Air Force planning makes major shift in cyber era

Cyber operations are causing a shift in Air Force priorities, driving the service to reconsider the established ways airmen and personnel are trained and money is spent, according to the Air Force CIO.

“With the evolution of the airplane in World War II…rapid changes in aircraft technology meant rapid obsolescence. Sound familiar?” Lt. Gen. Bill Lord said Feb. 23 at the AFCEA Air Force IT Day in Vienna, Va. “The world is changing and the cyber piece will be at the center of that.”

To deal with the changes the Air Force has to adjust the way it trains aimen, civilian employees and even industry partners, Lord said.

“We require a differently trained force than we have today,” Lord said. “Operators in cyberspace no longer just support the mission.”

While support functions are still part of that job description, these airmen and employees are being pulled into new areas, including creating combat effects in the cyber arena. That change means these people are developing a new area of expertise that requires a broader perspective operational picture, rather than the separate specialties that have long been the norm.

A new approach to training will be wide reaching, from the lowest-level airmen brand new to the force to highly developed military occupational specialties. The Air Force will also look to incorporate the skills of combat veterans re-entering the workforce, Lord said.

The Air Force also is developing a new core function master plan aimed at cyber workforce, investments and spending, and also tactics, techniques and procedures, Lord said.

The Air Force Space Command is developing the plan, which will include directives focused on the next five to 10 years, he said. The plan will be shaped by the mission needs relayed from combatant commanders, he said.

The goal is to drive progress in a world where cyber advancement is “akin to the World War I-World War II era of air power,” Lord said, adding, “You could argue the 20th century was the century of air and space power. Will the 21st century be the century of cyberspace?”

About the Author

Amber Corrin is a former staff writer for FCW and Defense Systems.

The 2015 Federal 100

Meet 100 women and men who are doing great things in federal IT.

Featured

  • Shutterstock image (by venimo): e-learning concept image, digital content and online webinar icons.

    Can MOOCs make the grade for federal training?

    Massive open online courses can offer specialized IT instruction on a flexible schedule and on the cheap. That may not always mesh with government's preference for structure and certification, however.

  • Shutterstock image (by edel): graduation cap and diploma.

    Cybersecurity: 6 schools with the right stuff

    The federal government craves more cybersecurity professionals. These six schools are helping meet that demand.

  • Rick Holgate

    Holgate to depart ATF

    Former ACT president will take a job with Gartner, follow his spouse to Vienna, Austria.

  • Are VA techies slacking off on Yammer?

    A new IG report cites security and productivity concerns associated with employees' use of the popular online collaboration tool.

  • Shutterstock image: digital fingerprint, cyber crime.

    Exclusive: The OPM breach details you haven't seen

    An official timeline of the Office of Personnel Management breach obtained by FCW pinpoints the hackers’ calibrated extraction of data, and the government's step-by-step response.

  • Stephen Warren

    Deputy CIO Warren exits VA

    The onetime acting CIO at Veterans Affairs will be taking over CIO duties at the Office of the Comptroller of the Currency.

  • Shutterstock image: monitoring factors of healthcare.

    DOD awards massive health records contract

    Leidos, Accenture and Cerner pull off an unexpected win of the multi-billion-dollar Defense Healthcare Management System Modernization contract, beating out the presumptive health-records leader.

  • Sweating the OPM data breach -- Illustration by Dragutin Cvijanovic

    Sweating the stolen data

    Millions of background-check records were compromised, OPM now says. Here's the jaw-dropping range of personal data that was exposed.

  • FCW magazine

    Let's talk about Alliant 2

    The General Services Administration is going to great lengths to gather feedback on its IT services GWAC. Will it make for a better acquisition vehicle?

Reader comments

Fri, Feb 24, 2012 Yasser

Planning & Training are great... but let's get some basics out first. It would be great if the AF distro'd modern cyber tools to its airmen for any-where, any-time use like they did w/ the home-use anti-virus program. Imagine tablet/phone security tools, bootable CDs (like the AF's own Lightweight Portable Security), basic data protection (Encryption Wizard),and such.

Fri, Feb 24, 2012 30yr DoD Fed

I don’t disagree, but I hope the top level leadership coordinates the formulation of the policy with those actually doing the work to better ensure its applicability and usefulness. Normally policy is generated by top level officials who have no clue in reality of the impact or if actual performance gains are realized or impeded at the mission performance level. Exclusive uninformed policy formulation/dictation is part of the problem of the general inefficiencies of federal government; particularly in DoD’s mentality that the military leader is god over civilian mission performance of that which they have no functional level knowledge/understanding.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above