Ble lending Cyber Effects in into Liv ive, Vir irtual and Constructive Sim imulation
April 29, 2020 Presenters
Daniel J. Lacks, PhD Chief Scientist Stephen Lopez Senior Program Manager
DRAFT 1-6-20
With help from
DRAFT 1-6-20 Ble lending Cyber Effects in into Liv ive, Vir - - PowerPoint PPT Presentation
DRAFT 1-6-20 Ble lending Cyber Effects in into Liv ive, Vir irtual and Constructive Sim imulation April 29, 2020 Presenters Stephen Lopez Daniel J. Lacks, PhD Senior Program Manager Chief Scientist With help from Introduction A
April 29, 2020 Presenters
Daniel J. Lacks, PhD Chief Scientist Stephen Lopez Senior Program Manager
With help from
product brochures surprisingly did not include the word “cyber” [1-12].
cyber despite not advertising. Have we not prioritized cyber training for…
communications, situational awareness, and planning equipment?
effectiveness?
including kinetic and non-kinetic effects in your LVC exercises
conduct defensive and offensive cyber operations. It also includes the impacts of stimulating and being affected by cyber actions.
exploit kinetic effects
Cyber Actions
Operations
Operations
Leadership Kinetic and Non-Kinetic Effects
Impacts
TODO Include a graphic of echelons where kinetic LVC training focuses juxtaposed against where operational cyber exists
Simulation Type Kinetic M&S Use Case Cyber M&S Use Case Live A real tank on a training range. Primary user interface is the actual tank controls Real OCO or DCO tactical kit (HW and SW) operating within a cyber range. Inclusive of virtualized instances of physical devices Virtual A tank simulator with physical or virtual user interface executing in simulated 3D graphical environment Emulated OCO or DCO tactical kits operating within a cyber range
*Emulated tactical kits offer no training value over operational equipment, and other similarities make this redundant to the live domain
Constructive A computer generated forces (CGF) simulation of a tank unit operating on a virtual terrain with a desktop based point and click interface Software models that represent or enable cyber operations. Includes automated BLUFOR and OPFOR models, user emulation, traffic generation, etc.
cyber effects into C2 simulation including kinetic and non-kinetic effects through interoperability. This research suggests a similar approach for an LVC environment.
(NKE)
kinetic effects and impact the cyber actions
cyber personas, and other networked entities that comprise, supervise, and control cyberspace
address gaps
Kinetics modeled in VBS3 and
CERT’s STEPfwd cyber simulator with a VBS3 and CyberSAF/OneSAF kinetic simulators
and kinetic operations using a simple interoperability approach with only three elements to conduct a variety of missions in the data model:
accessing physical facilities, cyber attacking infrastructure and modeling the impacts in the kinetic world, avoiding detection at enemy checkpoints, defending friendly networks and intel assets, defending communications systems, and more.
communications between kinetic and cyber forces, realizing the impacts of SCADA attacks, advantages to capturing video feeds, and improving combat power and effectiveness with cyber operations
SCADA systems modeled in STEPfwd
System State Value
SQL Injection Video Feeds CyberSAF/OneSAF
interoperate cyber using DIS IEEE Std 1278.1- 2012 PDUs
enemy information and decision making while protecting friendly information operations
defining the interoperability business logic for IO attackers and targets
pre-exercise
Warfare Type Enumerations:
attack profile and effects start and end
degraded, disrupted
Cyber Action Simulator Kinetic Simulator IO Action - MILDEC Doxxing operation exposes PII PII used to crack password Access gained to power plant network Controls compromised, power disabled Special Forces maneuver to Landing Zone Special Forces launch UAV UAV captures video of enemy patrol Special Forces plans route to hostage Street lights disabled, Special Forces move RED Attack, BLUE Defend UAV feed Updated SA, Special Forces change course Access gained to warehouse network Warehouse camera feed extracted Special Forces arrive, stay on alert IO Action - MILDEC Building layout and hostage location shown Special Forces don night vision goggles SCADA compromised IO Action - MILDEC Warehouse lights out Special Forces enter building, engage enemy Monitor camera feeds, provide SA IO Action - CNO IO Action - CNO IO Action - MILDEC Network closet collaterally damaged Special Forces kill enemies, rescues hostage IO Action - MILDEC Camera feeds denied to RED and BLUE
Specification for Cloud Applications (TOSCA) Language
simulators and cyber training ranges can use to create cyber terrain for L, V, or C simulation
system, etc.)
scripts (for configuration), etc.)
capabilities
complicated
countermeasures between simulation and C2 systems. In seeking a parallel LVC standard, an industry standardized data model exists to link cyber effects with kinetic and NKE actions using DIS IO Action and report SA using IO Report PDUs.
within its simulators/tools and interoperate with cyber action simulators
scope of cyber training to practical operations
experimentation, wargaming, and other use cases