NSTAC REPORT to the PRESIDENT on Communications Resiliency May 6, 2021 Table of Contents

Total Page:16

File Type:pdf, Size:1020Kb

NSTAC REPORT to the PRESIDENT on Communications Resiliency May 6, 2021 Table of Contents THE PRESIDENT’S NATIONAL SECURITY TELECOMMUNICATIONS ADVISORY COMMITTEE NSTAC REPORT TO THE PRESIDENT on Communications Resiliency May 6, 2021 Table of Contents Executive Summary .......................................................................................................ES-1 Introduction ........................................................................................................................1 Scoping and Charge.............................................................................................................2 Subcommittee Process ........................................................................................................3 Summary of Report Structure ...............................................................................................3 The Future State of ICT .......................................................................................................4 ICT Vision ...........................................................................................................................4 Wireline Segment ............................................................................................................5 Satellite Segment............................................................................................................6 Wireless 5G/6G ..............................................................................................................7 Public Safety Communications ..........................................................................................8 Key Evolutions in the Power Sector....................................................................................8 Next-Gen IP .....................................................................................................................9 ICT Architectures Transformation ....................................................................................10 ICT Security Transformation ............................................................................................14 Major Technologies and Resources Leveraged ...................................................................16 Software-Defined Networking..............................................................................................16 Quantum Computing, Communications, and Encryption ........................................................16 Artificial Intelligence (AI) .....................................................................................................18 Chipset and Foundry (Resource Issue) ................................................................................18 Potential Resiliency Stressors to the Future Network ..........................................................20 Wide-Scale Electromagnetic Pulse ......................................................................................20 Position, Navigation, and Timing Disruption ..........................................................................21 Long-Term Outage (30+ days) .............................................................................................22 Supply-Chain Based Cyber Attack .......................................................................................23 Non-Dependent Challenges ..............................................................................................24 Evolving Technological Threats ............................................................................................24 Technological Discoveries...................................................................................................25 The Form of the Future Internet: New IP and Its Alternatives..............................................26 Evolutions in Secure Internet Routing ..............................................................................26 Spectrum ......................................................................................................................27 NSTAC Report to the President • Communications Resiliency i Global Market Destabilization ...........................................................................................27 Internet Bifurcation ........................................................................................................27 Supply Chain-Based Global Economy ...............................................................................28 Standards .....................................................................................................................28 Summary of Findings and Analysis of the Future State of ICT ..............................................28 Network Densification and Ubiquitous Connectivity ...............................................................28 Incorporation of the Enterprise Into Shared Risk Planning .....................................................29 Reliance on Cloud-Based Services ......................................................................................30 Secure and Resilient Supply Chains ....................................................................................30 The Broad Impact of Quantum-Based Technologies ..............................................................31 Accelerating Artificial Intelligence Implementation .................................................................32 Standards and Interoperability ............................................................................................32 Resilient and Ubiquitous PNT Services ................................................................................32 Power Remains a Key Dependency ......................................................................................32 ICT Is an Integral Component of National Security ................................................................33 Summary of Actions the Administration Can Take to Support the Future ICT Vision ...............35 Public/Private Planning, Consultation, and Risk Assessments ...............................................35 Changes in Emergency Preparedness Practices/Procedures ..............................................35 Communicating the Resiliency of Underlying Cloud/Edge Environments ..............................35 Impact of Geopolitical Issues .........................................................................................36 Forward Assessment of ICT/Power Dependencies ............................................................36 Continued Reliance on Fuel: Stockpile Issue ....................................................................36 Next Generation IP Strategy ...........................................................................................36 