Threat Level Red
Threat Level Red
Michael Erbschloe
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
This book contains information obtained from authentic and highly regarded sources. Reasonable
efforts have been made to publish reliable data and information, but the author and publisher can-
not assume responsibility for the validity of all materials or the consequences of their use. The
authors and publishers have attempted to trace the copyright holders of all material reproduced in
this publication and apologize to copyright holders if permission to publish in this form has not been
obtained. If any copyright material has not been acknowledged please write and let us know so we
may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or
hereafter invented, including photocopying, microfilming, and recording, or in any information
storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copy-
right.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC),
222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that
provides licenses and registration for a variety of users. For organizations that have been granted a
photocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and
are used only for identification and explanation without intent to infringe.
Foreword..............................................................................................................xi
Acknowledgments.............................................................................................xiii
About the Author............................................................................................... xv
Introduction.....................................................................................................xvii
1 The U.S. Federal Government Initiatives on Cybersecurity Research.....1
1.1 Evolving toward Coordinated Cybersecurity Research.......................1
1.2 The Comprehensive National Cybersecurity Initiative........................2
1.3 The Federal Information Security Modernization Act of 2014............5
1.4 The Cybersecurity Act of 2015 and Automated Indicator Sharing......5
1.5 The Cybersecurity National Action Plan............................................6
1.6 The Strategic Plan for the Federal Cybersecurity Research
and Development Program.................................................................8
1.7 2016 Federal Cybersecurity RDSP...................................................15
1.8 The Growing Necessity for Diverse and Specialized Research..........20
1.9 Summary..........................................................................................21
1.10 Seminar Discussion Topics...............................................................22
Key Terms...................................................................................................22
References...................................................................................................23
v
vi ◾ Contents
Key Terms.................................................................................................. 84
References...................................................................................................85
5 Intelligence Advanced Research Projects Activity and In-Q-Tel...........87
5.1 The IARPA Organization.................................................................87
5.2 IARPA Cyber-Attack Automated Unconventional Sensor
Environment....................................................................................92
5.3 IARPA Trusted Integrated Chips.....................................................96
5.4 In-Q-Tel and the U.S. IC R&D Needs.............................................97
5.5 Summary........................................................................................100
5.6 Seminar Discussion Topics.............................................................101
Key Terms.................................................................................................101
References.................................................................................................101
6 U.S. Military Cybersecurity Research and Deployment.....................105
6.1 The Military Cybersecurity Cross-Community Innovation
Ecosystem.............................................................................................105
6.2 DoD Enterprise Cybersecurity Research and Deployment.............107
6.3 Cyber Deception through Active Leverage of Adversaries’
Cognition Process........................................................................... 110
6.4 ONR Long Range BAA for Navy and Marine Corps Science
and Technology..............................................................................112
6.5 OT Agreements for Prototype Projects...........................................113
6.6 DCO Research and Supporting Elements...................................... 115
6.7 Summary........................................................................................ 117
6.8 Seminar Discussion Topics............................................................. 117
Key Terms................................................................................................. 118
References................................................................................................. 118
7 The National Security Agency.............................................................121
7.1 NSA and the SoS............................................................................121
7.2 The NSA IA Research.....................................................................123
7.3 Information for IT Decision Makers, Staff, and Software/
Hardware Developers.....................................................................124
7.4 NSA Office of Research and Technology Applications
Technology Transfer Program........................................................125
7.5 NSA Cybersecurity Publications.....................................................126
7.6 National CAE-CD.........................................................................127
7.7 Summary........................................................................................128
7.8 Seminar Discussion Topics.............................................................129
Key Terms.................................................................................................129
References.................................................................................................129
8 The National Science Foundation........................................................131
8.1 NSF Overview................................................................................131
viii ◾ Contents
In the late 1990s, the U.S. Commission on National Security in the twenty-first
century concluded that if the United States does not invest significantly more in
public research and development, it will be eclipsed by others. Failure to do so
may return to haunt the nation and in the judgment of the Commission; the U.S.
government had not taken a broad, systematic approach to investing in science and
technology R&D, and thus will not be able to sustain projects of sufficient scale
and boldness. To keep pace with changes in technology, the commission recom-
mended that the President of the United States should propose, and the Congress
should support, dramatically increasing the U.S. government’s investment in sci-
ence and technology research and development by 2010.1 The looming challenge
was to be able to master cyberspace and at that time it was not realized to what
extent the added dimension of cyberspace would change the world as drastically as
it has over the last two decades.
The increasing dependency on information technology systems and networked
operations pervades nearly every aspect of our society. While bringing significant
benefits, this dependency can also create vulnerabilities to cyber-based threats.
Underscoring the importance of safeguarding critical information and information
systems and weaknesses in such efforts, federal information and network security
as well as private security efforts supporting our nation’s critical infrastructure are
designated a high-risk area.
From buying products to running businesses to finding directions to commu-
nicating with the people the online world has fundamentally reshaped our daily
lives. But just as the continually evolving digital age presents boundless opportuni-
ties for the economy, businesses, and people, it also presents a new generation of
threats that we must adapt to meet. Criminals, terrorists, and countries who wish
to do harm have all realized that attacking online is often easier than attacking in
person. As more and more sensitive data is stored online, the consequences of those
attacks grow more significant each year. Nation states can become more secure but
to stay that way they need to develop the capability to defend against cybersecurity
attacks. The same is true for government agencies and private corporations.
xi
xii ◾ Foreword
Reference
1. U.S. Commission on National Security 21st Century. Road Map for National Security:
Imperative for Change the Phase III Report of the U.S. Commission on National Security
21st Century. February 15, 2001. Retrieved December 17, 2016, http://govinfo.library.
unt.edu/nssg/PhaseIIIFR.pdf
Acknowledgments
The author acknowledges Richard O’Hanley, Publisher at CRC Press, and his pub-
lishing team for their support and assistance which helped getting this book from
concept to print. The author also acknowledges his sister for her never-ending sup-
port of his efforts.
xiii
About the Author
Michael Erbschloe worked for more than 30 years performing analysis of the
economics of information technology, public policy relating to technology, and
utilizing technology in reengineering organization processes. He has authored sev-
eral books on social and management issues of information technology most of
which covered some aspects of information or corporate security. Mr Erbschloe has
also taught at several universities and developed technology-related curriculum.
His career has focused on several interrelated areas: technology strategy, analysis,
and forecasting; teaching and curriculum development; writing books and articles;
speaking at conferences and industry events; publishing and editing; and public
policy analysis and program evaluation. He currently works as a consultant on
technology and security issues.
xv
Introduction
Cyberspace and its underlying infrastructure are vulnerable to a wide range of risk
stemming from both physical and cyber threats and hazards. Sophisticated cyber
actors and nation states exploit vulnerabilities to steal information and money and
are developing capabilities to disrupt, destroy, or threaten the delivery of essential
services. Cyberspace is particularly difficult to secure due to a number of factors:
the ability of malicious actors to operate from anywhere in the world, the linkages
between cyberspace and physical systems, and the difficulty of reducing vulnerabil-
ities and consequences in complex cyber networks. Of growing concern is the cyber
threat to critical infrastructure, which is increasingly subject to sophisticated cyber
intrusions that pose new risks. As information technology becomes increasingly
integrated with physical infrastructure operations, there is increased risk for large-
scale or high-consequence events that could cause harm or disrupt services upon
which our economy and the daily lives of millions of Americans depend. In light
of the risk and potential consequences of cyber events, strengthening the security
and resilience of cyberspace has become an important homeland security mission.1
Cyberattacks can instantly squander billions of dollars worth of private invest-
ments in intellectual property and research and development, or disrupt crucial
business operations. Governments face unique challenges in defending national in
such a threat environment. The vast majority of the infrastructure that underpins
the digital economy, from financial systems to telecommunications networks, is
owned and operated by private industries. When Iran launched denial-of-service
attacks on U.S. banks, when North Korea infiltrated Sony Pictures, when cyber-
criminals injected ransomware into a California hospital’s patient management
system, they targeted privately owned infrastructure. Neither government nor
industry can confront the cyber challenges alone. To realize the vast potential of
the digital economy, the public and private sectors need to work together to improve
and maintain cybersecurity.2 This cooperation may have become even more impor-
tant since Russia has been accused by many of hacking the U.S. presidential elec-
tion of 2016.
The United States and other technology-dependent nations are challenged with
continuing to defend current systems and networks and at the same time attempt to
get out in front of adversaries and ensure that future technology can better protect
xvii
xviii ◾ Introduction
Chapter 3: The National Institute for Standards and Technology. The National
Institute of Standards and Technology (NIST) was founded in 1901 and is part of
the U.S. Department of Commerce and is one of the oldest physical science labora-
tories in the United States. The Congress established the agency to remove a major
challenge to U.S. industrial competitiveness at the time which was the country’s
second-rate measurement infrastructure that lagged behind the capabilities of the
United Kingdom, Germany, and other economic rivals.5
Innumerable products and services rely in some way on technology, mea-
surement, and standards provided by the National Institute of Standards and
Technology. NIST measurements support the smallest of technologies to the
largest and most complex of man-made creations from nanoscale devices so
tiny that tens of thousands can fit on the tip of a single strand of human hair
up to earthquake-resistant skyscrapers and global communication networks.
NIST’s cybersecurity program supports the promotion of innovation and indus-
trial competitiveness of the United States by advancing measurement science,
standards, and related technology through research and development in ways
that enhance economic and national security.6 Research areas covered in this
chapter are
◾◾ Smart Grid
◾◾ Cyber-Physical Systems
is investing in research and development projects that are of interest to IC. This
chapter covers the unclassified cybersecurity research information provided by
IARPA and In-Q-Tel.8
Chapter 6: U.S. Military Cybersecurity Research and Deployment. The U.S.
military has several diverse challenges in cybersecurity research and development
of cyber capabilities. First is the strategic research needs to develop leap ahead
transforming technology to maintain cyber superiority which is largely handled by
DARPA and other military research laboratories. Second is the combined strategic
and applied research, development, and deployment of the technology required
to protect the Department of Defense (DoD) at the enterprise level. Third is the
applied research, development, and deployment of the technology required to
enable and protect the missions of the diversity of the capabilities provided by the
air force, army, navy, and marines. Fourth is the applied research, development,
and deployment of the technology required to enable and protect the specific units
and missions within the four branches of services. Finally, the tactical and action
research required to enable and protect all military forces and missions that are
in progress as they face emerging and possibly previously unknown cyber threats.
Each military branch has developed cybersecurity goals and strategies which help
to guide the type of research which is conducted internally or for which contracts
are initiated with research partners. The Broad Agency Announcements, Other
Transaction (OT) Agreements, and the Sources Sought Notices reviewed in this
chapter are examples of how the DoD approaches the cybersecurity process.9
This chapter examines how the U.S. military meets the challenges of cybersecu-
rity research including the Military Cybersecurity Cross-Community Innovation
Ecosystem.
Chapter 7: The National Security Agency. The National Security Agency
(NSA) has several research efforts exploring the Tailored Trustworthy Spaces
theme, including exploration of risk through behavioral analytics and large-scale
data analysis, novel means to detect modifications to computing systems and net-
work analytics, and efforts to customize system controls. NSA is also exploring
Moving Target technologies. By conducting a full scope analysis of the Moving
Target problem and solution space, NSA plans to develop movement prototypes
and evaluate several critical enabling functions. In partnership with the DoD, the
agency produced a survey of current Moving Target techniques, thereby enabling
a cost–benefit analysis that will take into account different approaches and tech-
nologies, the potential impact Moving Target protections may have on mission
operations, the costs and overheads associated with implementation, and the over-
all effectiveness of the movement response. In addition, NSA is supporting activi-
ties that foster an interdisciplinary collaborative community around the science
of security, including a virtual organization and four university-based multidisci-
plinary research centers.10 The nature of NSA is such that most things will happen
in secrecy. However, NSA does do considerably cybersecurity research, which is
applied in the development of advisories, guidance, and standards and selected
xxii ◾ Introduction
areas are covered in this chapter. Topics also include: the Science of Security;
Information Assurance (IA) Research; Information for IT Decision Makers, Staff,
and Software/Hardware Developers; NSA’s Technology Transfer Program; and the
National Centers of Academic Excellence in Cyber Defense.
Chapter 8: The National Science Foundation. The National Science Foundation
(NSF) invests in cybersecurity research through several programs, including
the Directorate of Engineering (ENG) programs in Communications, Circuits,
and Sensing Systems (CCSS) and Energy, Power, and Adaptive Systems (EPAS).
A major program in cybersecurity is spearheaded by the NSF Directorate of
Computer and Information Science and Engineering (CISE), in collaboration with
the Directorates of Education and Human Resources (EHR), Engineering (ENG),
Mathematical and Physical Sciences (MPS), and Social, Behavioral, and Economic
Sciences (SBE). NSF’s solicitation for the Secure and Trustworthy Cyberspace
(SaTC) Program provides funding to university investigators for research activities
on all four Strategic Plan thrusts, with an explicit option for transition to practice
projects. NSF’s program is distinguished from other agency efforts by its compre-
hensive nature, and by the strong role of research on cybersecurity foundations.7
This chapter covers some of the relevant activities of the NSF including an overview
of NSF, cybersecurity research activities, and cybersecurity research grants.11
Chapter 9: Federally Funded Research and Development Centers. Federally
Funded Research and Development Centers (FFRDCs) are government-funded
entities that have long-term relationships with one or more federal agencies to
perform research and development and related tasks. FFRDCs are typically
entirely federally funded, or nearly so, but they are operated by contractors or
other nongovernmental organizations.12 FFRDCs sponsored by the DOE are
covered in Chapter 10. This chapter covers FFRDCs that are sponsored by other
agencies.
Chapter 10: DOE-Funded Research and Development Centers. Founded
during the immense investment in scientific research in the period preceding
World War II, the National Laboratories have served as the leading institutions
for scientific innovation in the United States for more than 60 years. The Energy
Department’s National Laboratories address large-scale, complex research and
development challenges with a multidisciplinary approach that places an emphasis
on translating basic science to innovation.13 This chapter provides background on
federally funded research and development centers (FFRDCs) and examines the
cybersecurity research activities of the DOE-funded national laboratories including
Argonne, Idaho, Lawrence Berkeley, Los Alamos, the National Renewable Energy
Laboratory, Oak Ridge, Pacific Northwest, and Sandia.14
Chapter 11: Cybersecurity Research for the Critical Industry Sectors. Since the
events of September 11, 2001, many governments have supported the implementa-
tion of stronger security measures in their country as well as in the countries of
their treaty or trading partners. In the United States, the Department of Homeland
Security (DHS) has provided a leadership role in promoting threat analysis and
Introduction ◾ xxiii
security efforts.14 DHS and The Office of the President have identified 16 criti-
cal infrastructure sectors whose assets, systems, and networks are important to
sustaining national interest including economic stability and sustainability.8 This
chapter reviews the critical sectors and the NIST cybersecurity framework being
used to address cybersecurity issues as well as sector-specific agencies cybersecurity
progress.
Chapter 12: Cybersecurity Research for Consumer Protection. A considerable
amount of cybersecurity research is directed at protecting the national infrastructure
and the military capability of the United States. However, there are several research
initiatives that are definitely focused on protecting consumers. Agencies like the
Food and Drug Administration (FDA), the National Highway Transportation
Safety Administration (NHTSA), and the Federal Aviation Administration (FAA)
have specific responsibilities to protect the general public. This chapter examines
research efforts that are directed at protecting consumers some of the cybersecurity
including automotive cybersecurity and automated vehicle research, enabled air-
craft, medical devices and hospital networks, protecting personal technologies, and
unmanned aircraft systems.
Chapter 13: Cybersecurity Usability Obstacles and Research. Usability has only
recently become an important concern in the cybersecurity field, due to growing
recognition of the fact that users themselves are a key component in organizational
security programs. If users find a cybersecurity measure too difficult, they will try
to circumvent it which, of course, harms organizational security. There are numer-
ous obstacles to achieve cybersecurity usability but there are also proven methods
to perform appropriate usability testing for cybersecurity applications. It is in every
organization’s interest to design cybersecurity measures in such a way that they take
into account the perceptions, characteristics, needs, abilities, and behaviors of users
themselves.15 This chapter covers the security usability research of the U.S. govern-
ment including: the NIST Usability of Cybersecurity Team, the basics of usability
research, mobile device security usability, the growth in the use of handheld com-
puters for Internet access and literacy in the United States.
Chapter 14: Conclusions. The cybersecurity efforts of the U.S. government are
slowly maturing and starting to show more solid progress including the coordina-
tion and prioritization of cybersecurity research activities. The major legislation
passed by the U.S. Congress and the executive actions of President Obama that
have prompted greater progress in these efforts. It is likely that the Congressional
actions will stay in place but it is also likely that the executive actions will be modi-
fied by incoming presidents and cabinets. The research goals and objectives will
likely stay in place but how the organization of oversight and priority setting will
be modified by the new cabinets. The changes will mostly be propaganda focused
with new administrations criticizing past administrations and self-glorifying and
laying claim to their new but not likely improved management approaches. This
chapter provides an overview of the some major findings and conclusions of this
research project.
xxiv ◾ Introduction
References
1. U.S. Department of Homeland Security. Cybersecurity Overview. September 27,
2016. Retrieved November 13, 2016, https://www.dhs.gov/cybersecurity-overview
2. U.S. Department of Commerce. U.S. Deputy Secretary of Commerce Bruce Andrews
Delivers Keynote at the Internet Security Alliance’s 15th Anniversary Cybersecurity
Conference. September 15, 2016. Retrieved November 13, 2016, https://www.
commerce.gov/news/deputy-secretary-speeches/2016/09/us-deputy-secretary-
commerce-bruce-andrews-delivers-keynote
3. U.S. Department of Homeland Security. Roadmap for Cybersecurity Research.
November 2009. Retrieved November 13, 2016, https://www.dhs.gov/sites/default/
files/publications/CSD-DHS-Cybersecurity-Roadmap.pdf
4. U.S. Department of Homeland Security. Science and Technology CSD Projects.
Retrieved November 13, 2016, https://www.dhs.gov/science-and-technology/
csd-projects
5. The National Institute of Standards and Technology. About NIST. Retrieved
November 16, 2016, https://www.nist.gov/about-nist
6. The National Institute of Standards and Technology. Cybersecurity. Retrieved
November 16, 2016, https://www.nist.gov/topics/cybersecurity
7. Defense Advanced Research Projects Agency (DARPA). DARPA Offices. Retrieved
November 21, 2016, http://www.darpa.mil/about-us/offices
8. Intelligence Advanced Research Projects Activity (IARPA). About IARPA. Retrieved
November 10, 2016, https://www.iarpa.gov/index.php/about-iarpa
9. The Networking and Information Technology Research and Development Program.
Report on Implementing Federal Cybersecurity Research and Development Strategy.
Retrieved November 11, 2016, https://www.nitrd.gov/PUBS/ImplFed
CybersecurityRDStrategy-June2014.pdf
10. U.S. National Security Agency. Science of Security. June 21, 2016. Retrieved November
28, 2016, https://www.nsa.gov/what-we-do/research/science-of-security/index.shtml
11. NSF. At a Glance. Retrieved November 28, 2016, https://www.nsf.gov/about/glance.
jsp
12. United States Government Accountability Office. Federally Funded Research
Centers. August 2014. Retrieved December 1, 2016, http://www.gao.gov/products/
GAO-14-593
13. DOE. Office of Electricity Delivery & Energy Reliability. Mission. Retrieved December
1, 2016, http://www.energy.gov/oe/mission
14. Critical Infrastructure Sectors. United States Department of Homeland
Security. October 2015. Retrieved December 8, 2016, https://www.dhs.gov/
critical-infrastructure-sectors
15. NIST Security. Usability of Security. Retrieved December 10, 2016, http://csrc.nist.
gov/security-usability/HTML/about.html
Chapter 1
It was not until after the September 11, 2001, terrorist attacks on the United States
did the country start getting serious about cybersecurity. The Homeland Security
Acts and the related legislation just barely started to address cybersecurity. The
national leadership had very little understanding of anything cyber and the mis-
steps in legislative efforts and attempts at building a robust organizational response
to the cyber threat was at best inadequate. A decade later the understanding of cyber
issues in Washington, DC finally entered its adolescence. The efforts of the U.S.
government are slowly maturing and starting to show more solid progress including
the coordination and prioritization of cybersecurity research activities. This chapter
traces some of the significant actions on the part of the government that has led to
the current state of affairs on cybersecurity and cybersecurity research.
1
2 ◾ Threat Level Red
Cyber incidents reported by the U.S. federal agencies increased from 5,503 in
the fiscal year (FY) 2006 to more than 48,000 in FY 2012.1 The Internet Crime
Complaint Center (IC3) which provides the public with a reliable and convenient
reporting mechanism to submit information to the Federal Bureau of Investigation
(FBI) concerning suspected Internet-facilitated criminal activity receives approxi-
mately 300,000 complaints of Internet crime incidents per year. In 2015, IC3
reported there were $55 million in losses from Internet crime incidents.2 High-
profile hacking and attack incidents have become common place with hacks or data
thefts reported by Yahoo, Sony, the U.S. Office of Personnel Management, Target
stores, and numerous others.
In 2009 and subsequent years, the U.S. government started to retool its
approach to dealing with cyber threats and cybersecurity research and since then
there has been improved legislation and a more coordinated effort to address cyber-
security issues.
The CNCI included funding for the federal law enforcement, intelligence, and
defense communities to enhance the key functions of criminal investigation; intel-
ligence collection, processing, and analysis; and information assurance (IA) critical
to enabling national cybersecurity efforts. The CNCI initiatives included
specific interest to agencies, but may not fall into the purview of the harmonized
set of current priorities for the federal cybersecurity R&D enterprise. Specifically,
it is important to note that the unclassified research activities outlined are only one
portion of the work of the federal cybersecurity R&D enterprise, of which classified
activities are an important additional component.
In February 2013, the President issued Executive Order 13636 (EO 13636),
Improving Critical Infrastructure Cybersecurity, and Presidential Policy Directive
21 (PPD-21), Critical Infrastructure Security and Resilience. EO 13636 states that
the cyber threat to critical infrastructure continues to grow and represents one of
the most serious national security challenges we must confront. The national and
economic security of the United States depends on the reliable functioning of the
critical infrastructure in the face of such threats. It is the policy of the United States
to enhance the security and resilience of the critical infrastructure and to maintain
a cyber environment that encourages efficiency, innovation, and economic pros-
perity while promoting safety, security, business confidentiality, privacy, and civil
liberties.
Within these two documents, the President specified a new roadmap of activi-
ties and goals that the federal government must undertake to ensure the cyber-
security of the critical infrastructure, outlining a plan of policy coordination,
information sharing, privacy and civil liberties protection, and the development of
frameworks to identify and address cybersecurity risks. PPD 21 explicitly outlines
the roles and responsibilities for different agencies within this directive, including
for cybersecurity R&D, specifically
◾◾ Promoting R&D to enable the secure and resilient design and construction of
critical infrastructure and the accompanying cyber technology
◾◾ Enhancing modeling capabilities for determining the potential impacts of
incident or threat scenarios on critical infrastructure, as well as cascading
effects on other sectors
◾◾ Facilitating initiatives to incentivize cybersecurity investments and the adop-
tion of critical infrastructure design features that strengthen all-hazards secu-
rity and resilience
◾◾ Prioritizing efforts to support the strategic guidance issued by the Secretary
of Homeland Security
The Strategic Plan identifies high-priority cyber capabilities that hold prom-
ise for enabling fundamental improvements in the security and trustworthiness
of cyberspace. To achieve these capabilities, the plan defined an R&D framework
that organizes objectives and activities across a range of R&D efforts, including
those that require coordination across multiple agencies and those that an indi-
vidual agency might support in the context of its particular mission, capabilities,
and expertise.
No single agency addresses all the priority areas in the Strategic Plan nor should
it. Instead, it is the many different agency efforts comprising the federal cybersecu-
rity R&D enterprise that, with guidance from the Strategic Plan and coordination
through NITRD, enables progress toward the plan’s goals. The unique aspects of
agency research strategies for addressing the goals and challenges outlined in the
Strategic Plan are as follows.
Air Force Research Laboratory (AFRL): AFRL’s efforts in cybersecurity aim to
create a firm, trustable foundation in cyberspace, and then to build assured mis-
sion capabilities upon it. New technologies are needed to be aware of the missions
and threats, compute optimal assurance solutions, and implement protection as
needed via mission agility or infrastructure reinforcement. The capabilities devel-
oped through this research will be more agile and resilient than current solutions,
providing the ability to avoid, fight through, survive, and recover from advanced
cyber threats. They will also be more effective at engaging and optimizing the role
of humans in cyberspace operations (CSO).
Army Research Laboratory (ARL): ARL’s mission is to provide the science,
technology, and analysis that underpin full-spectrum military operations. Within
its mission, ARL contributes to a number of the Strategic Plan objectives with a par-
ticular focus on Moving Target technologies within its Cyber Maneuver Initiative.
The U.S. Federal Government Initiatives on Cybersecurity Research ◾ 11
The Cyber Maneuver Initiative aims to improve defense against advanced per-
sistent threats (APTs) by creating dynamic attack surfaces for protected systems,
and includes research in dynamic operating system maneuverability, application
diversity, network agility, cyber deception, predictive cyber-threat modeling, and
cognitive reasoning and feedback to maximize maneuver effectiveness in tactical
environments.
DARPA: DARPA is the principal agency within the DoD for high-risk, high-
payoff research, development, and demonstration of new technologies and systems
that serve the warfighter and National defense. DARPA’s R&D efforts in cyber-
security strongly support the Moving Target and Tailored Trustworthy Spaces
themes. In particular, DARPA’s Information Assurance and Survivability Program
seeks to draw on biological and immune systems as an inspiration for radically
rethinking computer hardware, software, and system designs. Such systems will
be able to detect, diagnose, and respond to attacks by using their own innate and
adaptive immune systems. Furthermore, in response to attacks, such systems will
also be capable of dynamically adapting and improving their defensive capabilities
over time. As in biological systems, the Cyber Maneuver Initiative s will dynami-
cally diversify, increasing their resiliency and survivability, and that of their indi-
vidual, constituent computers.
DOE: A key mission of the DOE Office of Electricity Delivery and Energy
Reliability (OE) is to enhance the reliability and resiliency of the national energy
infrastructure. Within DOE OE’s Cybersecurity for Energy Delivery Systems
(CEDS) Program, cybersecurity R&D is tailored to the unique performance
requirements, designs, and operational environments of the energy delivery systems
(EDS). The CEDS Program operates with the goal that, by 2020, resilient EDS
are designed, installed, operated, and maintained to survive cyber incidents while
sustaining the critical functions. To help achieve this vision, OE fosters and actively
engages in collaborations among energy stakeholders including utilities, vendors,
national labs, and academia. Through these collaborations, OE seeks to solve
hand-in-hand with industry the right problems, and to transition next-generation
research from the national labs and academia into commercial products operating
in the energy sector. The Strategic Plan research themes, particularly Designed-In
Security and Tailored Trustworthy Spaces are strongly supported by the strategies
and milestones outlined in the CEDS Program.
Other elements of DOE also perform related cybersecurity research. The
Advanced Scientific Computing Research (ASCR) Program, which is part of the
Office of Science, sponsors research to support DOE’s world leadership in scien-
tific computation. Security of networks and middleware is a critical element in
the ASCR Next Generation Networking Research Program. The National Nuclear
Security Administration (NNSA) within DOE also sponsors cybersecurity research
to support its unique mission requirements.
DHS: The DHS Science and Technology Directorate Cyber Security Division
(DHS S&T CSD) focuses on applied R&D, test, evaluation, and transition for
12 ◾ Threat Level Red
technologies to support civilian federal, state, and local governments and private
sector unclassified needs to protect the national cyber infrastructure. Of particular
interest to DHS are technologies that can be developed and transitioned to com-
mercial products or used in federal, state, and local government systems. DHS
S&T CSD has promoted innovation and accelerated transition to practice by using
Broad Agency Announcements (BAA) to solicit research proposals, supporting the
Small Business Innovation Research (SBIR) program, participating in and initiat-
ing public–private partnerships, and collaborating with federal agencies and inter-
national partners through joint project funding and management. In FY 2011,
DHS S&T CSD issued BAA 11-02 which solicited proposals for R&D in 14 tech-
nical areas (TAs), spanning all research themes of the Strategic Plan.
IARPA: IARPA’s cybersecurity research is spearheaded by its Office of Safe and
Secure Operations (SSO), which aims to counter emerging adversary potential to
ensure the U.S. Intelligence Community’s (IC) operational effectiveness in a glob-
ally interdependent and networked environment. SSO’s research portfolio is orga-
nized into three areas: computational power, trustworthy components, and safe
and secure systems. Objectives within the computational power area include devel-
oping revolutionary advances in science and engineering to solve problems intrac-
table with today’s computers, focusing on the fundamental elements of quantum
computing systems, and exploring the feasibility of a superconducting computer. In
the trustworthy components area, research programs focus on understanding and
manipulating very small-scale electronics, obtaining mission-worthy chips from
the state-of-the-art, but untrusted fabrication facilities, and gaining functional-
ity from unpedigreed software without placing mission systems at risk. Finally,
research in the safe and secure systems area has a broad objective of safeguarding
the integrity of missions in a hostile environment. Some of the current projects
focus on enabling collaboration without wholesale sharing of data through pri-
vacy-preserving search techniques. Research in both the trustworthy components
and safe and secure systems areas contributes directly to the Tailored Trustworthy
Spaces research theme.
NIST: NIST’s Information Technology Laboratory (ITL) is a recognized
thought leader in cryptography, identity management, key management, mobile
security, risk management, security automation, security of networked systems,
foundations of measurement science for information systems, secure virtualiza-
tion, cloud security, trusted roots of hardware, usability and security, and vulner-
ability management. ITL is composed of six divisions. In particular, the NIST
Software and Systems Division (SSD) works with industry, academia, and other
government agencies to increase trust and confidence in the deployed software,
standards, and testing tools for today’s software infrastructures and tomorrow’s
next-generation software systems, and conformance testing. In addition, the NIST
Computer Security Division (CSD) within the ITL leads the government’s efforts
in risk management, identity management, key management, security automa-
tion, mobile security, trusted roots for hardware, vulnerability management, and
The U.S. Federal Government Initiatives on Cybersecurity Research ◾ 13
Trustworthy Spaces, and Designed-In Security areas. The Moving Target theme
is particularly supported by the Robust and Autonomic Computing Systems
Program, a long-term initiative for exploring architectures and approaches for
future adaptive computing systems. Research in the Tailored Trustworthy Spaces
area is supported by the Fabric Project a medium-term project providing strong,
principled security guarantees based on explicitly stated security policies, and does
so for distributed systems with complex, incomplete, and changing trust between
participants. Additional programs such as Automation in Cryptology, Software
Efficiency Reclamation, Computer Network Defense and Information Assurance,
and Quantum Information Sciences contribute to the Strategic Plan by develop-
ing novel capabilities and technologies across the research themes. At the Georgia
Institute of Technology, ONR-funded researchers investigated the theory and
models for botnets, and developed state-of-the-art algorithms, methods, and tools
for detecting and tracking botnets and their command and control. Their research
has been invaluable for the DoD, as well as the tools developed and now in use by
the FBI for taking down botnets and tracking down botmasters and individual
operators. In addition, ONR promotes underexplored research topics that have
promising impacts on cybersecurity. For example, at the University of California,
ONR is supporting a technical investigation of the underground economy that
allows botnets to exist.
OSD: DoD’s cybersecurity science and technology programs emphasize
game-changing research over incremental approaches, and enhance the organiza-
tional ties and experimental infrastructure needed to accelerate transition of new
technologies into practice. The Assistant Secretary of Defense for Research and
Engineering (ASD(R&E)) formed the DoD Cyber S&T Community of Interest
(DoD Cyber COI). The DoD has specialized needs in cybersecurity due to the
nature of its national security and warfighting mission. The DoD Cyber COI
was charged with developing a DoD Cyber S&T problem statement, challenge
areas that address warfighter requirements, a research framework, priority technol-
ogy areas, and, in particular, a Cyber S&T Roadmap of the current and needed
research in cybersecurity.
The Cyber S&T Roadmap lays out four areas of research: Foundations of Trust,
Resilient Infrastructure, Agile Operations, and Assuring Effective Missions. All
four areas relate strongly to the Designed-In Security theme, strengthening differ-
ent attributes of security through the development, design, and validation meth-
ods, component and system design, algorithms, protocols, and architecture. The
Foundations of Trust area contributes particularly to the Tailored Trustworthy
Spaces theme. The Resilient Infrastructure and Agile Operations areas support the
Moving Target theme.7
There are numerous aspects of the NITRD that help drive the work of the pro-
gram and more information can be found on the website (www.nitrd.gov/Index.
aspx). The later chapters of this book will focus on the actual research being sup-
ported and conducted by the laboratories and agencies (Figure 1.1).
The U.S. Federal Government Initiatives on Cybersecurity Research ◾ 15
Figure 1.1 NITRD Member Agencies. (From The Networking and Information
Technology Research and Development Program. Report on Implementing Federal
Cybersecurity Research and Development Strategy. Retrieved November 11, 2016
from https://www.nitrd.gov/PUBS/ImplFedCybersecurityRDStrategy-June2014.pdf)
the earlier phases. As malicious cyber activities have increased and methods have
evolved over the years, the established approaches (e.g., signature-based detection,
anomaly detection) have not adequately enabled cybersecurity practitioners to stay
ahead of these threats.
The gap between aspirations for detection and the current state of detection is
striking. It is clear that defenders are not detecting malicious cyber activities at the
earliest possible time. It seems very likely that many completed and ongoing mali-
cious activities are never detected; some are probably completed and the tracks are
cleaned up, while others likely continue to this day. To address these challenges,
new technologies must be developed that
◾◾ Enable robust situational awareness to defend networks and systems that
identify all critical assets contained within network when devices have been
added or removed, as well as the attributes and anomalies associated with the
users. Real-time change detection, including schemes that are flexible enough
for dynamic network conditions and that enable comparisons against last
known good system states, is essential.
◾◾ Identify weaknesses in systems when changes in system configuration, intro-
duction of new applications, or discovery of new techniques may reduce the
level of protection or create new vulnerabilities. Tools are required to identify
the shortcomings in protection measures in near real time, so that the situa-
tion can be remediated.
◾◾ To reliably detect malicious cyber activities, research is needed to determine
whether the security tools are ineffective or underutilized. Additional R&D
is required to ensure that the techniques can reliably detect the full range
of adversaries’ malicious cyber activities and reduce the detection time. In
particular, tools are needed that can detect zero-day malware and innovative
sequences of operations with acceptable levels of false positives and negatives
as well as behavioral intrusion detection and heuristic tools, which look for
anomalies to system baseline activities, offer an avenue of promising research.
Near-term R&D objectives are to discover and apply automated tools to map
networks, including entities, attributes, roles, and logical relationships between
processes and behaviors as well as usable presentation interfaces that allow opera-
tors to better anticipate incidents, discover them in progress, and achieve better
post-incident response.
While midterm R&D objectives are to use data analytics to identify malicious
cyber activities and differentiate them from authorized user behavior with low false
positive and false negative rates and apply predictive analysis techniques across a
range of potential cyber-threat vectors (e.g., via software or hardware) and determine
the probable course of action for each threat method. Predictive analysis supports
all four defensive elements: deter, protect, detect, and adapt. The long-term R&D
objectives is to develop automated tools for cyber-threat forecasting in order to assess
the limitations of protective measures and better inform sensor deployment.
The U.S. Federal Government Initiatives on Cybersecurity Research ◾ 17
Near-term R&D objectives are to develop the technologies and techniques that
enable critical assets to adjust and continue operating acceptably, despite adversary
actions. Midterm R&D objectives are to establish methods to achieve the timely
recovery of functionality of interdependent systems even while adversary activity
continues. Long-term R&D objectives are to build adaptive effective collective
defenses informed by predictive analysis that minimize adversary-imposed effects,
as well as unintended effects caused by defender actions.
