03.12.2012 Views

Life-Cycle Management - Army Logistics University - U.S. Army

Life-Cycle Management - Army Logistics University - U.S. Army

Life-Cycle Management - Army Logistics University - U.S. Army

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

UltraLog: Securing <strong>Logistics</strong><br />

Information on the Battlefield<br />

BY COMMANDER JAMES C. WORKMAN, USN (RET.)<br />

Sustaining highly maneuverable forces on a rapidly changing, noncontiguous<br />

battlefield requires an agile logistics command and control system. But can<br />

such a system prevent compromise of its data by a determined adversary?<br />

Ubiquitous information is a cornerstone of many<br />

contemporary visions of future warfare. Programs<br />

as diverse as the Office of the Secretary<br />

of Defense’s Force Transformation program and the<br />

<strong>Army</strong>’s Future Combat Systems program envision a<br />

tight linking of operations, intelligence, and logistics<br />

made possible by extensive, shared, and widely distributed<br />

information.<br />

Military logisticians generally<br />

accept the potential<br />

advantages of a future<br />

logistics system that<br />

is highly networked<br />

and that is able to<br />

widely distribute<br />

real-time, actionable<br />

data on the battlefield.<br />

However, the<br />

survivability of such a<br />

logistics information system has<br />

not been demonstrated in practice on the<br />

battlefield or tested extensively in the laboratory.<br />

With its UltraLog project, the Defense Advanced<br />

Research Projects Agency (DARPA) has taken up the<br />

challenge of building and demonstrating just such a<br />

networked logistics system. Specifically, the UltraLog<br />

project’s goal is to build an extremely survivable,<br />

agent-based logistics planning and execution information<br />

system for the modern battlefield. [An<br />

agent, or intelligent agent, is a software program that<br />

can perform many functions for a human computer<br />

user by applying a certain amount of reasoning.] In<br />

UltraLog, intelligent agents can be agents that are<br />

embedded in a military unit to perform the automated<br />

logistics function for that unit, or they can be agents<br />

that perform UltraLog system functions outside of military<br />

units. The agent society models combat and support<br />

units, equipment, transportation networks, and<br />

ARMY LOGISTICIAN PROFESSIONAL BULLETIN OF UNITED STATES ARMY LOGISTICS<br />

supply chains. [An “agent society” is an information<br />

system composed of networked intelligent agents.]<br />

The survivability of a distributed logistics system is<br />

based on three primary components: robustness, scalability,<br />

and security. Robustness is the ability of a system<br />

to continue functioning when one or more of its<br />

components are destroyed or impaired. Scalability is<br />

the ability of a system to withstand<br />

massive increases in size and<br />

workload, such as might<br />

be encountered in<br />

going from peacetime<br />

operations to<br />

war. Security is<br />

the capacity of a<br />

system to maintain<br />

integrity and confidentiality,<br />

even when it<br />

is under directed information<br />

warfare (IW) attacks. To be<br />

successful, future logistics information<br />

systems must be robust, scalable, and secure; in short,<br />

they must be survivable under battlefield conditions.<br />

In an article in the November–December 2004 issue<br />

of <strong>Army</strong> Logistician, retired Lieutenant General<br />

Leo Pigaty and I examined UltraLog’s robustness<br />

and scalability and detailed the process for assessing<br />

the military usefulness of logistics data produced<br />

when UltraLog was attacked along those two vectors.<br />

This article discusses UltraLog’s security<br />

defenses against cyberattack.<br />

Security Threat Environment<br />

Cyberterrorism is a fact of Information Age life. As<br />

a form of asymmetrical warfare, an IW attack may<br />

result in potential damage that is completely disproportionate<br />

to the level of effort the attacker expends to<br />

achieve that damage. Attacks can be launched with<br />

19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!