H OMELAND S ECURITY P HYSICAL S ECURITY (Focus Group 1A) Update to Council September 15, 2003 K ARL...

15
H H OMELAND OMELAND S S ECURITY ECURITY P P HYSICAL HYSICAL S S ECURITY ECURITY (Focus Group 1A) (Focus Group 1A) Update to Council Update to Council September 15, 2003 KARL F. RAUSCHER Chair Homeland Security Physical Security Focus Group (1A) Director Network Reliability, Lucent Technologies Bell Labs Chair NRIC V Best Practices Subcommittee Vice Chair ATIS Network Reliability Steering Committee (NRSC) Founder & President Wireless Emergency Response Team (WERT) Representative National Coordinating Center (NCC) for Telecommunications Advisory Board Member Center for Resilient Networks (Columbia University) Chair-Elect IEEE Technical Committee on Communications Quality & Reliability (CQR) Federal Communications Commission Network Reliability and Interoperability Council VI

description

H OMELAND S ECURITY P HYSICAL S ECURITY F OCUS G ROUP 1A 2/19/2016 K. F. Rauscher 3 Focus Group Mission The Focus Group will assess physical vulnerabilities in the public telecommunications networks and the Internet and determine how best to address those vulnerabilities to prevent disruptions that would otherwise result from terrorist activities, natural disasters, or similar types of occurrences. The Focus Group will conduct a survey of current practices by wireless, wireline, satellite, and cable telecommunications and Internet services providers, network operators and equipment suppliers that address Homeland Defense. By December 31, 2002 the Focus Group will issue a report identifying areas for attention and describing best practices, with checklists, that should be followed to prevent disruptions of public telecommunications services and the Internet from terrorist activities, natural disasters, or similar types of occurrences. The Focus Group will report on current disaster recovery mechanisms, techniques, and best practices and develop any additional best practices, mechanisms, and techniques that are necessary, or desirable, to more effectively restore telecommunications services and Internet services from disruptions arising from terrorist activities, natural disasters, or similar types of occurrences. The Focus Group will issue a report containing best practices recommendations, and recommended mechanisms and techniques (including checklists), for disaster recovery and service restoration. The Focus Group will issue this report within twelve (12) months of the first Council meeting. The Focus Group will coordinate with the Homeland Security Cyber Security Focus Group (1B) to assure that vulnerabilities in the public telecommunications networks and the Internet are assessed, and to determine how best to address those vulnerabilities to prevent disruptions that would otherwise result from terrorist activities, natural disasters, or similar types of occurrences. The Focus Group will also coordinate with other Focus Groups, as appropriate.

Transcript of H OMELAND S ECURITY P HYSICAL S ECURITY (Focus Group 1A) Update to Council September 15, 2003 K ARL...

Page 1: H OMELAND S ECURITY P HYSICAL S ECURITY (Focus Group 1A) Update to Council September 15, 2003 K ARL F. R AUSCHER Chair Homeland Security Physical Security.

HHOMELANDOMELAND S SECURITYECURITY P PHYSICALHYSICAL S SECURITYECURITY (Focus Group 1A)(Focus Group 1A)

Update to CouncilUpdate to Council

September 15, 2003

KARL F. RAUSCHER Chair Homeland Security Physical Security Focus Group (1A)

Director Network Reliability, Lucent Technologies Bell LabsChair NRIC V Best Practices Subcommittee

Vice Chair ATIS Network Reliability Steering Committee (NRSC)Founder & President Wireless Emergency Response Team (WERT)

Representative National Coordinating Center (NCC) for TelecommunicationsAdvisory Board Member Center for Resilient Networks (Columbia University)

Chair-Elect IEEE Technical Committee on Communications Quality & Reliability (CQR)

Federal Communications Commission

Network Reliability and Interoperability Council VI

Page 2: H OMELAND S ECURITY P HYSICAL S ECURITY (Focus Group 1A) Update to Council September 15, 2003 K ARL F. R AUSCHER Chair Homeland Security Physical Security.