It is estimated that 80% to 90% of current cybersecurity failures are due to human
and organizational shortcomings. Comprehensive cybersecurity requires understand-
ing the human facets of cyber threats and secure cyber systems. Much research in
SBE disciplines has investigated the human aspects of cybersecurity problems. The
field of cybersecurity economics examines adversaries’ incentives and the means by
which they profit from malicious cyber activities in the real world. The economic
analysis of incentives helps explain why individuals and organizations do (and do not)
take action to detect and mitigate cybersecurity threats. Social psychologists have
investigated the impact of individual characteristics (e.g., age, gender, dispositional
factors of personality) and social norms on promoting good practices in cyberspace.
Research on persuasion has identified the methods to train, incentivize, or
encourage users to improve their cybersecurity behavior. Socio-technical investi-
gations have expanded understanding of the role of trust and assurance in secure
socio-technical systems as well as deception and adverse intentions in malicious
cyber activities. While these are excellent examples of fruitful multidisciplinary
research activities, many opportunities in the economic, human, and social research
still exist for improving cybersecurity. Research is needed to support the following
four elements:
The new frontier will require resilient and secure networks for space operations,
vehicles, and stations. They may very well have their own Internet which will facili-
tate commerce and industry in space.
The government of Luxembourg announced in early 2016 that the country will
be investing in the as-yet-unrealized industry of asteroid mining. Luxembourg will
be funding research into the extraction of minerals from objects in space, work-
ing on legal and regulatory frameworks to govern such activities and, potentially,
directly investing in companies active in the field. The nation’s ministry of the
The U.S. Federal Government Initiatives on Cybersecurity Research ◾ 21
economy says in a statement that the measures are meant to position Luxembourg
as a European hub in the exploration and use of space resources. Luxembourg is
already home to SES, a satellite operator, and has previously moved to boost its
international high-tech profile. There are technical challenges involved in finding
promising targets, sending unmanned spacecraft to mine them, managing commu-
nications within the technology infrastructure, and returning exploited resources
safely to Earth. Japan’s space agency is working in a similar direction.
Asteroids are governed by the Outer Space Treaty which says space and space
objects do not belong to any individual nation. What that means for mining activi-
ties has never been tested in international courts because, well, nobody’s managed
to mine an asteroid yet. The U.S. Space Act of 2015 says American companies are
permitted to harvest resources from outer space. The law asserts that extracting
minerals from an extraterrestrial object is not a declaration of sovereignty. However,
it is not clear what happens if another country passes a contradictory law, or if trea-
ties are arranged that cover extraction of minerals from space.
To research and develop cybersecurity and secure networking technologies for
Earth-based enterprises and space activities as well as for future space exploration, a
variety of U.S. government agencies will need to continue to research at the science,
technology, and application levels to protect the future Internet infrastructure and
networked activities.
1.9 Summary
The cybersecurity efforts of the U.S. government are maturing and starting to show
more solid progress including the coordination and prioritization of cybersecu-
rity research activities. This chapter traces some of the significant actions on the
part of the government that has led to the current state of affairs on cybersecurity
and cybersecurity research. The major legislation and executive actions that have
impacted the progress of these efforts include
There are several national laboratories and federal agencies that will apply their
unique capabilities to research programs designed to address the goals and chal-
lenges outlined in the Strategic Plan including
This book examines a wide range of cybersecurity research activities being con-
ducted by the U.S. Science Laboratories, branches of the military, and civilian agen-
cies listed above as well as by cybersecurity research efforts in other agencies.
◾◾ What experience has seminar participants had working with or utilizing U.S.
government cybersecurity programs or cybersecurity research efforts?
◾◾ What experience has seminar participants had with private corporations or
nongovernmental organizations that have worked with U.S. government
cybersecurity programs or cybersecurity research efforts?
◾◾ What areas of U.S. government cybersecurity research do seminar partici-
pants think are the most important? Why?
◾◾ What areas of U.S. government cybersecurity research do seminar partici-
pants think are the most relevant to the private sector? Why?
Key Terms
counterintelligence capabilities: are the knowledge, skills, technology, and orga-
nization that provide a comprehensive security program and constant
evaluation of the intentions and targets of foreign intelligence services. CI
capabilities and programs also work to detect and neutralize the impact of
espionage against national interests
moving target defense: is a rotational environment that runs an application on
several different operating system platforms to thwart attacker reconnais-
sance efforts and improve application resilience to the threat of zero-day
exploits
multifactor authentication: uses a combination of two (or more) different meth-
ods to authenticate a user identity. The first is what users know, usually a
password, but this can also include a user response to a challenge question
The U.S. Federal Government Initiatives on Cybersecurity Research ◾ 23
References
1. U.S. GAO. Cybersecurity National Strategy, Roles, and Responsibilities Need to Be Better
Defined and More Effectively Implemented. February 2013. Retrieved November 10,
2016, www.gao.gov/products/GAO-13-187
2. Internet Crime Complaint Center (IC3). 2015 Internet Crime Report. Retrieved
November 10, 2016, https://www.ic3.gov/images/2015IC3Report.png
3. The White House. The Comprehensive National Cybersecurity Initiative. Retrieved
November 8, 2016, https://www.whitehouse.gov/issues/foreign-policy/cybersecurity/
national-initiative
4. S.2521—Federal Information Security Modernization Act of 2014 113th Congress
(2013–2014). December 18, 2014. Retrieved November 8, 2016, https://www.
congress.gov/bill/113th-congress/senate-bill/2521
5. U.S. Department of Homeland Security. Automated Indicator Sharing (AIS).
Retrieved November 8, 2016, https://www.us-cert.gov/sites/default/files/ais_files/
AIS_fact_sheet.pdf
6. The White House. The Cybersecurity National Action Plan. February 9, 2016.
Retrieved November 8, 2016, https://www.whitehouse.gov/the-press-office/2016/02/
09/fact-sheet-cybersecurity-national-action-plan
7. The Networking and Information Technology Research and Development
Program. Report on Implementing Federal Cybersecurity Research and Development
Strategy. Retrieved November 11, 2016, https://www.nitrd.gov/PUBS/
ImplFedCybersecurityRDStrategy-June2014.pdf
8. National Science and Technology Council. Networking and Information Technology
Research and Development Program. 2016 Federal Cybersecurity Research and
24 ◾ Threat Level Red
Development Strategic Plan. February 2016. Retrieved November 27, 2016, https://
w w w.whitehouse.gov/sites/whitehouse.gov/f iles/documents/2016_Federal_
Cybersecurity_Research_and_Development_Stratgeic_Plan.pdf
9. The White House. Internet of Things: Examining Opportunities and Challenges.
August 30, 2016. Retrieved November 10, 2016, https://www.whitehouse.gov/
blog/2016/08/30/internet-things-examining-opportunities-and-challenges
10. U.S. Department of Commerce, National Oceanic and Atmospheric Administration.
U.S. Leadership in Space Commerce Office of Space Commercialization Strategic Plan.
March 2007. Retrieved November 10, 2016, http://www.space.commerce.gov/wp-
content/uploads/NOAA-2007-Space-Commercialization-Strategic-Plan-6-pages.pdf
Chapter 2
The Department of
Homeland Security
Cybersecurity
Research Programs
25
26 ◾ Threat Level Red
financial system. However, there have also been instances where the cloak of
anonymity provided by virtual currencies has helped support dangerous crimi-
nal activity, such as drug smuggling, money laundering, gun running, and child
pornography.
If virtual currencies remain a virtual wild west for narcotics traffickers and
other criminals, that would not only threaten the national security, but also the
very existence of the virtual currency industry as a legitimate business enterprise.
Thus, it is in the common interest of the public and the virtual currency industry
to bring virtual currencies out of the darkness and into the light of day through
enhanced transparency. It is vital to put in place appropriate safeguards for con-
sumers and law-abiding citizens.
Firms engaging in money transmission are generally required by states to post
collateral in order to better safeguard customer account funds. In addition, they are
required to undergo periodic safety and soundness examinations, as well as comply
with applicable anti-money laundering laws. These guidelines for money transmit-
ters help protect consumers and root out illegal activity. In addition, putting in
place appropriate regulatory safeguards for virtual currencies will be beneficial to
the long-term strength of the virtual currency industry.
Safety and soundness requirements help build greater confidence among cus-
tomers that the funds that they entrust to virtual currency companies will not
get stuck in a digital black hole. Indeed, some consumers have expressed concerns
about how quickly their virtual currency transactions are processed. Taking steps
to ensure that these transactions, particularly redemptions, are processed promptly
is vital to earning the faith and confidence of customers.
Virtual currency companies and the currencies themselves have received signifi-
cant interest from investors and venture capital firms. Similar to any other industry,
greater transparency and accountability is critical to promoting sustained, long-
term investment. Taking steps to root out illegal activity is both a legal and busi-
ness imperative for virtual currency firms serving as a money changer of choice for
terrorists, drug smugglers, illegal weapons dealers, money launderers, and human
traffickers who could expose the virtual currency industry to extraordinarily serious
criminal penalties.4
Anonymous networks and cryptocurrencies have many legitimate applications
to support the freedom of the press, protect human rights, and allow new meth-
ods of payments that protect individual privacy. However, criminals are exploit-
ing the protections built into the encryption and the promise of near anonymity.
Investigating anonymous networks and cryptocurrencies is resource intensive and
difficult, requiring significant man-hours to investigate and prosecute criminals
involved in illegal activities on anonymous marketplaces and websites.
DHS S&T is developing cost-effective solutions for law enforcement compo-
nents to complement and expand their capabilities to investigate crimes. Strong
partnerships with law enforcement results in requirements for solutions fitting
specific investigative needs while protecting the privacy and the legitimate uses
28 ◾ Threat Level Red
◾◾ New Tor Service Protocol: Development of a new service protocol for The
Onion Router (Tor) to provide stronger encryption and protections for law
enforcement communications within the anonymous networks. This effort
will improve security through protocol enhancements and provide end-to-
end encryption.
◾◾ Safe Aggregation of Usage Statistics: Development of techniques to provide
for a safe aggregation of usage statistics within anonymous networks while
respecting and protecting the privacy and anonymity of anonymous network
users.
◾◾ System Analysis, Requirements Gathering, and Tool Development:
Implementation of system analysis of the broader anonymous network and
cryptocurrency landscape to generate additional requirements and develop
broader solutions to investigate criminal activities.
◾◾ Cryptocurrency Forensics: Development of tools to enable law enforcement
to perform forensic analysis of cryptocurrency transactions and facilitate the
tracing of currencies involved in illicit transactions.5
The CPS and IoT space is vast and covers many distinct sectors. The Cyber-
Physical Systems Vision Statement from the NITRD Program identifies nine
areas of critical importance to government: agriculture, building controls, defense,
energy, emergency response, health care, manufacturing and industry, society, and
transportation. Further, these areas share crosscutting issues of cybersecurity, eco-
nomics, interoperability, privacy, safety and reliability, and social aspects. No single
agency can tackle these areas alone.6
The program regularly engages with agencies and the community to identify
needs that cannot be met with current technologies, and to understand the cur-
rent state of the art and practice in the data privacy domain. As an R&D program
a major goal is to ensure that privacy managers are not surprised by the emerging
trends or emerging issues in the future. This interaction drives the R&D of the
capabilities needed to protect cyberspace in a manner that incorporates both secu-
rity and privacy.
In cases where technologies do not exist or are immature, the program makes
the necessary investments in applied research, advanced development, test and
evaluation, and technology transition to ensure their availability to the HSE.
Each engagement starts with a discovery process in which DHS works with agen-
cies to understand and identify their need or the problem they are experiencing.
Results of the discovery process generally results in one of two possible courses
of action:
DHS works with researchers and technology providers that present innovative
ideas and technologies that map to the DHS research agenda. In general, DHS
interest is focused around the following:
This project addresses three related DDoSD challenges. First, DDoSD is work-
ing to increase deployment of best practices that would slow attack scale growth,
specifically a technique called Internet BCP 38 that blocks forged packets at or
near the source. Second, DDoSD is seeking to defend networks against massive
1 Tbps scale attacks through the development of collaboration tools suitable for
medium-scale organizations. Lastly, the project is working to defend emergency
management systems, both current 911 and Next Generation 911 systems, from
TDoS attacks.
Some DDoS attacks make use of spoofed source addresses. The existing best
practices filter out forged addresses at the network periphery. Additional best
practices extend this guidance to more complex deployments. The collection of
anti-spoofing best practices could help mitigate DDoS attacks that rely on forged
addresses. Measurement and analysis tools are required to test whether new anti-
spoofing deployments are successful, verify existing anti-spoofing practices are
working correctly, and to provide evidence to demonstrate both advantages and
limitations when anti-spoofing best practices are deployed in an organization.
32 ◾ Threat Level Red
The distributed nature of the DDoS attacks provides several advantages to the
attacker. An attack often comes from a large number of compromised computers
that span multiple organizations. Further, as network bandwidth and computa-
tional power increases, the attacker benefits from the increased resources, providing
the capability to conduct more powerful attacks. To counter the threat, organiza-
tions that make use of network services should invest in resources that keep pace
with the increasing significance of the attacks. In addition, organizations that
deploy resources carelessly may simply provide the attacker with easily compro-
mised resources that can then be used in future attacks. Even organizations with
global scale capability, including those providing security-related services, have
faced challenges in keeping pace with vast DDoS attacks.
Novel DDoS attack mitigation and defense techniques research seeks to address
new variations of DoS attacks. DoS attack concepts are being directed at a growing
range of services. For example, in spring 2013, DHS and the FBI issued warnings
for DoS attacks targeting emergency management services, such as 911 systems.
Systems including, but not limited to, mobile devices, CPSs, and critical infrastruc-
ture components are all potential targets for these attacks. Further, new variations
of DoS attacks exploit vulnerabilities, such as overwhelming power supplies, soft-
ware vulnerabilities, and other features.
Too often the response to new types of attacks and targets is reactive; attack-
ers develop new techniques and/or target new systems and this drives mitigation
efforts. Ideally, new techniques and new targets would be anticipated and defenses
would be proactively developed before large-scale attacks occur. Therefore, the
goal of this thrust area is to identify the potential targets for DDoS that have not
been subject to known large-scale DDoS attacks, and to develop DDoS mitigation
capabilities that will be able to withstand a DDoS attack that is double in magni-
tude from the capabilities of the target’s DDoSD capability at the beginning of the
project. Emergency management systems and CPSs are examples of nontraditional
targets that are vulnerable to DoS and most relevant to this topic area.
DHS S&T awards in this area include
teams often respond to problems or incidents that have not been seen before. There
is no overarching set of guiding principles and best practices that CSIRTs can look
to in terms of organization, training, and execution.
The core research focuses on current best practices from a business organiza-
tional psychology perspective to clearly explain how incident response individuals
and teams can best work to improve complex cyber incident response to be faster,
more efficient, and more adaptive. The work is being done by an academic/industry
research team and in collaboration with the U.S. Computer Emergency Readiness
Team and the NCCIC and international government partners from the Netherlands
and Sweden. This underscores the international applicability of the cybersecurity
challenge and its value as a partnership and confidence-building mechanism. The
interdisciplinary team working on the project includes a cybersecurity and software
engineering researcher, organizational psychologists, economists, and practitioners
from a commercial partner with CSIRT expertise.10
DECIDE is another program which DHS has put into place. The DHS S&T,
with support from the financial sector, including the Financial Services Sector
Coordinating Council (FSSCC), is creating a tool to enable private sector enti-
ties located within critical infrastructures to conduct collaborative, realistic, fully
immersive, scenario-based exercises with response decisions made by subject matter
experts. DECIDE exercises are intended to enable participants to war-game stress-
ful scenarios in a closed-loop manner where the consequences of each participant’s
actions are given as feedback into the exercise. These exercises are designed to help
participants understand the systemic ramifications of their actions and those of
their industry peers especially scenarios that may induce or exacerbate cascading
failures, resource contention, systemic instability, and other unintended conse-
quences. Furthermore, DECIDE exercises allow critical infrastructure operators to
identify scenarios where industrywide coordinated response tactics are beneficial,
and enable these scenarios to be exercised efficiently.
The tool significantly reduces barriers to exercise participation by encouraging
the reuse of time and monetary investments in the exercise setup and planning pro-
cess. DECIDE exercises insulate and protect each participant’s proprietary infor-
mation, allowing competitive institutions to exercise with confidence. Efficient,
cost-effective, high-value, and low-risk, DECIDE exercises encourage participation
from a full range of participants.
To be realistic, business continuity exercises in a large complex industry require
participation from multiple organizations. This requirement has made industry-
wide exercises time- and resource intensive both from a planning standpoint and
with respect to the level of commitment required from each participant. Moreover,
lack of full industry participation often results in exercises that are incomplete or
less robust than intended. DECIDE alleviates this requirement by providing arti-
ficial intelligence agents. These agents may be plugged into the exercise as needed
to provide realistic simulation of nonpresent players. Artificial intelligence agents
able to simulate specific industry activities are developed in close conjunction with
The Department of Homeland Security Cybersecurity ◾ 35
industry subject matter experts. DECIDE allows these smart agents to be used
interchangeably with human players. DECIDE is sponsored by the AFRL in sup-
port of DHS S&T.11
The Cyber Security Assessment and Evaluation Project ensures that cybersecu-
rity technologies developed both inside and outside of the DHS S&T are assessed
and evaluated prior to operational deployment within the HSE and also provides
an environment where emerging technologies are exposed to a broad range of end
users and investors.
Assessments and evaluations are conducted through technical assessment, mod-
eling, vulnerability and risk analysis, and red team evaluations and operational
assessments. Performers execute a technology transition process whereby cyberse-
curity tools developed under sponsorship by DHS can be acquired, evaluated, and
transitioned to end users, including owners and operators of U.S. critical infrastruc-
tures, private sector entities, and federal, state, and local law enforcement agencies.
By leveraging cutting edge tools and technologies, end users have the opportunity
to address contemporary cyber threats and enhance their security posture. This
project impacts and influences the entire cybersecurity community, both within
the federal government and in the private sector, in identifying and assessing cyber
threats and vulnerabilities and assisting in the acquisition, evaluation, and deploy-
ment of cybersecurity technologies.14
The Cyber Economic Incentives Project is designed to measure where and
how much should the private sector invest in cybersecurity as well as how can law
enforcement alter the behaviors and motives of criminal enterprises investing in
cybercrime. Unlike other research efforts, the methods being investigated focus on
business aspects rather than technical aspects. By measuring the market or busi-
ness value of cybersecurity targeted, lower-cost investments can be made that both
control the effects of cyber threats and mitigate the risks of cybercrime and cyberat-
tacks. The impact of this work will be realized through the production and use of
the following:
(ref Conficker and Stuxnet attacks), and situational understanding and attack attri-
bution. Attack protection, Prevention and Pre-emption, and Automated Attack
Detection, Warning and Response are documented requirements found in the
Federal Plan for CSIA R&D, a report coauthored by S&T and other program par-
ticipants. Internet Measurement and Attack Modeling program focus areas include
resilient systems and networks, modeling of Internet attacks, and network mapping
and measurement.
The technical approach for Internet measurement is to improve the system used
to collect network traffic information to provide scalable, real-time access to the
data as it is being collected from around the globe. This data are being improved by
increasing both the number of data collectors and the number of data points being
monitored. To build a more complete map of the Internet, the effort will build
upon previous research projects, which have built large research platforms capable
of Internet measurements from points across the globe. These efforts include the
following:
In the area of cyber forensics, law enforcement has a significant challenge keep-
ing up with the technology changes. New technology, both hardware and software,
is released into the market at a very rapid pace and used in criminal activity almost
immediately. The large volume of information contained on digital devices can
make the difference in an investigation, and law enforcement investigators require
updated tools to address the changing technology.
Since its inception in November 2008, the Cyber Forensics Working Group
(CFWG) has provided project requirements. Part of S&T’s CSD, CFWG is com-
posed of representatives from federal, state, and local law enforcement agencies.
Members meet biannually to provide requirements, discuss capability gaps, and
prioritize the areas of most immediate concern to focus technology development
and participate as test and evaluation partners of resultant solutions.
40 ◾ Threat Level Red
The Cyber Forensics Tool Testing Program at the NIST is a project that offers
a measure of assurance that the tools used by law enforcement in the investigations
of computer-related crimes produce valid results. The implementation of testing
based on rigorous procedures provides impetus for vendors to improve their tools
to provide consistent and objective test results to law enforcement that will stand
up in court. There are also research efforts focused on the capabilities to forensically
acquire data from information and entertainment systems found in vehicles seized
during law enforcement investigations.19
Along with an increase in the use of mobile devices cloud computing is rapidly
transforming information technology (IT) in the private and public sectors. Cloud-
based solutions provide significant scalability, realize significant cost effectiveness,
can be quickly deployed and provisioned, and can enable full transparency in man-
aging operational costs. Owing to this, organizations face enormous pressure to
incorporate cloud solutions into their operational environment. However, the novel
combination of technologies used to implement cloud services introduces new vul-
nerabilities to malicious attack, which will only increase as more applications and
platforms move to cloud environments.
A comprehensive cloud security solution must be resilient in the face of signifi-
cant node corruption and must incorporate regenerative capabilities that can ensure
the continued mission effectiveness of the system. Current solutions to prevent
an attacker from stealing a compromised node’s data require unacceptably high
The Department of Homeland Security Cybersecurity ◾ 41
bandwidth, which can significantly slow systems. These approaches also assume a
static architecture, a situation that inherently favors the attacker since it provides
them with time to discover the network’s architecture and layout and implement
an effective attack.
To address these and other challenges, CSD is supporting the R&D of sev-
eral technologies within the Security for Cloud-based Systems program. This work
focuses on developing and deploying cloud investigation and auditing tools and
capabilities, technologies that allow for advanced VMs management, methods that
provide for secure multiparty computing as well as the development of other tech-
nologies to secure the endpoints in a cloud system.21
The beneficiaries of this research range from the national security bodies operat-
ing the most sensitive or classified systems, to homeland security officials who need
to share sensitive-but-unclassified/controlled unclassified information (CUI) and to
healthcare, finance, and many other sectors where sensitive and valuable informa-
tion is managed. In many systems, such as those operating critical infrastructures,
the integrity, availability, and total system survivability are of the highest priority
and can be compromised by insiders. Current efforts include the following:
2.12 Summary
The DHS S&T CSD focuses on applied R&D, test, evaluation, and transition for
technologies to support civilian federal, state, and local governments and private
sector unclassified needs to protect the cyber infrastructure. Important characteris-
tics of the CSD research approach include the following:
◾◾ The program regularly engages with agencies and the community to identify
needs that cannot be met with current technologies and to understand the
current state of the art and practice in each area of need.
◾◾ In cases where technologies do not exist or are immature, the program makes
the necessary investments in applied research, advanced development, test
and evaluation, and technology transition to ensure their availability to the
HSE.
◾◾ Assessments and evaluations are conducted through technical assessment,
modeling, vulnerability and risk analysis, and red team evaluations and
operational assessments. Performers execute a technology transition process
whereby cybersecurity tools developed under sponsorship by DHS can be
acquired, evaluated, and transitioned to end users.
◾◾ DHS has several talent development programs in place along with conduct-
ing research on talent development methods.
◾◾ What experience has seminar participants had working with or utilizing U.S.
DHS cybersecurity programs or cybersecurity research efforts? Which areas
was that experience with?
◾◾ What experience has seminar participants had with private corporations or
nongovernmental organizations that have worked on similar research to that
being conducted and supported by DHS?
◾◾ What areas of U.S. DHS cybersecurity research do seminar participants
think are the most important? Why?
◾◾ What areas of U.S. DHS cybersecurity research do seminar participants
think are the most relevant to the private sector? Why?
Key Terms
anonymous networks: enable users to access the World Wide Web while blocking
any tracking or tracing of their identity on the Internet
cryptocurrencies: are digital assets designed to work as a medium of exchange
using cryptography to secure the transactions and to control the creation
of additional units of the currency
cyber analytics: analytical data generated by specialized tools that enable network
security managers to address pressing information security problems
cyber-physical systems: are engineered systems that are built from, and depend
upon, the seamless integration of computational algorithms and physical
44 ◾ Threat Level Red
References
1. U.S. Department of Homeland Security. Science and Technology. Homeland Security
Advanced Research Projects Agency. Retrieved November 13, 2016, https://www.dhs.
gov/science-and-technology/hsarpa
2. The Networking and Information Technology Research and Development
Program. Report on Implementing Federal Cybersecurity Research and Development
Strategy. Retrieved November 11, 2016, https://www.nitrd.gov/PUBS/
ImplFedCybersecurityRDStrategy-June2014.pdf
3. U.S. Department of Homeland Security. Science and Technology CSD Projects. Retrieved
November 13, 2016, https://www.dhs.gov/science-and-technology/csd-projects
4. New York State Department of Financial Services. Notice of Inquiry on Virtual
Currencies. August 12, 2013. Retrieved November 13, 2016, http://www.dfs.ny.gov/
about/hearings/vc_01282014/notice_20130812_vc.pdf
5. U.S. Department of Homeland Security. Science and Technology CSD Projects.
Anonymous Networks and Currencies. Retrieved November 13, 2016, https://www.
dhs.gov/CSD-ANC
6. U.S. Department of Homeland Security. Science and Technology CSD Projects. Cyber
Physical Systems Security. Retrieved November 13, 2016, https://www.dhs.gov/
science-and-technology/csd-cpssec
7. U.S. Department of Homeland Security. Science and Technology CSD Projects.
Data Privacy Technologies. Retrieved November 14, 2016, https://www.dhs.gov/
science-and-technology/csd-privacy
8. U.S. Department of Homeland Security. Science and Technology CSD Projects.
Distributed Dental of Service (DDoS). Retrieved November 14, 2016, https://www.
dhs.gov/science-and-technology/csd-ddosd
The Department of Homeland Security Cybersecurity ◾ 45
The NIST was founded in 1901 and is now part of the U.S. Department of
Commerce. NIST is one of the oldest physical science laboratories in the United
States. The Congress established the agency to remove a major challenge to U.S.
industrial competitiveness at the time which was the country’s second-rate mea-
surement infrastructure that lagged behind the capabilities of the United Kingdom,
Germany, and other economic rivals. This chapter covers the cybersecurity research
activities of NIST.
47
48 ◾ Threat Level Red
During the tier selection process, an organization should consider its current risk
management practices, threat environment, legal and regulatory requirements,
business/mission objectives, and organizational constraints.
The key tenet of the tiers is to allow organizations to take stock of their current
activities from an organization-wide point of view and determine if the current inte-
gration of cybersecurity risk management practices is sufficient given their mission,
regulatory requirements, and risk appetite. Progression to higher tiers is encouraged
when such a change would reduce cybersecurity risk and would be cost effective.
The companion roadmap discusses NIST’s next steps with the framework and
identifies the key areas of development, alignment, and collaboration. These plans
were based on input and feedback received from stakeholders through the frame-
work development process. This list of high-priority areas was not intended to be
exhaustive, but were important areas identified by stakeholders that should inform
future versions of the framework.6 The framework is discussed in more depth in
Chapter 11, Cybersecurity Research, for the Critical Industry Sectors.
199) defines how agencies should determine the security category of their informa-
tion and information systems. Agencies are to consider the potential impact or mag-
nitude of harm that could occur should there be a loss in the confidentiality, integrity,
or availability of the information or information system as low, moderate, or high.
◾◾ Low impact: the loss could be expected to have a limited adverse effect on
organizational operations, organizational assets, or individuals. For example,
the loss might cause degradation in an organization’s mission capability to an
extent and duration that the organization is able to perform its functions, but
the effectiveness of the functions is noticeably reduced.
◾◾ Moderate impact: the loss could be expected to have a serious adverse effect
on organizational operations, organizational assets, or individuals. The loss
could significantly reduce the agency’s capability to effectively perform its
mission and functions, among other things.
◾◾ High impact: the loss could be expected to have a severe or catastrophic
adverse effect on organizational operations, organizational assets, or indi-
viduals. For example, it might cause the organization to be unable to perform
one or more of its primary functions or result in a major financial loss.
◾◾ Selected agencies did not always implement controls for selected systems
effectively.
◾◾ Up-to-date patches were not always installed to support selected systems.
◾◾ Selected agencies had contingency plans in place for systems reviewed, but not
all plans were comprehensive and appropriate tests were not always conducted.
◾◾ Selected agencies had developed security programs, but had not effectively
implemented the key elements.
◾◾ Although agencies had developed security plans, consideration of the security
baseline controls for high-impact systems varied.
◾◾ Agencies did not always ensure individuals with significant security responsi-
bilities received specialized training.
56 ◾ Threat Level Red
research work. The testbed focuses on future microgrid concepts and is both agile,
to accommodate a wide range of experimental and testing configurations, and to
enable its use in combination with other testbeds across the country and around
the world for work at significant scale. The research work supports and informs the
standards work and together these components enable NIST to promote the emer-
gence of a smart grid for the nation. Some recent accomplishments for the Smart
Grid Program include the following:
◾◾ NIST Smart Grid Framework and Roadmap for Smart Grid Interoperability
Standards, Release 1.0 (January 2010) and Release 2.0 (February 2012):
these authoritative framework documents are the primary NIST output ful-
filling its Enterprise Information Security Architecture (EISA) role, provid-
ing to the U.S. and world smart grid industry the high-level guidance on
architectural and cybersecurity principles, standards, and testing and cer-
tification based on consensus industry input supported by a comprehensive
public review process.
◾◾ New private/public organization: SGIP (established in November 2009 as a
public–private partnership; transitioned to an industry-led nonprofit organi-
zation in April 2013). With nearly 200 member organizations and significant
international participation, the SGIP is recognized as the leading worldwide
organization and forum for smart grid standards coordination and testing
and certification guidance.
◾◾ New or revised smart grid standards and guides: NIST-facilitated output
from a variety of standards development organizations and other groups,
including as part of priority action plans within the SGIP, have been devel-
oped and published, covering areas such as energy usage information, smart
meters, electric vehicles, demand response, and guidelines for assessing wire-
less standards for smart grid applications.
◾◾ Cybersecurity guidelines and standards: these are NIST-facilitated or NIST
Interagency Report output from NIST, the SGIP Cyber Security Working
Group, and other groups. The primary NIST-facilitated contribution,
NISTIR 7628 Guidelines for Smart Grid Cyber Security (Volumes 1, 2, and
3), provides an analytical framework that organizations can use to develop
effective cybersecurity strategies tailored to their particular combinations of
smart grid-related characteristics, risks, and vulnerabilities.
◾◾ Testing and certification methods and tools: NIST-facilitated output includes
the SGIP-published Interoperability Process Reference Manual (IPRM),
Version 2.0, which provides recommendations on processes and best practices
that enhance the introduction of interoperable products into smart grid markets.
◾◾ Measurement methods and tools: development of these methods and tools
results in a variety of publications, guides, and models covering areas includ-
ing synchrophasor, advanced meters, time synchronization, building-to-grid
and other testbeds, and system performance models.15
58 ◾ Threat Level Red
◾◾ The first measurement science problem is the need for a credible technical archi-
tecture suitable to the full range of CPS use cases. The research plan provides
for the development of a CPS reference architecture that enables collaboration
among stakeholders, discovery of common principles applicable to many CPS
implementations, and the identification of critical gaps in standards and metrics.
◾◾ The second measurement problem is the need to integrate work and share ideas
and solutions across a broad range of disciplines and domains. Development of
the CPS framework and its analysis methodology through a public consensus
The National Institute for Standards and Technology ◾ 59
The NIST research plan comprises two elements as follows. The first focuses on
new approaches enabling the design and engineering of a CPS from initial concept
through successful operation. This requires a new systems science and engineering
approach. This approach must simultaneously embrace all levels of the CPS archi-
tecture, from physical components and their associated sensors and actuators at
the base layers, through middle-layer control systems and analytics, to the overall
optimization and user functionality at higher layers.
The research plan applies these principles in two key areas to enable new, scal-
able CPS design approaches. The first area is the development of a common vocabu-
lary that enables shared progress across current, siloed CPS domains. These include
a reference architecture, syntax, and ontologies that provide the basis for modeling,
programming, control, and communications languages that span domains and dis-
ciplines. This work provides the essential foundation for the subsequent develop-
ment of standards for interoperability and composability across architectural layers
and between components and systems.
The second area focuses on security and privacy status during operations and
includes consensus guidelines and measurement processes for security automation,
privacy, and high-confidence networks with assured quality of service (QoS). The
results are essential to developing CPS for use in sensitive applications such as health
care and assisted living; in safety-critical applications such as remote surgery; in
60 ◾ Threat Level Red
time-critical applications such as the smart grid; and in critical infrastructures for
disaster resilience, traffic management, and municipal water systems.
The second element of the research plan focuses on the capabilities required
for experimental manipulation, measurement, and evaluation of the performance
of the more capable and powerful CPSs enabled by the new design approaches
targeted under the first area. In this context, CPS performance metrics include effi-
ciency and sustainability, agility and flexibility, reliability (including time-critical
performance), resilience, usability, safety, security, and privacy. Research in this
second area focuses on the development of a comprehensive abstraction infrastruc-
ture comprising tools, platforms, testbeds, and integrated design environments to
enable the application of formal methods and standards to the codesign of hetero-
geneous, interacting components. Testbeds and research platforms developed under
this initiative will be modular, reconfigurable, remotely accessible, and adaptable to
multiple domains and applications.16
A key challenge to progress in CPSs is the lack of robust platforms for experi-
ment and testing, which NIST is addressing through the development of a modu-
lar, composable multi-domain CPS testbed. Currently, many CPS experiments are
done either in operational systems or in domain-specific testbeds. The former are
limited by the severe constraints required to ensure that experiments and testing do
not affect reliability and safety for systems that are providing critical, often life- and
health-safety, functions in real time. The latter are limited by the inability to test in
constrained environments the general applicability of CPS concepts and technologies
intended for implementation across multiple domains and in varied applications. The
program is addressing this need through the development of design principles for
modular, composable testbeds that are interoperable with facilities across the nation
and around the world for varying scale and readily reconfigurable for work across
domains and applications, and through development of a cross-sector CPS testbed.17
Smart grid cybersecurity must address not only deliberate attacks, such as from
disgruntled employees, industrial espionage, and terrorists, but also inadvertent com-
promises of the information infrastructure due to user errors, equipment failures, and
natural disasters. The SGIP Cybersecurity Committee (SGCC), which is led and man-
aged by the NIST ITL, Computer Security Division, is moving forward in to address
the critical cybersecurity needs in the areas of advanced metering infrastructure (AMI)
security requirements, cloud computing, supply chain, and privacy recommendations
related to emerging standards. This project will provide foundational cybersecurity
guidance, cybersecurity reviews of standards and requirements, outreach, and foster
collaborations in the cross-cutting issue of cybersecurity in the smart grid.18
◾◾ Reside within the United States and be a legal entity, duly organized and
incorporated, validly existing, and in good standing under the laws of the
state where the laboratory intends to do business.
◾◾ Agree to accept the U.S. government technical oversight and validation of
evaluation-related activities in accordance with the policies and procedures
established by the NIAP Common Criteria Scheme.
The National Institute for Standards and Technology ◾ 63
3.9 Summary
NIST is one of the oldest physical science laboratories in the United States. The
Congress established the agency to remove a major challenge to U.S. indus-
trial competitiveness at the time when the country’s second-rate measurement
infrastructure lagged behind the capabilities of the United Kingdom, Germany,
and other economic rivals. NIST cybersecurity research activities include the
following:
Although NIST continues to research and improve the standards and methods
for protecting federal information systems and improve cybersecurity, agencies are
often slow to implement standards and update security methods. A 2016 study
conducted by the U.S. GAO found that federal agencies face numerous threats to
high-impact systems. Over the last several years, the GAO has made about 2,500
recommendations to agencies aimed at improving their implementation of infor-
mation security controls. As of September 16, 2016, about 1,000 of the GAO infor-
mation security-related recommendations had not been implemented.
