Rebuilding the New Orleans Region: Infrastructure Systems and Technology Innovation Forum Bernard L. Malone III Technical Manager Wireless Networks Contributor to The President’s NSTAC ECITF Task Force Private Sector Advisor – U.S. State Department Delegation OAS ANSI & IEEE Panel Presenter Work of the Bell Labs Network Reliability & Security Office September 26, 2006
23
Embed
Rebuilding the New Orleans Region: Infrastructure Systems and Technology Innovation Forum
Rebuilding the New Orleans Region: Infrastructure Systems and Technology Innovation Forum. Bernard L. Malone III Technical Manager Wireless Networks Contributor to The President’s NSTAC ECITF Task Force Private Sector Advisor – U.S. State Department Delegation OAS ANSI & IEEE Panel Presenter - PowerPoint PPT Presentation
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Rebuilding the New Orleans Region:Infrastructure Systems and Technology Innovation Forum
Bernard L. Malone IIITechnical Manager Wireless NetworksContributor to The President’s NSTAC ECITF Task ForcePrivate Sector Advisor – U.S. State Department Delegation OASANSI & IEEE Panel PresenterWork of the Bell Labs Network Reliability & Security Office
September 26, 2006
Perspectives from Critical Industry-Government Fora Wireless Emergency Response Team
(WERT) - saving lives
FCC Mandates for Outage Reporting - collaborative industry analysis
FCC Network Reliability & Interoperability Council (NRIC) - Best Practices
Vulnerability- A characteristic of any aspect of the communications infrastructure that renders it, or some portion of it, susceptible to damage or compromise
Threat- Anything with the potential to damage or compromise the communications infrastructure or some portion of it
FCC NRIC VI Homeland Security Physical Security Final Report, December 2003.
Some Characteristics of Ts and Vs
Vulnerabilities (intrinsic) finite fixed and well known only way threats can impact
Threats ~ infinite in number knowledge value is fleeting each has permutations
FCC NRIC VI Homeland Security Physical Security Final Report, December 2003.
A Fundamental Lesson of 9-11
. . . is the need to identify and address vulnerabilities – independent of threat knowledge
• Does NOT mean that you abandon threat and risk analysis
• It means you MUST supplement it, balance it, integrate
. . . this means more science and engineering competencies are needed
8 Ingredients of Communications Infrastructure
HardwareHardwareSoftwareSoftware
EnvironmentEnvironmentPayloadPayload
NetworksNetworks PolicyPolicyHumanHumanPowerPower
CCOMMUNICATIONSOMMUNICATIONS I INFRASTRUCTURENFRASTRUCTURE
TRANSPORTATION ENERGY
FINANCIAL
PUBLIC HEALTH
LAW ENFORCEMENT
Other InfrastructuresOther Infrastructures
. . . Example of Intrinsic VulnerabilitiesHardware
The President’s National Security Telecommunications Advisory Committee (NSTAC) Next Generation Networks
(NGN) Task Force Report, March, 2006
Integrated V-T-BP FrameworkTwo approaches can be integrated
by preventing the exercise of vulnerabilities, and/or mitigating the impact should a vulnerability be exercised
X-222
The Network Reliability Steering Committee's mission is to analyze the industry's major network outages in order to: identify trends make recommendations aimed at improving network reliability make the results publicly available
. . . in order to help ensure a continued high level of reliability of the nation’s public networks.
www.atis.org
Network Reliability Steering Committee Mission
2004 Annual Report
www.atis.org
Network Reliability Steering CommitteeOutage Deep Dive Analysis
NRIC History & Focus
20051992
NRC I NRC II NRIC III NRIC IV NRIC V NRIC VI
Homeland Security
Packet SwitchingY2KInteroperability
(Telecom Act of ’96)Reliability
NRIC VII
Emergency Services
Historic Analogy
Systematic Vulnerability Assessment
Best Practice
Development
NRIC Best Practices - Overview Most authoritative guidance in the world for communications
industry – network reliability, network security, physical security, disaster recovery
Offer what no one company’s SMEs can offer Intended to be implemented voluntarily NRIC VII includes a focus on reliability of Wireless Networks ~800 Best Practices:
Bell Labs Personnel deployed to New Orleans with the BSR six days after Katrina BSR mounted on USCG Helicopter for SAR Operations Unique stand-alone network established over the city Over 50 GSM cell phones identified and contacted Coast Guard observers say: “BSR could be a critical tool in Search and Rescue”
“Take Away’s” A Fundamental Lesson of 9-11 is the need to identify and address vulnerabilities – independent of threat knowledge
An optimum balance of core competencies requires more integration of the science and engineering disciplines into rebuilding planning, investments and policies
The private sector is very motivated from business and/or human interest reasons