Recommendations to Support Deployment of Future Networks ...........................................37 Trusted Semiconductor Supply Chain ...............................................................................37 Spectrum Policies ..........................................................................................................37 Fiber Deployment ..........................................................................................................37 National Timing Architecture ...........................................................................................37 Recommendations to Support Adoption of Key Technologies ...............................................38 The U.S. Government Can Foster Enterprise Adoption of Next-Gen Technologies .................38 Cybersecurity Considerations for U.S. Government Networks .............................................38 Standards .....................................................................................................................38 Post Quantum Cryptography ...........................................................................................39 Incorporating AI .............................................................................................................39 NSTAC Report to the President • Communications Resiliency ii Utilizing Testbeds to Enable Mastery of Quantum and AI Technologies .................................40 Testbeds: Quantum-Based Technologies .........................................................................40 Testbeds: AI ..................................................................................................................40 Conclusion ......................................................................................................................40 Appendix A. Subcommittee Membership ...........................................................................A-1 Appendix B. Acronyms .....................................................................................................B-1 Appendix C. Definitions ....................................................................................................C-1 Appendix D. Bibliography ................................................................................................ D-1 List of Figures Figure 1. Enablers of Technology Convergence .......................................................................5 Figure 2. Advanced Antenna Systems (AAS) – Beamforming and MIMO Examples .....................7 NSTAC Report to the President • Communications Resiliency iii Executive Summary Nearly a decade has passed since the President’s National Security Telecommunications Advisory Committee (NSTAC) last reviewed the Nation’s communications resiliency posture. In its 2011 NSTAC Report to the President on Communications Resiliency
Recommended publications
  • Apollo Funds to Acquire U.S.-Based Telecom Platform from Lumen Technologies
    Apollo Funds to Acquire U.S.-Based Telecom Platform from Lumen Technologies Transaction to accelerate fiber build to millions of American homes and businesses NewCo platform to be led by former Verizon Fios Executive Team NEW YORK– August 3, 2021 – Apollo Global Management, Inc. (NYSE: APO) (together with its consolidated subsidiaries, “Apollo”) and Lumen Technologies, Inc. (NYSE: LUMN) (“Lumen”), today announced that funds managed by affiliates of Apollo (the “Apollo Funds”) have entered into a definitive agreement to acquire Lumen’s ILEC assets and all associated operations across 20 states (“NewCo”) for $7.5 billion. The transaction is subject to customary closing conditions, including regulatory approvals, and is expected to close in 2022. Today, the NewCo platform serves more than 6 million homes and businesses across the Midwest and Southeast regions of the United States. As a standalone company, NewCo will be led by Bob Mudge, Chris Creager, and Tom Maguire – industry veterans who together were responsible for the buildout and growth of Verizon’s fiber-based Fios service. The investment from the Apollo Funds will help accelerate the upgrade to fiber optic technologies, bringing faster and more reliable internet service to many rural markets traditionally underserved by broadband providers, while delivering best-in-class customer service. “The team at Lumen has built a great business and we see an incredible opportunity to provide leading edge, fiber-to-the-home broadband technology to millions of its business and residential customers,” said Aaron Sobel, Private Equity Partner at Apollo. Sobel continued, “As more of our economy, educational systems and entertainment choices move online, it reinforces the urgency and importance of providing faster, more reliable internet connectivity to bridge the digital divide, particularly in rural and suburban America.
    [Show full text]
  • 2021 Proxy Statement 3
    Table of Contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 SCHEDULE 14A Proxy Statement Pursuant to Section 14(a) of the Securities Exchange Act of 1934 (Amendment No. ) ☑ Filed by the Registrant ☐ Filed by a Party other than the Registrant CHECK THE APPROPRIATE BOX: ☐ Preliminary Proxy Statement ☐ Confidential, For Use of the Commission Only (as permitted by Rule 14a-6(e)(2)) ☑ Definitive Proxy Statement ☐ Definitive Additional Materials ☐ Soliciting Material Under Rule 14a-12 Comcast Corporation (Name of Registrant as Specified In Its Charter) (Name of Person(s) Filing Proxy Statement, if Other Than the Registrant) PAYMENT OF FILING FEE (CHECK THE APPROPRIATE BOX): ☑ No fee required. ☐ Fee computed on table below per Exchange Act Rules 14a-6(i)(1) and 0-11. 1) Title of each class of securities to which transaction applies: 2) Aggregate number of securities to which transaction applies: 3) Per unit price or other underlying value of transaction computed pursuant to Exchange Act Rule 0-11 (set forth the amount on which the filing fee is calculated and state how it was determined): 4) Proposed maximum aggregate value of transaction: 5) Total fee paid: ☐ Fee paid previously with preliminary materials: ☐ Check box if any part of the fee is offset as provided by Exchange Act Rule 0-11(a)(2) and identify the filing for which the offsetting fee was paid previously. Identify the previous filing by registration statement number, or the form or schedule and the date of its filing. 1) Amount previously paid: 2) Form, Schedule or Registration Statement No.: 3) Filing Party: 4) Date Filed: Table of Contents Notice of 2021 Annual Meeting of Shareholders and Proxy Statement Table of Contents 2020 Company Highlights Strong Execution on Key Strategic Priorities Broadband Aggregation Streaming $15 billion Further deployed X1, Flex & Sky Q Launched Peacock with 33 million sign-ups investment in Comcast Cable’s broadband network since with 47 million devices deployed, provide more of in the U.S.