Key Terms
Border Gateway Protocol (BGP): was developed in the late 1980s to exchange
routing information and compute routes between the networks that com-
prise Internet. Over time, BGP has evolved into the fundamental glue that
enables the commercial Internet
composable: technologies that are able to exist, happen, or work together
critical infrastructure cybersecurity: is designed to protect the critical infrastruc-
ture which includes all technology functions that are required to support
the national economy and security
The National Institute for Standards and Technology ◾ 65
cyber-physical systems (CPS): combine the cyber and physical worlds with tech-
nologies that can respond in real time to their environments including the
IoT, industrial Internet, and co-engineered interacting networks of physi-
cal and computational components
microgrid: is a localized grouping of electricity sources and loads that normally
operates connected to and synchronous with the traditional centralized
grid (macrogrid), but can be disconnected and function autonomously as
physical and/or economic conditions dictate
nanoscale: technology or physical items that have dimensions measured in nano-
meters which is one billionth of a meter
next generation internet architectures: are those which will support future
Internet applications and environments such as the Internet or things and
the smart grid
ontology: describes a system of concepts and its associated properties for a specific
area often intended to support computer applications and exist on a con-
tinuum rather than completely distinct types of artifacts
siloed: separate systems, each with a separate function or environment that are
often duplicated rather than integrated into a whole system
smart grid: is the secure and resilient electrical grid that enables support for critical
infrastructures and the national economy
synchrophasor: is a sophisticated monitoring device that can measure the
instantaneous voltage, current, and frequency at specific locations on
the electric grid giving operators a near real-time picture of what is hap-
pening on the system, and allows them to make decisions to prevent
power outages
tailored trustworthy spaces: a security architecture and strategic federal cyberse-
curity research theme tailored for the smart grid and other cyber environ-
ments that assure that all elements in the space are secure
References
1. The National Institute of Standards and Technology. About NIST. Retrieved
November 16, 2016, https://www.nist.gov/about-nist
2. The National Institute of Standards and Technology. Cybersecurity. Retrieved
November 16, 2016, https://www.nist.gov/topics/cybersecurity
3. The Networking and Information Technology Research and Development
Program. Report on Implementing Federal Cybersecurity Research and Development
Strategy. Retrieved November 11, 2016, https://www.nitrd.gov/PUBS/
ImplFedCybersecurityRDStrategy-June2014.pdf
4. The National Institute of Standards and Technology. Commission on Enhancing
National Cybersecurity. Retrieved November 16, 2016, https://www.nist.gov/
cybercommission
5. The National Institute of Standards and Technology. Cybersecurity Framework.
Retrieved November 16, 2016, https://www.nist.gov/cyberframework
66 ◾ Threat Level Red
The DARPA is the principal agency within the DoD for high-risk, high-payoff
research, development, and demonstration of new technologies and systems that
serve the warfighter and the defense of the United States. DARPA’s R&D efforts in
cybersecurity strongly support the Moving Target Defense and Tailored Trustworthy
Spaces themes. In particular, DARPA’s Information Assurance and Survivability
Program draws upon biological and immune systems as inspiration for radically
rethinking computer hardware, software, and system designs. Such systems will
be able to detect, diagnose, and respond to attacks by using their own innate
and adaptive immune systems. Furthermore, in response to attacks, such systems
will also be capable of dynamically adapting and improving their defensive capa-
bilities over time. As in biological systems, the cyber systems will dynamically
diversify, increasing their resiliency and survivability, and that of their individual,
constituent computers.1 This chapter covers the unclassified cybersecurity research
of DARPA.
67
68 ◾ Threat Level Red
and stealth technology, but also such icons of modern society such as the Internet,
automated voice recognition and language translation, and Global Positioning
System (GPS) receivers small enough to embed in myriad consumer devices.
DARPA explicitly reaches for transformational change by working within an
innovation ecosystem that includes academic, corporate, and governmental partners,
with a constant focus on the U.S. Military Services. DARPA has approximately
220 government employees in six technical offices, including nearly 100 program
managers, who oversee about 250 R&D programs. Program managers report to
DARPA’s office directors and their deputies, who are responsible for charting tech-
nical directions, hiring program managers, and overseeing program execution. The
technical staff is also supported by experts in security, legal and contracting issues,
finance, human resources, and communications. DARPA’s technical offices are the
following:
DARPA hosted the Cyber Grand Challenge Final Event which was the world’s
first all-machine cyber hacking tournament on August 4, 2016 in Las Vegas. It
started with more than 100 teams consisting of some of the top security researchers
and hackers in the world. DARPA pit seven teams against each other during the
final event. During the competition, each team’s cyber reasoning system (CRS)
automatically identified software flaws, and scanned a purpose-built, air-gapped
network to identify affected hosts. For nearly 12 hours, teams were scored based on
how capably their systems protected hosts, scanned the network for vulnerabilities,
and maintained the correct function of software. Prizes of $2 million, $1 million,
and $750,000 were awarded to the top three finishers.
Computer Grand Challenge (CGC) was the first head-to-head competition
between some of the most sophisticated automated bug-hunting systems ever devel-
oped. These machines played the classic cybersecurity exercise of Capture the Flag
in a specially created computer testbed laden with an array of bugs hidden inside
custom, never-before-analyzed software. The machines were challenged to find and
patch within seconds the flawed code that was vulnerable to being hacked, and find
their opponents’ weaknesses before they could defend against them.3
The winning computer system, dubbed Mayhem, was created by a team known
as ForAllSecure, one of seven teams that competed in the all-day competition,
70 ◾ Threat Level Red
performed in front of 5,000 computer security professionals and others at the Paris
Las Vegas Conference Center. The entire event was visualized for attendees on giant
monitors and live streamed for remote viewers, with expert sportscasters document-
ing the historic competition. Details and videos about the competing teams can be
found at www.cybergrandchallenge.com
Xandra, a computer system designed by team TECHx of Ithaca, New York and
Charlottesville, Virginia, was declared the second-place winner and Mechanical
Phish, a system designed by team Shellphish of Santa Barbara, California, was
named the third-place winner. Judges spent the night verifying the preliminary
results, and winners were officially crowned at an award ceremony Friday morn-
ing, immediately before the launch of DEFense readiness CONdition (DEF CON)
hacker tournament also being hosted at the Paris Hotel.
The event was very significant considering that the Heartbleed security bug
existed in many of the world’s computer systems for nearly two-and-a-half years,
for example, before it was discovered and a fix circulated in spring 2014. By that
time, the bug had rendered an estimated half million of the Internet’s secure servers
vulnerable to theft and other mischief. Analysts have estimated that, on average,
such flaws go unremediated for 10 months before being discovered and patched,
giving nefarious actors ample opportunity to wreak havoc in affected systems before
they move on to exploit the new terrain.4
look for research on biometrics that can be captured through the technology we
already use looking for aspects of this cognitive fingerprint. These could include,
for example, how the user handles the mouse and how the user crafts written lan-
guage in an email or document. A heavy emphasis is placed on validating any
potential new biometrics with empirical tests to ensure they would be effective in
large-scale deployments to mitigate security threats.
The later phases of the program focus on developing a solution that inte-
grates any available biometrics using a new authentication platform suitable for
deployment on a standard DoD desktop or laptop. The combinatorial approach of
using multiple modalities for continuous user identification and authentication is
expected to deliver a system that is accurate, robust, and transparent to the user’s
normal computing experience. The authentication platform is to be developed with
open application programming interfaces (APIs) to allow the integration of other
software or hardware biometrics available in the future from other sources.5
greater degree than in other areas of defense, cybersecurity solutions require that
the DoD develops the ability to build quickly, at scale, and over a broad range of
capabilities.
DoD has made advances in streamlining its technology acquisition pro-
cess by taking advantage of COTS hardware and software. In particular, the
commercial mobile application (apps) marketplace for smartphones and simi-
lar personal technologies holds great potential as a rapid and adaptable supplier
for future military software applications, especially as DoD integrates hardened
smartphones into its standard equipment for warfighters. The challenge now
becomes validating the security of these apps so that they can be securely and
confidently used by warfighters, and doing so on a timeline consistent with oper-
ational tempo.
The Automated Program Analysis for Cybersecurity (APAC) program aims to
address the challenge of timely and robust security validation of mobile apps by
first defining security the properties to be measured against and then developing
automated tools to perform the measuring. APAC will draw heavily from the field
of formal methods program analysis (theorem proving, logic and machine proof-
ing) to keep malicious code out of DoD Android-based application marketplaces.
APAC will apply recent research breakthroughs in this field in an attempt to scale
DoD’s program analysis capability to a level never before achieved with an auto-
mated solution.
For the APAC to succeed, high-level DoD cybersecurity objectives for mobile
apps must be translated into properties that are at a sufficiently low level to be
proven with automated program analysis tools. As an example, the generic prop-
erty, “This application contains no malicious code,” is too high level to be proven
by likely tools. The narrower property, “This Push-to-Talk application is not an
eavesdropper,” is still too high level. The more limited property, “This Push-to-Talk
application only records audio when the ‘Talk’ button is pressed,” may be suf-
ficiently low level to be workable for automated program analysis. The APAC will
attempt to define many such low-level properties to come closer to the DoD goal of
no malicious code present in its mobile apps marketplaces.
The second challenge APAC aims to address is producing practical, automated
tools to demonstrate the cybersecurity properties identified. Successful tools would
minimize false alarms, missed detections, and the need for human filtering of
results to prove properties.
To validate approaches, APAC plans to examine multiple forms of program
analysis, including static analysis and hybrid static–dynamic analyses based on
symbolic execution. Performers will be broken into R&D teams to define proper-
ties and create tools and Adversarial Challenge (AC) teams to create applications
loaded with Trojan horse malicious code using techniques derived from the existing
Android malware. Performance will be evaluated on the metrics of: rate of false
alarms in identifying malicious code, rate of missed detections in identifying mali-
cious code, and human analysis time required.7
The Defense Advanced Research Projects Agency ◾ 73
◾◾ The end of frequency scaling has caused CPU manufacturers to shift their
focus to new features, particularly multiple cores. Multi-core chips are now
common; even smartphones come with four cores. The proliferation of cores
may enable a trade of silicon for security.
◾◾ Fault-tolerant architectures run multiple subsystems in parallel and con-
stantly cross-check results to rapidly detect, isolate, and mitigate faults, which
manifest as differences across the subsystems. Adapting fault-tolerant systems
to run multiple variants of a vulnerable software system in parallel present
the opportunity to immediately detect and interdict cyberattacks before they
gain a foothold.
◾◾ Transforming software to create variants of binary executables has the poten-
tial to increase the adversary’s work factor, because an attack on one variant
would likely fail on others. Recent advances in lifting compiled binaries
74 ◾ Threat Level Red
CFAR seeks to enable the DoD to make legacy computer systems more
secure by recompiling them. The resulting systems would operate identically to
the originals, so there would be no retraining costs and no change to existing
operations.9
control or management planes or with the WAN administrator, and will have
no knowledge of WAN architecture except for what EdgeCT systems can infer
from edge-based observation of packet flows into and out of the WAN. EdgeCT
system designs cannot require any changes to the WAN or to the encryption
boundaries. Deployed EdgeCT systems may ultimately have to recognize and
support robust communication for a variety of user applications including real-
time streaming video, real-time audio, file transfer and situational awareness,
among others.10
and improve ease of use. Researchers and hackers have shown that these kinds of
networked embedded systems are vulnerable to remote attack, and such attacks can
cause physical damage while hiding the effects from monitors.
The goal of the High-Assurance Cyber Military Systems (HACMS) program
is to create technology for the construction of high-assurance CPSs, where high
assurance is defined to mean functionally correct and satisfying appropriate safety
and security properties. Achieving this goal requires a fundamentally different
approach from what the software community has taken to date. Consequently,
HACMS seeks to adopt a clean-slate, formal methods-based approach to enable
semiautomated code synthesis from executable, formal specifications. In addition
to generating code, HACMS seeks a synthesizer capable of producing a machine-
checkable proof that the generated code satisfies functional specifications as well
as security and safety policies. A key technical challenge is the developments of
techniques to ensure that such proofs are composable, allowing the construction of
high-assurance systems out of high-assurance components.
Key HACMS technologies include interactive software synthesis systems, veri-
fication tools such as theorem provers and model checkers, and specification lan-
guages. Recent fundamental advances in the formal methods community, including
advances in satisfiability (SAT) and satisfiability modulo theories (SMT) solvers,
separation logic, theorem provers, model checkers, domain-specific languages, and
code synthesis engines suggest that this approach is feasible. If successful, HACMS
will produce a set of publicly available tools integrated into a high-assurance soft-
ware workbench, which will be widely distributed for use in both commercial and
defense software sectors.
HACMS intends to use these tools to (1) generate open-source, high-assurance,
and operating system and control system components and (2) use these components
to construct high-assurance military vehicles. HACMS will likely transition its
technology to both the defense and commercial communities. For the defense sec-
tor, HACMS can enable high-assurance military systems ranging from unmanned
vehicles (e.g., unmanned aerial vehicles [UAVs], unmanned ground vehicle [UGVs],
and unmanned underwater vehicles [UUVs]) to weapons systems, satellites, and
command and control devices.13
targeted attacks that disguise attacks as legitimate actions, making discovery far
more difficult. It is within this complicated web of networked systems that cyber
defenders must find targeted cyber attacks.
The Integrated Cyber Analysis System (ICAS) program aims to make system
information readily useful for attack forensics and tactical cyber defense. ICAS is
designed to integrate all sources of network data in a federated database to enable
reasoning across the enterprise. If successful, ICAS will provide cyber defenders
with a complete, current picture of the IT environment and will reduce the time
required to discover targeted attacks.14
larger pieces of software, from those that implement network services typically in
the range of hundreds of thousands of lines of source code to even larger systems
comprising millions or tens of millions of lines of code. Speed refers to the need
to increase the rate at which human analysts can analyze software with the help
of automated tools, from thousands of lines of code per hour to tens of thousands,
hundreds of thousands or millions of lines of code per hour.
The STAC program includes four TAs. TA One (TA1) performers are the R&D
teams charged with the development of new program analysis techniques and tools
to identify algorithmic resource usage vulnerabilities in software. TA2 performers
are the AC teams charged with producing challenge programs with known algo-
rithmic resource usage vulnerabilities for use in testing within the STAC program.
To measure technical progress, there will be a series of competitive engagements
throughout the STAC program in which R&D teams will attempt to use their
techniques and tools to find the algorithmic resource usage vulnerabilities in the
challenge programs produced by the AC performers. TA3 is the control team per-
former charged with applying present-day analysis techniques to the same problems
as the R&D teams during engagements in order to provide a baseline for compari-
son. TA4 is the experimentation lead (EL) performer who will plan each engage-
ment, manage the event, and collect measurements of the results.17
end-to-end system behaviors; and reason over these behaviors, both forensically and in
real time. By automatically or semiautomatically connecting the dots across multiple
activities that are individually legitimate but collectively indicate malice or abnormal
behavior, TC has the potential to enable prompt detection of APTs and other cyber
threats, and allow complete root cause analysis and damage assessment once adver-
sary activity is identified. In addition, the TC program will integrate its basic cyber
reasoning functions in an enterprise-scale cyber monitoring and control construct
that enforces security policies at key ingress/exit points, for example, the firewall.
The intent of the TC program is to develop basic technologies that are separable
and usable in isolation (e.g., within a given software layer/application environment,
such as web middleware), while exploring the best way to integrate multiple TC
technologies in an experimental prototype. The program will aim to produce basic
technologies and an experimental prototype comprising multilayer data collection
architecture and an analysis/enforcement engine that will enable both proactive
enforcement of desirable policies (permissible/impermissible interactions) and near
real-time intrusion detection and forensic analysis. It is expected that this prototype
will provide a starting point for technology transition.18
that the software and firmware shipped on commodity IT devices is free of broad
classes of hidden malicious functionality. The program supports the White House’s
2009 CNCI, which specifically named developing a multipronged approach for
global supply chain risk management as a key national security goal.
Specific VET program objectives include the following:
clearances and those who may be granted clearances based on technical capabilities
and eligibility.
The DARPA I2O requests information on potential performers for classified
CSO R&D. Specifically, this RFI seeks information on potential performers who
have the capability to rapidly develop state-of-the-art CSO technologies responsive
to current and emerging cyber threats, and who have either of the following:
4.19 Summary
DARPA’s technological approach focuses on radical innovation that addresses future
warfighting needs, rather than developing technologies that address current warf-
ighting needs. This approach shapes how the agency defines, pursues, and tracks
technology transition. DARPA considers a successful transition to be one where its
program, or a portion of its program, influences or introduces new knowledge. This
knowledge is often passed through program performers, which DARPA relies on to
execute technology development in its programs. Typical performers include com-
mercial enterprises; other DOD entities, such as military service laboratories and
research agencies; and academic institutions. Further, DARPA generally does not
develop technologies to full maturity. Instead, the agency focuses on demonstrat-
ing the feasibility of new technologies, which includes verifying that the concepts
behind the technologies have potential for real-life applications. As a result, most
DARPA technologies require additional development before they are ready for oper-
ational or commercial use.21
DARPA is working to assure that the United States has cyberspace superiority
that permits secure, reliable conduct of operations by U.S. Military forces, and its
related land, air, maritime, and space forces at a given time and place without pro-
hibitive interference by an adversary. DARPA is developing the research capabilities
and tools necessary to assure that dominance includes the following:
◾◾ Enhanced attribution methods, the in ICAS and the RADICS, will enable
defenders to more quickly respond to cyber attacks and to identify and track
potential attackers.
◾◾ DARPA is far ahead of private technology companies in how it views com-
puting and networking technology and how to defend that technology.
◾◾ DARPA’s RFI: CSO R&D clearly shows that the agency intends to research
and develop technology that can get and keep the U.S. military far ahead on
cybersecurity and cyber space capabilities.
Key Terms
biometrics: are the characteristics used to uniquely recognize humans based on
one or more intrinsic physical or behavioral traits
cognitive fingerprint: is the unique pattern arising from an individual’s interac-
tion with existing technology without the need for specific data collection
technology and without the need for cooperation from the user
composable: technologies that are able to exist, happen, or work together
computing substrate: is a complex of processors and sensors, or collectors that
when combined provide arrays of processing abilities interconnected by a
communication channel
cybersecurity metrics: help organizations verify that cybersecurity controls are
in compliance with a policy, process, or procedure and help to identify
security strengths and weaknesses
innovation ecosystem: multidisciplinary research is key and is often driven by
military or industrial needs. Disciplines are brought into the innovation
ecosystem from many types of universities, national laboratories, private
industry, and military laboratories to perform rapid, efficient innovation
that could have a transformative economic impact on an industry or sector
The Defense Advanced Research Projects Agency ◾ 85
References
1. Defense Advanced Research Projects Agency (DARPA). About DARPA. Retrieved
November 21, 2016, http://www.darpa.mil/about-us/about-darpa
2. Defense Advanced Research Projects Agency (DARPA). DARPA Offices. Retrieved
November 21, 2016, http://www.darpa.mil/about-us/offices
3. Defense Advanced Research Projects Agency (DARPA). Cyber Grand Challenge.
Retrieved November 21, 2016, http://www.darpa.mil/program/cyber-grand-challenge
4. Defense Advanced Research Projects Agency (DARPA). DARPA Celebrates Cyber
Grand Challenge Winners. August 7, 2016. Retrieved November 21, 2016, http://
www.darpa.mil/news-events/2016-08-05a
5. Defense Advanced Research Projects Agency (DARPA). Active Authentication.
Retrieved November 21, 2016, http://www.darpa.mil/program/active-authentication
6. Defense Advanced Research Projects Agency (DARPA). Active Cyber Defense (ACD).
Retrieved November 21, 2016, http://www.darpa.mil/program/active-cyber-defense
7. Defense Advanced Research Projects Agency (DARPA). Automated Program Analysis
for Cybersecurity (APAC). Retrieved November 21, 2016, http://archive.darpa.mil/
cybergrandchallenge/
8. Defense Advanced Research Projects Agency (DARPA). Clean-Slate Design of
Resilient, Adaptive, Secure Hosts (CRASH). Retrieved November 21, 2016, http://
www.darpa.mil/program/clean-slate-design-of-resilient-adaptive-secure-hosts
9. Defense Advanced Research Projects Agency (DARPA). Cyber Fault-Tolerant Attack
Recovery (CFAR). Retrieved November 21, 2016, http://www.darpa.mil/program/
cyber-fault-tolerant-attack-recovery
10. Defense Advanced Research Projects Agency (DARPA). Edge-Directed Cyber
Technologies for Reliable Mission Communication (EdgeCT). Retrieved November
21, 2016, http://www.darpa.mil/program/edge-directed-cyber-technologies-for-
reliable-mission-communication
11. Defense Advanced Research Projects Agency (DARPA). Enhanced Attribution.
Retrieved November 21, 2016, http://www.darpa.mil/program/enhanced-attribution
86 ◾ Threat Level Red
12. Defense Advanced Research Projects Agency (DARPA). Extreme DDoS Defense (XD3).
Retrieved November 21, 2016, http://www.darpa.mil/program/extreme-ddos-defense
13. Defense Advanced Research Projects Agency (DARPA). High-Assurance Cyber
Military Systems (HACMS). Retrieved November 21, 2016, http://www.darpa.mil/
program/high-assurance-cyber-military-systems
14. Defense Advanced Research Projects Agency (DARPA). Integrated Cyber Analysis
System (ICAS). Retrieved November 21, 2016, http://www.darpa.mil/program/
integrated-cyber-analysis-system
15. Defense Advanced Research Projects Agency (DARPA). Mission-Oriented Resilient
Clouds (MRC). Retrieved November 21, 2016, http://www.darpa.mil/program/
mission-oriented-resilient-clouds
16. Defense Advanced Research Projects Agency (DARPA). Rapid Attack Detection,
Isolation and Characterization Systems (RADICS). Retrieved November 21, 2016,
http://w ww.darpa.mil/program/rapid-attack-detection-isolation-and-characterization-
systems
17. Defense Advanced Research Projects Agency (DARPA). Space/Time Analysis for
Cybersecurity (STAC). Retrieved November 21, 2016, http://www.darpa.mil/program/
space-time-analysis-for-cybersecurity
18. Defense Advanced Research Projects Agency (DARPA). Transparent
Computing. Retrieved November 21, 2016, http://www.darpa.mil/program/
transparent-computing
19. Defense Advanced Research Projects Agency (DARPA). Vetting Commodity IT
Software and Firmware (VET). Retrieved November 21, 2016, http://www.darpa.mil/
program/vetting-commodity-it-software-and-firmware
20. Defense Advanced Research Projects Agency (DARPA). Request for Information
Cyberspace Operations Research and Development. DARPA-SN-16-42. July 11, 2016.
Retrieved November 21, 2016, https://www.fbo.gov/index?tab=documents&tabmo
de=form&subtab=core&tabid=2f7bca34ba9258beba980cad90c3a0b9
21. GAO. Defense Advanced Research Projects Agency: Key Factors Drive Transition of
Technologies, but Better Training and Data Dissemination Can Increase Success. GAO-
16-5. November 18, 2015. Retrieved December 21, 2016, http://www.gao.gov/
products/GAO-16-5
Chapter 5
Intelligence Advanced
Research Projects
Activity and In-Q-Tel
87
88 ◾ Threat Level Red
The analysis focuses on maximizing insights from the massive, disparate, unre-
liable, and dynamic data that are or could be available to analysts, in a timely man-
ner from new sources of information and from existing and novel data through the
use of innovative techniques that can be utilized in the processes of the analysis.
IARPA programs are in diverse technical disciplines but have common features
such as they: involve potential transition partners at all stages, beginning with the
definition of success; create technologies that can earn the trust of the analyst user
by providing the reasoning for results; and address uncertainty and data prove-
nance explicitly (Figure 5.1).2
IARPA pursues new mechanisms for combining information gathered from mul-
tiple sources to enhance the quality, reliability, and utility of the collected informa-
tion. Areas of interest include the following:
Operations focus on the IC’s ability to operate freely and effectively in an often
hostile and increasingly interdependent and resource-constrained environment.
The key research focus areas include IA, advanced computing technologies and
architectures, quantum information science and technology, and threat detection
and mitigation (Figure 5.4).5
Several of the research programs listed above may impact cybersecurity research
and technology in the future. The current IARPA cybersecurity focused research
is spearheaded by its Office of SSO, which aims to counter emerging adversary
potential to ensure the U.S. IC’s operational effectiveness in a globally interdepen-
dent and networked environment. SSO’s research portfolio is organized into three
areas: computational power, trustworthy components, and safe and secure systems.
Objectives within the computational power area include developing revolutionary
advances in science and engineering to solve problems intractable with modern
computers; focusing on the fundamental elements of quantum computing systems;
and exploring the feasibility of a superconducting computer. In the trustworthy
components area research programs focus on understanding and manipulating very
Intelligence Advanced Research Projects Activity and In-Q-Tel ◾ 91
◾◾ Cybersecurity
◾◾ Cyber-event forecasting
◾◾ Cyber-actor behavior and cultural understanding
◾◾ Threat intelligence
◾◾ Threat modeling
◾◾ Cyber-event coding
◾◾ Cyber-kinetic event detection7
cybersecurity (at least not in the way the data was originally intended) and may
come from nontypical disciplines that can be applied to the cybersecurity domain.
IARPA expects performers to identify and extract novel leading signals from
both internal and external sensors (both conventional and unconventional) and use
them to generate warnings—probabilistic forecasts and/or detections of cyberat-
tacks. Performers will generate warnings for real cyberattacks against one or more
U.S. industry organizations that have agreed to participate in CAUSE.8
IARPA expects that offerors will identify, create, and evaluate several novel
unconventional signals from novel data sources to develop their sensors. In addition
to unconventional sensors, existing data sensors or signals from other disciplines
may be evaluated, refined, and expanded for use within the program, provided their
inclusion is well documented and justified. It is expected that some of the novel
signal concepts described in the offeror’s proposal will require additional research
and further exploration to determine their applicability and utility to the CAUSE
Program’s goal of creating new unconventional sensors.
IARPA expects complete approaches to include sensors from many disciplines
or domains, such as human/behavioral, cultural, cyber-physical, social, economic,
and others. Information extracted from social media has been useful in forecasting
noncyber events and is expected to be useful for the cybersecurity domain as well;
however, it is expected that an offeror’s complete solution will extend its uncon-
ventional sensor exploration beyond just social media. Offerors are encouraged to
consider the influence of culture on cyber-actor group behavior(s) (e.g., motiva-
tion, intent). Offerors must address the challenges involved with the integration
of conventional and unconventional sensors due to their differences in structure,
accuracy, reliability, and complexity.
CAUSE will rely on data and sensors from external sources that are located
outside the logical and physical boundaries of an organization (such as social media
and economic events) and internal sources that are located within the logical and
physical boundaries of a participating organization (including its logical public
interfaces).
External sensor data shall be from publicly available data sources, lawfully
obtained data available to any member of the general public, to include by pur-
chase, subscription, or registration. IARPA expects that external data acquisition
will require significant resources by each performer, and expects that external data
requirements will likely overlap across performers. Offerors are asked to list all data
sources required for their proposed approach, to explain how each data source sup-
ports their approach, and to include estimates of all external data costs in their cost
proposals.
It is expected that the technology developed under the CAUSE Program will
have no human in the loop. Experts may help develop, train, and improve the solu-
tion systems, but they will not manually generate warnings, guide the system, or
filter warnings before they are delivered to the Test and Evaluation (T&E) team.
The performer-produced warnings must be machine generated and submitted
94 ◾ Threat Level Red
automatically to the T&E team continuously throughout the program. The T&E
team will provide details of the automated warning ingestion and acceptance sys-
tem used for T&E at program kickoff.
The performer must include an audit trail for all warnings. The goal of this
requirement is to make the warning transparent to the end user, by allowing a
drill down from warning to sensor data. Since the Audit Trail is dependent on the
performers’ approach and system, the government team, prior to scored warnings,
intends to work with each performer to develop the specific requirements for the
audit trail. Ultimately, the audit trail capability would be mapped to a series of user
interfaces (UIs) as an integral part of the prototype system and be web enabled so
that it can easily be demonstrated to facilitate analysis of tools.
In CAUSE Phases 2 and 3, the performer’s prototype interface should provide
useful contextual information about warnings in human-readable, text format.
To the maximum extent possible, this capability should leverage existing tools for
Natural Language Generation. The interface should explain in natural language why
the warning was sent and why now, by extracting and synthesizing details from the
audit trail in a logical narrative. The narrative can also include contextual information
that relates to other warnings and noncyber events (e.g., economic upheaval, political
events, kinetic warfare), influences on actor behaviors and motivations, or historical
knowledge that might explain the event (e.g., prior bank cyber-theft patterns).
Replication Test is a test of the warning generation system’s ability to repeatedly
generate the same warning with a given sensor data input. During site visits, per-
formers will be asked to replicate certain warnings they submitted; therefore, this
capability must be built into each system. Version control and proper data man-
agement are important to be able to rerun a specific version of the system, on the
specific portion of the data that was used to generate a particular warning. During
phases 2 and 3 of the program, performers will also be asked to perform ablation
tests during the planned site visits. Ablation tests are intended to promote the use of
multiple feeds, and to gauge how performance degrades as a function of the avail-
ability of any particular feed.
Understanding the trade-offs (between recall and false discovery rate [FDR],
and between lead time, utility time, and warning quality score) is very important
for analysts. How the systems should set these trade-offs varies greatly across ana-
lytic requirements. Some analysts may favor recall over FDR, or vice versa, and
other analysts may favor utility time over warning quality score, or viceversa.
It is therefore important that the systems formalize and quantify the trade-offs
and provide the analyst dial functionality (as part of the audit trail UI to manage
these trade-offs explicitly). This is a requirement for phases 2 and 3 of the program.
Performer teams will design, implement, and demonstrate the dial functionality.
The CAUSE solution/system must be flexible enough to integrate with mini-
mal configuration changes for use in organizations with diverse sets of internal
sensors, not relying on organization-specific software/hardware hooks to integrate
with an organization. Solutions must adapt to new and/or potentially unavailable
Intelligence Advanced Research Projects Activity and In-Q-Tel ◾ 95
It is anticipated that the TIC Program will logically scale its capabilities over a
four-year period having started with a core 130 nm-node capability and subsequently
moving toward a 22 nm capability at the end of a four-year period. It is expected
that the methodologies to be demonstrated will define both high-performance inte-
grated circuits and integrated systems such as MEMS over the next 10 years.
Collaborative efforts and teaming among potential performers will be strongly
encouraged. It is anticipated that the teams will be multidisciplinary with capabili-
ties including: circuit design, chip manufacturing, and characterization. The vision
of the TIC Program is to ensure that the United States can
was invested in Protonex which develops portable power solutions for the mili-
tary. Expect Labs, the creator of the MindMeld app, which is intelligent assistant
that understands conversations and finds information you need before you have to
search for it received a $1.5 million investment from In-Q-Tel in 2014.14
In April of 2015 Ash Carter, U.S. Secretary of Defense, said DoD has proposed
and In-Q-Tel has accepted a pilot project to provide innovative solutions to DoD’s
most challenging problems. The department will make a small investment with
In-Q-Tel to leverage the nonprofit’s proven relationships and apply its approach to
DoD.17
CIA Director David H. Petraeus stated at the In-Q-Tel CEO Summit (March
1, 2012) that the key applications developed by In-Q-Tel investment companies
are focused on technologies that are driving the IoT. These include the following:
Petraeus added that the ocean of big data has implications for both intelligence
collection and intelligence analysis. For collection, having access to free and open
information on so many topics that used to be denied to the CIA to better focus
our human intelligence effort which often involves high costs and risks, while still
learning the key secrets that justify those costs and risks. CIA analysts must dis-
cern the nonobvious relationships embedded deeply within different types of data:
finding connections between a purchase here, a phone call there, a grainy video,
customs and immigration information, various embedded metadata, and so on,
and then making sense of it. Ultimately, combining the open-source feeds with
the increasingly massive volumes of classified data the CIA receives, it is clear that
the IC partners require new ways to organize and unify this universe of data and
to make data usable, to accelerate automation, and to enable data traceability, rel-
evance, and security.
Cloud computing provides important new capabilities for performing analysis
across all data, allowing our analysts and decision makers to ask ad-hoc analytic
questions of big data in a quick, precise manner. New cloud computing technolo-
gies developed by In-Q-Tel partner companies are driving analytic transformation
in the way organizations store, access, and process massive amounts of disparate
data via massively parallel and distributed IT systems.
Petraeus said he was very encouraged by what he had seen, in fact, we are
excited about it. For example, among the analytic projects underway with In-Q-Tel
startups is one that enables collection and analysis of worldwide social media feeds,
along with projects that use either cloud computing or other methods to explore
and analyze big data.18
100 ◾ Threat Level Red
Science and Technology Directorate has also been engaging with the pri-
vate sector through its investments in In-Q-Tel. In 1999, the CIA supported the
establishment of In-Q-Tel as a not-for-profit strategic investment firm designed
to bridge the gap between new advances in commercial technology and the tech-
nology needs of the U.S. intelligence and security communities. Most In-Q-
Tel investments combine funds from more than one partner agency, allowing
S&T to leverage significant investments from the IC. In testimony before the
House Committee on Science, Space, and Technology, Dr. Tara O’Toole, Under
Secretary for Science and Technology Directorate, DHS, stated that according
to In-Q-Tel’s figures, $1 of government investment can attract more than $10
in private sector funding. In addition to rapidly delivering innovative technolo-
gies to their government customers, In-Q-Tel also supports small businesses that
may not normally work with the government. In-Q-Tel estimates that following
investments via In-Q-Tel, companies have created more than 10,000 jobs.19
5.5 Summary
The IARPA invests in high-risk, high-payoff research programs to tackle some
of the most difficult challenges of the agencies and disciplines in the IC. IARPA
collaborates across the IC to ensure that research addresses relevant future needs.
In-Q-Tel is investing in R&D projects in the private sector that are of interest to
IC. Both IARPA and In-Q-Tel are leveraging expertise and funding to equip the
IC with new technologies including the following:
Key Terms
ablation tests: are used to determine the impact of a data feed being added or sub-
tracted from an information feed used to generate warnings
cross-community research: is research that serves several related organizations
by using expertise from government agencies, private companies, and
academic institutions that can provide complementary knowledge and
skills
dial functionality: provide the ability to change modes or setting that change the
trade-offs between recall and FDR, or between lead time, utility time, or
warning quality score
logical narrative: an uncomplicated straightforward explanation or directions.
natural language generation: plain uncomplicated jargon-free language that does
not require specialized training to understand
replication test: the repeated duplicate answer derived when analyzing a data set
References
1. Intelligence Advanced Research Projects Activity (IARPA). About IARPA. Retrieved
November 10, 2016, https://www.iarpa.gov/index.php/about-iarpa
2. Intelligence Advanced Research Projects Activity (IARPA). Analysis. Retrieved
November 22, 2016, https://www.iarpa.gov/index.php/about-iarpa/analysis
3. Intelligence Advanced Research Projects Activity (IARPA). Anticipatory Intelligence.
Retrieved November 22, 2016, https://www.iarpa.gov/index.php/about-iarpa/
anticipatory-intelligence
4. Intelligence Advanced Research Projects Activity (IARPA). Collection. Retrieved
November 22, 2016, https://www.iarpa.gov/index.php/about-iarpa/collection
102 ◾ Threat Level Red
The U.S. military has several diverse challenges in cybersecurity R&D of cyber
capabilities. First are the strategic research needs to develop leap ahead trans-
forming technology to maintain cyber superiority which are largely handled by
DARPA and other military research laboratories. Second is the combined strategic
and applied research, development, and deployment of the technology required
to protect the DoD at the enterprise level. The third is the applied research,
development, and deployment of the technology required to enable and protect
the missions of the diversity of capabilities provided by the air force, army, navy,
and marines. The fourth is the applied research, development, and deployment
of the technology required to enable and protect the specific units and missions
within the four branches of services. Finally is the tactical and action research
required to enable and protect all military forces and missions that are in prog-
ress as they face emerging and possibly previously unknown cyber threats. This
chapter reviews material that is publically available about how the U.S. military
meets these challenges.
