Protecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information

Similar documents
Engaging the DoD Enterprise to Protect U.S. Military Technical Advantage

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE. DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3)

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC

Department of Defense INSTRUCTION

SECRETARY OF THE ARMY WASHINGTON

Department of Defense MANUAL

Department of Defense INSTRUCTION. SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems

Department of Defense INSTRUCTION

Department of Defense DIRECTIVE

Supply Chain Risk Management

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 7 R-1 Line #198

An Enterprise Environment for Information Assurance / Computer Network Defense Testing and Evaluation

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

DEPARTMENT OF THE NAVY INSIDER THREAT PROGRAM. (1) References (2) DON Insider Threat Program Senior Executive Board (DON ITP SEB) (3) Responsibilities

Department of Defense INSTRUCTION

DEPARTMENT OF THE NAVY COUNTERINTELLIGENCE

DEPUTY SECRETARY OF DEFENSE 1010 DEFENSE PENTAGON WASHINGTON, DC

Department of Defense INSTRUCTION

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 5 R-1 Line #199

Department of Defense DIRECTIVE

8/11/2015. Navigation in the Meeting Room. Cyber Enabled Threats to Cleared Industry. Host: Rebecca Morgan Counterintelligence Instructor CDSE

Department of Defense INSTRUCTION

Department of Defense DIRECTIVE

FSO Role in the NISP. Student Guide. Lesson 1: Course Introduction. Course Information. Course Overview

Department of Defense DIRECTIVE

Department of Defense MANUAL

DATA ITEM DESCRIPTION

DOD Insider Threat Management and Analysis Center COUNTERINTELLIGENCE AWARENESS WEBINAR SERIES

DOD STRATEGY CWMD AND THE POTENTIAL ROLE OF EOD

Department of Defense INSTRUCTION

Agency Mission Assurance

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION. Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN)

Subj: DEPARTMENT OF THE NAVY CYBERSECURITY/INFORMATION ASSURANCE WORKFORCE MANAGEMENT, OVERSIGHT, AND COMPLIANCE

Department of Defense MANUAL

DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC

Encl: (1) References (2) Department of the Navy Security Enterprise Governance (3) Senior Director for Security (4) Definitions (5) Responsibilities

Department of Defense INSTRUCTION

SUBJECT: Directive-Type Memorandum (DTM) Law Enforcement Reporting of Suspicious Activity

UNCLASSIFIED R-1 ITEM NOMENCLATURE

Department of Defense INSTRUCTION

Rapid Innovation Fund (RIF) Program

Department of Defense INSTRUCTION. SUBJECT: Physical Security Equipment (PSE) Research, Development, Test, and Evaluation (RDT&E)

Defense Industrial Base Predictive Analysis System

Department of Defense DIRECTIVE

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC

DEPARTMENT OF DEFENSE (DoD) INITIAL TRAINING GUIDE

Title: F/A-18 - EA-18 AIRCRAFT / SYSTEM PROGRAM PROTECTION IMPLEMENTATION PLAN. Number: DI-MGMT-81826C Approval Date:

UNCLASSIFIED R-1 ITEM NOMENCLATURE

Air Force Cyberspace Command NDIA 2007 DIB Infrastructure Protection Symposium

Department of Defense INSTRUCTION. DoD Treaty Inspection Readiness Program (DTIRP)

CYBER SECURITY PROTECTION. Section III of the DOD Cyber Strategy

DoD Joint Federated Assurance Center (JFAC) 2017 Update

Department of Defense INSTRUCTION. 1. PURPOSE. This Instruction, issued under the authority of DoD Directive (DoDD) 5144.

Cybersecurity TEMP Body Example

Question Distractors References Linked Competency

Department of Defense INSTRUCTION. SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information

Department of Defense DIRECTIVE

Security Asset Protection Professional Certification (SAPPC) Competency Preparatory Tools (CPT)

Export-Controlled Technology at Contractor, University, and Federally Funded Research and Development Center Facilities (D )

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE

New DoD Approaches on the Cyber Survivability of Weapon Systems

il~l IL 20 I I11 AD-A February 20, DIRECTIVE Department of Defense

Department of Defense DIRECTIVE

Department of Defense INSTRUCTION. DoD Unclassified Controlled Nuclear Information (UCNI)

SECNAVINST A DON CIO 20 December Subj: DEPARTMENT OF THE NAVY INFORMATION ASSURANCE (IA) POLICY

Department of Defense DIRECTIVE

Introduction to Homeland Security. The Intelligence Community (IC) Director of National Intelligence (DNI) National Intelligence Coord.

