SlideShare una empresa de Scribd logo
1 de 13
National Policy Guidance for Protecting NASA Space Systems Randy Seftas Code 599.0, Mission Engineering and Systems Analysis Division E-Mail:  george.r.seftas@nasa.gov Phone:  301-286-5765
2010 National Space Policy (Protection) Principles The United States will employ a variety of measures to help assure the use of space for all responsible parties, and, consistent with the inherent right of self-defense, deter others from interference and attack, defend our space systems and contribute to the defense of allied space systems, and, if deterrence fails, defeat efforts to attack them. Goals Increase assurance and resilience of mission-essential functions enabled by commercial, civil, scientific, and national security spacecraft and supporting infrastructure against disruption, degradation, and destruction, whether from environmental, mechanical, electronic, or hostile causes. Inter-Sector Guidelines Assurance and Resilience of Mission-Essential Functions.  The US shall: Assure space-enabled mission-essential functions by developing the techniques, measures, relationships, and capabilities necessary to maintain continuity of services Such efforts may include enhancing the protection and resilience of selected spacecraft and supporting infrastructure Develop and exercise capabilities and plans for operating in and through a degraded, disrupted, or denied space environment for the purposes of maintaining mission-essential functions Address mission assurance requirements and space system resilience in the acquisition of future space capabilities and supporting infrastructure
Protection Categories NASA’s existing protection policies and requirements basically fall into two very distinct (and in some cases, mutually exclusive) categories, which are: Protecting the terrestrial and space environments from naturally occurring events, and activities associated with the operation of NASA space systems. This protection category is strategic in nature and delineates environmental policies and requirements for protection domains ranging from any place on the Earth to planets in our solar system. Earth Environment - The Earth or terrestrial environment protection domain includes subsea regions, the surface of the planet and extends out 50 statute miles above mean sea level (MSL). Near Earth Space – The near Earth space protection domain begins at 50 statute miles above MSL and extends out to geosynchronous orbit altitude (approximately 22,300 miles).  This protection domain includes the area of space that has the highest concentration of orbiting man-made satellites and launch vehicle upper stages. Interplanetary Space – The interplanetary space protection domain begins at geosynchronous orbit altitude and extends beyond our solar system.  This domain includes spacecraft orbiting around the Moon and planets. Protecting NASA space assets from intentional or unintentional disruption, exploitation or attack, whether natural or man-made is the second NASA protection category.  This category delineates policies to achieve sustained mission assurance/survivability of NASA space systems through the reduction of susceptibilities and the mitigation of vulnerabilities.
Environmental Protection Policy Decomposition (Terrestrial)
Space Asset Protection Policy Decomposition (Ground Segment) Analysis –Space Asset Protection Policies and Requirements (Ground Segment) Institutional Security – The national space policy does not specifically provide guidance on protecting the ground segment of US space systems, even though there are interagency issues regarding this topic, such as critical commercial infrastructure support to NASA space flight Centers. NASA has policy directives and requirements documents that provide guidance on implementing institutional security disciplines to protect the Agency’s people and property however, this guidance is more focused on providing institutional security for large NASA organizations, i.e., Headquarters, Centers and Flight Facilities.  What is really needed is a more tailored security focus on the high value missions that the Agency acquires and flies.
Physical Attack on the Ground Segment ,[object Object]
NASA Example:  A hard drive that contained an old version of the AQUA flight software was stolen from the AQUA/AURA hardware/software flight simulator (which is a critical node and single point-of-failure for the AQUA/AURA operational space systems).
Physical security was inadequate as there were two entrances to the simulator room and only one entrance required a key card.
IT security was inadequate since the very sensitive software on the hard drive could be downloaded to personal computers owned by personnel working in the lab.
Asymmetric Attack on Critical Commercial Infrastructure – Negates a space system’s mission performance by attacking it’s supporting commercial infrastructure.
NASA Example: An aerial fiber-optic cable that supports space operations from buildings 3, 13 and 14 at GSFC crosses Greenbelt road from the manhole trunk main-7 (single point-of-failure) and is susceptible to traffic accidents, weather and sabotage.
Open Source Example:  For the fourth time in a week, an undersea communications cable has apparently been cut (or "failed due to a power outage," as some sources suggest), and while no official reports of subversion have surfaced just yet, things are beginning to get suspicious.Agency Approval Project Formulation  Project Implementation  Phase E:  Phase B:  Phase D: System  Phase F:  Phase A: Concept  Phase C: Final  Pre - Phase A:   Operations and  Preliminary Design  Assembly,  Closeout and Technology  Design and  Concept Studies Sustainment &Technology  Integration, Test  Development Fabrication Completion and  Launch Affected Phases of a Typical Mission’s Lifecycle
Space Asset Protection Policy Decomposition (Comm/Info Segment) Analysis –Space Asset Protection Policies and Requirements (Comm/Info Segment) Information Systems and Network  Security – Much like the other NASA institutional security disciplines the Agency’s IT Security organizations are focused on providing IT security for large NASA groups, i.e., Headquarters, Centers and Flight Facilities.  What is really needed is a more tailored IT security focus on the projects that the Agency acquires and flies so as to counter Computer Network Attacks (CNA) and Exploitations (CNE) against these high-value space assets

