Test/Cyber Requirements and Capability Gaps Abstract

Similar documents
Systems Engineering and Integration Efforts. 11 Dec 2013

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology

Department of Defense DIRECTIVE

Presentation to NDIA 16th Annual Systems Engineering Conference Hyatt Regency, Crystal City, VA October 2013

ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South

Department of Defense DIRECTIVE

UNCLASSIFIED R-1 ITEM NOMENCLATURE

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems

1 July 2015 Version 1.0

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC

Cybersecurity is one of the most important challenges for our military today. Cyberspace. Cybersecurity. Defending the New Battlefield

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Ms. Sandy Veautour Chief Systems Engineer PSG

Project Manager Integrated

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

Working Group 9 Cyber Analysis

Defense Acquisition Review Journal

Cybersecurity in Test & Evaluation. James S. Wells Deputy Director, Cyberspace & HSE Programs Office of Test & Evaluation

Navy Information Dominance Industry Day

DoD Strategy for Defending Networks, Systems, and Data

AF Life Cycle Management Center

Simulation and Training Solutions

Department of Defense INSTRUCTION

Cybersecurity Training in OT&E for DOT&E Action Officers

Position Descriptions. Aerospace

Cybersecurity Throughout DoD Acquisition

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

Army Intelligence Industry Day Foundation Layer Technology Focus Areas

Always On-On Demand: Supporting the Development, Test, and Training of Operational Networks & Net-Centric Systems

Cyber R &D Research Roundtable

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50

NICE and Framework Overview

Department of Defense INSTRUCTION

Predictive Cyber Defense A Strategic Thought Paper

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review

UNCLASSIFIED. R-1 Program Element (Number/Name) PE N / Directed Energy and Electric Weapon System. Prior Years FY 2013 FY 2014 FY 2015

Cyber Community Highlights

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities

White Paper Assured PNT Inside Military Ground Vehicles Using D3

G2 Industry Day JULY Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

MEDICAL PLATOON LEADERS HANDBOOK TACTICS, TECHNIQUES, AND PROCEDURES TABLE OF CONTENTS

UNCLASSIFIED PE D8Z

Enterprise Capabilities Descriptions

Some Thoughts on the Future of Cyber-security

Department of Defense Project Manager Mobile Electric Power (PM MEP)

Industry White Board Session

PEO LAND SYSTEMS MARINE CORPS Planning Brief to Industry. 22 Sep 2015 Michael D. Halloran Director S&T, PEO LS

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.

Spectrum Technology Assessment Test Range Spectrum Challenges

WORKFORCE COMPOSITION CPR. Verification and Validation Summit 2010

Director of Intelligence Proposed Research Topics

AFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015

Security Threats on National Defense ICT based on IoT

Guidelines for Cybersecurity DT&E v1.0

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC

Electronic Warfare System Integrated Electronic Warfare System. Own the Enemy s Battlespace

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

Space and Naval Warfare Systems Center Atlantic

IAI/Malat Solutions for the Maritime Arena

SUBJECT: Army Information Technology Service Management (ITSM) Policy

Department of Defense NetOps Strategic Vision

Data Intensive Science and Computing

Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) Project

U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview

Fort Monmouth Programs

AUSA Background Brief

Army Research Laboratory Technical Strategy

Microwave Photonic Systems Inc. Joshua L. Korson & Richard J. Stewart

Rapheal Holder From Platform to Service in the Network Centric Value Chain October 23, Internal Information Services

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139

Emerging Threats and Challenges for Homeland Air Security

Dr. David Burns Director for Science and Technology Advanced Technology Missile Defense Agency

Northrop Grumman Cybersecurity Research Consortium

Live Training. Full-spectrum Range Instrumentation and Tactical Engagement Simulation Systems (TESS)

Flexible, Life-Cycle Support for Unique Mission Requirements

Cybersecurity: Mission integration to protect your assets

Operation IMPACT (Injured Military Pursuing Assisted Career Transition)

PEO Land Systems It s All About the Warfighter. Mr. William E. Taylor REPORT TO INDUSTRY. Modern Day Marine Quantico, Virginia 23 September 2015

THE CHALLENGES OF CYBERSECURITY TRAINING

The State of DoD Biometrics

MEMORANDUM FOR ASSISTANT SECRETARY OF THE ARMY MANAGEMENT)

Information Briefing and Reception. Chris Van Metre President, SCRA Applied R&D December 4, 2014

