Threats to Fiber- Optic Infrastructures



Similar documents
Fiber-Optic Networks: Is Safety Just an Optical Illusion?

Attaching the PA-A1-ATM Interface Cables

Net Optics Learning Center Presents The Fundamentals of Passive Monitoring Access

SECURITY FOR TODAY S PHYSICAL NETWORK AND DATA TRAFFIC

Dr. Emmanuel Hooper, PhD, PhD, PhD Presentation title SUB TITLE HERE National Broadband Plan Public Safety and Homeland Security Workshop

Market Central

State of Texas. TEX-AN Next Generation. NNI Plan

Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer

Fail-Safe IPS Integration with Bypass Technology

Network Design. Yiannos Mylonas

Cabling & Test Considerations for 10 Gigabit Ethernet LAN

Carrier Ethernet: New Game Plan for Media Converters

Upgrading Path to High Speed Fiber Optic Networks

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

domain is known as the high side, and the less secure domain is the low side. Depending on the application, the

Network Monitoring - Fibre TAP Modules

Security and Risk Analysis of VoIP Networks

Increase your network s security by making the right premise cabling decisions

Interceptor Optical Network Security System. Design Guide. Chapter 4: INTERCEPTOR Optical Network Security System Alarmed Carrier PDS

THREATS AND VULNERABILITIES FOR C 4 I IN COMMERCIAL TELECOMMUNICATIONS: A PARADIGM FOR MITIGATION

Optimizing Infrastructure Support For Storage Area Networks

Fibre Channel Fiber-to-Fiber Media Converters

CCNA Discovery Chapter Four

Security for 802 Access Networks: A Problem Statement

NSA Surveillance, National Security and Privacy

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Guide to Industrial Fiber Optics

MTS/T-BERD Platforms Very Long Range (VLR) OTDR Module

FIBER OPTIC SYSTEM TEST PROCEDURES

Migration to 40/100G in the Data Center with OM3 and OM4 Optical Connectivity

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

The Truck Roll; why it shouldn t be the first choice response to trouble

NXU RoIP Link to Eliminate Voice-Grade Leased Line

Notes on Network Security - Introduction

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

T.38 fax transmission over Internet Security FAQ

Network Monitoring White Paper

Design Guide. SYSTIMAX InstaPATCH 360 Traffic Access Point (TAP) Solution.

Special Topics in Security and Privacy of Medical Information. Reminders. Medical device security. Sujata Garera

How To Use A Network Instrument Ntap

Building A Secure Microsoft Exchange Continuity Appliance

How to Solve the Most Persistent Problem in Perimeter Security Systems

How To Create An Intelligent Infrastructure Solution

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Security Issues with Integrated Smart Buildings

Optical Network Management System. Remote Testing, Network Monitoring, and Service Provisioning Solution for High-Quality Network Performance

Ixia Net Optics 10G Regen Tap

Ethernet 301: 40/100GbE Fiber Cabling and Migration Practices

Acterna DSL Services Tester TPI 350+ Application Highlights

Fiber Distributed Data Interface

Best Practices for Ensuring Fiber Optic System Performance. David Zambrano

Data Center Design for 40/100G

2-Pair HDSL1 Adtran Fiber Optic Link System

Considerations for Hybrid Communications Network Technology for Pipeline Monitoring

1.Context What is the problem with current cryptographic techniques? Current Quantum Key Distribution (QKD)... 4

Networking Devices. Lesson 6

Technical Description U00980 Revision 2

The 8-Fiber Solution for Today s Data Center

Introduction to Optical Networks

Gigabit Ethernet Copper-to-Fiber Converters

How To Get The Most Out Of A Pon From Commscope

Securing the Intelligent Network

Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking

Cyber Threats in Physical Security Understanding and Mitigating the Risk

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Nexus Technology Review -- Exhibit A

How To Monitor A Network With A Network Probe

10GbE Implementation Architectures

Chap. 1: Introduction

WHITE PAPER. Network Traffic Port Aggregation: Improved Visibility, Security, and Efficiency

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW

Intelligent Routing Platform White Paper

CADDSTAR V7.0 FEATURES AND FUNCTIONALITY

DVI Extender via 4 fiber channel LC Duplex Connector Extends DVI connection up to 500 meters

RLH 2 Wire Digital Phone Fiber Link Card System

Network Management and Monitoring Software

Access Mediation: Preserving Network Security and Integrity

Your single source for network transmission solutions.

