21 juin 2019 | International, Naval

Navy Looking for Better Ways to Share Data

By:

WASHINGTON, D.C. – The Navy is grappling with how to securely share the vast amounts of data ship designers, operators and sustainers collect, a panel of engineers said Wednesday.

Shipyards have the design systems they use to transmit plans from engineers to the shipbuilders. Once delivered, modern ships, submarines and even aircraft generate tremendous amounts of data gauging their performance. The Navy has more data than it knows what to do with, but Rear Adm. Lorin Selby wants to change this.

“The problem we have is we don't do a great job of linking those together,” Selby said of the various data points. “That's what I'm driving for trying to link those together.”

Selby, the chief engineer and deputy commander for ship design, integration and naval engineer at the Naval Sea Systems Command, was speaking as part of a panel discussing how the Navy and shipbuilding industry can use digital plans at the American Society of Naval Engineering's annual Technology, Systems & Ship symposium.

Selby was joined by Rear Adm. Eric Ver Hage, the commander of the Naval Surface Warfare Center and Naval Undersea Warfare Center, and Zac Staples, a retired commander and current chief executive of Austin, Texas,-based maritime analytics firm FATHOM5. Staples' final tour in the Navy was the director of the Center for Cyber Warfare at the Naval Postgraduate School.

“Today, we know the liability of many of our systems. We know the ship loadout. We know the type of baseline the ships have. We know the performance of tactical action officers and other key watchstanders when they're in the basic training cycle. We know the proficiency of the strike group when they go to sea,” Ver Hage said. “You have all this data; the problem is, we put missiles on ships, but the combat systems can't unlock all the capability that missile has in some instances,” he said, referring the possibility communications between ships and missiles could improve targeting.

When quantum computing is developed, the ability to process this massive amount of data will become much easier, Selby said. Quantum computing is still being researched, with several nations trying to develop a way to tackle large data sets quickly, Selby explained. Within a year or two of mastering quantum computing, he predicts everyone will be able to use quantum computing. For the U.S. to have a decisive quantum computing edge, Selby said requires being ready now.

“The key to being the one who can actually lever that technology and really take a huge leap forward in this century is going to be the nation that lays the foundation to be able to lever the capabilities of quantum with a software delivery mechanism,” Selby said.

However, as the ability to analyze data speeds up, the importance of protecting this data also grows.

“If we're going to build capabilities in the era of great power competition, we have to assume our adversaries are trying to steal them – because they're trying to steal them,” Staples said. “The exact copy Chinese joint strike fighter is a good indication that whatever our shipboard capabilities might go for will be equally targeted.”

The current secure method of transferring data classified up to the secret level is over the Secret Internet Protocol Router Network (SIPRNet). However, SIPRNet has limitations, such as the expense of operating the network and creating secure terminals so everyone has access to a SIPRNet terminal to send and receive classified secret information.

A cloud-based data vault could prove to be a good solution. Under such a program, access can be restricted, Staples said. Vault monitors will also know which adversaries are denied access to the valuable data being stored.

“When you think about encrypting data, there's probably a more efficient way to do that than on SIPRNet,” Staples said.