05/04/23K. F. Rauscher

2

HOMELAND SECURITY PHYSICAL SECURITYFOCUS GROUP 1A

Network Reliability and Interoperability Council

• Mission• Areas for Attention (2)• Blended Attacks - Collaboration with Cyber Security

Focus Group (1B)• Actions for Council Members

OutlineOutline

Page 3: H OMELAND S ECURITY P HYSICAL S ECURITY (Focus Group 1A) Update to Council September 15, 2003 K ARL F. R AUSCHER Chair Homeland Security Physical Security.

05/04/23K. F. Rauscher

3

HOMELAND SECURITY PHYSICAL SECURITYFOCUS GROUP 1A

Network Reliability and Interoperability Council

Focus Group MissionFocus Group MissionThe Focus Group will assess physical vulnerabilities in the public telecommunications networks and the Internet and determine how best to address those vulnerabilities to prevent disruptions that would otherwise result from terrorist activities, natural disasters, or similar types of occurrences.

The Focus Group will conduct a survey of current practices by wireless, wireline, satellite, and cable telecommunications and Internet services providers, network operators and equipment suppliers that address Homeland Defense.

By December 31, 2002 the Focus Group will issue a report identifying areas for attention and describing best practices, with checklists, that should be followed to prevent disruptions of public telecommunications services and the Internet from terrorist activities, natural disasters, or similar types of occurrences.

The Focus Group will report on current disaster recovery mechanisms, techniques, and best practices and develop any additional best practices, mechanisms, and techniques that are necessary, or desirable, to more effectively restore telecommunications services and Internet services from disruptions arising from terrorist activities, natural disasters, or similar types of occurrences.

The Focus Group will issue a report containing best practices recommendations, and recommended mechanisms and techniques (including checklists), for disaster recovery and service restoration. The Focus Group will issue this report within twelve (12) months of the first Council meeting.

The Focus Group will coordinate with the Homeland Security Cyber Security Focus Group (1B) to assure that vulnerabilities in the public telecommunications networks and the Internet are assessed, and to determine how best to address those vulnerabilities to prevent disruptions that would otherwise result from terrorist activities, natural disasters, or similar types of occurrences. The Focus Group will also coordinate with other Focus Groups, as appropriate.

Page 4: H OMELAND S ECURITY P HYSICAL S ECURITY (Focus Group 1A) Update to Council September 15, 2003 K ARL F. R AUSCHER Chair Homeland Security Physical Security.

05/04/23K. F. Rauscher

4

HOMELAND SECURITY PHYSICAL SECURITYFOCUS GROUP 1A

Network Reliability and Interoperability Council

HardwareHardwareSoftwareSoftware

EnvironmentEnvironmentPayloadPayload

NetworksNetworks PolicyPolicyHumanHumanPowerPower

Communications InfrastructureCommunications Infrastructure

CCOMMUNICATIONSOMMUNICATIONS I INFRASTRUCTURENFRASTRUCTURE

Other InfrastructuresOther Infrastructures

TRANSPORTATION ENERGY

FINANCIAL

PUBLIC HEALTH

LAW ENFORCEMENT

Page 5: H OMELAND S ECURITY P HYSICAL S ECURITY (Focus Group 1A) Update to Council September 15, 2003 K ARL F. R AUSCHER Chair Homeland Security Physical Security.

05/04/23K. F. Rauscher

5

HOMELAND SECURITY PHYSICAL SECURITYFOCUS GROUP 1A

Network Reliability and Interoperability Council

Area for Attention No. 1Area for Attention No. 1 Protecting Critical Infrastructure Information BACKGROUND

• Government entities - at all levels - are systematically gathering information about critical infrastructures within their jurisdictions

• Security requires strict protection of critical information by means of very controlled access and distribution

• The number of lists of critical communications infrastructure facilities can be nearly impossible to protect

Page 6: H OMELAND S ECURITY P HYSICAL S ECURITY (Focus Group 1A) Update to Council September 15, 2003 K ARL F. R AUSCHER Chair Homeland Security Physical Security.

05/04/23K. F. Rauscher

6

HOMELAND SECURITY PHYSICAL SECURITYFOCUS GROUP 1A

Network Reliability and Interoperability Council

Area for Attention No. 1Area for Attention No. 1 (continued) (continued)Protecting Critical Infrastructure Information INSIGHTS• as a general practice, government entities should NOT aggregate sensitive

information critical to the communications infrastructure.