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Network Instruments white paper

OFM-500 Optical Fiber Mapping Software. A complete software application for managing documentation in fiber optic plants

White Paper VoIP Crash Phone Systems

Region 10 Videoconference Network (R10VN)

Industrial RS-232/ RS-422/ RS-485 over Ethernet Media Converter

WaveReady CFM. Optical Link Monitoring System: Continuous Fiber Monitor

Security Policy JUNE 1, SalesNOW. Security Policy v v

Security for Ad Hoc Networks. Hang Zhao

Transcription:

Threats to Fiber- Optic Infrastructures A Blackhat Federal Briefing 1-2 October, 2003 0

TOC Introduction to Fiber Network Infrastructure Technology Threats Tapping [A Demo] Defending Fiber Infrastructures Physical Security Defenses Conclusion Q&A 1

Your Presenters Mark Gross [Opterna] Vice President mgross@epix.net www.opterna.com Robert J. Bagnall [idefense] Dir, Intel Ops rbagnall@idefense.com www.idefense.com 2

Perceptions Item Washington Technology, April 10, 2003 Running a continuous strand of fiber also assures that a fiber optic line has not been tapped into a bonus of security conscious agencies. 3

Threats 4

Threats ComputerWorld April 2003 Tapping fiber optic cable without being detected, and making sense of the information you collect, certainly isn t trivial, but has been done for the past seven or eight years. Gartner Group 5

Intrusion Eavesdropping Injection Phone Fax Video teleconference Data Integrity Attacks 6

Intrusion 1. Eavesdropping Case Study The Wolf Report March 2003 Security forces in the US discovered an illegally installed fiber eavesdropping device in Verizon s optical network. It was placed at a mutual fund company shortly before the release of their quarterly numbers. Baghdad April 6, 2003 - Fox News 2. Injection Case Study FAA 7

Assessing the Security Threat Assessing TV show Alias - the fall, Security 2002-3 rd episode Threat Item CIA agent Sidney Bristow is sent off on a mission with a device that will be used to tap SD-6 s fiber optic cable 8

Assessing the Security Threat Tom Clancy s new book, Cutting Edge, March-2003 -Premise is that a submarine fiber optic cable will be tapped and the information mined for a profit 9

Assessing the Security Threat The concept and practice of tapping secretly into a fiber optic cable, wherever it is, has become part of the lexicon- a standard mode of operation, to be discussed and considered as a legitimate method to gather information. 1 0

Introduction to Fiber Network Infrastructure Technology 1 1

US Fiber Facts There are over 90 million miles of single-mode fiber in the US alone Only 25% is currently lit 90% of the installation has occurred since 1996 Technology advances increase data transport capacity on fiber exponentially on an annual basis 1 2

US Fiber Facts FO networks form the backbone of the US communications infrastructure Recent technology advances have resulted the ability to easily and inexpensively tap an FO cable US military, intelligence, law enforcement, and financial services information run on fiber, and are thus exposed 1 3

Fiber: The Basics Multimode Single mode Electrical-Optical Conversion 1 4

Structure of a Fiber Optic Cable 1 5

Structure of a Fiber Optic Cable 1 6

Assessing The Security Threat By design, optical systems have wide optical budgets. A well designed fiber link can experience a wide variety of optical anomalies with no data loss, bit errors, signal failures, or network warnings whatsoever. Local Equipment Tx Rx Transmit power = -10 dbm Receive sensitivity = -32 dbm Duplex fiber link Link loss = 14 db Local Equipment Rx Tx Margin = 8 db! 1 7

Threats ComputerWorld April 2003 Fiber optic cables can be easily intercepted, interpreted, and manipulated using standard off-the-shelf equipment that can be obtained legally throughout the world. More important, the vast majority of public fiber networks do not incorporate methods for detecting optical taps, offering an intruder a relatively safe way to conduct corporate espionage. 1 8

