WEBVTT 00:00.159 --> 00:02.381 Thank you , General General Barrier for 00:02.381 --> 00:04.215 those opening remarks . Our next 00:04.215 --> 00:06.215 speaker is Lieutenant General Kevin 00:06.215 --> 00:08.215 Kennedy , commander of the 16th Air 00:08.215 --> 00:10.539 Force , Commander of Air Forces , Cyber 00:10.640 --> 00:12.251 and Commander of Joint Force 00:12.251 --> 00:14.307 Headquarters , Cyber at joint base , 00:14.307 --> 00:16.409 San Antonio Lackland , Texas . 00:16.670 --> 00:18.892 Lieutenant General Kennedy assumed this 00:18.892 --> 00:22.409 role in July of 2022 . Please join me 00:22.420 --> 00:24.142 in welcoming General Kennedy . 00:28.229 --> 00:30.229 All right . Well , thank you . So I 00:30.229 --> 00:32.340 have a son that plays baseball and he 00:32.340 --> 00:32.330 always has these walk up songs that 00:32.340 --> 00:34.396 came up and said , hey , what do you 00:34.396 --> 00:36.562 want for a walk up song ? And I'm from 00:36.562 --> 00:36.049 New England . So I'm like , when am I 00:36.060 --> 00:38.171 gonna ever get that chance again ? So 00:38.171 --> 00:40.590 went with dropkick Murphys . Um , so , 00:40.599 --> 00:42.432 first of all , thank you for the 00:42.432 --> 00:44.543 opportunity to talk um , today and to 00:44.543 --> 00:46.766 and to meet with everyone that's here . 00:46.766 --> 00:48.877 Uh Mr Casa , thank you very much . Uh 00:48.877 --> 00:50.988 How about another round of applause ? 00:50.988 --> 00:50.970 Uh , Scott Barrier is a great teammate , 00:50.979 --> 00:53.201 great partner . Thank you very much for 00:53.201 --> 00:53.090 your service 00:57.319 --> 00:59.375 prior to this position . I was the J 00:59.375 --> 01:01.430 three at Cyber Command and we were a 01:01.430 --> 01:03.430 demanding customer . So , Scott was 01:03.430 --> 01:05.541 very , very helpful in our mission as 01:05.541 --> 01:07.763 we go forward there . So I'm gonna hear 01:07.763 --> 01:09.930 today , I'm gonna represent the 49,000 01:09.930 --> 01:09.720 airmen that are part of 16th air force 01:09.730 --> 01:11.952 in the total force . Um But rather than 01:11.952 --> 01:14.119 getting detailing for you , um first , 01:14.119 --> 01:16.341 I had a less of a budget than dia did , 01:16.341 --> 01:18.452 but I'm gonna let you , I'm gonna let 01:18.452 --> 01:20.563 the airmen show you what they do . So 01:20.563 --> 01:19.330 please roll the video . 01:26.879 --> 01:29.101 The world we live in today is smaller . 01:29.180 --> 01:31.169 Global connectivity allows people 01:31.180 --> 01:33.870 societies , economies and countries to 01:33.879 --> 01:36.389 interact at the speed of light . Our 01:36.400 --> 01:38.720 adversaries leverage this connectivity . 01:38.959 --> 01:41.500 They spread disinformation target , 01:41.510 --> 01:44.290 transparent , free and open societies 01:44.300 --> 01:47.110 to stoke chaos , fear and division . 01:47.480 --> 01:49.690 They erode trust by exploiting the 01:49.699 --> 01:51.810 vulnerabilities in our interconnected 01:51.810 --> 01:54.400 world . The information environment 01:54.410 --> 01:56.688 that touches every aspect of our lives . 01:57.540 --> 01:59.484 The information environment is our 01:59.484 --> 02:02.099 battle space and 16th Air Force is the 02:02.110 --> 02:04.389 competition force . Our empowered 02:04.400 --> 02:06.622 airmen generate insights to connect our 02:06.622 --> 02:10.339 forces hunt , expose disrupt and defeat 02:10.350 --> 02:12.406 our enemies and deliver outcomes for 02:12.410 --> 02:15.169 our nation . Dominant in competition , 02:15.190 --> 02:17.830 vital in crisis and a critical enabler 02:17.839 --> 02:20.600 in conflict . We are 16th Air Force , 02:20.679 --> 02:22.901 the men and women of 16th Air Force are 02:22.901 --> 02:25.012 persistently engaged , competing with 02:25.012 --> 02:27.235 the power of information and protecting 02:27.235 --> 02:30.190 our nation daily , working by with and 02:30.199 --> 02:32.550 through the interagency and our allies 02:32.559 --> 02:34.910 and partners . 16th Air Force reveals 02:34.919 --> 02:37.369 to deter conceals the defeat and 02:37.380 --> 02:39.449 exposes to gain the advantage over 02:39.460 --> 02:42.199 malign actors across the globe . We 02:42.210 --> 02:45.139 connect our force , we assure air 02:45.149 --> 02:46.949 superiority , intelligence , 02:46.960 --> 02:49.509 surveillance and reconnaissance , rapid 02:49.520 --> 02:51.809 global mobility , global strike and 02:51.820 --> 02:53.042 command and control . 02:55.860 --> 02:57.916 We arm national decision makers with 02:57.916 --> 03:00.330 the information that drives us posture 03:00.339 --> 03:03.050 and response activities during 03:03.059 --> 03:05.539 competition are critical to integrated 03:05.550 --> 03:07.529 deterrent , which is the ultimate 03:07.539 --> 03:10.860 informational outcome . The air force's 03:10.869 --> 03:13.100 competition force is a tightly 03:13.110 --> 03:15.054 integrated collection of empowered 03:15.054 --> 03:17.820 airmen , our most critical capability 03:17.990 --> 03:21.229 operating across the globe . But we are 03:21.240 --> 03:23.440 most effective when we integrate and 03:23.449 --> 03:26.029 synchronize our capabilities , scaling 03:26.039 --> 03:28.210 our information and expertise across 03:28.220 --> 03:30.220 the enterprise to affect adversary 03:30.229 --> 03:32.619 behavior . At the time of our choosing , 03:33.250 --> 03:35.880 empowered airmen delivering outcomes 03:35.889 --> 03:36.960 for the nation . 