An L3 Perspective on Allied Data Security

10
1 Joint force Information Exchange and Data Integrity in a Coalition Environment Rob Slaven, DSM L-3 Communication Systems Australia

Transcript of An L3 Perspective on Allied Data Security

1

Joint force Information

Exchange and Data

Integrity in a Coalition

Environment

Rob Slaven, DSML-3 Communication Systems Australia

2

“Trust me”

Does not compute…

3

Come as you are warfare

For a Coalition finding a common cause is hard, speaking one language is harder, whilst using common systems and equipment configurations would seem to be the hardest challenge of them all

4

The Expeditionary Battlespace

5

Integration as a stepping stone

The challenge isn’t

technical in nature, but

technical solutions exist

to address the issue in

the short term given early

holistic focus

6

The hidden threat

“Every battle is won before it’s ever fought”

Sun Tzu

7

Black Routed WAN(e.g. MTWAN)

HAIPECrypto HAIPE

Crypto

Black IPBlack IP

UNCLASSIFIED Data

PROTECTED/FOUOData

Black IP

Black IP

5-Eyes SECRET Data

TOP SECRET Data

AUSTEO SECRET Data

HAIPECrypto

Black IP

TCDL with Embedded Crypto e.g.

ROVER, mini-CDL

Red IP

Satcom Links

Terr

estr

ial L

inks

Data Diode

8

How to address the problem?

• Internationally agreed interface standards and programming languages are a first step

• Initiation of a cyber secure program environment from project initiation is a necessary step

9

A Future Vision

• All sensors

• All data

• All weapons

• All bandwidth

• One picture

• One unified

response

10