MINUTES OF THE 15 FEBRUARY 1985 MEETING OF THE NTISSC

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP87M00220R000100170025-6
Release Decision: 
RIPPUB
Original Classification: 
U
Document Page Count: 
52
Document Creation Date: 
December 27, 2016
Document Release Date: 
November 23, 2010
Sequence Number: 
25
Case Number: 
Publication Date: 
March 4, 1985
Content Type: 
MEMO
File: 
AttachmentSize
PDF icon CIA-RDP87M00220R000100170025-6.pdf2.15 MB
Body: 
Declassified in Part - Sanitized Copy Approved for Release'2013/03/18 : CIA-RDP87M00220Ik000100170025-6 TO: EXECUTIVE SECRETARIAT ROUTING SLIP ACTION INFO DATE INITIAL 1 DC1 2 DDCI 3 EXDIR V 0 .7 D/ICS 'V DDI 6 DDA X 7 DDO 8 DDS&T 9 Chm/NIC 10 GC 11 IG 12 Compt 13 D/Pers 14 D/OLL 15 D/PAO 16 SA/IA 17 AO/DCI 18 C/IPD/OIS 19N10 20 21 22 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 STAT NTISSC OFFICE OF THE EXECUTIVE SECRETARY NATIONAL TELECONNIUNICAT10?4 AND INFOSUAAT1011 SYSTEMS WWWW =WWTTEE NTISSC 10-85 4 March 1985 MEMORANDUM FOR THE MEMBERS AND OBSERVERS, NATIONAL TELECOMMUNICATIONS AND INFORMATION SYSTEMS SECURITY COMMITTEE )6S1? SUBJECT: Minutes of the 15 February 1985 Meeting of the NTISSC This memorandum forwards the minutes of the second meeting of the NTISSC, held on 15 February 1985. If no written corrections or changes to these minutes are received by 22 March 1985, they will stand as written. Atch: Meeting Minutes w/1 Enclosure TORZTETTC111-L--USE?ANLY- Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 MINUTES OF THE 15 FEBRUARY 1985 MEETING OF THE NATIONAL TELECOMMUNICATIONS AND INFORMATION SYSTEMS SECURITY COMMITTEE (NTISSC) 1. The second meeting of the NTISSC was held on Friday, 15 February 1985, at the Federal Aviation Administration (FAA) building. With the exception of the NSC representative, all other agency and department representatives and observers were present. 2. The Chairman opened the meeting with an expression of appreciation to the Transportation representative for hosting the Committee meeting, after which the Transportation representa- tive welcomed the Committee to the FAA facility. 3. NTISSC's meeting schedule for the remainder of 1985 was provided by the Chairman. The NTISSC will meet again on 10 May, 9 August and 8 November 1985, from 0900 to 1100 hours. Notification of meeting location(s) will be forwarded with each meeting agenda. 4. Two items on the subject of membership were next addressed: a. The Chairman announced that the U.S. Nuclear Regulatory Commission (NRC) had joined the NTISSC in an observer status and introduced NRC's representative, Mr. Raymond J. Brady. b. The second item regarding membership was Mr. William J. Casey's request to Secretary Weinberger for the Director of Central Intelligence (DCI) to have two representatives on the NTISSC and its subcommittees. The Chairman stated that the Central Intelligence Agency is currently represented on the Committee, and it was Mr. Casey's request that the Intelligence Community (IC) Staff also be represented. The Chairman went on to say that in the NTISSC Governing Procedures there existed a provision for this request, and the subject was then opened for discussion and comment. The NSA representative stated he had no objection to the IC Staff initially participating in the NTISSC as an observer, and the JCS representative agreed. The DIA and CIA representatives were asked to provide comments and both agreed with the suggestion. The Chairman concluded the discussion on this subject by stating that without objection he would recommend that the IC Staff provide a representative to the NTISSC to participate initially as an observer. Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18 : CIA-RDP87M00220R000100170025-6 5. The Executive Secretary reviewed current issues before the Committee for comment and vote. Particular mention was made of the KGV-10/TSEC release request, specifically the tardiness of some vote responses. At this point, some of the representatives expressed concern at not having received the correspondence. The importance of timely responses was stressed, especially in cases of equipment release requests. The Executive Secretary further stated he anticipated another six issues requiring comments, and one issue requiring a vote response to be forwarded to the Committee representatives in the near future. These issues, listed below, will have a 30-day response requirement. Directive on NTISS Issuance System COMSEC Classification Instruction DES Instruction AUTOSEVOCOM Doctrine Instruction COMSEC Equipment Instruction KW-46 Fleet Broadcast Instruction, and TSEC/KG-30 release request (for vote). 6. The next subject discussed by the Committee was the National Policy on Application of Communications Security to Civil (U.S. Government and Commercial) Space Systems. Formal vote on this policy was delayed from the 8 November 1984 meeting due to concern that the private sector had not been fully informed. The FCC and NCS representatives provided feedback from the private sector; the findings of both representatives was that while the private sector does not disagree on the need to provide satellite security, there still exists a need for more definition and clarification of the policy. (The staff paper prepared by FCC which summarizes the questions and issues raised at the NIAC Communications Common Carrier Subcommittee meeting on 29 January 1985, is enclosed. Copies of the vugraphs used in the briefing presented by the NCS representative are available upon request from the NTISSC Secretariat.) Discussion followed as to how the Committee would best resolve the questions and concerns put forth by the private sector. The idea of forming a working group was viewed as being too time-consuming and unproductive. The Commerce representative suggested another approach to the private sector via letter. It was further suggested by the NCS representative that NSA undertake the necessary revision of the.policy, to which NSA agreed. The Chairman stated that this issue would be brought up again for vote at the 10 May NTISSC meeting. The question of funding surfaced throughout the discussion of this policy; the Chairman emphasized that funding would not be provided by the Federal Government. 2 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 7. A briefing was presented by the Chairman of the Subcommittee on Telecommunications Security (STS) on The Evaluation of the Security Status of National Telecommunications. The STS Chairman stated that the report was still in a draft status and was the result of the Subcommittee's meeting on 12 February. He expected to provide a finalized version of this report by 25 February. He said that the report was approved by the Subcommittee representatives, with an abstention by CIA and a non-concurrence by OMB. The briefing consisted of a summary of the STS report (copies of this report were provided to the Committee representa- tives prior to the meeting). The STS Chairman stated that as of today our communications are still very vulnerable. During the briefing the NTISSC Chairman questioned use of the phrase "NO ACCEPTED DEFINITION OF A GOVERNMENT-WIDE COMMUNICATIONS NETWORK", and the STS Chairman agreed to rephrase that term. (Copies of the vugraphs used in the STS briefing are available upon request from the NTISSC Secretariat.) 8. A briefing was also presented by the Chairman of the Subcommittee on Automated Information Systems Security (SAISS) on The First Annual Evaluation of the Status of Automated Information Systems Security (AISS) in the U.S. Government. The SAISS Chairman stated that this was the Subcommittee's final report, which had been formally approved on 7 February. With the exception of one abstention by NCS (because they had not received the report) and one non-concurrence by OMB, all other Subcommittee representa- tives concurred on the report. This briefing also consisted of a summary of the SAISS report (copies of this report were provided to all Committee representatives prior to the meeting). In essence the report stated that the status of automated information systems security was poor and declining. The SAISS Chairman also included the subject of the interaction between the SAISS and the STS, upon which the NTISSC Chairman remarked that the two Subcommittees appeared to be working well together. (Copies of the vugraphs used in the SAISS briefing are available upon request from the NTISSC Secretariat.) At the conclusion of the SAISS briefing, the Chairman stated that no further revisions were planned for these reports. As soon as the final STS report was received the two reports would be merged and published during the March timeframe. 9. In the discussion that followed the briefings presented by the two Subcommittee Chairmen, the JCS representative commented that the greatest problem was the volume of information 3 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 STAT being moved from one agency to another, and he felt that it was volume which needed to be considered on both sides of the assessment. There was much discussion regarding the securing of communications. In particular, the NTISSC expressed concern that the new upgrade of the FTS would not contain all the necessary security requirements. The GSA representative stated that every attempt had been made to incorporate these security requirements into the GSA upgrade, but that cost was a major consideration. She requested advice and assistance from the Subcommittee Chairmen on how these requirements might best be met, and the STS Chairman responded with an offer to assist. epresentative provided a briefer, to present the NSA views of how the telecommunications systems security programming and budget process/system would work. Only a portion of the actual briefing had been presented when the Committee representatives began to discuss the budget process and related problems. Many present agreed that the existing budgeting process was inconsistent. The FEMA representative commented that it was difficult to project a five year plan, when in fact, OMB had only approved funding every other year. The NSA representative questioned the OMB representative as to whether or not OMB was going to be able to bring the budgeting together for COMSEC for the total Government. The OMB representative's response was that he believed it would be centralized, and stated that what OMB was requesting, was for the data from all agencies and departments to be collected (in terms of resources required to fix the critical areas), provide a set list of those areas to be fixed, and submit a request through the Steering Group and the National Manager. 