105
106 ◾ Threat Level Red
research. No single agency addresses all the priority areas in the Strategic Plan nor
should it. Instead, it is the many different agency efforts comprising the federal
cybersecurity R&D enterprise that, with guidance from the Strategic Plan and
coordination through NITRD, enables progress toward the plan’s goals. The mili-
tary side of the Strategic Plan taps into the DoD Cybersecurity Cross-Community
Innovation Ecosystem.
The strategic research needs to develop leap ahead transforming technology to
maintain cyber superiority which is largely handled by DARPA and other military
research laboratories is accomplished in a sophisticated and diverse research estab-
lishment. The military centric research is handled by the OSD, the AFRL, the
ONR, the ARL, and the respective R&D units within the research structure of the
DoD and military branches and in each of their Research Ecosystems.
DARPA is the principal agency within the DoD for high-risk, high-payoff
research, development, and demonstration of new technologies and systems that
serve the warfighter and the nation’s defense. The work of DARPA is covered in
Chapter 4 of this book.
The OSD programs emphasize game-changing research over incremental
approaches, and enhance the organizational ties and experimental infrastructure
needed to accelerate transition of new technologies into practice.
The AFRL efforts in cybersecurity aim to create a firm, trustable foundation in
cyberspace, and then to build assured mission capabilities upon it. New technologies
are needed to be aware of missions and threats, compute optimal assurance solutions,
and implement protection as needed via mission agility or infrastructure reinforcement.
The ARL contributes to a number of the Strategic Plan’s objectives with a par-
ticular focus on Moving Target technologies within its Cyber Maneuver Initiative.
The Cyber Maneuver Initiative aims to improve defense against APTs by creating
dynamic attack surfaces for protected systems, and includes research in dynamic
operating system maneuverability, application diversity, network agility, cyber
deception, predictive cyber threat modeling, and cognitive reasoning and feedback
to maximize maneuver effectiveness in tactical environments.
The ONR focuses on long- and medium-term scientific and technology areas
that have the potential for delivering significant improvements in the robustness,
resiliency, security, and operational effectiveness of cyber environments. ONR’s
cybersecurity research contributes strongly to the objectives identified in the
Moving Target, Tailored Trustworthy Spaces, and Designed-In Security areas.
At the Georgia Institute of Technology, ONR-funded researchers investigated the
theory and models for botnets, and developed state of the art algorithms, methods,
and tools for detecting and tracking botnets and their command and control. Their
research has been invaluable for the DoD, as also the tools developed and now in
use by the FBI for taking down botnets and tracking down botmasters and individ-
ual operators. In addition, ONR promotes underexplored research topics that have
promising impacts on cybersecurity. For example, at the University of California,
U.S. Military Cybersecurity Research and Deployment ◾ 107
U.S. Army cyberspace research priorities are risks, detection, agility, and human
dimensions:
◾◾ Risk: theories and models that relate fundamental properties of dynamic risk
assessment to cyber threats of the army’s networks and defensive mechanisms.
◾◾ Detection: theories and models that relate properties and capabilities of cyber
threat detection and recognition to properties of malicious activity.
◾◾ Agility: theories and models to support planning and control of cyber maneu-
vers in network characteristics and topologies.
◾◾ Human dimensions: theoretical understanding of the socio-cognitive factors
that impact the decision making of the user, defender, and adversary.6
The U.S. Marines Corps IT strategy focuses on quality assurance and the abil-
ity to deploy IT support where and when it is needed. Cyberspace transcends both
the physical domain and the information environment and thus the entire IT
structure exists within cyberspace. The Marine Corps Cyberspace Concept calls for
improved capabilities to operate within this domain:
U.S. Military Cybersecurity Research and Deployment ◾ 109
◾◾ The ability to operate in the cyber domain with the same skill as on land,
sea, or air is critical to the Marine Corps’ future operational success. Without
mastery of computerized technology, many weapon and C2 systems will not
work.
◾◾ Intelligence, surveillance, and reconnaissance will be ineffective; and sensi-
tive information will be at risk of compromise. Adversaries recognize that
much of the United States’ economic and military dominance is heavily tied
to technology, communications, and automated systems that are enabled by
cyberspace and they constantly seek to get a competitive advantage within
this domain.
The strategy recognizes that intelligence helps the commander assess the stra-
tegic environment by providing tailored products and assessments that improve
awareness, understanding, and decision making. Within cyberspace, intelligence
regarding the cyber threat to IT components is of strategic consequence. Thus, the
Marine Corps must leverage superior intelligence to forecast threats and rapidly
mitigate and counter their effect on the enterprise. In addition, the Marine Corps
must ensure intelligence is produced and used holistically to enhance our ability
to conduct CSO. Cyberspace intelligence must ensure a shared awareness of net-
work health, network vulnerabilities, and emerging or imminent network threats.
In addition, cyberspace intelligence must incorporate and use tactical computer
forensics to ensure a more complete picture of the threat environment. The employ-
ment of cyber capabilities purpose is to achieve objectives in or through cyberspace.
Such operations include computer network operations and activities to operate and
defend the Global Information Grid (GIG).7
Marine Corps Systems Command is tackling cyber acquisition head-on with
enhanced oversight and governance, and new streamlined processes to better
respond to the needs of the force. The command’s cyber acquisition experts are
working with the Marine Corps Cyber Task Force as it creates courses of action to
address manpower, organizational, acquisition, and other challenges for CSO. This
update to the Corps’ approach to cyber warfare is in response to the Commandant’s
vision to modernize offensive and defensive cyber operations (DCO) in a volatile
and complex operating environment. Established in 2015, the Cyber Acquisition
Team (CAT) is tasked with developing a rapid cyber acquisition process to address
urgent and emergency cyber requirements.
The CAT will lead acquisition and fielding efforts for emergency requirements
(<30 calendar days from statement of need to fielding) and assist program manage-
ment offices, as needed, with urgent cyber requirements (30 to 180 calendar days
from statement of need to fielding).
The end goal is to provide speed to the Corps’ cyber warfighting capability
while maintaining the discipline necessary for a unified, standardized, and con-
figuration-controlled Marine Corps Enterprise Network. These improvements will
provide more responsive and effective support to the operational force.8
110 ◾ Threat Level Red
A discussion and description of the various DoD and service branch organiza-
tion and unit functionality can go on for weeks. The focus here is to provide enough
background on the DoD units to provide a context for the cybersecurity research
the U.S. military is pursuing.
The DoD Multidisciplinary University Research Initiative (MURI), one ele-
ment of the University Research Initiative (URI), is sponsored by the DoD research
offices. Those offices include the ONR, the Army Research Office (ARO), and the
Air Force Office of Scientific Research (AFOSR) (collectively referred to as DoD
agencies).
DOD’s MURI program addresses high-risk basic research and attempts to
understand or achieve something that has never been done before. The program
was initiated more than 25 years ago and it has regularly produced significant sci-
entific breakthroughs with far reaching consequences to the fields of science, eco-
nomic growth, and revolutionary new military technologies. Key to the program’s
success is the close management of the MURI projects by service program officers
and their active role in providing research guidance.9
The following sections will cover samples of actual BAA Other Transaction
(OT) Agreements, and Sources Sought Notices related to cybersecurity that have
been issued by DoD component organizations.
It is anticipated that awards under this topic will be no more than an average
of $1.25M per year for five years, supporting no more than six funded faculty
researchers. Exceptions warranted by specific proposal approaches should be dis-
cussed with the topic chief during the white paper phase of the solicitation.9
112 ◾ Threat Level Red
The HII technology area has also been described as human–machine interac-
tion and human–computer interaction (HCI). The focus of this area is the inter-
action of humans and information (machines/agents) for decision making. R&D
goals are to apply fundamental principles of HII across domains, including com-
plex information systems, human–agent teams, cybersecurity, communication,
and organizational social networks. Concepts will be pursued to provide situation
understanding and relevant actionable information to users at the point of need by
engaging the greater HII community. HII R&D prototype projects could be in the
following areas:
◾◾ Naturalistic and mixed reality human interfaces developed through the use
of balanced bidirectional human–human and human–agent communica-
tions and decision-making approaches. Prototype projects in tool and model
development to transition deep insights into human states and intentions and
how hybrid interface concepts join the strengths of naturalistic and mixed
reality interface concepts.
◾◾ Joint human–agent decision making developed through effective teaming of
human and autonomous, intelligent agents. This area will develop tools and
model human and autonomous agents in order to accentuate strengths and
mitigate weaknesses and enable heterogeneous teams to make decisions faster
and more effectively than homogeneous teams.
◾◾ Context-aware analytics and resource management addressed through the
development of models that deliver actionable information to the point of
need and allow enhanced decision making.
6.7 Summary
Each military branch has developed cybersecurity goals and strategies which help
to guide the type of research which is conducted internally or for which contracts
are initiated with research partners. The BAA, OT Agreements, and Sources
Sought Notices reviewed in this chapter are examples of how the DoD approaches
the cybersecurity process. Significant aspects of the DoD cybersecurity research
efforts include
Key Terms
cross-community research: is research than serves several related organizations by
employing expertise from government agencies, private companies, and aca-
demic institutions that can provide complementary knowledge and skills
experimental infrastructure: is the established ability to conduct experimental
cutting edge research on extraordinary and previously unexplored areas
of S&T
Global Information Grid (GIG): is the communications system necessary to
accomplish mission and theater superiority anywhere in the world as and
when needed
infrastructure reinforcement: is the physical and logical technological and human
capability required to create and maintain the necessary organizational
ability and resources to meet mission needs
innovation ecosystem: multidisciplinary research is intrinsic and is driven by
military or industrial needs. Disciplines are brought into the innovation
ecosystem from many types of universities, national laboratories, private
industry, and military laboratories to perform rapid, efficient innovation
that could have a transformative economic impact on an industry or sector
research ecosystems: research capabilities and resources are brought into a research
ecosystem from many types of universities, national laboratories, private
industry, and military laboratories to perform complex and effective
research with each organization contributing their specific e xpertise and
organizational capabilities
strategic environment: the environment that military branches must be capable of
establishing, maintaining, and adapting in order to achieve the mission at hand
trustable foundation in cyberspace: is a basic underlying structure that is
reliable, defensible, and available when and where needed to protect
national and economic security
References
1. The Networking and Information Technology Research and Development
Program. Report on Implementing Federal Cybersecurity Research and Development
Strategy. Retrieved November 11, 2016, https://www.nitrd.gov/PUBS/
ImplFedCybersecurityRDStrategy-June2014.pdf
2. Office of the Secretary of Defense. Cybersecurity Operational Test and Evaluation
Priorities and Improvements. July 27, 2016. Retrieved November 21, 2016, http://
www.dote.osd.mil/pub/policies/2016/20160727_Cybersec_OTE_Priorities_and_
Improvements(11093).pdf
3. Air Force Cyber Command. Air Force Cyber Command Strategic Vision. February
2008. Retrieved November 22, 2016, www.dtic.mil/cgi-bin/GetTRDoc?AD=
ADA479060
U.S. Military Cybersecurity Research and Deployment ◾ 119
4. U.S. Fleet Cyber Command, U.S. Tenth Fleet. Strategic Plan 2015 to 2020. Retrieved
November 22, 2016, www.navy.mil/strategic/FCC-C10F%20Strategic%20Plan%20
2015-2020.pdf
5. U.S. Army Cyber Command and Second Army. Retrieved November 22, 2016,
http://www.arcyber.army.mil/Pages/ArcyberHome.aspx
6. U.S. Army Research Laboratory. Cyber Security Research Focus. February 2014.
Retrieved November 23, 2016, www.arl.army.mil/www/pages/1417/03.Cyber.CRA.
overview_2014_02_18%20Swami_final.pdf
7. Marine Corps Information Enterprise (MICENT) Strategy. December 2010. Retrieved
November 23, 2016, http://www.hqmc.marines.mil/Portals/156/Newsfeeds/SV%20
Documents/Marine_Corps_Information_Enterprise_Strategy%20(MCIENT)%20
V1.0.pdf
8. Marine Corps rolls out tailored cyber acquisition strategy. By Emily Greene,
MCSC Office of Public Affairs and Communication Marine Corps Systems
Command, March 10, 2016. Retrieved November 23, 2016, http://www.
marcorsyscom.marines.mil/News/Press-Release-Article-Display/Article/690480/
marine-corps-rolls-out-tailored-cyber-acquisition-strategy/
9. U.S. Army Research Office. W911NF-07-R-0003-04; BAA for Basic and Applied
Research Multidisciplinary University Research Initiative (MURI). Retrieved November
23, 2016, http://www.arl.army.mil/www/pages/8/2017%20MURI%20FOA%20
FINAL.pdf
10. Office of Naval Research. Long Range Broad Agency Announcement (BAA) for Navy and
Marine Corps Science and Technology. ONR BAA Announcement #N00014-17-S-B001.
11. U.S. Army Contracting Command. Request for Information (RFI): Seeking Information
from Those interested in Partnering with the Army Research Laboratory in the Areas of
Human Information Interaction, Cybersecurity, and Electromagnetic Spectrum through
an Other Transaction (OT) Agreement. Solicitation Number: W911NF-16-R-0037.
September 30, 2016. Retrieved November 23, 2016, https://www.fbo.gov/index?s
=opportunity&mode=form&id=9d0f3a4fa33589255b19a2cf8b9034d7&tab=c
ore&_cview=0
12. U.S. Department of the Army. Sources Sought Synopsis: Defensive Cyber Operations
(DCO) Research and Supporting Elements. Solicitation Number: W911QX-17-R-0006.
November 14, 2016. Retrieved November 25, 2016, https://www.fbo.gov/index?s
=opportunity&mode=form&id=6b03b64d275d7358e47ce89b9577b740&tab=c
ore&_cview=1
Chapter 7
The National
Security Agency
The National Security Agency (NSA) has several research efforts exploring the Tailored
Trustworthy Spaces theme, including exploration of risk through behavioral analyt-
ics and large-scale data analysis, a novel means to detect modifications to comput-
ing systems and network analytics, and efforts to customize system controls. NSA is
also exploring Moving Target technologies. By conducting a full scope analysis of the
Moving Target problem and solution space, NSA plans to develop movement proto-
types and evaluate several critical enabling functions. In partnership with the DoD,
the agency produced a survey of current Moving Target techniques, thereby enabling
a cost-benefit analysis that will take into account different approaches and technolo-
gies, the potential impact Moving Target protections may have on mission operations,
the costs and overheads associated with implementation, and the overall effectiveness
of the movement response. In addition, NSA is supporting activities that foster an
interdisciplinary collaborative community around the SoS, including a virtual organi-
zation and four university-based multidisciplinary research centers. The nature of NSA
is such that most things will happen in secret. However, NSA does do considerable
unclassified cybersecurity research which is applied in the development of advisories,
guidance, and standards. Selected areas of NSA research are covered in this chapter.
121
122 ◾ Threat Level Red
The SoS initiative, together with academia, industry, and other government
partners is making a strong effort to create a research community dedicated to
building security science. NSA seeks to discover formal underpinnings for the
design of trusted systems which include contributions from the disciplines of
computer science, mathematics, behavioral science, economics, and physics. The
research work addresses both the establishment of pieces of security science as well
as how security science is created.
The NSA position is that the creation of a security science is seen as an evolving
long-term research endeavor. It is not assumed that a holistic body of knowledge
that scientifically addresses all aspects of security: economics, behavioral science,
computer science, physics, etc. will be successful. There is not one assured path that
will create security science. It will require building both the theory of how to create
the science and specific artifacts of security science work. The infancy of this work
will be directed at experiments seeking to explore methods to create possible pieces
that enable this science, as well as creating a large collaborating community lever-
aging the cutting-edge research necessary to push new bounds in security. Some of
NSA’s efforts in the area of security science are
◾◾ The SoS virtual organization provides a focal point for security science-related
work as well as a collaborative environment the community can use to further
advance security science.
◾◾ Research Lablets stimulates basic research to create scientific underpinnings for
security; advocates for scientific rigor in security research; creates and broadens
a SoS community and culture in the IC; and identifies hard problems in secu-
rity that require science as a community focus and measurement of progress.
◾◾ The best scientific cybersecurity paper competition offers a yearly award that
highlights papers which display scientific rigor in the multidisciplined area of
security research.
◾◾ The Intel International Science and Engineering Fair award sponsors an
award in cybersecurity recognizing the need for scientific measures in cyber-
security, and takes place annually.
and techniques which will secure future information systems. The major areas of
areas of NSA research are Security Enhanced Linux, IA, Mathematical Sciences,
Computer and Analytic Sciences, and Technology Transfer.3
Built upon a foundation of five decades of experience designing methods to
fight against threats, the IA Lab’s extensive in-house research program covers a
wide range of areas. These include cryptographic algorithms to photonics, from
operating systems like SELinux to advanced intrusion detection tools. The experi-
ence of the NSA workforce has close and creative partnerships in high-technology-
with industry, academia, government, and with colleagues scattered around the
globe. The Trusted Systems Research Group conducts in-house research in the fol-
lowing focus areas:
◾◾ Cryptography
◾◾ Cryptographic infrastructure and standards
◾◾ High-confidence software and systems (HCSS)
◾◾ Authentication
◾◾ High-speed security solutions
◾◾ Secure wireless multimedia
◾◾ Technical security
◾◾ Attack, sensing, warning, and response
◾◾ Research integration
◾◾ Trusted computing3
The NSA TTP facilitates a variety of partnerships through the following agree-
ment vehicles:
◾◾ PLA Title 35 USC, Sections 207 to 209, gives NSA the authority to grant
licenses on its domestic and foreign patents and patent applications. This
authority is implemented through PLAs. The goal of these licenses is to
provide the private sector with the opportunity to commercially develop
federally funded research to promote economic growth and global
competitiveness.
◾◾ CRADA is one of the most valuable technology transfer mechanisms for
obtaining long-term value. Title 15 USC, Section 3710, gives NSA the
authority to enter into CRADAs to foster collaborative relationships with
industry, local and state governments, and academia to obtain valuable tech-
nology transfer goals and benefits.
◾◾ EPA formalizes the relationship between a federal lab and an educational
institution. Title 10 USC, Section 2194, allows NSA to share its unique expe-
rience by providing training to personnel in the science and technology fields
at all education levels using EPAs.
◾◾ TTSA protects NSA’s right to seek commercialization of technologies it owns
and to effectively track the transfer of these technologies.
◾◾ Open Source Software Releases (OSS) is a collaborative model for technol-
ogy transfer, inviting cooperative development of technology and encourag-
ing broad use and adoption. The public can benefit by adopting the code,
enhancing it, adapting it, or taking it into the commercial marketplace. The
government can gain from the open source community’s shared enhance-
ments and advances.5
The Next Wave: Building a science of cybersecurity: The next move. Volume 21
Number 1 2015 covered resilient and secure CPSs, improving power grid cyberse-
curity, analyzing the cost of securing control systems as well as build it, break it, fix
it: competing to build secure systems and the social engineering behind phishing.6
NSA research papers and technical reports include
knowledge units. Schools may also elect to map their curricula to specialized focus
areas. CAE-CD institutions receive formal recognition from the U.S. government
as well as opportunities for prestige and publicity for their role in securing impor-
tant information systems. Designation as a center does not carry a commitment of
funding from NSA or DHS. Funding opportunities may become available periodi-
cally from other sources such as the NSF.
The initial National CAE in Information Assurance Education (CAE-IAE)
program was started by NSA in 1998, with DHS joining as a partner in 2004.
The CAE in IA Research component was added in 2008 to encourage universities
and students to pursue higher-level doctoral research in cybersecurity. In 2010,
the CAE2Y component was established to afford two-year institutions, techni-
cal schools, and government training centers the opportunity to receive such
designation.
Complimentary in nature, the CAE-Cyber Operations program focuses on
technologies and techniques related to specialized cyber operations (e.g., collection,
exploitation, and response) to enhance the national security posture.8 A current list
of designated centers is available at https://www.iad.gov/nietp/reports/current_cae_
designated_institutions.cfm
7.7 Summary
NSA has several research efforts exploring the Tailored Trustworthy Spaces theme,
including exploration of risk through behavioral analytics and large-scale data
analysis, novel means to detect modifications to computing systems and network
analytics, and efforts to customize system controls. Areas of NSA research include
Security Enhanced Linux, IA, Mathematical Sciences, and Computer and Analytic
Sciences. NSA also supports an active technology transfer program. Recent NSA
research activity includes
◾◾ NSA IA experts conduct and sponsor research in the technologies and tech-
niques which will secure future information systems.
◾◾ NSA and DHS jointly sponsor the National CAE-CD program which is
designed to reduce vulnerability in the national information infrastructure
by promoting higher education and research in cyber defense and producing
professionals with cyber defense expertise.
◾◾ What experience have seminar participants had with the NSA technology
transfer program? What are participant’s opinions on the technology transfer
program?
◾◾ What experience have seminar participants had with NSA guidance and
advisory publications? What are participant’s opinions on the publications?
◾◾ What areas of NSA cybersecurity research do seminar participants think are
the most important? Why?
Key Terms
capability package: identifies critical architectural components, while describ-
ing the role each component plays in protecting data and also identifies
approved CSfC products
policy-governed secure collaboration: is the process of providing a collabora-
tive platform, normative requirements, and standard policies for han-
dling data with differing usage needs and among users in different
authority domains
science of security (SoS): is science that is needed to mature the broad range
of cybersecurity disciplines necessary to establish a foundation to achieve
advances in cyber defense
security-metrics: are the necessary standardized measures that are rigorously
tested and universally applied to evaluation, design, development, and
deployment so security solutions
References
1. U.S. National Security Agency. Science of Security. June 21, 2016. Retrieved November
28, 2016, https://www.nsa.gov/what-we-do/research/science-of-security/index.shtml
2. This Science of Security Virtual Organization. About Science. June 21, 2016.
Retrieved November 28, 2016, http://cps-vo.org/group/SoS/about
130 ◾ Threat Level Red
3. U.S. National Security Agency. Research. May 3, 2016. Retrieved November 28,
2016, https://www.nsa.gov/what-we-do/research/ia-research/
4. U.S. National Security Agency. Information for IT Decision Makers, Staff, and
Software/Hardware Developers. Retrieved November 28, 2016, https://www.iad.gov/
iad/help/faq/information-for-it-professionals.cfm
5. NSA Office of Research and Technology Applications Technology Transfer
Program. November 18, 2016. Retrieved November 28, 2016, https://www.nsa.gov/
what-we-do/research/technology-transfer/
6. The Next Wave Building a science of cybersecurity: The next move. Vol. 21 No. 1
2015. Retrieved November 28, 2016, https://www.nsa.gov/resources/everyone/digital-
media-center/publications/the-next-wave/index.shtml
7. U.S. National Security Agency. Research Papers & Technical Reports. May 3,
2016. Retrieved November 28, 2016, https://www.nsa.gov/resources/everyone/
digital-media-center/publications/research-papers/
8. U.S. National Security Agency. National Centers of Academic Excellence in Cyber
Defense. May 3, 2016. Retrieved November 28, 2016, https://www.nsa.gov/resources/
educators/centers-academic-excellence/cyber-defense/
Chapter 8
131
132 ◾ Threat Level Red
◾◾ Initiate and support, through grants and contracts, scientific and engineer-
ing research and programs to strengthen scientific and engineering research
potential, and education programs at all levels, and appraise the impact of
research upon industrial development and general welfare.
◾◾ Award graduate fellowships in the sciences and in engineering.
◾◾ Foster the interchange of scientific information among scientists and engi-
neers in the United States and foreign countries.
◾◾ Foster and support the development and use of computers and other scien-
tific methods and technologies, primarily for research and education in the
sciences.
◾◾ Evaluate the status and needs of the various sciences and engineering and take
into consideration the results of this evaluation in correlating our research
and educational programs with other federal and nonfederal programs.
◾◾ Provide a central clearinghouse for the collection, interpretation, and analysis
of data on scientific and technical resources in the United States, and provide
a source of information for policy formulation by other federal agencies.
◾◾ Determine the total amount of federal money received by universities and
appropriate organizations for the conduct of scientific and engineering
The National Science Foundation ◾ 133
That round of awards also included 11 grants with a particular focus on address-
ing cybersecurity educational and workforce development needs. These included
the creation of new training and education programs and the development of effec-
tive cybersecurity pedagogy. Among the projects in this track were cybersecurity
training for workers in hospitals, virtual environments in which students can exper-
iment with and learn about cybersecurity practices, and competitions and chal-
lenges to enhance and broaden cybersecurity education.
Because many aspects of cybersecurity can be implemented by industry, the
program supports both a Secure, Trustworthy, Assured and Resilient Semiconductors
and Systems (STARSS) perspective focused on hardware research in partnership
with the Semiconductor Research Corporation (SRC), and a Transition to Practice
(TTP) track focused exclusively on transitioning existing research into practice.3
The goals of the SaTC program are aligned with the Federal Cybersecurity
RDSP and the National Privacy Research Strategy (NPRS) to protect and preserve
the growing social and economic benefits of cyber systems while ensuring security
and privacy. The RDSP identified six areas critical to successful cybersecurity R&D:
◾◾ Scientific foundations
◾◾ Risk management
◾◾ Human aspects
◾◾ Transitioning successful research into practice
◾◾ Workforce development
◾◾ Enhancing the research infrastructure
The NPRS, which complements the RDSP, identifies a framework for privacy
research, anchored in characterizing privacy expectations, understanding privacy
violations, engineering privacy-protecting systems, and recovering from privacy
violations. In alignment with the objectives of both strategic plans, the SaTC pro-
gram takes an interdisciplinary, comprehensive, and holistic approach to cyber-
security research, development, and education, and encourages the transition of
promising research ideas into practice.4
NSF operates no laboratories itself but does support National Research Centers,
user facilities, certain oceanographic vessels, and Antarctic research stations. NSF
also supports cooperative research between universities and industry, U.S. partici-
pation in international scientific and engineering efforts, and educational activities
at every academic level.5
Through its merit review process, NSF ensures that proposals submitted are
reviewed in a fair, competitive, transparent, and in-depth manner. The merit review
process is described in detail in Part I of the NSF Proposal and Award Policies and
Procedures Guide (PAPPG): the Grant Proposal Guide (GPG). The GPG provides
guidance for the preparation and submission of proposals to NSF.5 Several recent
research awards are briefly described below.
Security as an Everyday Practical Concern explores how people resolve the
tension between these two realities and the practices that people have adopted to
balance competing demands upon them. The goal is to understand how people
manage security online, in two ways. The first is in the sense of engaging in techni-
cal fixes for potential problems and the second is how they come to terms with the
potential risks and develop strategies, accommodations, and justifications for par-
ticular ways of working online. Using techniques from anthropology and sociology,
this project sets out to understand online security as part of people’s everyday lives.
The research will have two major outcomes. The first is to document the conditions
of contemporary digital life, as a contribution to ongoing studies of the impact of
digital technology. The second is to provide the basis on which new technologies
can more adequately protect people’s privacy and security online, and more easily
integrate with people’s online and offline practices.6
Online Safety for the Ages (OSA): Generational Differences in Motivations to
Use Security Protections in an online banking context examines generational dif-
ferences in motivations to use risky online services and self-protective measures in
the context of online banking. An influx of older adults attracted to the Internet by
social media but at times unfamiliar with dealing with the hazards of online life, as
well as younger users who are sometimes oblivious to those dangers, pose distinct
challenges to the preservation of online safety. A partnership with the Michigan
State University Federal Credit Union provides access to both users and nonusers
of online banking services of various ages to explore these issues. OSA will work
from group interviews and observations of users in their homes to understand the
risks that ordinary users perceive when attempting to use online banking, how
they cope with risks currently, and the gaps that they see in their own abilities
to bank safely online. In-depth analysis of surveys administered to credit union
customers will reveal the factors that drive and the barriers that prevent the adop-
tion of online banking and online consumer safety measures. OSA will contribute
new knowledge about how to motivate average users to play their part in making
the Internet safer for their own use. The project focuses on a vulnerable group of
older Americans whose lives can be improved through secure access to financial
services. Older Americans, however, are also vulnerable to online scammers and
136 ◾ Threat Level Red
are too often uninformed about online dangers and inexperienced with effective
protections.7
The Building Public Cyber Health: Designing and Testing the Efficacy
of a School-Focused, Gamification Approach to Create a Secure Computing
Environment project was designed to examine the use of online incentives as an
effective tool for enhancing an individual’s engagement with a task. This project
explores the use of online incentives and social networking to improve an organiza-
tion’s cyber health by coalescing the micro cyber behaviors of individuals within the
organization to create a more secure computing environment. Schools represent an
ideal setting in which to test such a new model for cybersecurity. Teachers, faculty,
and parents are motivated to keep students safe and secure. This project approaches
the school as a system in which cybersecurity is improved and maintained through
the use of digitally mediated interventions that combine online psychological incen-
tives for student engagement and social networking to reinforce social and author-
ity figure influences. In short, the project broadly aims to build cybersecurity in
by engaging multiple stakeholders to help build a more robust public cyber health
system. The effectiveness of incentives in building collective cybersecurity aware-
ness and reinforcing positive cyber behaviors is being explored through intervention
experiments that are implemented in the following three student populations:
◾◾ Elementary school students who are being exposed to supervised use of digi-
tal devices, both in a school environment and at home, for the first time
◾◾ Middle school students who are experimental users of digital devices and
have limited awareness of cybersecurity concepts
◾◾ College students who have been shown to demonstrate risky cyber behaviors
that often put them and other university stakeholders at risk
at-risk groups are being targeted in the study with two of the student populations
participating providing unique challenges to the research as well as unique rewards
if the research is successful. The elementary school population will be drawn from
a charter school composed exclusively of minority youth in North Carolina that
face significant social, economic, and educational challenges. The middle school
partner, located in rural, economically challenged eastern North Carolina, is strug-
gling to provide the technical skills that its students need to succeed in the wider
global economy.8
The Pocket Security Smartphone Cybercrime in the Wild project is a significant
study because most of the world’s internet access occurs through mobile devices such
as smart phones and tablets. While these devices are convenient, they also enable
crimes that intersect the physical world and cyberspace. For example, a thief who
steals a smartphone can gain access to a person’s sensitive email, or someone using a
banking app on the train may reveal account numbers to someone looking over her
shoulder. This research will study how, when, and where people use smartphones
and the relationship between these usage patterns and the likelihood of being a
victim of cybercrime. This research is the first step to a better scientific understand-
ing how the physical world surrounding smartphone use enables cybercrime. Tired
users may be less cautious in browsing to unsafe websites, or distracted users may
miss a critical pop-up that a virus has been detected. This research collects sensor
data from the smartphones of 160 volunteers such as GPS location, call frequency,
and app usage. The smartphone sensor data are combined with questionnaires,
demographic data from the U.S. Census, and neighborhood condition data from
Google Street view. This research also provides a baseline of smartphone security
threats stemming from behavioral and social factors, and applies new methods for
social science research using mobile sensor data to unobtrusively observe the daily
activities of subjects.9
The Value-Function Handoffs in Human–Machine Compositions that are
under Design for the IoT project is an interdisciplinary effort that brings together
social scientists, computer scientists, engineers, and designers to engage in a col-
laborative research project. The goal of the project is to obtain a better understand-
ing of value handoffs in complex systems that involve interconnected social and
technological agents. The social agents may include humans and organizations, the
technological agents may include devices and infrastructures. An example of such
a system is the Internet, a global communication network that allows almost all
users of computers worldwide to connect and exchange information. When there
are interactions between agents in such systems, there is a handoff of functions.
With regard to the Internet, one such function is the preservation of information
content; that handoff involves others that represent specific values such as reliability
and trustworthiness. This project focuses on the IoT, an extension of the Internet
to include physical devices (such as vehicles, buildings, and sensing devices) that
are monitored and controlled remotely across that network. The research team will
develop three case studies in this broader domain: bio-sensing, smart homes, and
138 ◾ Threat Level Red
visual data processing. The research team has developed a preliminary model for
value handoffs. In each of the three case studies, they will collaborate with an iden-
tified technical researcher to use the model to shape the technology, and to gain
insights from the technology to refine their model. The version of the model that
results from numerous feedback processes that are to occur through the sequence
of cases is expected to be applicable to a broad range of socio-technical systems. The
results of this project will serve to meet an urgent need to foster rigorous thinking
about humans and machines in relation to one another, to making things work
well across society, in concert with human need, and in service of societal values.
Among the values potentially under consideration in this project are security, pri-
vacy, trustworthiness, accountability, transparency, autonomy, intellectual prop-
erty, freedoms of speech and association, justice, and fairness. Failures to protect
value handoffs are likely to pose barriers to technical adoption, and to impose bur-
dens on the least privileged in society. This indicates that models to guide decisions
about value handoffs are likely to be of critical importance.10
The Technological Con-Artistry: An Analysis of Social Engineering study
focuses on one of the most serious threats in the world today to the security of
cyberspace which is social engineering. The social engineering process is used to
get people with access to critical information regarding information systems secu-
rity to surrender such information to unauthorized persons, thereby allowing them
access to otherwise secure systems. This research will examine who social engineers
are, why they engage in social engineering, the processes they use to conceive of
and implement social engineering projects, and how they view information pri-
vacy and security and justify their behavior. Further, to understand how organiza-
tions affected by social engineering cope with the threat it poses, this research also
examines the perspectives on social engineering of IT professionals who oversee
organizational computer systems and the security of potentially sensitive infor-
mation. This study uses a cross-sectional, non-experimental research design that
employs both qualitative and quantitative data. The qualitative component involves
semi-structured interviews of social engineers in the wild, security auditors, and
IT professionals. Open-ended interview questions will be used to elicit this data.
In addition, these interviews will be used to gather quantitative data to measure
demographics, computer use, and other social characteristics of social engineers. A
set of structured survey questions will be administered by the interviewer as part of
the interview process.11
Understanding the Cyber Attackers and Attacks via Social Media Analytics is
a study of cyber attacker communities designed to learn more about cyber attacker
behaviors, emerging threats, and the cybercriminal supply chain. Many cyber
attacker communities take careful measures to hide themselves by employing anti-
crawling measures. For these reasons, research studying hacker communities is
needed, as well as research that advances the capacity to understand and investigate
content from such communities. Specifically, the development of automated tools
and analyses increases the potential for more cybersecurity research. Web mining
The National Science Foundation ◾ 139
and machine learning technologies can be used in tandem with social science meth-
odologies to help answer many questions related to hacker behaviors and culture,
illegal markets and covert networks, cybercriminal supply chain, malware analysis,
emerging security threats, and other matters. In this research, important questions
about hacker behaviors, markets, community structure, community contents, arti-
facts, and cultural differences are explored. Automated techniques to collect and
analyze data from forums, Internet Relay Chat, and honeypots will be developed.
