U.S. Air Force Fact Sheet
AFRL/RI CORE TECHNICAL COMPETENCIES (CTCS)

Advanced Computing Architectures: Exploring computer architectures with greater capability, sophistication and openness for addressing dynamic mission objectives under constraints imposed by C4 ISR, and strike systems in order to establish, maintain, and exploit information superiority. Advanced Computing Architectures includes the interplay of computational models, hardware, and software.

Programs:
Architectures for Cognitive Systems
PetaFlop Embedded Processing on Demand
Quantum Computing
Software Intensive Systems
Embedded Technology Development
HPC SWAPA
SBIRS-Hi Risk Reduction
100K Infosphere

Command and Control: Exercise of authority and direction by a properly designated commander over assigned and attached forces in the accomplishment of the mission. Command and control functions are performed through an arrangement of personnel, equipment, communications, facilities, and procedures toward the accomplishment of the assigned mission. Provides decision-support capabilities to the warfighter in order to rapidly accomplish the mission (e.g. reduce the "kill chain" timeline).

Programs:
Cascading COA Reasoner
Alternate Mission Planning Techniques
CPE
Effects Assessment Methodology
Full Spectrum Force Syncronization
ACUMEN
Causal Analysis Mehtods
DASEA
GRAS
JASMAD
TTWC

Connectivity: Ground, air and space seamless communication to ensure the warfighter's information is available all the time, everywhere. Provides assured global interoperable, protected communications enabling timely information access and dynamic bandwidth allocation. Additionally, composed of Information Transmission, Airborne Networking and Enterprise Management functions.

Programs:
Next Generation On-board Comm
Assured Access Anti Jam Comm
BATNET
Cognitive Network Nodes
I2RAN
JCAN
NetOps Management
Assured, Load-balancing Enterprise
Modeling Cyber Effects
TCATS

Cyber Operations: Capabilities providing for a superior defense of the United States' critical information infrastructure required to control the information space. These capabilities include: protecting our own information space, detecting intruders and anomalous conditions, denying the adversary that same control, analyzing and correlating information to understand attack sources and intent, and properly, responding to malicious intrusion attempts to deny the adversary that same control and determining courses-of-action. The development of this comprehensive understanding, and the subsequent translation of it into a scientific discipline of information operations, becomes the basis for achieving Information Superiority/Dominance. The achievement of cyber-superiority comes through agile, dynamic and integrated defense, attack and exploitation of the information battlespace, seamlessly integrated with kinetic and other operations.

Programs:
Autonomic Response
Cyber Delivery of PsyOps
Cyber IPB (Intel Prep of Battlespace)
Cyber Tracking Technology
D5 Info Systems/Affect Humans
Defensive COA Development
Persistence
Proprietary Hardware/Software Systems Analysis
Red System Pub/Sub Architecture
Remote Access Tools
Self-Regenerating Incorruptible Enterprise
Wireless IA
Defensive Cyber Craft
Global Cyber Situational Understanding
Net-Centric Aware Cyber Defense
CyberCraft XC -03
Secure Data Sharing

Information Exploitation: Signals Intelligence, Imagery Intelligence, and Measurements Intelligence. Information dominance through the research and development of advanced technologies which intercept, locate and process raw data from intelligence collection sensors. The technologies developed address improved sensor collection and accurate location, extraction, analysis and correlation of both parametric and intelligence information for input to fusion, information understanding, and decision-making processes.

Programs:
Synergistic Airborne/Ground Geo-Location
Channelized Personal Comm System Exploitation
Multi-Sensor MASINT Signal Collection

Information Fusion and Understanding: The continuous process that provides world-wide situational awareness in order to enable decision superiority. Research, develop, integrate and test innovative technologies that enable continuous assessment of global conditions and events; that establish and maintain battlespace situational awareness, including an understanding of adversarial capabilities and intent; and that locate, identify, and track red, blue, green, and gray forces anywhere, anytime in near real-time.

Programs:
Continuous Predictive Battlespace
Futurecaster
Object Track & /ID
Situational Analysis
Knowledge BOT
Continuous Predictive Battlespace
FASTER
Model Comprehension & Analysis
Self Learning Sensitivity Analysis <

Information Management: Ensure information superiority by providing universal access to information in a tailorable information environment orchestrated to meet the enterprise objectives that continuously adapt to a changing operational environment. This will allow warfighters the ability to find and obtain information in the right format and level of granularity in time, based upon resources and priorities to support Communities of Interest (COIs) and enterprise processes and workflows. The IM focus area is further broken down into four initiatives--universal access, tailorable information environment, continuous adaptation to operations environment, and the orchestrated information environment.

Programs:
Agile Information Environment
Brokered Federated Info Spaces
Content Aware Info Mgt
Installation Command System
Polymorphic Services
Secure Data Sharing





For additional information please contact the AFRL/RIB Strategic Planning & Integration Division at:

E-mail: RIB@rl.af.mil
Phone: (315) 330-2041
DSN: 587-2041
Fax: (315) 330-2065
DSN Fax: 587-2065