11. The Chairman closed the meeting by saying he looked forward to the next meeting of the NTISSC in May. 1 Enclosure 4 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 NATIONAL TELECOMMUNICATIONS AND INFORMATION SYSTEMS SECURITY COMMITTEE February 15, 1985 Handout by Managing Director, Federal Communications Commission 1. FCC Staff Paper 2. Minutes of NIAC Meeting AI Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 ? 1, Attachment 1 - FCC Staff Paper February 7, 1985 NUICNAL POLICY ON APPLICATION OF CCMMUNICATDONS SECURITY TO COMMERCIAL SATELLITE TELEMETRY. TRACKING AND CONTROL (nu) 1. yurpose This paper summarizes issues raised at the NIAC Communications Common Carrier Sub-Committee meeting on January 29, 1985 and incorporates additional information obtained frau discussions with sub-committee menbers and FCC statf after the meeting. 2. Need for Protection of 7T&C a. There was no disagreement at the NIAC meeting on the need to provide some measure of security for TT&C. Carriers contend that they already provide some security measures. Further they suggested several options to the government recommended technique for provision of TT&C security which they believe may be much less costly and equally effective in countering the threat. Options suggested include: (1) continuous high powered uplink; (2) an increase in command power threshold after satellite orbit is established; (3) shaped TT&C antenna bean to reduce the proba- bility of disruption from offshore points; and (4) intrusion detection to permit inmediate activation of countermeasures. b. while carriers apparently concur in the government's objectives in this matter, they have serious concerns and nurnerous unanswered questions regarding: the application of the proposed national policy statement; what techniques might be approved by the government for providing secure TT&C; and the relationship of TT&C security to the much broader issue of total satellite systems security, including other NSEP features that might be requested by the government in the future. 3. Scope of Proposed Policy Statement a. What is the intended scope of the proposed policy statement? While the briefers professed that it would not preclude the procurement of services by the government or government contractors from commercial satellite systems before the effective date of the policy, considerable further clarification is required. - Will the proposed policy preclude the procurement of services from systems which were launched before the effective date if the government determines that secure TT&C is required for a particular application or progran? do Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 - Will the proposed policy apply to the procurement of all satellite services by the government and goverment contractors from systems which are launched after the effective date, or just for those applications or programs where secure 'IT&C is a stated requirenent? - As a practical matter, will government contractors be forced to procure satellite services only from government approved systems even though only a portion of their business is with the government? b. Obviously, answers to these and related questions will greatly affect the results of the proposed policy fran the government's perspective as well as the carriers response' to the policy if implemented. If broadly applied, the policy might cover a significant portion of commercial satellite business and the outcome might be quite different than if narrowly applied. c. Certainly, the scope of policy application will influence satellite carrier technical and business decisions which in turn may affect their competitive position vis-a-vis other satellite and terrestrial carriers. It is possible that the policy might have anti-competitive consequences which would be of concern to the FCC. This important issue is addressed in more detail in the attached paper prepared by the Dcrnestic Facilities Division of the Common Carrier Bureau. d. Certainly, the scope of application will also impact the effectiveness of the policy from the government's perspective. If narrowly applied, some carriers may elect not to compete for government business. This could have several undesirable con- sequences including reduced competition, increased costs and government dependence on one or a few systens to provide essential communications. It is conceivable that the policy might produce a result counter to the government objectives of flexibility, redunaancy and interoperability. Concentration of government traffic on one or two satellite systems might actually increase the possibility of disruption. 4. Countermeasures and the Threat a. TT&C countermeasures appear to be extremely threat dependent both in terms of the nature of the threat and its duration. Some countermeasures are very effective against one or more types of threat and less eftective or not effective at all against other types of threat. Not one technique discussed at the meeting was effective against all types of threat to 'IT&C. For example, continuous jamming can defeat crypto secure 'IT&C. And, of course, physical destruction of critical satellite components can render them inoperable regardless of measures taken to protect -2- - Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 b. It appears that the carriers have already taken various measures to protect against unauthorized access to the TTEic of their satellite systems and have already established techniques and procedures for regaining control should TT&C malfulction or an unauthorized entity temporarily take control. c. It appears that informed decisions by the government or carriers with respect to security of TT&C cannot be made until a more detailed analysis of threats and countermeasures is completed. This analysis should include not only the recanmended technique but options presented at the NIAC meeting as well as techniques and procedures presently enplcyed by the =tiers. 5. Countermeasures and Cost a. 'IT&C countermeasures are extremely cost variable, ranging fran little or no additional cost to techniques requiring substantial additional expenditures by the carriers. Increased costs may be associated with design and construction as well as system operation of both satellites and ground stations. Also, weight/space considerations are particularly critical in satellite design as they directly affect longevity, capacity and other critical paraneters. b. As mentioned above, the carriers have already taken some measures to provide TT&C security and recovery capabilities in the event of malfunction or unauthorized access. The question is, how cost-eftective are these measures compared with other possibilities and the technique recommended by the government. Cost considerations aftect business decisions which in turn have competitive marketplace implications. The briefers presented virtually no information or analysis of any of these cost issues. c. Again, it appears that an informed decision cannot be made on this matter until a more detailed analysis is completed of various countermeasures, including their costs. 6. Belationship of IT&C To Other Security Considerations a. How do decisions regarding TT&C security relate to other commercial satellite system security requirements? This is another significant unanswered question which surfaced at the NIAC meeting. b. TT&C Security addresses only one type of threat to just one component of a total satellite system. 'TT&C countermeasures are designed principally to deny satellite access by unauthorized entities or prevent unauthorized entities from denying control to the system owner/operators. It does not address jamming of control circuits, physical destruction or damage of vital satellite components, security of ground stations and caranunica- tions links, hardening, interoperability, and other security concerns. -3- - Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 C. It appears that the present government structure for dealing with these issues is fragmented. The NTISSC charter is limited to certain aspects of the overall problem. Other forms, such as the NSTAC, are addressing equally if not more important satellite system security issues. Further, consideration of sane of these issues has been deferred. d. The carriers have limited resources to spend on total satellite system security and appear to be operating in a highly competitive environment with other satellite and terrestrial carriers. Accordingly, decisions regarding TT&C security (either by the government with respect to procurement policy or by the carriers themselves as they respond to the marketplace) should not be made out of context. Absent a "systems" approach which addresses the total problem and all viable solutions prior to the issuance of the government TT&C procurement policy, the carriers may make suboptirnum business and investment decisions. They may take measures to guard against lager risk threats and protect less vulnerable system components at the expense of protecting more vulnerable system components against more likely threats. Large investments in IT&C countermeasures in response to the issuance of the proposed policy may preclude adequate investments in other aspects of system security at a later date. In other words, issuance of the procurement policy without further analysis might contribute to reduced rather than enhanced overall satellite system security. It is conceivable that a better overall outcome might result from the government's perspective if the policy statement is not issued. Further, as mentioned earlier, the proposed policy may have unintended anti-competitive consequences wnich would work counter to the governments overall objectives of providing reliable and secure satellite communi- cations. 7. Reliability of Recarmended Technique a. At the NIAC meeting the carriers expressed concern about the reliability of the recommended technique. Irrespective of the other concerns expressed above, they are reluctant to proceed with the substantial investment required to incorporate the reozatnended technique into their satellite systems until its reliability is adequately demonstrated. In other words, they don't want to buy a "lock" when there is no assurance that the "key" will work. The recommended technique has apparently not been tested in a space environment. The briefers indicated it might be several years betore tests are completed. This concern relates directly to the issuance and effective dates of the policy. 