[PDF] Drones, Irregular Warfare and Vulnerabilities: a new US Air Force study

[ DOWNLOAD ]
3,6MB – PDF – 110 pages

Abstract

The United States Air Force has long envisioned a strategic role for remotely piloted and autonomous aircraft. As early as May 1896, Samuel Pierpont Langley developed an unpiloted heavier-than-air vehicle which flew over the Potomac River. On V-J Day in August 1945, General Hap Arnold, US Army Air Forces, observed1:

We have just won a war with a lot of heroes flying around in planes. The next war may be fought by airplanes with no men in them at all … Take everything you’ve learned about aviation in war, throw it out of the window, and let’s go to work on tomorrow’s aviation. It will be different from anything the world has ever seen.

Since these early days, extended range, persistence, precision, and stealth have characterized remotely piloted aircraft (RPA) advancements. RPAs have been employed in multiple combat roles and increasingly contested environments. This year, for the first time in history, the President’s budget proposed a larger investment in RPAs than manned aircraft. A seemingly insatiable operational appetite for RPAs, however, has led to an Air Force manning bottleneck. This is exacerbated by a lack of common ground stations, unsatisfactory integration with civilian and international airspace, and vulnerabilities in communications and command and control links. Further complicating
efforts, yet essential in irregular warfare, are directives to minimize civilian casualties. General David Petraeus sees this need as a direct way to support a key center of gravity:

…We must fight the insurgents, and will use the tools at our disposal to both defeat the enemy and protect our forces. But we will not win based on the number of Taliban we kill, but instead on our ability to separate insurgents from the center of gravity – the people …2

Our Panel conducted an extensive set of visits and received numerous briefings from a wide range of key stakeholders in government, industry, and academia. Taking a human-centered, evidence-based approach, our study seeks to address operational challenges as well as point to new opportunities for future RPAs. That RPAs will be a foundational element of the Air Force’s force structure is no longer debatable. The real question is how to maximize their current and future potential. Our intention is that this study will help provide both vector and thrust in how to do so in the irregular warfare context, as well as other applications.

The undersigned express our sincerest appreciation to all the talented and dedicated study members and to the support of Lt Gen David Deptula and Lt Gen Phillip Breedlove. We also acknowledge the support of Executive Officers and the Air Force Scientific Advisory Board Secretariat for their excellent support to this effort.

Dr. Greg Zacharias Dr. Mark Maybury
UIW Study Chair UIW Study Vice Chair

***********************************************************************************

3.3.4 Encryption and Potential C2 Link Vulnerabilities

Historically, sensor/data downlinks for some RPAs have not been encrypted or obfuscated. Unencrypted sensor data (e.g., FMV) is beneficial because the downlink is used to feed ROVER systems used by Joint Terminal Attack Controllers (JTAC) and other ground personnel, including uncleared coalition members and contractors. This is a life-saving capability. Nevertheless, not protecting against interception of sensor data has been criticized. “Fixing” this security issue by mandating NSA Type 1 encryption is likely to lead to an unacceptable key management burden because of the large number of users of RPA data that have a wide variety of access rights. However, commercial-grade, NSA-approved cryptography is available (“Suite B”). Commercial cryptography of this kind does not require the same degree of rigor in handling key material and encryption devices, and is not limited in operation to cleared personnel. There is relevant Department of Defense (DOD) activity in this general area.

Encryption has generally been used on C2 messages because the risks associated with compromise are higher (loss of the vehicle), and there is a greatly reduced need for sharing of the C2 data as compared with sensor data. However, crypto issues will likely be exacerbated when doing coalition/joint swarming across platforms that require shared C2 across security domains – a capability that is desired to fully exploit the potential of networked RPA operations.

Lascia un commento