Cryptologic Systems Group Securing the Global Information Grid (GIG)



Similar documents
Forecast to Industry 2015

Space and Naval Warfare Systems Center Atlantic

WEEKLY SCHEDULE (as of 01 Mar 16)

Office of Warfighting Integration and Chief Information Officer SAF/CIO A6. Mission Brief

Advanced Systems & Development

The future of range instrumentation.

Mobile Applications. Army s Direction and Our Challenges

The DoD CIO Charter:

G2 Industry Day JULY Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE

Rapheal Holder From Platform to Service in the Network Centric Value Chain October 23, Internal Information Services

AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration

Systems Engineering and Integration Efforts. 11 Dec 2013

Overview of NATO Technology Trends

CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense

The State of DoD Biometrics

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

Department of Defense NetOps Strategic Vision

Common Operating Environment (COE) and Global Information Grid (GIG) Enterprise Services (GES) Mr. Rob Walker 24 September 2003

UNCLASSIFIED. UNCLASSIFIED Navy Page 1 of 20 R-1 Line #208

Army Intelligence Industry Day Foundation Layer Technology Focus Areas

Corporate Overview A

Department of Defense Net-Centric Services Strategy

UNCLASSIFIED R-1 ITEM NOMENCLATURE

DISA Testing Services for the Enterprise. Luanne Overstreet

WHITE PAPER COMBATANT COMMAND (COCOM) NEXT-GENERATION SECURITY ARCHITECTURE USING NSA SUITE B

COMBATSS-21 Scalable combat management system for the world s navies

Space Ground Services in the Joint Information Environment (JIE)

Department of Defense Information Enterprise Architecture (DoD IEA) Version 2.0

UNCLASSIFIED R-1 ITEM NOMENCLATURE

L-3 Guardian SME PED Frequently Asked Questions

APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS

UNITED STATES AIR FORCE. Air Force Product Support Enterprise Vision

ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE

Satellite REPRINTED FROM. John D. Prentice, Stratos Global Corp., USA,

Security Threats on National Defense ICT based on IoT

Director of Intelligence Proposed Research Topics

Innovation. Performance. Security. SMARTSCAN man-portable land EW solutions. target. up-to-the-minute situational intelligence

Middle Class Economics: Cybersecurity Updated August 7, 2015

SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

Department of Defense DIRECTIVE

DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO

FM 6-02 SIGNAL SUPPORT TO OPERATIONS

( Increased usage of IP addresses )

Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT)

What is Really Needed to Secure the Internet of Things?

Secure information exchange

Inmarsat Global Xpress Global, Mobile, Trusted. U.S. Government > Services > Global Xpress

Unified Capabilities (UC)

TECHNIQUES FOR COMMUNICATIONS SECURITY (COMSEC) OPERATIONS. August 2015

UNCLASSIFIED. UNCLASSIFIED Defense Information Systems Agency Page 1 of 9 R-1 Line #131

Department of Defense PKI Use Case/Experiences

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing

White Paper. Five Steps to Firewall Planning and Design

Turn Your Business Vision into Reality with Microsoft Dynamics NAV. icepts Technology Group, Inc. Dynamics NAV Gold ERP Partner

Fort Monmouth Programs

SatCom For Net-Centric Warfare July/August MilsatMagazine

The Comprehensive National Cybersecurity Initiative

AUDIT REPORT. Audit of NRC s Communications Security Program. OIG-14-A-21 September 29, 2014

Intelligent Solutions for the Highest IT Security Demands

Department of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise

PEO SYSCOM Conference Joint Pgm Management Perspective

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC

Small Business Programs Conference. Technical, Engineering, Advisory, and Management Support (TEAMS)

AUSA Background Brief

DISA Acquisition Opportunities

Asset Management Challenges and Options, Including the Implications and Importance of Aging Infrastructure

DoD CIO ITSM Overview Enterprise Architecture Conference

Power of Oracle in the Cloud

Start building a trusted environment now... (before it s too late) IT Decision Makers

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

Bridging the Digital Divide with Net-Centric Tactical Services

Deterrent and detection of smart grid meter tampering and theft of electricity, water, or gas

Security in the smart grid

Introduction MIND CTI. Overview

AFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015

The Boeing Company Strategic Missile & Defense Systems

Transmission Security (TRANSEC) in an IP-based VSAT Architecture. February 2011

Future Multi-Mission Satellite Operations Centers Based on an Open System Architecture and Compatible Framework

secure For the ultimate in Cyber Defence TRL Technology

Qlik UKI Consulting Services Catalogue

Operationally Focused CYBER Training Framework

Department of Defense INSTRUCTION

Navy Information Dominance Industry Day

Partnering with Small Business

BT Unified Trading communication. The Future Delivered

How To Protect Your Data With A Senior Security Encryptor From Being Hacked By A Hacker

i LCDR Peter Duffley Third Party Sales Officer / CAN Rep

Air Force Agency for Modeling & Simulation Mission Brief. Col James Spanky Dennis AFAMS Commander

