U.S. FLEET CYBER COMMAND U.S. TENTH FLEET



Similar documents
The Road to Cyber Power

Role of the Judge Advocate General s Corps. Uniformed Legal Advisor to Naval Leaders Title 10 Responsibilities

Cyber Situational Awareness - Big Data Solution

DISA Testing Services for the Enterprise. Luanne Overstreet

1. Section B for Option Year 2 is hereby reiterated as follows:

How To Improve The Defense Communications System

The Comprehensive National Cybersecurity Initiative

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION

Next Generation Enterprise Network: Network Operations (NetOps) Concept of Operations (CONOPS) 7 April 2008

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities

Joint Information Environment Single Security Architecture (JIE SSA)

DoD Strategy for Defending Networks, Systems, and Data

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

Forecast to Industry 2015

NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives

A Combat Support Agency

Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN

Navy Information Dominance Industry Day

DON Cybersecurity/Information Assurance Workforce Management

Subj: APPLICATION PROCEDURES FOR FISCAL YEAR 2016 NAVY MEDICINE ACTIVE COMPONENT CAREER MILESTONE POSITIONS

Eric J. Getka, Ph.D. CAPT(ret), MSC, USN National Training Director, Navy Psychology

Data Consolidation and Application Optimization (DCAO) Organization

Space and Naval Warfare Systems Center Atlantic

DECC Montgomery. Mr. Chris Kemp Director May 2009

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50

Improvements Needed With Host-Based Intrusion Detection Systems

An Overview of Large US Military Cybersecurity Organizations

Mark S. Orndorff Director, Mission Assurance and NetOps

NGEN Re-compete Industry Day Navy Data Center Consolidation

Commander s Cyber Security and Information Assurance Handbook

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing

How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives

Industrial Control System Cyber Situational Awareness. Robert M. Lee* June 10 th, 2015

Closed loop endpoint compliance an innovative, standards based approach A case study - NMCI

U. S. Fleet Cyber Command / TENTH Fleet. Strategic Plan

continue to have difficulty with communications in the Arctic region.

Obtaining Enterprise Cybersituational

How To Manage Sourcefire From A Command Console

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

What Does a Cyber Secure Navy Look Like?

The DoD CIO Charter:

DoD IA Training Products, Tools Integration, and Operationalization

AUSA Background Brief

Subj: DEPARTMENT OF THE NAVY CYBERSECURITY/INFORMATION ASSURANCE WORKFORCE MANAGEMENT, OVERSIGHT, AND COMPLIANCE

Решения HP по информационной безопасности

AGENDA. CNDSP Program CNDSP is a Team Sport. Protect Respond CNDSP Contacts Questions

Department of Defense NetOps Strategic Vision

Continuous Cyber Situational Awareness

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

Ph.D. Nova Southeastern University, Ft Lauderdale, FL, Information Systems, completed 24 credit hours, expected ABD in Spring 2012

CHAIN OF COMMAND. 1 August 2015

Intrusion Detection for Mobile Ad Hoc Networks

Orchestrating Software Defined Networks (SDN) to Disrupt the APT Kill Chain

Information Assurance and Interoperability

Manned Information Security

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Consolidated Afloat Networks and Enterprise Services (CANES)

Enterprise Capabilities Descriptions

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

Update On Smart Grid Cyber Security

Enterprise Cybersecurity: Building an Effective Defense

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

4. Objective. To provide guidelines for IS requirements and LCM support under NMCI.

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS K CH-63

CHAIN OF COMMAND 1 JANUARY 2016

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)

Operationally Focused CYBER Training Framework

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Compliance Guide: PCI DSS

METALOGIX REPLICATOR FOR SHAREPOINT: Supporting Government and Military Missions Worldwide

Bio-inspired cyber security for your enterprise

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Army Intelligence Industry Day Foundation Layer Technology Focus Areas

Critical Security Controls

Department of Defense INSTRUCTION

Depot Contributions to Weapon Systems Readiness

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data

Accenture Cyber Security Transformation. October 2015

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

The Cyber OODA Loop: How Your Attacker Should Help You Design Your Defense. Tony Sager The Center for Internet Security

MUOS Program Update. Program Executive Office Space Systems (PEO SS) Navy Communications Satellite Program Office PMW 146

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology

CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS F CH-48

Strategic Design. To learn more about the Naval Facilities Engineering Command, please visit us at and

CALNET 3 Category 7 Network Based Management Security. Table of Contents

SANS Top 20 Critical Controls for Effective Cyber Defense

Network Mission Assurance

BlackRidge Technology Transport Access Control: Overview

Cloud Computing and Enterprise Services

Transcription:

U.S. FLEET CYBER COMMAND U.S. TENTH FLEET Dr. Starnes Walker Technical Director / CTO Fleet Cyber Command FLTCYBERCOM TENTH FLEET 1

Agenda Fleet Cyber Command (FCC) /10 th Fleet Introduction Technical Director/CTO Role Key Initiatives & Challenges Unclassified

