WARRIORIAM CAPABILITIES
CYBERSECURITY CHALLENGE
Presently there is no end in sight to data breaches, cybercrime, and cyber attacks by our enemies.
With the advent of cyberspace as an operational domain of war, our enemies have skillfully exploited the vulnerabilities of our present weak and vulnerable state of being digital.
All of us are being surveilled online – profiles being built and shared across a sea of players who expose us to harm.
Special forces members and their families have and continue to be hunted. They are priority targets for our enemies. Presently, citizens and warriors have little if any control over their human-digital existence, their digital identity and information assets.
Core to the cybersecurity catastrophe we are experiencing are that of computer language data primitives (e.g. Java): byte, short, int, long, float, double, char, boolean, and XML, JSON, and other primitive object types that were never designed to be secure, to be self-protecting, or self-governing.
In other words, the data object is the most fundamental flaw in our critical information technology fabric.
As a result, our information is weak, vulnerable, easy prey. This is a fundamental flaw and continues to put us all at risk and in particular SOF Warriors and their families who are being hunted by our adversaries.
WarriorIAM is a tool for SOF Warriors to gain an asymmetric advantage in cyberspace—taking control of their digital identity and information assets wherever they exist
WARRIORIAM SELF-DETERMINING DIGITAL PERSONA™
POLICY MANAGEMENT CAPABILITY
TRUST COMMUNITY & REPUTATION MANAGEMENT
Trust in warfare is fluid, not static, and can change immediately. Trust Community (TC) members trust reputations, governing data access and processing policies are dynamically controlled.
Through the ability to trigger governing policy by recipient behavior, owner-operators can dynamically reassess and change the trust reputation of others and alter governing policy at will.
This is further enhanced by automatic lockdown and erase forever capabilities.
For example, once a Metered Time Policy has expired: e.g., 1 minute data access policy to sensitive mission location data, the agent will automatically lockdown or erase forever.
HUMINT OPERATIONS
HUMINT managers conduct and negotiate trusted information-for-value or benefit transactions with human sources. MIS and HUMINT professionals manage the identities of HUMINT sources. Videos, audio speeches, training, cultural values material, and counter-messaging campaign content can be encapsulated within a Self-Determining Digital Persona (SDDP) and distributed within social networks and operation specific TCs.
We envision enhanced human intelligence gathering through social networks, such as CYVA’s eMetro™, a commercial Trusted Network Community™ or other popular social networks. Operators can use their smartphones to engage in pay-for-intelligence gathering operations.
Moreover, COTS smartphone makers and independent developers continue to advance secure mobile payment capabilities that can include the use of cryptocurrency. CYVA Research proposes to combine these capabilities demonstrating a secure, HUMINT source identity protected, reward-for-intelligence transaction.
PERSONNEL RECOVERY/ISOPREP MANAGEMENT
Personnel Recovery is a system to return isolated personnel to duty, sustain morale, increase operational performance, and deny adversaries the opportunity to influence military strategy and national will by exploiting the intelligence and propaganda value of isolated personnel.
WarriorIAM provides a method of gathering and sharing isolated personnel report (ISOPREP) and evasion plans of action (EPAs) or their equivalents and, when needed, obtain ISOPREP and EPA data for further dissemination to recovery forces.
GOING BEYOND ENCRYPTION
Once primitive data is encrypted confidentially and integrity can be protected, provided the encryption scheme is properly implemented. However, once primitive data is decrypted, a key is provided to the recipient for decryption, you are at the mercy of recipients and systems in safeguarding and controlling access to these primitive data objects. Recipients of primitive data objects can do whatever they want with the decrypted data.
Encryption works well for hiding the meaning of a message, but we need to go beyond scrambling data, especially when it comes to operational control, controlling the data post decryption – controlling the performing of operations on data objects such as read, update, delete, transfer and exchange.
SPECIAL RECONNAISSANCE
Special reconnaissance, surveillance, and exploitation entails reconnaissance and surveillance actions normally conducted in a clandestine or covert manner to collect or verify information of strategic or operational significance, employing military capabilities not normally found in conventional forces.
SOF operators must be able to securely gather, transmit, receive, store, process, and protect information in near-real time while being vigilant in discerning the trustworthiness of others.
SMARTPHONE-BASED AD HOC COVERT COMPARTMENTAL COMMUNITIES
Information warriors discern and decide independently and/or co-operatively who they trust and who they don’t.
Warriors dynamically manage trust reputations, as they can be highly fluid in warfare, and continuously control the exchange and processing of their deployed identities and information agents within warrior managed trust communities of human and machine entities.
CHALLENGE: CONTROLLING MESSAGE DATA
Communicating securely and controlling message data is challenging especially when trying not to leave a digital footprint. Emerging and publicly available secure messaging products continue to evolve and have differing security capabilities.
Can message data truly be erased from a device with high assurance that the operating environment integrity is good and the security operation or transaction has been performed?
Can a forensic audit log of message received and message read actions be sent back to the sender confirming the message was received and read by the intended recipient? Can additional message policy rules be set governing the amount of time a message is displayed or allowed to exist on a recipient device?
TRUSTED MESSAGE AGENT (TMA) CAPABILITY
It is critical that HUMINT Operations Officers can send secure and controlled messages to trusted community (TC) members (e.g., HUMINT assets, other clandestine operators, allies).
ISIS/terrorist members routinely stop and interrogate individuals on the street and confiscate and examine their smartphones for any messages or material that would indicate they are infidels or traitors and summarily execute them provided they find such messages or content.
Our proposed TMA provides operators a means to set a Metered Time Policy so after 15 seconds post receipt/decryption the TMA (message) will self-erase, leaving no forensic trace of the message. Again, the mobile information objects are self-protecting, self-governing and can be pre-set to lockdown or erase forever.
HYBRID CYBERSECURITY SOLUTION
CYVA’s WarriorIAM™ system is based on a combination of CYVA’s patented cybersecurity innovations, security certified (FIPS 140-2, CC, DISA) Samsung COTS equipment, ARM® TrustZone® technology, a system-on-chip (SoC) security architecture that establishes two hardware-based “worlds” — a Normal World and a Secure World.
The Normal World is where non-secure software and data processing takes place. The Secure World is reserved for storage and computing of sensitive (encrypted) data and the associated cryptographic keys.
By erecting a strong security perimeter between the two worlds, hardware logic present in the TrustZone bus fabric prevents Normal World components from accessing Secure World resources.
Shown in the figure below, the TrustZone monitor controls switching between worlds. Applications that run in the Secure World are called Trusted Apps(TAs).
The combination of TrustZone-based hardware isolation, Trusted Boot and a trusted OS make up the Trusted Execution Environment (TEE) on Samsung devices.
This hybrid solution positions the military for asymmetric cyber advantages, enhanced cyber resiliency, lower operational and unit costs (COTS equipment), improved sustainability and adaptation speed - secure continuous development/delivery.
CYVA Research is a Samsung Enterprise Alliance Program (SEAP) partner and developing Trusted Apps (TAs).