    [Show full text]
  • Critical Perspectives on Provable Security: Fifteen Years of “Another Look” Papers
    Advances in Mathematics of Communications doi:10.3934/amc.2019034 Volume 13, No. 4, 2019, 517{558 CRITICAL PERSPECTIVES ON PROVABLE SECURITY: FIFTEEN YEARS OF \ANOTHER LOOK" PAPERS Neal Koblitz Department of Mathematics University of Washington, USA Alfred Menezes Department of Combinatorics & Optimization University of Waterloo, Canada Abstract. We give an overview of our critiques of \proofs" of security and a guide to our papers on the subject that have appeared over the past decade and a half. We also provide numerous additional examples and a few updates and errata. 1. Introduction What does \provable security" mean? If \proof" is understood in the strict mathematical sense | as in \proof of the Pythagorean Theorem" or \proof of Fermat's Last Theorem" | then there's a simple answer: There is no such thing. \Provable security" is an oxymoron. As Benjamin Franklin said 230 years ago, \in this world nothing can be said to be certain, except death and taxes." About communications security there can be no certainty. But it is wrong to reject proofs in cryptography just because in general they do not measure up to the standards of pure mathematics. To take such an inflexible position would be, as Jonathan Katz pointed out, \snobbery at its purest" [200]. Proofs can be useful in several ways. They enforce a kind of discipline on authors so that they strive for precision, systematic approaches, and completeness. They rule out certain categories of attacks or attacks on certain parts of the protocol so that testing can focus on other types of attacks and on the assumptions made in the provable security theorem.
    [Show full text]
  • LUMEN MASTER SERVICE AGREEMENT Page 1 of 4
    LUMEN MASTER SERVICE AGREEMENT This Master Service Agreement ("Agreement") is between CENTURYLINK COMMUNICATIONS, LLC D/B/A LUMEN TECHNOLOGIES GROUP (“Lumen”) and «CUSTOMERNAME» (“Customer”). This Agreement provides the terms and conditions applicable to Customer’s purchase of products and services (“Service”) from Lumen. 1. Term. The term of the Agreement will continue until the expiration of the last Service term, unless earlier terminated in accordance with the Agreement (“Term”). 2. Service. Lumen will provide Service in accordance with the Agreement, including all applicable Service Schedules, Service Exhibits, Statements of Work, Order(s), pricing attachments, and any other documents that are attached or expressly incorporated into the Agreement (“Service Attachments”). Additional Service Attachments may be added by Amendment or by Customer placing an Order. 3. Order(s). Customer may submit requests for Service in a form designated by Lumen (“Order”). The term for a Service is defined in the applicable Service Attachment (“Service Term”). Unless otherwise set forth in a Service Attachment, Service will continue month- to-month at the expiration of the Service Term at the existing rates, subject to adjustment by Lumen on 30 days’ written notice. Lumen will notify Customer of acceptance of requested Service in the Order by delivering (in writing or electronically) the date by which Lumen will install Service (the “Customer Commit Date”), by delivering the Service, or by the manner described in a Service Attachment. Renewal Orders will be accepted by Lumen’s continuation of Service. For moves, adds or changes agreed to by Lumen, Customer will pay Lumen’s then current charges unless otherwise specifically stated in a Service Attachment.