Reliable, Repeatable, Measurable, Affordable

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

MILLENNIUM CORPORATION

PATRIOTWATCHTM PATRIOTSHIELDTM PATRIOTSWORDTM

Implementation of the DoD Management Control Program for Navy Acquisition Category II and III Programs (D )

PEO Land Systems Marine Corps. It s s all about the Warfighter! NDIA Tactical-Wheeled Vehicle Conference Monterey, CA 4 Feb 08

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C

DOD DIRECTIVE CLIMATE CHANGE ADAPTATION AND RESILIENCE

Welcome RADM Frederick Lewis, USN (Ret) President, National Training and Simulation Association (NTSA)

System Security Engineering

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit)

Transcription:

Test/Cyber Requirements and Capability Gaps Abstract The use of cyberspace operations to defend supported networks and project power through the digital domain is at the leading edge of new age warfare. DoD agencies are working feverishly to define doctrine, tactics, techniques, procedures and materiel requirements to enable the employment of cyberspace operations in support of national, strategic, operational and tactical objectives. Development of tools and technology to test and verify effectiveness of weapon systems is critical for success in the cyberspace domain. In addition, unique technical knowledge and lessons learned from the test community provide an excellent launch point for the development of training systems simulating cyberspace effects. The Test/Cyber Requirements and Capability Gaps Panel brings together key Government, Industry and Academic experts to discuss current and future initiatives to ensure weapon systems and platforms are tested within a realistic cyberspace operating environment. The panel will present user requirements, proposed science and technology needs, and current industry and academic perspectives on implementation of cyber testing. The panel will also address the Shift Left paradigm which provides greater emphasis on cyber testing during program development versus only at an operational test. The panel will discuss opportunities for the community build training capabilities leveraging knowledge gained from cyber-related testing. This panel is for those interested in gaining a better understanding of cyberspace activities within the test and training communities. Project managers, engineers, technology managers, and business development personnel should attend this interactive session. The panel will provide presentations and will interact through real time questions from the audience.

Test-Cyber Panel Colonel Mike Flanagan, USA Ret d Moderator 18 June 2015

Test-Cyber Panel 1. Mr. Rick Copeland, Acting PM ITTS 2. Mr. Joshua Miller, Senior Evaluator, Survivability Evaluation Directorate, Army Test and Evaluation Command/Army Evaluation Center 3. Ms. Cisca Vuong, PM ITTS Chief Engineer 4. Mr. Mike Aldinger, Northrop Grumman IS, Manager, LVC Mission Integration 5. Mr. Jon Callahan, General Dynamics Mission Systems, Deputy Program Manager 6. Dr. Fred Wright, Deputy Director and Chief Engineer, Cyber Technology and Information Security Laboratory, Georgia Tech Research Institute 7. Mr. Jason Wonn, CGI-Federal, Director, Cyber Engineering & Consulting Services Moderator: COL Mike Flanagan, USA Ret d, Vice President, CACI-Fed 2

Mr. Joshua Miller (ATEC) Senior Evaluator, Survivability Evaluation Directorate, Army Test and Evaluation Command/Army Evaluation Center Cybersecurity Test and Evaluation: The Army Perspective 3

Operational Environments Operational Environment domains: Air (naturally occurring) Land (naturally occurring) Maritime (naturally occurring) Space (naturally occurring) Cyberspace (manmade) DoD Reliance on Cyberspace for: Military Command and Control Intelligence Business Operations Reference: FM 3-38: Cyber Electromagnetic Activities 4

ATEC Initiatives Shift Left Earlier Developmental T&E for Cyber Security Cooperative Vulnerability and Penetration Assessments (CVPA) to Prepare Systems for Record Test Test & Evaluation Program Synchronization (TEPS) Early communication on Test and Evaluation metrics The Cybersecurity Scorecard EW - investments in signals collection and automation Realistic Threat Portrayals Metrics Study Effort in partnership with MIT Lincoln Labs Examine the application of continuous monitoring 4

Cybersecurity Shift Left Compliance with IA controls / standards and profiles are necessary but not sufficient Fielded systems found to have novice IA vulnerabilities during OT, which is problematic and costly. Shift Left to discover cybersecurity issues earlier in the acquisition lifecycle. 6

Shift Left Effect on Cybersecurity Testing Formally add cybersecurity DT to the TEMP ATEC: Leverage existing test capabilities rather than build new Build T&E plans starting with Risk Management Framework (RMF) products RMF replaces DIACAP with intent to manage risk over the system s lifecycle 7