03:43.289 --> 03:45.919 16th Air Force is the competition force . 03:50.529 --> 03:53.000 All right . And that is the external 03:53.009 --> 03:55.231 world premiere of that video there . So 03:55.231 --> 03:57.231 we , we brought it out just for you 03:57.231 --> 04:01.220 guys . Thank you . All right . 04:01.229 --> 04:03.929 Next slide , please . So let's talk 04:03.940 --> 04:06.162 that they , they teed up a little bit . 04:06.162 --> 04:08.162 Here's our mission and , and what I 04:08.162 --> 04:07.850 want to focus on is the center of the 04:07.860 --> 04:10.720 slide here . So our , our , our mission 04:10.729 --> 04:12.940 is to generate insights , compete now 04:12.949 --> 04:15.060 and prepare for crisis and conflict . 04:15.060 --> 04:17.227 Those are the efforts that we do . And 04:17.227 --> 04:17.059 when we talk about that , this is like , 04:17.070 --> 04:19.119 how do we posture the Air Force 04:19.130 --> 04:22.619 enterprise to enable our CFACC and the 04:22.630 --> 04:24.908 combatant commands . So 16th Air Force , 04:24.908 --> 04:26.852 we also support the joint force um 04:26.852 --> 04:29.019 through Cyber command as the Air Force 04:29.019 --> 04:30.797 component . And we also support 04:30.797 --> 04:32.797 Stratcom space com and Ucom . So we 04:32.797 --> 04:34.963 have , our team is aligned to that way 04:34.963 --> 04:36.963 and down in San Antonio , but we're 04:36.963 --> 04:39.074 able to leverage our enterprises that 04:39.074 --> 04:41.297 have come together in this singular N A 04:41.297 --> 04:43.352 from the 24th Air Force and the 25th 04:43.352 --> 04:43.209 Air Force . What that did is it brought 04:43.220 --> 04:45.442 together our cyber enterprise , our ISR 04:45.442 --> 04:47.619 enterprise , our weather enterprise , 04:47.630 --> 04:49.741 portions of our ew enterprise and the 04:49.741 --> 04:51.574 greatest preponderance of our IO 04:51.574 --> 04:53.574 professionals that we've trained in 04:53.574 --> 04:55.519 information operations . What that 04:55.519 --> 04:57.741 enables uh those empowered airmen to do 04:57.741 --> 04:59.963 is deliver outcomes that are executable 04:59.963 --> 05:02.019 in competition and as we prepare for 05:02.019 --> 05:04.019 crisis and conflict . And that's we 05:04.019 --> 05:06.241 also have that very , very key that the 05:06.241 --> 05:08.297 information that we partner with Dia 05:08.297 --> 05:10.309 NGA um and the other agencies um to 05:10.320 --> 05:12.320 provide those insights for decision 05:12.320 --> 05:14.320 makers at the national level . Next 05:14.320 --> 05:16.720 slide , please . So let's talk about a 05:16.730 --> 05:18.730 little bit of what that information 05:18.730 --> 05:20.897 environment looks like that our airmen 05:20.897 --> 05:22.841 operate in . And so this is like , 05:22.841 --> 05:25.063 what's changed we've talked about . I , 05:25.063 --> 05:27.230 I completely agree with Joan Barrier . 05:27.230 --> 05:29.397 This feels like the eighties uh in the 05:29.397 --> 05:31.563 in just the tensions between the , the 05:31.563 --> 05:33.619 powers and , and moving forward from 05:33.619 --> 05:33.040 where we were in the past couple of 05:33.049 --> 05:34.940 decades . However , the the 05:34.950 --> 05:37.061 environment's changed significantly , 05:37.061 --> 05:39.172 right ? So when I joined the force in 05:39.172 --> 05:41.394 1986 at the Air Force Academy , we were 05:41.394 --> 05:43.450 the first class with A PC . Um since 05:43.450 --> 05:45.561 that time , we have become incredibly 05:45.561 --> 05:48.079 connected across the globe . And what 05:48.089 --> 05:50.311 does that mean for the military force . 05:50.311 --> 05:52.422 It means that we can communicate with 05:52.422 --> 05:54.256 the with the population of other 05:54.256 --> 05:56.829 nations directly and they can complete , 05:56.839 --> 05:58.920 they can communicate with us . So we 05:58.929 --> 06:01.040 need to understand , not be scared of 06:01.040 --> 06:03.151 that , but we need to understand what 06:03.151 --> 06:03.100 that means . And as we're leveraging 06:03.109 --> 06:05.331 the information environment , the other 06:05.331 --> 06:07.553 one is proliferated as you look there , 06:07.553 --> 06:09.553 those are the adoption stats in the 06:09.553 --> 06:11.720 cost of the United States . 90% market 06:11.720 --> 06:13.831 type of adoption every , for the most 06:13.831 --> 06:15.720 part , 90% of our citizens in the 06:15.720 --> 06:17.831 United States will touch the internet 06:17.831 --> 06:19.998 every day . And if you put reminders , 06:19.998 --> 06:19.769 you know , I get a screen time thing 06:19.940 --> 06:22.649 apparently 10 to 12 hours a week um as 06:22.660 --> 06:24.716 you're going forward in that type of 06:24.716 --> 06:26.438 activity , so we are deeply uh 06:26.438 --> 06:28.940 connected and it's proliferated across 06:28.950 --> 06:31.119 our population . It's awful perforated 06:31.130 --> 06:33.640 to our um to our adversaries as you 06:33.649 --> 06:35.649 think through that . What does that 06:35.649 --> 06:37.816 mean ? If you look at some of the , if 06:37.816 --> 06:39.816 you look at the colonial pipeline , 06:39.816 --> 06:41.982 cyber hack that happened um almost two 06:41.982 --> 06:44.093 years ago now , maybe a little over . 