment of the Air Force Rapid Capabilities Office should leverage the best available mature cybersecurity practices and capabilities, including multi factor authentication; identity, credential, and access management; encryp tion; penetration testing; managed detection services; behavior monitoring applications; among others.
From page 68...
... Pope, 2019, "Military Conducts First Test of Advanced Battle Management System," Air Force News, https://www.eglin.af.mil/News/Article-Display/Article/2047058/military conducts-first-test-of-advanced-battle-management-system/, December 26.
From page 69...
... FINDING 12: Developmental testing should be focused on detecting and remedying errors in designing or implementing a system; operational testing 83  D Henley, 2020, "Advanced Battle Management System OnRamp #2, Accelerating Data Sharing and Decision-Making," Air Force News, https://www.acc.af.mil/News/Article-Display/ Article/2358597/advanced-battle-management-system-onramp-2-accelerating-data-sharing-and decisi/, September 22.
From page 70...
... Moreover, as the methodology continues to mature, MBSE may extend beyond basic engineering models to support cross domain model integration and complex predictive and effects-based modeling.92 89  See DoD Digital Engineering Working Group, 2016, "Systems Engineering Digital Engineering Fundamentals," https://ac.cto.mil/wp-content/uploads/2019/06/DE-Fundamentals.pdf. 90  INCOSE (International Council on Systems Engineering Technical Operations)
From page 71...
... 96  See R.S. Cohen, 2021, "ABMS, Digital Engineering Decisions on Roper's Final To-Do List," Air Force Magazine, https://www.airforcemag.com/abms-digital-engineering-decisions-on-ropers-final to-do-list/, January 14.
From page 72...
... .98 Collectively, the DTO and the Digital Engineering Enterprise Office seek to accelerate digital modernization and transformation across the DAF enterprise.99 FINDING 13: MBSE and digital engineering methodologies reduce develop ment risk and improve system design and performance. RECOMMENDATION 17: The Department of the Air Force Chief Archi tect's Office and the Department of the Air Force Rapid Capabilities Office should work with the Department of the Air Force's Digital Engineering Enterprise Office to apply model-based systems engineering (MBSE)
From page 73...
... at the Air Force Life Cycle Management Center's Architecture and Integration Directorate, Wright-Patterson Air Force Base. The role of the CSTE is to create a collaborative environment where training systems and simulators may be better linked to support operators and warfighters.
From page 74...
... 108  S Waterman, 2020, "Digital Twins Proliferate as Smart Way to Test Tech," Air Force Magazine, https://www.airforcemag.com/digital-twins-proliferate-as-smart-way-to-test-tech/, March 15.
From page 75...
... Vendors are directed to build their digital twins using the Government's Reference 110  Ibid. 111  See Air Force Research Laboratory Public Affairs, 2021, "WeaponONE Demonstrates Digi tal Twin Technologies That Deliver Software-Defined Weapon Capabilities to the Battlefield," Air Force Life Cycle Management Center News, https://www.aflcmc.af.mil/News/Article-Display/Ar ticle/2478391/weaponone-demonstrates-digital-twin-technologies-that-deliver-software-defined/, January 21.
From page 76...
... RECOMMENDATION 18: Building on existing activities in digital engi neering and modeling and simulations, the Department of the Air Force Chief Architect's Office and the Department of the Air Force Rapid Capa bilities Office should expand the use of digital twins in Advanced Battle Management System development, particularly as new capabilities and technologies are introduced. COMMON MISSION COMMAND CENTER An example of a complex architecture and systems integration has been the Family of Systems (FOS)
From page 77...
... RECOMMENDATION 19: The Department of the Air Force Rapid Capa bilities Office should consider scaling the Common Mission Control Center and designate it as phase zero for the Advanced Battle Management System. 116  DoD, 2020, "21st Century Multi-Domain Effects Executive Summary," Defense Science Board, https://dsb.cto.mil/reports/2020s/FINALMDEExecutiveSummary.pdf, September.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.