Effect on Cybersecurity Evaluation Assess program readiness for major events such as MS C or Initial Operational Test (IOT) AEC cybersecurity scorecard to continually assess Incorporate DOT&E 1 August 2014 policy memorandum Protect, Detect, React, Restore Cybersecurity T&E Scorecard Presented at Each PEO Executive Test Day 8

Phase 1 Understand Cybersecurity Requirements Analysis phase Test phase Proposed Cybersecurity T&E Events A B C RMF Developmental Test Integrated DT/OT Phase 3 Phase 2 Cooperative Vulnerability Characterize Identification Cyber Attack Surface Phase 4 Adversarial Cybersecurity DT&E DT Adversarial Assessment DT Cooperative Vulnerability & Penetration Assessment (CVPA) Operational Test IATT OTRR Phase 5 CVPA Phase 6 AA OT Cooperative Vulnerability and Penetration Assessment Events derived from draft DASD(DT&E) DoD Cybersecurity Test and Evaluation Guidebook, and DOT&E Cybersecurity Operational Test and Evaluation Guidance Memo (01 August 2014) FRP OT Adversarial Assessment 9

Challenges Cybersecurity as Systems Engineering Discipline Contractual Language for systems with IT Cyber Test Ranges Plug and Play Tactical Network M&S Virtual Machine Emulation & Simulation System of Systems Risk Assessment for Investment Decisions Operational Requirements If there is a computer in something, it can be cyber-attacked, and we need to be able to harden it and defend it, the Pentagon s Deputy Chief Information Officer for Cybersecurity Mr. Richard Hale The Joint Staff has recently put out a formal requirement document that includes cybersecurity as a key part of the survivability key performance parameter [KPP] for every new system Addressing DOTMLPF-P Metrics Defensible Systems 10

Ms. Cisca Vuong (PEO STRI) Chief Engineer for Project Manager, Instrumentation, Targets & Threat Simulators (PM ITTS) PM ITTS S&T/Capability Gaps 11

PM ITTS Strategic Focus Areas Support Army Capabilities as Material Developer for Test Validated Cyber and Electronic Warfare Threats, Targets, and Test Range Instrumentation Training Material Developer Special Operations Forces (including 160 th SOAR), Intelligence, and Fires Emerging Test Capabilities Integrated Live Virtual Constructive Test Environment Warrior Injury Assessment Manikin Stakeholders - Combatant Commands - Army G2, INSCOM and TRADOC Centers of Excellence - Army Test and Evaluation Command and Army Test Centers - OSD Director, Operational Test & Evaluation - OSD Director, Developmental Test & Evaluation 12

S&T for Test & Evaluation PM ITTS leverages primarily DoD Test Resource Management Center (TRMC) T&E/S&T S&T requirements submitted through established T&E Reliance Panel Needs and Solutions Process TRMC strategic focus on eight Test Technology Areas (TTA) Advanced Instrumentation Systems Technology (AIST) Cyberspace Test Technology (CTT) Directed Energy Test (DET) Electronic Warfare Test (EWT) High Speed Systems Test (HSST) C4I and Software Intensive Systems Test (C4T) Spectrum Efficient Technology (SET) Unmanned and Autonomous Systems Technology (UAST) Emphasis on efficiency and commonality Minimize duplication of effort 13

Test / Cyber S&T Research Areas TSIS S&T # S&T Focus Area Research Areas Target Program of Record Estimated Current TRL Program Need Date Mid Term (2020-2030) Near Term (2016-2020) Far Term (2030-2040) 1 Enhance threat Computer Network Operations Various Various X X X 2 Threat Computer Network Attack & Computer Network Defense Various Various X X X 3 Remote mission command of multiple cyber platforms; Various Various X X X 4 Threat cyber capabilities Modeling & execution of cyber activities Various Various X X X 5 Virtualization of threat networks Various Various X X X 6 Threat cyber tools developed as Software as a Service (SaaS) Various Various X X X 14

Current Cyber T&E/S&T Efforts TSMO cyber threat environments Automated Cyberspace Threat Representation (ACTR) S&T effort executed under TRMC CTT Potential S&T insertion/transition to TSMO Network Operations Security Center (NOSC) Framework for Automated and Verified Sanitization (FAVS) S&T effort executed under TRMC CTT Potential S&T insertion/transition to TSMO NOSC, National Cyber Range (NCR) Work collaboratively with CERDEC Intelligence and Information Warfare Directorate (I2WD) and SMEs to shape/address Army S&T needs for threat cyber T&E 15

