FY98 Program Element Descriptive Summaries / RDDS

0303140F Information Systems Security Program

COST ($ In Thousands) FY 1996 Actual FY 1997 Estimate FY 1998 Estimate FY 1999 Estimate FY 2000 Estimate FY 2001 Estimate FY 2002 Estimate FY 2003 Estimate Cost to Complete Total Cost
Total Program Element (PE) Cost 10,381 6,548 5,298 6,589 6,337 5,634 5,391 5,515 Continuing TBD
7820 Computer Security RDT&E: Firestarter 10,381 6,549 3,561 4,550 5,044 5,634 5,391 5,515 Continuing TBD
4585 Cryptologic 2020 0 0 1,737 2,039 1,293 0 0 0 TBD TBD
Quantity of RDT&E Articles 0 0 0 0 0 0 0 0 0 0

(U) A. Mission Description and Budget Item Justification

This program provides the capability to protect and defend USAF Command, Control, Communications, and Intelligence, Surveillance, and Reconnaissance (C4ISR) and Weapon Systems from IW attacks and recover from those attacks. The program element consists of two complementary projects. The computer security project directs the R&D of Information Protection technology and tools to defend AF C4ISR systems, with emphasis on computer and network systems security, risk management, and multi-level systems security. This project focuses on protection and defense of the Air Force, Joint, National, and Defense Information Infrastructures. This R&D provides adequate access control, integrity, assured services and meets warfighter's requirements. The Cryptologic 2020 project comprises R&D for the Air Force Electronic Key Management System (AFEKMS). The AFEKMS, in concert with NSA's EKMS, provides a secure and flexible capability for the electronic generation, distribution, and management of key material, voice callwords, and Communications Security (COMSEC) publications for the F-22. AFEKMS replaces the existing physical distribution and management system providing COMSEC KEYS for USAF Information Protection. The Air Force unique AFEKMS software is required because the production software developed by NSA can not provide the capabilities to distribute the system keys in the format needed by the F-22 Mission Support System.

This program is in budget activity 7 - Operational System Development, because it addresses the development and transition of information security, protection and defensive capabilities and technologies to protect, detect, respond to, and defend against information attack by new and emerging IW threats

(U) B. Program Change Summary ($ in Thousands)
FY 1996 FY 1997 FY 1998 FY 1999 Total

Cost

(U) FY 1997 Previous President's Budget 11,261 6,900 4,978 4,581 TBD
(U) Appropriated Value 11,261 6,900
(U) Adjustments to Appropriated Value
a. Cong Reductions (414) (182)
b. SBIR (236)
c. Omnibus or Other Above Threshold Reprogram
d. Below Threshold Reprogramming (7)
e. Rescissions (223)
(U) Adjustments to Budget Years Since FY 1997 PB 320 2,008
(U) FY 1998 President's Budget 10,381 6,548 5,298 6,589 TBD

(U) Change Summary Explanation:

Funding:

FY96: Actual reductions (thousands) consist of general Congressional reductions, SBIR, BTR, and rescissions. FY97: Actual reductions (thousands) consist of general Congressional reductions and RDT&E for innovative small business research.

FY98 and FY 99: Funds for this on-going project were converted from 3080 to 3600 within this program element.

Schedule:

Delays completion and start of numerous Firestarter Project research efforts until FY99, including such as planned emissions security, communications security, computer security. Curtails the capability to keep pace with new and emerging IW threats and meet mission needs. Delays the insertion of essential technology into AF systems. Extends the window of vulnerability that would allow an adversary to exploit and degrade AF and other warfighting units in performing their missions. Specific impacts are: delays transition of intrusion detection technology into the Base Network Control Center (BNCC) multi-level security and secure distributed operations for the F-22 Mission Planning System, and Secure Data Handling System security for the distributed AOC. Delays start of voice callword automation until FY99.

Technical:

None.

