infosec strategy & policy - lecture 6

Upload: 3153899

Post on 10-Feb-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    1/50

    INFO 6230 IIUM Semester 22009/10

    1

    InfosecInfosec Strategy & PolicyStrategy & PolicyINFO 6230

    Lecture 6

    Jamaludin Ibrahim

    Senior Academic Fellow, KICT, IIUM.

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    2/50

    INFO 6230 IIUM Semester 22009/10

    22

    Vision: Interplanetary Internet

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    3/50

    INFO 6230 IIUM Semester 22009/10

    33

    What do you think?

    Probably our greatest threat and

    vulnerability are from space

    Threat: someone peeking and invading from

    space 24X7

    Assets CIA under threat

    Vulnerability: we are weak in space

    technology

    Weak defense measures to preserve CIA

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    4/50

    INFO 6230 IIUM Semester 22009/10

    4

    Civil Space Systems

    Implications for International

    Security

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    5/50

    INFO 6230 IIUM Semester 22009/10

    55

    Introduction Geospatial information has physical security

    implications

    Critical infra networks Development patterns

    Natural resources locations

    Security infra including physical (natural, man-made,hybrid)

    A peek to national security blueprint

    Point of weakest-link Probable single-point of failure

    Geospatial Information is normally collected viacameras from the sky or space Orbiting satellites

    Flying airplanes, balloons Requires space technologies

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    6/50

    INFO 6230 IIUM Semester 22009/10

    66

    Introduction Space technology is technology that is related to

    entering space, maintaining and using systems during spaceflightand returning people and things from space.

    Most of space technology has dual-use Civil and military

    Development and use of space technology for civil and military

    occurred in parallel Technologies such as weather satellites, satellite navigationsystems, satellite television and some long distancecommunications systems critically rely on space infrastructure andthese technologies touch the vast majority of lives in every singleday.

    Outer Space is the new frontierand the ultimate high ground forboth civil, commercial and military operations etc

    Presents both opportunity and threat (man-made and non-man-made) to security.

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    7/50

    INFO 6230 IIUM Semester 22009/10

    77

    Satellite/Google Eye-view

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    8/50

    INFO 6230 IIUM Semester 22009/10

    88

    Outer Space is the new

    frontier..

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    9/50

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    10/50

    INFO 6230 IIUM Semester 22009/10

    1010

    Solar Flares

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    11/50

    INFO 6230 IIUM Semester 22009/10

    1111

    Militarisation of Outer Space

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    12/50

    INFO 6230 IIUM Semester 22009/10

    1212

    Man-made Threats from Outer

    Space

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    13/50

    INFO 6230 IIUM Semester 22009/10

    1313

    Space Technology Milestones More detailed timeline

    http://www.braeunig.us/space/index.htm

    1957 Russias Sputnik I went intoorbit

    1961 Kennedy man on the moonvision before 1970

    1967 - Outer Space Treaty (OST) 1969 - Apollo 11 performs the first

    lunar landing by astronauts NeilArmstrong and Edwin Aldrin on July20

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    14/50

    INFO 6230 IIUM Semester 22009/10

    1414

    Space Exploration Milestone: First Times

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    15/50

    INFO 6230 IIUM Semester 22009/10

    1515

    GPS Technology

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    16/50

    INFO 6230 IIUM Semester 22009/10

    1616

    GPS Usage

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    17/50

    INFO 6230 IIUM Semester 22009/10

    1717

    Satellite Operations

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    18/50

    INFO 6230 IIUM Semester 22009/10

    1818

    Future Military Operations

    "Space is the ultimate high ground,"

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    19/50

    INFO 6230 IIUM Semester 22009/10

    1919

    RF Spectrum Management Communications in space via

    allocated RF spectrum

    Free bands

    Licensed bands

    Military/Defence bands

    Spectrum is a national

    resource/asset

    Controlled by respective

    government autority

    Coordinating International

    body ITU under UN

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    20/50

    INFO 6230 IIUM Semester 22009/10

    20INFO 6230 IIUM Semester I2009/10

    20

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    21/50

    INFO 6230 IIUM Semester 22009/10

    2121

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    22/50

    INFO 6230 IIUM Semester 22009/10

    2222

    Definitions International Security

    Security regarded not as a goal but a means toachieving other goals such as personal freedom,human survival, societal welfare, international orderand human dignity

    2 basic forms of security +ve form

    seeks to eradicate traditional causes of conflict by addressingremoval of sources of insecurity and instability

    -ve form

    Based upon maximizing security of a state thru reliance onarms and traditional means of coercive power or manipulationof existing sources of conflict.

