Instrumented Range Data Security

The US military is actively replacing aging live-fire training infrastructures with a modern suite of digital capabilities for applications such as the Army’s Instrumented Ranges (IR) program. Such programs address emerging doctrinal requirements and enable new techniques to train, evaluate and stress today’s soldiers and their modern equipment in realistic train-as-you-fight environments. The Instrumented Ranges utilize the combat system’s capabilities and digitally integrate them to manage forces undergoing individual and collective live-fire training and qualification exercises.

In addition to challenging the war fighters participating in the training, these state-of-the-art ranges bring new challenges for Information Assurance personnel responsible for the confidentiality, integrity and availability of the classified information being generated. With the limitations of traditional security methods – such as bandwith bottlenecks of encryption and costly construction of hardened carrier protected distribution systems (PDS) – network managers are seeking effective alternatives.

The INTERCEPTOR™ Optical Network Security System is an authorized method of monitoring the optical cables transmitting digital, instrumented range data from the exercise site to the training facilities. By monitoring only two fibers, an entire cable up to 144 fibers is protected against intrusion. Any attempt to penetrate the cable, along its entire path, is immediately detected and reported to security forces.

For very long distance applications, combining the INTERCEPTOR with an optical time domain reflectometer (OTDR) allows IA personnel to pinpoint the location of the intrusion. The benefits of this method are significant:

  • Elimination of expensive, bandwidth-constraining encryption devices and the cumbersome requirements for managing them
  • Elimination of expensive video compression equipment
  • Full bandwidth availability up to 10G and beyond
  • Availability of every fiber in the cable for secure transmission by monitoring just two fibers – versus encryption, which requires an encryptor for every two fibers being used for secure transmissions
  • Plug-and-play installation

 

Comments are closed.