JCSS Web Demo Transcript

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

Forecast to Industry 2015 External Contracting Opportunities

How To Improve The Defense Communications System

Attachment 1 DATA SERVERS AND DATA CENTERS APPROVAL PROCESS

Transcription:

Cryptologic Systems Group Securing the Global Information Grid (GIG) Air Force Cryptographic Modernization Third Annual Layered Assurance Workshop 4-5 August 2009 Mrs. Mary Anne Smith Director, AF Crypto Mod Program Office CPSG/ZX, Lackland AFB, TX DISTRIBUTION A: Approved for public release; distribution unlimited. (Approval given by Public Affairs Office)

Purpose Present an overview of Cryptologic Systems Group (CPSG) & Air Force Cryptographic Modernization Program Office (CMPO) to attendees at the Third Annual Layered Assurance Workshop Securing the Global Information Grid (GIG) Slide #2

Outline AF challenges AF Cryptologic Systems Group (CPSG) AF Cryptographic Modernization Program Office (CMPO) AF CM acquisition & modernization approach Programs & interest areas CM challenges - technical, budget & programmatic Securing the Global Information Grid (GIG) Slide #3

Air Force Challenges Securing Today s Cyber Battlefield More Complex Battlefield Sophisticated Global Enemy Dynamic & Evolving Environment Securing the Global Information Grid (GIG) Slide #4

Cryptologic Systems Group Mission: Assured Information Dominance Vision: Securing the Global Information Grid Securing the Global Information Grid (GIG) Slide #5

CPSG Organization ESC/CC Lt Gen Bowlds FYDP $3B in Cyber Acquisition Public Key Infrastructure (PKI) 653rd ELSW/CL Mr. Mason Key Management Infrastructure (KMI) Crypto Mod - 9 ACAT III programs CPSG/CC Col Collamore Information Assurance NI Mr. Collazo Special Projects ZJ Mr. Friesenhahn Crypto Modernization ZX Ms. Smith COMSEC Products ZC Ms. Moncus Intel & Force Protect ZI Mr. Aguirre PKI AF EKMS KMI GIG-IA (III) KG-327, TT&C AVE (III) KS-252, TT&C GOE (III) Space Mission Data (III) Space COMSEC Crypto Modernization KS-60 ICU (III) KG-3X (III) ROME Crypto Transformation IFF Mode 5 CM (III) RRK (III) CKG (III) VACM (III) Air / Ground COMSEC ITAC Consolidated SIGINT Support Activity Technical Applications Tactical Intel Force Protection Contracting PK Ms. Hair Financial Mgmt FM Mr. Kane Mission Support OM Mr. Dietert Engineering EN Ms. Moncus (A) Maintenance MA Mr. Parmigiani Logistics LG Mr. Jandt Securing the Global Information Grid (GIG) Slide #6

Current Cryptographic Inventory Security & component technologies are aged/aging Typically point-to-point with little to no net-centric/ Internet Protocol capability Bandwidth & processing speed constrained Challenged with regard to: Logistics Interoperability Flexibility Compatibility with modernized key management (EKMS & KMI) Securing the Global Information Grid (GIG) Slide #7

DoD Crypto Mod Initiative (CMI) Vital effort to transform all NSA-certified, Type 1 Crypto solutions to meet the needs of the next generation warfighting environment cannot fight & win without crypto that protects C2 & data in transit DoD Type 1 Crypto Equipment transformation goals: Net-centric & Global-Information-Grid (GIG) compatibility Compatible w/ next generation Key Management Infrastructure (KMI) More robust, stronger algorithms Releasable versions of algorithms to warfighting partners Higher data rates & larger downloads Over-The-Network Re-keying (OTNR) capability Reprogrammable H/W enabling easier & less expensive upgrades Logistically supportable NSA Executive Agent -- all Services actively participating Securing the Global Information Grid (GIG) Slide #8

AF Crypto Modernization Legacy Systems Modernized Systems Transparent, Cross-Cutting Solutions P l a t f o r m s Equipment (Radio) Device (Crypto Hardware) Engine (Chip) A l g o r i t h m Increased Security Robustness Programmability Advanced Algorithms Interoperability Releasability Key Management Infrastructure Compatibility Global Info Grid Secure Information for Net-Centric Ops Technology Infusion Securing the Global Information Grid (GIG) Slide #9

AF Crypto Mod Program Office Est. 7 December 2001 Enterprise management CM Acquisition Policy, Guidance, & Strategic Planning Promote AF Awareness, coordinate w/ other Services & NSA Manage portfolio funding w/ Lead Command & Air Staff Analysis -- Ensure crypto is secure & supportable Understand crypto inventory & platform usage Analyze decertification & AF way ahead Track current / future tech development Partner for risk reduction & concept technology development Facilitate NSA security evaluation & certification Program planning -- Initial planning for: Concept refinement Development Production & deployment Securing the Global Information Grid (GIG) Slide #10

