Protecting Everything in the Age of Light - 1105...

16
Protecting Everything in the Age of Light Attacks From the Physical Infrastructure Standpoint

Transcript of Protecting Everything in the Age of Light - 1105...

Protecting Everything in the Age of Light

Attacks From the

Physical Infrastructure Standpoint

Datacenter & SAN

Infrastructure Solutions (Pre-terminated cables, cabinets, etc)

Physical Security & Life Safety (Access Control, CCTV, Paging,

Notification)

Physical Network Security &

Information Assurance Solutions (PDS, Fiber Security, Intelligent Patching)

Tactical & Deployable Solutions (Mobile Command Centers, Integrated Cross

Talk over multiple platforms)

OSP/LAN Networks (Cable, Connectivity,

Pathway, Racks/Cabinets)

Secure/C4ISR Network

& SCIF Infrastructure (SIPRNET/JWICS, DODIIS)

Light and Air • Communication Infrastructure from Inside Plant to Outside Plant

• Vulnerabilities of Wired/Wireless Communications Networks

• Available Technologies to Protect Physical Infrastructure

• Department of Defense is Driving Information Assurance

• Protecting Everything

Protecting Everything

National: Border Security

Railways: Cable Tampering

Railways: Track Damage

Military: Choke Points

Perimeters: Restricted Areas

Perimeters: Airports

Military: Counter IED

Perimeters: Power Stations

Perimeters: Vandalism

Perimeters: High Value Assets

Why Fiber?

• Fiber is inexpensive • Simple installation • Maintenance-free • No power or electronics in the field • Fiber is inert, perfect for hazardous conditions • Immune to EMI, RFI, and lightning • Covert applications

Available Technologies

Methods • Harden

• Pipe, Concrete, Boxes, Locks, Welding etc…

• Inspection • Constant or Periodic Visual Inspection

• Alarm • External Monitors

• Internal Monitors

• Designed for data infrastructure security • Makes the entire cable a sensor

- Use a pair of fibers inside the cable being protected

- When any component of the cable is abnormally handled, the monitored fibers sense the disturbance

• Event discrimination technology - Learns the ambient state of the network and

differentiates between benign events and real threats

- False alarms eliminated - If an INTERCEPTOR alarms, there is a problem

(perhaps not a threat)

Standard fibers intrinsic to (inside) the cables being protected are used to monitor intrusions into the cables themselves

Rack mounted Sensing Controller

Inactive lead-

in cable

Passive

Start

Junction

fiber optic sensing cable Passive Terminator

• A SM fiber optic cable is used as a distributed sensor

• Steady CW laser light is sent down the fiber

• When any motion or vibration acts on the fiber, or anything the fiber is attached to or buried in, the lightwave is affected and this change is detected and the event is classified using patented FFT technology

Uses standard fiber optic cable.

Measurements all along a 16km fiber = 16,000 sensors.

Backscattered light provides measurement point every 1m.

Resulting Trace

Backscatter light caused by

compression

1 meter pulse of light traveling inside fiber

Standard communication glass fiber

Outer casing

Compression caused by vibration

Acoustic profiles for common intrusion activities triggers an alert.

Acoustic profile of digging in the vicinity of a buried fiber

Footsteps along the Aura buried fiber sensor

Intruder brushing against a chain link fence

Protecting Everything

Single system provides:

Event detection and identification

Threat locating and tracking

Real time situational awareness

Integration with other sensors

Monitoring A Military Supply Route Applications include C-IED and the monitoring of choke points.

• Buried fiber along the center of a Main Supply Route

• Buried fiber for choke points and forward operating bases

• Infrastructure may be used for communications

• Minimal burial depth required for sensing.

Define fiber architecture for threats & environment

Configure system for environment

Detect and track events through sensing zone

Classify events using acoustic signature (e.g. walking, vehicles, etc)

Alarm sent to field operators with threat class, track and velocity

Appropriate action taken to mitigate threat

Buried fiber Mounted fiber Non-sensing fiber

Main Supply Route

Suspect area for insurgent activity

Monitoring A Military Supply Route 1. Detect vehicle movement on

MSR at night

2. Footsteps and digging classified

3. Alert provided to HQ

4. UAV vectored to coordinates for further intel

5. Alert information sent to local engineering teams, with warnings provided to logistics and military personnel

Define fiber architecture for threats & environment

Configure system for environment

Detect and track events through sensing zone

Classify events using acoustic signature (e.g. walking, vehicles, etc)

Alarm sent to field operators with threat class, track and velocity

Appropriate action taken to mitigate threat

Buried fiber Mounted fiber Non-sensing fiber

Main Supply Route

Suspect area for insurgent activity

1

2

3

4 5

Monitoring A Military Supply Route

Define fiber architecture for threats & environment

Configure system for environment

Detect and track events through sensing zone

Classify events using acoustic signature (e.g. walking, vehicles, etc)

Alarm sent to field operators with threat class, track and velocity

Appropriate action taken to mitigate threat

This deployment provides:

Real-time situational awareness on MSR of insurgent activities that could indicate an IED threat

Accurate positioning of threat activities to vector other surveillance assets

Increased security for logistics and military personnel operating along MSRs

Buried fiber Mounted fiber Non-sensing fiber

Main Supply Route

Suspect area for insurgent activity

1

2

3

4 5

Department of Defense Defense Information Systems Agency (DISA) A Combat Support Agency, provides, operates, and assures command and control, information sharing capabilities, and a globally accessible enterprise information infrastructure in direct support to joint warfighters, National level leaders, and other mission and coalition partners across the full spectrum of operations.

Information Assurance (IA) National Security Agency (NSA) NSA's Information Assurance Mission focuses on protecting National Security Information and Information Systems

Certified TEMPEST Technical Authority (CTTA) "TEMPEST Countermeasures for Facilities," establishes guidelines and procedures that shall be used by departments and agencies to determine the applicable TEMPEST countermeasures for national security systems.

Conclusion

Secure(it) Program

• Most Comprehensive Collection of Products and Solutions Developed Specifically for Reducing the Cost and Complexity of SIPRNet Networks

• Proven Approved Bundled Solutions from Industry Leading Manufacturers

• Exclusive to CSC Products and Solutions

• Design and Consulting Services Available

• Complete Security For Confidential, Secret, Top Secret, Sensitive Compartmented Information (SCI), Special Access Programs (SAP)

• The Most Experienced Team in The Industry.