:(U) C. Other Program Funding Summary ($ in Thousands) Related RDT&E:

(U) For research and development efforts pursued under Program Element (PE) 33140F there is complementarywork being performed under PE 35167G which addresses the development of generic technology in the area of information security. Products from PE 33140F transition to other agencies through PE 64740F Computer Resource Management Technology Transition

(U) D. Schedule Profile: See Individual Project Schedules
COST ($ In Thousands) FY 1996 Actual FY 1997 Estimate FY 1998 Estimate FY 1999 Estimate FY 2000 Estimate FY 2001 Estimate FY 2002 Estimate FY 2003 Estimate Cost to Complete Total Cost
7820 Computer Security RDT&E: Firestarter 10,381 6,549 3,561 4,550 5,044 5,634 5,391 5,515 Continuing TBD

(U) A. Mission Description and Budget Item Justification

This program directs the Research & Development (R&D) of Information Protect technology/tools to provide the capability to defend USAF Command, Control, Communications, Computer and Intelligence (C4I) Systems from Information Warfare (IW) Cyber attacks and to recover from those attacks. As the USAF single manager for Information Protect (R&D), this program directs C41 system Information Protect R&D with emphasis in computer/network systems security, risk management and multi-level system security. With the advent of the information age, the battlefield commander's ability to fight and win becomes more dependent upon the availability, timeliness, and integrity of the information flow/processing capability available. The requirement for global presence and global power has demanded increasing reliance on these advanced information systems with global accessibility. The susceptabilities inherent in such reliance and accessibility has heightened the awareness that the National Information Infrastructure (NII) and Defense Information Infrastructure (DII) must be protected against attack.

Emphasis is therefore placed on R&D areas that provide deterrence of attack through cyberspace surveillance, Tactical Indications & Warning (I&W), intrusion detection and characterization of attack. As adversaries may gain access to critical US information systems through a variety of means, including the Internet, other dial-up connections, and DSNET, this technology will provide the capability of collecting, integrating and displaying threat, vulnerability, and system data indicating an attack is about to take place and/or is taking place. As an integral part of a Joint Information Protection architecture, countermeasure technology will also be developed to prevent, contain and recover from such attacks. It is also imperative that these information protection mechanisms be developed in conjunction with commercial enterprises in order to transition this important technology to enterprise networks which may become launching places for IW attacks. These launching places provide opportunities to monitor networks, alter critical information, deny or degrade service, and destroy penetrated systems, within the DII and the NII.

Also, R&D is required in automated risk management/vulnerability assessment processes because the Air Force does not currently have the automated assessment, planning, and decision tools to support prudent Information Operations risk management. Summarizing, this program is in budget activity 7-Operational System Development, Research category 6.7, because it addresses the development and transition of communications and computer network Information Protection and risk management technologies/tools in order to protect, detect, defend, and respond to information attack against Base Network Control Centers (BNCCs) and the National/Defense Information Infrastructure.

(U) FY 1996 ($ in Thousands):
(U) $3966 Continue development of Air Force Electronic Key Management System
(U) $1500 Complete development of Trusted Rubix
(U) $719 Complete Joint Service secure distributed computing experiments
(U) $450 Initiate development of analysis tools for Base Information Protection
(U) $410 Develop security architecture for Air Force Mission Support System
(U) $1363 Continue development of technology for adaptive voice/data networks
(U) $1324 Develop network security interfaces for Theater Battle Management
(U) $649 Continue development of security interfaces for Theater Battle Management
(U) $10,381 Total

(U) FY 1997 ($ in Thousands):
(U) $230 Initiate development of secure data handling system for F-22 Integrated Weapon System (IWS) Data Base
(U) $545 Develop mechanisms to protect databases from IW attacks
(U) $545 Continue development of security analysis tools for Base Information Protection
(U) $710 Initiate development of secure interoperable distributed computing system
(U) $1100 Prototype adaptive voice/data networks
(U) $250 Initiate effort to develop technology for secure distributed collaborate planning
(U $150 Initiate effort to transition DARPA intrusion detection technology to Air Force Information Warfare Center (AFIWC)
(U) $400 Initiate effort to demonstrate INFOSEC for Air Force Mission Support System
(U) $2618 Complete development of Air Force Electronic Key Management System
(U) $6,548 Total