06:44.093 --> 06:46.779 Um That wasn't a deeply technical 06:46.790 --> 06:49.779 operation . It was the availability of , 06:49.790 --> 06:52.049 of dark web marketplaces that sell 06:52.059 --> 06:54.570 access , that sell access that provide 06:54.579 --> 06:56.690 opportunities to work with ransomware 06:56.690 --> 06:58.959 activities . Um So for the fairly low 06:58.970 --> 07:02.429 dollar value , you could probably 07:02.440 --> 07:04.662 affect a company that had the access on 07:04.662 --> 07:06.940 the web um with very , with , you know , 07:06.940 --> 07:08.884 what I would call basic level . Um 07:08.884 --> 07:11.051 Cyber awareness and skills . So that's 07:11.051 --> 07:13.107 what we have to compete against , of 07:13.107 --> 07:12.630 understanding . This is the type of 07:12.640 --> 07:14.196 proliferation . It's really 07:14.196 --> 07:16.084 democratization of the technology 07:16.084 --> 07:18.251 across to impact our populations . And 07:18.251 --> 07:20.418 the other one is there's persistence . 07:20.418 --> 07:22.640 It's always on , it's always there much 07:22.640 --> 07:24.807 like the the video talked about in the 07:24.807 --> 07:26.973 beginning . It's , it's something that 07:26.973 --> 07:28.918 drives the information environment 07:28.918 --> 07:31.140 disconnecting is , is a choice that you 07:31.140 --> 07:33.029 have to make . Otherwise you will 07:33.029 --> 07:34.751 continually be connected . Our 07:34.751 --> 07:36.807 population will our military members 07:36.807 --> 07:36.584 will and we need to make sure that we 07:36.595 --> 07:38.762 understand that as we're going forward 07:38.762 --> 07:41.095 in great power competition . Next slide . 07:42.269 --> 07:45.260 So what advantage do you gain this ? I 07:45.269 --> 07:47.380 don't think was an accident that they 07:47.380 --> 07:49.658 look so similar as we're going forward . 07:49.658 --> 07:51.602 So there's real advantage that our 07:51.602 --> 07:53.825 adversaries can gain in the competition 07:53.825 --> 07:56.559 space . Now , ours is better , right ? 07:56.570 --> 07:58.792 The F-22 Raptor is still the finest air 07:58.792 --> 08:01.014 superior platform that has been fielded 08:01.014 --> 08:03.237 in the history of the world . However , 08:03.540 --> 08:06.130 when you look at the J 35 there's some 08:06.140 --> 08:08.362 capabilities there as you look for it . 08:08.362 --> 08:10.251 And like I said , it doesn't look 08:10.251 --> 08:12.473 similar by accident . And so what we've 08:12.473 --> 08:14.696 seen over the last couple of decades is 08:14.696 --> 08:16.862 that access , that persistence and the 08:16.862 --> 08:18.973 proliferation of the technologies has 08:18.973 --> 08:21.029 enabled our adversaries to gain some 08:21.029 --> 08:23.140 strategic and operational advantage . 08:23.140 --> 08:22.609 What would that mean if we were to get 08:22.619 --> 08:25.220 into a hot crisis or conflict ? We play 08:25.230 --> 08:27.480 it out . I I am more confident in our 08:27.489 --> 08:29.656 ability to employ those capabilities , 08:29.950 --> 08:32.117 but I don't want to give the adversary 08:32.117 --> 08:34.228 further advantage . And so when we're 08:34.228 --> 08:36.339 thinking about our information , this 08:36.339 --> 08:36.330 is the reason why we have to have the 08:36.340 --> 08:38.396 level of security that we do when we 08:38.396 --> 08:40.507 all partner together on J Wick . This 08:40.507 --> 08:42.618 is the reason when we're working with 08:42.618 --> 08:42.500 the defense industrial base that we 08:42.510 --> 08:44.710 have fairly high security standards to 08:44.719 --> 08:46.886 make sure that we don't leak this type 08:46.886 --> 08:48.997 of information to ours . Next slide , 08:48.997 --> 08:51.219 please . So what is uh what we're gonna 08:51.219 --> 08:53.450 talk through here in the next slides is 08:53.460 --> 08:55.404 the three things as you're talking 08:55.404 --> 08:57.880 about bringing clarity um to chaos and 08:57.890 --> 08:59.946 how we're postured in 16th Air Force 08:59.946 --> 09:02.057 and what we see . So the first one is 09:02.057 --> 09:04.001 talked about the environment . The 09:04.001 --> 09:06.168 second one is here is what's the power 09:06.168 --> 09:08.223 of information sharing and where you 09:08.223 --> 09:10.501 gain and for the Russia Ukraine crisis . 