SPAWAR Systems Center (SSC) Pacific Unmanned Vehicle (UV) - - PowerPoint PPT Presentation

spawar systems center ssc pacific unmanned vehicle uv
SMART_READER_LITE
LIVE PREVIEW

SPAWAR Systems Center (SSC) Pacific Unmanned Vehicle (UV) - - PowerPoint PPT Presentation

SPAWAR Systems Center (SSC) Pacific Unmanned Vehicle (UV) Information Assurance (IA) Support 15th Annual INCOSE Region II Fall Mini-Conference 30 October 2010 John Yen Jason Ricks Unmanned IA Support Team SSC Pacific SSC Pacific Key


slide-1
SLIDE 1

SPAWAR Systems Center (SSC) Pacific Unmanned Vehicle (UV) Information Assurance (IA) Support

15th Annual INCOSE Region II Fall Mini-Conference 30 October 2010

John Yen Unmanned IA Support Team SSC Pacific

619-553-9404 john.yen@navy.mil

Jason Ricks SSC Pacific Key Management Architectures and Information Systems Branch Head

jason.ricks@navy.mil

Statement A: Approved for public release; distribution is unlimited.

slide-2
SLIDE 2

Statement A: Approved for public release; distribution is unlimited.

2 2

Agenda

▼ Background ▼ Assumptions ▼ DoD Encryption Policy for UAS ▼ Certified Cryptography in UV Environments ▼ Cross Domain Issue ▼ Data at Rest (DAR) ▼ Summary

slide-3
SLIDE 3

Statement A: Approved for public release; distribution is unlimited.

Excerpt from the Wall Street Journal

▼ Senior defense and intelligence

  • fficials said Iranian-backed

insurgents intercepted the video feeds by taking advantage of an unprotected communications link in some of the remotely flown planes' systems. Shiite fighters in Iraq used software programs such as Sky-Grabber -- available for as little as $25.95 on the Internet -- to regularly capture drone video feeds, according to a person familiar with reports on the matter.

3

▼ WASHINGTON -- Militants in Iraq have used $26 off-the-shelf software

to intercept live video feeds from U.S. Predator drones, potentially providing them with information they need to evade or monitor U.S. military operations. - Wall Street Journal, 17 December 2009

slide-4
SLIDE 4

Statement A: Approved for public release; distribution is unlimited.

4

Who We Are, How We Can Help

▼ SSC Pacific IA & Engineering Division provides

acquisition program IA and systems engineering support for Navy and other activities to include:

  • Cryptography and Key Management Architectures
  • Certification & Accreditation (C&A)
  • Computer Network Defense (CND)

▼ Currently supporting 3 Navy programs deploying

Unmanned Vehicles (UV)

  • Common IA lessons learned from these UV implementations
slide-5
SLIDE 5

Statement A: Approved for public release; distribution is unlimited.

5

Dynamic Computer Network Defense, Harry Jones Assured Information Sharing, Mike Lee Network Security Engineering Services and Operations, Jorge Alvarez Certification and Accreditation Engineering Services, Gleason Snashall

Computer Network Defense and Cyber Security Information Assurance System Security Engineering

Key Management Architectures and Systems, Jason Ricks Cryptographic Systems and Solutions, Jorge Alvarez

Cryptographic and Key Management

DEPUTY FOR OPERATIONS Elisa Wing RESOURCE MANAGEMENT Raquel Gensler DEPUTY FOR PROGRAM DEVELOPMENT

Bette Fondas

TECHNICAL STAFF Gary King, Brian Shaw, Brian Whyte, Larry Willits

Information Assurance and Engineering Division Elissa Huffstetler Assured Identity & Cyber Defense Engineering, Vic Beach

SSC Pacific Information Assurance (IA) Division

slide-6
SLIDE 6

Statement A: Approved for public release; distribution is unlimited.

6

▼ SSC Pacific provides IA and cryptographic systems

engineering support to NAVSEA PMS 420 for the Littoral Combat Ship Mission Modules (LCS MM)

▼ Mine Countermeasures (MCM) Mission Module

includes two UVs

6

Littoral Combat Ship (LCS) Mission Modules (MM)

MCM Unmanned Surface Vehicle (USV) Remote Multi-mission Mine-hunting Vehicle (RMMV)

slide-7
SLIDE 7

Statement A: Approved for public release; distribution is unlimited.

7

▼ SSC Pacific provides IA and cryptographic systems

engineering support to NAVAIR PMA 262 for the Broad Area Maritime Surveillance (BAMS) Unmanned Aircraft System (UAS)

7

BAMS UAS

slide-8
SLIDE 8

Statement A: Approved for public release; distribution is unlimited.

8

▼ SSC Pacific also provides IA and cryptographic systems

engineering support to Office of Naval Research (ONR) for the Large Displacement Unmanned Underwater Vehicle (LD UUV)

8

LD UUV

slide-9
SLIDE 9

Statement A: Approved for public release; distribution is unlimited.

