protecting everything in the age of light - 1105...
Post on 06-Sep-2018
219 Views
Preview:
TRANSCRIPT
Datacenter & SAN
Infrastructure Solutions (Pre-terminated cables, cabinets, etc)
Physical Security & Life Safety (Access Control, CCTV, Paging,
Notification)
Physical Network Security &
Information Assurance Solutions (PDS, Fiber Security, Intelligent Patching)
Tactical & Deployable Solutions (Mobile Command Centers, Integrated Cross
Talk over multiple platforms)
OSP/LAN Networks (Cable, Connectivity,
Pathway, Racks/Cabinets)
Secure/C4ISR Network
& SCIF Infrastructure (SIPRNET/JWICS, DODIIS)
Light and Air • Communication Infrastructure from Inside Plant to Outside Plant
• Vulnerabilities of Wired/Wireless Communications Networks
• Available Technologies to Protect Physical Infrastructure
• Department of Defense is Driving Information Assurance
• Protecting Everything
Protecting Everything
National: Border Security
Railways: Cable Tampering
Railways: Track Damage
Military: Choke Points
Perimeters: Restricted Areas
Perimeters: Airports
Military: Counter IED
Perimeters: Power Stations
Perimeters: Vandalism
Perimeters: High Value Assets
Why Fiber?
• Fiber is inexpensive • Simple installation • Maintenance-free • No power or electronics in the field • Fiber is inert, perfect for hazardous conditions • Immune to EMI, RFI, and lightning • Covert applications
Available Technologies
Methods • Harden
• Pipe, Concrete, Boxes, Locks, Welding etc…
• Inspection • Constant or Periodic Visual Inspection
• Alarm • External Monitors
• Internal Monitors
• Designed for data infrastructure security • Makes the entire cable a sensor
- Use a pair of fibers inside the cable being protected
- When any component of the cable is abnormally handled, the monitored fibers sense the disturbance
• Event discrimination technology - Learns the ambient state of the network and
differentiates between benign events and real threats
- False alarms eliminated - If an INTERCEPTOR alarms, there is a problem
(perhaps not a threat)
Standard fibers intrinsic to (inside) the cables being protected are used to monitor intrusions into the cables themselves
Rack mounted Sensing Controller
Inactive lead-
in cable
Passive
Start
Junction
fiber optic sensing cable Passive Terminator
• A SM fiber optic cable is used as a distributed sensor
• Steady CW laser light is sent down the fiber
• When any motion or vibration acts on the fiber, or anything the fiber is attached to or buried in, the lightwave is affected and this change is detected and the event is classified using patented FFT technology
Uses standard fiber optic cable.
Measurements all along a 16km fiber = 16,000 sensors.
Backscattered light provides measurement point every 1m.
Resulting Trace
Backscatter light caused by
compression
1 meter pulse of light traveling inside fiber
Standard communication glass fiber
Outer casing
Compression caused by vibration
Acoustic profiles for common intrusion activities triggers an alert.
Acoustic profile of digging in the vicinity of a buried fiber
Footsteps along the Aura buried fiber sensor
Intruder brushing against a chain link fence
Protecting Everything
Single system provides:
Event detection and identification
Threat locating and tracking
Real time situational awareness
Integration with other sensors
Monitoring A Military Supply Route Applications include C-IED and the monitoring of choke points.
• Buried fiber along the center of a Main Supply Route
• Buried fiber for choke points and forward operating bases
• Infrastructure may be used for communications
• Minimal burial depth required for sensing.
Define fiber architecture for threats & environment
Configure system for environment
Detect and track events through sensing zone
Classify events using acoustic signature (e.g. walking, vehicles, etc)
Alarm sent to field operators with threat class, track and velocity
Appropriate action taken to mitigate threat
Buried fiber Mounted fiber Non-sensing fiber
Main Supply Route
Suspect area for insurgent activity
Monitoring A Military Supply Route 1. Detect vehicle movement on
MSR at night
2. Footsteps and digging classified
3. Alert provided to HQ
4. UAV vectored to coordinates for further intel
5. Alert information sent to local engineering teams, with warnings provided to logistics and military personnel
Define fiber architecture for threats & environment
Configure system for environment
Detect and track events through sensing zone
Classify events using acoustic signature (e.g. walking, vehicles, etc)
Alarm sent to field operators with threat class, track and velocity
Appropriate action taken to mitigate threat
Buried fiber Mounted fiber Non-sensing fiber
Main Supply Route
Suspect area for insurgent activity
1
2
3
4 5
Monitoring A Military Supply Route
Define fiber architecture for threats & environment
Configure system for environment
Detect and track events through sensing zone
Classify events using acoustic signature (e.g. walking, vehicles, etc)
Alarm sent to field operators with threat class, track and velocity
Appropriate action taken to mitigate threat
This deployment provides:
Real-time situational awareness on MSR of insurgent activities that could indicate an IED threat
Accurate positioning of threat activities to vector other surveillance assets
Increased security for logistics and military personnel operating along MSRs
Buried fiber Mounted fiber Non-sensing fiber
Main Supply Route
Suspect area for insurgent activity
1
2
3
4 5
Department of Defense Defense Information Systems Agency (DISA) A Combat Support Agency, provides, operates, and assures command and control, information sharing capabilities, and a globally accessible enterprise information infrastructure in direct support to joint warfighters, National level leaders, and other mission and coalition partners across the full spectrum of operations.
Information Assurance (IA) National Security Agency (NSA) NSA's Information Assurance Mission focuses on protecting National Security Information and Information Systems
Certified TEMPEST Technical Authority (CTTA) "TEMPEST Countermeasures for Facilities," establishes guidelines and procedures that shall be used by departments and agencies to determine the applicable TEMPEST countermeasures for national security systems.
Conclusion
Secure(it) Program
• Most Comprehensive Collection of Products and Solutions Developed Specifically for Reducing the Cost and Complexity of SIPRNet Networks
• Proven Approved Bundled Solutions from Industry Leading Manufacturers
• Exclusive to CSC Products and Solutions
• Design and Consulting Services Available
• Complete Security For Confidential, Secret, Top Secret, Sensitive Compartmented Information (SCI), Special Access Programs (SAP)
• The Most Experienced Team in The Industry.
top related