Back to news

November 13, 2019 | International, Aerospace, C4ISR

Air Force to link F-35, F-22 in ‘connect-a-thon’ experiment

By: Aaron Mehta

WASHINGTON — The U.S. Air Force is preparing an experiment it hopes will link the F-22 and F-35 fighter jets, the first in a series of experiments that service acquisition head Will Roper has dubbed “connect-a-thons.”

The experiments are to happen every four months, starting in December. The goal is to identify a fleet of aircraft with a communications issue, invite voices from inside and outside the Pentagon to offer solutions, and then test those offerings in a live experiment.

“We're making it up as we go, right? There's never been anything like this,” Roper said at a breakfast hosted by the Defense Writers Group. “We need a way for people to propose connections and get into the pipeline. So I wouldn't be surprised at all if it ends up being like a pitch day ... having a proposal process where we review the maturity of the tech versus the benefit to the war fighter. We would do the former, our operators would do the latter."

“And what I love about this is it's kind of a competition within the joint force," he added. "We're going to be looking for the fast movers to volunteer, then we'll be looking at the fast followers.”

The first event, hosted by North American Aerospace Defense Command and U.S. Northern Command, will feature an attempt to allow the F-22 and F-35 to share battlespace — a long-sought capability.

The F-22 was built with an older data link that can't match up with the Multifunction Advanced Data Link, or MADL, system used on the newer F-35; while the F-35 can receive data through Link 16, it can't share the data back — a key capability given the envisioned role of the F-35 as a major sensor for the future Air Force.

For the test, the service will use what Roper called a “Babel Fish-like translator” under the working name of GatewayOne to serve as a “universal translator” for the two jets. The first test, in December, will feature the equipment on a pole on a test range, with the jets pinging their information back and forth from that fixed location.

Should that system work well, in four months Roper plans to put GatewayOne onto a Valkyrie drone, a system designed by Kratos to be cheap enough to be disposable in a battlefield situation. It's not the first time a drone has been used as a link between the two fighters: In 2017, Northrop Grumman pitched its Global Hawk unmanned system, equipped with a new radio, to act as a translator between the aircraft.

Future connect-a-thons currently planned include linking SpaceX's Starlink satellites with KC-135 aerial refueling aircraft in an effort to show commercial communications can work with military aircraft; Roper said the KC-135 community volunteered because the tanker aircraft is perpetually seeking more bandwidth.

Roper also expects the F-16 community — which he called “very innovative, agile operators” who understand they need to keep an aging plane relevant — to “sign up wholesale” for tests in the future.

The acquisitions chief said he is committed to keeping the four-month schedule going, in part because it means if the technology isn't satisfactory, the service will know quickly and be able to move onto something else.

“The good news about that is [Congress and the Pentagon] don't really have to believe us for very long. Just let us get through a few connect-a-thon cycles,” Roper said. “And if we're failing miserably, then that should tell you something about the future of the program.”

https://www.c4isrnet.com/air/2019/11/12/us-air-force-to-link-f-35-with-f-22-in-connect-a-thon-experiment/

On the same subject

  • Five Eyes Intel Alliance Urges Big Tech to Help Break Encrypted Messages

    September 4, 2018 | International, C4ISR

    Five Eyes Intel Alliance Urges Big Tech to Help Break Encrypted Messages

    By Joseph Marks The U.S. and four major allies warn new legislation might be necessary to ensure law enforcement can access communications. Homeland Security Secretary Kirstjen Nielsen joined leaders of the U.S.'s four major intelligence sharing partners Thursday in a statement urging tech companies to help law enforcement access otherwise-encrypted communications from criminals and terrorists. The joint statement stopped short of urging new laws to mandate that cooperation but warned that “should governments continue to encounter impediments to lawful access to information necessary to aid the protection of the citizens of our countries, we may pursue technological, enforcement, legislative or other measures to achieve lawful access solutions.” The statement from the U.S., Canada, the United Kingdom, Australia and New Zealand, collectively known as the Five Eyes, describes law enforcement's inability to access encrypted communications as “a pressing international concern that requires urgent, sustained attention.” While “governments should recognize that the nature of encryption is such that there will be situations where access to information is not possible,” the statement notes, “such situations should be rare.” Obama and Trump administration officials have warned since 2014 that end-to-end encryption systems, which shield the content of communications even from the communications provider, are allowing criminals and terrorists to plan operations outside law enforcement's reach. Legislative proposals that would make it easier for police to access those communications have failed to gain traction, however, even after a 2015 showdown between the FBI and Apple over an encrypted iPhone used by San Bernardino shooter Syed Farook. An inspector general's investigation in March found the FBI rushed to court in that case, seeking to compel Apple's assistance without exploring other options for cracking into the phone. Thursday's statement notes that: “Providers of information and communications technology and services ... are subject to the law, which can include requirements to assist authorities to lawfully access data, including the content of communications.” The statement does not go into detail, however, about what laws would justify those requirements and how they should be interpreted. The San Bernardino case was never decided in court because an unknown third party sold the FBI a method for breaking through the phone's passcode and accessing its encrypted contents. U.S. tech companies, for the most part, have resisted calls to cooperate with law enforcement. They argue that any effort to weaken encryption would be found and exploited by criminal hackers or foreign spies. Technologists, civil libertarians and many members of Congress have urged police to use other methods to break through encrypted communications without forcing companies to help or installing government backdoors into encryption systems. Those methods include obtaining a warrant to hack into the communications and building a case using unencrypted metadata. During the summit, Nielsen and other Five Eyes officials also agreed to strengthen cooperation between their nations' cyber centers and to cooperate on improving the cybersecurity of supply chains for critical infrastructure such as energy plants and airports. https://www.nextgov.com/cybersecurity/2018/08/five-eyes-intel-alliance-urges-big-tech-help-break-encrypted-messages/150961/

  • Opinion: The Real Cost Of Cybersecurity

    March 18, 2022 | International, C4ISR, Security

    Opinion: The Real Cost Of Cybersecurity

  • Inside The UK’s Integrated Defense Review  | Aviation Week Network

    March 24, 2021 | International, Aerospace, Naval, Land, C4ISR, Security

    Inside The UK’s Integrated Defense Review | Aviation Week Network

    The UK military is aligning its focus to platforms that will serve it well in the Pacific, and this is a quick look at how the nation’s plans for aerospace programs are changing.

All news