8. Conclusions and Recamendations - Finalization and/or promulgation of the proposed procurement policy is premature absent extensive further study and analysis. Further, it adopted, the policy should state its purpose, scope, -4-. 4. Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 and operation in the clearest possible terms in order to avoid the confusion and concerns generated by the draft. - The commercial satellite industry already uses a variety or system design and operational techniqms to provide a measure of TT&C security. They have suggested a number of other options. Full consideration should be given to all of these, including the government proposal, before the government policy statement is finalized and promulgated. - Most important, decisions regarding government 'IT&C procure- ment policy should not be finalized absent a total satellite systems security analysis. This analysis should include consi- deration of all risks and threats including associated probabi- lities in relation to all viable countermeasures together with their effectiveness and costs. - Accordingly, it is recommended that a government-industry mechanism be established to conduct this system analysis and submit findings and recommendations to appropriate government authorities. Prepared By: Alan R. McKie, Deputy Managing Director, in coordi- nation with Thomas P. Stanley, Deputy Chief Scientist -Ccerations, and James, R. Feegan, Chief, Domestic Facilities Division, Carmon Carrier Bureau. Attachment -5- - Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 February 6, 1985 Domestic Facilities Division Common Carrier Bureau Concerns Regarding and Proposed Revision to National Policy on Application of Communications Security to Civil Space Stations. The policy's overall approach is contractual: satellite carriers wishing to do business with the government directly must secure the systems over which they will carry government traffic, and those other companies which seek government contracts must send their communications over secured satellite systems. As a general proposition, the Commission does not interfere in the marketplace bargaining that goes on between a customer, such as the government, and service provider, such as a satellite carrier, in contracting for telecommunications services. In this instance, however, anticompetitive problems may arise depending upon whether the policy, in its application to government contractor use of satellite systems, covers government contractor use of satellite services for all their business activities, or only use of such services to conduct that portion of their business which relates to performance of their government contracts. As currently drafted, the policy does not make clear whether the broader or narrower interpretation is intended, although its plain language makes it susceptible to the more far-reaching interpretation. Yet, such an attempt to control the telecommunications procurement choices of government contractors in their activities that are outside the scope of their business or contracts with the government, is problematic. While it may be an appropriate reflection and exercise of market power for the government to dictate, through what is in effect a government-vide procurement policy, the type of security its contractors must provide with respect to the telecommunications activities they undertake in connection with security related government business or even government business generally, an effort to influence all government contractor telecommunications practices in areas unrelated to government contracts has the potential to distort the marketplace forces normally governing the availability and selection of satellite systems and services. The government would be using its power in a capacity far beyond that of an ordinary communications service customer. By affecting the use of satellite systems for the total volume of satellite traffic generated by all the companies that do business with the government, the policy would have an impact on the satellite industry far out of proportion to the government's direct market power in this area. While we estimate that the government uses less than 5% of the total capacity of satellites now in orbit, if the policy were extended to all government contractor use of such systems for any purposes, it would influence a much more substantial, if not major, Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 2 segment of commercial satellite business. This effect may conflict with the Commission's pro-competitive policies aimed at minimizing government interference in marketplace structure and practices. Furthermore, while the NTISSC has the authority to issue national policies applicable to and binding upon the departments and agencies of the government, their authority to similarly bind private entities through a government policy statement, especially as to their non-government contract related activities, is questionable. Would the obligations under the policy be imposed on the contracting government agencies, the satellite carriers and/or the other commercial entities contracting with the government? What would be the relationship between these various obligations, and by what authority and mechanism would they be enforced? These issues require clarification. The policy would, in any event, be less troublesome to the FCC in its potential to disrupt normal marketplace forces and relationships if its reach with respect to government contractors were clearly limited to their use of satellite systems for communications related to performance of their government contracts alone. (See Attachment A for some suggested alternative language.) " Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 1-.0.L.:1 Li i.C-11 ? '11/ LA al a lsj SUMMARY MINUTES FEDERAL COMMUNICATIONS COMMISSION NATIONAL INDUSTRY ADVISORY COMMITTEE . COMMON CARRIER COMMUNICATIONS SUBCOMMITTEE Tuesday, January 29, 1985 AT&T Communications Tenth Floor Conference Room 1120 - 20th Street, N. W. Washington, D. C. Chairman: John Boning RCA Corporation Public Notice of Meeting Appendix A Attendance List Appendix B Meeting Outline Appendix C Draft of proposed National Policy on Application of Communications Security to Civil Space Systems Appendix D Background Correspondence Appendix E Optional Methods of Providing TT&C Security ? ^ Appendix F The Chairman, Mr. Boning, opened the meeting at 9:45 A. M. by thanking AT&T for the use of the excellent facility to accommodate this NIAC Common Carrier Communications Subcom- mittee meeting on the protection of telemetry, tracking and control (TT&C) for commercial and civil satellites. He mentioned the documents provided as handouts to all meeting attendees (included as Appendices C, D and E of these minutes). Mr. Boning cited some examples of verbage in the policy that needed clarification, such as "civil satellites" and "mission data."- These definitions were subsequently clarified in the briefing by the National Security Agency (NSA). Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 2 Mr. Boning provided a brief history of the National Security Telecommunications Advisory Committee (NSTAC) Communications Satellite Subcommittee (CSS) analysis wherein recommenda- tions were made to protect the TT&C, to harden terrestrial facilities against Electro-Magnetic Pulse (EMP), to enhance physical security against terrorist attack, to provide a capability for interoperability, to provide for protection of traffic, and to enhance emergency planning and procedures. Mr. Boning pointed out that if we can fully understand the total threat to the satellite system, we can determine the most practical solution to the problem. The total threat is not just the TT&C problem. On 15 January SRI provided a terrorist activities briefing by the FBI, FEMA, ERDA, Treasury, and CIA. These federal agencies defined threats that were very real and as significant as the TT&C threat. Based on the above briefing, terrorism should be considered as a new form of warfare perpetrated by three geheral categories of terrorists, as follows: o State supported terrorists o Internal terrorists o Crazies The primary threat is from the state supported terrorists who physically exist in this country. They are organized, equipped, trained and capable. Many of them are identified and are tracked by government agencies. The FBI defined their usual targets, particularly in Central America, as transportation, power, communications, finance and political targets. Their modus operendi is never very clear. They . are very clever, they use surprise to the maximum extent and they desire spectacular results toward interrupting the status quo of orderly government. They capitalize on fear. Mr. Boning stated that the reason for the meeting today is to discuss TT&C of commercial satellites and the protection thereof. There are several options to provide protection; each option has its drawbacks and all are scenario dependent. Even though this particular meeting is on TT&C, the carrier must also address all of the threats. The satellite carriers must be very careful in protecting against these threats lest their costs escalate to the point that their business picture is so burdened by protection systems that they can no longer be competitive. In such an event the terrorists would have won without ever challenging the system. 1. Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 3 Mr. McKie of the Federal Communications Commission (FCC) stated that the meeting was called to provide information for Mr. Edward J. Minkel, the FCC Managing Director, prior to his participation in an upcoming meeting of the National Telecommunications and Information Systems Security Committee (NTISSC). Mr. Boning introduced Mr. Noell Matchett of NSA who initiated a classified briefing on the threat to commercial satellite TT&C. In an unclassified portion of the briefing NSA agreed to provide a high quality algorithm that can be embedded in the TT&C package of the satellite by the satellite manufacturers. The overall system would be unclassified but the computer chips would be controlled. With the agreement of the carriers NSA will provide counsel, expertise, evaluation and endorsement of the TT&C incorporated into commercial system. The system will contain characteristics for interoperability. Radiation hardening of the subsystem is being developed but hardening is not required. Five years after the adoption of a national policy on TT&C government Requests for Proposals (RFP's) may include a specification for protected TT&C. NSA concluded that TT&C incorporation makes good sense to the government. NSA counsel, advice and guidance is available and all potential protection techniques will be considered. Following the NSA briefing the subject was opened for questions and general discussion. Several questions were asked involving the definition'of the term, "civil satellite." These were defined as applications type satellites that generate on board information. METSAT and LANDSAT are in the civil satellite category. Another series of questions involved the term, "mission data." This was defined as the data from civil satellites that develop on board information. There is no mission data on commercial satellites. This point is very significant because several of the carriers had interpreted "mission data" as commercial satellite through-put. If they became responsible for the protection of that data they would face a severe financial burden. do Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 4 Another question was, "Why is the threat limited to accessing the satellite rather than destroying the satellite by lasers or high powered signals?" One answer was that the satellite could be held for ransom. A question was posed based on the SRI briefing wherein the FBI defined threats against terrestrial facilities. Since the carriers must address such threats as well as inter- operability, EMP protection, and command survivability, the question asked if anybody is looking at the total threat package and making a systems analysis and cost estimate of all the protection needed. The answer indicated that this is an NSTAC problem but that NSTAC has not yet addressed it. Further, the stated government strategy included a presumption that the free market will allow carriers to recoup cost on a competive basis and that there may even be some insurance savings. Both of these statements were disputed by several carriers. Another point introduced was that, based on a survey, commercial entities were not interested in traffic protection. Nevertheless, costs resulting from protection systems will be passed along to the public. Carriers reiterated the related point that as protection requirements increase, so does the cost of service. In the meantime, terrestrial point-to-point traffic costs are going down. The Chairman stated the carriers do not dispute the fact that encryption Of TT&C is a good protection against the threat described by NSA but that the FBI has drawn up just as realistic a threat scenario which may include the destruction of satellites and terrestrial communication systems for which encryption provides no protection. The carriers expressed concern about how all of their protection efforts will be paid for. One of the carriers proposed tax incentives to help offset some of the more significant costs. The Chairman interrupted the discussion in the interest of time and requested that a TT&C engineer describe several options to providing protected TT&C. Mr. Lewin, RCA Manager of Satellite Operations, provided four options, each involving a different scenario. One option is a continuous high powered uplink carrier (Ku band) that would effectively jam the TT&C receiver to preclude accessing the system with present state of the art hardware. A second option is to raise the command threshold level on the satellite once orbit is established. A third option exists to shape the beam of the TT&C antenna to minimize its coverage. A fourth option is to incorporate intrusion Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 5 detection to provide a very rapid indication that the satellite is being accessed by outside parties; this system is installed in some satellites now and presumes an override capability at the TT&C station. A more complete description of the options discussed by Mr. Lewin are contained in Appendix F. A carrier questioned whether or not the grandfathered systems (within five years of a National Security Policy on TT&C) would be ignored in the future in favor of the newer protected systems. The answer from a Defense Communications Agency (DCA) spokesman was that an RFP can state that there is a requirement for protection. In other words, there is nothing to stop a government agency from specifying TT&C protection before the grandfather period ends. The open discussion ended and the Chairman summarized proposed submission of conclusions to the NIAC Long Range Planing Committee and the FCC as follows: o All solutions offered for the protection of TT&C are scenario dependent. ' o There are many security problems other than TT&C, including destruction of the satellite and/or ground facilities, and EMP considerations. o Costs of total security will significantly affect the competitive position of satellite carriers. An overall conclusion to be drawn from the meeting is that there is a critical need to take a systems approach to the protection of satellite systems and communications resources in general prior to establishing a national policy om such a narrow aspect as TT&C of satellite communications. The terrorist threat is real and can be anticipated when it is politically expedient for the terrorists to attack. The meeting was adjourned at 12:02 P. M. Herbert J. Neumann Executive Secretary, NIAC ( Johti Boning Chairman, Common Carri Communications Subc ittee Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 APPENDIX A PUBLIC NOTICE FEDERAL COMMUNICATIONS COMMISSION 1919 M STREET N.W. WASHINGTON, D.C. 20554 1795 News media information 202/254-7674. Recorded listing of releases and texts 202/632-0002. FCC 85-1 35452 January 8, 1985 NATIONAL INDUSTRY ADVISORY COMMITTEE COMMON CARRIER COMMUNICATIONS SUBCOMMITTEE NOTICE OF MEETING Pursuant to the provisions of Public Law 92-463, notice is hereby given of a closed meeting of the Common Carrier Communications Subcommittee of the National Industry Advisory Committee (NIAC) to be held Tuesday, January 29, 1985. This meeting is closed to the public under authority of Section 10(d) of the Federal Advisory Committee Act (P. L. 92-463, as amended). The Subcommittee will meet at 9:30 A. M. at AT&T Communications, 1120 - 20th Street, N. W. Washington, D. C. 20036, North Tower. PURPOSE: Classified briefing concerning satellite communications matters. AGENDA : As follows: 1. Opening remarks by Chairman. 2. Briefing and discussion. 3. Adjournment. For more information about the meeting the NIAC Executive Secretary in the FCC Emergency Communications Division may be contacted at (202) 634-1549. Action by the Commission January 4, 1985. Commissioners Fowler (Chairman), Quello, Dawson, Rivera and Patrick. ? - FCC - Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 APPENDIX B Page 1 Attendance List NIAC Common Carrier Communications Subcommittee Chairman John Boning NIAC Members William Jack Charles Meizner James Oref ice Colemen Guthrie George Tellmann, Jr. Jeff Kushan Lowell Thomas Angelo Nicosia Marianne Swindler Michael Shaw John Dunlop Other Industry Stuart Meister Robert Yamazaki Robert Bradshaw Troy Ellington G. Jay Nelson Richard Heitman Jerold Jacaruso Al Prekeris Jacob Lewin Charles Somerville Donald Jansky Federal Government Karl Brimmer Fred Goldsmith James Keegan Kevin Kelley Michael Marcus Alan McKie Herbert Neumann Jack Richards Raymond Seddon Anne Siegel Thomas Stanley January 29, 1985 RCA Consultant AT&T Communications AT&T Communications AT&T Communications COMSAT General COMSAT GTE Sprint GTE ITT ITT MCI TRT AMSAT COMSAT GTE GTE GTE Sprint ITT ITT ITT RCA Americom TRT TRT Consultant FCC FCC FCC FCC FCC FCC FCC FCC FCC FCC FCC Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 1STAT APPENDIX B Page 2 Attendance List (Continued) NIAC Common Carrier Communications Subcommittee January 29, 1985 Federal Government (Continued) Capt. David Brown J. Randolph MacPherson Benham Morriss George Silbermann Milton Weiner NCS NCS NCS NCS NCS Arthur Altenburg NTIA do Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 APPENDIX C lational Industry Advisory Committee Common Carrier Communications Subcommittee Meetinz Outline January 29, 1985 Background and Objective: o The Government is formulating a national policy regarding the procurement of commercial satellite systems and services by Federal agencies and government contractors. This policy will address government requirements for communications security with respect to both message traffic and telemetry, tracking and control (TT&C). o The NIAC Common Carrier Communications Subcommittee has been convened by the FCC to provide a forum for the presentation and discussion of the potential threat to TT&C of commercial satellite systems, and the various measures which might be employed by the owners and operators of these systems in order to provide protection against this threat when required by the government. (The meeting will not address security of satellite message traffic.) o The government seeks information on the full range of options available, the merits and demerits of each, their costs, and any other information which may be useful in finalizing the proposed national procurement policy. o Additional government-industry meetings and discussions may be required to conclude technical evaluations of options identified at the meeting. Order of Discussion: 1. Threat Briefing 2. One Proposed Solution to the Threat 3. Clarification of Draft Policy Statement 4. Identification and Discussion of Other Options to Counter the Threat 5. Summation im Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 NATIONAL POLICY ON APPLICATION OF COMMUNICATIONS SECURITY TO CIVIL (U.S. GOVERNMENT AND COMMERCIAL) SPACE SYSTEMS SECTION I - POLICY 1. Government classified and Government or Government contractor national security-related information transmitted over satellite circuits shall be protected by approved techniques from exploitation by unauthorized intercept. 2. Government or Government contractor use of U.S. civil and commercial satellites launched five years from the date of this policy shall be limited to space systems using approved techniques necessary to protect the essential elements of telemetry, tracking and control (TTiC) and mission data. 'SECTION II- EXCEPTIONS 3. Exceptions to this policy may be granted by the NTISSC in consultation with Federal departments and agencies as well as the private sector. SECTION III - DEFINITIONS 4. Space systems consist of the spacecraft or satellite, command ground station, data acquisition stations, telecommunications, TT&C, and mission data functions. 