    [Show full text]
  • Lumensm Data Center Services Omaha, Nebraska High Availability Enterprise Computing
    LumenSM Data Center Services Omaha, Nebraska High availability enterprise computing Designed and equipped to meet the demands of enterprises, wholesale businesses and government agencies, The Lumen Premier Elite Omaha Data Center is an ideal space to house your power-intensive applications and ensure business continuity. Get the incremental footprint you need for enterprise servers and storage systems with minimal capital investments or increased in-house costs for operation, administration and management. Size Campus access The campus and facility are accessible to customers 24 x • Raised floor space: More than 10,000 square feet. 7 Flood Plain: All facilities elevated above 100-year flood • Power densities: Exceeding 200 watts per square foot plain • Certifications • Tier III Uptime Institute Design Certified Nearest Airports Eppley Airfield – Omaha Airport Authority (OMA) – Public • Tier III Uptime Institute Construction Certified • Energy Star Storage Secure caged storage available for customer use Examinations and assessments • SSSAE 16 Examinations and PCI DSS Assessments Completed Floor system and floor load • Raised Floor: 20” Tate Concore 2500 Access Floor System • Floor Load: 2500 lbs/tile • Sub Floor Load: Depressed slab on grade Location Address 6805 Pine Street, Omaha, NE 68106 Campus 20 acres Parking 400-plus stalls Storm Resistance Cast in place concrete shell providing resistance to winds in excess of 200 mph Shipping Loading dock with dock leveler Lumen Premier Elite data center is protected by K12 rated perimeter. All critical infrastructure systems are housed internally. Power to evolve with connectivity to expand Migrating your enterprise applications to our data center means you gain direct access to our vast, advanced communications services and Lumen network with service to 45 countries around the globe.
    [Show full text]
  • The Changing Nature of TV Understanding How Streaming Video Is Changing What Consumers Think of TV
    WHITE PAPER The Changing Nature of TV Understanding how streaming video is changing what consumers think of TV. Contents Executive Summary ............................................................................................... 3 Methodology ........................................................................................................... 5 Geographic Distribution of Respondents ......................................................... 6 High-Level Findings ............................................................................................... 7 The Changing Definition of “TV”.......................................................................... 7 The New World of Streaming ............................................................................... 7 Mobility and Video ................................................................................................. 7 The Changing Definition of TV ............................................................................ 8 TV 2.0 Profiles ......................................................................................................... 9 Consumer Awareness Provides Opportunity and Challenges .................... 10 TV is Changing (And Remaining the Same) .................................................... 14 Navigating the Landscape of Interruptions .................................................... 16 Out With the Old, In With the New .................................................................... 18 The New World of Streaming ............................................................................
    [Show full text]
  • Lumen Retiree and Inactive Health Care Plan* Standard Consumer
    Lumen Retiree and Inactive Health Care Plan * Standard Consumer Driven Health Plan (CDHP) (Administered by UnitedHealthcare) Summary Plan Description (SPD) For Retired and Inactive Former Employees CenturyLink, Embarq, Qwest Post-1990 Management, Qwest Post-1990 Occupational Retirees (including Inactive and COBRA Participants) Effective January 1, 2021 This SPD must be read in conjunction with the Retiree General Information SPD , which explains many details of your coverage and provides a listing of the other Benet options under the Plan. * The Lumen brand was launched on September 14, 2020. As a result, Lumen, Inc. is referred to as Lumen Technologies, or simply Lumen. The legal name Lumen, Inc. is expected to be formally changed to Lumen Technologies, Inc. upon the completion of all applicable requirements. Issued Jan. 1, 2021 Table of Contents INTRODUCTION 1 The Patient Protection and Affordable Care Act Known as the “Affordable Care Act” ....................................... 1 The Required Forum for Legal Disputes .......................................................................................................... 2 How to Use This Document ............................................................................................................................... 2 Exempt Retiree Medical Plan Status Notice ...................................................................................................... 2 Lumen’s right to use your Social Security number for administration of benets .............................................