AF Crypto Mod Acquisition Structure AF SAE SAF/XCI SAF/AQI AFSPC 24 AF AFNIC AF PEO C2 & CS SPM National Crypto Solutions Management Office User Community KG-3X Crypto Mod AF CMPO Program Management Offices Industry Industry Industry Industry ICBM Crypto Upgrade IFF Mode 5 Crypto Space TT&C AVE Industry Industry Industry Industry Industry Industry Industry Industry Remote Re-Key Combat Key Generator Space Mission Data VINSON ANDVT Crypto Space TT&C GOE Securing the Global Information Grid (GIG) Slide #11

AF Crypto Mod Phased Approach Replacement: Near term sustainability issues Nuclear C2 Crypto (KG-3X & KS-60) IFF Mode 5 Crypto Remote Re-key (RRK) Combat Key Generator (CKG) Modernization: Incremental improvement & reduced logistics Space Telemetry, Tracking, & Commanding (TT&C) Space Mission Data (SMD) VINSON/ANDVT Crypto Mod (VACM) Transformation: Common network-centric crypto solutions Remote Operational Management of End-Crypto-Units (ROME) Multi-Level Security (MLS) Dynamic Group Keying (DGK) Common Interface to Cryptographic Modules (CICM) Miniaturized & Software Crypto Securing the Global Information Grid (GIG) Slide #12

AF Crypto Mod Other Areas of Interest Link Encryption Family (LEF) F-22 Multi-Function Crypto Programmable Objective Encryption Technologies (POET) Navy-led Link-16 Encryption Modernization Multiple studies Securing the Global Information Grid (GIG) Slide #13

AF CM Challenges Technical Size, Weight & Power (SWaP) Software-based crypto NSA certification / decertification requirements Funding Cuts to military budget (-) Increasing emphasis on security (+) Increasing emphasis on cyber capabilities (+) Programmatic Ever-changing acquisition process (-) New acquisition framework (+) Securing the Global Information Grid (GIG) Slide #14

AF CM Way Ahead Common solutions for legacy & future systems Reduced size, weight & power High assurance, high speed & anti-tamper Multi-Level Security & dynamic group keying High assurance storage encryption Continue to evolve & capitalize on PKI Transition plan from EKMS to KMI Anticipate emerging threats & participate in Air Force Cyber response Securing the Global Information Grid (GIG) Slide #15

Point of Contact Crypto Mod Program Office Sue Hooker, CPSG/ZX Crypto Mod Program Office Program Action Group, Govt Lead Commercial Phone: (210) 925-5277, DSN: 945-5277 Email: sue.hooker@lackland.af.mil Or CPSG.ZX.PAG@lackland.af.mil Securing the Global Information Grid (GIG) Slide #16

Questions? Securing the Global Information Grid (GIG) Slide #17

Back-Ups Securing the Global Information Grid (GIG) Slide #18

Electronic Key Management System(EKMS) Key Management Infrastructure(KMI) SCOPE: Transactions per month F-15 requires 18 keys F-22 & JSF: 450 keys AEHF: 100,000 keys PROGRAM CONTENT: Provides electronic key generation, distribution, accounting, & management EKMS based on phone networks & requires significant human hands-on management KMI ensures modernized, AF-compliant networked operation for cryptographic key management Enables warfighter Joint interoperability/ reachback Decreases human intelligence threat (HUMINT) Cuts production costs for NSA & shipment costs for Services AF Key Management growth areas: GPS equipment, secure cell phones, network encryptors, national agency & Coalition customers Securing the Global Information Grid (GIG) Slide #19

Space COMSEC Airborne C2 & ISR Assets Med/High Alt UAVs SCOPE: JSOAC CFSOCC CSAR Forces Units Small UAVs Ground-based Sensors SOF Teams National Assets Sensored SOF Platforms Supports development, production, launch & operations of 15 satellite programs PROGRAM CONTENT: Provides warfighter secure, uninterrupted satellite communications, 24/7 ISR, & near real-time NAV / positioning & weather data Protects Command & Control of critical national assets Encrypts information collected or passed by satellite (mission data) Securing the Global Information Grid (GIG) Slide #20

Air & Ground COMSEC PROGRAM CONTENT: Ensures AF warfighters communicate securely in any environment or media Replaces legacy link encryptors & aging in- line network encryptors SCOPE: - Sustains entire AF cryptographic inventory over 1,200 device types -Supports all AF bases fixed & deployed Modernized KIV-7M & KIV-19M point-to-point encryptors High Assurance IP Encryptors (HAIPE) In-line encryptors HAIPEs ensure compliancy with the National Security Telecom & Information Systems Security Policy (NSTISSP) No. 11 Securing the Global Information Grid (GIG) Slide #21