Better understanding of hacker communities across multiple geopolitical regions
will support a better understanding of cybercriminal behavior and improved and
safer practices for security researchers and practitioners. Knowing more about
cyber criminals, hackers, and their illegal black markets can help policy makers
and security professionals make better decisions about how to prevent or respond
to attacks.12
Brain Hacking: Assessing Psychological and Computational Vulnerabilities in
Brain-based Biometrics evaluates the strengths and weaknesses of brain biomet-
rics. Brain biometrics are more difficult to steal than fingerprints, since the current
technology for collecting brain biometrics is impossible to use without a person’s
knowledge and consent. Brain biometrics, importantly, can also be cancelled if
stolen. This is because there are vast networks of the brain that generate unique
activity, meaning that if a person’s brainprint is stolen, they can generate a new one
by tapping into a different brain network. This investigation holds the potential
to transform existing authentication systems into more secure and attack-resistant
brain biometric solutions; critical for high-security applications. Brain biometrics
has recently been shown to be 100% accurate in identifying people, in a pool of
50 users and across a period of up to a year. This research project will systemati-
cally evaluate the potential vulnerabilities of brainprint biometrics, with the goals
of demonstrating the resistance and robustness of brainprints to the most likely
attacks and developing a comprehensive protection plan addressed at the most vul-
nerable aspects of this method. In particular, the interdisciplinary team plans to
investigate psychological and computational attacks. Psychological attacks consist
of attempting to force a user to provide their brainprints under duress, or attempt-
ing to impersonate a target brainprint through a biofeedback entrainment process.
Computational attacks consist of attempting to circumvent brainprint authentica-
tion system through presenting a counterfeit or stolen brainprint, with varying lev-
els of obfuscation, such as the addition of noise, and attacking the stimuli database.
This project will examine potential vulnerabilities in brain biometrics at an unprec-
edented level of detail, and convert the resulting knowledge into recommendations
for the implementation of brain biometrics to guard an increasingly vulnerable
cyberspace.13
A Socio-Technical Approach to Privacy in a Camera-Rich World is a project is
designed to gain a deeper understanding of the privacy implications of camera tech-
nologies from both a social and a technical perspective. Cameras are now pervasive on
consumer devices, including smartphones, laptops, tablets, and new wearable devices
140 ◾ Threat Level Red
like Google Glass and the Narrative Clip life logging camera. The ubiquity of these
cameras will soon create a new era of visual sensing applications, for example, devices
that collect photos and videos of our daily lives, augmented reality applications that
help us understand and navigate the world around us, and community-oriented appli-
cations, for example, where cameras close to a crisis are tasked with obtaining a real-
time million-eye view of the scene to guide first responders in an emergency. These
technologies raise significant implications for individuals and society, including both
potential benefits for individuals and communities, but also significant hazards includ-
ing privacy invasion for individuals, and, if unchecked, for society, as surveillance
causes a chilling effect in the public square. The proposed research has the potential
for profound and positive societal impact by laying a foundation for p rivacy-sensitive
visual sensing techniques for a society where cameras are ubiquitous.14
Security and Privacy for Wearable and Continuous Sensing Platforms is a
research project focused on security and privacy for wearable devices. This includes
how to empower users and enable them to control how apps on wearable devices
can access audio and video resources, how to use privilege separation and the least-
privilege principle to mitigate risks associated with third-party applications that run
on wearable devices, how operating systems for wearable devices can be architected
to prevent applications from collecting extraneous data, and new threats from wear-
able computing and how each of these threats could be countered with secure plat-
form designs. Wearable computing is poised to become widely deployed throughout
society. These devices offer many benefits to end users in terms of real-time access to
information and the augmentation of human memory, but are also likely to introduce
new and complex privacy and security problems. To protect privacy, the researchers
are conducting user studies to improve the understanding of what data users find
most sensitive; the findings from these user studies is helping the researchers design
techniques to prevent applications from accessing sensitive data inappropriately.15
Knowing Your Enemy: Understanding and Counteracting Web Malvertising
research endeavors to gain a holistic, in-depth understanding about the scope and
magnitude of malicious display, search and contextual advertising, features of their
infrastructures and ad content, behavior of malicious ad-related parties, and eco-
nomics of this underground business. With the Internet becoming the dominant
channel for marketing and promotion, online advertisements (ad for short) are also
increasingly used for propagating malware, committing scams, click frauds, and
other illegal activities. These activities, which we call malvertising, systematically
deliver malicious ad content and victimize visitors through an infrastructure, which
includes malicious advertisers, ad networks, redirection servers, exploit servers, and
others. Our preliminary study shows that most of such malvertising activities are
missed by popular detection services such as Google Safe Browsing and Microsoft
Forefront. This points to a disturbing lack of understanding of such web malvertis-
ing activities, which renders existing countermeasures less effective, and an urgent
need to study the features of this threat to better prepares us to defend against it.16
The National Science Foundation ◾ 141
8.4 Summary
NSF invests in cybersecurity research through several programs. A major program
in cybersecurity is spearheaded by the NSF Directorate of CISE, in collabora-
tion with the Directorates of EHR, Engineering (ENG), MPS, and SBE Sciences.
Another major program is CyberCorps SFS led by the EHR Directorate.1 NSF
cybersecurity research activities include
◾◾ NSF awarded $160 million in cybersecurity research and education across the
agency in FY 2015 including grants through the NSF SaTC program.
◾◾ The RDSP identified six areas critical to successful cybersecurity R&D: (1)
scientific foundations; (2) risk management; (3) human aspects; (4) transi-
tioning successful research into practice; (5) workforce development; and (6)
enhancing the research infrastructure.
◾◾ NSF receives approximately 40,000 proposals each year for research, educa-
tion, and training projects, of which approximately 11,000 are funded. In
addition, NSF receives several thousand applications for graduate and post-
doctoral fellowships.
◾◾ The wide variety of NSF-funded cybersecurity research will impact all aspects
of cybersecurity and the social and business use of the Internet.
◾◾ Research such as Brain Hacking: Assessing Psychological and Computational
Vulnerabilities in Brain-based Biometrics that evaluates the strengths and
weaknesses of brain biometrics can help set the foundation for a new area of
biometrics to open in the future.
◾◾ Projects like The Technological Con-Artistry: An Analysis of Social
Engineering will help security professionals and law enforcement officers gain
insight into cyberspace-based criminal enterprises and provide an advantage
when working to stop or investigate crime.
◾◾ What experience have seminar participants had working with NSF grants?
◾◾ What experience have seminar participants had with research organizations
that have worked with NSF cybersecurity programs or cybersecurity research
efforts?
◾◾ What areas of NSF cybersecurity research do seminar participants think are
the most important? Why?
◾◾ What areas of NSF cybersecurity research do seminar participants think are
the most relevant to the private sector? Why?
142 ◾ Threat Level Red
Key Terms
assured and resilient semiconductors: are semiconductors that are free of any
malicious code that can compromise cyber operations or cybersecurity
Bose–Einstein condensate: Eric A. Cornell of the NIST and Carl E. Wieman of
the University of Colorado at Boulder led a team of physicists at JILA, a
joint institute of NIST and CU-Boulder, in a research effort that culmi-
nated in 1995 with the creation of the world’s first Bose–Einstein conden-
sate—a new form of matter. Predicted in 1924 by Albert Einstein, who
built on the work of Satyendra Nath Bose, the condensation occurs when
individual atoms meld into a superatom behaving as a single entity at just
a few hundred billionths of a degree above absolute zero
censorship resistance: is the ability of a digital publishing tool to overcome the
capabilities of censors and the censorship resistance tools that research-
ers develop that can serve the needs of citizens who require them to
communicate
cryptocurrencies: are digital assets designed to work as a medium of exchange
using cryptography to secure transactions and to control the creation of
additional units of the currency
cyber health: is the state of the ability of cyber-human systems to be resilient in
the face of attacks, the level that the systems will not be compromised by
attacks or human error, and will provide access and availability as, when,
and where needed
malvertising: is the undisclosed and often unauthorized insertion of advertising
or misleading content in social media posts, webpage content, and email
messages
References
1. The Networking and Information Technology Research and Development
Program. Report on Implementing Federal Cybersecurity Research and Development
Strategy. Retrieved November 11, 2016, https://www.nitrd.gov/PUBS/
ImplFedCybersecurityRDStrategy-June2014.pdf
2. NSF. At a Glance. Retrieved November 28, 2016, https://www.nsf.gov/about/glance.jsp
3. NSF. Awards $74.5 Million to Support Interdisciplinary Cybersecurity Research.
October 7, 2015. Retrieved November 29, 2016, https://nsf.gov/news/news_summ.
jsp?cntn_id=136481&org=NSF&from=news
4. NSF. Secure and Trustworthy Cyberspace (SaTC). Retrieved November 29, 2016,
https://nsf.gov/funding/pgm_summ.jsp?pims_id=504709
5. NSF. About Funding.
6. NSF. Security as An Everyday Practical Concern. Award Abstract #1525861. August
21, 2015. Retrieved November 29, 2016, https://www.nsf.gov/awardsearch/
showAward?AWD_ID=1525861
The National Science Foundation ◾ 143
7. NSF. Safety for the Ages: Generational Differences in Motivations to Use Security
Protections in An Online Banking Context. Award Abstract 1318885. June
2, 2015. Retrieved November 29, 2016, https://www.nsf.gov/awardsearch/
showAward?AWD_ID=1318885
8. NSF. Building Public Cyber Health—Designing and Testing the Efficacy of a School-
Focused, Gamification Approach to Create a Secure Computing Environment. Award
Abstract #1319045. September 6, 2013. Retrieved November 29, 2016, https://www.
nsf.gov/awardsearch/showAward?AWD_ID=1319045
9. NSF. Pocket Security—Smartphone Cybercrime in the Wild. Award Abstract #
1619084. September 12, 2016. Retrieved November 29, 2016, https://www.nsf.gov/
awardsearch/showAward?AWD_ID=1619084
10. NSF. Value-Function Handoffs in Human–Machine Compositions That Are
under Design for the Internet of Things. Award Abstract # 1650589. September
13, 2016. Retrieved November 29, 2016, https://www.nsf.gov/awardsearch/
showAward?AWD_ID=1650589
11. NSF Technological Con-Artistry: An Analysis of Social Engineering. Award Abstract
#1616804. September 6, 2016. Retrieved November 29, 2016, https://www.nsf.gov/
awardsearch/showAward?AWD_ID=1616804
12. NSF Securing Cyber Space: Understanding the Cyber Attackers and Attacks via Social
Media Analytics. Award Abstract #1314631. March 4, 2016. Retrieved November 29,
2016, https://www.nsf.gov/awardsearch/showAward?AWD_ID=1314631
13. NS. Brain Hacking: Assessing Psychological and Computational Vulnerabilities in
Brain-Based Biometrics. Award Abstract #1564104. August 22, 2016. Retrieved
November 30, 2016, https://www.nsf.gov/awardsearch/showAward?AWD_ID=
1564104
14. NSF. A Socio-Technical Approach to Privacy in a Camera-Rich World. Award Abstract
#1408730. August 26, 2014. Retrieved November 30, 2016, https://www.nsf.gov/
awardsearch/showAward?AWD_ID=1408730
15. NSF. Security and Privacy for Wearable and Continuous Sensing Platforms. Award
Abstract #1513584. January 25, 2016. Retrieved November 30, 2016, https://www.
nsf.gov/awardsearch/showAward?AWD_ID=1513584
16. NSF. Knowing Your Enemy: Understanding and Counteracting Web Malvertising.
Award Abstract #1223477. August 16, 2012. Retrieved November 30, 2016, https://
www.nsf.gov/awardsearch/showAward?AWD_ID=1223477
Chapter 9
Federally Funded
Research and
Development Centers
145
146 ◾ Threat Level Red
The agencies that sponsor FFRDCs are subject to various laws and regula-
tions concerning the management and performance of their activities. These laws
and regulations guide the sponsors’ oversight activities and shape the relationship
between sponsors and the FFRDC contractors. Federal law caps the total allowable
compensation for certain contractor positions for which federal agencies may reim-
burse contractors. In addition, the FAR provides criteria for agencies and contrac-
tors to use to determine what costs may comprise the compensation charged to the
government. The FAR also describes characteristics of FFRDCs operated by con-
tract and includes requirements for their establishment, use, and review. Among
other things, the FAR encourages long-term relationships between the federal gov-
ernment and FFRDCs to provide continuity and to attract high-quality personnel
to the FFRDCs. Because FFRDCs are contractor operated, sponsoring agencies do
not directly determine pay or non-pay benefits for contractor employees.
The GAO studied the budgets of 30 FFRDCs sponsored by the DOE, DOD,
and NSF that received nearly $84 billion in total funding for FYs 2008 through
2012. Of these 30 centers, the 16 sponsored by the DOE received about 79% of
this funding according to GAO’s analysis of sponsoring agencies’ responses to a
GAO survey on FFRDC funding and compensation. During this time, the DOE
obligated about 34% of its budget to the FFRDCs it sponsored, and the DOD and
NSF devoted less than 1% and 4% of their budgets, respectively. FFRDCs spon-
sored by these agencies received approximately $15 billion of their total funding
from sources other than the sponsoring agency, specifically other federal agencies,
nonfederal entities such as state or local governments, and private entities.1
R&D laboratories fill voids where in-house and private sector R&D centers are
unable to meet agency core area needs. Specific objectives for these FFRDCs are to
R&D laboratories engage in research programs that emphasize the evolution and
demonstration of advanced concepts and technology, and the transfer or transition of
technology. Figure 9.1 shows the list of federally funded R&D laboratories. The cyber-
security research activities of selected laboratories are covered later in this chapter and
national laboratories funded by the DOE are covered in the following chapter.
Study and analysis centers deliver independent and objective analyses and
advise in core areas important to their sponsors in support of policy development,
decision making, alternative approaches, and new ideas on issues of significance.
Figure 9.2 shows the list of federally funded study and analysis centers.
System engineering and integration centers provide required support in core
areas not available from sponsor’s in-house technical and engineering capabilities to
Federally Funded Research and Development Centers ◾ 147
ensure that complex systems meet operational requirements. The centers assist with
the creation and choice of system concepts and architectures, specification of tech-
nical system and subsystem requirements and interfaces, development and acqui-
sition of system hardware and software, testing and verification of performance,
integration of new capabilities, and continuous improvement of system operations
and logistics. They often play a critical role in assisting their sponsors in techni-
cally formulating, initiating, and evaluating programs and activities undertaken by
firms in the for-profit sector.2 Figure 9.3 shows the list of systems engineering and
integration centers.
to address these complex data integrity challenges. Multiple systems need to work
together to prevent, detect, notify, and recover from events that corrupt data. This
project explores methods to effectively recover operating systems, databases, user
files, applications, and software/system configurations. It will also explore issues
of auditing and reporting (user activity monitoring, file system monitoring, data-
base monitoring, scanning backups and snapshots for malware, and rapid recovery
solutions) to support recovery and investigations. To address real-world business
challenges around data integrity, the resulting example solution will be composed
of open-source and commercially available components. The goal of this building
block effort is to help organizations confidently identify
complex mobile information systems. With this in mind, a set of security con-
trols and countermeasures that address mobile threats in a holistic manner must
be identified, necessitating a broader view of the entire mobile security ecosystem.
This view must go beyond devices to include, as an example, the cellular networks
and cloud infrastructure used to support mobile applications and native mobile
services.
The Mobile Threat Catalogue identifies threats to mobile devices and associ-
ated mobile infrastructure to support development and implementation of mobile
security capabilities, best practices, and security solutions to better protect enter-
prise IT. Threats are divided into broad categories, primarily focused upon mobile
applications and software, the network stack and associated infrastructure, mobile
device and software supply chain, and the greater mobile ecosystem. Each threat
identified is catalogued alongside explanatory and vulnerability information where
possible, and alongside applicable mitigation strategies.6
Privacy-enhanced identity federation: As enterprises move more services online,
many have given customers the option to use third-party credentials to access their
services, rather than asking them to create and manage new accounts. For example,
you can use your social media account login to access your fitness tracker account.
In effect, the social media company is vouching that the same person is logging
in each time they access the tracker website. Allowing third-party credentials are
beneficial to businesses because it saves them time and resources in managing iden-
tities. For users, the benefit comes from not having another username, password, or
a second-factor credential to manage and remember.
While these arrangements are becoming more common, organizations are find-
ing it a time-consuming task to manage each relationship, or third-party integra-
tion. The dominant solution is a service called brokered identity management in
which identity brokers manage the integration relationships between organizations
and credential providers. Organizations can use an identity broker to manage mul-
tiple third-party credentialing options instead of having to manage each separately.
However, for users, there is a concern that these connections create the opportunity
for a breach, or exposure of personal information, as well as for the broker to track
a user’s online activity. The privacy-enhanced identity brokers project is examin-
ing how privacy-enhancing technologies, leveraging market-dominant standards,
can be integrated into identity broker solutions to meet the privacy objectives of
users and organizations. This project is a joint effort between the NCCoE and the
NSTIC National Program Office (NSTIC NPO).7
Trusted geolocation in the cloud: while cloud computing offers businesses and
other organizations cost savings and flexibility, these shared resources can intro-
duce security and privacy challenges. Enterprises that use cloud services want to
be assured that
◾◾ The cloud compute platform hosting their workload has not been modified
or tampered with
Federally Funded Research and Development Centers ◾ 151
The Cyber Security Visualization project at JPL that addresses the spectra of
cyberattacks on aerospace systems is important because many of the components
and vulnerabilities that have been successfully exploited by the adversary on other
infrastructures are the same as those deployed and used within the aerospace envi-
ronment. An important consideration with respect to the mission/safety critical
infrastructure supporting space operations is that an appropriate defensive response
to an attack has the goal to preserve critical mission objectives in the presence of
adversarial activity which invariably involves the need for high precision and accu-
racy, because an incorrect response can trigger unacceptable losses involving lives
and/or significant financial damage.
A highly precise defensive response, considering the typical complexity of aero-
space environments, requires a detailed and well-founded understanding of the
underlying system. To capture this detailed and rigorous understanding, a struc-
tured approach for modeling aerospace systems has been developed. The approach
includes physical elements, network topology, software applications, system func-
tions, and usage scenarios. JPL leverages model-based systems engineering meth-
odology by utilizing the Object Management Group’s Systems Modeling Language
to represent the system being analyzed and also utilize model transformations to
provide relevant aspects of the model to specialized analyses. A novel visualization
approach is utilized to visualize the entire model as a 3D graph, allowing easier inter-
action with subject matter experts. The model provides a unifying structure for ana-
lyzing the impact of a particular attack or a particular type of attack. A graph-based
propagation analysis based on edge and node labels is used to analyze the model.10
Some agencies have adopted other agencies’ FFRDC oversight and management
practices. For example, DHS mirrored most of the DOD’s FFRDC Management
154 ◾ Threat Level Red
◾◾ Analytic Services, Inc. Department of the Air Force. Removed from list of
FFRDCs in FY 1977.
◾◾ Applied Physics Laboratory. Department of the Navy. Removed from list of
FFRDCs in FY 1978.
◾◾ Center for Research in Social Systems. Department of the Army. Phased out
as FFRDC at end of FY 1970.
◾◾ Institute for Advanced Technologies. Department of the Army. Phased out as
FFRDC November 1993.
◾◾ Logistics Management Institute. OSD. Decertified as FFRDC September
1998.
◾◾ Research Analysis Corporation. Department of the Army. Phased out as
FFRDC September 1972.2
9.5 Summary
FFRDCs are government-funded entities that have long-term relationships with
one or more federal agencies to perform R&D and related tasks. FFRDCs are typi-
cally entirely federally funded, or nearly so, but they are operated by contractors
or other nongovernmental organizations. Key points covered in this chapter about
FFRDCs include
◾◾ The Cyber Security Visualization project at JPL that addresses the spectre of
cyberattacks on aerospace systems is important because many of the compo-
nents and vulnerabilities that have been successfully exploited by the adver-
sary on other infrastructures are the same as those deployed and used within
the aerospace environment.
◾◾ A review of the websites of FFRDCs that are not covered above or those of
the DOE covered in Chapter 10 did not yield a great deal of usable informa-
tion regarding their cybersecurity research activities.
◾◾ Federally Funded Study and Analysis Centers were among those FFRDCs
that provide little if any information about cybersecurity research they may
be performing.
◾◾ The DOD Inspector General’s office and others have raised concerns that
FFRDC mission statements are too broad and do not clearly identify the
specialized tasks that FFRDCs should perform. Congress and others have
repeatedly raised questions about the adequacy of DOD oversight of the
FFRDCs it sponsors.
◾◾ What experience have seminar participants had working with any FFRDC?
◾◾ What do the seminar participants think about the lack of transparency that
many of the FFRDCs have?
◾◾ What role do the seminar participants think the FFRDCs should have in
cybersecurity research?
◾◾ What areas of FFRDC cybersecurity research do seminar participants think
are the most important? Why?
Key Terms
geolocation: is the location of a user’s wireless device or computer location via a GPS
chip or triangulation of nearby wireless network towers. The user’s device
then transmits this information when the website or content provider asks
for it. Other geolocation services obtain information from the user’s device
that does not immediately identify the user’s location such as an IP address;
they then consult external databases that associate that data with location
information such as country and state and pass this information on to website
transfer or transition of technology: is the process of moving technology from
one of the national laboratories into use in the private sector or in another
organization other than the laboratory
156 ◾ Threat Level Red
References
1. United States Government Accountability Office. Federally Funded Research
Centers. August 2014. Retrieved December 1, 2016, http://www.gao.gov/products/
GAO-14-593
2. NSF. Master Government List of Federally Funded R&D Centers. Retrieved December
4, 2016, https://www.nsf.gov/statistics/ffrdclist/#activity
3. NIST. About the National Cybersecurity Center of Excellence. Retrieved December 4,
2016, https://nccoe.nist.gov/sites/default/files/library/fact-sheets/nccoe-fact-sheet.pdf
4. NCCoE. Data Integrity. Retrieved December 4, 2016, http://nccoe.nist.gov/projects/
building_blocks/data_integrity
5. NCCoE. Derived PIV Credentials. Retrieved December 4, 2016, http://nccoe.nist.
gov/projects/building_blocks/piv_credentials
6. NCCoE. Mobile Device Security. Retrieved December 4, 2016, http://nccoe.nist.gov/
projects/building_blocks/mobile_device_security
7. NCCoE. Privacy-Enhanced Identity Federation. Retrieved December 4, 2016, http://
nccoe.nist.gov/projects/building_blocks/privacy-enhanced-identity-brokers
8. NCCoE. Trusted Geolocation in the Cloud. Retrieved December 4, 2016, nccoe.nist.
gov/projects/building_blocks/trusted_geolocation_in_the_cloud
9. JPL. About. Retrieved December 4, 2016, http://www.jpl.nasa.gov/about/
10. JPL. Cyber Security Visualization. Retrieved December 4, 2016, https://www-
robotics.jpl.nasa.gov/tasks/showTask.cfm?FuseAction=ShowTask&TaskID=294&t
daID=700098
11. GAO. Federally Funded R&D Centers: Issues Relating to the Management of DOD-
Sponsored Centers. NSIAD-96-112. August 6, 1996. Retrieved December 5, 2016,
http://www.gao.gov/products/GAO/NSIAD-96-112
12. GAO. Opportunities Exist to Improve the Management and Oversight of Federally
Funded Research and Development Centers. GAO-09-15. October 8, 2008. Retrieved
December 5, 2016, http://www.gao.gov/products/GAO-09-15
Chapter 10
DOE-Funded Research
and Development Centers
Founded during the time of immense investment in scientific research in the period
preceding World War II, the National Laboratories have served as the leading insti-
tutions for scientific innovation in the United States for more than 60 years. The
Energy Department’s National Labs address large scale, complex research and
development challenges with a multidisciplinary approach that places an emphasis
on translating basic science to innovation. This chapter provides a background on
FFRDCs and examines the cybersecurity research activities of the DOE-funded
national laboratories.
157
158 ◾ Threat Level Red
The NNSA within DOE also sponsors cybersecurity research to support its unique
mission requirements.
The CEDS Program operates with the goal that, by 2020, resilient EDS are
designed, installed, operated, and maintained to survive cyber-incidents while sus-
taining critical functions. To help achieve this vision, OE fosters and actively engages
in collaborations among energy stakeholders, utilities, vendors, national labs, and
academic institutions. Through these collaborations, OE seeks to solve hand-in-hand
with industry the right problems, and to transition next-generation research from the
national labs and academia into commercial products operating in the energy sector.1
The Cybersecurity and Emerging Threats Research and Development (CET
R&D) Division advances the R&D of innovative technologies, tools, and tech-
niques to reduce risks to the critical energy infrastructure posed by cyber and
other emerging threats. Continuing to increase the security, reliability, and resil-
iency of the electricity delivery system will help ensure the success of grid mod-
ernization and transformation of the energy systems. CET R&D activities include
the ongoing support of research, development, and demonstration of advanced
cybersecurity solutions, acceleration of information sharing to enhance situational
awareness, and technical assistance in the development and adoption of best
practices.2
The DOE launched the Grid Modernization Laboratory Consortium, a strate-
gic partnership between DOE headquarters and the DOE National Laboratories to
bring together leading experts and resources to collaborate on the goal of modern-
izing the nation’s grid. The Consortium employs an integrated approach to ensure
that DOE-funded studies and R&D are efficiently coordinated to reap the greatest
return for the taxpayer dollar. It will also allow DOE to become a resource and
convener for the diverse and fragmented set of stakeholders across industry, the
scientific community, and all levels of government.
One of the many undertakings of the Grid Modernization Laboratory
Consortium is to develop a multiyear program plan for grid modernization. The
plan will outline an integrated systems approach to transforming the nation’s
grid by incorporating numerous program activities within DOE as well as
activities undertaken by national stakeholders. As a first step, the leaders of the
Consortium are focused on coordinating all of DOE’s grid-related activities to
ensure connectivity, avoid redundancies, and identify gaps in R&D needs of a
modern grid.
The Grid Modernization Laboratory Consortium forms a united front employ-
ing the department’s leading policy and technical experts to work toward trans-
forming the grid for the future. By coupling headquarters collaboration with the
strengths of the labs in areas including their computational abilities, knowledge
of cybersecurity systems, integration of renewable and energy efficient technolo-
gies, and command of sensing and control technologies the Consortium will tackle
the challenges associated with achieving a modern grid that will make a clean
energy future possible.3 A special emphasis has been placed on the development
DOE-Funded Research and Development Centers ◾ 159
(RTDS) to enhance the security of the nation’s electric power grid and related con-
trol systems including SCADA systems. It allows engineers to visualize the effects
of power grid failures. With 15 racks, INL has the largest installation of RTDS in
the national lab system.
The ability to simulate real-time power grid information is a key factor in
detecting previously unknown vulnerabilities and providing infrastructure owners
and operators with a path forward for responding to grid failures. The simulator
allows critical infrastructure protection specialists to predict, plan, and prepare for
catastrophic events.
Instrumentation, Control, and Intelligent Systems (ICIS) research is centered
on developing components, programs, systems, and individuals for any application
that requires monitoring, control, and human interaction. External peer review
and advisory committees made up of academic, R&D, and customer organizations
provide independent and ongoing review of the strategy within the signature and
the focus or research funds.6
Resilience has emerged in the national dialog; the concept centers on the notion
of a complex system being able to recover and continue operating through disrup-
tive, manmade or natural, events. INL research leads the security by design effort
to incorporate resilience into critical control system components. INL is focused on
the nexus of cyber controls and wireless communications, and our differentiating
science-based, full-scale assets uniquely position INL to lead technology and solu-
tion development to secure ICSs.
INL experts employ their real-world control system knowledge to advance the
physical and cybersecurity protection of ICSs. The lab has developed the capa-
bilities and multidisciplinary teams to provide analysis and deployable solutions to
meet the complex and evolving national challenges of cyber-physical integration,
infrastructure resilience, and critical support for the lifeline sectors. INL’s wire-
less and cybersecurity capabilities and expertise enable industry, academia, govern-
ment, and public safety to conduct:
◾◾ Real-time spectrum and network research associated with spectrum use and
allocation
◾◾ Encryption and authentication studies for secure communications adoption
and deployment
◾◾ Wireless signal propagation modeling, testing, and analysis
◾◾ Technology application studies and the development of appropriate concepts
of operation
◾◾ New methods to instrument computers and networks and detect the activi-
ties of cyber insiders be they humans or malicious software.
◾◾ Malware detection, classification through the analysis of dynamic instruction
traces of malware using the VERA visualization tool, statistical models, and
machine learning methods.
◾◾ Scalable cyber data science and the development of systems that enable graph
analytics while enabling privacy, parallelism, and streaming.
◾◾ Resilient cyber command and control systems using EpiCom to improve the
resilience, security, and performance of distributed systems addressing vul-
nerabilities inherent in centralized management and detection systems and
use predictive analysis to reason about distributed system security.
◾◾ Communications systems modeling and simulation using the multi-scale
integrated information and telecommunications system (MIITS) that sup-
ports Internet, public switched telephone network (PSTN), wireless, and
botnet models which can be combined with other transportation, activity,
demand, and social network models.
◾◾ The development of methods and tools for creating, disrupting, and detect-
ing covert and steganographic channels enable undetected communications in
a network.
◾◾ Quantum-enabled security which uses quantum (single-photon) communi-
cations integrated with optical communications to provide a strong, innate
security foundation at the photonic layer for optical fiber networks.
◾◾ Work on Optimization and Control Theory for Smart Grids which devel-
ops new understanding on how the electrical power grid can be made more
robust to attack and failure.11
◾◾ Los Alamos physicists developed a quantum random number generator and a
quantum communication system, both of which exploit the weird and immu-
table laws of quantum physics to improve cybersecurity.12
In 2015, Los Alamos National Laboratory partnered with two private sector
companies to bring cybersecurity technology developed by the lab to market. The
first partnership, with Whitewood Encryption Systems, Inc., developed a quantum
random number generator in an effort to address a key fundamental flaw in all
cryptosystems: predictability. The security of electronic messages depends on the
unpredictability of the random numbers used to scramble the data. Modern data
centers have very limited access to true random numbers because computers do not
generally do unpredictable things and to provide truly secure data communica-
tions, systems need a reliable source of unpredictable numbers that are not gener-
ated by a set of mathematical operations.
From the physicist’s point of view, the only true unpredictability comes from
quantum mechanics. These physical laws state that events at the subatomic level can-
not be predicted; random quantum events lie at the root of the universe. From that
starting point, Los Alamos developed a revolutionary method to generate unpredict-
able, theoretically unhackable random numbers. Quantum mechanics itself guards
the secret. Unlike current math-based encryption keys, which are derived from ran-
dom numbers generated by a potentially knowable algorithm, a quantum key cannot
be determined through calculation, no matter how powerful a computer one uses.
Quantum random number generation technology, commercialized by
Whitewood under the name Entropy Engine, is a plug-and-play computer card
that fits most network servers and creates truly random numbers at a rate of up to
200 million bits each second and can deliver them on-demand over a network to
existing encryption applications and devices performing cryptographic operations
across datacenters, cloud computing systems, mobile phones, and the IoT. Entropy
Engine is more than 10 times higher performing than other quantum devices cur-
rently on the market and is one of the world’s most cost-effective, quantum-pow-
ered random number generators.
The second alliance, between Los Alamos and Ernst and Young, commercial-
ized PathScan, a network-anomaly detection tool that searches for deviations in
normal communication patterns that might indicate a cyber intruder. Unlike tradi-
tional security tools that look for malware or network signatures, PathScan searches
for deviations from normal patterns of communication that are indicative of an
intruder’s presence.
PathScan’s three-step approach builds statistical models to characterize the nor-
mal flows of traffic between each pair of communicating computers; actively enu-
merates multi-hop paths of communication; and passively monitors each path and
tests whether the flows observed are expected in the context of the statistical models
or whether they are unlikely and, therefore, show indicators of a possible adversary
moving through the network. PathScan was also designed to work with an orga-
nization’s legacy information security framework and does not require significant
infrastructure development or vast stores of data to operate. Its network collection
is passive, with limited impact to operations.14
164 ◾ Threat Level Red
chain and critical infrastructure, and continuing operational capabilities, and defeat
known and future adversaries. The objective is rapid research development and deliv-
ery of innovative end-to-end integrated solutions to cyber and information security
problems.17 Research projects at the CISR cover a wide range of areas including
A central concern in modeling and simulating electric grids and the information
infrastructure that monitors and controls them is hybrid modeling and simulation.
ORNL has an extensible framework for integrating continuous and hybrid system
models into discrete-event simulations. It includes a set of numerical integration
schemes for solving ordinary differential equations and can be easily extended by
end users who require specialized or especially robust continuous system simulation
algorithms. This is useful for
collaboration with national and international standards bodies, vendors, and uni-
versities to arrive at better solutions.
The PNNL Electricity Infrastructure Operations Center (EIOC) and SCADA
laboratory can measure the impact of vendor security products on control systems
communication. The EIOC provides a test environment where it can examine the
impacts of vendor projects using live data. One result of these impact assessments
is suggestions for enhancing and improving vendor products.17 Below is a summary
of Atlanta Regional Commission (ARC) Initiative projects:
to analyzing graph data problems will provide researchers a new avenue for
understanding their data.
◾◾ Implementing cutting edge concepts in automation, algorithms, and infra-
structure can severely increase the complexity for the human managing all
of it, negating the increase in cost for the adversary, unless we start early and
evaluate the role of cyber defenders in a new paradigm of resilient infrastruc-
ture. Researchers are identifying the defender’s role in resilient cybersecurity,
how to best convey needed information to them for situational awareness, and
how to provide the ability to investigate malicious activity. Studies are being
conducted across many organizations to (1) identify key awareness challenges
presented by resilient technologies, (2) study various approaches for convey-
ing network awareness while the underlying infrastructure is dynamic, and
(3) find why certain data attributes are required to potentially answer the
question in a different manner. Studies will be compiled and assessed for
insight on how to proceed forward with enabling defenders in the future;
prototypes will then be developed, incorporating concepts from resiliency
applications, and validated with the defender community.
◾◾ Rendezvous: optimization and stochastic algorithms for asymmetric resil-
ient infrastructure is a broadly accepted idea in cyber defense is that a
cyber system cannot be successfully defended on a continual basis against
malicious attacks. While the economic constraints restrict the amount of
resources available to defenders of a system, the attackers operate at a rela-
tively low cost leading to the well understood asymmetry in cyber defense.
Researchers are developing a mathematical framework to understand and
enable defenders with a limited budget to gain the asymmetrical advan-
tage over the attackers. Specifically, based on fundamental concepts such as
multi-objective optimization, stochasticity, and attacker–defender multi-
stage Stackelberg games, are being developed for efficient proactive strate-
gies for defenders to disrupt the cyber kill chain in order to increase the
cost for attackers while minimizing the costs to defend while satisfying the
constraints with available resources.
◾◾ A fundamental assumption of the ARC Initiative is that significant improve-
ments in sustaining the functionality of cyber systems in the face of ongo-
ing attacks requires thinking strategically about the problem and conducting
research that is defensible, repeatable, and has enduring impact. The initiative
has engaged scientists from other research domains to develop science prac-
tices that are relevant to cybersecurity research with the intent of enhancing
the quality and impact of the research results.
◾◾ CyberFit lays the groundwork for cyber operations, cyber research, and cyber
engineering to team up and create a culture of cyber fitness, for better stand-
ing up against adversaries. While there has long been a positive attitude
between cyber operations, researchers, and software engineers, the culture
gap and lack of interaction between these groups has been problematic. The
DOE-Funded Research and Development Centers ◾ 171
rogue actors. The researchers then fed that data into the GPS input of an Android
VM. Software on the VM treats the location data as indistinguishable from real
GPS data, which offers researchers a much richer and more accurate emulation
environment from which to analyze and study what hackers can do to smartphone
networks. The main challenge in studying Android-based machines is the sheer
complexity of the software. Google, which developed the Android operating sys-
tem, wrote some 14 million lines of code into the software, and the system runs on
top of a Linux kernel, which more than doubles the amount of code.