(U) FY 1998 ($ in Thousands):
(U) $430 Continue development of secure interoperable distributed computing system
(U) $430 Prototype security analysis tools for Base Information Protection
(U) $430 Continue effort to transition DARPA intrusion detection technology to AFIWC ( BNCC/BIP)
(U) $430 Continue effort to transition INFOSEC technology into Base Network Control Center
(U) $430 Continue development of secure distributed collaborative planning system
(U) $550 Continue investigation of techniques for commercial software evaluation
(U) $861 Develop prototype of secure wrapper to protect COTS software
(U) $3,561 Total

(U) FY 1999 ($ in Thousands):
(U) $256 Continue development of secure data handling system for F-22 IWS DB
(U) $780 Continue development of secure interoperable distributed computing system
(U) $770 Continue development of technology for self-healing network system
(U) $744 Develop methodology for commercial software evaluation
(U) $510 Complete effort to transition DARPA intrusion detection technology to AFIWC
(U) $490 Complete effort to transition INFOSEC technology to Base Network Control Center
(U) $500 Initiate effort to transition secure wrapper technology into air Force systems
(U) $500 Initiate effort for automatic capability to trace source of intrusions
(U) $4,550 Total

(U) B. Program Change Summary ($ in Thousands)
FY 1996 FY 1997 FY 1998 FY 1999 Total Cost
(U) Previous President's Budget (FY97) 11,261 6,900 4,978 4,581 TBD
(U) Appropriated Value 11,261 6,900
(U) Adjustments to Appropriated Value
a. Cong Reductions (414) (182)
b. SBIR (236)
c. Below Threshold Reprogramming (7)
d. Rescissions (223)
(U) Adjustments to Budget Years Since FY 1997 PB TBD
a. Program execution decisions (1,400)
b. Small business RDT&E (170)
c. Other AF requirements (17) (31)
(U) Current Budget Submit/FY98 PB 10,381 6,548 $3,561 4,550 TBD

(U) Change Summary Explanation:

Funding:

FY96: Actual reductions (thousands) consist of general Congressional reductions, SBIR, BTR, and rescissions.

Schedule:

Delays completion and start of numerous Firestarter Project research efforts until FY99, including such as planned emissions security, communications security, computer security. Curtails the capability to meet mission needs. Delays the insertion of essential technology into AF systems. Extends the window of vulnerability that would allow an adversary to exploit and degrade AF and other warfighting units in performing their missions. Specific impacts are: delays transition of intrusion detection technology into the BNCC,multi-level security and secure distributed operations for the F-22 Mission Planning System, and Secure Data Handling System security for the distributed AOC.

Technical:

FY98:

Adjustments deletes critical analysis, assessment, and decision support tools for Defensive IW and F-22 software applications

(U) C. Other Program Funding Summary ($ in Thousands)

Not Applicable

(U) D. Schedule Profile

FY96 FY97 FY98 FY99
1 2 3 4 1 2 3 4 1 2 3 4 1 2 3 4
(U) Requirements Review Board X X X X
(U) Secure x.500 Directory Server X
(U) AFMSS Security Architecture X
(U) BNCC INFOSEC Transition X X
(U) Adaptive Voice/Data Network Demonstrations X X
(U) Secure Wrapper Development X
(U) Self-Healing Network Demonstration X
(U) F-22 IWS DB X X
(U) Secure Interoperable Distributed Computing System X X
(U) Trusted Rubix X
(U) Theater Battle Management Secure Interfaces X X




COST ($ In Thousands) FY 1996 Actual FY 1997 Estimate FY 1998 Estimate FY 1999 Estimate FY 2000 Estimate FY 2001 Estimate FY 2002 Estimate FY 2003 Estimate Cost to Complete Total Cost
4585 Cryptologic 2020 0 0 1,737 2,039 1,293 0 0 0 TBD TBD