    [Show full text]
  • Fiber Trends: What 2021 Promises for the Broadband Industry
    INDUSTRY ANALYSIS Fiber Trends: What 2021 Promises For the Broadband Industry The 2021 broadband plans of incumbent telcos, independents, cable operators and electric co-ops will have a ripple effect on consumers and businesses. By Sean Buckley / Broadband Communities s the new year begins, BROADBAND the next decade if the telecom companies COMMUNITIES is asking industry successfully execute on their plans,” said Acolleagues what will drive the broadband Jonathan Chaplin, equity analyst for New industry in 2021. If anything is clear about the Street Research, in a research note. “This would past year, the COVID-19 pandemic highlighted take FTTH availability from 25 percent to that broadband has gone from being a luxury to a 35 percent of households – we assume growth necessity for remote learning and remote work. in occupied households of about 1 percent.” Key to that is a fiber-based symmetrical Render predicts that the potential number of connection. Whether service is from homes that could be passed by FTTH will be an incumbent telco, a cable company, a even larger when taking into account that a host municipality or an electric cooperative, fiber has of emerging players are building out service to a ripple effect: It gives consumers higher speeds more homes. “There are more than 1,000 other and can serve as an economic development tool providers in the United States alone – some to attract and retain businesses. small, some medium, some large – that add RVA LLC noted that as of 2020, more than up to more than 10 million,” Render said. 54 million U.S.
    [Show full text]
  • Centurylink Communications, LLC D/B/A Lumen Technologies Group (C) Price List No
    CenturyLink Communications, LLC d/b/a Lumen Technologies Group (C) Price List No. 1 TITLE PAGE UTAH Release 2 Issued: 11-24-2020 Effective: 12-04-2020 (A.L. 2020-P04) PRICE LIST Applying to the provision of Interexchange Telecommunications Service as provided by CenturyLink Communications, LLC d/b/a Lumen Technologies Group (C) whether offered under that name, or the trade or brand name CenturyLink or Lumen (C) in the State of UTAH ADOPTION NOTICE (N) Effective September 14, 2020, CenturyLink Communications, LLC registered and began operating under the fictitious name Lumen Technologies Group. As such, CenturyLink Communications, LLC d/b/a/ Lumen Technologies Group hereby adopts, ratifies and makes its own, in every respect as if the same had been originally filed by it, all schedules, rules, notices, concurrences, schedule agreements, divisions, authorities or other instruments whatsoever, filed with the Public Service Commission of Utah by or adopted by CenturyLink Communications, LLC prior to September 14, 2020. (N) Effective October 13, 2014, this CenturyLink Communications, LLC replaced in its (T) entirety the CenturyLink Communications, LLC d/b/a CenturyLink QCC Price List No. 1, and included long distance services formerly provided by Qwest LD Corp. d/b/a (T) CenturyLink LD and Embarq Communications, Inc. d/b/a CenturyLink Communications. UT2020-16 CenturyLink Communications, LLC d/b/a Lumen Technologies Group (C) Price List No. 1 SECTION 1 Page 1 UTAH Release 2 Issued: 11-24-2020 Effective: 12-04-2020 (A.L. 2020-P04) 1. APPLICATION AND REFERENCE 1.1 APPLICATION OF PRICE LIST This Price List contains the regulations and rates applicable to intrastate interexchange telecommunications services furnished by CenturyLink Communications, LLC d/b/a Lumen Technologies Group (f/k/a Qwest (C) Communications Company, LLC d/b/a CenturyLink QCC, Qwest LD Corp.