09:10.501 --> 09:12.723 As I mentioned , I was at Cyber Command 09:12.723 --> 09:14.668 when the crisis started and then I 09:14.668 --> 09:14.489 moved transition in this role and still 09:14.500 --> 09:16.556 continue to support uconn today as a 09:16.556 --> 09:18.611 joint force headquarters , Commander 09:18.611 --> 09:20.667 for Cyber Air Force . And so what we 09:20.667 --> 09:22.722 saw there is the information sharing 09:22.722 --> 09:24.789 enabled us to build a coalition , 09:24.820 --> 09:27.150 enabled a defense for one of our 09:27.159 --> 09:29.580 partners . And then once the once 09:29.590 --> 09:31.757 Russia invaded Ukraine , it enabled us 09:31.757 --> 09:33.757 to share information at a level and 09:33.757 --> 09:36.419 speed that enabled Ukraine to defend 09:36.429 --> 09:39.059 themselves actively uh during the 09:39.070 --> 09:41.539 actual conflict and continues to this 09:41.549 --> 09:43.771 day . That is one of the power now that 09:43.771 --> 09:45.780 what is what's required below that 09:45.900 --> 09:48.011 again , going back to the information 09:48.011 --> 09:50.178 technology , we're going to leverage , 09:50.178 --> 09:52.067 we have to have confidence in the 09:52.067 --> 09:54.289 networks and we have to have confidence 09:54.289 --> 09:56.011 in the means that we share the 09:56.011 --> 09:58.011 information that the information is 09:58.011 --> 09:57.479 going to remain secure with our 09:57.489 --> 09:59.600 partners and allies . And we're going 09:59.600 --> 10:01.799 to have to do this in competition to 10:01.809 --> 10:03.976 make sure that we're postured in a way 10:03.976 --> 10:06.299 to succeed in a crisis . We figure this 10:06.309 --> 10:09.200 out , we have to move left and we think 10:09.210 --> 10:11.266 through the technologies and I think 10:11.266 --> 10:13.488 the technologies are getting there to a 10:13.488 --> 10:15.488 point um where we can work together 10:15.488 --> 10:14.640 with our partners and allies to make 10:14.650 --> 10:16.928 sure that level of information sharing , 10:16.928 --> 10:18.983 which we've usually waited to crisis 10:18.983 --> 10:21.150 and conflict as we look through the to 10:21.150 --> 10:23.372 the new environment that's not going to 10:23.372 --> 10:25.594 be fast enough . Next slide , the other 10:25.594 --> 10:27.539 thing that brings us is resilience 10:27.539 --> 10:29.650 through partnerships , right ? If you 10:29.650 --> 10:31.872 think about how we this is AAA conflict 10:31.872 --> 10:33.872 or a competition in the information 10:33.872 --> 10:35.872 environment , the more partnerships 10:35.872 --> 10:37.928 that you have , the more voices that 10:37.928 --> 10:37.900 you have in the information environment , 10:37.909 --> 10:39.798 the more folks that are operating 10:39.798 --> 10:41.965 inside that environment that have like 10:41.965 --> 10:44.710 ideals like values like interests is 10:44.719 --> 10:47.059 going to help as you're taking out the 10:47.070 --> 10:48.959 disinformation and misinformation 10:48.959 --> 10:50.959 that's present in the environment . 10:50.959 --> 10:53.181 This is just an example from the Russia 10:53.181 --> 10:55.292 Ukraine . We saw this , the more that 10:55.292 --> 10:57.403 NATO this the other by product of the 10:57.403 --> 10:59.626 Russia Ukraine invasion is NATO I think 10:59.626 --> 11:01.681 is stronger than it's been since the 11:01.681 --> 11:03.681 fall of the Cold War . This is what 11:03.681 --> 11:06.159 information can do for us next slide . 11:07.179 --> 11:09.290 So how do we posture ourselves within 11:09.290 --> 11:11.401 16th Air Force ? So we already talked 11:11.401 --> 11:13.346 about that . So the , the way that 11:13.346 --> 11:15.568 we're gonna succeed in the future and , 11:15.568 --> 11:17.679 and when we think about the co crisis 11:17.679 --> 11:19.901 and conflicts that come , there's three 11:19.901 --> 11:22.123 kind of critical things that we look at 11:22.123 --> 11:24.290 in 16th Air Force that we need to do . 11:24.290 --> 11:26.235 First one partners and allies it's 11:26.235 --> 11:25.669 captured in the national defense 11:25.679 --> 11:27.846 strategy . It is also very , very true 11:27.846 --> 11:30.068 at the operational and tactical level . 11:30.068 --> 11:32.179 For us , we have to think through how 11:32.179 --> 11:34.346 do we build partnerships and how do we 11:34.346 --> 11:36.457 work with our nation partners as well 11:36.457 --> 11:38.346 as our allies to be ready for the 11:38.346 --> 11:40.401 crisis and conflict . That that also 11:40.401 --> 11:42.623 means that we have to think through how 11:42.623 --> 11:44.790 do we partner with the inter agency as 11:44.790 --> 11:47.012 the Department of Defense ? And we also 11:47.012 --> 11:46.520 need to think through how do we depart ? 11:46.530 --> 11:48.530 How do we partner with industry and 11:48.530 --> 11:50.510 academia when we're talking about 11:50.520 --> 11:52.919 making clarity from chaos and 11:52.929 --> 11:54.929 leveraging or emerging technologies 11:54.929 --> 11:57.262 unless it's an offensive for capability . 11:57.262 --> 11:59.207 So an offensive cyber would be the 11:59.207 --> 12:01.151 example for us in 16th Air Force . 12:01.151 --> 12:03.262 Unless it's an offensive capability , 12:03.262 --> 12:05.207 it's unlikely worth the innovators 12:05.207 --> 12:07.318 unlikely . Um I don't have the budget 12:07.318 --> 12:09.429 that the industry has or academia has 12:09.429 --> 12:11.651 or necessarily the expert , I have some 12:11.651 --> 12:13.818 real good experts on that other side . 