• any exception should be limited to information needed to address specific concerns in support of federal Homeland or National Security objectives.

• the federal government should establish and implement a process that ensures any received industry information will be protected to the satisfaction of the providing entity(ies). Additional review is needed to determine how information-protective measures being developed by the U.S. Department of Homeland Security can protect non-DHS federal agencies, and state and local governments

• after a concern is addressed, provided information should be returned to the providing entity(ies) or properly destroyed

Page 7: H OMELAND S ECURITY P HYSICAL S ECURITY (Focus Group 1A) Update to Council September 15, 2003 K ARL F. R AUSCHER Chair Homeland Security Physical Security.

05/04/23K. F. Rauscher

7

HOMELAND SECURITY PHYSICAL SECURITYFOCUS GROUP 1A

Network Reliability and Interoperability Council

Area for Attention No. 2Area for Attention No. 2 Protecting the Character of NRIC Best Practices BACKGROUND• The Best Practice development process . . .

– top experts from each company– rigorous discussions consider many approaches; then identify the optimum– language inclusive of network types and network technology – guidance is generally the best approach– implementation is voluntary– not all Best Practices are applicable in all situations– experts within each company determine when implementation is appropriate.

• Value of NRIC Best Practices . . .– ten-year history of being effective– confirmed by the ATIS Network Reliability Steering Committee (NRSC)– high regard given is encouraging and appropriate– however, there are increasing concerns that government entities may mandate the

implementation of these Best Practices

Page 8: H OMELAND S ECURITY P HYSICAL S ECURITY (Focus Group 1A) Update to Council September 15, 2003 K ARL F. R AUSCHER Chair Homeland Security Physical Security.

05/04/23K. F. Rauscher

8

HOMELAND SECURITY PHYSICAL SECURITYFOCUS GROUP 1A

Network Reliability and Interoperability Council

Area for Attention No. 2Area for Attention No. 2 (continued) (continued)Protecting the Character of NRIC Best Practices BACKGROUND• Reasons for avoiding mandates . . .

– Not consistent with intent • very complex systems and networks• collective guidance is the best for the industry as a whole• not all Best Practices are applicable to all situations• future NRIC Best Practices would likely be reduced in number and, therefore, would

not provide valuable guidance based on field experience in some situations. – Protect the value of the industry’s investment and future benefits

• current information sharing, mutual learning, and resulting Best Practices developed are of immeasurable value

• process is in jeopardy if its deliverables are applied inappropriately• industry cooperation and open discussion among its experts can be quickly stifled.

– It is risky to mandate actions. • Coerced implementation without expert judgment will result in wrong directions

being followed, or with more limited guidance provided since it will be required to be applied in all situations.

Page 9: H OMELAND S ECURITY P HYSICAL S ECURITY (Focus Group 1A) Update to Council September 15, 2003 K ARL F. R AUSCHER Chair Homeland Security Physical Security.

05/04/23K. F. Rauscher

9

HOMELAND SECURITY PHYSICAL SECURITYFOCUS GROUP 1A

Network Reliability and Interoperability Council

Area for Attention No. 2Area for Attention No. 2 (continued) (continued)Protecting the Character of NRIC Best Practices INSIGHTS• individual communications companies employing their own expertise, need to

determine when it is appropriate to implement any given NRIC Best Practice.

• any effort to mandate NRIC Best Practices by a regulatory, or any other, agency should be discouraged by the FCC and the NRIC Council

• recognize the need for regulators to have some assurance that reasonable measures are being taken to protect the public’s Homeland Security interests

• the approach whereby individual companies voluntarily offer a statement to regulators as to their policy of implementing applicable Best Practices is preferred over any approach that forces implementation actions.

Page 10: H OMELAND S ECURITY P HYSICAL S ECURITY (Focus Group 1A) Update to Council September 15, 2003 K ARL F. R AUSCHER Chair Homeland Security Physical Security.

