Price: $3,999.00

Length: 4 Days
Print Friendly, PDF & Email

Link 16 Cybersecurity Crash Course

Link 16 is a military tactical data link network designed to provide warfighters operating on land, in the air and at sea with secure, anti-jam Line-of-Sight (LoS) communications.

As such, Link 16 advances situational awareness in the chaos of battle. Needless to say, Link 16 cybersecurity is essential so data between allies does not become known to adversaries.

A great deal of Link 16’s success is due to the stringent cybersecurity safeguards built into Link 16. Obviously, one area of great concern is the potential vulnerability of tactical data links (TDL) such as Link 16, a communications system that delivers crucial exchange of situational awareness among U.S., NATO and Coalition forces inside the chaos of a battlespace.

In Link 16, both the message and the transmission are encrypted. The message is encrypted by the encryption device for JTIDS (Joint Tactical Information Distribution System) in accordance with a crypto variable specified for message security or MSEC (message encryption).

Transmission security or TSEC (transmission encryption), is provided by the same crypto variable or by a second crypto variable, which controls the specifics of the JTIDS/MIDS (Multifunctional Information Distribution System) wave form. For MIDS, the MSEC and TSEC are provided by a circuit board embedded in the terminal.

But advocates are calling for even greater Link 16 cybersecurity as this important data link branches out into even more advanced applications.

One of those developing Link 16 technological advances is a LEO (Low Earth Orbit) constellation satellite with Link 16 capabilities. Connecting the satellites to Link 16 terminals would give a new global reach to Link 16’s reliable and widely deployed tactical communications system. 

To assure continuous secure and uninterrupted communications, compulsory Link 16 protocol updates are implemented as needed across the network, with system sunset dates pre-announced to all network participants so they can update their various platforms’ equipment and procedures effectively

In contrast to other communications link waveforms, Link 16 improves security, jam resistance, and situational awareness, while also increasing data throughput and the capacity of information exchanged. In addition, Link 16 provides secure voice capability, relative navigation capability, and precise participant location and identification.

Link 16 Cybersecurity Crash Course by Tonex

Link 16 Cybersecurity Crash Course covers Link 16 TDL operational security and cybersecurity requirements for managing and exchanging Link 16 data. Learn about security of Link 16 and datalink implementations needs to interoperate STANAG 5602 Standard Interface for Multiple Platform Link Evaluation (SIMPLE) Link 16 standard (Reference 8) protocol. Learn how to analyze security and cybersecurity at node and message level model for various JTIDS J-messages messaging.

Our Link 16 cybersecurity program will  teach you:

  • Link 16 Security Features and Policies
  • How to administer, manage, and troubleshoot hardware, software, or services for single, mixed and multi-user Link-16 environments
  • Use cybersecurity measures for Link 16 operations.
  • Link 16 Joint key management Policies and Plans
  • Procedures for production, distribution, and use of Link 16 COMSEC keying material (KEYMAT) for legacy and crypto modernized Link 16 systems
  • Joint Multi-Tactical Data Link (TDL) Operating Procedures
  • National Security Agency (NSA) security doctrine associated with Link 16 devices
  • Link 16 Vulnerabilities and Mitigation

At TONEX, your Link-16 Security and Cybersecurity training class experience is reinforced with hands-on instruction and practices. Plan and architect Operational Link-16 networks, and design and implement Link 15 network security plans to keep hackers at bay and networks secure including:

  • Maintain Link 16 network hardware and software
  • Evaluate Link 16  problems and monitor network to ensure its availability to operation and users
  • Identify Link-16 and TDL needs and use that information to design, interpret, and assess Link 16 network requirements
  • Plan, coordinate, and implement Link 16 network security measures
  • Tools and Techniques to monitor Link 16 networks for security breaches

Further develop knowledge in the following Link-16 areas:

  • Link-16 Ethical and Professional Practices
  • Link-16 Logic and Decision Processes; Troubleshooting; Problem Resolution
  • Link-16 Risk Management
  • Protection of Sensitive Link-16 Information by Preventing, Detecting, and Responding to Cybersecurity Attacks

Topics Covered:

Introduction of Link 16

  • General Link-16 Information
  • Link 16 architecture
  • Link 16 Terminals, Users, and Associated Platforms
  • Joint Tactical Information Distribution System(JTIDS) (AN/URC-107 Series)
  • Multifunctional Information Distribution System (MIDS) Low-Volume Terminal (LVT) (AN/USQ-140 Series) sets
  • MIDS Joint Tactical Radio System (JTRS) sets

Introduction to Link-16 Network and Information Security

  • Cryptographic Variable Logic Label (CVLL)
  • Link 16 Security Architecture
  • CVLL by the Joint Interface Control Officer (JICO)
  • Role of Operational Tasking Data Link (OPTASK LINK) Message
  • Basic Link-16 Security
  • Encryption including TRANSEC and Message Encryption (MSEC)
  • Partitioned Variable Mode (PVM) NPG
  • One variable for CVM NPG
  • Link 16 and functional mission areas
  • Joint theater air and missile defense
  • Attack operations
  • Counter-air
  • Interdiction
  • Suppression of enemy air defenses
  • Close air support
  • Time-critical targeting prosecution
  • Secure Data Unit
  • COMSEC Requirements
  • Link 16 Networks Protection
  • COMSEC Equipment and KEYMAT
  • Procedure to Load an Unencrypted ECU KEK into Link 16 Equipment
  • Procedure to Load Either an Encrypted ECU KEK or a TEK
  • Operational Link 16 Key Allocation

Link-16 Security Management

  • Link-16 Security Classification
  • J-Series Messages
  • Link-16 Crypto
  • Transition to Modernized Crypto
  • System Description
  • Key Loading Devices
  • Key Distribution for Link 16

Link-16 Key Management Infrastructure 

  • Electronic Key Management System
  • Key Ordering Parameters for KMI and EKMS
  • Joint Key Management Plan Procedures
  • Key Management Responsibilities
  • Key Generation
  • Key Distribution
  • Key Storage
  • Key Loading
  • Crypto Periods
  • Compromise Procedures
  • Operational Tasking Data Link
  • Transition to Modernized Crypto
  • CJCSI 651002D directs DoD to perform Link 16 Crypto
  • Modernization for all DoD users and must also be extended to Allied and compatibility with legacy Link 16 equipment

Link-16  Penetration Test

  • Link 16 Digital Forensics
  • Link 16 Information Assurance and Security
  • Link 16 Network Defense
  • What is a Link-16 Penetration Test?
  • Vulnerability Scan
  • Link 16 Security Assessment
  • Effectiveness of Link 16 security controls against
  • Compliance audits
  • Controls and correct configurations
  • Determining the feasibility of a particular set of Link 16 attacks
  • Higher-risk vulnerabilities
  • Lower-risk vulnerabilities exploited in a particular sequence
  • Assessing the magnitude of potential operational impacts of successful attacks
  • Testing the ability of Link 16 network defenders
  • Post security incident

Link 16 Cybersecurity Crash Course

Request More Information

Please enter contact information followed by your questions, comments and/or request(s):
  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.