Video: The Importance of Multiple Independent Levels of Security in Air Combat Training

0
6414
Multiple Independent Levels of Security

On the battlefield, it is critical for the right information to reach the warfighter at the right time. It requires rapid, efficient communication, which can be difficult with many levels of classification and different generations of aircraft. How does the right information get to the right aircraft? Is the aircraft equipped to accept that classification level of data? Operators face this same challenge in training with the added need to protect tactics, techniques and procedures from enemy exploitation. In order to train our warfighters as they fight, it is crucial to have Multiple Independent Levels of Security (MILS) for LVC test and training scenarios.

DOWNLOAD New Whitepaper on Human-Machine Performance Assessment Trends

In this short video, Ty Bachmann, former U.S. Marine Test Pilot and Weapons School Graduate, and the first Marine to fly the F-35, and an F-35 Squadron Commander, shares an operator’s perspective on the importance of MILS.

“Multiple Independent Levels of Security gives airborne platforms with different security levels the ability to share information without the wrong data being shared with a platform that is not equipped or allowed to see the higher classification of information,” Bachmann stated. “Basically, MILS ensures the right airplanes have the ‘need to know’ information.”

Exchanging classified data in both wartime and training is critical to the warfighter. It enables the warfighter to “train like you fight,” without allowing enemies to gain access to sensitive data during the training scenarios. 

In this 5 Minute Insights: Test and Training video, Bachmann shared examples of scenarios that require MILS technology and gives an easy to understand explanation of how the technology works. He uses an example where an F-35 sends four levels of classified data across varying levels, which is then fed into a tactical guard that confirms their classification. “At the point, the data is routed into an encryption device and then sent through an advanced data link to the recipient. The receiver decrypts the data and routes it through a similar tactical guard for use by applications or sensors with matching classification levels,” Bachmann explained.

Watch the full video to learn how MILS can connect multiple generations of platforms together at various security classifications.