Introducing Kessel Run to DOD

Everyone wants part of the Air Force’s successful software development program

Everyone wants a piece of Kessel Run, the Air Force’s agile software development program, and attempts to replicate its success of are already underway.

Air Force Chief Information Security Officer Wanda Jones-Heath said the Defense Department is taking steps to scale the program, named after a reference in the “Star Wars” movies, with the help of the Department of Homeland Security.

“DOD is stepping up to the table now to guide the services,” Jones- Heath said during a panel discussion at the Armed Forces Communications and Electronics Association’s Air Force luncheon Nov. 16.

“They’ve already taken a lot of the Kessel Run artifacts, the playbook — and there are other services also doing the same thing. We’re looking at how can we scale across the entire DOD enterprise to bring that capability securely into what we do. DOD is already working that; they’ve brought in someone from DHS recently that’s now taking that on.”

More Software Based

The Air Force is in the midst of shifting to being more software based, and to do that, it is considering creating and deploying mini Kessel Runs throughout the service.

“If we’re going to do a DevOps model as we transition to a software- based Air Force, where we’re more software defined, more agile … I can change capabilities via an aircraft out there,” such as a sensor, shooter or network node, Brig. Gen. Kevin Kennedy, Air Force director of cyberspace strategy and policy, said during the panel discussion.

To get the software to that level, Kennedy said, three elements are needed: an operator—air, cyber, or space—an acquisitions expert and a coder all with proficiency in software development. The Air Force hasn’t made any decisions yet, Kennedy told reporters following the event, and conversations about how to scale Kessel Run focus on how to mobilize the right problem solvers when needed.

“The idea is if a problem presents itself—an operational capability that we want to evolve or change—how would we put the right people on it,” he said. “Right now we have Kessel Run, we operate that activity.... That’s the concept, but we haven’t fleshed it out yet.”

To identify capabilities within its members, the Air Force is building a program to identify service members with programming skills—modeled on a similar one for language skills—that would allow “immersion opportunities” to hone those skills, Kennedy said. The challenge is keeping up with the constant evolution and change of programming languages.

Merging Intel and Communications

The Air Force is also considering merging its Intelligence, Surveillance, and Reconnaissance branch (A2) with its chief information office (A6) to better prepare for information warfare.

Kennedy said the service is still talking about combining the two components despite not having an official CIO. The idea would be to create seams between IT network operations, defensive cyber operations and network defense to better ensure information sharing and deliver cyber effects.

“We want to do this, but I want to emphasize that we are also in a place where we have to rely on the nomination/confirmation of a new leader and new roles and responsibilities,” Kennedy said.

Right now, Air Force Undersecretary Matthew Donovan is acting in the CIO role, with William Marion as deputy CIO and Lt. Gen. Veralinn Jamieson as head of ISR.

As the Air Force moves forward, Kennedy said, the service must determine how get “better postured for information warfare and what capabilities we can focus on creating cyber effects. If we can get better at information warfare, then how do we move toward information dominance as we look at becoming a software-driven Air Force.”

This article originally appeared in the January/February 2019 issue of Security Today.

About the Author

Lauren C. Williams is a staff writer at FCW covering defense and cybersecurity.

Featured

  • Tradeshow Work Can Be Fun

    While at ISC West last week, I ran into numerous friends and associates all of which was a pleasant experience. The first question always seemed to be, “How many does this make for you?” Read Now

    • Industry Events
    • ISC West
  • New Report Says 1 in 5 SMBs Would Be Forced to Shutter After Successful Cyberattack

    Small and medium-sized businesses (SMBs) play a crucial role in the U.S. economy, making up 99.9% of all businesses and contributing to half of the nation's GDP. However, these vital economic growth drivers face an escalating threat—cyberattacks that could put them out of business. Read Now

  • The Yellow Brick Road

    The road to and throughout Wednesday's and Thursday's ISC West was crowded but it was amazing. Read Now

    • Industry Events
    • ISC West
  • An Inside Look From Napco at ISC West

    Get a look into the excitement at ISC West 2025 from Napco. Hear from some of their top-tech executives live from the show floor. Read Now

    • Industry Events
    • ISC West
  • Upping the Ante

    I am not a betting man in terms of cards, dice, blackjack or that wheel with the black marble racing around the circumference of a spinning wheel, but I would bet on the success of ISC West this year. Read Now

    • Industry Events
    • ISC West

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.