12:13.818 --> 12:12.979 Like I said , innovation in the 12:12.989 --> 12:15.039 offensive cyber realm were probably 12:15.049 --> 12:17.590 your go to . Um but I wanna be an early 12:17.599 --> 12:19.821 adopter or a fast follower . I wanna be 12:19.821 --> 12:22.043 in that portion of the adoption curve . 12:22.043 --> 12:24.099 If we wait too long , we will not be 12:24.099 --> 12:26.321 there . But I , so the way that we look 12:26.321 --> 12:28.432 at doing that in 16th Air Force is we 12:28.432 --> 12:30.321 think , how do we pilot toward an 12:30.321 --> 12:32.266 outcome ? Now , I said , pilot and 12:32.266 --> 12:32.059 everyone in the room like uh you got 52 12:32.070 --> 12:34.880 3.3 pilots . Um True , we're good at 12:34.890 --> 12:36.779 starting them . We're not good at 12:36.779 --> 12:38.834 finishing them um as we go forward , 12:38.834 --> 12:41.057 but that is one of the areas that we're 12:41.057 --> 12:43.001 looking for is a , how do we bring 12:43.001 --> 12:45.001 technology into our environment and 12:45.001 --> 12:47.168 leverage it quickly um at that part of 12:47.168 --> 12:49.112 the adoption curve . So when we're 12:49.112 --> 12:51.223 thinking through that this is the way 12:51.223 --> 12:50.520 that we came forward and when they're 12:50.530 --> 12:52.808 talking about that partners and allies . 12:52.808 --> 12:55.030 And so if you , what you see at the top 12:55.030 --> 12:57.086 of the chart here are our priorities 12:57.086 --> 12:59.141 within 16th Air Force as we're parts 12:59.141 --> 13:01.308 and you know , as we're operating with 13:01.308 --> 13:03.363 this information technology and what 13:03.363 --> 13:03.200 we're driving our aim to do to support 13:03.210 --> 13:05.321 the joint force and the CFACC and the 13:05.321 --> 13:07.543 Air Force . So the first one is growing 13:07.543 --> 13:09.599 readiness , the readiness state that 13:09.599 --> 13:11.599 we've had uh for our posture during 13:11.599 --> 13:13.932 since 911 and , and to the fight in the , 13:13.932 --> 13:17.049 in the uh Southwest Asia was fantastic . 13:17.059 --> 13:18.979 We were well organized to do that 13:18.989 --> 13:20.799 mission as the national defense 13:20.809 --> 13:22.865 strategy has , as we've been talking 13:22.865 --> 13:24.976 about this pivot like general barrier 13:24.976 --> 13:27.142 mentioned for a while national defense 13:27.142 --> 13:29.087 strategy is very more even more on 13:29.087 --> 13:31.309 point lately . And our leadership , our 13:31.309 --> 13:33.309 political leadership is also very , 13:33.309 --> 13:35.476 very pointed about , hey , we're going 13:35.476 --> 13:35.440 to have to have strategic discipline as 13:35.450 --> 13:37.339 we move this pivot to the Pacific 13:37.339 --> 13:40.210 because the growing concern about the 13:40.219 --> 13:43.780 pr C as our pacing threat or challenge . 13:44.150 --> 13:46.317 So that's what we're looking about how 13:46.317 --> 13:48.483 we grow our readiness . We're employed 13:48.483 --> 13:50.650 in place force . So what that means to 13:50.650 --> 13:52.706 us is a , we , we are employed doing 13:52.706 --> 13:54.928 our mission today . We , we're not just 13:54.928 --> 13:54.299 for crisis and conflict , but we're 13:54.309 --> 13:56.476 trying to , we're looking to carve out 13:56.476 --> 13:58.609 about 20% of our airmen's time to 13:58.619 --> 14:00.841 enable that training and to enable that 14:00.841 --> 14:03.008 connection with the rest of the United 14:03.008 --> 14:05.230 States Air Force through flag exercises 14:05.230 --> 14:07.452 um through other wing level exercises . 14:07.452 --> 14:09.452 We're looking to make sure that our 14:09.452 --> 14:11.397 airmen outside of 16th Air Force , 14:11.397 --> 14:13.452 understand the power that comes from 14:13.452 --> 14:15.619 the ISR enterprise and understands the 14:15.619 --> 14:17.730 power of the IC that they have access 14:17.730 --> 14:19.675 to at the operational and tactical 14:19.675 --> 14:21.897 level , but they may not understand how 14:21.897 --> 14:23.897 to connect and that's our job . The 14:23.897 --> 14:23.330 next one is strengthening our 14:23.340 --> 14:25.507 resilience . This is resilience of our 14:25.507 --> 14:27.451 airmen . This is resilience of our 14:27.451 --> 14:29.618 capabilities and this is resilience of 14:29.618 --> 14:31.729 our processes . They have to have all 14:31.729 --> 14:34.020 three . We talk a lot about the 14:34.030 --> 14:36.030 resilience of our airmen as they're 14:36.030 --> 14:38.086 working in this very dynamic world . 14:38.086 --> 14:40.086 But the the capabilities need to be 14:40.086 --> 14:42.330 able to survive a , an effect upon our 14:42.340 --> 14:44.396 weapon systems and recover . When we 14:44.396 --> 14:46.451 think about the folks in this room , 14:46.451 --> 14:48.673 our networks need to think about how do 14:48.673 --> 14:50.896 we absorb losses of capabilities in our 14:50.896 --> 14:53.062 networks and then bring itself back up 14:53.062 --> 14:55.284 online that was driving modernization . 