This latest development by Sandia cyber researchers represents a significant
steppingstone for those hoping to understand and limit the damage from network
disruptions due to glitches in software or protocols, natural disasters, acts of terror-
ism, or other causes. These disruptions can cause significant economic and other
losses for individual consumers, companies, and governments. The research builds
upon the Megatux project that started in 2009, in which Sandia scientists ran a
million virtual Linux machines, and on a later project that focused on the Windows
operating system, called MegaWin. Sandia researchers created those virtual net-
works at large scale using real Linux and Windows instances in VMs.24
Control system cybersecurity, including grid control, has operated as a niche
for some time. That status is ending, however, as the electric grid now operates in
a world where grid vulnerabilities can be easily discovered through open Internet
research. Electric power systems and power-system operators are more reliant on
telemetry, automated controls, and communications than ever before in an effort to
improve energy reliability, safety, and cost effectiveness. More specifically, emerging
advancements in phasor measurement units (PMUs), distributed energy resources
(DER), smart-grid technologies, cloud computing services, and grid cyber vulner-
ability and assessments represent significant cybersecurity threats to the continuity
of delivered power. To mitigate the additional risk, deploying cybersecurity con-
trols must be commensurate with the deployment of these enabling technologies.
Cybersecurity across the national electric grid is made difficult by a highly con-
strained solution space. Constraints on addressing grid cybersecurity include
The National SCADA Test Bed is a DOE Office of Electricity Delivery and
Energy Reliability (OE) sponsored resource to help energy control systems. It
combines state-of-the-art operational system testing facilities with research, devel-
opment, and training to discover and address critical security vulnerabilities and
threats to the energy sector. Sandia research efforts range from autonomous agent
174 ◾ Threat Level Red
10.10 Summary
The Energy Department’s National Labs address large scale, complex R&D chal-
lenges with a multidisciplinary approach that places an emphasis on translat-
ing basic science to innovation. A key mission of the DOE Office of Electricity
Delivery and Energy Reliability (OE) is to enhance the reliability and resiliency
of the energy infrastructure. This chapter provides background on DOE FFRDCs.
◾◾ Which national laboratory do seminar participants feel are doing the most
interesting cybersecurity research?
DOE-Funded Research and Development Centers ◾ 175
◾◾ What experience have seminar participants had working with any of the
DOE national laboratories?
◾◾ What areas of cybersecurity research being conducted by the national labora-
tories do seminar participants think are the most important? Why?
Key Terms
cyber-physical systems (CPS): combine the cyber and physical worlds with tech-
nologies that can respond in real time to their environments including the
IoT, industrial Internet, and co-engineered interacting networks of physi-
cal and computational components
steganographic channels: steganography means covered writing or covered, con-
cealed messages, or messages in image, or video within another file, mes-
sage, image, or video. A steganographic channel in a communications
network is when the channel is hidden in another channel or made dif-
ficult to detect in some manner
stochastic: is an event or system is one that is unpredictable because of a random variable
References
1. DOE. Office of Electricity Delivery & Energy Reliability. Mission. Retrieved December
1, 2016, http://www.energy.gov/oe/mission
2. DOE. Cybersecurity and Emerging Threats Research and Development (CET R&D).
Retrieved December 1, 2016, http://www.energy.gov/oe/mission/cybersecurity-and-
emerging-threats-research-and-development-cet-rd
3. DOE. Launch of the Grid Modernization Laboratory Consortium. November 17, 2014.
Retrieved December 1, 2016, http://energy.gov/articles/launch-grid-modernization
-laboratory-consortium
4. DOE. Grid Modernization Update Electricity Advisory Committee. March 26, 2015.
Retrieved December 1, 2016, http://energy.gov/sites/prod/files/2015/04/f21/01-
Mar2015EAC-NatlLabConsortium.pdf
5. Argonne National Laboratory. Cyber Operations, Analysis, and Research (COAR).
November 8, 2016. Retrieved December 2, 2016, https://coar.risc.anl.gov/category/
cyber-research/
6. INL. Securing the Electrical Grid from Cyber and Physical Threats. Retrieved December
2, 2016, https://www.inl.gov/research-programs/grid-resilience/
7. INL. Improving Wireless Communication Reliability and Security. Retrieved December
2, 2016, https://www.inl.gov/research-programs/wireless-research/
8. LBNL. Cybersecurity for Energy Delivery Systems Research and Development. Retrieved
December 2, 2016, https://crd.lbl.gov/departments/data-science-and-technology/idf/
research/cybersecurity-energy-systems/
9. LBNL. Livermore, Berkeley National Labs Leading Project to Increase Power Grid
Cybersecurity. Retrieved December 2, 2016, https://crd.lbl.gov/news-and-publica
tions/news/2016/livermore-berkeley-national-labs-leading-project-to-increase-power-
grid-cybersecurity/
176 ◾ Threat Level Red
10. Los Alamos National Laboratory. Our History. Retrieved December 3, 2016, http://
www.lanl.gov/about/history-innovation/index.php
11. Los Alamos National Laboratory. Cyber Security Science. Retrieved December 3,
2016, http://csr.lanl.gov/projects/
12. Los Alamos National Laboratory. For Cybersecurity, in Quantum Encryption We Trust.
13. Los Alamos National Laboratory. Lab Hosts Multi-Lab Cyber Security Games.
14. Los Alamos National Laboratory. Addressing Cybersecurity. Retrieved December 3,
2016, http://www.lanl.gov/projects/feynman-center/about/news/2016-03-17-address
ing-cybersecurity.php
15. NREL. About NREL. Retrieved December 3, 2016, http://www.nrel.gov/about/
16. NREL. Security and Resilience. Retrieved December 3, 2016, http://www.nrel.gov/
grid/security-resilience.html
17. PNNL. Cyber Security Protecting Our Nation’s Critical Infrastructure. Retrieved
December 3, 2016, http://eioc.pnnl.gov/research/cybersecurity.stm
18. ORNL. Cyber and Information Security Research. Retrieved December 3, 2016, http://
www.ioc.ornl.gov/about/
19. ORNL. Energy Security Projects. Retrieved December 3, 2016, http://web.ornl.gov/
sci/electricity/research/security/projects/
20. PNNL. Asymmetric Resilient Cybersecurity. Retrieved December 3, 2016, http://
cybersecurity.pnnl.gov/projects.stm
21. Sandia National Laboratories. About. Retrieved December 4, 2016, http://www.
sandia.gov/about/index.html
22. Sandia National Laboratories. Cybersecurity. Retrieved December 4, 2016, http://
www.sandia.gov/missions/defense_systems/cybersecurity.html
23. Sandia National Laboratories. Cyber Engineering Research Laboratory (CERL).
Retrieved December 4, 2016, http://www.cs.sandia.gov/CERI/cerl.html
24. Sandia National Laboratories. Cyber and Physical Security. Retrieved December 4,
2016, http://energy.sandia.gov/energy/ssrei/gridmod/cyber-security-for-electric-infra
structure/
25. Sandia National Laboratories. National Supervisory Control and Data Acquisition
(SCADA). Retrieved December 4, 2016, http://energy.sandia.gov/energy/ssrei/grid
mod/c yber-security-for-electric-infrastructure/scada-systems/
Chapter 11
Cybersecurity
Research for Critical
Industry Sectors
Since the events of September 11, 2001, many governments have supported the
implementation of stronger security measures in their own country as well as in
the countries of their treaty or trading partners. In the United States, the DHS has
provided a leadership role in promoting threat analysis and security efforts. DHS
and The Office of the President have identified 16 critical infrastructure sectors
whose assets, systems, and networks are important to sustaining national interest
including economic stability and sustainability.1 This chapter reviews these critical
sectors and the NIST cybersecurity framework being used to address cybersecurity
issues in many of them.
177
178 ◾ Threat Level Red
Figure 11.1 Critical industry sectors and federal agencies charged with security
leadership.
◾◾ Basic chemicals
◾◾ Specialty chemicals
◾◾ Agricultural chemicals
◾◾ Pharmaceuticals
◾◾ Consumer products
The majority of chemical sector facilities are privately owned, requiring DHS
to work closely with the private sector and its industry associations to: set goals
and objectives; identify assets; assess risks; prioritize needs; and implement protec-
tive programs. DHS has also issued regulatory Chemical Facility Anti-Terrorism
Cybersecurity Research for Critical Industry Sectors ◾ 179
Standards (CFATS) for any facility that manufactures, uses, stores, or distributes
certain chemicals at or above specified quantities or concentrations.3
The commercial facilities sector includes a diverse range of sites that draw
large crowds of people for shopping, business, entertainment, or lodging. Facilities
within the sector operate on the principle of open public access, meaning that the
general public can move freely without the deterrent of highly visible security barri-
ers. The majority of these facilities are privately owned and operated, with minimal
interaction with the federal government and other regulatory entities. DHS is des-
ignated as the sector-specific agency (SSA) for the commercial facilities sector. The
commercial facilities sector consists of eight subsectors:
◾◾ The energy sector, which provides power to run cellular towers, central offices,
and other critical communications facilities and also relies on communica-
tions to aid in monitoring and controlling the delivery of electricity.
180 ◾ Threat Level Red
◾◾ The IT sector, which provides critical control systems and services, physical
architecture, and Internet infrastructure, and also relies on communications
to deliver and distribute applications and services.
◾◾ The financial services sector, which relies on communications for the trans-
mission of transactions and operations of financial markets.
◾◾ The emergency services sector (ESS), which depends on communications for
directing resources, coordinating response, operating public alert and warn-
ing systems, and receiving emergency 9-1-1 calls.
◾◾ The transportation systems sector, which provides the diesel fuel needed to
power backup generators and relies on communications to monitor and con-
trol the flow of ground, sea, and air traffic.5
The critical manufacturing sector is crucial to the economic prosperity and con-
tinuity of the United States. A direct attack on or disruption of certain elements of
the manufacturing industry could disrupt essential functions at the national level
and across multiple critical infrastructure sectors. DHS is designated as the SSA
for the critical manufacturing sector. The critical manufacturing sector identified
several industries to serve as the core of the sector:
◾◾ Primary metals manufacturing including iron and steel mills and ferro alloy
manufacturing, alumina and aluminum production and processing, and
nonferrous metal production and processing.
◾◾ Machinery manufacturing including engine and turbine manufacturing,
power transmission equipment manufacturing, and earth moving, mining,
agricultural, and construction equipment manufacturing.
◾◾ Electrical equipment, appliance, and component manufacturing including
electric motor manufacturing, transformer manufacturing, and generator
manufacturing.
◾◾ Transportation equipment manufacturing including vehicles and com-
mercial ships manufacturing, aerospace products and parts manufactur-
ing, and locomotives, railroad and transit cars, and rail track equipment
manufacturing.6
The dams sector delivers critical water retention and control services includ-
ing hydroelectric power generation, municipal and industrial water supplies, agri-
cultural irrigation, sediment and flood control, river navigation for inland bulk
shipping, industrial waste management, and recreation. Its key services support
multiple critical infrastructure sectors and industries. Dams sector assets irrigate
at least 10% of U.S. cropland, help protect more than 43% of the U.S. population
from flooding, and generate about 60% of electricity in the Pacific Northwest.
There are more than 87,000 dams in the United States and approximately 65% are
privately owned and approximately 77% are regulated by state dam safety offices.
The dams sector has interdependencies with a wide range of other sectors, including
Cybersecurity Research for Critical Industry Sectors ◾ 181
cannot function. More than 80% of the country’s energy infrastructure is owned
by the private sector, supplying fuels to the transportation industry, electricity to
households and businesses, and other sources of energy that are integral to growth
and production across the nation.
The energy infrastructure is divided into three interrelated segments: electricity,
oil, and natural gas. The electricity segment contains more than 6,413 power plants
(this includes 3,273 traditional electric utilities and 1,738 nonutility power pro-
ducers) with approximately 1,075 gigawatts of installed generation. Approximately
48% of electricity is produced by combusting coal (primarily transported by rail),
20% in nuclear power plants, and 22% by combusting natural gas. The remaining
generation is provided by hydroelectric plants (6%), oil (1%), and renewable sources
(solar, wind, and geothermal) (3%). The heavy reliance on pipelines to distribute
products across the nation highlights the interdependencies between the energy
and transportation systems sector.
The energy sector is well aware of its vulnerabilities and is leading a significant
voluntary effort to increase its planning and preparedness. Cooperation through
industry groups has resulted in substantial information sharing of best practices
across the sector. Many sector owners and operators have extensive experience
abroad with infrastructure protection and have more recently focused their atten-
tion on cybersecurity. The DOE is designated as the SSA for the energy sector.10
The financial services sector represents a vital component of the national critical
infrastructure. Large-scale power outages, recent natural disasters, and an increase
in the number and sophistication of cyberattacks demonstrate the wide range of
potential risks facing the sector. The financial services sector includes thousands
of depository institutions, providers of investment products, insurance companies,
other credit and financing organizations, and the providers of the critical financial
utilities and services that support these functions. Financial institutions vary widely
in size and presence, ranging from some of the world’s largest global companies
with thousands of employees and many billions of dollars in assets, to community
banks and credit unions with a small number of employees serving individual com-
munities. The Department of Treasury is designated as the SSA for the financial
services sector. Whether an individual savings account, financial derivatives, credit
extended to a large organization, or investments made to a foreign country, these
products allow customers to
The food and agriculture sector is almost entirely under private ownership and
is composed of an estimated 2.1 million farms, 935,000 restaurants, and more
than 200,000 registered food manufacturing, processing, and storage facilities.
Cybersecurity Research for Critical Industry Sectors ◾ 183
This sector accounts for roughly one-fifth of U.S. economic activity. The food and
agriculture sector has critical dependencies with many sectors, but particularly with
the following:
◾◾ Water and wastewater systems, for clean irrigation and processed water
◾◾ Transportation systems, for movement of products and livestock
◾◾ Energy, to power the equipment needed for agriculture production and food
processing
◾◾ Chemical, for fertilizers and pesticides used in the production of crops12
details how the NIPP RMF is implemented within the context of the unique char-
acteristics and risk landscape of the sector. The Department of Health and Human
Services (DHHS) is designated as the SSA for the healthcare and public health
sector.14
The IT sector is central to the nation’s security, economy, and public health
and safety as businesses, governments, academia, and private citizens are increas-
ingly dependent upon IT sector functions. These virtual and distributed functions
produce and provide hardware, software, and IT systems and services, and in col-
laboration with the communications sector, the Internet. The sector’s complex and
dynamic environment makes identifying threats and assessing vulnerabilities dif-
ficult and requires that these tasks be addressed in a collaborative and creative
fashion. IT sector functions are operated by a combination of entities which are
often owners and operators and their respective associations that maintain and
reconstitute the network, including the Internet. Although IT infrastructure has a
certain level of inherent resilience, its interdependent and interconnected structure
presents challenges as well as opportunities for coordinating public and private
sector preparedness and protection activities. DHS is designated as the SSA for the
IT sector.15
The nuclear reactors, materials, and waste sector accounts for approximately
20% of the U.S. electrical generation which is provided by 99 commercial nuclear
plants. The Sector-Specific Plan details how the NIPP RMF is implemented within
the context of the unique characteristics and risk landscape of the sector. DHS is
designated as the SSA for the nuclear reactors, materials, and waste sector.16
DHS and the United States Department of Transportation (USDOT) are desig-
nated as the co-SSAs for the transportation systems sector. The transportation system
quickly, safely, and securely moves people and goods through the country and over-
seas. The transportation systems sector consists of seven key subsectors, or modes:
◾◾ Aviation includes aircraft, air traffic control systems, and about 19,700 air-
ports, heliports, and landing strips. Approximately 500 provide commercial
aviation services at civil and joint-use military airports, heliports, and sea
plane bases. In addition, the aviation mode includes commercial and rec-
reational aircraft (manned and unmanned) and a wide variety of support
services, such as aircraft repair stations, fueling facilities, navigation aids, and
flight schools.
◾◾ Highway and motor carrier encompasses more than 4 million miles of
roadway, more than 600,000 bridges, and more than 350 tunnels. Vehicles
include trucks, including those carrying hazardous materials; other commer-
cial vehicles, including commercial motor coaches and school buses; vehicle
and driver licensing systems; traffic management systems; and cyber systems
used for operational management.
◾◾ Maritime transportation system consists of about 95,000 miles of coastline,
361 ports, more than 25,000 miles of waterways, and intermodal landside
Cybersecurity Research for Critical Industry Sectors ◾ 185
In the water and wastewater systems sector, there are approximately 153,000
public drinking water systems and more than 16,000 publicly owned wastewater
treatment systems in the United States. More than 80% of the U.S. population
receives their potable water from these drinking water systems, and about 75% of
the U.S. population has its sanitary sewerage treated by these wastewater systems.
The water and wastewater systems sector is vulnerable to a variety of attacks,
including contamination with deadly agents; physical attacks, such as the release
of toxic gaseous chemicals; and cyberattacks. The result of any variety of attack
could be large numbers of illnesses or casualties and/or a DoS that would also
impact public health and economic vitality. The sector is also vulnerable to natural
disasters. Critical services, such as firefighting and healthcare (hospitals), and other
dependent and interdependent sectors, such as energy, food, and agriculture, and
transportation systems, would suffer negative impacts from a DoS in the water and
wastewater systems sector. The Environmental Protection Agency (EPA) is desig-
nated as the SSA for the water and wastewater systems sector. PPD-21 changed the
name of the water sector to the water and wastewater systems sector in 2013.18
The DHS Office of Cybersecurity and Communications (CS&C), within the
NPPD, is responsible for enhancing the security, resilience, and reliability of the
cyber and communications infrastructure. CS&C works to prevent or minimize
disruptions to critical information infrastructure in order to protect the public, the
economy, and government services. CS&C leads efforts to protect the federal.gov
domain of civilian government networks and to collaborate with the private sector
to increase the security of critical networks in the.com domain. In addition, the
186 ◾ Threat Level Red
The respond function supports the ability to contain the impact of a potential
cybersecurity event. Examples of outcome categories within this function include:
response planning; communications; analysis; mitigation; and improvements.
Recover: develop and implement the appropriate activities to maintain plans
for resilience and to restore any capabilities or services that were impaired due to
a cybersecurity event. The recover function supports timely recovery to normal
operations to reduce the impact from a cybersecurity event. Examples of outcome
categories within this function include: recovery planning; improvements; and
communications.
The Framework Profile is the alignment of the functions, categories, and sub-
categories with the business requirements, risk tolerance, and resources of the
organization. A Profile enables organizations to establish a roadmap for reducing
cybersecurity risk that is well aligned with organizational and sector goals, consid-
ers legal/regulatory requirements and industry best practices, and reflects risk man-
agement priorities. Given the complexity of many organizations, they may choose
to have multiple profiles, aligned with particular components and recognizing their
individual needs.
Framework Profiles can be used to describe the current state or the desired
target state of specific cybersecurity activities. The Current Profile indicates the
cybersecurity outcomes that are currently being achieved. The Target Profile indi-
cates the outcomes needed to achieve the desired cybersecurity risk management
goals. Profiles support business/mission requirements and aid in the communica-
tion of risk within and between organizations. This Framework document does not
prescribe Profile templates, allowing for flexibility in implementation.
An organization can use the Cybersecurity Framework as a key part of its sys-
tematic process for identifying, assessing, and managing cybersecurity risk. The
Framework is not designed to replace existing processes; an organization can use its
current process and overlay it onto the Framework to determine gaps in its current
cybersecurity risk approach and develop a roadmap to improvement. Utilizing the
Framework as a cybersecurity risk management tool, an organization can deter-
mine activities that are most important to critical service delivery and prioritize
expenditures to maximize the impact of the investment.
The Framework is designed to complement existing business and cybersecurity
operations. It can serve as the foundation for a new cybersecurity program or a
mechanism for improving an existing program. The Framework provides a means
of expressing cybersecurity requirements to business partners and customers and
can help identify gaps in an organization’s cybersecurity practices. It also provides a
general set of considerations and processes for considering privacy and civil liberties
implications in the context of a cybersecurity program.22
The content of the Cybersecurity Framework document and supporting mate-
rial is very comprehensive and detailed. This section just provides a brief overview
of the basic concepts and processes. Complete documentation can be found at:
https://www.nist.gov/cyberframework
Cybersecurity Research for Critical Industry Sectors ◾ 191
To conduct the review, GAO analyzed policy, plans, and other documenta-
tion and interviewed public and private sector officials for eight of nine SSAs with
responsibility for 15 of 16 sectors.
SSAs determined the significance of cyber risk to networks and ICSs for all 15
of the sectors in the scope of GAO’s review. Specifically, they determined that cyber
risk was significant for 11 of 15 sectors. Although the SSAs for the remaining four
sectors had not determined cyber risks to be significant during their 2010 sector-
specific planning process, they subsequently reconsidered the significance of cyber
risks to the sector. For example, commercial facilities SSA officials stated that they
recognized cyber risk as a high-priority concern for the sector as part of the updated
sector planning process. SSAs and their sector partners are to include an overview
of current and emerging cyber risks in their updated sector-specific plans.
SSAs generally took actions to mitigate cyber risks and vulnerabilities for their
respective sectors and developed, implemented, or supported efforts to enhance
cybersecurity and mitigate cyber risk with activities that aligned with a majority
of actions called for by the NIPP. SSAs for 12 of the 15 sectors had not identified
incentives to promote cybersecurity in their sectors as proposed in the NIPP; how-
ever, the SSAs are participating in a working group to identify appropriate incen-
tives. In addition, SSAs for 3 of 15 sectors had not yet made significant progress
in advancing cyber-based R&D within their sectors because it had not been an
area of focus for their sector. DHS guidance for updating the sector-specific plans
directs the SSAs to incorporate the NIPP’s actions to guide their cyber risk mitiga-
tion activities, including cybersecurity-related actions to identify incentives and
promote R&D.
All SSAs that GAO reviewed used multiple public–private and cross-sector
collaboration mechanisms to facilitate the sharing of cybersecurity-related infor-
mation. For example, the SSAs used councils of federal and nonfederal stakehold-
ers, including coordinating councils and cybersecurity and ICS working groups,
to coordinate with each other. In addition, SSAs participated in the NCCIC, a
national center at DHS to receive and disseminate cyber-related information for
public and private sector partners.
192 ◾ Threat Level Red
The DoD, DoE, and DHHS established performance metrics for their three
sectors. However, the SSAs for the other 12 sectors had not developed metrics to
measure and report on the effectiveness of all of their cyber risk mitigation activities
or their sectors’ cybersecurity posture. This was because, among other reasons, the
SSAs rely on their private sector partners to voluntarily share information needed
to measure efforts. The NIPP directs SSAs and their sector partners to identify
high-level outcomes to facilitate progress toward national goals and priorities. Until
SSAs develop performance metrics and collect data to report on the progress of
their efforts to enhance the sectors’ cybersecurity posture, they may be unable to
adequately monitor the effectiveness of their cyber risk mitigation activities and
document the resulting sector-wide cybersecurity progress.
GAO recommended that certain SSAs collaborate with sector partners to
develop performance metrics and determine how to overcome challenges to report-
ing the results of their cyber risk mitigation activities. Four of these agencies con-
curred with GAO’s recommendations, while two agencies did not comment on the
recommendations. The GAO report provides great detail on what each SSAs had
accomplished and the report is a profile of where each SSA was at in the process
of working with their respective sectors.23 A full copy of the report is available at:
http://www.gao.gov/products/GAO-16-79
11.5 Summary
In the United States, DHS has provided a leadership role in promoting threat
analysis and security efforts. DHS and The Office of the President have identified
16 critical infrastructure sectors whose assets, systems, and networks, are impor-
tant to sustaining national interest including economic stability and sustainability.1
NIST has conducted research and lead development efforts on the cybersecurity
framework which SSAs have encouraged organizations in their respective sectors to
use when developing or improving cybersecurity plans. Key points covered in this
chapter include
◾◾ There are 16 critical infrastructure sectors whose assets, systems, and net-
works, whether physical or virtual, are considered so vital to the United States
that their incapacitation or destruction would have a debilitating effect on
security, national economic security, national public health or safety, or any
combination thereof.
◾◾ The DHS Office of CS&C, within the NPPD, is responsible for enhanc-
ing the security, resilience, and reliability of the cyber and communications
infrastructure.
◾◾ A risk-based approach was called for to identify critical infrastructure where a
cybersecurity incident could reasonably result in catastrophic regional or national
effects on public health or safety, economic security, or national security.
Cybersecurity Research for Critical Industry Sectors ◾ 193
Key Terms
category: the subdivision of a function into groups of cybersecurity outcomes, closely
tied to programmatic needs and particular activities. Examples of categories
include asset management, access control, and detection processes
critical infrastructure: systems and assets, whether physical or virtual, so vital to the
United States that the incapacity or destruction of such systems and assets
would have a debilitating impact on cybersecurity, national economic secu-
rity, national public health or safety, or any combination of those matters
cybersecurity event: a cybersecurity change that may have an impact on organiza-
tional operations (including mission, capabilities, or reputation)
framework core: a set of cybersecurity activities and references that are common
across critical infrastructure sectors and are organized around particular
outcomes. The Framework Core comprises four types of elements: func-
tions, categories, subcategories, and informative references
framework implementation tiers: a lens through which to view the characteristics
of an organization’s approach to risk or how an organization views cyber-
security risk and the processes in place to manage that risk
framework profile: a representation of the outcomes that a particular system or
organization has selected from the framework categories and subcategories
194 ◾ Threat Level Red
References
1. U.S. Department of Homeland Security Critical Infrastructure Sectors. October
2015. Retrieved December 8, 2016, https://www.dhs.gov/critical-infrastructure-
s ec tors
2. The White House. Presidential Policy Directive–Critical Infrastructure Security
and Resilience (PRESIDENTIAL POLICY DIRECTIVE/PPD-21). February 2013.
Retrieved December 8, 2016, https://www.whitehouse.gov/the-press-office/2013/02/
12/presidential-policy-directive-critical-infrastructure-security-and-resil
3. DHS. Chemical Sector. Retrieved December 8, 2016, https://www.dhs.gov/
chemical-sector
4. DHS. Commercial Facilities Sector. Retrieved December 8, 2016, https://www.dhs.
gov/commercial-facilities-sector
5. DHS. Communications Sector. Retrieved December 8, 2016, https://www.dhs.gov/
communications-sector
6. DHS. Critical Manufacturing Sector. Retrieved December 8, 2016, https://www.dhs.
gov/critical-manufacturing-sector
7. DHS. Dams Sector. Retrieved December 8, 2016, https://www.dhs.gov/dams-sector
8. DHS. Defense Industrial Base Sector. Retrieved December 8, 2016, https://www.dhs.
gov/defense-industrial-base-sector
9. DHS. Emergency Services Sector. Retrieved December 8, 2016, https://www.dhs.gov/
emergency-services-sector
10. DHS. Energy Sector. Retrieved December 8, 2016, https://www.dhs.gov/energy-sector
11. DHS. Financial Services Sector. Retrieved December 8, 2016, https://www.dhs.gov/
financial-services-sector
12. DHS. Food and Agriculture Sector. Retrieved December 8, 2016, https://www.dhs.
gov/food-and-agriculture-sector
13. DHS. Government Facilities Sector. Retrieved December 8, 2016, https://www.dhs.
gov/government-facilities-sector
14. DHS. Healthcare and Public Health Sector. Retrieved December 8, 2016, https://
www.dhs.gov/healthcare-public-health-sector
15. DHS. Information Technology Sector. Retrieved December 8, 2016, https://www.dhs.
gov/information-technology-sector
16. DHS. Nuclear Reactors, Materials, and Waste Sector. Retrieved December 8, 2016,
https://www.dhs.gov/nuclear-reactors-materials-and-waste-sector
17. DHS. Transportation Systems Sector. Retrieved December 8, 2016, https://www.dhs.
gov/transportation-systems-sector
18. DHS. Water and Wastewater Systems Sector. Retrieved December 8, 2016, https://
www.dhs.gov/water-and-wastewater-systems-sector
19. DHS. Office of Cybersecurity and Communications. Retrieved December 8, 2016,
https://www.dhs.gov/office-cybersecurity-and-communications
20. DHS. Office of Cyber and Infrastructure Analysis (OCIA). Retrieved December 8,
2016, https://www.dhs.gov/office-cyber-infrastructure-analysis
21. The White House Office of the Press Secretary. Executive Order Improving Critical
Infrastructure Cybersecurity. February 12, 2013. Retrieved December 8, 2016, https://
www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-
critical-infrastructure-cybersecurity
Cybersecurity Research for Critical Industry Sectors ◾ 195
Cybersecurity Research
for Consumer Protection
197
198 ◾ Threat Level Red
NHTSA believes that it important for the automotive industry to make vehicle
cybersecurity an organizational priority. This includes proactively adopting and
using well-researched available guidance and existing standards and best practices.
Prioritizing vehicle cybersecurity also means establishing other internal processes
and strategies to ensure that systems will be reasonably safe under expected real-
world conditions, including those that may arise due to potential vehicle cyberse-
curity vulnerabilities.
NHTSA cybersecurity research focuses on solutions to harden the vehicle’s
electronic architecture against potential attacks and to ensure that vehicle systems
take appropriate and safe actions, even when an attack is successful. A layered
approach to vehicle cybersecurity reduces the probability of an attack’s success
and mitigates the ramifications of potential unauthorized access. The following
fundamental vehicle cybersecurity protections serve as a small subset of potential
actions which can move the motor vehicle industry toward a more cyber-aware
posture:
NHTSA cybersecurity research has also shown that the automotive indus-
try should consider that consumers may bring aftermarket devices (e.g., insur-
ance dongles) and personal equipment (e.g., cell phones) onto cars and connect
them with vehicle systems through the interfaces that manufacturers provide
(Bluetooth, USB, OBD-II port, etc.). The automotive industry should consider
the incremental risks that could be presented by these devices and provide reason-
able protections.
In addition, aftermarket device manufacturers should consider that their
devices are interfaced with CPS and could impact safety-of-life. Even though the
primary purpose of the system may not be safety related (e.g., telematics device
collecting fleet operational data), if not properly protected, they could be used
as proxy to influence the safety-critical system behavior on vehicles. Aftermarket
devices could be also brought on to all ages and types of vehicles with varying
levels of cybersecurity protections on the vehicle side of the interface. Therefore,
these devices should include strong cybersecurity protections on the units since
Cybersecurity Research for Consumer Protection ◾ 199
they could impact the safety of vehicles regardless of their intended primary func-
tion. NHTSA urges that the NIST RMF Security Life Cycle and NIST standards
be used in the process.
In addition, NHTSA cybersecurity research has also shown that the automotive
industry should also consider the serviceability of vehicle components and systems
by individuals and third parties. The automotive industry should provide strong
vehicle cybersecurity protections that do not unduly restrict access by authorized
alternative third-party repair services.1
Automated Vehicle Research is another area where the USDOT’s Intelligent
Transportation System Joint Program Office (ITS JPO) has established a pro-
gram within the overall ITS program. As a first step, the program has developed a
2015–2019 Multimodal Program Plan for Vehicle Automation, a key component
of the ITS JPO’s ITS Strategic Plan 2015–2019. The program plan establishes
the vision, role, and goals, as well as a broad research roadmap for automation
research. USDOT cybersecurity research aims to enable and accelerate the devel-
opment and deployment of automated vehicles; ensure safe and efficient operations
of emerging technologies and systems; and maximize public benefits by lever-
aging connected vehicle technologies, infrastructure-based solutions, and other
approaches.
There are critical research questions regarding driver transitions between
automated and manual driving modes, such as how drivers perform over time
when using these systems. An initial study, funded by the NHTSA and the ITS
JPO, addressed human factors research questions focused on drivers transition-
ing into and out of automated driving. The results support development of initial
human factors driver-vehicle interface principles. Project partners include the
Virginia Tech Transportation Institute, Battelle, Bishop Consulting, General
Motors, Google, and the Southwest Research Institute.2 Additional current
research includes
involvement from other government agencies including DHS and DoD, aircraft
OEMs, suppliers, and academia. Because the cybersecurity of aircraft should be
an international effort, the government of the United Kingdom was also involved.
Also in 2007, the FAA helped lead the establishment of a standards develop-
ment group in the Radio Technical Commission for Aeronautics (RTCA). This
group (SC-216) developed the Security Assurance and Assessment Processes for
Safety-related Aircraft Systems (DO-326). Published in December 2010, this pro-
cess document is intended to augment current guidance for aircraft certification
to handle the information security threat. It addresses only aircraft type certifica-
tion but is intended as the first of a series of documents on aeronautical systems
security that together will address information security for the overall Aeronautical
Information System Security (AISS) of airborne systems with related ground sys-
tems and environment.
The FAA has also staffed an internal national cybersecurity team to research
and work on developing a standardized approach to address the cybersecurity vul-
nerabilities of aircraft equipment being installed during type certification, amended
type certification, supplemental type certification (STC), and field approval proj-
ects throughout the Aircraft Certification Service and Flight Standards Service.
Future work activities by the RTCA SC-216 group include examination and update
of the FAA Instructions for Continued Airworthiness Order to address operational
cybersecurity guidance for airline and maintenance repair organizations for eEn-
abled aircraft.
In order to gain hands-on understanding and experience regarding how the
various eEnabled components were integrated and what cybersecurity vulner-
abilities may be present, the FAA engaged the Volpe Center and Wichita State
University (WSU) to develop the airborne network security simulator (ANSS). The
goals for ANSS are to
One of the key issues in the cybersecurity challenge for the FAA is that, at this
time, aircraft are not fully integrated with all of the eEnabled technologies and sys-
tems. This creates a difficult type certification (TC) and STC problem with respect
to cybersecurity.
202 ◾ Threat Level Red
A different set of challenges may emerge as many of the legacy aircraft may be
retrofitted with newer avionics as required to operate in a NextGen (U.S.) or Single
European Sky ATM Research, SESAR (Europe) operational environment. Even
older legacy aircraft will need to consider the importance of cybersecurity. Many
scheduled for retrofit with the newer technology are subject to the same cybersecu-
rity threats. This also increases complexity to the STC process by requiring a new
security baseline for each aircraft model and subtype configuration.
The challenge will be how to properly mitigate and manage the installation and
use of newer IP-enabled external networks onto a legacy aircraft that was not origi-
nally designed to provide such capabilities. While the existing backplane has fewer
capabilities for an external access to any part of the aircraft, previously isolated
systems were never designed to protect or manage themselves while operating with
some of the newer external access methods.5
In 2010, the FAA and Volpe Center conducted a survey of aircraft OEMs, sup-
ply chain vendors, type certification inspection (DERs), and government/military
organizations. The goal of the study was to gather information to be used to aid in
future FAA planning related to regulations, directives, standards, guidance, train-
ing, and research regarding aircraft network security.
The survey results showed that the vast majority of respondents had aggres-
sive plans for developing and adding eEnabled technologies into airframes: 63%
of organizations planned to include eEnabled technologies and within three to five
years and that number would grow to 83%. The inclusion of these technologies is a
logical business decision for aircraft manufacturers and airlines.
STC involving the incorporation of eEnabled technologies on legacy aircraft
as well as the need to type certify new aircraft that are eEnabled will be a major
workload for the FAA in the next few years. In addition, the survey findings show
the need for eEnabled certification will expand by 63% to 83% over the next five
years. This will influence the FAA in the following areas:
The FDA cybersecurity research findings have evolved into a guidance docu-
ment entitled Content of Premarket Submissions for Management of Cybersecurity
in Medical Devices, which recommends that manufacturers consider cybersecu-
rity risks as part of the design and development of a medical device. Then also
submit documentation to the FDA about the risks identified and controls in place
to mitigate those risks. The guidance also recommends that manufacturers submit
their plans for providing patches and updates to operating systems and medical
software.
As medical devices become more interconnected and interoperable, they can
improve the care patients receive and create efficiencies in the healthcare sys-
tem. Some medical devices, like computer systems, can be vulnerable to security
breaches, potentially impacting the safety and effectiveness of the device. By care-
fully considering possible cybersecurity risks while designing medical devices, and
having a plan to manage system or software updates, manufacturers can reduce the
vulnerability in their medical devices.