5. Mission data is transmitted by the spacecraft to accomplish its operating objectives. Protected essential elements are Iliose?fun-ctions of TTINC which would deny unauthorized control of the space system. SECTION iv - sEADs OF DEPARTMENTS 6. The Director, National Security Agency, in coordination with other departments or agencies as appropriate, shall assess space systems telecommunications, TT4C, and mission data functions to determine their vulnerability to unauthorized use and provide approved protection techniques and guidance. 7. Nothing in this policy shall relieve the heads of Federal departments and agencies of their authority and responsibility for executing other measures to assure the adequate protection of their telecommunications. Declassified in Part - Sanitized Copy Approved for Release 2013/03/18 : CIA-RDP87M00220ROOni nni7nn9c_R Declassified in Part- Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220ROCkii 00-170025-6 November 27, 1984 MEMORANDUM GTE Service Corporation 1120 Connecticut Avenue N.W. Washington, D.C.20036. (202)463-5200 TO: Members, long Range Planning Committee, National Industry Advisory Committee SUBJECT: National Policy on Applications of Commumicastions Security to Civil (U.S. Government and Commercial) Space Systems The N1AC Long Range Planning Committee hal been asked by-_the FCC to comment on a draft "National Policy on Applications of Communications Security to Civil (U.S. Government and Commercial) Space Systems." The cover letter and draft policy requesting our assistance from Ed Minkel of the FCC is attached. An answer from the LRPC is expected before the Holidays. Please provide your comments to me at 1120 Connecticut Avenue, .N.W., Suite 900, by December 6, 1984. We will consolidate your comments and coordinate with each of you before an answer, is provided to the FCC. - Since Commissioner Dawson and Ed Minkel are anxious to receive our comments, I would prefer not to convene a formal meeting of the LRPC, but stand ready to do so if necessary. Thank you for your cooperation. Sincerely, C. J. Mclean Vice President Government Communications CJM:mhf Attachment cc: Chairman Mark Fowler Honorable David Markey Commissioner Mimi Weyforth Dawson Lt. Gen. Winston Powers mu Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 FEDERAL COMMUNICATIONS COMMISSION WASHINGTON. D.C. tOSSII November 21, 1984 ON *MT 111011, TO. Cyrus J. McLean Vice President ? Government Communications GTE Service Corporation Stamford Forum, Stamford Conn. 06904 Dear Mr. McLean: I am writing to you in your capacity as Chairman of the Long Range Planning Committee of the Commission's National Industry Advisory Committee. National Security Decision Directive 145 (NSDD 145), "National Policy on Telecommunications and Automated Information Systems Security," signed by the President on September 17, 1984, establishes initial objectives, policies, and an organizational structure for national activities aimed at safeguarding from hostile exploitation systems which process or communicate sensitive information. That Directive established, in place of the former National Communications Security Committee (NCSC), the National Telecommunications and Information Systems Security Committee (NTISSC), a working level interagency group operating under the direction of a senior level steering group, to consider technical matters and develop operating policies as necessary to implement the provisions of ESDD 145. The Commission participates in the NTISSC as an observer. As part of its effort, the NTISSC has prepared a draft "National Policy on Application of Communications Security to Civil (17.S. Government and Commercial) Space Systems." That policy, a copy of which is attached, would limit government and government contractor use of space systems to those which use "approved techniques" to protect the telemetry, tracking and control elements that are essential to control of the space system. Because of the Commission's regulatory role in licensing domestic communications satellites, we have a responsibility to assess the impact of the NTISSC satellite security policy on the commericil satellite industry. One of NIAC's roles has been to advise the Commission on NSEP matters, and once again we look to your group for assistance. We request that you review the draft National Policy and provide the Commission with informal comments reflecting the consensus of your committee members by the end of the year. NIAC's evalvation of this important facet of the government's National Security and Emergency Preparedness efforts will enable the Commission to most effectively fulfill its regulatory responsibilities. Because the policy is in draft form, we ask that its circulation be limited to your committee members. NIAC's work on NSEP issues have been of great value to the Commission in the past, and on behalf of the Commission I thank you for your no Declassified in Part - Sanitized Copy Approved for Release 2013/03/18 : CIA-RDP87M00220R000100170075-A ? Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 2 efforts in tbis vital area. We look forward to receiving your comments and to our continued cooperation. Sincerely. WGtj 1$n) 5 Managing Director Enclosure cc: Chairman Mark Fowler Ccrmz is sioner Mini Wey forth Day eon Honorable David Markey U. Gen. Winston Powers 1K\ bAjt. .A.NpA ? S21/4/1 MOOLL40. Ax . tyAA. &t,e_i_z.v.L.t ? dm Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 RATIONAL POLICY ON APPLICATION OF COMMUNICATIONS SECURITY TO CIVIL (U.S. GOVERNMENT AND COMMERCIAL) SPACE SYSTEMS SECTION I - POLICY 1. Government classified and Government or Government contractor national security-related information transmitted over satellite circuits shall be protected by approved techniques from exploitation by unauthorized intercept. 2. Government or Government contractor use of U.S. civil and commercial satellites launched five years from the date of this policy shall be limited to space iystems using approved techniques necessary to protect the essential elements of telemetry, tracking and control (TT&C) and mission data. SECTION II- EXCEPTIONS 3. Exceptions to this policy may be granted by the NTISSC in consultation with Federal departments and agencies as well as the private sector. SECTION III - DEFINITIONS 4. Space systems consist of the spacecraft or satellite, command ground station", data acquisition stations, telecommunications, TT&C, and mission data functions. 5. Mission data is transmitted by the spacecraft to accomplish its operating objectives. Protected essential elements are those functions of TT&C which would deny unauthorized control of the space system. SECTION IV - BEADS OF DEPARTMENTS' 6. The Director, National Security Agency, in coordination with other departments or agencies as appropriate, shall assess space systems telecommunications, TT&C, and mission data functions to determine their vulnerability to unauthorized use and provide approved protection techniques and guidance. 7. Nothing in this-policy shall relieve the heads of Federal departments and agencies of their authority and responsibility for executing other measures to assure the adequate protection of their telecommunications. iC Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170075_R . Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 GTE Service Corporation 1120 Connecticut Avenue N.W. Washington, D.C. 20036 (202) 463-5200 December 19, 1984 Mr. Edward J. Minkel Managing Director Federal Communications Commission 1919 M Street, N.W. Room 852 Washington, D.C. 20554 Dear Mr. Hinkel: This responds to your letter of 21 November 1984, in which you ask for the National Industry Advisory Committee (NIAC) to comment on the draft executive branch policy on xhe "Application of Communication Security to Civil (U.S. Government and Commercial) Space Systems." I have asked the members of the NIAC Long Range Planning -Committee for their thoughts on this matter. Enclosed are the comments from a number of the members. As you can see the draft policy has raised a number of questions and concerns. Some of the areas in which there, is uncertainty include: ' Ambiguity over what is intended by the policy; ' Appreciation for the nature of the threat; ' Clarification over the type of technique which may be used to protect commercial communications satellites. As should be apparent, the NIAC membership is not now in a position to endorse this proposed policy. Many of the carriers' concerns could be aleviated if they receive information which would clarify the points raised. We recommend that this matter be referred to the Common Carrier Subcommittee for a A part ol GTE Corporation mi Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 . Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 classified briefing during January. The Common Carrier Subcommitte would then be in a position to make recommendations to the FCC. Thank you for the chance to comment on this policy. Sincerely, ? C. . McLean . Chairman, Long Range Planning Committee National Industry Advisory Committee CJM:dmp Enclosures cc: Chariman Mark Fowler, FCC Commissioner Mimi Weyforth Dawson, FCC Honorable David Markey, NTIA Lt. Gen. Winston Powers, NCS Hubert J. Neumann, FCC Long Range Planning Committee Members: Robert F. Allnut, COMSAT Corp. John Boning, RCA American Communications, Inc. Eugene S. Cowen, American Broadcasting Company Mark E. Crosby, Special Industrial Radio Service Association, Inc. Charles Dorian, The American Radio Relay League, Inc. Wallace Dunlap, Westinghouse Broadcasting Company John Dunlop, TRT Telecommunications Corporation Charles R. Dunn, Commercial Radio & Electronics Eugene Eidenberg, MCI Telecommunications Corporation Edward O. Fritts, National Association of Broadcasters Joseph J. Gancie, ITT World Communications, Inc. Arthur A. Garman, Western Union Telegraph Company Robert E. Cradle, AT&T Technology Systems Wayne Green, Wayne Green Enterprises, Inc. Jerry M. Haleva, California Legislature Robert D. Hynes, Jr., National Broadcasting Company, Inc. Robert W. Kinzie, COMSAT General Corporation Marvin W. Konow, Bell Communications Research, Inc. E. J. Rushan, GTE Sprint Communications Corporation C. Travis Marshall, Motorola, Inc. Henry W. Meetze, Railing Corporation Ron Nessen, Mutual Broadcasting System, Inc. Richard O. Newman, Public Service Company of Oklahoma Morgan E. O'Brien, Lukas, O'Brien and Raiser Samuel F. Shawhan, GTE Corporation Hillyer S. Smith, Jr., Aeronautical Radio, Inc. Robert H. Snedaker, Jr., United Telephone System, Inc. John B. Summers, National Association of Broadcasters Roy M. Teel, Jr., MSI Communications, Inc. Donald D. Wear, Jr., CBS, Inc. Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220Rnnn1nn17nry,g_p . Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 To: From: Date: Subject: Inter-Office Memo Lowell Thomas Leslie A. Taylor, GTE Spacenet Corporation December 19, 1984 GTE Spacenet Corporation Proposed National Policy on Government or Government Contractor Use of U.S. Civil and Commercial Satellites The following are the concerns of GTE Spacenet relative to the NSTAC proposal on the Draft National Policy on Application of Communications Security to Civil (U.S. Government) and Commercial Space Systems. 1. The purpose(s) of the proposed policy needs clarification. (a) is the purpose to provide protection to government classified traffic carried over commercial systems? (b) is the purpose to prevent access by unauthorized persons to the facilities of commercial space system operators? (c) is the purpose to ensure that protection is available over commercial systems in the event the government needs to utilize such systems in a national emergency? (d) is the purpose all of the above? 2. What is the definition of "approved techniques?" Will commercially available encryption equipment be adequate, or will NSA equipment or NSA approved equipment be required? The costs and feasibility of various requirements could vary greatly. 3. The grandfather clause may not adequately protect companies such as GTE which is now deploying its satellite system. The thrust of the policy appears to indicate a strong preference for protection and this is likely to appear in RFPs, thereby excluding GTE from such government business. There are certain other companies which would be in a strong position with such a policy in place. mo Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18 ?CIA-RDP87M00220R000100170025-6 Proposed National Policy December 19, 1984 Page two 4. The cost/benefit trade-off for the private satellite operator is really unknown, particularly because of the uncertainty as to what equipment would be required, and if any government classified business would ultimately be obtained, even if systems are retrofitted. 5. Are there comparable requirements imposed or proposed for terrestrial communications systems? 6. Under Definitions, what does "data acquisition stations" mean? Does it mean earth stations, transmit/receive? Conclusion: While GTE Spacenet can understand the government's desire to have commercial operators bear the expense of installing protection devices on space systems, the draft policy is so vague .that it provides insufficient guidance as to how an operator can quantify the costs of so doing, the benefits of so doing, or even if the installation of protection devices would satisfy the government's requirements.. Please let us know it we can be of additional assistance in this matter. Leslie A. Taylor Director, Regulatory. Affairs 1259P Declassified in Part - Sanitized Copy Approved for Release 2013/03/18 : CIA-RDP87M00220R000100170025-6 Declassified in Part,- Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 November 29, 1984 Nr. C.J. Mclean Vice President - Government Communications GTE Service Corporation 1120 Connecticut Avenue, N.W. Suite 900 Washington, D.C. 20036 Boll Communications Research Inc. Dear John, This is in response to your November 27, 1984 memorandum concerning the proposed "National Policy on Applications of Communications Security to Civil (U.S. Government and Commercial) Space Systems". As you know, neither Bell Communications Research nor the Bell Operating Companies that we support are in any way involved in satellite communications systems. For that reason, I do not feel it would be appropriate for us to comment on the proposal. I look forward to working with you on future issues where our input could be helpful. Sincerely, ? LA) N? trse%4N--.3 M.W. Konow Assistant Vice President National Security and Emergency Preparedness MWK-plb Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 . Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Lill LI western union A. A. GARMAN VICE PRESCIENT APO GENERAL MANAMA Mr. C.J. McLean Vice President GTE Service Corporation 1120 Connecticut Avenue N.W. Washington D. . 20036 Dear Jo December 4, 1984 1 e reviewed the draft National Policy on Application of Communications Security to Civil (U.S. Government and Commercial) Space Systems attached to your letter dated November 27, 1984. The wording of Section I - Policy, and Section III - Definitions, is unclear and is likely to lead to confusion. Section 1, Paragraph 2 introduces a new element, "mission data". Section III states that "mission data is transmitted by the spacecraft". Since Section III, Paragraph 4 differentiates between spacecraft and satellites, I assume spacecraft are shuttles or space probes or the like. Since we service suppliers only deal in satellites I do not understand what satellite-originated information is being referred to which would need to be protected. This should be clarified. Section I - Policy, Paragraph 1 deals with information transmitted over satellite circuits and this is certainly the prerogative of the Government user. This can be implemented at any time and is basically a function of cost. Section 1, Paragraph 2 deals with protection of the TT&C which is understandable. It is not clear that such a mandate is in the best interest of the country (all suppliets of TT&C ' must be protected for all launches after five years from the date of the policy). The obvious individual advantages of satellite protection must be weighed against the technical problems posed in the face of solving the satellite interoperability question being addressed by NSTAC. Clearly, this issue should be thoroughly discussed with NSTAC. If I may contribute further, please do not hesitate to call me. Sincerely, iles,6?$11A7thuilr A. Garman Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 . Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 RCA, Arne,.cen Communications Inc I 400 College liOa 0 Lest riinGgiuri FAX (609) 734-4380 I Icel. 244010 Government Services Mr. C. J. McLean Vice President GTE 1120 Connecticut Ave.. N.W. Washington, DC 20036 Reil Dear John: November 29, 1984 Reference is made to your memo dated 27 November 1984, Subject: National Policy on Applications of Communications Security to Civil (U.S. Government and Commercial) Space Systems. The enclosed paper lists the problems and questions generated by each paragraph of the proposed national policy. We find the policy paper severely lacking in definition and intent. I recommend that we convene a closed session of the Common Carrier Subcommittee or an informal gathering of the same. group with representatives of RUA to clarify what the government wants and what can be done for the government with and without support funding. Regards, e41,/ n Boning RCA Member NIAC JB:glt Enclosure Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R0001nn17nn9_R ? Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 COMMENTS ON PROPOSED NATIONAL POLICY The following comments on the draft National Policy are provided for each paragraph contained therein. Section I - Policy Paragr!ph 1 'Government classified and Government or Government contractor national security - related information transmitted over satellite circuits hall be protected by approved techniques from exploitation by unauthorized Intercept.' Comment To the best of our knowledge and belief, this policy has been in effect for an extended period. The Government determines the classification of information and is responsible for its protection. For the purposes of transmitting this information if it is classified, the government encrypts the data and provides an encrypted bit stream to the carrier who delivers the encrypted data to the premises of the receiving user. The receiving user decrypts the bit stream. Encryption equipment is not commonly provided to the carrier. The government is responsible for using government approved encryption techniques. Declassified in Part - Sanitized Copy Approved for Release 2013/03/18 : CIA-RDP87M0022oRnon1nn17nn,,c_R Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Section I - Policy Paragraph 2 'The government or government contractors use of U.S. civil and commercial satellites launched five years from the date of this policy should be limited to space systems using approved techniques necessary to protect the essential elements of telemetry tracking and control (TT&C) and mission data.' Comment This paragraph is not entirely clear in the following areas. a. What is meant by a civil satellite and how does it differ from a commercial satellite? b. What is the date of the policy - when does the 5 year time period start? Depending on when an 'approved" system will be available, the five years may not be realistic. c. It is assumed from reviewing paragraph 6 below that the approving authority of techniques used in protection of ITU is NSA. This should be stated. Also, a departmental contact point needs to be established. If any other agencies or departments are involved in the approval, they should be listed to provide a definitive contact(s) for carriers trying to determine their appropriate action and when it is satisfactorily completed. Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M0027nRnnn1 nn 7nnoa a ? Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 d. The term 'mission data' may be interpreted several ways. Since the mission of the satellite is to relay data between terrestrial points, it is assumed that this policy is directed toward specific circuits that need to be protected. Is it the intent of this policy to have the carrier responsible for encrypting the circuits to be protected? Section II - Exceptions Paragraph 3 'Exceptions to this policy may be granted by the KTISSC in consultation with Federal departments and agencies as well as the private sector.' Comment Since RCA American Communications,, Inc. has not been provided with a copy of NSDD 145, it is not clear as to who is the approving authority for exceptions. Section III - Definitions Paragraph 4 'Space systems consist of spacecraft or satellites, command ground station, data acquisition stations, telecommunications, TUC, and mission data functions." Declassified in Part - Sanitized Copy Approved for Release 2013/03/18 : CIA-RDP87M00220R0001nn17nn9_R . Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Comment See comment in paragraph (d) under Policy Paragraph 2. 