transforming the afcent air operations center ... - cec...

28
Copyright © 2013 Raytheon Company. All rights reserved. Customer Success Is Our Mission is a registered trademark of Raytheon Company. Transforming the AFCENT Air Operations Center April 2013 Ed Hammersla

Upload: dinhminh

Post on 22-Apr-2018

216 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Copyright © 2013 Raytheon Company. All rights reserved.

Customer Success Is Our Mission is a registered trademark of Raytheon Company.

Transforming the AFCENT Air Operations Center

April 2013

Ed Hammersla

Page 2: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Page 2

Space and Airborne Systems

El Segundo, CA

Rick Yuse

Missile SystemsTucson, AZ

Taylor Lawrence

Network Centric Systems

McKinney, TX

Daniel Crowley

Intelligence and Information Systems

Garland, TX

Lynn Dugle

John Harris II

Technical ServicesReston ,VA

BD and RaytheonInternational Operations

Rosslyn, VA

Integrated

Defense SystemsTewksbury, MA

Thomas Kennedy

Chairman

and CEO

Bill Swanson

Global HeadquartersWaltham, MA

68,000 employees; 2012 revenue: $24 billion

Page 3: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Page 3

Intelligence and Information Systems

Information solutions spanning intelligence, surveillance and reconnaissance for defense and homeland security

– Intelligence Solutions

– Integrated Commandand Control Systems

– IT Systems Integration

– Environmental Systems

– Cybersecurity

– Mission Support

2012 Revenue: $3.0B

Employees: 8,300

HQ: Garland, TX

Lynn A. Dugle

President

Leading intelligence and information solutions for a global customer base

Page 4: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Page 4

• Insider Threat

•Desktop Monitoring

•Passive Surveillance

•Visual Forensics

•Reverse Engineering

•Red Teaming

•Remote Access Techniques

• Implants/Exploits

•Threat / Vulnerability Analysis

•Physical and Information Security

•Open Source

• IO Mission Tradecraft

•Reverse Engineering

•Network Security R&D

•Computer Network Exploitation

•Cyber Analytics

Partnerships

•Research Partnerships with 12 Universities

•National Labs

Information Security Products and Systems

Information Security Engineering & Accreditation Support

Vulnerability Assessments and Testing

Cross Domain Information Sharing Solutions

CNE/CNA (Access and Exploits)

Information Operations Training

Technology

Associates•Data Extraction and Analysis

•Digital Media Intercept and Exploitation,

•Cryptography, and Information Assurance Services

•Cross Domain Security

• INFOSEC Engineering

•Certification & Accreditation

•Risk Assessments

•System Security Engineering

•RTN Secure

•Multiple-Levels of Security Systems

•Secure Systems and Architectures

•Large-scale, real-time analytics

•Situational awareness

•Real-time Command and Control

•High Speed Cross Domain Solutions

•SOA-based IO Systems

•NETOPS and SECOPS

• IA Services and Compliance

•Deployments and Field Support

IIS Cyber Overview

Raytheon Proprietary and Confidential

•Software Protection

•Anti-Exploitation

• Information Operations

•Forensics.

•Analytic Engineering

•Enterprise Solutions

•Language Technologies

•Mission Engineering

Oakley Systems

SI Government

Solutions

Pikewerks

Telemus Solutions

BBN Technologies

Henggeler Consulting

Trusted Computer

Solutions

Page 5: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Page 5

RTCS Company Overview

� Trusted Computer Solutions (“TCS”) Founded in 1994

� 18 Years of Sustained Profitable Growth

‒ Headquartered in National Capitol Region‒ Locations in VA, IL, TX and London

� Raytheon Trusted Computer Solutions (“RTCS”)

‒ Nov. 4, 2010 Raytheon Company acquired TCS‒ RTCS is a wholly owned subsidiary of Raytheon‒ RTCS’ strong product portfolio extends Raytheon’s leadership in government Cross-

Domain/MLS solutions

� Recognized Leader in Cross Domain Solutions

‒ Largest enterprise provider of COTS software‒ Experienced Professional Services Team

Products Accredited in Operational Systems Around the World

Raytheon Proprietary and Confidential

Page 6: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Page 6

Core Competencies

� Trusted Operating Systems Leadership – All products utilize Trusted OS for Security

Enforcement

– Developed CCEVS EAL4+ version of Security Enhanced Linux (SELinux)

� Packaged CDS Application Products– Information Access

– Information Transfer

� Experienced Professional Services– Cleared professionals in Information Assurance

& Cross Domain Fields

– Enterprise deployment expertise

– Certification and Accreditation Support

RTCS Mission

� Increase security & reduce infrastructure cost by implementing cross domain technology

� Develop and market software products that enable management & sharing of information in a trusted environment

Raytheon Proprietary and Confidential

Page 7: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Page 7

AFCENT Mission

� Located at Shaw Air Force Base, South Carolina, the 9th Air Force is the headquarters for U.S. Air Forces Central (USAFCENT) and serves as the air component for a 27-nation area within the U.S. Central Command (USCENTCOM) area of responsibility.