USCYBERCOM COMUSSTRATCOM will establish USCYBERCOM DIRNSA is also 4-star Commander, U.S. Cyber Command IOC: Upon CDR confirmation at Ft. Meade, MD FOC: 1 OCT 10 Services will create a component JFCC-NW, JTF-GNO dissolved by FOC *Source: 23Jun09 SECDEF Letter Unclassified

FCC/C10F Mission Establish Fleet Cyber Command to serve as the Naval component Commander to USCYBERCOM Central operational authority for Navy networks, cryptology/sigint, IO, cyber, EW and space in support of forces afloat and ashore Delineate FLTCYBERCOM s mission: Directs cyberspace operations, to deter and defeat aggression Ensure freedom of action and achieve military objectives in and through cyberspace Organize and direct Navy cryptologic operations worldwide Integrate Information Operations and Space planning and operations Unclassified

Navy Cyberspace C2 Relationships CNO STRATCOM FLTCOMs ADCON COCOM NSW NAVSOUTH NAVCENT NAVAF NAVEUR PACFLT USFF USCYBERCOM OPCON NSA TYCOMs SUBFOR AIRFOR SURFOR CYBERFOR FLTCYBERCOM C10F SCC Service Employment NCDOC NNWC s NCWDG NAVSOC NCTAMS Unclassified

FCC/C10F Lines of Operation Lines of Operation Operate - Achieve and sustain the ability to navigate and maneuver freely in cyberspace and the RF spectrum Defend - Actively assuring Navy s ability to Command and Control its operational forces in any environment Exploit/Attack - On command, and in coordination with Joint and Navy commanders, conduct operations to achieve effects in and through cyberspace Aligned with USCYBERCOM Unclassified

FCC/C10F Operating Authorities STRATCOM Title 50 Authority NSA USCYBERCOM Title 10 Authority FLTCYBERCOM C10F DEFENSE NETWORKS TASK FORCE COMMANDS R&D Intelligence Warfighter Title 50 USC Analyze network activity of target users and/or computers Analyze network activity of target groups Provide alerts when target users/computers are active Track network usage Determine associations of groups & individuals FCC/C10F Commander Coordination Title 10 USC Deny network and/or computer use Degrade network and/or computer use Redirect network traffic Disrupt Destroy Title 14 Authority Unclassified

FCC/C10F Global Operations Elmendorf Bremerton Beale AFB Hickam AFB San Diego NCTAMSPAC Pearl Harbor, HI PMRF Kauai Great Lakes Fallon Yuma Corpus Christi Columbus Newport Washington Quantico Norfolk Millington Jacksonville Puerto Rico Pensacola San Antonio London Rota Sigonella Vaihingen Wiesbaden Cairo Naples Capodichino Souda Bay Bahrain Chinhae Yokosuka Sasebo Okinawa Misawa Atsugi Guam Singapore DISA Interface IT21 Diego Garcia NMCI ONENET Excepted/Legacy Navy Sensor Unclassified

Technical Director & CTO Role Senior Executive Service career official Serves as the senior Research Development, Test and Evaluation (RDT&E) Executive providing the Commander with advice & assistance Serve as command s Senior Executive responsible for technical direction Formulate Cyber RDT&E Strategic Programmatic Objectives supporting command mission Identify Cyber technology investment opportunities strengthening Navy Enterprise capabilities & operational/tactical effectiveness Recommend technology policies & standards Enhance teamwork and collaboration strengthening Command structure and cyber strategic deliverables across the DON, OSD, OGAs and Coalition Partners Ensure RDT&E Cyber objectives meet current and future exponentially growing technology advances and threats. Unclassified

FCC/C10F Standing Task Organization FCC CTF 1000 C10F CTF 1030 CO Norfolk CTF 1090 CO NCWDG Suitland C10F CTG 1000.1 Menwith Hill Station CTG 1000.2 Sugar Grove CTG 1000.3 Misawa CTG 1000.4 Texas CTG 1000.5 Georgia CTG 1000.6 Maryland CTG 1000.7 Hawaii CTG 1000.8 Colorado CTG 1000.9 NIOD Yakima CTG 1000.10 NIOD Alice Springs CTG 1030.1 Norfolk CTG 1030.2 San Diego R & D HQ Service Cryptologic Component Operations CTG 1030.3 Whidbey Island Information Operations CTF 1010 COMNNWC CTF 1020 CO NCDOC CTF 1040 CO Texas CTF 1050 CO Georgia CTF 1060 CO Maryland CTF 1070 CO Hawaii CTF 1080 CO Colorado CTG 1010.1 NCTAMS LANT CTG 1020.1 NCDOC CTG 1040.1 Texas CTG 1050.1 Georgia CTG 1060.1 Maryland CTG 1070.1 Hawaii CTG 1080.1 Colorado CTG 1010.2 NCTAMS PAC CTG 1020.2 Pensacola CTG 1050.2 Bahrain CTG 1060.2 FIOC UK CTG 1070.2 Yokosuka CTG 1010.3 NAVSOC CTG 1070.3 Misawa Network Operations & Defense Group Fleet and Theater Operations Unclassified

UNCLAS // FOUO IDC Data

Agenda Cyber SA Initiatives Cyber SA Challenges SCADA & Other Initiatives SCADA & Other Challenges Other Significant Questions 12