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    23/50

    INFO 6230 IIUM Semester 22009/10

    2323

    Definitions A state is considered internationally secured

    when it can: Defend its territory against aggression

    Participate effectively in intl forums that regulate or influence activitieswithin the state

    Control exploitations of its physical resources and obtain investments,loans, imports, products, and sell exports that it requires in intl trade

    Gain access to, use, protect, and develop technological resourcesneeded to function and interact effectively in the world community

    Pursue social, educational,or developmental aspects of the residentcultures without external interference, providing citizens with housing,food, education, and jobs, while protecting their human rights andpersonal freedom

    Conserve and maintain the quality of the environment in a manneracceptable to the people and to the government

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    24/50

    INFO 6230 IIUM Semester 22009/10

    2424

    Definitions There are 6 Dimensions

    of International Security

    Military Political,

    Economic,

    Scientific & technical,

    Socio-cultural,

    Environmental

    In this class we will look atspace technologyimplications to the first 2 of

    the 6 Dimensions Remote sensing,

    communication satellite,navigation satellite

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    25/50

    INFO 6230 IIUM Semester 22009/10

    2525

    Uses of Outer Space

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    26/50

    INFO 6230 IIUM Semester 22009/10

    2626

    Military Implications

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    27/50

    INFO 6230 IIUM Semester 22009/10

    2727

    Military Implications Remote Sensing

    sensed stateexposed/naked

    Commercial data/info

    collected could be used for

    military

    Sensed state sensitive

    data and info captured w/o

    consent and knowledge

    Can provide info about

    security of sensed state

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    28/50

    INFO 6230 IIUM Semester 22009/10

    2828

    Military Implications Communication satellite

    systems Communications betweenground station and satellite

    could

    monitored/intercepted

    unless use encryption

    Broadcast unwanted

    programs pornography,

    propaganda,

    misinformation, culturalimperialism

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    29/50

    INFO 6230 IIUM Semester 22009/10

    2929

    Military Implications Navigation satellite

    Significant military use fordeployment and logistics of

    forces, targeting weapons,

    location of assets

    Civil usage: civil maritime

    fleets, commercial aviation,fleet mgmt, search and

    rescue

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    30/50

    INFO 6230 IIUM Semester 22009/10 3030

    Military Implications Use of civil space systems such as

    satellite has profound implications for astates physical security

    The protective roof has been removed!

    There is relationship between a states

    military security and use by it or other

    states of certain civil space systems

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    31/50

    INFO 6230 IIUM Semester 22009/10 3131

    Political Implications Politics are integrated processes of national and

    international government.

    Implications Space tech blurs states borders e.g open sky policy,

    globalization

    Dependence on space technology lead to greaterinterdependence of states

    Need to cooperate for mutual advantage

    Strengthen political relationships brings-about stabilization andstrengthening of international security

    Has +ve and ve implications for political security

    Political security and relation are reinforced OR undermined bynature of cooperation or confrontation by uses of civil spacesystems

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    32/50

    INFO 6230 IIUM Semester 22009/10 32

    Civil space technologiesand their implications

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    33/50

    INFO 6230 IIUM Semester 22009/10 3333

    Civil space technologies We look key technologies and their

    implications to international security Launch systems and technologies

    Satellite apps systems

    Scientific systems Crewed flight systems

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    34/50

    INFO 6230 IIUM Semester 22009/10 3434

    Launch systems and

    technologies Launch vehicles to

    transport satellite to outer

    space Rockets and ballistic

    missiles

    Earth-to-orbit launchers

    Lunar and deep spacelaunchers

    Reusable launchers

    Transatmospheric vehicles

    Air launch and sea launchvehicles

    Launch support facilities

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    35/50

    INFO 6230 IIUM Semester 22009/10 3535

    Implications of launchers for

    international security Launcher can be used for

    civil, scientific, peaceful

    purposes

    Also potential military

    apps

    Launch capability may beconsidered stabilizing,

    supporting international

    security, or a source of

    concern and

    destabilization

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    36/50

    INFO 6230 IIUM Semester 22009/10 3636

    Satellite Systems and Technologies

    Communication

    satellite services Communication

    satellite systems

    Broadcasting satelliteservices

    Implications?

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    37/50

    INFO 6230 IIUM Semester 22009/10 3737

    Satellite Communications

    Apps

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    38/50

    INFO 6230 IIUM Semester 22009/10 3838

    Satellite Navigation & Timing

    Apps

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    39/50

    INFO 6230 IIUM Semester 22009/10 3939

    Earth observation systems Earth resources sensing

    satellites

    Implications?

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    40/50

    INFO 6230 IIUM Semester 22009/10 4040

    Some Major Space States

    Country Early-

    warning

    satellites

    Communication

    s satellites

    Navigation

    satellites

    Meteorological

    satellites

    Observation

    satellites

    Indigenou

    s launch

    vehicle

    Space

    weapons

    D C D C D C D C

    China

    Europe

    France

    India

    Israel

    Japan

    Russia

    USA

    V i t f

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    41/50

    INFO 6230 IIUM Semester 2

    2009/10

    4141

    Various types of space

    weaponsWeapons

    Status

    Deployment mode (3)

    Type Groun

    d-

    space

    Space-

    space

    Space-

    air

    Space-

    ground

    Air-

    space

    Nuclear

    Endo-

    atmospheric

    Exo-atmospheric

    X-ray laser

    X(1)

    O(2)

    O O(3) O(3) X(3,4) O

    Existing

    Existing

    Theoretical

    Non-nuclear

    Projectiles (e.g.