Tapping [The Basics] 1 9

Active Fiber Tapping WSJ May 2001 former intelligence officials confirmed that NSA technicians used a special submarine to tap into a fiber-optic cable on the seafloor in the mid-1990s, around the same time that fiber amplifiers began displacing electro-optic amplifiers. The sub supposedly had a special compartment into which the cable could be hauled, enabling technicians to install the tap. IEEE June 2003 Further evidence of the NSA s ability to tap undersea fiber-optic cables and its intention to go on doing it is a $1B project at Electric Boat in Groton, Connecticut, to outfit a new Navy submarine, the USS Jimmy Carter, with a special 45-meter-long section. The Navy has never disclosed the exact purpose of the expensive addition to the $2.4B sub, but most observers believe it is to tap undersea fiber-optic cables. 2 0

The Tap It It has has been shown that that an an intruder can can easily tap tap a fiber fiber line line without being detected through the the use use of of a low-cost Clip-on Coupler 2 1

The Tap Commercially available taps taps are are readily available that that produce an an insertion loss loss of of 3 db db which cost cost less less than than $1000! Taps Taps currently in in use use by by state-sponsored military and and intelligence organizations have have insertion losses as as low low as as 0.5 0.5 db! db! 2 2

Security Threat - Disclosure Too Much Information Online! Efficiency over Security Social Engineering & End- User Awareness 2 3

Security Threat - Actors Adversarial nation states [N. Korea] Intercepted comms of US military build-up activities International Espionage [France] Targeted US high-tech, scientific, & pharmaceutical corporations Corporate Espionage [US-vs-US Company] MCI targeting Verizon for brand damage [tap disclosures] Rogue Groups [Al-Qaeda] Intercepting network traffic between US & embassies Rogue Individuals [Miscreants, Hackers] Wire transfer & other financial attacks 2 4

Security Threat PnP & Ops Companies do not view themselves as a CIP asset Basic security policies not in place or followed Procedures not enforced Lack of awareness/education for end-users Lack of accountability of end-users after training 2 5

Defending Fiber Optic Infrastructures 2 6

Defenses Provide continuous, real-time, protocol independent, physical layer monitoring of the fiber network connection Identify optical anomalies by analyzing the optical carrier Built-in Route Protection Switching proactively enhances network integrity by auto-switching to preconfigured backup paths as required. 2 7

Physical Security of Fiber 1> DETECT the event monitor both primary and backup paths 2> ISOLATE the affected path within the first few milliseconds 3> RE-ROUTE traffic using the RPS 4> Notify the management system 2 8

Physical Security of Fiber Physical Layer Intrusion Prevention Systems: desired traits Automatically identifies, differentiates, and characterizes 8 distinct optical event types: Intrusions Optical Signal Injections & Eavesdropping Cable Breaks Transients Receiver Overloads Low Optical Signal Levels Data Signal Loss Identify Causes of Power-off Conditions 2 9

Physical Security of Fiber Functionality: Monitoring the optical carrier DOES NOT decode the data on the optical carrier Is a PASSIVE system Data remains in the optical state and is not regenerated 3 0

Physical Security Measures Bury the fiber in concrete Weld shut or secure manhole covers, wiring closet doors, riser access panels, & elevator shafts Use of OTDR Technology: No continuous monitoring No intrusion shutdown No characterization or optical faults detected Ineffective at detecting dynamic or transient disturbances Optical Power Level Attenuation Monitoring No intrusion shutdown No fault characterization 3 1

Physical Security Measures Vibration Sensing Technology No intrusion shutdown 6 db optical insertion loss FiberSenSys Phase modulation of the optical signal Oyster Optics Real-time fiber carrier monitoring systems FiberSentinel 3 2

Conclusion 3 3

Security Concerns Tapping [easy & cheap] Injection & Eavesdropping DoS Attacks Physical Security & Access Environmental & Man-made DoS Events 3 4

Desired Security Elements Continuous Real-time Monitoring Capability to Differentiate & Characterize Optical Anomalies Automatic Intrusion Detection Shutdown Automatic Re-route to Redundant Paths 3 5

Questions? 3 6

How to Contact Us Mark Gross, VP [Opterna] mgross@epix.net www.opterna.com Robert J. Bagnall [idefense] Dir, Intel Ops rbagnall@idefense.com www.idefense.com 3 7