14:55.284 --> 14:57.451 I've talked to that already , but this 14:57.451 --> 14:59.673 is how do we bring in modernize again , 14:59.673 --> 15:01.507 our capabilities , modernize our 15:01.507 --> 15:03.673 training and modernize our processes , 15:03.719 --> 15:06.369 maturing information warfare . So this 15:06.380 --> 15:08.491 is a competition based framework that 15:08.491 --> 15:10.547 we're developing in 16th Air Force . 15:10.547 --> 15:12.602 It's , it's centered on the , on the 15:12.602 --> 15:14.658 principles that you heard during the 15:14.658 --> 15:16.824 video . The first one is uh reveal and 15:16.824 --> 15:18.991 conceal is the first half of reveal we 15:18.991 --> 15:21.213 think about that is what capabilities , 15:21.213 --> 15:23.324 what ability to operate as a military 15:23.324 --> 15:25.380 force is the United States Air Force 15:25.380 --> 15:27.380 going to reveal in competition . We 15:27.380 --> 15:29.491 reveal to deter , we reveal , to show 15:29.491 --> 15:31.047 the adversary , this is our 15:31.047 --> 15:33.102 capabilities and this is what we can 15:33.102 --> 15:35.269 bring to the fight . Should you choose 15:35.269 --> 15:37.436 to challenge us in a military manner ? 15:37.436 --> 15:39.640 The second one is conceal , we conceal 15:39.650 --> 15:42.179 these high bespoke and high investment 15:42.190 --> 15:44.580 and high impact capabilities that if 15:44.590 --> 15:46.369 they were to become known . The 15:46.380 --> 15:48.436 adversary may be able to blunt their 15:48.436 --> 15:52.049 effectiveness . So we conceal to defeat 15:52.059 --> 15:54.679 the adversary if we're , once we enter 15:54.690 --> 15:57.309 in a crisis or conflict . The next part 15:57.320 --> 16:00.369 is we expose , we expose for advantage , 16:00.580 --> 16:02.799 we expose to build alliances . We may 16:02.809 --> 16:04.979 expose on the public in the out in the 16:04.989 --> 16:07.211 open information environments or we may 16:07.211 --> 16:09.378 just expose the information we have to 16:09.378 --> 16:11.433 our adversary um to our partners and 16:11.433 --> 16:13.545 allies like we mentioned before . And 16:13.545 --> 16:16.090 then the fourth one is we disrupt to 16:16.099 --> 16:18.739 deny the activities that the adversary 16:18.750 --> 16:21.049 is trying to do . Right now . You saw 16:21.059 --> 16:24.419 the image on the F-22 raptor and the J 16:24.429 --> 16:27.409 35 . We are , we are disrupting those 16:27.419 --> 16:29.141 activities whether as removing 16:29.450 --> 16:31.283 adversary malicious cyber active 16:31.283 --> 16:33.340 infrastructure , removing means to 16:33.349 --> 16:35.640 spread disinformation or misinformation 16:35.650 --> 16:38.190 by external forces that are looking to 16:38.200 --> 16:40.089 seeking to influence our military 16:40.089 --> 16:42.144 members or our population um through 16:42.144 --> 16:44.144 the information environment , we're 16:44.144 --> 16:46.200 partnered together with that and the 16:46.200 --> 16:48.200 interagency as well . So that's how 16:48.200 --> 16:47.554 we're thinking about maturing 16:47.565 --> 16:49.676 information warfare and then you come 16:49.676 --> 16:52.009 back up increasing combat effectiveness . 16:52.009 --> 16:51.755 That's the purpose of the United States 16:51.765 --> 16:53.765 Air Force . It's the purpose of the 16:53.765 --> 16:55.932 Department of Defense . We are here to 16:55.932 --> 16:57.821 engage in combat . Should someone 16:57.821 --> 17:00.043 choose to threaten the interests of the 17:00.043 --> 17:01.821 United States of America or our 17:01.821 --> 17:03.876 partners and allies ? So that's what 17:03.876 --> 17:06.098 it's about in the middle is the Phoenix 17:06.098 --> 17:08.043 initiative is like , OK , how do I 17:08.043 --> 17:09.876 support that ? How do I get with 17:09.876 --> 17:11.709 industry ? How do I partner with 17:11.709 --> 17:13.654 academia in a way that's more than 17:13.654 --> 17:15.321 having good interactions at a 17:15.321 --> 17:17.376 conference . These are valuable . Um 17:17.376 --> 17:19.598 But how do we close on that ? How do we 17:19.598 --> 17:19.359 bring that technology and how do we 17:19.369 --> 17:21.948 become early adopters ? And so that 17:21.958 --> 17:24.180 what we're trying to do there is assess 17:24.180 --> 17:26.555 publish frequent type of engagements 17:26.785 --> 17:29.574 with outcome driven activities that we 17:29.584 --> 17:32.175 can learn by doing at a scale that 17:32.185 --> 17:34.296 enables us to , to be ready to go and 17:34.296 --> 17:36.185 scale if we find something that's 17:36.185 --> 17:38.185 important . When I have an industry 17:38.185 --> 17:40.296 engagement . The first question I ask 17:40.296 --> 17:40.015 is help me write a better and help me 17:40.025 --> 17:42.081 write a better requirement . I don't 17:42.081 --> 17:44.510 necessarily know what the technology 17:44.520 --> 17:46.409 could do . Help me write a better 17:46.409 --> 17:48.464 requirement . Now , we can't write a 17:48.464 --> 17:50.687 requirement that just says , you know , 17:50.687 --> 17:52.742 Kennedy Incorporated is the only one 17:52.742 --> 17:52.449 that can do this thing . We all 17:52.459 --> 