    [Show full text]
  • Furthering Human Progress Through Technology
    TECHNOLOGIES Furthering Human Progress Through Technology 2020 Annual Report 2021 Proxy Statement IMPORTANT NOTICE REGARDING THE AVAILABILITY OF PROXY MATERIALS FOR THE ANNUAL MEETING OF SHAREHOLDERS TO BE HELD ON MAY 19, 2021 This proxy statement and related materials are available at www.proxyvote.com. Dear fellow shareholders: We made significant progress in 2020 to position the company for the future. The launch of Lumen Technologies and the Lumen Platform is an inflection point in our ongoing transformation. We invested in the business both to meet growing customer demand and to improve the customer experience. Under our three-year transformation plan, we continued to drive efficiencies throughout the business, and achieved our transformation savings goals a full year ahead of schedule. These investments paid off as we saw improvement in our revenue trajectory and Net Promoter scores, a President and CEO measure of our customer experience. We also continued to execute our capital allocation strategy, further strengthening the balance sheet, reducing interest costs and investing in the business. Responding to Covid-19 The events of 2020 affected every corner of the world, including our customers, our communities and our employees. Throughout the year, we recognized the importance of our services through what we do best: providing scalable, flexible connectivity to further human progress through technology. We met customers’ urgent needs for a new way to connect securely to their employees. We met frontline workers’ needs by connecting Throughout the emergency hospitals and pop-up medical locations around the “year, we recognized world. We evolved our customer support models to achieve more the importance contactless installations than ever before and enabled the growing demand for bandwidth.
    [Show full text]
  • Security Protocols in a Nutshell
    Security Protocols in a Nutshell Mohsen Toorani Department of Informatics University of Bergen, Norway [email protected] Abstract Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of protocols. Specifically, it clarifies differences between information-theoretic and computational security, and computational and symbolic models. Furthermore, a survey on computational security models for authenticated key exchange (AKE) and password-authenticated key exchange (PAKE) protocols, as the most impor- tant and well-studied type of security protocols, is provided. Keywords: Cryptographic protocols, Authenticated key exchange, Computational security, Provable security, Security models. arXiv:1605.09771v2 [cs.CR] 2 Jun 2016 Copyright c 2015 Mohsen Toorani. All Rights Reserved. Contents 1 Introduction 1 1.1 Security attacks . 2 1.2 Security services . 2 1.3 Security mechanisms . 3 2 Taxonomy of attacks 3 2.1 Attacks on security protocols . 3 2.2 Attacks on encryption schemes . 8 2.3 Attacks on implementations . 11 3 Security models 14 3.1 Information-theoretic vs computational security . 15 3.2 Idealized models in computational security . 16 3.3 Formal security models . 18 3.4 Security proofs in reality . 19 4 Security models for cryptographic protocols 20 4.1 AKE protocols . 22 4.1.1 Security models for AKE protocols . 23 4.1.2 PAKE protocols .
    [Show full text]
  • Securing Hardware, Software and Data (SHSD) • Frank Siebenlist, Argonne National Laboratory • Len Napolitano, Sandia National Laboratories
    Report of the Cyber Security Research Needs for Open Science Workshop July 23-24, 2007 Sponsored by the DOE Office of Science in Cooperation with the Office of Electricity Delivery and Energy Reliability PNNL-16971 Report of the Cyber Security Research Needs for Open Science Workshop July 23-24, 2007 Sponsored by the DOE Office of Science in Cooperation with the Office of Electricity Delivery and Energy Reliability i Acknowledgements The workshop chairs wish to thank Joree O’Neal and Rachel Smith for all their help and support with organizing the logistics and registration activities for this workshop; Sue Chin, Ted Tanasse, Barbara Wilson, and Stacy Larsen for their expert help with the assembly, text editing, and graphics for this report; and Lance Baatz for his masterful job as webmaster for this project. Finally, we wish to thank the Pacific Northwest National Laboratory for supporting the development and assembly of the final report. iii EXECUTIVE SUMMARY Protecting systems and users, while maintaining ease of access, represents the “perfect storm” of challenges in the area of cyber security. A fundamental tenet of every scientific investigation is the search for truth. Trust and integrity are immutable values that are fundamental to all research endeavors. By extension, the absolute integrity of information, encompassing systems, networks, and file systems is a critical requirement essential for promoting and facilitating discovery. These qualities are equally important for our nation’s critical energy infrastructure. To determine the cyber security research needs for open science and energy control systems, the U.S. Department of Energy’s (DOE) Office of Science (SC), in cooperation with the Office of Electricity Delivery and Energy Reliability (OE), organized a two-day workshop held July 23 and 24, 2007, at the Bethesda North Marriott Hotel in Bethesda, Maryland.
    [Show full text]