05/04/23K. F. Rauscher

10

HOMELAND SECURITY PHYSICAL SECURITYFOCUS GROUP 1A

Network Reliability and Interoperability Council

Blended AttacksBlended Attacks• Scope

– Physical dependencies on Cyber– Cyber dependencies on Physical– Communications infrastructure dependencies on other critical

infrastructures• Systematic Vulnerability-based Approach

– Outlining P/C, C/P and CI dependencies– Identifying vulnerabilities associated with dependencies– Develop Best Practices to address above– Evaluate coverage

• identify Areas for Attention• develop Council recommendations as appropriate

Page 11: H OMELAND S ECURITY P HYSICAL S ECURITY (Focus Group 1A) Update to Council September 15, 2003 K ARL F. R AUSCHER Chair Homeland Security Physical Security.

05/04/23K. F. Rauscher

11

HOMELAND SECURITY PHYSICAL SECURITYFOCUS GROUP 1A

Network Reliability and Interoperability Council

• Provide feedback on 2 Areas for Attention

• Continue internal review and implementation of Best Practices, as appropriate

• Continue to support Focus Group activities in coming months

““Take Aways” for Council MembersTake Aways” for Council Members

Page 12: H OMELAND S ECURITY P HYSICAL S ECURITY (Focus Group 1A) Update to Council September 15, 2003 K ARL F. R AUSCHER Chair Homeland Security Physical Security.

05/04/23K. F. Rauscher

12

HOMELAND SECURITY PHYSICAL SECURITYFOCUS GROUP 1A

Network Reliability and Interoperability Council

Additional InformationAdditional Information

AcknowledgementsFocus Group StatisticsBig Picture of Process

Page 13: H OMELAND S ECURITY P HYSICAL S ECURITY (Focus Group 1A) Update to Council September 15, 2003 K ARL F. R AUSCHER Chair Homeland Security Physical Security.

05/04/23K. F. Rauscher

13

HOMELAND SECURITY PHYSICAL SECURITYFOCUS GROUP 1A

Network Reliability and Interoperability Council

• Team Members – professional excellence and personal commitment to mission– teamwork

• Pam Stegora-Axberg, Steering Committee Chair– recruiting industry experts, coordinating outreach program

• Jeff Goldthorp, NRIC VI Designated Federal Officer– care and diligence, supporting outreach program

• ATIS– hosting numerous meetings at their Washington, D.C. facilities

AcknowledgementsAcknowledgements

Page 14: H OMELAND S ECURITY P HYSICAL S ECURITY (Focus Group 1A) Update to Council September 15, 2003 K ARL F. R AUSCHER Chair Homeland Security Physical Security.

05/04/23K. F. Rauscher

14

HOMELAND SECURITY PHYSICAL SECURITYFOCUS GROUP 1A

Network Reliability and Interoperability Council

Summary StatisticsSummary Statistics

• 1 Report (Issue 2)• 10 Recommendations • 28 Areas for Attention• Best Practices

– 185 Prevention– 107 Restoration

• Millions of possible Checklists (using keywords)

Page 15: H OMELAND S ECURITY P HYSICAL S ECURITY (Focus Group 1A) Update to Council September 15, 2003 K ARL F. R AUSCHER Chair Homeland Security Physical Security.

05/04/23K. F. Rauscher

15

HOMELAND SECURITY PHYSICAL SECURITYFOCUS GROUP 1A

Network Reliability and Interoperability Council

NRIC FGs

Stakeholders

Big Picture of Process FlowBig Picture of Process Flow

Focus Group 1AFocus Group 1A

VulnerabilitiesVulnerabilities

ThreatsThreats

Existing BPsExisting BPsP & R ReportsP & R Reports

RecommendationsRecommendations

Council

Areas for Attention

Checklists

Best Practices

Mechanisms

Techniques

SMEs $

Broader Industry

AssembleAssembleVulnerabilitiesVulnerabilities

AssembleAssembleThreatsThreats assess determine

conduct issue report develop

CoordinationCouncil Charter

Steering Committee

FCC

&

IndustryAssembleAssembleBPsBPs

Survey

Council

INP

UTS

OU

TPU

TS

SUPPORT

OVERSIGHT