17:54.570 understand that in the room . But I'm 17:54.570 --> 17:56.792 looking forward to understand how we do 17:56.792 --> 17:59.015 that as we're going forward . The other 17:59.015 --> 17:58.900 one with academia , we're looking to 17:58.910 --> 18:01.077 how we , how do we partner together so 18:01.077 --> 18:03.380 we can get um with students and the 18:03.390 --> 18:05.770 professors that have life long 18:05.780 --> 18:08.160 experience in the technology and we 18:08.170 --> 18:10.239 bring the use cases and so we can 18:10.250 --> 18:12.417 explore that activity and whether it's 18:12.417 --> 18:14.583 a crater or whether it's other type of 18:14.583 --> 18:16.639 partnership with them , we looked at 18:16.639 --> 18:16.560 how we can leverage those with academic 18:16.569 --> 18:18.670 institutions and then finally , it's 18:18.680 --> 18:21.280 the labs and the R and D . So Air Force 18:21.290 --> 18:23.290 Research Lab we have a great strong 18:23.290 --> 18:25.401 partner system in the Air Force . But 18:25.401 --> 18:24.739 if , when you think about the other 18:24.750 --> 18:26.972 national labs that are out there , that 18:26.972 --> 18:29.550 is also i an untapped potential within 18:29.560 --> 18:31.727 16th Air Force that we are proactively 18:31.727 --> 18:33.949 working um with those lab directors and 18:33.949 --> 18:35.782 we're , we're placing mid career 18:35.782 --> 18:37.893 officers with them to help bring that 18:37.893 --> 18:39.893 back in . And then we're looking to 18:39.893 --> 18:41.671 partner with them where on real 18:41.671 --> 18:43.504 operational challenges , the the 18:43.504 --> 18:45.671 advantage of of labs is nothing new to 18:45.671 --> 18:47.893 the room here is I can partner in a way 18:47.893 --> 18:47.430 they have clearances , they have 18:47.439 --> 18:50.170 facilities . It's fast , it is very fa 18:50.229 --> 18:52.340 it's much faster than if , if we have 18:52.340 --> 18:54.451 an academic institution , unless it's 18:54.451 --> 18:56.451 one of the FFRD CS that are already 18:56.451 --> 18:55.880 there . So that's what we're looking 18:55.890 --> 18:57.834 for now , that's in the innovation 18:57.834 --> 18:59.779 front . The next one is the talent 18:59.779 --> 19:02.819 recruitment . Um Anyone that wants to 19:02.829 --> 19:04.996 join the United States Air Force , see 19:04.996 --> 19:07.218 me after . Um but uh as we're going for 19:07.218 --> 19:09.385 it and we raised our recruiting age of 19:09.385 --> 19:09.209 40 if you're not tracking . So that's 19:09.219 --> 19:11.386 brought a whole bunch of you back in . 19:11.386 --> 19:14.670 Um But we have to find a way to bring 19:14.680 --> 19:17.229 in to make folks excited about um 19:17.239 --> 19:19.461 service in the Department of Defense of 19:19.461 --> 19:21.628 the United States Air Force . And that 19:21.628 --> 19:23.850 is really the key I'm industry . That's 19:23.850 --> 19:23.839 not , it's really the academic 19:23.849 --> 19:25.793 engagement . That's the number one 19:25.793 --> 19:27.682 objective . We may get some other 19:27.682 --> 19:29.849 innovation R and D access to faculty , 19:29.849 --> 19:31.849 great partnership . But it's really 19:31.849 --> 19:33.960 about showing a viable path , whether 19:33.960 --> 19:36.071 it a civilian or uniformed member for 19:36.071 --> 19:35.635 service in the United States Air Force . 19:35.875 --> 19:37.986 And then it's the global research and 19:37.986 --> 19:39.986 development that industry brings um 19:39.986 --> 19:42.153 that we may not have within the United 19:42.153 --> 19:44.375 States Air Force of the department . So 19:44.375 --> 19:44.135 that's how we , that's how we look at 19:44.145 --> 19:46.034 this initiative as we're thinking 19:46.034 --> 19:48.201 through , uh we're 16th Air Forces and 19:48.201 --> 19:50.201 the , and the outcome , the idea is 19:50.201 --> 19:52.145 we're gonna drive mission outcomes 19:52.145 --> 19:54.329 through deliberate engagement to come 19:54.339 --> 19:56.561 to an event like this . We have members 19:56.561 --> 19:58.561 from our Air Force here . They will 19:58.561 --> 20:00.728 have um specific use cases in mind and 20:00.728 --> 20:02.950 it's being driven through our technical 20:02.950 --> 20:02.900 director and all the technical 20:02.910 --> 20:05.170 directors across um the wings . One of 20:05.180 --> 20:07.402 the things that I've asked them to look 20:07.402 --> 20:09.402 at within the Phoenix initiative is 20:09.402 --> 20:11.458 mission resilience . And so when you 20:11.458 --> 20:13.624 think about mission resilience , we've 20:13.624 --> 20:15.847 broke it down into , there's three ways 20:15.847 --> 20:17.791 that we think we could disrupt our 20:17.791 --> 20:19.902 mission . Um And that we need to look 20:19.902 --> 20:19.790 at it . Well , the three disruptors are 20:19.800 --> 20:22.329 adversaries , weather 20:23.089 --> 20:25.300 technology . And so we've broken those 20:25.310 --> 20:27.532 apart and looked at where do we perform 20:27.532 --> 20:29.643 since we're employed in place force , 20:29.643 --> 20:31.866 except for the aircraft that we fly and 20:31.866 --> 20:33.754 we