� The 9th Air Force is also an intermediate headquarters under Air Combat Command and is responsible for five active-duty flying wings, as well as overseeing the operational readiness of 18 designated units of the Air National Guard and Air Force Reserve.

� Central Air Operations Center (CAOC) supports all air operations conducted in Southwest Asia.

Page 8: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Page 8

AFCENT’s Problem at the Air Operations Center

Goal: Replace 95% of all PCs with thin clients providing multi-level access at the AOC in Southwest Asia.

Page 9: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Page 9

AFCENT’s Problem at the Air Operations Center

• Lack of operator workspace

• Operators required multiple PCs, monitors, and KVMs to access various security domains

• Constant upgrades made it challenging to maintain security and configuration management

• Too many workstations to provide sufficient administration and maintenance

• Power usage was reaching maximum levels

• Noise

Page 10: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Page 10

Cross Domain Access Problem

Page 11: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Page 11

Trusted Thin Client Solution

Page 12: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Page 12

AFCENT’s Trusted Thin Client

NIPRnet

Network

StorageTerminal Server

Thin Client Users

SIPRnet

Network

Storage

Terminal Server

TTC Distribution

Console

CENTRIX

Network

Storage

JWICS

DC Failover

Client applications reside on Citrix servers

Single thin client per user provides secure

simultaneous access to applications in multiple single level networks

DC provides physical connection

to multiple networks and maintains

data separation between each. Built

on Red Hat Enterprise Linux 5, EAL 4.

Terminal Server

Terminal Server

Network

Storage

Page 13: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Page 13

How TTC is Being Used at AFCENT

� CAOC

– SABI Accredited

– Deployed 1000+ TTC thin clients (HP) at the Air Operations Center

– 7 Distribution Consoles connected to 4 networks supporting 120+ C2 applications

– Secret, Secret Releasables, and Unclassified

� Shaw AFB, South Carolina

– SABI Accredited

– 300+ TTC thin clients (HP)

– 4 Distribution Consoles connected to 4 networks, supporting 120+ applications

– Additional 250 TTCs planned

Page 14: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Page 1414

� Reduced footprint, cabling, and AOC floor clutter

� Access to multiple classified networks from a single desktop

� Improved operator situational awareness

� Reduced system administration associated with software upgrades and patches

� Rapid deployment of new apps and services

� Significantly reduced positional hardware changes

� Streamlined client recovery and increased availability

� Reduced power consumption on the operations floor

� Reduced power consumption in the CAOC by 22%

� Reduced noise level

AFCENT Benefits

Page 15: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Costs by Fiscal Year

Thin Client Solution has an estimated total

savings of $474K in the first year

and an average of $286K per year

over 9 out years.

Notes

• Thin Client Solution reduces total number of boxes requiring less administration; however quantitative manpowercost reduction is TBD

• Program Management costs have not been factored

• $58K/yr for training has been factored into savings calculation

• Does not include $1.5M prototyping and R&D costs

• Net saving increase as host nation kilowatt-hour costs increase (planning figure = $0.09/KWh, actual may be as high $0.45/KWh)

H/W Tech Refresh

Cost Comparison

H/W Tech Refresh

Page 16: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Page 16

The Solution (1)

2

Page 17: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Page 17

The Solution (2)

2

Page 18: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Page 182 November 2012

Utility of Cross Domain Solutions

Space, weight

Space, weight

Power

Power

Fuel

FuelCable

Cable

Security adminSecurity admin Single desktopMultiple desktops

Element As-Is To-Be % Less

Volume (m3) 45.3 12.4 73%

Weight (tonne) 10.8 2.9 73%

Power (kW) 105.3 26.6 75%

Fuel (k-ltr) 33.05 10.15 69%

As-Is To-Be

Page 19: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Page 19

Medium Deployable Comparison

DLAN Next Gen DICT

Users 50 150

Weight 1,800 kg < 150 kg

Power 4.5 kW 1 kW

Cable – CAT5 16 km < 6 km

Cable - Fibre 12 km 0 km

Wireless No Yes*

Set up/pack up 2.5 hrs First user online in < 10 mins

# Devices As many as 4 per user Reduced to 1 per user

2

Page 20: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Page 20

Cost Savings for IC Customer

Benefits Year 1 Year 2 Year 3 Total

Thin Client Cost Avoidance

(3 nets *800 TC * 500 users)

$ 1,200,000$ -0- $ -0- $ 1,200,000

Support staff reduction $ -0- $ 3,000,000 $ 6,000,000 $ 9,000,000

Infrastructure savings(cable and network) $ 15,500,000 $ -0- $ -0- $ 15,500,000

Power Savings $ 132,830 $ 132,830 $ 132,830 $ 398,489

Total $ 16,832,830 $ 3,132,830 $ 6,132,830 $ 26,098,489

Source: The Total Economic Impact of Trusted Thin Client, Forrester Consulting, June 2012

� Every organization’s experience may differ based on the characteristics of the environment.

