Lockheed Martin supports real-time ISR for Red Flag
The Distributed Common Ground Station Imagery (DCGS-I) mobile test bed modernised by Lockheed Martin in 2012 has been used to provide advanced exploitation of intelligence, surveillance and reconnaissance (ISR) capabilities during the US Air Force aerial warfare Red Flag exercise.
The DCGS-I is used by the US Department of Defence to test ISR capabilities prior to their introduction into an operational environment. During Red Flag, live imagery from manned and unmanned aircraft was disseminated in near real-time to the DCGS-I at a ‘level never before achieved’, the company said.
Lt. Col. Christopher Reiz, the 526th Intelligence Squadron commander, said: ‘Red Flag was a huge success, and a large chunk was due to the DCGS-I capabilities. DCGS-I was a critical part of our High Altitude mission and pivotal to the successful execution of reconnaissance missions and in providing realistic combat training.’
Red Flag exercises are realistic aerial war games intended to prepare pilots from the US, NATO and other allied countries for combat situations. According to Lockheed Martin, this is the first time that the US Air Force brought together not just the platform and supporting sensors, but also the analysis of the collected intelligence data, as well as the communications paths upon which the data travels.
Jim Quinn, vice president of C4ISR systems for Lockheed Martin Information Systems & Global Solutions, said: ‘This is a major step forward in exploring the true potential of real-time intelligence. The value that analysing and sharing ISR data offers for success in future conflicts is clear: a holistic understanding of a complex battlespace.’
During Red Flag, raw intelligence from manned and unmanned ISR assets was sent to DCGS-I, which served as the primary data link, processor, and delivery mechanism for the Synthetic Aperture Radar (SAR) imagery taken from the U-2, as well as the backup data link for the SAR and infrared imagery taken by the Global Hawk. Analysts reviewed the data, and in collaboration with the Air Operations Center, sent the intelligence products to users, allowing for a more effective prioritisation of combat assets.
Users from dissimilar classification environments were able to review imagery gleaned from the airborne platforms through the use of Lockheed Martin's cross domain solution Trusted Manager (TMAN). TMAN automatically disseminated imagery from the secret DCGS-I environment to the top secret Air Force common workstations, allowing airmen to work seamlessly at both the secret and top secret security levels.
More from Digital Battlespace
-
AUSA 2024: General Micro Systems adds four new products to the X9 Spider family
The airborne three-domain, the two ground-based and the ¼ ATR OpenVPX-based cross-domain systems were engineered to provide real-time security across multi-domain operations.
-
BAE Systems gets go-ahead for second phase of mission communications programme
DARPA’s Mission-Integrated Network Control (MINC) programme was set up to develop an autonomous tactical network and enable critical data flow in contested environments.
-
Just Released: Space Technology Report
Why space is an essential part of modern military capabilities
-
Work-from-home warfare: the power of mixed reality
Defence-secure mixed reality headsets can save hours, or even weeks, of travel time to fix defunct equipment or get subject experts effectively “on-site” where they are needed.
-
Northrop Grumman receives follow-on contract for CUAS and C-IED systems
The Joint Counter Radio-Controlled Improvised Explosive Device Electronic Warfare (JCREW) counter-improvised explosive device (C-IED) and Drone Restricted Access Using Known Electromagnetic Warfare (DRAKE) counter-UAS (CUAS) systems are mounted and dismounted RF jammers.
-
Adarga’s Vantage AI software selected for UK Strategic Command’s Defence Support
Adarga’s Vantage information analysis tool is in service with the UK MoD and individual UK forces. It builds on the company’s Knowledge Platform which processes, organises and analyses open source material, as well as information held by the user’s military, security and intelligence services.