Академический Документы
Профессиональный Документы
Культура Документы
TENTH FLEET
Dr. Starnes Walker Technical Director / CTO Fleet Cyber Command
Agenda
Fleet Cyber Command (FCC) /10th Fleet Introduction Technical Director/CTO Role Key Initiatives & Challenges
Unclassified
USCYBERCOM
COMUSSTRATCOM will establish USCYBERCOM DIRNSA is also 4-star Commander, U.S. Cyber Command IOC: Upon CDR confirmation at Ft. Meade, MD FOC: 1 OCT 10 Services will create a component JFCC-NW, JTF-GNO dissolved by FOC
FCC/C10F Mission
Establish Fleet Cyber Command to serve as the Naval component Commander to USCYBERCOM
Central operational authority for Navy networks, cryptology/SIGINT, IO, cyber, EW and space in support of forces afloat and ashore Directs cyberspace operations, to deter and defeat aggression Ensure freedom of action and achieve military objectives in and through cyberspace Organize and direct Navy cryptologic operations worldwide Integrate Information Operations and Space planning and operations
Unclassified
STRATCOM
COCOM
USCYBERCOM
OPCON
NSA
SCC
TYCOMs
SUBFOR AIRFOR SURFOR CYBERFOR NAVSOC
FLTCYBERCOM C10F
Service Employment
NCDOC
NNWC
NIOCs
NCWDG
NCTAMS
Unclassified
Operate - Achieve and sustain the ability to navigate and maneuver freely in cyberspace and the RF spectrum Defend - Actively assuring Navys ability to Command and Control its operational forces in any environment Exploit/Attack - On command, and in coordination with Joint and Navy commanders, conduct operations to achieve effects in and through cyberspace
Title 50 Authority
Title 10 Authority
FLTCYBERCOM C10F
DEFENSE
NETWORKS
R&D
Intelligence
Title 50 USC Analyze network activity of target users and/or computers Analyze network activity of target groups Provide alerts when target users/computers are active Track network usage Determine associations of groups & individuals
Warfighter
Title 10 USC Deny network and/or computer use Degrade network and/or computer use Redirect network traffic Disrupt Destroy
FCC/C10F Commander
Elmendorf
Great Lakes Bremerton Beale AFB Hickam AFB San Diego NCTAMSPAC Pearl Harbor, HI PMRF Kauai Yuma Corpus Christi Fallon
London Columbus Newport Washington Quantico Norfolk Millington Jacksonville Puerto Rico Pensacola San Antonio Rota
Vaihingen Wiesbaden Naples Capodichino Souda Bay Sigonella Cairo Bahrain Misawa Chinhae Atsugi Yokosuka Sasebo Okinawa
Guam Singapore
Diego Garcia
Unclassified
Serve as commands Senior Executive responsible for technical direction Formulate Cyber RDT&E Strategic Programmatic Objectives supporting command mission Identify Cyber technology investment opportunities strengthening Navy Enterprise capabilities & operational/tactical effectiveness Recommend technology policies & standards Enhance teamwork and collaboration strengthening Command structure and cyber strategic deliverables across the DON, OSD, OGAs and Coalition Partners Ensure RDT&E Cyber objectives meet current and future exponentially growing technology advances and threats.
Unclassified
CTF 1090
CO NCWDG Suitland
FCC
CTG 1000.1
NIOC Menwith Hill Station
C10F
CTG 1000.3
NIOC Misawa
CTG 1000.5
NIOC Georgia
CTG 1000.7
NIOC Hawaii
CTG 1000.9
NIOD Yakima
CTG 1030.1
NIOC Norfolk
R&D
C10F
HQ
CTG 1000.2
NIOC Sugar Grove
CTG 1000.4
NIOC Texas
CTG 1000.6
NIOC Maryland
CTG 1000.8
NIOC Colorado
CTG 1000.10
NIOD Alice Springs
CTG 1030.2
NIOC San Diego
CTG 1030.3
NIOC Whidbey Island
CTF 1010
COMNNWC
CTF 1020
CO NCDOC
CTF 1050
CO NIOC Georgia
CTF 1060
CO NIOC Maryland
CTF 1070
CO NIOC Hawaii
CTF 1080
CO NIOC Colorado
CTG 1010.1
NCTAMS LANT
CTG 1020.1
NCDOC
CTG 1040.1
NIOC Texas
CTG 1050.1
NIOC Georgia
CTG 1060.1
NIOC Maryland
CTG 1070.1
NIOC Hawaii
CTG 1080.1
NIOC Colorado
CTG 1010.2
NCTAMS PAC
CTG 1020.2
NIOC Pensacola
CTG 1050.2
NIOC Bahrain
CTG 1060.2
FIOC UK
CTG 1070.2
NIOC Yokosuka
CTG 1010.3
NAVSOC
CTG 1070.3
NIOC Misawa
Unclassified
IDC Data
UNCLAS // FOUO
Agenda
Cyber
SA Initiatives Cyber SA Challenges SCADA & Other Initiatives SCADA & Other Challenges Other Significant Questions
12
SATCOM
SIGINT
GCCS
Vulnerabilities
USS Neversail
Embedded Querys Blue Force Tracks Red Force Tracks Afloat C2 User defined widget dashboard Available Cyber Widgets Widgets created on-the-fly
Available C2 Widgets
Widget Library
UNCLAS // FOUO
13
Numbered Fleet
Naval C2SA
14
Working through pilots to map the Navy network using the following tools;
IPSONAR: implementation-pilot network discovery & mapping tool currently deployed on SIPRNET(Yokosuka, Naples & Bahrain) Everest: implementation-pilot Lawrence Livermore National Laboratory-generated visualization tool employing HBSS agent data Host-Based Security System (HBSS): DoD-standard C4I Host-based Intrusion Prevention System deployed on USN terrestrial and Shipboard C4I NIPR and SIPRNET networks
15
Cyber SA Initiatives
16
Commercial IT companies Telecom Companies can provide high level metrics of the internet slide shows the expected are real usage of commercial IT network Commercial undersea transport locations helped us to expect outages based events such as the Japanese Tsunami
17
Cyber SA Challenges
Cognitive Science & Human Factors
What are the linkages between the data and the actions the operator needs to take or decisions the commander needs to make? How should the data be displayed at for different actions or decisions? How should the data be displayed given different operational (threat) environments? Possibly the most difficult part of developing and maintaining SA Reduce the mass of data into appropriate information sets for display Net sensor data, alarms, net anomalies, packet capture, etc. Sharing/access externally owned data & analytics for this data
18
Cyber SA Challenges
Linking virtual locations to physical locations
If we find a client is not behaving as expected we should be able to see its location on a ship and the location of the ship on a map.
19
Cyber SA Challenges
Ability to afford gaining SA and control of non-SNMP legacy network elements
Analog radios
Extended View of Cyber SA of cyber external to DoD? What is the quantitative level of attacks? Are sections of the worldwide transport damaged or down? Should this be collected & provided at a higher level? Time synchronization of events Transition from awareness to action; automation versus human in the loop
20
21
PLC Controller
Use IA agents & sensors in realtime environments Develop hardening capabilities to encase SCADA systems with a defensive capability without requiring high cost upgrades using existing hardware and minimal operator knowledge. Ability to scan source code of real time systems for vulnerabilities
22
RISC Processor operating in real-time without interrupts Boundary encasing SCADA code to provide security without degradation in speed of actions
23
Redundancy
Maneuver
Deception
Reconstitution
24
25
26
Unclassified