The FDA’s concerns about cybersecurity vulnerabilities include malware
infections on network-connected medical devices or computers, smartphones,
and tablets used to access patient data; unsecured or uncontrolled distribution
of passwords; failure to provide timely security software updates and patches
204 ◾ Threat Level Red
◾◾ Pocket Security Smartphone Cybercrime in the Wild studies how, when, and
where people use smartphones and the relationship between these usage pat-
terns and the likelihood of being a victim of cybercrime. This research is the
first step to a better scientific understanding how the physical world sur-
rounding smartphones use enables cybercrime.9
◾◾ Technological Con-Artistry: An Analysis of Social Engineering is a study of
one of the most serious threats in the world today to the security of cyber-
space. Social engineering is a process by which people with access to critical
information regarding information systems security are tricked or manipu-
lated into surrendering such information to unauthorized persons, thereby
allowing access to otherwise secure systems. This research will examine who
social engineers are, why they engage in social engineering, the processes
they use to conceive of and implement social engineering projects, and how
they view information privacy and security and justify their behavior.10
◾◾ A Socio-Technical Approach to Privacy in a Camera-Rich World project is
designed to a gain a deeper understanding of the privacy implications of cam-
era technologies from both a social and technical perspective. Cameras are
now pervasive on consumer devices, including smartphones, laptops, tablets,
and new wearable devices like Google Glass and the Narrative Clip lifelog-
ging camera.11
◾◾ Security and Privacy for Wearable and Continuous Sensing Platforms research
project studies security and privacy for wearable devices. These devices offer
many benefits to end users in terms of real-time access to information and the
augmentation of human memory, but they are also likely to introduce new
and complex privacy and security problems.12
In October 2014, the NIST established the NCCoE’s with the goal of accelerat-
ing the adoption of secure technologies to address the most pressing cybersecurity
Cybersecurity Research for Consumer Protection ◾ 205
NAS. Regardless of the type of UAS operation, FAA regulations and Federal Codes
prohibit any conduct that endangers individuals and property within the NAS.
Specifically these guidelines:
◾◾ Require the FAA to regulate aircraft and UAS operations in the NAS (49
U.S.C. § 40103)
◾◾ Authorize government public safety agencies to operate UAS under certain
restrictions (FAA: A.C.001.1-A)
◾◾ Ban all UA and remote control aircraft operations within three miles and
up to 3,000 feet in altitude from all major sporting events as detailed in the
Notice to Airmen (NOTAM) 4/3621
◾◾ Air traffic integration. The overall level of safety in the National Aerospace
System is preserved through NAS integration, which requires adherence to
rigorous airworthiness standards and airspace regulations. While they apply
equally to manned aircraft, they also recognize the distinguishing character-
istics of UAS. This research encompasses those UAS that operate like fixed
wing manned aircraft that require use of ramps, taxiways, and runways to
complete ground operations.
◾◾ Collaborative decision making (CDM) is a joint government/industry ini-
tiative aimed at improving air traffic flow management (ATFM) through
increased information exchange among aviation community stakeholders.
These stakeholders work together to create technological and procedural solu-
tions to the ATFM challenges faced by the NAS. New entrants into the NAS
such as UAS are not being considered.
◾◾ Airworthiness. Advances in technology have greatly increased the affordabil-
ity and accessibility of UAS to potential commercial operators and the gen-
eral public. Accordingly, when the FAA develops and issues regulations that
enable the commercial and private operation of UAS in the NAS below 400
feet, we can expect a significant increase in the number of aircraft operating
in this space. In addition to the significant number of new aircraft operating
in this space, these UAS will be operating in airspace that puts them in closer
Cybersecurity Research for Consumer Protection ◾ 209
UAS holds the potential to provide significant benefits to both industry and
consumers in myriad ways. These include using UAS to inspect cell phone towers
without risking human lives, monitor crop growth, and take aerial photos of real
estate. The best practices agreed to by privacy and consumer advocates, industry,
news organizations, and trade associations represent an important step in building
consumer trust, giving users the tools to innovate in this space in a manner that
respects privacy, and providing accountability and transparency. The voluntary best
practices are consistent with safe harbor principles and encourage UAS users to
12.7 Summary
Agencies like the FDA, the NHTSA, and the FAA have specific responsibilities to
protect the general public. This chapter examined cybersecurity research efforts
that are directed at protecting the consumer. Key points covered include
unlike anything that has been done before. Twenty-three leading research
institutions and one hundred leading industry, government partners com-
prise the Alliance for System Safety of UAS through Research Excellence, or
ASSURE.
Key Terms
automated driving: operating a vehicle that performs one or more driving func-
tions through the use of vehicle automation systems
configurable embedded computer systems: a computer system that is embedded
in another device which can be configured prior to embedding as well as
after installation
eEnabled: is any device, system, or combination of devices/components and
systems that communicate with technologies other than point-to-point
including interfaces between aircraft components and interfaces between
aircraft and off-aircraft entities
personal mobile technologies: include individually owned devices such as cell
phones, tablets, laptops, and digital media
truck platooning: is an extension of cooperative adaptive cruise control and for-
ward collision avoidance technology that provides automated lateral and
longitudinal vehicle control to maintain a tight formation of vehicles with
short following distances
References
1. USDOT. National Highway Traffic Safety Administration. Cybersecurity Best
Practices for Modern Vehicles. (Report No. DOT HS 812 333). October, 2016.
Retrieved December 7, 2016, http://www.nhtsa.gov/staticfiles/nvs/pdf/812333_
CybersecurityForModernVehicles.pdf
212 ◾ Threat Level Red
21. FAA Center of Excellence for Unmanned Aircraft Systems. Research Focus Areas.
Retrieved December 8, 2016, http://www.assureuas.org/projects/
22. U.S. Department of Commerce. Finding Common Ground on Unmanned Aircraft
Systems (UAS). May 19, 2016. Retrieved December 8, 2016, https://www.commerce.
gov/news/blog/2016/05/finding-common-ground-unmanned-aircraft-systems-uas
23. FAA. UAS Integration Office. FAA Unmanned Aircraft Systems (UAS) Cyber Security
Initiatives. February 11, 2015. Retrieved December 8, 2016, http://csrc.nist.gov/
groups/SMA/ispab/documents/minutes/2015-02/2015-feb_george-ispab.pdf
Chapter 13
Cybersecurity Usability
Obstacles and Research
215
216 ◾ Threat Level Red
professionals so that they can make better decisions that enhance the usability of
cybersecurity in their organizations. Ideally, these decisions should
The NIST Usability of Cybersecurity Team conducts research into specific areas
of cybersecurity usability in order to gather empirical data and discover best prac-
tices. This includes research on passwords, password policies, and password typing
studies that explore the relationship between password length, complexity of the
password rules, and human memory. In addition, the team studies multi-factor
authentication and users’ perception of security and privacy in order to determine
users’ mental models and develop personas, training, educational requirements,
and integrating the usability, security, and software engineering life cycles.2
Other NIST usability research is being conducted in collaboration with the
Office of the National Coordinator (ONC) for Health Information Technology
(HIT) and the Agency for Healthcare Research and Quality (AHRQ). The proj-
ect is a multiyear research program aimed at building a principled framework for
measuring the usability of healthcare IT systems. The ultimate goal is to discover
principles for how systems can be built to prevent critical errors and promote safe,
effective, and efficient use by all end users (doctors, nurses, administrators, patients,
and others). The research program is proceeding on two tracks:
◾◾ The human factors tasks, users, and systems track examines key scenarios of use,
describes user populations and their characteristics, and identifies the key design
features of healthcare IT systems that lead to usability successes and failures.
◾◾ The organizational usability processes track focuses on existing usability
engineering practices in HIT organizations. The practices will be compared
to industry standards and best practices. The collaboration also will research
existing methodologies for formal usability evaluation to inform our efforts
to develop usability assessment procedures.3
HIT holds significant potential to provide tools, electronic health records (EHR)
in particular, that enables the healthcare system to better respond to the healthcare
needs of American diversity and avoids disparities from occurring. To ensure that
EHRs can live up to that potential, NIST and Johns Hopkins are partnering in a
research program aimed at developing human factors guidelines for preventing dis-
parities related to EHR adoption. The objectives of the research are to ensure
NIST will employ the research findings to develop technical guidance that
provides the basis for HIT design decisions (based on universal design principles)
that will decrease or eliminate potential health-care disparities among end users.
Implementing identified best practices and comprehensive technical guidelines
will help support safe, effective, error-free EHR use among an increasingly diverse
population of potential users.
Accessibility barriers to HIT devices for the one in five Americans with dis-
abilities are a closely related area of concern that electronic health record systems
(EHRs) have the potential to address. By providing guidance for HIT design,
NIST has an opportunity to achieve a nationwide impact that is truly welcoming
to all people, regardless of ability. Even though Section 508 applies only to the
federal sector, NIST believes it is important to promote the use of accessibility
standards on a voluntary basis. For that reason, NIST supports HIT standards for
accessibility of electronic and IT promulgated by the U.S. Access Board. It also
is working to develop test methods to validate HIT accessibility conformance.
The positive impact of accessible HIT includes not only improved health, but
also improvements in the employment and education of people with disabilities.4
NIST participates on the ISO/IEC JTC 1/SC 7 and ISO/TC 159/SC 4 as the
WG28 Joint Working Group, U.S. delegation co-convener, to develop standards
for usability documentation. This family of documents provides a definition of the
type and scope of formats and the high-level structure to be used for documenting
required usability information and the results of usability evaluation. These stan-
dards define the content of the context of use, user needs, user requirements, user
interaction specification, UI specification, user report format, and field data report.5
◾◾ Find out how satisfied participants are with a website or other product
◾◾ Identify changes required to improve user performance and satisfaction
◾◾ Analyze the performance to see if it meets usability objectives
Effective usability testing does not require a formal usability lab for testing. It
can be done in a fixed laboratory having two or three connected rooms outfitted
with audiovisual equipment or in any space as long as someone is observing the
user and taking notes. Testing costs depend on the type of testing performed, size
of testing team, and the number of participants for testing.7
The System Usability Scale (SUS) provides a quick and dirty reliable tool for mea-
suring usability. It consists of a 10-item questionnaire with five response options
for respondents; from strongly agree to strongly disagree. It allows developers and
testers to evaluate a wide variety of products and services, including hardware,
software, mobile devices, websites, and applications. SUS has become an industry
standard, with references in over 1,300 articles and publications. The noted benefits
of using SUS include that it
When a SUS is used, participants are asked to score the following 10 items with
one of five responses that range from strongly agree to strongly disagree:
Interpreting scoring can be complex. The participant’s scores for each question
are converted to a new number, added together, and then multiplied by 2.5 to con-
vert the original scores of 0–40 to 0–100. Though the scores are 0–100, these are
not percentages and should be considered only in terms of their percentile ranking.
Based on research, a SUS score above 68 would be considered above average
and anything below 68 is below average, however, the best way to interpret results
involves normalizing the scores to produce a percentile ranking.8
Cybersecurity Usability Obstacles and Research ◾ 219
◾◾ Usability training for federal employees: the free workshops and webinars
help participants to conduct UX activities including audience research, task
analysis, and usability tests and evaluations.
◾◾ The UX community supports monthly calls, live events, and the UX listserve.
◾◾ Usability test support through occasional educational tests to demonstrate
why usability tests are so important.
◾◾ The DigitalGov team will present to stakeholders how usability can improve
government services.
◾◾ Usability case studies that are filled with before and after screenshots of gov-
ernment products improved by user research.
◾◾ Usability starter kit that has templates and samples.9
ensuring end-user security. Given that the current system is complex, dynamic, and
includes many players, the panelists agreed that there are unique security challenges
the ecosystem faces such as inefficiencies when rolling out patches and updates, but
that security should be a focal point for every player in the mobile ecosystem.
Finally, the fourth panel explored consumer behaviors with respect to mobile
security. Panelists noted that even though device loss and theft are the most com-
mon problems faced by consumers, many consumers do not take advantage of
existing options, such as password authentication, to protect mobile devices. The
panel discussed potential solutions, such as biometrics, that may be more consumer-
friendly and help drive the adoption of better security practices.14
After the panels, Nithan Sannappa, an attorney in the Division of Privacy and
Identity Protection analyzed the content of the panels in a series of blog posts explor-
ing several important issues regarding user privacy and security in mobile comput-
ing which are cited in this section. Key observations made by Nithan Sannappa in
the posts included
the developer. As with any user-facing security feature, the usability of per-
missions has been widely debated in the security community.
◾◾ Operating system architects began experimenting with permission-based
access controls in the desktop era. In an effort to thwart malware, User Access
Control (UAC) prompted the user with a run-time system dialog when an
application attempted to perform a sensitive task. Subsequent studies, how-
ever, demonstrated that users did not necessarily understand or act appropri-
ately when presented with the UAC run-time dialogs.
◾◾ Moreover, researchers have noted, a decade of usability research has shown
that users may become habituated to run-time warnings making them inef-
fective. Developers have observed that run-time dialogs in mobile operating
systems can be similarly problematic since an application usually barrages
users with a stack of dialogs on its first launch which can lead to the user care-
lessly dismissing all of them without reading them. Thus, effective usability
is compromised.
◾◾ Recent studies, however, have demonstrated that users also often ignore
or do not fully understand install-time permissions. Based on experiences
and the available research, there appear to be important usability concerns
with both run-time and install-time permissions. In both cases, users may
not fully understand the implications of granting access, or may be so
habituated to the prompts that they do not pay attention when making
access decisions. In light of these usability concerns, one may question
whether permission-based access controls provide any value as a privacy or
security-enhancing mechanism. First, researchers have demonstrated that
permissions can have a positive impact in limiting application access to
privacy and security-sensitive APIs. Second, researchers have noted that
permissions may allow advanced users to raise concerns with developers
and flag questionable application behavior for other users. Indeed, anec-
dotal evidence suggests that developers often respond to user concerns
regarding permissions.
◾◾ Despite a history of usability concerns, permissions appear to be a useful
tool in increasing transparency and encouraging developers to adhere to the
principle of least privilege. The FTC has long supported the idea of layered
disclosures presented in a context that is useful for consumers. From this
perspective, permissions in mobile operating systems are clearly an improve-
ment over the opacity of traditional operating systems, which often led to
disclosures buried in lengthy legal documents.
◾◾ Nonetheless, increasing the usability and efficacy of permissions remain
important challenges to address. Participants at the 2013 workshop noted
that providing users with greater context regarding information flows is an
important part of addressing these challenges. Researchers have applied the
concept of contextual integrity to permissions suggesting that in order to
minimize habituation and increase user comprehension; mobile operating
224 ◾ Threat Level Red
systems should only ask users to make security decisions when information
flows defy user expectations.
◾◾ By providing incentives and opportunities for developers to adhere to the
principle of least privilege, mobile operating systems can help minimize the
situations in which users must confront such information flows. In addition,
by providing greater context for access requests, mobile operating systems can
help users make informed decisions about such information flows.16
◾◾ With applications often using data for multiple purposes, it is unsurprising
that users may question whether a defined purpose is the only use for that
data. For example, an application that collects location data to support a
navigation feature may also include a third-party advertising library that col-
lects the same information to provide geo-targeted ads. With studies finding
that the purpose for which an app requests a certain permission has a major
impact on people’s willingness to grant that permission, consumers must be
able to trust developers to disclose all material purposes for an application’s
access to a resource. Researchers have suggested that application markets
could play a role in this disclosure process.17
The FTC has also researched mobile apps for kids and findings raise several alarms
about cybersecurity usability at disclosure on what data is being collected from their
children, how it is being shared, or who will have access to it. The FTC also found
that many of the apps surveyed included interactive features, such as connecting to
social media, and sent information from the mobile device to ad networks, analytics
companies, or other third parties, without disclosing these practices to parents.
FTC staff examined hundreds of apps for children and looked at disclosures
and links on each app’s promotion page in the app store, on the app developer’s
website, and within the app. According to the report, most apps failed to provide
any information about the data collected through the app, let alone the type of
data collected, the purpose of the collection, and who would obtain access to the
data. Even more troubling, the results showed that many of the apps shared certain
information with third parties such as device ID, geolocation, or phone number
without disclosing that fact to parents so they could decide which apps to grant
what permissions. In this case, cybersecurity usability was thwarted by app devel-
opers. Further, a number of apps contained interactive features such as advertising,
the ability to make in-app purchases, and links to social media without disclosing
these features to parents prior to download. The survey found that
◾◾ Parents were not being provided with information about what data an app col-
lects, who will have access to that data, and how it will be used. Only 20% of the
apps staff reviewed disclosed any information about the app’s privacy practices.
◾◾ Many apps (nearly 60% of the apps surveyed) were transmitting information
from a user’s device back to the app developer or, more commonly, to an
advertising network, analytics company, or other third party.
Cybersecurity Usability Obstacles and Research ◾ 225
In a follow-up study, the FTC reviewed 364 kids’ apps in Google Play or the
Apple App Store. It was found that164 of them (45%) had privacy policies that
could be viewed from a direct link on the app store page. Of the apps surveyed, an
additional 38 include privacy policies in harder-to-find places, for example, within
the app or on the app developer’s webpage. However, information that is difficult
for parents to locate is not likely to be of much benefit to them. Of all the apps,
48 included short form disclosures in their app descriptions about the sharing of
personal information with third parties, the use of persistent identifiers, in-app pur-
chases, social network integration, or the presence of advertising. The conclusion
was that a significant portion of kids’ apps still leave parents in the dark about the
data collected about their children.19
◾◾ Below basic: no more than the most simple and concrete literacy skills
◾◾ Basic: can perform simple and everyday literacy activities
◾◾ Intermediate: can perform moderately challenging literacy activities
◾◾ Proficient: can perform complex and challenging literacy activities
Cybersecurity Usability Obstacles and Research ◾ 227
In prose literacy, or the knowledge and skills needed to understand and use
information from texts including editorials, news stories, poems, and fiction there
was not much change in the percentage of the U.S. population scoring in the four
different levels of literacy between 1992 and 2003 (1992: below basic 14% basic
28% intermediate 43% proficient 15%) (2003: below basic 14% basic 29% inter-
mediate 44% proficient 13%).
In document literacy or the knowledge and skills required to locate and use
information contained in various formats, including job applications, payroll
forms, transportation schedules, maps, tables, and graphics there was an increase
in the percentage of the population that scored at the intermediate level in 2003
(1992: below basic 14% basic 22% intermediate 49% proficient 15%) (2003: below
basic 12% basic 22% intermediate 53% proficient 13%).
In quantitative literacy or the knowledge and skills required to apply arithmetic
operations, either alone or sequentially, to numbers embedded in printed materi-
als, such as balancing a checkbook, calculating a tip, completing an order form, or
determining the amount of interest on a loan from an advertisement there was an
improvement from 1992 to 2003 (1992: below basic 26% basic 32% intermediate
30% proficient 13%) (2003: below basic 22% basic 33% intermediate 33% profi-
cient 13%).21
The Program for the International Assessment of Adult Competencies (PIAAC)
is a cyclical, large-scale study that was developed under the auspices of the
Organization for Economic Cooperation and Development (OECD). Adults were
surveyed in 24 participating countries in 2012 and 9 additional countries in 2014.
The goal of PIAAC is to assess and compare the basic skills and the broad
range of competencies of adults around the world. The assessment focuses on cog-
nitive and workplace skills needed for successful participation in twenty-first cen-
tury society and the global economy. Specifically, PIAAC measures relationships
between individuals’ educational background, workplace experiences and skills,
occupational attainment, use of information and communications technology, and
cognitive skills in the areas of literacy, numeracy, and problem solving.
PIAAC is a complex assessment: the data collection has been conducted in mul-
tiple languages, in numerous countries with diverse populations, cultures, educa-
tion, and life experiences. In the United States, the PIAAC assessment is conducted
in English only; however, the PIAAC survey background questions are admin-
istered either in English or Spanish. All participating countries follow the qual-
ity assurance guidelines set by the OECD consortium, and closely follow all the
agreed-upon standards set for survey design, implementation of the assessment, and
the reporting of results.
PIAAC builds on knowledge and experiences gained from previous interna-
tional adult assessments, the International Adult Literacy Survey (IALS) and the
Adult Literacy and Lifeskills Survey (ALL). PIAAC enhances and expands on
these previous assessments’ frameworks and, at the same time, improves upon their
design and methodologies. IALS measured literacy proficiency for each domain on
228 ◾ Threat Level Red
a scale of 0–500 points. Literacy ability in each domain was expressed by a score,
defined as the point at which a person has an 80% chance of successful perfor-
mance from among the set of tasks of varying difficulty included in the assessment.
The five levels of literacy that correspond to measured ranges of scores achieved are
◾◾ Level 1 indicates persons with very low skills, where the individual may, for
example, be unable to determine the correct amount of medicine to give a
child from information printed on the package.
◾◾ Level 2 respondents can deal only with material that is simple, clearly laid
out, and in which the tasks involved are not too complex. It denotes a weak
level of skill, but more than at level 1. It identifies people who can read, but
test poorly. They may have developed coping skills to manage everyday lit-
eracy demands, but their low level of proficiency makes it difficult for them
to face novel demands, such as learning new job skills.
◾◾ Level 3 is considered a suitable minimum for coping with the demands of
everyday life and work in a complex, advanced society. It denotes roughly the
skill level required for successful secondary school completion and college
entry. Like higher levels, it requires the ability to integrate several sources of
information and solve more complex problems.
◾◾ Levels 4 and 5 describe respondents who demonstrate command of higher-
level information processing skills.22
highlight, submit, and send). Such interaction involves familiarity with electronic
texts, images, graphics, and numerical data, as well as the ability to locate, evaluate,
and critically judge the validity, accuracy, and appropriateness of accessed informa-
tion. These skills constitute the core aspects of the PIAAC PS-TRE assessment.
PS-TRE items present tasks of varying difficulty to be performed in simulated
software applications using commands and functions commonly found in the tech-
nology environments of email, web pages, and spreadsheets. These tasks range from
purchasing particular goods or services online and finding interactive health infor-
mation to managing personal information and business finances.
PIAAC recognizes the diversity of digital technologies and the fact that they are
evolving at a rapid pace, but due to implementation constraints the first round of
PIAAC will be limited to using computers and computer networks. The PS-TRE
assessments are only computer administered. The percentage of U.S. adults age 16 to
74 at each level of proficiency on the PIAAC PS-TRE scale in 2012 are as follows23:
The PIAAC literacy framework expands the definition of literacy used in IALS
and ALL1 and provides a broad definition of literacy: literacy is understanding,
evaluating, using, and engaging with written text to participate in society, to
achieve one’s goals, and to develop one’s knowledge and potential.
This definition (a) highlights the ranges of cognitive processes involved in lit-
eracy, (b) focuses on a more active role of individuals in society (participating), and
(c) includes a range of text types, such as narrative and interactive texts, in both
print and electronic formats.
While this is a broader definition than IALS and ALL, selected items from those
assessments are used to provide a link to IALS and ALL. PIAAC items include con-
tinuous texts (e.g., sentences and paragraphs), noncontinuous texts (e.g., schedules,
graphs, maps), and electronic texts (including hypertext, or text in interactive envi-
ronments, such as forms and blogs). Task activities are presented in home, work,
and community contexts, addressing various purposes adults pursue in their lives.
Based on the PIAAC framework, literacy tasks include items (in both modes) that
cover a range of difficulties (low, middle, and high) to present a comprehensive picture
of the range of skills of adults in each country.24 The percentage of U.S. adults age
16 to 74 at each level of proficiency on the PIAAC literacy scales in 2012 are as follows:
◾◾ Below level 1 9%
◾◾ Level 1 20%
◾◾ Level 2 34%
◾◾ Level 3 28%
◾◾ Levels 4 and 5 10%
Based on studies prior to PIAAC, it was found that in the United States over
seven million adults had very low literacy skills. Many other countries participating
in PIAAC also had large numbers of adults with low literacy skills. The primary
goal of the PIAAC reading components framework is to provide information about
the literacy skills of adults at the lower end of the literacy spectrum specifically,
whether they have the foundational skills to develop the higher literacy and numer-
acy abilities necessary for functioning in society.
The reading components assessment focuses on elements of reading that are
comparable across the range of languages in the participating countries: reading
vocabulary, sentence comprehension, and basic passage comprehension.
The reading vocabulary section asks participants to identify the best word to
label different graphic illustrations. This task measures whether participants can
identify common, concrete print words used in everyday adult interactions in the
community, home, and workplace. It is not meant to determine the vocabulary
knowledge (breadth or depth) of the participants.
The sentence comprehension section asks participants to identify whether sen-
tences of varying grammatical/syntactic complexity make sense. This task measures
whether participants can understand and correctly judge the accuracy of the con-
tent of sentences.
The basic passage comprehension section asks participants to make a choice
between a correct and an incorrect word to complete a sentence within a pas-
sage. This task measures whether respondents comprehend text in context and can
appropriately use words in ways that characterize fluency.
Cybersecurity Usability Obstacles and Research ◾ 231
The reading component portion of the assessment is optional for countries par-
ticipating in PIAAC. In countries that chose to adopt the reading components
tasks, participants who do not take the computer-based assessment and those who
fail to pass the computer-administered ICT and literacy/numeracy core items are
directed to these tasks.26
In the 2003 study, adults household income was divided into eight catego-
ries: less than $10,000, $10,000–$14,999, $15,000–$19,999, $20,000–$29,999,
$30,000-$39,999, $40,000–$59,999, $60,000–$99,999, and $100,000 or greater.
It was found that average prose, document, and quantitative literacy were higher
for adults in each increasing level of household income, with two exceptions. On
the prose and quantitative scales, the differences in average literacy between adults
who lived in households with incomes of $10,000–$14,999 and adults who lived in
households with incomes of $15,000–$19,999 were not statistically significant. On
the document scale, the difference in average literacy between adults who lived in
households with incomes below $10,000 and adults who lived in households with
incomes between $10,000 and $14,999 was not statistically significant.
With each higher level of prose, document, and quantitative literacy (from
below basic through proficient), the percentage of adults with household incomes
below $10,000 decreased. For example, 26% of adults with below basic prose liter-
acy lived in households with incomes below $10,000 compared with 14% of adults
with basic prose literacy, 5% of adults with intermediate prose literacy, and 2% of
adults with proficient prose literacy.
At the top of the income scale, the percentage of adults living in households
with incomes above $100,000 was higher at each higher level of literacy. For exam-
ple, 2% of adults with below basic prose literacy lived in households with incomes
of $100,000 or more, while 6% of adults with basic prose literacy, 16% of adults
with intermediate prose literacy, and 30% of adults with proficient prose literacy
lived in households with incomes of $100,000 or more.27
13.7 Summary
Usability has recently become an important concern in the cybersecurity field but
usability research is a rather well-established discipline. There are numerous obsta-
cles to achieve cybersecurity usability but there are also proven methods to perform
appropriate usability testing for cybersecurity applications. If users find a cyberse-
curity measure too difficult, they will try to circumvent it and compromise security.
Key points covered in this chapter include
◾◾ The NSF has made several grant awards to address cybersecurity usability
and related issues.
◾◾ The 2002 Help America Vote Act has given NIST a key role in helping to realize
nationwide improvements in the usability and security of voting systems and
to assist the EAC with the development of voluntary voting system guidelines.
◾◾ Since the ordinary use of mobile devices involves the collection, transmission,
and storage of consumers’ sensitive personal information, mobile threats such
as lost or stolen devices, or malicious or privacy-infringing applications can
place consumers at serious risk of identity theft or financial harm.
◾◾ There are two approaches to implementing permission-based access controls
that predominate in mobile operating systems: run-time and install-time.
◾◾ Based on experiences and the available research, there appear to be important
usability concerns with both run-time and install-time permissions.
◾◾ There appear to be important usability concerns with both run-time and
install-time permissions. In both cases, users may not fully understand the
implications of granting access, or may be so habituated to the prompts that
they do not pay attention when making access decisions.
◾◾ The FTC has also researched mobile apps for kids and findings raise several
alarms about cybersecurity usability at disclosure on what data is being col-
lected from children, how it is being shared, or who will have access to it.
◾◾ Cybersecurity usability is rapidly becoming more critical every year especially
since there is tremendous growth in the use of handheld computing devices
for Internet access.
◾◾ Low-income households are reporting handheld computing device owner-
ship alone at much higher rates than more affluent household groups and rely
on handheld computers more than others.
◾◾ The PS-TRE assessments of U.S. adults age 16 to 74 show that about half of
the population are challenged when tested on solving problems using com-
puting technology.
◾◾ In the 2003 literacy study, it was found that average prose, document, and
quantitative literacy was higher for adults in each increasing level of house-
hold income, and lower for lower income households.
◾◾ The lower income population is facing cybersecurity risks because of their
tendency to rely on handheld computing devices for Internet use and because
they also have lower literacy scores which makes using technology more
challenging.
Key Terms
install-time permissions: require the developer to identify all of the protected
resources that an application can access, and to declare these permissions
at the time of installation. Based on the permissions displayed, the user
can choose whether or not to install the application
run-time permissions: are the permissions that users give to a computing device
when a system dialog box prompts the user when an application attempts
to access a particular resource. Users can then decide, on a case-by-case
basis, whether to give an application access to that resource
system usability scale (SUS): is widely used reliable tool for measuring usability
of a wide variety of products and services, including hardware, software,
mobile devices, websites, and applications
usability testing: is the evaluation of a product or service by testing it with repre-
sentative users and during a test, participants will try to complete typical
tasks while observers watch, listen, and take notes
user experience (UX): is what happens during HCI from the human perspective
References
1. NIST Security. Usability of Security. Retrieved December 10, 2016, http://csrc.nist.
gov/security-usability/HTML/about.html
2. NIST. About Us. Retrieved December 10, 2016, http://csrc.nist.gov/security-usabil
ity/HTML/about.html
3. NIST Health Information Technology (IT). Safety-Related Usability Framework.
Retrieved December 10, 2016, https://www.nist.gov/healthcare/health-it-usability/
safety-related-usability-framework
4. NIST Health Information Technology (IT). Human Factor Guidelines and Accessibility.
Retrieved December 10, 2016, https://www.nist.gov/healthcare/health-it-usability/
human-factor-guidelines-and-accessibility
5. NIST Information Technology Laboratory. Information Access. Industry
Usability Reporting. Retrieved December 10, 2016, https://www.nist.gov/itl/iad/
industry-usability-reporting
234 ◾ Threat Level Red
25. National Center for Education Statistics. Numeracy Domain. Retrieved December
12, 2016, http://nces.ed.gov/surveys/piaac/numeracy.asp
26. National Center for Education Statistics. Reading Components Domain. Retrieved
December 12, 2016, http://nces.ed.gov/surveys/piaac/reading-components.asp
27. National Center for Education Statistics. Literacy in Everyday Life Results from the
2003 National Assessment of Adult Literacy. April 2007. Retrieved December 12,
2016, http://nces.ed.gov/Pubs2007/2007480.pdf
Chapter 14
Conclusions
The cybersecurity efforts of the U.S. government are slowly maturing and
starting to show more solid progress including the coordination and prioritiza-
tion of cybersecurity research activities. Major legislation passed by the U.S.
Congress and the executive actions of President Obama have prompted greater
progress in these efforts. They have created the CNCI,1 the Federal Information
Security Modernization Act of 2014, 2 and the Cybersecurity Act of 2015 and
The CNAP.3
The desperately needed cybersecurity research efforts are spread across numer-
ous agencies that provide technical expertise in their areas of responsibility. The
agencies are clearly focused on cybersecurity research to meet the needs of the
realms and industry sectors for which they have responsibility. Thus, the goal
of reducing overlap has been achieved as has the goal of assuring that there is
appropriately focused research to support the diverse and critical needs of the U.S.
economy.
It is likely that the Congressional actions will stay in place but it is also likely
that the executive actions will be modified by incoming presidents and cabinets.
The research goals and objectives will likely stay in place but the organization of
oversight and priority setting will be modified by new cabinets. The changes will
mostly be propaganda focused with new administrations criticizing past admin-
istrations and self-glorifying their changes and laying claim to their new, but not
likely improved, management approaches.
237
238 ◾ Threat Level Red
data thefts reported by Yahoo, Sony, the U.S. Office of Personnel Management,
Target stores, and numerous others including the Democratic National Committee.
To address these trends, a portion of government cybersecurity research has been
focused on leap ahead technology, strategies, and programs. The goal is to develop
technologies that provide increases in cybersecurity by orders of magnitude above
current systems and which can be deployed within five to ten years. In addition,
the federal government, through efforts such as the NICE, plans to enhance cyber-
security education and training nationwide and hire more cybersecurity experts to
secure federal agencies.4
It is widely accepted that cyberspace has moved well beyond websites and social
media applications. We are now in the age of the IoT. Through the integration of
computers, sensors, and networking in physical devices, the IoT fuses the physical
and digital worlds to develop new capabilities and services, which in turn create
new opportunities.5
agencies are often two to three years behind the commercial market for technology,
especially in areas like IT where there is rapid innovation.12 In-Q-Tel is seeking
business plans from companies that are developing cutting-edge technology and
more information about submitting ideas is available on the website.
◾◾ The NSA and the DHS jointly sponsor the National CAE-CD program. The
goal of the program is to reduce vulnerability in national information infra-
structure by promoting higher education and research in cyber defense and
producing professionals with cyber defense expertise.18
◾◾ Maintain over the long term a competency in technology areas where the
government cannot rely on in-house or private sector capabilities
244 ◾ Threat Level Red
◾◾ Develop and transfer important new technology to the private sector so the
government can benefit from a wider, broader base of expertise22
Several FFRDCs claim that they have cybersecurity capabilities but do not
explain or elaborate on their activities related to cybersecurity research. This may
just be a transparency issue or it is also possible they are doing very little to pursue
cybersecurity research. This gap in information leaves doubts about their activities
even they report having capabilities. The GAO and the DoD Inspector General’s
Office and others have raised concerns that FFRDC mission statements are too
broad and do not clearly identify the specialized tasks that FFRDCs should per-
form. Congress and others have repeatedly raised questions about the adequacy of
DoD policy guidance and oversight as well as concerns regarding whether DoD
policy guidance ensures that sponsors adequately justify awarding noncompetitive
contracts for the operation of the FFRDCs.23
A key mission of the DOE Office of Electricity Delivery and Energy Reliability
(OE) is to enhance the reliability and resiliency of the energy infrastructure. Within
DOE OE’s CEDS Program, cybersecurity R&D is tailored to the unique perfor-
mance requirements, designs, and operational environments of EDS. The Strategic
Plan research themes, particularly Designed-In Security and Tailored Trustworthy
Spaces are strongly supported by the strategies and milestones outlined in the CEDS
Program. Other elements of DOE also perform related cybersecurity research. The
ASCR Program, which is part of the Office of Science, sponsors research to support
DOE’s leadership in scientific computation. Security of networks and middleware
is a critical element in the ASCR Next Generation Networking research program.
