Back to news

June 21, 2019 | International, Naval

Navy Looking for Better Ways to Share Data

By:

WASHINGTON, D.C. – The Navy is grappling with how to securely share the vast amounts of data ship designers, operators and sustainers collect, a panel of engineers said Wednesday.

Shipyards have the design systems they use to transmit plans from engineers to the shipbuilders. Once delivered, modern ships, submarines and even aircraft generate tremendous amounts of data gauging their performance. The Navy has more data than it knows what to do with, but Rear Adm. Lorin Selby wants to change this.

“The problem we have is we don't do a great job of linking those together,” Selby said of the various data points. “That's what I'm driving for trying to link those together.”

Selby, the chief engineer and deputy commander for ship design, integration and naval engineer at the Naval Sea Systems Command, was speaking as part of a panel discussing how the Navy and shipbuilding industry can use digital plans at the American Society of Naval Engineering's annual Technology, Systems & Ship symposium.

Selby was joined by Rear Adm. Eric Ver Hage, the commander of the Naval Surface Warfare Center and Naval Undersea Warfare Center, and Zac Staples, a retired commander and current chief executive of Austin, Texas,-based maritime analytics firm FATHOM5. Staples' final tour in the Navy was the director of the Center for Cyber Warfare at the Naval Postgraduate School.

“Today, we know the liability of many of our systems. We know the ship loadout. We know the type of baseline the ships have. We know the performance of tactical action officers and other key watchstanders when they're in the basic training cycle. We know the proficiency of the strike group when they go to sea,” Ver Hage said. “You have all this data; the problem is, we put missiles on ships, but the combat systems can't unlock all the capability that missile has in some instances,” he said, referring the possibility communications between ships and missiles could improve targeting.

When quantum computing is developed, the ability to process this massive amount of data will become much easier, Selby said. Quantum computing is still being researched, with several nations trying to develop a way to tackle large data sets quickly, Selby explained. Within a year or two of mastering quantum computing, he predicts everyone will be able to use quantum computing. For the U.S. to have a decisive quantum computing edge, Selby said requires being ready now.

“The key to being the one who can actually lever that technology and really take a huge leap forward in this century is going to be the nation that lays the foundation to be able to lever the capabilities of quantum with a software delivery mechanism,” Selby said.

However, as the ability to analyze data speeds up, the importance of protecting this data also grows.

“If we're going to build capabilities in the era of great power competition, we have to assume our adversaries are trying to steal them – because they're trying to steal them,” Staples said. “The exact copy Chinese joint strike fighter is a good indication that whatever our shipboard capabilities might go for will be equally targeted.”

The current secure method of transferring data classified up to the secret level is over the Secret Internet Protocol Router Network (SIPRNet). However, SIPRNet has limitations, such as the expense of operating the network and creating secure terminals so everyone has access to a SIPRNet terminal to send and receive classified secret information.

A cloud-based data vault could prove to be a good solution. Under such a program, access can be restricted, Staples said. Vault monitors will also know which adversaries are denied access to the valuable data being stored.

“When you think about encrypting data, there's probably a more efficient way to do that than on SIPRNet,” Staples said.

https://news.usni.org/2019/06/20/navy-looking-for-better-ways-to-share-data

On the same subject

  • The Air Force sends good guys in to hack its cloud

    August 8, 2019 | International, Security

    The Air Force sends good guys in to hack its cloud

    By: Andrew Eversden The Air Force invited ethical hackers into its IT networks again this spring, allowing good guys the chance to infiltrate its enterprise-wide Air Force Common Computing Environment in search of vulnerabilities, the white hat hacking company Bugcrowd announced Aug. 6. The bug bounty program, done in a partnership with Bugcrowd and the Air Force's CCE program office, found 54 vulnerabilities. Bug bounties work under the assumption that the customer, in this case the Air Force, will now close the loopholes the hackers found, making the system more secure. The CCE cloud uses Amazon Web Services and Microsoft's Azure commercial cloud. The service plans to migrate more than 100 applications to that cloud environment, Bugcrowd executives said. The largest payout from the bug bounty totaled $20,000. The event ran from March 18 to June 21 at Hanscom Air Force Base in Massachusetts. Casey Ellis, Bugcrowd founder and CTO, said it was the first time Bugcrowd has worked with the Air Force. The Air Force has completed several other white hat hacking events with the firm HackerOne. Ellis said that moving to the cloud from on-premise environment represents a “paradigm shift” for many organizations. Penetration testing is an important part of keeping that environment secure, he said. Bugcrowd conducted such tests in six phases: source code analysis, AWS environment testing, Azure environment testing, black box network authentication assessment, social engineering engagement and Air Force portal testing. Bugcrowd declined to discuss how many vulnerabilities were found throughout each stage of the process. According to a news release from the Air Force from April, the CCE currently houses 21 Air Force applications and "has room for countess more.” The computing environment allows the Air Force to have a cloud to host its applications that reside on its Global Combat Support System, which is a centralized, cohesive enterprise resource planning system. The Air Force said in the April release that each migration costs $446,000 and that the service has spent more than $136 million on the program since 2016. https://www.fifthdomain.com/dod/air-force/2019/08/06/the-air-force-sends-good-guys-in-to-hack-its-cloud/

  • See images from the first day of the Singapore Airshow

    February 16, 2022 | International, Aerospace

    See images from the first day of the Singapore Airshow

    '€œThe show might be smaller, and the pandemic may have mitigated the number of exhibitors, but it doesn't mean that defense procurement has been slowing down.'€

  • Lockheed Martin wins $2.76B Army contract for guided missile rockets

    March 30, 2021 | International, Land

    Lockheed Martin wins $2.76B Army contract for guided missile rockets

    The U.S. Army announced a $2.76 billion contract award to Lockheed Martin to obtain guided missile launch rocket systems and associated equipment.

All news