Length: 4 Days
Link 16 Cybersecurity Crash Course
Emphasis on Link 16 cybersecurity has made it a favorite among militaries in the U.S. and its allies.
In fact, Link 16 is the standard by which other systems are measured for secure, airborne situational awareness. Link 16 cybersecurity has been credited by the U.S. Air Force as a key factor for saving lives in multiple theaters due to the increased situational awareness the system provides.
One key factor that contributes to link 16 cybersecurity is that Link 16 terminals currently use a variety of cryptographic solutions, called out in the terminal specifications as a secure data unit (SDU), which are all cryptographically compatible.
The SDU provides both transmission security (TRANSEC) and communications security (COMSEC) for message security (MSEC).
In TRANSEC security, each Link 16 terminal can operate on any one of 127 selected nets with each net defined by a distinct pseudo-random frequency hopping pattern, increasing resistance to jamming and exploitation.
With MSEC, Link 16 messages are transmitted via data blocks and encrypted using an MSEC key assigned by the Link 16 network initialization parameters. Traffic Encryption Keys (TEKs) provide Link 16 MSEC. Also Link 16 design allows for the use of TEKs not tied to a TSEC operation by using the PVM.
Additionally, Traffic Encryption Key (TEK) is used for all transmission security (TSEC) and message security (MSEC) operations. The TEK used in legacy equipment is also used in modernized equipment for interoperability. A standard Key Encryption Key (KEK) type is used to encrypt and decrypt TEK in legacy equipment during distribution, issue and key loading to decrease risk of exploitation.
In recent years with the advent of evolving digitalization, cybersecurity has become an even greater concern in the usage of new Link 16 aspects.
Consequently, the DOD has devoted considerable time and resources shoring up Link 16 against potential cyber-attacks. This includes using jam resistant technology and Cryptographic Variable Logic Labels (CVLL).
Link 16 Cybersecurity Crash Course by Tonex
Link 16 Cybersecurity Crash Course covers Link 16 TDL operational security and cybersecurity requirements for managing and exchanging Link 16 data. Learn about security of Link 16 and datalink implementations needs to interoperate STANAG 5602 Standard Interface for Multiple Platform Link Evaluation (SIMPLE) Link 16 standard (Reference 8) protocol. Learn how to analyze security and cybersecurity at node and message level model for various JTIDS J-messages messaging.
Our Link 16 cybersecurity program will teach you:
- Link 16 Security Features and Policies
- How to administer, manage, and troubleshoot hardware, software, or services for single, mixed and multi-user Link-16 environments
- Use cybersecurity measures for Link 16 operations.
- Link 16 Joint key management Policies and Plans
- Procedures for production, distribution, and use of Link 16 COMSEC keying material (KEYMAT) for legacy and crypto modernized Link 16 systems
- Joint Multi-Tactical Data Link (TDL) Operating Procedures
- National Security Agency (NSA) security doctrine associated with Link 16 devices
- Link 16 Vulnerabilities and Mitigation
At TONEX, your Link-16 Security and Cybersecurity training class experience is reinforced with hands-on instruction and practices. Plan and architect Operational Link-16 networks, and design and implement Link 15 network security plans to keep hackers at bay and networks secure including:
- Maintain Link 16 network hardware and software
- Evaluate Link 16 problems and monitor network to ensure its availability to operation and users
- Identify Link-16 and TDL needs and use that information to design, interpret, and assess Link 16 network requirements
- Plan, coordinate, and implement Link 16 network security measures
- Tools and Techniques to monitor Link 16 networks for security breaches
Further develop knowledge in the following Link-16 areas:
- Link-16 Ethical and Professional Practices
- Link-16 Logic and Decision Processes; Troubleshooting; Problem Resolution
- Link-16 Risk Management
- Protection of Sensitive Link-16 Information by Preventing, Detecting, and Responding to Cybersecurity Attacks
Topics Covered:
Introduction of Link 16
- General Link-16 Information
- Link 16 architecture
- Link 16 Terminals, Users, and Associated Platforms
- Joint Tactical Information Distribution System(JTIDS) (AN/URC-107 Series)
- Multifunctional Information Distribution System (MIDS) Low-Volume Terminal (LVT) (AN/USQ-140 Series) sets
- MIDS Joint Tactical Radio System (JTRS) sets
Introduction to Link-16 Network and Information Security
- Cryptographic Variable Logic Label (CVLL)
- Link 16 Security Architecture
- CVLL by the Joint Interface Control Officer (JICO)
- Role of Operational Tasking Data Link (OPTASK LINK) Message
- Basic Link-16 Security
- Encryption including TRANSEC and Message Encryption (MSEC)
- Partitioned Variable Mode (PVM) NPG
- One variable for CVM NPG
- Link 16 and functional mission areas
- Joint theater air and missile defense
- Attack operations
- Counter-air
- Interdiction
- Suppression of enemy air defenses
- Close air support
- Time-critical targeting prosecution
- KEYMAT
- Secure Data Unit
- COMSEC Requirements
- Link 16 Networks Protection
- COMSEC Equipment and KEYMAT
- Procedure to Load an Unencrypted ECU KEK into Link 16 Equipment
- Procedure to Load Either an Encrypted ECU KEK or a TEK
- Operational Link 16 Key Allocation
Link-16 Security Management
- Link-16 Security Classification
- J-Series Messages
- Link-16 Crypto
- Transition to Modernized Crypto
- System Description
- Key Loading Devices
- Key Distribution for Link 16
Link-16 Key Management Infrastructure
- Electronic Key Management System
- Key Ordering Parameters for KMI and EKMS
- Joint Key Management Plan Procedures
- Key Management Responsibilities
- Key Generation
- Key Distribution
- Key Storage
- Key Loading
- Crypto Periods
- Compromise Procedures
- Operational Tasking Data Link
- Transition to Modernized Crypto
- CJCSI 651002D directs DoD to perform Link 16 Crypto
- Modernization for all DoD users and must also be extended to Allied and compatibility with legacy Link 16 equipment
Link-16 Penetration Test
- Link 16 Digital Forensics
- Link 16 Information Assurance and Security
- Link 16 Network Defense
- What is a Link-16 Penetration Test?
- Vulnerability Scan
- Link 16 Security Assessment
- Effectiveness of Link 16 security controls against
- Compliance audits
- Controls and correct configurations
- Determining the feasibility of a particular set of Link 16 attacks
- Higher-risk vulnerabilities
- Lower-risk vulnerabilities exploited in a particular sequence
- Assessing the magnitude of potential operational impacts of successful attacks
- Testing the ability of Link 16 network defenders
- Post security incident
Link 16 Cybersecurity Crash Course