The NNSA within DOE also sponsors cybersecurity research to support its unique
mission requirements.24
One of the many undertakings of the Grid Modernization Laboratory
Consortium is to develop a multiyear program plan for grid modernization. The
plan will outline an integrated systems approach to transforming the nation’s
grid by incorporating numerous program activities within DOE as well as
activities undertaken by national stakeholders. As a first step, the leaders of the
Consortium are focused on coordinating all of DOE’s grid-related activities to
ensure connectivity, avoid redundancies, and identify gaps in the R&D needs of
a modern grid.25
The CEDS Program operates with the goal that, by 2020, resilient EDS will
be designed, installed, operated, and maintained to survive cyber-incidents while
sustaining critical functions. To help achieve this vision, OE fosters and actively
engages in collaborations among energy stakeholders, utilities, vendors, national
labs, and academic institutions. Through these collaborations, OE seeks to solve
the right problems hand-in-hand with industry, and to transition next-generation
research from the national labs and academia into commercial products operating
in the energy sector.24
Conclusions ◾ 245
The IoT has the potential to offer enormous benefits to consumers. Innovative
companies are already selling connected devices, apps, sensors, services, etc., unlike
anything that has been done before. As with any online activity, it is important to
protect consumers’ sensitive data from thieves. The IoT, however, adds new security
dimensions to consider. For example, an insecure connection could give a hacker
access not just to the confidential information transmitted by the device, but to
everything else on a user’s network. And in the IoT, the risk is not just to data. If
that home automation system is not secure, a criminal could override the settings
to unlock the doors. And just think of the consequences if a hacker were able to
remotely recalibrate a medical device.34 An UA with associated support equipment,
control station, data links, telemetry, communications, and navigation equipment
necessary to operate it is just one example of how the IoT keeps expanding and
some of vulnerabilities that come with such rapid expansion.35
References
1. The White House. The Comprehensive National Cybersecurity Initiative. Retrieved
November 8, 2016, https://www.whitehouse.gov/issues/foreign-policy/cybersecurity/
national-initiative
2. S.2521—Federal Information Security Modernization Act of 2014 113th Congress
(2013–2014). December 18, 2014. Retrieved November 8, 2016, https://www.
congress.gov/bill/113th-congress/senate-bill/2521
3. The White House. The Cybersecurity National Action Plan. February 9, 2016. Retrieved
November 8, 2016, https://www.whitehouse.gov/the-press-office/2016/02/09/
fact-sheet-cybersecurity-national-action-plan
248 ◾ Threat Level Red
4. U.S. GAO. Cybersecurity National Strategy, Roles, and Responsibilities Need to Be Better
Defined and More Effectively Implemented. February 2013. Retrieved November 10,
2016, www.gao.gov/products/GAO-13-187
5. The White House. Internet of Things: Examining Opportunities and Challenges.
August 30, 2016. Retrieved November 10, 2016, https://www.whitehouse.gov/
blog/2016/08/30/internet-things-examining-opportunities-and-challenges
6. U.S. Commission on National Security 21st Century. Road Map for National Security:
Imperative for Change the Phase III Report of the U.S. Commission on National Security
21st Century. February 15, 2001. Retrieved December 17, 2016, http://govinfo.library.
unt.edu/nssg/PhaseIIIFR.pdf
7. DHS. Department of Homeland Security.
8. The National Institute of Standards and Technology. About NIST. Retrieved
November 16, 2016, https://www.nist.gov/about-nist
9. GAO. Defense Advanced Research Projects Agency: Key Factors Drive Transition of
Technologies, but Better Training and Data Dissemination Can Increase Success. GAO-
16-5. November 18, 2015. Retrieved December 21, 2016, http://www.gao.gov/
products/GAO-16-5
10. Intelligence Advanced Research Projects Activity (IARPA). About IARPA. Retrieved
November 10, 2016, https://www.iarpa.gov/index.php/about-iarpa
11. Looking Ahead. U.S. Central Intelligence Agency. January 03, 2012. Retrieved
November 22, 2016, https://www.cia.gov/library/reports/archived-reports-1/Ann_
Rpt_2002/looking.html
12. Should Congress Establish “ARPA–E,” The Advanced Research Projects Agency–Energy?
Hearing before the Committee on Science House of Representatives One Hundred Ninth
Congress Second Session. March 9, 2006. Retrieved November 22, 2016, http://com-
mdocs.house.gov/committees/science/hsy26480.000/hsy26480_0.HTM
13. The Networking and Information Technology Research and Development
Program. Report on Implementing Federal Cybersecurity Research and Development
Strategy. Retrieved November 11, 2016, https://www.nitrd.gov/PUBS/
ImplFedCybersecurityRDStrategy-June2014.pdf
14. Office of The Secretary of Defense. Cybersecurity Operational Test and Evaluation
Priorities and Improvements. July 27, 2016. Retrieved November 21, 2016, http://
www.dote.osd.mil/pub/policies/2016/20160727_Cybersec_OTE_Priorities_and_
Improvements(11093).pdf
15. U.S. National Security Agency. Science of Security. June 21, 2016. Retrieved November
28, 2016, https://www.nsa.gov/what-we-do/research/science-of-security/index.shtml
16. U.S. National Security Agency. Research. May 3, 2016. Retrieved November 28,
2016, https://www.nsa.gov/what-we-do/research/ia-research/
17. NSA Office of Research and Technology Applications Technology Transfer
Program. November 18, 2016. Retrieved November 28, 2016, https://www.nsa.gov/
what-we-do/research/technology-transfer/
18. U.S. National Security Agency. National Centers of Academic Excellence in Cyber
Defense. May 3, 2016. Retrieved November 28, 2016, https://www.nsa.gov/resources/
educators/centers-academic-excellence/cyber-defense/
19. NSF. At a Glance. Retrieved November 28, 2016, https://www.nsf.gov/about/glance.jsp
20. NSF. Awards $74.5 Million to Support Interdisciplinary Cybersecurity Research.
October 7, 2015. Retrieved November 29, 2016, https://nsf.gov/news/news_summ.
jsp?cntn_id=136481&org=NSF&from=news
Conclusions ◾ 249
ablation tests: are used to determine the impact of a data feed being added or
subtracted from an information feed used to generate warnings
anonymous networks: enable users to access the World Wide Web while blocking
any tracking or tracing of their identity on the Internet
assured and resilient semiconductors: are semiconductors that are free of any
malicious code that can compromise cyber operations or cybersecurity
attack surface: is the set of interfaces (the attack vectors) where an unauthorized
user can try to enter data to or extract data from a system, or modify a
system’s behavior
attack vector: refers to the interfaces or paths an attacker uses to exploit a
vulnerability
automated driving: operating a vehicle that performs one or more driving func-
tions through the use of vehicle automation systems
backdoor: a backdoor generally circumvents security programs and provides
access to a program, an online service, or an entire computer system. It
can be authorized or unauthorized, documented or undocumented
best practices: are techniques or methodologies that, through experience and
research, have reliably led to a desired or optimum result
biometrics: is the science of using one or more unique physical characteristics or
behavioral traits to identify individuals
Border Gateway Protocol (BGP): was developed in the late 1980s to exchange
routing information and compute routes between the networks that com-
prise Internet. Overtime, BGP has evolved into the fundamental “glue”
that enables the commercial Internet
Bose–Einstein condensate: Eric A. Cornell of the National Institute of Standards
and Technology and Carl E. Wieman of the University of Colorado at
Boulder led a team of physicists at JILA, a joint institute of NIST and
CU-Boulder, in a research effort that culminated in 1995 with the cre-
ation of the world’s first Bose–Einstein condensate—a new form of matter.
Predicted in 1924 by Albert Einstein, who built on the work of Satyendra
Nath Bose, the condensation occurs when individual atoms meld into a
251
252 ◾ Glossary
criminal groups: are comprised of people that are organized for the purpose of
committing criminal activity for economic gain or political clout or domi-
nance in a specific geographical area
criminal enterprise: the FBI defines a criminal enterprise as a group of individu-
als with an identified hierarchy, or comparable structure, engaged in sig-
nificant criminal activity
criminal intelligence information: is data which meets criminal intelligence col-
lection criteria and which has been evaluated and determined to be rel-
evant to the identification of criminal activity engaged in by individuals or
organizations which are reasonably suspected of involvement in criminal
activity
critical infrastructure: systems and assets, whether physical or virtual, so vital to
the United States that the incapacity or destruction of such systems and
assets would have a debilitating impact on cybersecurity, national eco-
nomic security, national public health or safety, or any combination of
these matters
critical infrastructure cybersecurity: is designed to protect the critical infra-
structure which includes all technology functions that are required to sup-
port the national economy and security
cross-community research: is research than serves several related organizations by
employing expertise from government agencies, private companies, and aca-
demic institutions that can provide complementary knowledge and skills
cryptocurrencies: are digital assets designed to work as a medium of exchange
using cryptography to secure transactions and to control the creation of
additional units of the currency
critical industry sectors: are those industries and business sectors that provide
essential infrastructure support for economic activity that enables a coun-
try to function economically, politically, and socially
critical intelligence: is intelligence that requires immediate attention by a com-
mander or policymaker and which may enhance or refute previously held
beliefs about hostilities or actions, leading to a change of policy
culture of security: is an organization culture in which security pervades every
aspect of daily life as well as all in all operational situations
cyber analytics: analytical data generated by specialized tools that enable network
security managers to address pressing information security problems
cyber health: is the state of the ability of cyber-human systems to be resilient in
the face of attacks and the level that the systems will not be compromised
by attacks or human error and provide access and availability as needed
when needed and where needed
cyberbullying: is bullying that takes place using electronic technology including
devices and equipment such as cell phones, computers, and tablets as well
as communication tools including social media sites, text messages, chat,
and websites
254 ◾ Glossary
cyber physical systems: are engineered systems that are built from, and depend
upon, the seamless integration of computational algorithms and physi-
cal components that enable capability, adaptability, scalability, resil-
iency, safety, security, and usability of physical systems through cyber
connections
cybersecurity event: a cybersecurity change that may have an impact on organi-
zational operations (including mission, capabilities, or reputation)
cybersecurity metrics: help organizations verify that cybersecurity controls are
in compliance with a policy, process, or procedure and help to identify
security strengths and weaknesses
cyber-stalking: is the use of the Internet, email, social media, or other electronic
communication devices to stalk another person
dial functionality: provide the ability to change modes or settings that change
the trade-offs between recall and false discovery rate (FDR), or between
lead time, utility time, or warning quality score
digital government: is a system of electronically accessible utilities and applica-
tions that provides access to government services and information
eEnabled: is any device, system, or combination of devices/components and
systems that communicate with technologies other than point-to-point
including interfaces between aircraft components and interfaces between
aircraft and off-aircraft entities
electronic aggression: is the use of any electronic device to commit such acts as
cyberbullying, Internet harassment, and Internet bullying
enterprise-level security metrics: measure the security posture of an organiza-
tion and allow system administrators and nontechnical users alike to use a
system while still maintaining security
experimental infrastructure: is the established ability to conduct experimental
cutting edge research on extraordinary and previously unexplored areas of
science and technology
facial recognition technologies: are technologies that are able to identify human
subjects in an idle position or while in motion and the identification and
images are used to improve security and security officer safety
framework core: a set of cybersecurity activities and references that are common
across critical infrastructure sectors and are organized around particular
outcomes. The framework core comprises four types of elements: func-
tions, categories, subcategories, and informative references
framework implementation tiers: a lens through which to view the character-
istics of an organization’s approach to risk or how an organization views
cybersecurity risk and the processes in place to manage that risk
framework profile: a representation of the outcomes that a particular system or
organization has selected from the framework categories and subcategories
freedom of information law: is a law defining the public’s right to access the
records of government
Glossary ◾ 255
gaps in security: are security measures or mitigation methods that are inadequate
to protect an asset or do not thoroughly protect the asset that they were
deployed to protect
geolocation: is the location of a user’s wireless device or computer location via a
GPS chip or triangulation of nearby wireless network towers. The user’s
device then transmits this information when the website or content pro-
vider asks for it. Other geolocation services obtain information from the
user’s device that does not immediately identify the user’s location such as
an IP address; then they consult external databases that associate that data
with location information such as country and state and pass this informa-
tion on to the website
Global Information Grid (GIG): is the communications system necessary to
accomplish mission and theater superiority anywhere in the world as and
when needed
hackathon: is an event in which computer programmers and others have a specific
focus, which can include the programming language used, the operating
system, an application, an API, the subject, or the demographic group
of the programmers. In other cases, there is no restriction on the type of
software being created
incident report: is a document that describes an occurrence of a security incident,
or a violation or imminent threat of violation of computer security policies,
acceptable use of policies, or standard security practices (NIST SP800-61)
indistinguishability obfuscation: a method that transforms a computer program
into a “multilinear jigsaw puzzle.” Each piece of the program mixes in
carefully chosen random elements so that the randomness cancels out and
the pieces fit together to compute the correct output. The idea has the
potential to transform cybersecurity
industry leader: is a company or organization that performs better than its com-
petitors bringing innovations to its field of endeavor and whose products
or services become the industry standard to match or beat in open market
competition
infrastructure reinforcement: is the physical and logical technological and
human capability required to create and maintain the necessary organiza-
tional ability and resources to meet mission needs
infringement of intellectual property: can be the unauthorized reproduction or dis-
tribution of copyrighted material, the misappropriation of trade secrets for
commercial gain, or the unauthorized use of a trademarked name or logo
innovation ecosystem: multidisciplinary research is key and is often driven by
military or industrial needs. Disciplines are brought into the innovation
ecosystem from many types of universities, national laboratories, private
industry, and military laboratories to perform rapid, efficient innovation
that could have a transformative economic impact on an industry or sector
256 ◾ Glossary
is what users have such as a physical object (token), for example, a smart
card, or hardware token that generates one-time-only passwords. It might
also be some encrypted software token installed on an individual’s system.
The third is who users are, as indicated by some biometric characteristic
such as a fingerprint or an iris pattern
nanoscale: technology or physical items that have dimensions measured in nano-
meters which is one billionth of a meter
natural language generation: plain uncomplicated jargon-free language that
does not require specialized training to understand
need-to-know: is the necessity for access to, knowledge of, or possession of specific
information required to carry out official duties
netiquette: is a group of principles and concepts that encourage the socially proper
use of social media and other Internet applications
next generation Internet architectures: are those which will support future
Internet applications and environments such as the Internet or things and
the smart grid
online alias: is an online identity encompassing identifiers, such as name and date
of birth, differing from the employee’s actual identifiers that use a nongov-
ernmental Internet Protocol address. Online alias may be used to monitor
activity on social media websites or to engage in authorized online under-
cover activity
ontology: describes a system of concepts and its associated properties for a specific
area often intended to support computer applications and exist on a con-
tinuum rather than completely distinct types of artifacts
personally identifiable information (PII): is information that can be used to dis-
tinguish or trace an individual’s identity, either alone or when combined
with other personal or identifying information that is linked or linkable
to a specific individual
personal technologies: include individually owned devices such as cell phones,
tablets, laptops, and digital media
personal use: means using a service or an item only for personal reasons and goals
that do not have any relationship to the organization employing the indi-
vidual using the item or service
plain language: is the straightforward writing that enables readers of all types
and levels of education to better understand written content in any media
through which it is delivered
platform of security and privacy: means securing how data are stored, processed,
or transmitted
policy-governed secure collaboration: is the process of providing a collaborative
platform, normative requirements, and standard policies for handling data
with differing usage needs and among users in different authority domains
privacy impact assessment (PIA): is an analysis of how information is handled
by ensuring handling conforms to applicable legal, regulatory, and policy
258 ◾ Glossary
263
264 ◾ Index
Assistant Secretary of Defense for Research and Brokered identity management, 150; see also
Engineering (ASD(R&E)), 14 Federally Funded Research and
Associated data analysis, 38 Development Centers
Assured and resilient semiconductors, 142, 251
ATFM, see Air traffic flow management C
Atlanta Regional Commission (ARC), 169
Initiative projects, 169–171 CAE-CD program, 127; see also National
Attacker, advantages to, 32 Security Agency
Attack modeling, 38–39; see also Department CAN, see Controller area network
of Homeland Security cybersecurity Capability package, 124, 129, 252
research programs CAT, see Cyber Acquisition Team
Attack surface, 11, 28, 106, 251 Category, 193, 252
Attack vector, 251 CAUSE, see Cyber-Attack Automated
Automated driving, 211, 251 Unconventional Sensor Environment
Automated Indicator Sharing (AIS), 5–6; CCDC, see Collegiate Cyber Defense Challenge
see also U.S. federal government CCEVS, see Common Criteria Evaluation and
initiatives on cybersecurity research Validation Scheme
Automated Program Analysis for CCRA, see Common Criteria Recognition
Cybersecurity (APAC), 72–72; see Arrangement
also Defense Advanced Research CCSS, see Communications, Circuits, and
Projects Agency Sensing-Systems
Automated vehicle research, 199 CCTL, see Common Criteria Testing
Automotive cybersecurity, 197; see also Laboratory
Cybersecurity research for consumer CDM, see Collaborative decision making
protection CEDS, see Cybersecurity for Energy Delivery
NHTSA cybersecurity research, 198 Systems
vehicle cybersecurity protections, 198 CellRAD system, 161
AVTI, see Accessible Voting Technology Censorship resistance, 142, 252
Initiative Central Intelligence Agency (CIA), 97
CERI, see Cyber Engineering Research Institute
B CERL, see Cyber Engineering Research
Laboratory
BAA, see Broad Agency Announcements CET R&D, see Cybersecurity and Emerging
Backdoor, 251 Threats Research and Development
Back-end-of-line (BEOL), 96 CFAR, see Cyber Fault-tolerant Attack Recovery
Basic input output system (BIOS), 54 CFATS, see Chemical Facility Anti-Terrorism
BCP, see Best Current Practice Standards
BEOL, see Back-end-of-line C4 Technology Area, see Command, Control,
Berkeley Lab Data Science and Technology Computers, and Communication
Department, 161 Technology Area
Best Current Practice (BCP), 31 CFWG, see Cyber Forensics Working Group
Best practices, 31, 34, 148, 154, 251 CGC, see Computer Grand Challenge
voluntary, 209 Chat group, 252
BGP, see Border Gateway Protocol Chemical Facility Anti-Terrorism Standards
Biological Technologies Office, 68 (CFATS), 178–179
Biometrics, 70, 84, 251 Chimera, 171
brain, 139 CI, see Counterintelligence
BIOS, see Basic input output system CIA, see Central Intelligence Agency
Border Gateway Protocol (BGP), 50, 64, 251 CISE, see Computer and Information Science
Bose–Einstein condensate, 132, 142, 251 and Engineering
Brain biometrics, 139 CISR, see Cyber and Information Security
Broad Agency Announcements (BAA), 12 Research
Index ◾ 265
event, 189, 190, 193, 254 Cybersecurity usability, 217–219, 225, 247
Framework, 48–50, 186, 246 DigitalGov User Experience Program, 219
failures, 19 FTC, 221, 224
national, 148–151 handheld computers growth, 225–226
research grants, 134–140 literacy in United States, 226–231
technology area, 115 MDS usability, 221–225
Cybersecurity and Communications (CS&C), mobile threats, 221
185 NIST Usability of Cybersecurity Team,
Cybersecurity and Emerging Threats Research 215–217
and Development (CET R&D), 158 obstacles and research, 215, 231–233
Cyber Security and Information Assurance research activities, 219–220
Interagency Working Group (CSIA SUS, 218
IWG), 8 testing, 217–218
Cybersecurity for Energy Delivery Systems Cyberspace operations (CSO), 10
(CEDS), 11, 158, 244 Cy-identity, see Cyber Identity
Cybersecurity Incident Response Teams
(CSIRT), 26, 33–34; see also Talent D
development research
Cybersecurity metrics, 35, 44, 84, 254; see also DAA, see Detect and avoid
Department of Homeland Security DANE, see Domain Name System-Based
cybersecurity research programs Authentication of Named Entities
ColoRS, 35 Database Management System (DBMS), 41
Cyber Analytics, 35 Data Privacy R&D Program, 29
Cyber Economic Incentives Project, 37 DHS S&T awards, 30–31
Cyber Identity, 36 goal, 30
Cyber Security Assessment and Evaluation Data privacy technologies, 29–31; see also
Project, 37 Department of Homeland Security
enterprise-level security metrics, 35 cybersecurity research programs
SNDCD project, 36 DBMS, see Database Management System
SuperID project, 36 DCO, see Defensive cyber operations
VASA, 35–36 DDoS, see Distributed Denial of Service
Cybersecurity National Action Plan (CNAP), DDoSD, see Distributed Denial of Service
6–8; see also U.S. federal government Defense
initiatives on cybersecurity research DECIDE, see Distributed Environment for
Cybersecurity research for consumer protection, Critical Infrastructure Decision-
197, 210–211 making Exercises
automated vehicle research, 199 DEF CON, see DEFense readiness CONdition
automotive cybersecurity, 197–199 Defense Advanced Research Projects Agency
configurable embedded computer (DARPA), 8, 11, 15, 67, 83–85, 106,
systems, 202 239–241
eEnabled aircraft, 200–202 active authentication, 70–71
IoT and unmanned aircraft systems, Active Cyber Defense, 71
207–210 APAC, 71–72
medical devices and hospital networks, biometrics, 70
202–204 CFAR, 73–74
project categories for research by ASSURE, cognitive fingerprint, 71
208–209 CRASH, 73
protecting personal technologies, 204–205 CSO R&D RFI, 82–83
UAS best practices, 209 Cyber Grand Challenge, 69–70
U.S. air traffic control system, 208 DoD cybersecurity solutions, 71
U.S. Federal Trade Commission, 205–207 dubbed Mayhem, 69–70
Cybersecurity service provider (CSSP), 116 EdgeCT, 74–75
268 ◾ Index
Distributed energy resources (DER), 173 ECTB, see Extreme Cyber Test Bed
Distributed enterprise-level cyber-physical EdgeCT, see Edge-Directed Cyber Technologies
intelligence (DELPHI), 166 for Reliable Mission Communication
Distributed Environment for Critical Edge-Directed Cyber Technologies for Reliable
Infrastructure Decision-making Mission Communication (EdgeCT),
Exercises (DECIDE), 26, 34–35; see 74–75; see also Defense Advanced
also Talent development research Research Projects Agency
DNS, see Domain Name System EDS, see Energy delivery systems
DNSSEC, see Domain Name System security Education and Human Resources (EHR), 13
extensions Education Partnership Agreements (EPA), 125
DoD, see Department of Defense EEG, see Electroencephalography
DOE, see Department of Energy eEnabled, 211, 254; see also Cybersecurity
DOE-funded national laboratories, 157, research for consumer protection
174–175; see also Office of Electricity aircraft, 200–202
and Energy Reliability EFBs, see Electronic flight bags
Argonne National Laboratory, 159 EHR, see Education and Human Resources;
CEDS Program, 158 Electronic health records
CET R&D, 158 EINSTEIN-3, 3
cybersecurity research activities, 157–159 EINSTEIN and Continuous Diagnostics and
grid cybersecurity, 173 Mitigation programs, 7
Grid Modernization Laboratory EIOC, see Electricity Infrastructure Operations
Consortium, 158 Center
Human Performance Laboratory, 172 EISA, see Enterprise Information Security
Idaho National Laboratory, 159–161 Architecture
Lawrence Berkeley National Laboratory, 161 EL, see Experimentation lead
Los Alamos National Laboratory, 161–163 Election Assistance Commission (EAC), 220
National Renewable Energy Laboratory, Electricity Infrastructure Operations Center
164 (EIOC), 169
National SCADA Test Bed, 173 Electric Power Board (EPB), 161
Oak Ridge National Laboratory, 164–168 Electroencephalography (EEG), 172
Pacific Northwest National Laboratory, Electromagnetic environment (EME), 115
168–171 Electronic attack (EA), 112
Sandia National Laboratories, 171–174 Electronic flight bags (EFBs), 200
DOE/NNSA, see National Nuclear Security Electronic health records (EHR), 216
Administration EME, see Electromagnetic environment
DOE/OE, see Office of Electricity and Energy Emergency services sector (ESS), 180, 181
Reliability Energy delivery systems (EDS), 11
DOE/SC, see Office of Science Energy infrastructure, 182
Domain Name System (DNS), 51 Energy, Power, and Adaptive Systems
Domain Name System-Based Authentication of (EPAS), 13
Named Entities (DANE), 51 ENG, see Directorate of Engineering
Domain Name System security extensions Engineering and Physical Sciences Research
(DNSSEC), 51 Council (EPSRC), 36
DoS attack concepts, 32 Enhanced Attribution program, 75; see also
DSO, see Defense Sciences Office Defense Advanced Research Projects
Dubbed Mayhem, 69–70 Agency
Dubbed MegaDroid, 205 Enterprise cybersecurity R&D, 107–110
Enterprise Information Security Architecture
E (EISA), 57
Enterprise-level security metrics, 35, 44, 254
EA, see Electronic attack Entropy Engine, see Quantum random number
EAC, see Election Assistance Commission generation technology
270 ◾ Index
General Accountability Office (GAO), 55–56 HS-STEM, see Homeland Security Science,
General Electric (GE), 167 Technology, Engineering, and Math
General Services Administration (GSA), 183 Human–computer interaction (HCI), 114
Geolocation, 155, 255 Human information interaction (HII), 113, 114
GIG, see Global Information Grid Human Performance Laboratory, 172
Global Information Grid (GIG), 109, 118, 255
Global Positioning System (GPS), 68 I
Google Earth, 97
GPG, see Grant Proposal Guide IA, see Information assurance
GPS, see Global Positioning System IAA, see Information Assurance Advisories
Grant Proposal Guide (GPG), 135 IAE, see Information Assurance Education
Grid cybersecurity, 173 IALS, see International Adult Literacy Survey
Grid Modernization Laboratory Consortium, IARPA, see Intelligence Advanced Research
158, 244 Projects Activity
GSA, see General Services Administration IASD, see Infrastructure Analysis and Strategy
Division
H IC, see Intelligence Community’s
ICAS, see Integrated Cyber Analysis System
HACMS, see High-Assurance Cyber Military ICIS, see Instrumentation, Control, and
Systems Intelligent Systems
Handheld computers, growth of, 225–226 ICN, see Integrated Computing Network
Hardware root of trust, 151 ICs, see Integrated circuits
HAVA, see Help America Vote Act of 2002 ICT, see Information and Communications
HCI, see Human–computer interaction Technology
HCSS, see High-confidence software and systems IC3, see Internet Crime Complaint Center
Health Information Technology (HIT), 216 Idaho National Laboratory (INL), 159–161;
Help America Vote Act of 2002 (HAVA), 220 see also DOE-funded national
High-Assurance Cyber Military Systems laboratories
(HACMS), 76–77; see also Defense IDEA laboratory, 172
Advanced Research Projects Agency IEEE, see Institute of Electrical and Electronics
High-confidence software and systems Engineers
(HCSS), 124 IETF, see Internet Engineering Task Force
High interest NSA technologies, 126 Information and Communications Technology
HII, see Human information interaction (ICT), 228
HIT, see Health Information Technology Information assurance (IA), 3
HITRAC, see Homeland Infrastructure Threat research, 123–124
and Risk Analysis Center and Survivability Program, 67
Homeland Infrastructure Threat and Risk Information Assurance Advisories (IAA), 124
Analysis Center (HITRAC), 186 Information Assurance Education (IAE), 128
Homeland Security Advanced Research Projects Information Innovation Office (I2O), 68
Agency (HSARPA), 25 Information security continuous monitoring
Homeland Security Enterprise (HSE), 25 (ISCM), 13
Homeland Security Presidential Directive 23 Information technology (IT), 40
(HSPD-23), 2 Information Technology Laboratory (ITL), 12,
Homeland Security Science, Technology, 47–48
Engineering, and Math (HS-STEM), Infrastructure Analysis and Strategy Division
220 (IASD), 186
HSARPA, see Homeland Security Advanced Infrastructure Protection (IP), 186
Research Projects Agency Infrastructure reinforcement, 118, 255
HSE, see Homeland Security Enterprise Infringement of intellectual property, 255
HSPD-23, see Homeland Security Presidential INL, see Idaho National Laboratory
Directive 23 Innovation ecosystem, 84, 118, 255
272 ◾ Index
In-Q-Tel, 87, 97–100, 239–241; see also Internet service providers (ISPs), 38
Intelligence Advanced Research Interoperability Process Reference Manual
Projects Activity (IPRM), 57
to CIA and IC, 240 Intrinsically Secure Computing (ISC), 168
game changing capabilities, 239 IoT, see Internet of things
seeking business plans, 242 IP, see Infrastructure Protection; Internet
Insider Threat Program, 41–42; see also Protocol
Department of Homeland Security IPRM, see Interoperability Process Reference
cybersecurity research programs Manual
Install-time permissions, 233,256 ISC, see Intrinsically Secure Computing
Institute of Electrical and Electronics Engineers ISCM, see Information security continuous
(IEEE), 53 monitoring
Instrumentation, Control, and Intelligent ISPs, see Internet service providers
Systems (ICIS), 160 IT, see Information technology
Integrated circuits (ICs), 96 ITL, see Information Technology Laboratory
Integrated Computing Network (ICN), 52 ITS JPO, see Intelligent Transportation System
Integrated Cyber Analysis System (ICAS), Joint Program Office
77–78; see also Defense Advanced I2O, see Information Innovation Office
Research Projects Agency
Intelligence Advanced Research Projects J
Activity (IARPA), 8, 12, 87,
100–101, 239–241; see also Jet Propulsion Laboratory (JPL), 151–152; see
In-Q-Tel also Federally Funded Research and
areas of interest, 90 Development Centers
CAUSE, 92–96 JPL, see Jet Propulsion Laboratory
collections research, 89, 91
OSI program, 92 K
research in analysis, 88
research in anticipatory intelligence, 89 Kritikos, 171
research operations, 91
research thrusts within, 87 L
TIC Program, 96–97
USIC R&D Needs, 97 LANs, see Local Area Networks
Intelligence Community’s (IC), 12 Lawrence Berkeley National Laboratory
Intelligent Transportation System Joint (LBNL), 161; see also DOE-funded
Program Office (ITS JPO), 199 national laboratories
Interagency LBNL, see Lawrence Berkeley National
forums, 8 Laboratory
groups, 56 Legacy aircraft, 200
International Adult Literacy Survey (IALS), 227 Literacy in United States, 226; see also
International Standards Organization (ISO), Cybersecurity usability
53, 210 five levels of literacy, 228
Internet BCP 38, 31 and income scale, 231
Internet Crime Complaint Center (IC3), 2 PIAAC, 227
Internet Engineering Task Force (IETF), 50 literacy scales, 229
Internet measurement, technical approach numeracy assessment, 230
for, 39 PS-TRE, 228–229
Internet of things (IoT), 17, 28; see also Cyber- ratings for literacy, 226
Physical Systems Security Local Area Networks (LANs), 200
devices, 20 Logical narrative, 101, 256
and unmanned aircraft systems, 207–210 Long Range BAA for Navy and Marine Corps
Internet Protocol (IP), 5 Science and Technology, 112–113;
Index ◾ 273
NCPS, see National Cybersecurity Protection NPRS, see National Privacy Research Strategy
System NRECA, see National Rural Electric
Network Access Device (NAD), 51 Cooperative Association
Network Function Virtualization (NFV), 51 NREL, see National Renewable Energy
Network Identification Number (NID), 51 Laboratory
Networking and Information Technology NRO, see National Reconnaissance Office
Research and Development NSPD, see National Security Presidential
(NITRD), 8 Directive
member agencies, 14, 15 NSTC, see National Science and Technology
Next Generation Air Traffic Control system Council
(NextGen system), 200 NSTIC, see National Strategy for Trusted
Next-generation Internet (NGI), 50 Identities in Cyberspace
Next-Generation Internet Architectures NSTIC NPO, see National Strategy for Trusted
(NGIA), 52, 65, 257 Identities in Cyberspace National
Next Generation Secure Scalable Program Office
Communication Network, 167 Numeracy assessment items, 230
NextGen system, see Next Generation Air NVLAP, see National Voluntary Laboratory
Traffic Control system Accreditation Program
NFV, see Network Function Virtualization
NGI, see Next-generation Internet O
NGIA, see Next-Generation Internet
Architectures Oak Ridge National Laboratory (ORNL),
NHTSA, see National Highway Transportation 164–168; see also DOE-funded
Safety Administration national laboratories
NIAP, see National Information Assurance Observe-Orient-Decide-Act (OODA), 169
Partnership OCIA, see Office of Cyber and Infrastructure
NICE, see National Initiative for Cybersecurity Analysis
Education OECD, see Organization for Economic
NID, see Network Identification Number Cooperation and Development
NIH, see National Institutes of Health OEMs, see Original Equipment Manufacturers
NIPP, see National Infrastructure Protection Office of Cyber and Infrastructure Analysis
Plan (OCIA), 186
NISAC, see National Infrastructure Simulation Office of Electricity and Energy Reliability
and Analysis Center (DOE/OE) , 11, 15, 157
NIST Interagency or Internal Reports CEDS Program, 244
(NISTIRs), 53 Office of Management and Budget
NISTIRs, see NIST Interagency or Internal (OMB), 3, 15
Reports Office of Naval Research (ONR), 13–14,
NIST Usability of Cybersecurity Team, 215; see 106–107
also Cybersecurity usability Office of Science (DOE/SC), 15
accessibility barriers to HIT devices, 217 Office of Science and Technology Policy
objectives of research, 216 (OSTP), 8, 15
research program, 216 Office of the National Coordinator (ONC),
NITRD, see Networking and Information 15, 216
Technology Research and Office of the Secretary of Defense (OSD), 8,
Development 14, 15
NITRD/NCO, see National Coordination programs, 106
Office for Networking and OMB, see Office of Management and Budget
Information Technology Research Online Safety for the Ages (OSA), 135
and Development ONR, see Office of Naval Research
NOAA, see National Oceanic and Atmospheric Ontology, 65, 257
Administration OODA, see Observe-Orient-Decide-Act
276 ◾ Index
Open Source Indicators program (OSI PLC, see Programmable Logic Controllers
program), 92 PMUs, see Phasor measurement units
Open Source Software Releases (OSS), 126 PNT systems, see Position navigation and
Organization for Economic Cooperation and timing systems
Development (OECD), 227 Pocket Security Smartphone Cybercrime,
Original Equipment Manufacturers 137; see also National Science
(OEMs), 200 Foundation
ORNL, see Oak Ridge National Laboratory Policy-governed secure collaboration,
OSA, see Online Safety for the Ages 129, 257
OSD, see Office of the Secretary of Defense Position navigation and timing systems (PNT
OSI program, see Open Source Indicators systems), 115
program PPD-21, see Presidential Policy Directive-21
OSS, see Open Source Software Releases Presidential Policy Directive-21 (PPD-21), 9
OSTP, see Office of Science and Technology Pretty Good Privacy (PGP), 51
Policy Privacy-enhanced identity federation, 150
OT, see Other Transaction Problem solving in technology-rich
Other Transaction (OT), 110; see also U.S environments (PS-TRE), 228
military cybersecurity R&D Processing Exploitation Dissemination
agreements for prototype projects, 113 (PED), 114
ARL, 113 Program for the International Assessment of
cybersecurity technology area, 115 Adult Competencies (PIAAC), 227
goal of, 114 literacy scales, 229
HII technology area, 114 numeracy assessment items, 230
PS-TRE scale, 229
P Programmable Logic Controller Logic Audit
Control (PLAC), 165
Pacific Northwest National Laboratory Programmable Logic Controllers (PLC), 165
(PNNL), 36, 168–171; see also DOE- Proposal and Award Policies and Procedures
funded national laboratories Guide (PAPPG), 135
PAPPG, see Proposal and Award Policies and Protection profile, 61
Procedures Guide PSTN, see Public switched telephone network
Patent License Agreements (PLA), 125 PS-TRE, see Problem solving in technology-rich
PathScan, 163 environments
PED, see Processing Exploitation Dissemination Public-private partnerships, 23, 258
Personal identity verification (PIV), 149 Public safety, 6, 48
Personally identifiable information (PII), in cybersecurity, 160
3, 23, 257 issues, 258
Personal mobile technologies, 204–205, 211; networks, 53
see also Cybersecurity research for to operate UAS, 208
consumer protection tactical teams, 181
Personal technologies, 85, 257 Public switched telephone network (PSTN),
protecting, 204–205 162
PGP, see Pretty Good Privacy Push-to-Talk application, 72
Phasor measurement units (PMUs), 173
PIAAC, see Program for the International Q
Assessment of Adult Competencies
PII, see Personally identifiable information QKD, see Quantum key distribution
PIV, see Personal identity verification QoS, see Quality of service
PLA, see Patent License Agreements Quality of service (QoS), 59
PLAC, see Programmable Logic Controller Quantum key distribution (QKD), 167
Logic Audit Control Quantum random number generation
Plain language, 205, 221, 257 technology, 163
Index ◾ 277