Download ATC LOB review

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
UNCLASSIFIED // LOCKHEED MARTIN PROPRIETARY INFORMATION
Perspectives on Space and Cyber
Yadunath Zambre, Ph.D.
Chief Scientist and Senior Fellow
Advanced Technology Center
Lockheed Martin Space Systems Company
UNCLASSIFIED // LOCKHEED MARTIN PROPRIETARY INFORMATION
1
UNCLASSIFIED // LOCKHEED MARTIN PROPRIETARY INFORMATION
Traditional Warfare and Cyber Warfare
• Cyber can/will be an additional domain in warfare
– Space, Air, Sea, Land, Cyber
– Used prior to physical engagement or presence to
• Degrade adversary command and control, ISR, national
infrastructure
• Conduct psychological operations (spread propaganda, reduce
confidence in government, organize and coordinate opposition)
• Potential standalone approach to warfare
– Could inflict significant harm to an adversary country
• Electronic Warfare – sub-domain of cyber (sometimes
overlapping)
Cyber Warfare Crosses All Domains: Space – Air – Sea – Land
UNCLASSIFIED // LOCKHEED MARTIN PROPRIETARY INFORMATION
2
UNCLASSIFIED // LOCKHEED MARTIN PROPRIETARY INFORMATION
Cyber Operations I
Span an enormous range of scale, impact, complexity
– Unilateral attack to achieve military or political goal
– Active response to an attack (defense as offense)
– Preparations for or operations during kinetic war
Outcomes are highly contingent
– Identifying what targets to strike
– Collateral damage, cascading effects hard to limit or predict
– Battle damage assessment – how do you know what you did?
Success depends on
– How adversary systems are interconnected
– Adversary security measures that are in place and operational
– Available advance intelligence to guide attack planning or defense
Required private sector involvement may be significant:
– Base computer and networking technologies or services are often
based on commercial products or services
UNCLASSIFIED // LOCKHEED MARTIN PROPRIETARY INFORMATION
3
UNCLASSIFIED // LOCKHEED MARTIN PROPRIETARY INFORMATION
Cyber operations II
Two categories of cyber operations (offensive and defensive):
– Attack: destroy, degrade, disrupt technology or information
– Exploitation: obtain information from adversary systems
– Legal constructs (US Title 50 vs. Title 10 …)
Attack and exploitation both require a mix of:
– Social operations: Trick, bribe, extort, comprise an insider
– Technical operations: virus, DoS attack, supply chain compromise, …
Military and IC objectives include:
– Denial of operations or services
– Compromise of battle plans, intelligence, or commands
– Modification of battle plans, intelligence, commands
Inherently deniable – easy to conduct with plausible deniability
Require long lead times to set up
UNCLASSIFIED // LOCKHEED MARTIN PROPRIETARY INFORMATION
4
UNCLASSIFIED // LOCKHEED MARTIN PROPRIETARY INFORMATION
Space Based Capabilities
Communications
– Narrow Band (e.g. MUOS)
– Protected (e.g. AEHF)
– Wideband (e.g. WGS)
– Relay
Remote Sensing
– SIGINT
– IMINT
– OPIR (e.g. SBIRS)
– Weather
– etc.
Position, Navigation, Timing
– GPS
Space based capabilities are critical to many missions
UNCLASSIFIED // LOCKHEED MARTIN PROPRIETARY INFORMATION
5
UNCLASSIFIED // LOCKHEED MARTIN PROPRIETARY INFORMATION
Mission Assurance
Enterprise level perspective critical to mission assurance
Cyber and Physical worlds not separable
– Cyber attacks can result in physical effects
– Physical attacks can result in cyber effects
“Domains” (Land, Sea, Air, Space) are not separable
Integrated, cross-domain analysis is required
Our focus is on assuring the mission(s)
UNCLASSIFIED // LOCKHEED MARTIN PROPRIETARY INFORMATION
6
UNCLASSIFIED // LOCKHEED MARTIN PROPRIETARY INFORMATION
Space Environment and Hazards
Space
– Extreme temperatures
– Radiation
– Electric fields
– Magnetic fields
– Charged particles
– Solar flares
– Micrometeoroids
– Orbital debris
– Space vehicles
Human
– Acquisition delays
Terrestrial
– Severe storms (hurricanes,
blizzards, tornados,…)
– Floods
– Wildfires
– Landslides
– Earthquakes
– Tsunamis
– Volcanic eruptions
– Radiofrequency interference
– Launch failure
UNCLASSIFIED // LOCKHEED MARTIN PROPRIETARY INFORMATION
7
UNCLASSIFIED // LOCKHEED MARTIN PROPRIETARY INFORMATION
Threats to Space
“Cyber”
– Probing, intrusion
– Denial of service
– Malicious software
– Tamper, embed
– Insertion, manipulation
– Takeover
Electronic
– Brute force jamming
– Smart jamming
– Spoofing
– Meaconing
Physical
– Sabotage, terrorism, special ops
Directed Energy
– Laser dazzling
– High energy laser
– Prompt (blast, heat, SEU), Total dose
RF
– High power microwave
– Air strike, missile strike
– Direct ascent ASAT (LEO, MEO, or
GEO)
Rendezvous & Proximity Operations
– Cyber
– Electronic
– Radiofrequency
– Directed Energy
– Kinetic Energy
• Nuclear
UNCLASSIFIED // LOCKHEED MARTIN PROPRIETARY INFORMATION
8
UNCLASSIFIED // LOCKHEED MARTIN PROPRIETARY INFORMATION
Program Lifecycle: Attack Opportunities
Attacks Can Occur During Every Phase in a Program’s Lifecycle
UNCLASSIFIED // LOCKHEED MARTIN PROPRIETARY INFORMATION
9
UNCLASSIFIED // LOCKHEED MARTIN PROPRIETARY INFORMATION
Improving Mission Assurance
Reduce number of attack surfaces and minimize each surface
Attack surfaces arise from…
– People and their behaviors: users, operators, administrators…
– Flaws in architecture and/or design
– Defects in software and hardware
– Misconfigured systems and/or subsystems
– Supply chain and supplier base
Improve architecture “resilience”
Improve compliance (to processes, established best practice,
required configurations…)
– Addresses ~80% of current attack vectors in use
Focus needs to be on assuring the mission(s)
UNCLASSIFIED // LOCKHEED MARTIN PROPRIETARY INFORMATION
10
UNCLASSIFIED // LOCKHEED MARTIN PROPRIETARY INFORMATION
UNCLASSIFIED // LOCKHEED MARTIN PROPRIETARY INFORMATION
11