� The above benefits are offset by costs associated with license cost, professional services, internal labor costs, hardware and change management support

� Net benefits after costs and risk adjustments showed a NPV of $7.7M with a payback period of 6.2 months

Page 21: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Page 21

Deployment Highlights

Agency Product Deployment Level

AFCENT TTC 2500+ Seats In-Theatre Secret / Restricted

AFTAC TGS 6 Guards Secret / Restricted

Australian Defense

TTC 12,000 Seats (Active Pilot Phase) Secret /Restricted

DIA TTC 12,000+ Seats Top Secret / Secret

DIA WebShield 150,000+ Seats Top Secret / Secret

Army G2 TTC 6,000 Seats Licensed / Rollout current Top Secret / Secret

CANES TTC 54 Destroyers / Rollout Planned for FY Q3

2012

Secret /Restricted

US Intel Agency

TTC 16,000 Seats (Rollout currently underway) Top Secret / Secret

DCGS-A TGS 88 Guards Tactical In-Theatre Transit Cases

Secret /Restricted

Page 22: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Page 22

RTCS Cross Domain Product Line

ACCESS AND TRANSFER SOLUTIONS

Page 23: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Page 23

Trusted Thin Client

� Cost Effective

– Increases user productivity

– Supports a wide variety of back end servers

– Runs on most x86 thin clients

– Reduces desktop hardware and power

– Reduces administration and O&M costs

– Extends the benefits of Desktop in the Infrastructure

– COTS development, licensing, and support model

� Enterprise Ready

– Large scale enterprise deployments in operation

– Enterprise management capabilities

– Scalable with failover

– Consolidated user environment for ease of management

– Cloud computing model where all user data and applications are remotely accessible

– Ease of expansion for new clients, network connections, and sensitivity levels

� Flexibility

– Virtual implementations utilize existing workstations and support users requiring high performance computing

– Remote implementations provide all benefits of secure multi-level access for field agents and remote workers

– Supports multiple VDI technologies for desktop access

– Wide variety of client options: thin clients, PCs, memory sticks, etc.

– Hardware independent

� Security

– Controlled multi-level access; no data transfer

– Read-only operating system and applications at the end point

– UCDMO Baseline

– Meets DCID 6/3 PL4 and SABI requirements

– TSABI and SABI Certified and Accredited

Page 24: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Page 24

Virtual Access Implementation (VAI)

� Reuse existing desktop hardware

� High performance computing

� Access lower classification levels

� Maintain current PC work environment, user applications

� Runs on UNIX systems

� Seamless integration

� An additional desktop application

� No performance degradation of existing applications

� TSABI Accredited

Blending Desktop PCs with Thin Client Benefits

Page 25: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Page 25

Remote Access Implementation

� Targeted for remote workforce, field agents, and first responders� Access to multiple communities of interest from a single device � Booted from a FIPS 140-2 compliant device (USBs, cards, or

laptops)� Once enabled, there is no access to the local PC resources (data

files) on the hard drive

Blending Mobility with Thin Client Benefits

Page 26: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Page 26

Trusted Thin Client®

On the Unified

Cross Domain

Management

Office

(UCDMO)

Baseline List

Currently

accredited,

deployed, and

operational

within mission

critical

environments

TTC TSABI

(JWICS-SIPR)

TTC SABI

(SIPR-NIPR)

CDS-GIAP-based

accreditations

First: July 2008

Certification & Accreditation

Trusted Thin Client

DCID 6/3-based

PL4 Accreditations

First: September

2006

TTC VAI – March

2009

Touch Screen

Page 27: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Page 27

Thin Client Solution saves $162,690 per year in HVAC

costs

Key Comparison Factors(Thin vs. Fat Client)

Thin Client Solution saves $224,183 per year in

power consumption costs

Thin Client Solution saves $146K in H/W & S/W in the 1st year and is $42K more expensive in the out years

Page 28: Transforming the AFCENT Air Operations Center ... - CEC …conferences.computer.org/stc/2013/papers/0001a061.pdf · – Intelligence Solutions ... •Threat / Vulnerability Analysis

Page 28

Quantified Benefits of Trusted Thin Client

Benefits Year 1 Year 2 Year 3 TotalNet

Present Value

Thin Client Cost Avoidance

(3 nets *800 TC * 500 users)

$ 1,200,000$ -0- $ -0- $ 1,200,000 $ 1,090,909

Support staff reduction $ -0- $ 3,000,000 $ 6,000,000 $ 9,000,000 $ 6,987,228

Infrastructure savings(cable and network) $ 15,500,000 $ -0- $ -0- $ 15,500,000 $ 14,090,909

Power Savings $ 132,830 $ 132,830 $ 132,830 $ 398,489 $ 330,328

Total $ 16,832,830 $ 3,132,830 $ 6,132,830 $ 26,098,489 $ 22,499,373

Source: The Total Economic Impact of Trusted Thin Client, Forrester Consulting, June 2012

� Every organization’s experience may differ based on the characteristics of the environment.

� The above benefits are offset by costs associated with license cost, professional services, internal labor costs, hardware and change management support

� Net benefits after costs and risk adjustments showed a NPV of $7.7M with a payback period of 6.2 months