A picture says it best: Bandwidth LOG Current CASREPs Ship status Ship Movements Views derived data stored in the cloud proximal to collections points Navy Cyber Battlespace Awareness SOH NETOPS Watchbox User picked and situation dependant widgets SATCOM SIGINT Adversary I&W Known Threats USS Neverdock GCCS Vulnerabilities Widgets are linked together USS Neversail Embedded Querys Blue Force Tracks Red Force Tracks Afloat C2 User defined widget dashboard Widgets created on-the-fly Available Cyber Widgets Available C2 Widgets Widget Library UNCLAS // FOUO 13

Cyber and Maritime SA External Data Feeds External Data Feeds Tools Tools C10F Maritime Data Cyber Data Numbered Fleet Naval C2SA Sensor Data Sensor Data Multiple Views -Logical -Nodal -Check Lists -IP based -Geographic Geographic Views -Spatial -Readiness of ship -Time to get ordnance to target 14

Mapping & Managing the Network Cyber SA Initiatives Established Cyber Maritime Operations Center (MOC) Space dedicated to and designed for SA Working through pilots to map the Navy network using the following tools; IPSONAR: implementation-pilot network discovery & mapping tool currently deployed on SIPRNET(Yokosuka, Naples & Bahrain) Everest: implementation-pilot Lawrence Livermore National Laboratory-generated visualization tool employing HBSS agent data Host-Based Security System (HBSS): DoD-standard C4I Host-based Intrusion Prevention System deployed on USN terrestrial and Shipboard C4I NIPR and SIPRNET networks 15

Cyber SA Initiatives Moving to integrate tools/capabilities in the context of NSA Cyber Pilot Enterprise Network Management System (ENMS): mature capability to monitor shore-side networks to the router on afloat platforms Integrated Network Management System (INMS): mature DISA-provided SA tool for monitoring the GIG at the DISA Transport level SM-7: Hewlett-Packard (HP) provided info technology system management tool employed in monitoring CONUS shore-side networks and systems Cybercore: Business Object Environment based data store and widget driven front end to provide SA of Navy CND sensors 16

Cyber SA Initiatives External Awareness External to the DoD Cyber Awareness Commercial IT companies Telecom Companies can provide high level metrics of the internet slide shows the expected are real usage of commercial IT network Commercial undersea transport locations helped us to expect outages based events such as the Japanese Tsunami 17

Cognitive Science & Human Factors Cyber SA Challenges What are the linkages between the data and the actions the operator needs to take or decisions the commander needs to make? How should the data be displayed at for different actions or decisions? How should the data be displayed given different operational (threat) environments? Very Large Dataset Analytics Possibly the most difficult part of developing and maintaining SA Reduce the mass of data into appropriate information sets for display Net sensor data, alarms, net anomalies, packet capture, etc. Sharing/access externally owned data & analytics for this data 18

Cyber SA Challenges Linking virtual locations to physical locations If we find a client is not behaving as expected we should be able to see it s location on a ship and the location of the ship on a map. 19

Cyber SA Challenges Ability to afford gaining SA and control of non-snmp legacy network elements Analog radios Extended View of Cyber SA of cyber external to DoD? What is the quantitative level of attacks? Are sections of the worldwide transport damaged or down? Should this be collected & provided at a higher level? Time synchronization of events Transition from awareness to action; automation versus human in the loop 20

SCADA & Other Initiatives Initial threat assessment of HM&E risks from cyber Initial threat assessment of closed loop systems from cyber 21

SCADA & Other Challenges Industrial/SCADA systems using PLCs, embedded OS, and RISC processors are difficult to update to improve security Use IA agents & sensors in realtime environments Develop hardening capabilities to encase SCADA systems with a defensive capability without requiring high cost upgrades using existing hardware and minimal operator knowledge. Ability to scan source code of real time systems for vulnerabilities PLC Controller RISC Processor operating in real-time without interrupts Boundary encasing SCADA code to provide security without degradation in speed of actions 22

Bridging enterprise security to user owned and operated mobile computing platforms and next generation tablets. DoD required security features such as 2 factor authentication SCADA & Other Challenges 23

Other Significant Questions 1. Is virtual maneuver of networks to obfuscate/deceive executable at large scales? Defending networks that we purposefully change when we are still developing the best way to manage a static network Defend and Jump using virtualized firewalls & routers and security devices Applying virtual maneuver (IP Hopping, software configured networks) in situations where clear knowledge of the network lacking (Invicta)? Redundancy Deception Maneuver Reconstitution 24

Other Significant Questions 2. How do we assess risks/boundaries to grant authority to operate in the cloud? 3. How do you handle information spill containment in a highly virtualized / large cloud environment? 4. Is attribute based access control (ABAC) effective at very large scales? Highly granular identities and tagged data change rapidly 25

Other Significant Questions 5. What are the implications of transitioning an enterprise network from IPv4 to IPv6? Cyber SA Network Defense 6. Measuring affect of actions in cyberspace 7. Assigning attribution with a level of certainty 26

Unclassified