9

Assumptions

▼ Information onboard UV is National Security Information (NSI)

  • NSI: Information that has been determined, pursuant to Executive Order 12958 (as

amended) or any predecessor order, to require protection against unauthorized disclosure – CNSSI 4009, June 2006

  • National Security Agency (NSA) is the single authority for cryptography protecting

national security systems − Executive Order 12333, 04 December 1981 − National Security Directive 42, 05 July 1990 ▼ NSI stored, processed, transmitted and/or received onboard UV must be

protected in accordance with its classification level:

  • Classified information must be protected with Type 1 (NSA) cryptography
  • Unclassified sensitive NSI must be protected with Type 2 (NSA) cryptography
  • Unclassified US government information can be protected with Type 3 (National

Institute of Standards and Technology (NIST)) cryptography

  • Categories defined by CNSSI 4009

▼ Protection of NSI onboard UV must be approved by the Navy through the DoD

Information Assurance Certification & Accreditation Process (DIACAP)

  • DODD 8500.1, 24 October 2002
  • DODI 8500.2, 06 February 2003
slide-10
SLIDE 10

Statement A: Approved for public release; distribution is unlimited.

10

DoD Encryption Policies for Unmanned Aircraft Systems (UAS)

▼ Cryptographic Methods for Protection of Unmanned

Aircraft Systems (UAS) Wireless Communications

  • Classified ASD NII policy memo dated 06 Aug 2009

− Applicable to Airborne UVs only

  • Establishes encryption solutions for protection of DoD UAS

wireless communications in new DoD developments

▼ Encryption of Imagery Transmitted by Airborne Systems

and Unmanned Aircraft Control Communications

  • DoD Instruction currently being staffed at OSD

− Approval at end of 2010?

slide-11
SLIDE 11

Statement A: Approved for public release; distribution is unlimited.

11

Certified Cryptography in UV Environments

▼ Cryptographic devices previously certified by NSA were

based on expectations that they would be operated in controlled environments

  • Radio rooms, command posts, manned aircraft

▼ The UV environment was not “anticipated” in prior NSA

cryptographic certifications

  • Cannot remove and smash Crypto Ignition Key (CIK) on a UV
  • How to implement a remote/autonomous key zeroization process

− Emergency key and related data zeroization

▼ NSA will reassess earlier cryptographic certifications with

respect to the UV environment

  • NSA triage process for validated requirements

− Will NSA allocate resources to support the requirement?

  • Security engineering assessment of UV environment
slide-12
SLIDE 12

Statement A: Approved for public release; distribution is unlimited.

12

Cross Domain Issue

▼ Desire to control unclassified devices (radio, antenna,

sensor, etc…) from a classified network

▼ This is a cross domain issue since plaintext information

is moving between classified and unclassified domains

  • Capability to access or transfer information between two or more

security domains – CNSSI 4009, June 2006

  • High Assurance Guard (HAG) such as Radiant Mercury is overkill

given the low risk level

▼ Working with Navy Cross Domain Solutions Office

(NCDSO) towards a Very Low Attack Risk (VLAR) cross domain filter

  • Information being transferred is usually limited in size
  • Information being transferred is usually well formatted
  • Risk level is generally low
slide-13
SLIDE 13

Statement A: Approved for public release; distribution is unlimited.

13

Example Basic Functional Diagram

▼ Management & control information must be plaintext for

radio and antenna switch to understand commands

  • Cannot go through the network encryptor

▼ Example has 2 cross domain points

  • Controls to Radio (Hub)
  • Controls to Antenna Switch

Secret Controls Secret Data Radio HUB Antenna Switch Antenna IP-Serial Converter PT Control Serial PT Control IP CT Data IP PT Data IP Analog Analog CT Data IP RED=Classified Black=Unclassified Network Encryptor PT Control IP PT Control IP Antenna PT = Plaintext = Unencrypted CT = Ciphertext = Encrypted

slide-14
SLIDE 14

Statement A: Approved for public release; distribution is unlimited.

14

Example Solution Architecture

▼ Single cross domain filter that supports

IP-only traffic

  • Potential addition of a classified hub
  • Potentially more complicated unclassified

network connectivity or mapping to support two paths

Secret Controls Network Encryptor Secret Data Radio HUB IP-Serial Converter CT Data IP PT Data IP Analog IP Filter PT Control IP HUB PT Control IP CT Data IP PT Control IP PT Control IP PT Control IP PT Control IP Antenna Switch Antenna Analog Antenna PT = Plaintext = Unencrypted CT = Ciphertext = Encrypted RED=Classified Black=Unclassified

slide-15
SLIDE 15

Statement A: Approved for public release; distribution is unlimited.

15

Data at Rest (DAR)

▼ Classified data collected and stored on UV risks

compromise if the UV is lost or captured

  • Imagery, ELINT collections, processed information
  • NSA cryptographic devices generally protects only data in

transit (COMSEC and TRANSEC)

  • Zeroization generally applies to small amounts of data

− Crypto key material − ELINT processing algorithm databases

  • Insufficient power or time to wipe potentially gigabytes of data

▼ Data at rest protection is needed to ensure that classified

data is not exposed if UV is lost or captured

  • Encrypt stored DAR
  • Ensure DAR encryption keys are zeroized on UV loss or

compromise

slide-16
SLIDE 16

Statement A: Approved for public release; distribution is unlimited.

16

Summary

▼ Developers of DoD UVs need to consider these IA

systems engineering issues and work towards solutions acceptable to the approving authorities

  • SSC Pacific IA Division can provide technical expertise to help

resolve these issues

  • John Yen

− 619-553-9404 desk − 619-888-0302 cell − john.yen@navy.mil − yen@spawar.navy.smil.mil − yenj@spawar.navy.ic.gov