Mr. Rick Copeland (PEO STRI) Acting Project Manager, Instrumentation, Targets & Threat Simulators (PM ITTS) PM ITTS Support/Mission in Test and Cyber 16

PM ITTS Strategic Focus Areas Support Army Capabilities as Material Developer for Test Validated Cyber and Electronic Warfare Threats, Targets, and Test Range Instrumentation Training Material Developer Special Operations Forces (including 160 th SOAR), Intelligence, and Fires Emerging Test Capabilities Integrated Live Virtual Constructive Test Environment Warrior Injury Assessment Manikin Stakeholders - Combatant Commands - Army G2, INSCOM and TRADOC Centers of Excellence - Army Test and Evaluation Command and Army Test Centers - OSD Director, Operational Test & Evaluation - OSD Director, Developmental Test & Evaluation 17

Cybersecurity Shift Left Compliance with IA controls / standards and profiles are necessary but not sufficient Fielded systems found to have novice IA vulnerabilities during OT, which is problematic and costly. Shift Left to discover cybersecurity issues earlier in the acquisition lifecycle. 18 18

Cyber Electromagnetic Activities From FM 3-38; Approved for public release; Field Manual No. 3-38; Headquarters Department of the Army; Washington, DC, 12 Feb 2014 19

UNCLASSIFIED//FOUO Collective Cyber Training Leveraged Threat Computer Networks Operations, Red Team, and Cyber Environments/Range Experience to position PEO STRI as Army Material Developer for Collective Cyber Training Systems Organized a Consortium of Cyber Stakeholders to understand requirements and identify S&T needs Support system and collective training requirements generation process Designate PEO STRI as the Materiel Developer for Collective Cyber Training Goal: PEO STRI Materiel Developer for Collective Cyber Training Systems 20

Mr. Mike Aldinger (Northrop Grumman) Northrop Grumman IS, Manager, LVC Mission Integration 21

Cyber Electromagnetic Activities From FM 3-38; Approved for public release; Field Manual No. 3-38; Headquarters Department of the Army; Washington, DC, 12 Feb 2014 22

Mr. Jon Callahan (General Dynamics) Deputy Program Manager, General Dynamics Mission Systems 23

Cyber Electromagnetic Activities From FM 3-38; Approved for public release; Field Manual No. 3-38; Headquarters Department of the Army; Washington, DC, 12 Feb 2014 24

Dr. Fred Wright (Georgia Tech) Deputy Director and Chief Engineer, Cyber Technology and Information Security Laboratory, Georgia Tech Research Institute 25

Cyber Electromagnetic Activities From FM 3-38; Approved for public release; Field Manual No. 3-38; Headquarters Department of the Army; Washington, DC, 12 Feb 2014 26

Mr. Jason Wonn (CGI-Federal) Director, CGI-Federal Cyber Engineering & Consulting Services 27

Questions and Answers From FM 3-38; Approved for public release; Field Manual No. 3-38; Headquarters Department of the Army; Washington, DC, 12 Feb 2014 28

Back-Up 29

PM ITTS Prioritized Capability Gaps Technology Area Programs Description 1 Threat cyber capabilities Various Enhance threat Computer Network Operations, threat Computer Network Attack & Computer Network Defense; Remote mission command of multiple cyber offensive platforms; Modeling & execution of offensive cyber activities providing force multiplier effects; virtualization of threat networks; threat cyber tools developed as Software as a Service (SaaS) available in secure cloud environments 2 Next Generation Tactical Engagement Simulation Systems 3 Target Remote Control & Time-Space-Position Information (TSPI) in GPS Denied Env. ILTE Army Ground Aerial Target Control System (AGATCS); ILTE Capabilities to provide an operationally realistic test environment by generating battlefield effects and cues that will cause Soldiers to act in a tactically correct manner Capability to calculate and provide reliable & accurate target position to remote target control system in GPS denied environment; Instrumentation required to measure & time tag 3D location of systems under test in operational & urban test events 4 Airborne Threat Jamming Advanced Jammer Suite; Advanced Electronic Support Capability to provide live & simulated threat communications and radar electronic attack (EA) systems housed in aviation assets to locate, maneuver to and jam communications and RF signals to include GPS and SATCOM transmissions from space. 30