(U) A. Mission Description and Budget Item Justification

The Cryptologic project consists of the Air Force Electronic Key Management System (AFEKMS). This project was transferred from 3080 in PE 33140F to 3600 in 33140F to consolidate and realign efforts under the proper RDT&E program and appropriation. This project is not a new start because these efforts were previously conducted using Other Procurement, Air Force funds within the same Program Element designation. During the FY98 POM, these funds were converted from 3080 to 3600 within the same PE for the same project. AFKEMS, in concert with NSA's EKMS, provides a secure and flexible capability for the electronic generation, distribution, accounting, and management of key material, voice callwords, and Communications Security (COMSEC) publications for the F-22 and all AF weapon systems. AFEKMS replaces the existing physical distribution and management system providing USAF Information Protection. Information Protection emphasizes access control, multi-level secure databases, trusted computing and information integrity. AFEKMS is a three tier system structured in a hierarchical arrangement. This tiered structure provides "wholesale" to "retail" to "consumer" capability to distribute, manage, and account for COMSEC keying material. Tier 1 installations comprises the "wholesale" capability. Tier 2 installations comprises the distribution network and tier 3 comprises the "retail locations" where keying material leaves the AFEKMS and enters the End Item COMSEC Equipment (EICE), --the consumer.

Acquisition includes Commercial off-the Shelf (COTS) computers and software, contractor developed application software, Government furnished equipment (GFE) and software such as the NSA's Local COMSEC Management Software (LCMS). Also, USAF developed user application software (UAS) is necessary for unique systems such as the F-22 and unique key fill requirements of EICE for other airborne platforms. The F-22 platform employs KOV-5 modules and uses three types of keys (system keys and codes, traffic keys, and Firefly session keys and parameters). Using a Data Transfer Device (DTD), these keys are loaded directly into the KOV-5 and ground based KS-5 using a Firefly process. The F-22 employs a unique process for getting cryptographic keys into the KOV-5 onboard the F-22 platform. The production software developed by NSA can not provide the capabilities to distribute the system keys in the format needed by the F-22 Mission Support System.

(U) FY 1996 ($ in Thousands):
(U) $0
(U) $0 Total

(U) FY 1997 ($ in Thousands):
(U) $0
(U) $0 Total

(U) FY 1998 ($ in Thousands):
(U) $1487 Continue LCMS application software development (F-22)
(U) $250 Continue DTD software Development
(U) $1,737 Total

(U) FY 1999 ($ in Thousands):
(U) $250 Initiate Voice Callword software development
(U) $1489 Continue LCMS application software development (F-22)
(U) $300 Continue DTD software development and system integration
(U) $2,039 Total

(U) B. Program Change Summary ($ in Thousands)
FY 1996 FY 1997 FY 1998 FY 1999 Total Cost
(U) FY 1997 President's Budget 0 0 0 0 TBD
(U) Appropriated Value
(U) Adjustments to Appropriated Value
a. Cong Reductions
b. SBIR
c. Omnibus or Other Above Threshold Reprogram
d. Below Threshold Reprogramming
(U) Adjustments to Budget Years Since FY 1997 PB 0 0 3,250 2,050 TBD
a. Realignment of Cryptologic 2020 project (1,500)
b. Other AF requirements (13) (11)
(U) Current Budget Submit/FY98 PB 0 0 1,737 2,039 TBD






(U) Change Summary Explanation:

Funding:

FY98 and FY99:

$3.25 million (FY98) and $2.05 million (FY99) transfered from 3080 funds in this PE to develop application software that would manage and distribute cryptographic key material for the F-22 and voice callword automation.

FY98:

A $1.5 million reduction assesed to this project due internal budget realignment.

Schedule:

FY98:

Delays Voice Callword Automation project until FY99.

Technical:

None

(U) C. Other Program Funding Summary ($ in Thousands)





(U) D. Schedule Profile

FY 1996 FY 1997 FY 1998 FY 1999
1 2 3 4 1 2 3 4 1 2 3 4 1 2 3 4
(U) Requirements Review Board X X X X
(U) Initiate Voice Callword Development X
(U) Complete F-22 UAS Development X
(U) Initiate other LCMS UAS software Development X
(U) Initiate DTD UAS Development X
(U) Complete Voice Callword Software X X