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE

Cyber Attack: The Department Of Defense s Inability To Provide Cyber Indications And Warning

Preserving Investigative and Operational Viability in Insider Threat

CHIEF NATIONAL GUARD BUREAU INSTRUCTION

Department of Defense INSTRUCTION

DOD DIRECTIVE DOD SPACE ENTERPRISE GOVERNANCE AND PRINCIPAL DOD SPACE ADVISOR (PDSA)

Department of Defense INSTRUCTION

Student Guide. Course: Integrating Counterintelligence (CI) and Threat Awareness into Your Security Program, v2

National Insider Threat Special Interest Group (NITSIG)

Department of Defense INSTRUCTION

Department of Defense DIRECTIVE

DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON DC

UNCLASSIFIED. Cost To Complete Total Program Element : TECH SURVEIL COUNTER MEAS EQPT. FY 2016 Base FY 2016 OCO

DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process

Subj: DEPARTMENT OF THE NAVY CRITICAL INFRASTRUCTURE PROTECTION PROGRAM

Department of Defense INSTRUCTION

JRSS Discussion Panel Joint Regional Security Stack

Department of Defense INSTRUCTION

January 3, 2011 MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES

Operations Security (OPSEC)

Department of Defense DIRECTIVE

Annual Automated ISR and Battle Management Symposium

Fiscal Year 2017 President s Budget Request for the DoD Science & Technology Program April 12, 2016

Naval Security Enterprise Newsletter

Department of Defense INSTRUCTION

The Threat and Local Observation Notice (TALON) Report Program. Report No. 07-INTEL-09 June 27, 2007

EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES

Transcription:

Protecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information Mr. Brian D. Hughes Office of the Deputy Assistant Secretary of Defense for Systems Engineering 18th Annual NDIA Systems Engineering Conference Springfield, VA October 28, 2015 October 26-29, 2015 Page-1

These are Not Cooperative R&D Efforts Russia s A-50 U.S. HUMVEE U.S. E-3C U.S. Reaper China s Yìlóng-1 China s Dongfeng EQ2050 October 26-29, 2015 Page-2

Agenda DoD efforts to safeguard Controlled Technical Information (CTI) Evolving DoD policy to evaluate the compromise of CTI DoD cyber intrusion damage assessment process Defense Industrial Base (DIB) s role in the process October 26-29, 2015 Page-3

Agenda DoD efforts to safeguard Controlled Technical Information (CTI) Evolving DoD policy to evaluate the compromise of CTI DoD cyber intrusion damage assessment process Defense Industrial Base (DIB) s role in the process October 26-29, 2015 Page-4

Significant DoD Losses Bulk of DoD technical data resides on unclassified non-dod networks As we moved to a world where data is both developed and conveyed electronically, traditional physical security concepts and constructs are no longer valid DIB CS/IA DAMAGE ASSESSMENT NOMINATIONS More than 10% assessed as serious Assessed Risk Summary Serious Moderate Minor Minimal DoD has only assessed a small amount of the compromised DIB data DIB Network Technical Data Exfiltration Cyber is not the only exploit. Joint Ventures Export Violations Insider Threats Academic Exchanges Others Requires an all source look to fully comprehend the impact October 26-29, 2015 Page-5

DoD Efforts to Address DIB Cyber Intrusions In 2007 DoD launched the Defense Industrial Base Cybersecurity/Information Assurance (DIB CS/IA) program Voluntary program enables Government-Industry threat information sharing, industry cyber incident reporting, and damage assessment of information losses Currently 128 partners and ~125,000 threat information products shared DIB Enhanced Cybersecurity Services (DECS) provides additional engagement with commercial service providers DFARS 252.204-7012 published Nov 18, 2013 requires mandatory reporting of compromised Unclassified Controlled Technical Information Required reporting within 72 hours of discovery of any reportable cyber incident Reportable cyber incidents include: o A cyber incident involving possible exfiltration, manipulation, or other loss or compromise of any unclassified controlled technical information resident on or transiting through Contractor s, or its subcontractors, unclassified information systems. DFARS 252.204-7012 updated with interim rule on August 26, 2015 to address safeguarding of Covered defense INFORMATION Covered defense INFORMATION includes o o o Controlled Technical Information Critical information (operations security) Export control Enables submission of the malicious software associated with the cyber incident to DoD (if the contractor discovers and is able to isolate) Does NOT enable Government - Industry threat information sharing October 26-29, 2015 Page-6

Agenda DoD efforts to safeguard Controlled Technical Information (CTI) Evolving DoD policy to evaluate the compromise of CTI DoD cyber intrusion damage assessment process Defense Industrial Base (DIB) s role in the process October 26-29, 2015 Page-7