https://news.usni.org/2019/06/20/navy-looking-for-better-ways-to-share-data

Sur le même sujet

  • Four big questions for cybersecurity in 2019

    2 janvier 2019 | International, C4ISR

    Four big questions for cybersecurity in 2019

    By: Justin Lynch How will cybersecurity experts remember 2018? In the past year, the Trump administration announced it would take more offensive hacking operations against foreign countries, the Department of Justice announcedsweeping indictments against Chinese hackers and the U.S. intelligence community reported that foreign countries continued to interfere in American elections. So what comes next? Here are four overarching questions for the cybersecurity community in 2019: What will the new Pentagon chief do with expanded cyber powers? In August, the president gave the secretary of Defense the ability to conduct cyberattacks against foreign countries so long as they do not interfere with the national interest of the United States, according to four current and former White House and intelligence officials. But the resignation of Jim Mattis, the Defense secretary, means the next Pentagon chief will have a broad arsenal of cyber authorities. For the cyber community, Patrick Shanahan, the current acting secretary, is a relative unknown. He has not given significant insight into how he views the role of offensive cyberattacks for the Pentagon, and his scheduled Jan. 1 elevation comes as some in the Trump administration and U.S. Cyber Command have pushed for even more authorities. However, he has spoken at length about the need for the defense industry to bolster its own cyber practices. Although the appointment of Shanahan as acting Pentagon chief is temporary, he is on the short list of officials who may take on the job full time. The new Pentagon chief may also have to decide when the National Security Agency and U.S. Cyber Command should split. Both bodies are led by Gen. Paul Nakasone, but that may change. Cyber Command is in the process of gaining its own infrastructure to conduct offensive cyberattacks, and a Pentagon official told Fifth Domain in November that it appeared the split was all but certain to happen in the coming years, although no formal decision as been made. What comes next in the U.S.-China cyber relationship? The Department of Justice released a flurry of indictments against Chinese hackers in 2018, accusing Beijing's cyber sleuths of infiltrating American government agencies and defense contractors. The most recent round of allegations came Dec. 18, and the legal action could continue in 2019. While announcing the most recent indictments, Deputy Attorney General Rod Rosenstein accused China of breaking an agreement not to use hacked materials for commercial use, although he did not offer evidence. The hacking allegations come amid a broader trade war between the United States and China. Experts have told Fifth Domain a trade war could increase digital tension between the two nations. If the trade war continues, experts say they see little incentive for China to limit its cyberattacks. Will America suffer blowback for more offensive cyber operations? When the Trump administration announced the United States would take more offensive actions in cyberspace, some in the federal cybersecurity community criticized the plan as faulty. “The side effects of the strategy of ‘persistent engagement' and ‘defend forward' are still ill-understood,” Max Smeets and Herb Lin, experts at Stanford University wrote for Lawfare. “A United States that is more powerful in cyberspace does not necessarily mean one that is more stable or secure.” Experts also warn of making any rush judgments about the effectiveness of these offensive cyberattacks. Current and former intelligence officials worry that uncovering and attributing a hack can take more than a year, and, even then, that process is not perfect. One former official pointed to the leaked documents about Russian targeting of American election infrastructure in 2016 that was sent to the news organization the Intercept. It took months for the intelligence community to understand the full extent of the hack, the official said, an example of how long it takes to detect a cyberattack. However, all of that means it is reasonable to expect that the merits of the new offensive cyber operations may not be known publicly for years. Will Congress take action to streamline cybersecurity contracting and research? Yes, changing the way government does business is ambitious. But experts argue that if the United States wants to keep up with digital innovations from China and other countries it is necessary to change the American government's relationship with the private sector and academia. The effort to streamline cybersecurity funding and research will fall to the new Congress, in which Democrats will take over the House of Representatives. But when it comes to the U.S. government's relationship with the cyber industry, structural barriers to innovation remain. On average, it takes roughly seven years for an idea to get a contract inside the U.S. government. In that length of time, a product is already two generations old. Former Pentagon officials have used the digital fight against the Islamic State as an example of how long the process takes. It took roughly two years for Cyber Command to receive the proper equipment and training after the order to digitally defeat the Islamic State, officials told Fifth Domain. In addition, the cybersecurity industry is watching a series of bills in Congress. Sen. Mark Warner, D-Va., has pushed for a streamlined security clearance process, and industry officials told Fifth Domain they expect him to continue the effort in the new year. The bill could make it easier and cheaper to get a security clearance. And many in the federal cybersecurity community have called for a change in academia's relationship with cybersecurity. The universities and research institutions in the United States focusing on quantum computing are “subpar,” George Barnes, deputy director at the NSA said in June. Experts say that quantum computers will make traditional cybersecurity methods obsolete because of the expansive computing power. However, new investments in artificial intelligence and a new Solarium Commission, which was created to help contextualize cyber in the broader national and economic security discussion, may provide solutions to these problems. https://www.fifthdomain.com/industry/2018/12/31/four-big-questions-for-cybersecurity-in-2019

  • Argentina’s Army, Air Force to split new order of Bell Textron helos

    22 décembre 2022 | International, Aérospatial

    Argentina’s Army, Air Force to split new order of Bell Textron helos

    Deliveries are to start in the second half of 2023.

  • Embraer and Saab launch joint production line for Gripen fighter jets in Brazil

    9 mai 2023 | International, Aérospatial

    Embraer and Saab launch joint production line for Gripen fighter jets in Brazil

    Embraer SA and Saab on Tuesday launched a production line for Gripen fighter jets in Brazil, a move seen strengthening their partnership as the South American country mulls potential new orders for the aircraft.

Toutes les nouvelles