    KEW, US F15

    MHV, Russian

    ground-based

    missiles) (b)

    Neutral

    particle beams

    Lasers

    Radio-

    frequency

    weapons

    O

    O(5)

    O

    O

    O

    O

    O

    O

    X(3)

    O

    O

    X

    O

    O

    O

    O

    Investigated;

    Russian

    direct ascent

    reportedly

    deployed

    Investigated

    Investigated

    Investigated

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    42/50

    INFO 6230 IIUM Semester 2

    2009/10

    4242

    Crowding in Outer Space

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    43/50

    INFO 6230 IIUM Semester 2

    2009/10

    4343

    Close encounters in spaceSatellite name Date of collision/closeencounter

    Damage Safety measure

    US Fltsatcom-1 3 May 1980 Predicted distance from DSP-F4

    9.4km and reduced to 3.5km a few

    day later

    Fltsatcom-1 performed evasive

    manouvre

    US Fltsatcom-1 During 2nd half of 1981 Eight close encounters with USSBS-1 satellite, five between

    2.6km and 6km; and five

    encounters with four other

    satellites

    Collision avoidance manoeuvresperformed

    Cerise, a French military micro-

    satellite

    July 1996 Stabilisation boom damaged by

    debris from Ariane booster

    Regained attitude control by

    reprogramming the payload

    CRISTA-SPAS-a communications

    satellite

    12 August 1997 Passed very close (3.1km) to an

    old rocket motor from 1984

    Shuttle

    Failed to reach the GSO

    Russian Mir station 15 September 1997 US satellite MSTI-2 passed close

    (~500m)

    Mir not manoeuvred

    Russian Mir station 28 July 1999 Close encounter with a rocket

    body

    Mir not manoeuvred

    Several Shuttle missions: STS-44,

    -48, -53, -72, -82

    In each at least five manoeuvres

    were carried out

    International Space Station (ISS) 26 October 1999 Altitude raised to avoid close

    encounter with a satellite rocket

    ISS 28 March 2002 Passed within 14km of a Delta 2

    rocket

    ISS manoeuvred to avoid collision

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    44/50

    INFO 6230 IIUM Semester 2

    2009/10

    4444

    Implications to Physical Sec? Space Technologies are mission critical infra to

    information delivery Borderless info access due to wireless

    Need encryption tech to secure info especially military

    apps Satellite/wireless/radio jamming devices

    Anti-jamming technology

    Anti-satellite weapon system etc

    Daunting DoS or other cyber-attacks to space

    technologies

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    45/50

    INFO 6230 IIUM Semester 2

    2009/10

    4545

    US Global Info Grid Info Infra a key part of

    maintaining dominant

    world superpower status Info is (world super) power!

    Practically all war/militarycomponents depend on

    borderless space basedinfo infra

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    46/50

    INFO 6230 IIUM Semester 2

    2009/10

    4646

    Outlook Space technology is a double-edged sword Probably more open than the virtual Internet environment

    If Internet is an equalizing technology, space technology maybe the reverse

    Weaponization of space threatening international security Peace and Power struggle using space technology

    Countries/states have no choice but to embrace space technologies for them tobe secured internationally secured

    Significant investment required

    Man-kind, countries and states need to realize they are living on onebig (big to us but really very tiny within the universe) space ship calledEarth travelling in a very huge (still expanding) outer space Need to look at the big picture to minimize petty and (fatal) squabling

    Should there a Non-profileration Treaty (NPT) for space technology? Like theNuclear NPT?

    Th U i 5 illi

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    47/50

    INFO 6230 IIUM Semester 2

    2009/10

    4747

    The Universe 5 million years

    agostill expanding

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    48/50

    INFO 6230 IIUM Semester 2

    2009/10

    4848

    Questions Space Weather refers to conditions on the Sun and in the solar

    wind, magnetosphere, ionosphere, and thermosphere. Spaceweather is considered a threat space technology and globalinformation security. What problems can space weather cause tospace technology (civil and military) and protective security?

    Space technology is a double-edged sword. How does it affectinternational security?

    Non-Profileration Treaty (NPT) of Space Technology is a way to

    prevent undesirable and offensive use of space technologies. Theconcept is similar to the Nuclear NPT signed many nations andmanaged by International Atomic Energy Agency (IAEA). Shouldthere be NPT for Space Technology to maintain and sustainInternational Security?

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    49/50

    INFO 6230 IIUM Semester 2

    2009/10

    4949

    Assignment 3 due 2 wks What impact does the trend in space

    technology has on physical security of acountry like Malaysia?

    How could space technology compromise

    the CIA triad?

  • 7/22/2019 Infosec Strategy & Policy - Lecture 6

    50/50

    INFO 6230 IIUM Semester 2

    2009/10

    5050

    Nothing can substitute experience

    Have a nice holiday..