'Mission data functions' is ambiguous. Section III - Definitions Paragraph 5 ?Mission data is transmitted by the spacecraft to accomplish its operating objectives. Protected essential elements are those function of TT&C which would deny unauthorized control of the space system.' See above comments on mission data. This definition does not clearly define what is meant by the term mission data. The spacecraft does not initiate transmission. Section IV - Heads of Department Paragraph 6 'The Director, National Security Agency, in coordination with other departments or agencies as appropriate, shall assess space systems telecommunications, TT&C, and mission data functions to determine their vulnerability to unauthorized use and provide approved protection techniques and guidance.' ? Declassified in Part - Sanitized Copy Approved for Release 2013/03/18 : CIA-RDP87M0027nRnnn1nn17nnoa a _ Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 This activity, to be successful, should have the full participation of each carrier concerned since each carrier resources have different characteristics. Section IV - Heads of Departments Paragraph 7 'Nothing in this policy shall relieve the heads of Federal departments and agencies of their responsibility and authority for executing other measures to assure the adequate protection of their telecommunications.' No Comment General Conrnents and Questions a. Encrypted TUC links are vulnerable to jamming - extended jamming can cause a loss of control of the satellite. b. Does this policy directive provide for monies necessary for TUC encryption, software modification, security measures and physical TUC site security, and training? c. Does this policy directive contemplate placing the responsibility for broad band traffic encryption on the carrier? ? Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R00010017R Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 d. Can paragraph 6 be interpreted to mean that NSA will pay for expenses associated with encryption? e. If the carriers are to pay for the equipment associated with this policy, how would the government address the problem of competition with terrestrial systems who presumably handle traffic in the time proven manner and do not have the financial burden of encryption? f. Does the proposed policy contemplate modifying all satellites capable of handling government traffic whether or not they are used for that purpose (i.e. an exclusively all video distribution satellite). 9. Is the government aware that a hi-powered uplink carrier that saturates the TT&C receiver, can provide more protection against a conus originated signal than an encrypted uplink? h. There are more credible threats than acquiring TT&C such as burning out the front ends on the receivers or burning out the earth sensors. I. I suggest that this policy be discussed among the carriers and the drafters of this policy paper and NSDD 145. It may be more easily handled with the NIAC Commission Carrier Committee rather then the entire Long Range Planning Committee. Until some of the above questions are answered, RCA cannot provide a position on this ambiguous document. Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87Mnn79npnnni nni7f-v-v-)c . Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 c A Subsidiory of the Association of American Rollroods Henry W. Meet.) President Mr. C. J. McLean Vice President Government Communications GTE Service Corporation 1120 Connecticut Ave., NW Washington, DC 20036 Dear Mr. McLean: November 30, 1984 Reference, your memo of November 27, 1984, regarding National Policy on Applications of Communications Security to Civil (US Government and Commercial) Space Systems. I raise a concern regarding execution of that policy by the National Security Agency, but not with the policy itself which is quite broad. Spe- cifically, I believe the commercial sector should be assured that the 'approved protection techniques' provided by NSA will neither inhibit the commercial use of satellite communications nor the exploitation of that technology. Thank you for the opportunity to comment on the draft policy. Sincerely, RAILINC CORPORATION ? 1920 L Street, N.W. ? Washington, D.C. 20036 ? 202/835-9400 ? Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R00010017no7s_n ? Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 e!4:1 COMSAT COMMUNICATIONS SATELLITE CORPORATION Robert F. ADnott Vu President Gownsman( Adios December 13, 1984 Mr. C. J. McLean Vice President Government Communications GTE Service Corporation 1120 Connecticut Ave., SW Washington, DC 20036 Dear Mr. McLean: This responds to your memorandum of November 27, 1984, to the Members of the Long Range Planning Committee of NIAC. On behalf of COMSAT, I want to thank you for the opportunity to provide comments on what we deem as an important evolving national policy. Last year, the National Satellite Telecommunications Advisory Commis- sion (NSTAC) recommended that operators of commercial communications satel- lites should (a) in the short term, provide some method of command link protection; and (b) in the longer term develop, with the government, a com- mand link encryption standard. NSTAC also reviewed telemetry encryption and decided that this was not required to protect satellites against unautho- rized conmand access. We agree with the NSTACconclusions. With regard to the five-year grace period proposed by the policy, we feel that this is a reasonable period and would urge its retention in any policy that is finally adopted. We would suggest that a useful next step should be working level meetings between representatives of the government and the industry--both manufacturers and satellite owners?to discuss' the means of implementing the policy in detail. In this regard, we believe that the government should set standards for command link protection. rather than issuing detailed specifications for encryption equipment or other means of protection. Robert F. Allnutt 950 Ltrdant Plaza SW Washington. DC 20024 TeImhof* 202.8634313 Teks WQ66% Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 CON NI1tt Ng Nee MS Nas Viti s.aSsDat Neu. wpos .1 Pay a.. WA MUMS MOM Peguir? ea rano Dave acme wt. tammotaAulstamat.t, MWMKainemallst.ttltmetto &WWII v licaso mascots Cmen0cfaummr...... ? yooperet ? rot Di?Awroc.., Cower RC Nose Slaiotowt Off cro liwaimawc? ArKlii Pat oast StsCal Doyle" Platasbil. WOBAWOWS. lam Fag Sloasooit CAW CAMPS& IllasSOISft. Jou LOS itiolta'S Caton'. 10/Aertga ara Pat llama% Ilmaramn, Jaya V. Collovage grant Smasosa Cow,. OW Joan CO/Jaattoult etatmasstataos Otsa..t? Ilartog C. Earn Coatitat. ? IsmunctiCia Co? Fat Oa Porton en Ms. &sr cams faservo. (AVOCA OF LA* Soo0octoc.re Ca.otolo.o, Otoo,rItstoo co Juslca Ile. Toscriall Q palm. liaccionet tlaievot Oltattaistatato Caonas Otto Cacao ^ *limn I. Lump. AseArtiieff Mowry Los ildwaiiss Cown? rump Ceame.. CAW bun &ma Las os ca" INA,ArA Durainentert M.. a. C. mum. lloall.11S POOTECIWI LIAGIAA MIKA Witt OAIL11411.0 IPIAVIAITD rag rAPORINO OSCA?frOmmus N. 11M.A.11111100,aCm Ilatactto OreCt Co Cowan ? 114?..Cit ^ WA.4AAW J. Parritosta, Patatuo. tot MM.:, 6,1?..AA/Atart &At Na. JO..', 111,011Ati.l. INWA4Weiff. NOWT AIM MVO WC SteallAA ? ANL CANOWlet filArt Passattrt CA,oitotot Sot tot,,,,e? Scoocts &MX NO. ? Ina.loass Roos CA01,00..A 41606.14.A.K11 4160C..110. -111*-00 ?a4.1.Allip A WogAsea CONA?ANAI? CA?0,012ft+A AlAtiOna.GUSD Cesemisseacra? Ames c Phaa????? California Xegislaturi joint Committee on Aire, gum-sr:try ant, pisaster Aerilices SENATOR WILLIAM CAMPBELL CHMRMAN December 5, 1984 Mr. C.J. McLean Vice President, Government Communications GTE Service Corporation 1120 Connecticut Avenue, N.W. Washington, D.C. 20036 Dear Mr. McLean: 00010.00 1100 jStair sac...two c ? es. a ni.111toONS 101S tat I SS , Cow, avg., ?.. complerrfit War' 111,Aidi 1AAllosas ? .04?4061, Cosa.. 9 0.- 11110?4?1 S Ge slog ? ii? adiecic4,1 Coftb...?.? SA WASIAK,' 0 Sac.''.. Upon reviewing the draft 'National Policy on Telecommunications and Automated Information Systems Security, I concur with the need to safeguard from hostile exploitation those telecommunications systems that process sensitive information. It appears that the identified objectives and policies for developing the necessary safeguard measures could be successfully implemented given the proposed organizational structure. My only concern is in regard to the role and input of the Federal Communications Commission in this project. Since the FCC is responsible for licensing and regulating domestic telecommunications systems, I firmly believe that those individuals involved in the decision making process should consult with the Commission. I am confident that a cooperative arrangement can be established to bring that about. Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170075-R . Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Mr. C.J. McLean December 5, 1984 Page two Thank you for allowing me the opportunity to comment on this draft policy. If I can be of any assistance, please contact me at your convenience. cerel / 17,ERRY M. EALEVA B if Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025.-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 MEMO TO THE COMMON CARRIER SUB COMMITTEE Re: "The National Policy On Application of Communications Security TO Civil Space Systems" The Common Carrier Sub Committee has been asked to address the above national policy for adequacy and acceptability to the Common Carriers. A survey was conducted by the Long Range Planning Committee and the concensus was that the policy was ambiguous in several important areas. Some terms were not clear. The intent of the government as to how the services are to be provided is not clear. The threat is not well defined. Section I of the Policy paragraph 2 Indicates two needs: (1) Protection for classified government communications. (2) A protection of presumably unclassified but sensitive government contractor security related information. Protection of the communication of classified government information in accordance with existirig policy, is the responsibility of the originator of the transmission. This is usually done by providing the carrier with an encrypted bit stream that is transmitted to the receiving agent who in turn decrypts the signal. This represents no problem to the carriers and has been a standard operation for some years. Protection of the unclassified data Is less clear. Is the protection DES or KG equipment? Is the protection circuit by circuit or by bulk encryption. How Is analog handled? The circuit by circuit protection is not a problem if the originator provides a protected bit stream to the carriers. However, if the A. Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 carrier is to provide bulk encryption as a service, this is a problem that warrants considerable discussion and definition. Paragraph 2 of Section 1 defines a need to protect "The essential elements of Tracking Telementry and Control (TT&C) and mission data. Definition Is required on the word "protect" and the words "mission data." Is the protection system defined by the carrier at the government? If the government defines a system that places a financial burden on the carriers, does the government assume financial responsibility? Much of the system definition problem Is a lack of a clear Threat analysis that defines the problem to be solved. NSDD 145 Indicates the threat Is the interception of classified or sensitive data by foreign nations, terrorist groups and criminal elements. If the problem is interception then there is not so much concern at TUX. Each of the above groups have different Interests.. The Interception problem has been with us for many years and it is manageable. Procedures exist for government contractors to be reimbursed for their efforts to secure information. The terrorist problem is on the increase. Terrorists are becoming ? more sophisticated. There is some unanimity among knowledgeable people In the government that terrorists by design do not perform large coordinated efforts. Rather they perform spectacular operations with relatively few people to bring about political change by public opinion and feelings of insecurity. There are however enough of the more notorious terrorist groups in the United States TO perform coordinated operations if they uent Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 to. Power systems and communication system have been targets in Central America - primarily Transmission towers, power stations and antennas. It is no clear who is interest in TT&C. The following questions address the TT&C problem and tend to help carriers to understand the problem to be solved. THREAT (1) Who is the "enemy"? (2) Why does he want to access the satellites? (3) What does he want to do with the satellite? (4) Does he want temporary disruption, permanent disruption, destruction, or to steal it? (5) What technique will he use? (6) What are his assets to acquire access to the satellite? (7) How many satellites can he access at once and how frequently? (8) Is there a factual background that indicates that he will, in fact, make an attempt to access a satellite, or is there just a suspicion that he may possibly act against a satellite? (9) Why Is accessing the satellite preferable to jamming it or destroying it? TECHNOLOGY (1) Are there more than four options for the protection of the TT&C of the satellites? di Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 ? Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 (a) 0 E S - Available now. (b) NEW N S A algorythm - Available 6 18 months. (c) Jamming the uplink - Available now. (d) Inhibit system - Available 6 - 12 months. (2) How long will the DE $ equipment be acceptable as a means of protection to N S A? 1 - 3 years, 3 - 6 years, over 6 years? (3) How long will the new N S A algorythm be acceptable to N S A as a means of protection? 1 - 5 years, 1 - 10 years, over 10 years? (4) Jamming the uplink appears to be a good means of prohibiting access to the satellite. Why is this more cost effective technique not acceptable against such an Ill defined threat? (5) Is the "inhibit" system capability an acceptable amount of protection when coupled with a jamming capability? (6) Most carriers have in orbit spare satellites in event of the catastrophic loss of an operational satellite. Is this considered as protection? (7) What is the government intent - why? There will be further demands on carriers to protect other portions of their systems. We need to look at the most cost effective means to provide realistic pr. tion. John Boning Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part- Sanitized Copy Approved forRelease2013/03/18 : CIA-RDP87M00220R000100170025-6 RCA American Communications, Inc I 400 College Road East Princeton, NJ 08540 I Tel (b09) /344000 February 8, 1985 Mt. Herbert Neuman Executive Secretary, NIACC Federal Communications Commission Room BB #324 Washington, D.C. 20554 RCA APPENDIX F Dear Mt. Neuman, As per your request, enclosed is the summary of my remarks at the National Industrial Advisory Committee Common Carrier Communications Sub-committee meeting on the protection of telemetry tracking and control (TM) for commercial satellites of 29 January 85. Please feel free to call on me if I can be of any further assistance. Best regards, in, Mgr. Mission Operations JL: eb cc: J. Boning Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 PRU1 U., 1 lUN kik 1tLtML1zu, i KALAIINV, ?i1/44 (secure commanding) Commercial Communications Satellites are said to be vulnerable to unfriendly intrusion via the command system with the intruders ultimate aim of disruption of communications service. and for incapacitating the satellite for extensive periods or permanently. The preceding attacks are said to be particularly inopportune were they to occur during periods of urgent need. such as a world crisis or national emergency. It is during such periods that the Government would like to be able to count on the availability of commercial communications satellites to continue Government business carried theron to a large extent and/or to supplement other Government owned communication capacity. Commercial communications satellites comprise an available resource of major proportions (approximately 20 satellites - 1985 and more than double that number currently authorized and expected to be launched by 1986). It should be noted that the given objective of a "long term" or permanent denial of communications service ascribed to the unfriendly intruder can be attained via means other than spoofing the satellite command system, some of which might be attainable more effectively by certain types of unfriendly agents. For example, destruction of Earth Sensors via lasers. destruction of the communications or command receivers via high power klystrons (Giga Watts-pulsed) currently available or under development, placing noise generators near TT&C sites within side lobes of ground TT&C antennas effectively precluding telemetry reception, jamming either the communications or command receivers with high power carrier or physically destroying TT&C sites. Thus command system intrusion is an avenue of attack, singled out, perhaps out of context with the total range of interrelated possibilities. Within the above context, the suggested countermeasure of commercial communications satellites command link encryptions without assessment and in isolation of other attack possibilities is perhaps premature. Limiting this discussion to command link intrusion, however, other counter measures intended to deny unfriendly access can be named, with potentially less costly consequences: 1. High Power Command Carrier - permanently on and beamed to the satellite. Given the typical FM satellite command receiver with limiting, unfriendly intrusion would be possible only by another carrier whose power levels were 2-4 dB higher. With existing dedicated, per satellite large apperture (9-14 meter) antennas at TT&C sites, this approach would effectively limit all but resource rich potential intruders. 2. Satellite Command Antenna Beam Shaping - The typical "omni" antennas providing broad coverage during transfer orbit or during spinning of the satellite is not considered here. Generally commanding via omni antennas requires significantly (10dB) more power than via the communications antenna. Additionally this antenna can be switched "off" in Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6 when on-orbit, and automatically reconnected should the satellite lose earth lock and begin to spin out of the communications antennas "footprint". The potential intrusion threat is greater when command receivers are accessed via the high gain communications antenna with its expansive conus coverage and beyond footprint area.In contrast, on-orbit commanding needs can generally be satisfied by very limited "spot beams" or significantly narrowed footprint drastically decreasing the gain from offshore or transborder regions. This would require the intruder to use substantially greater resources to provide very large (30 meter +) antennas, to gain commanding access outside of the "footprint" area. 3. Raise The Command Receiver Threshold - commandable while on-station, necessitating higher power by the intruder. 4. Provide Intrusion Detection - via Telemetry.. This capability currently exists in a number of sitellites. This implies an override capability from the detecting TT&C sites. The preceding are but a few ideas that come to mind. They can be used singly or in combination. Each is effective to a greater or lesser degree on the type of intruder threat postulated:i.e. it is scenario dependent. The same can be said of command link encryption. The scenario of a hostile command jammer threat, for example, would, if allowed to persist long enough (hours to days). result in loss of communications or loss of the satellite even with encryption. In some cases jamming might, as is likely to be the case-by design, force the command system to revert to a "clear text" mode, allowing intrusion freely. The common thread throughout the preceding discussion is commanding power. An intruder without the ability to keep out TT&C attempts to overcome or correct whatever upset might have been caused by him, will prove less effective. As discussed earlier, encryption can be defeated via jamming of the command link or the telemetry link. Thus the ultimate counter to a potential intruder is the ability to uplink more power than the intruder, short of receiver destruction. A continuous high power carrier will effectively keep all lower power intruders out and retain control of the satellite. Spread Spectrum may be the optimum approach to high power systems. The preceding represent some ideas on the subject of satellite command link protection from hostile intruders whose objective is said to be the long periods (days to weeks) or permanently denial of a satellites communications capacity. It enumerates without discussion some other possible attack scenarios aimed at the same end. Clearly, a comprehensive "system" assessment as to the "Threat" and its countermeasures needs to be made before a determination as to the nature and scope of command protection is undertaken. L Declassified in Part - Sanitized Copy Approved for Release 2013/03/18: CIA-RDP87M00220R000100170025-6