Feeds

US Coastguard 'cutters' could offer network vuln

Admiral insists his backdoor can't be sniffed

Boost IT visibility and business value

The US Coast Guard has stoutly denied that its new National Security Cutters, currently under development, will be leaky - leaky in a wireless-security sense, that is.

The US Coast Guard, a seagoing paramilitary organisation with rescue and enforcement responsibilities, is comparable in size to many medium-sized world navies. The planned "cutters" are actually 4,300 ton pocket frigates mounting 57mm cannon and radar-controlled Phalanx gatlings capable of shooting a missile out of the air.

They can carry a brace of normal helicopters or as many as four Fire Scout droid choppers configured for surveillance or armed attack.

A US Coast Guard "cutter". Hate to meet one of their big ships.

The cutters are supposed to be capable of operating with US Navy and other military forces in the various Wars On Stuff, and they will thus be able to tie into the armed forces' comms and IT networks. This brings with it a requirement for military-grade security.

In particular, the Coasties' new ships need to be compliant with the National Security Agency's TEMPEST certification. TEMPEST refers to a type of spying in which suitably equipped attackers can sniff electromagnetic emissions from unshielded electronics, even if that gear isn't designed to communicate wirelessly.

If suitable precautions aren't taken, a team of knob-turners in a van parked on the jetty - or a "fishing boat" lurking nearby at sea - could conceivably tune into much of what was happening in a cutter's ops room or signals office, lifting the info unencrypted from the ship's internal systems.

Serious electronic spooks aren't found on the payroll of the Coasties' day-to-day enemies - drug smugglers and such. But if a cutter is plugged in to the US Navy's net it will become a target for first-division players, so it needs to have suitable security.

But, of late, reports have circulated that Coast Guard inspection teams have found that the new ships may not be TEMPEST compliant.

But officials are now contradicting that version of the story, saying they were just trying to get on top of any problems at an early stage.

"Everything will be done before the first piece of classified material ever runs on this ship," Coast Guard Admiral Ronald Rabago told Aerospace Daily yesterday.

"We wanted to get ahead of any potential Tempest issues. This will all be resolved. We take Tempest certification very, very seriously. We are not going to operate a system unless it meets all the requirements."

Michael Tangora, Coast Guard acquisition chief, said: "We'll probably find more stuff. This is a normal course of events, especially when you bring a first-of-class ship online. This is when you're learning all your problems."

Tangora said some shielding of electronics cabinets might need to be sorted out.

"We're taking tests on cabinets early, and we found emanations," he said. "But these are not classified emanations. We're just pumping electricity and signals through. If there are problems, we're correcting them."

Tangora said the new warship-like cutter would be "the most capable C4ISR* ship the Coast Guard has ever built". ®

*Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance. Some people like to get a "Target Acquisition" in there too, for C4ISTAR. Anyone remember back when it was just Command & Control? ®

Build a business case: developing custom apps

More from The Register

next story
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Detroit losing MILLIONS because it buys CHEAP BATTERIES – report
Man at hardware store was right: name brands DO last longer
Munich considers dumping Linux for ... GULP ... Windows!
Give a penguinista a hug, the Outlook's not good for open source's poster child
Govt control? Hah! It's IMPOSSIBLE to have a successful command economy
Even Moore's Law can't help the architects of statism now
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
This'll end well: US govt says car-to-car jibber-jabber will SAVE lives
Department of Transportation starts cogs turning for another wireless comms standard
New voting rules leave innocent Brits at risk of SPAM TSUNAMI
Read the paperwork very carefully - or fall victim to marketing shysters
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.