Instrumentation Management Office (IMO) Prioritized Capability Gaps Technology Area Programs Description 1 Next Generation TESS ILTE Capabilities to provide an operationally realistic test environment by generating battlefield effects and cues that will cause Soldiers to act in a tactically correct manner 2 Short Wave Infrared (SWIR) Metric Zoom Lens Advanced Range Tracking and Imaging System (ARTIS) Capability required in the SWIR for a continuous motorized zoom electro-optical instrument that changes its magnification to accommodate variations in object distances for tracking objects. 3 Enterprise Architecture and Synthetic Environment ILTE Infrastructure approach for service oriented architecture, cloud access to single synthetic environment, point of need, and One- World Terrain 4 Live Architecture ILTE Mobile/cloud/distributed computing architecture for Live capabilities deployed during operational tests 5 Time-Space-Position Information (TSPI) in GPS Denied Env. ILTE Instrumentation required to measure & time tag 3D location of systems under test involved in operational & urban test events (inside buildings, tunnels, alleys & maneuver area) in the presence of EW jamming & other effects 6 Terrain ILTE Correlation of geo-specific terrain with TESS to enable indirect fire weapon simulation and augmented reality of weapon effects. 31

Target Management Office (TMO) Prioritized Capability Gaps Technology Area Programs Description 1 Target Remote control in GPS Denied Environments 2 Sophisticated Remote Target Control System (at low cost) Army Ground Aerial Target Control System (AGATCS) AGATCS, Aerial Flight Target Services (AFTS) 3 Aerial Targets Launch MQM-107 Aerial Target Drone 4 Multi-spectral personnel targets for EO sensor testing Precision Targets Signature (PTS) Capability to calculate and provide reliable and accurate target position to the remote target control system in GPS denied environment More economical installation, checkout, mission planning, & sustainment to lower total life cycle cost of remotely controlling ground/aerial targets; simultaneous remote control of mixed (manned & unmanned) targets Capability to launch MQM-107 aerial target drone using a safe launching technology other than Rocket Assist Take-Off (RATO) bottle that could potentially reduce operating costs & eliminate explosive items hazards Multi-spectral personnel targets to support T&E of EO sensors & training personnel in detection, tracking & intent assessment. Personnel targets will be integrated into test & training scenarios, presented in different poses & displayed in multi-spectral bands ranging from visible to Long Wave Infrared (LWIR) 32

Threat Systems Management Office (TSMO) Prioritized Capability Gaps Technology Area Programs Description 1 Threat cyber capabilities Various Enhance threat Computer Network Operations, threat Computer Network Attack & Computer Network Defense; Remote mission command of multiple cyber offensive platforms; Modeling & execution of offensive cyber activities providing force multiplier effects; virtualization of threat networks; threat cyber tools developed as Software as a Service (SaaS) available in secure cloud environments 2 Airborne Threat Jamming Various Capability to provide live and simulated threat communications and radar electronic attack (EA) systems housed in aviation assets to locate, maneuver to and jam communications and RF signals to include GPS and SATCOM transmissions from space. 3 Software Defined Radios (SDR) Various Use of SDR/Cognitive Radios/Dynamic Spectrum Assess (DSA) technologies to represent threat faithful representations; spectrum efficient, frequency agile, small form/fit. 4 Digital Radio Frequency Memory (DRFM) Various Capability to model both physics & effects of DRFM waveforms and to provide DRFM signal injection for EA simulators. 5 Threat Directed Energy Various Capability to provide live and simulated threat of high energy laser, high power microwave transmission in a focused (narrow beam) technique for threat electronic warfare environment 33

IMO Current T&E/S&T Efforts Advanced Range Tracking and Imaging System (ARTIS) Short Wave Infrared (SWIR) Metric Zoom Lens Topic released under AIST Potential S&T insertion during Engineering & Manufacturing Development (EMD) phase Supports objective requirement, not needed for threshold Integrated Live-virtual-constructive Test Environment (ILTE) Real-Time Casualty Assessment (RTCA) Shoot through Foliage Topic submitted under AIST Potential S&T insertion during EMD phase Pulsed Neutron Environment (PNE) PNE S&T Study conducted under DET S&T insertion/transition to potential PNE Central T&E Investment Program new start Work collaboratively with Army test centers, RDECs and SMEs to shape/address Army S&T needs for T&E 34

DoD TRMC T&E/S&T Needs POAM Activity T&E/S&T Needs process FY13 FY 2014 May-13 Jun-13 Jul-13 Aug-13 Sep-13 Oct-13 Nov-13 Dec-13 Jan-14 Feb-14 Mar-14 Process documented by S&T panel Process reviewed by SME's Process reviewed by TRAG and BoD Staff Process aproved Needs Call Draft Needs Call devloped by panel Draft Call revewed by TRAG and BoD Staff Needs call Aproved by BoD Needs call Relased 35