leverage networks and physical 20:33.754 --> 20:33.569 locations . We're like , ok , what , 20:33.630 --> 20:35.574 what are some of the , the weather 20:35.574 --> 20:37.630 trends and patterns that could , the 20:37.630 --> 20:39.852 reason we brought this off at Air Force 20:39.852 --> 20:42.074 Base is one of our , our places off the 20:42.074 --> 20:41.869 Air Force Base got hit with a 500 year 20:41.880 --> 20:44.079 flood about four or five years ago , 20:44.089 --> 20:46.145 maybe a little more wiping out large 20:46.145 --> 20:47.978 portions of the base . And we're 20:47.978 --> 20:50.033 thinking through , ok , where are we 20:50.033 --> 20:52.033 postured in ways where , you know , 20:52.033 --> 20:54.145 river patterns based , uh where we've 20:54.145 --> 20:56.256 built some of our facilities . How do 20:56.256 --> 20:56.150 we look at that adversary disruption ? 20:56.160 --> 20:58.271 Where is the adversary trying to go ? 20:58.271 --> 21:00.493 How could the adversary disrupt ? So we 21:00.493 --> 21:02.716 don't have a single point of failure in 21:02.716 --> 21:04.938 our enterprise . That includes J Wick's 21:04.938 --> 21:07.049 resilience as part of that . And then 21:07.049 --> 21:09.049 the next portion that we look at um 21:09.049 --> 21:10.716 there is uh the technological 21:10.716 --> 21:12.938 disruption , you saw it in the video at 21:12.938 --> 21:12.800 the beginning of the conference , you 21:12.810 --> 21:14.754 know , where could quantum come in 21:14.754 --> 21:16.810 potentially , where could A I and ML 21:16.810 --> 21:18.866 come in and disrupt our mission ? We 21:18.866 --> 21:20.699 want to leverage it ? That's the 21:20.699 --> 21:22.754 portion for the global R and D . But 21:22.754 --> 21:24.699 how do we posture ourselves to see 21:24.699 --> 21:24.640 where , where could this disruption ? 21:24.650 --> 21:26.872 So we're , we're not on the backside of 21:26.872 --> 21:28.761 the curve uh on the late majority 21:28.761 --> 21:30.761 that's adopting the technology that 21:30.761 --> 21:30.739 we're on the front . And we're seeing 21:30.750 --> 21:32.750 where adversary is in that curve as 21:32.750 --> 21:36.459 well . That's the next slide . So in 21:36.469 --> 21:38.739 closing as we think about the future 21:38.750 --> 21:41.300 environment , we talked about um and 21:41.310 --> 21:43.939 how we bring chaos um or sorry , bring 21:43.949 --> 21:46.060 some clarity to chaos , we bring lots 21:46.060 --> 21:48.005 of chaos . Um how we bring uh some 21:48.005 --> 21:49.727 clarity to chaos . It's , it's 21:49.727 --> 21:51.838 important to be ready to leverage the 21:51.838 --> 21:53.949 technology . But when we bring in the 21:53.949 --> 21:56.005 technology , we're constantly asking 21:56.005 --> 21:58.660 how do I arm or how do I train 21:59.530 --> 22:02.880 49,000 airmen to use the technology ? 22:03.530 --> 22:05.697 And how do I , how do I posture myself 22:05.697 --> 22:07.863 and how do we posture our airmen to do 22:07.863 --> 22:10.086 that ? So that's one , anytime we bring 22:10.086 --> 22:09.599 in the capability where there's a net 22:09.609 --> 22:11.776 network , network capability , a cyber 22:11.776 --> 22:13.998 capability in ISR processing , we think 22:13.998 --> 22:15.942 through that portion of the of the 22:15.989 --> 22:18.329 challenge at the same time . Um because 22:18.339 --> 22:20.339 we're without that thinking through 22:20.339 --> 22:22.228 that , we're not gonna get to the 22:22.228 --> 22:24.228 posture we want , but it's highly , 22:24.228 --> 22:26.395 highly necessary . I just want to come 22:26.395 --> 22:28.561 back to three things . My opinion that 22:28.561 --> 22:30.728 we need to do to succeed as we look in 22:30.728 --> 22:32.395 the future in the information 22:32.395 --> 22:32.310 environment as well as any kind of 22:32.319 --> 22:35.469 great power competition or potential 22:35.479 --> 22:37.900 for moving into conflict . One is our 22:37.910 --> 22:40.021 allies and partners , which we talked 22:40.021 --> 22:42.188 about and we talked about the power of 22:42.188 --> 22:44.243 information of girding that up . But 22:44.243 --> 22:44.229 it's really about a level of 22:44.239 --> 22:46.128 interdependence with partners and 22:46.128 --> 22:48.229 allies that we have not done since 22:48.239 --> 22:51.069 world war two . The second piece is 22:51.079 --> 22:53.689 resilience , mission , resilience all 22:53.699 --> 22:57.390 portions airmen processes capabilities . 22:57.739 --> 23:00.510 And the final one is how do we leverage 23:00.520 --> 23:02.969 data and the information it provides to 23:02.979 --> 23:05.380 gain information advantage and decision 23:05.390 --> 23:07.800 advantage as we look into the future 23:07.859 --> 23:09.979 operating environment . So I really 23:09.989 --> 23:12.156 appreciate the time today to , to kind 23:12.156 --> 23:14.322 of let you know a little bit about the 23:14.322 --> 23:14.020 great things that 16th Air Force is 23:14.030 --> 23:16.197 doing . Uh Thank you to Dia for uh for 23:16.197 --> 23:18.420 the invitation and uh please and have a 23:18.430 --> 23:19.829 fantastic conference . Thank you .