Addressing the Loss of CTI Risk = ƒ ( threat, vulnerabilities, consequences) Goals: Enable information-sharing, collaboration, analysis, and risk management between acquisition and IC, CI, and LE Connect the dots in the risk function (map blue priorities, overlay red threat activities, warn of consequences) Integrate existing acquisition, IC, CI, and LE information to connect the dots in the risk function - linking blue priorities with adversary targeting and activity Cyber is a key data source, but many other sources and methods are relevant (e.g., HUMINT, joint ventures, etc.) Focus precious resources Speed discovery and improve reaction time Ultimately, evolve to a more proactive posture October 26-29, 2015 Page-8

DoD Policy Cyber: Defense Cyber Strategy, April 23, 2015: DoD will establish a Joint Acquisition Protection and Exploitation Cell (JAPEC) DoD will conduct comprehensive risk and damage assessments of cyber espionage and theft to inform requirements, acquisition, programmatic, and counterintelligence courses of action. Acquisition: Better Buying Power 3.0, April 9, 2015 Intelligence: Consolidated Intelligence Guidance (FY17-21), June 6, 2015 Planning and Programming Guidance for the National Intelligence Program and the Military Intelligence Program ASD(R&E) and the Services, with USD(I), Defense Security Service (DSS), CIO, and DIA will develop and demonstrate a process to link counterintelligence, law enforcement, and acquisition activities by establishing a joint analysis capability to improve enterprise protection of classified and unclassified technical information. -- USD(AT&L), BBP 3.0 Implementation Instructions, April 9, 2015 October 26-29, 2015 Page-9

JAPEC Mission: Integrated Analysis The Joint Acquisition and Protection Cell (JAPEC) integrates and coordinates analysis to enable Controlled Technology Information (CTI) protection efforts across the DoD enterprise to proactively mitigate future losses, and exploit opportunities to deter, deny, and disrupt adversaries that may threaten US military advantage. Capabilities Management Office (CMO) October 26-29, 2015 Page-10

JAPEC: Integrating Analysis Done at the Enterprise-Level JAPEC Other Agencies Army AT&L DoD R&D OSD DAMO DoD CI/LE USD(I) Army PEOs Army R&D Army CI/LE Army DAMO Army Intel COCOMs National CI/LE (FBI) USAF PEOs USAF R&D USAF AF DAMO Air Force CI/LE AF Intel National Intel (DIA, NSA, CIA) Shared Data Repository and Analytics Navy PEOs Navy R&D Navy Navy DAMO Navy CI/LE Navy Intel October 26-29, 2015 Page-11

Damage Assessment Focus Damage Assessment focuses on determining the impact of compromised CTI, NOT on the mechanism of cyber intrusion. Does this information enable an adversary to: Clone reverse engineer; Counter counter; or Kill defeat US capability? Assessment not possible without access to compromised material: Addressed in regulatory activities Purpose of resulting assessment: Trigger action across the linked communities (Acquisition, IC, CI, and LE) October 26-29, 2015 Page-12

Case Study: Failure to Protect USS Sturgeon Class Soviet Victor III Circumvention of protection schemes enabled parity October 26-29, 2015 Page-13

Tunable Response Options Acquisition Contract language Threat education Make program adjustments o E.g., accelerate alternative technologies Develop in classified environment CIO / Network Security Tiered IT security controls (e.g. isolated networks, commercial encryption, etc.) Counterintelligence Awareness training for programs (DIB and Government Program Offices) Incident investigations Focused CI support to security programs Intelligence Community Focused collection Requirements Community Revise requirements based on change in threat Warfighter Accept greater mission risk Update Tactics/Techniques/Procedures (TTPs) October 26-29, 2015 Page-14

Agenda DoD efforts to safeguard Controlled Technical Information (CTI) Evolving DoD policy to evaluate the compromise of CTI DoD cyber intrusion damage assessment process Defense Industrial Base (DIB) s role in the process October 26-29, 2015 Page-15

DIB Role Ensure appropriate action when CTI compromise occurs: Communicate with your stakeholders (e.g. program office, security (physical, network), contracts) Provide compromised data to the DoD in an expeditious manner Compromise is not the same as Exfiltration Work with DoD to recommend alternate protection measures Consider joining the DIB CS program: Enables Government to Industry information sharing Apply to the DIB CS program at http://dibnet.dod.mil/ Maintain an open dialogue with all the protection stakeholders Counterintelligence, Law Enforcement, Network Security, etc. The DIB is a critical partner in preventing unauthorized access to precious U.S. intellectual property by adversaries October 26-29, 2015 Page-16

Questions Mr. Brian D. Hughes Director, Joint Acquisition Protection and Exploitation Cell (JAPEC) brian.d.hughes3.civ@mail.mil 571-372-6451 October 26-29, 2015 Page-17