Más contenido relacionado

La actualidad más candente

Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18David Sweigert
 
Time Flies H4D 2020 Lessons Learned
Time Flies H4D 2020 Lessons LearnedTime Flies H4D 2020 Lessons Learned
Time Flies H4D 2020 Lessons LearnedStanford University
 
Seacurity Hacking for Defense 2017
Seacurity Hacking for Defense 2017Seacurity Hacking for Defense 2017
Seacurity Hacking for Defense 2017Stanford University
 
Guardian Week 6 H4D Stanford 2016
Guardian Week 6 H4D Stanford 2016Guardian Week 6 H4D Stanford 2016
Guardian Week 6 H4D Stanford 2016Stanford University
 
Jose Davila Cv 060309
Jose Davila Cv 060309Jose Davila Cv 060309
Jose Davila Cv 060309jdavila04
 
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...Power System Operation
 
Innovation fund themed competition webinar - session 2
Innovation fund themed competition webinar - session 2Innovation fund themed competition webinar - session 2
Innovation fund themed competition webinar - session 2Heather-Fiona Egan
 
Austra Lumina Hacking for Defense 2017
Austra Lumina Hacking for Defense 2017Austra Lumina Hacking for Defense 2017
Austra Lumina Hacking for Defense 2017Stanford University
 
CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013Ian Sommerville
 
CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013Ian Sommerville
 
Broadcom - Hacking for Defense - Stanford 2017
Broadcom - Hacking for Defense - Stanford 2017Broadcom - Hacking for Defense - Stanford 2017
Broadcom - Hacking for Defense - Stanford 2017Stanford University
 
7 Software Development Security
7 Software Development Security7 Software Development Security
7 Software Development SecurityAlfred Ouyang
 
Anthro Energy H4D 2020 lessons learned
Anthro Energy H4D 2020 lessons learnedAnthro Energy H4D 2020 lessons learned
Anthro Energy H4D 2020 lessons learnedStanford University
 
Guardian Week 4 H4D Stanford 2016
Guardian Week 4 H4D Stanford 2016Guardian Week 4 H4D Stanford 2016
Guardian Week 4 H4D Stanford 2016Stanford University
 
AV Combinator H4D 2020 Lessons Learned
AV Combinator H4D 2020 Lessons LearnedAV Combinator H4D 2020 Lessons Learned
AV Combinator H4D 2020 Lessons LearnedStanford University
 
US military report on cyber guard use of National Guard
US military report on cyber guard use of National GuardUS military report on cyber guard use of National Guard
US military report on cyber guard use of National GuardDavid Sweigert
 

La actualidad más candente (20)

Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18Army plan for Cyber Offensive Operations -- ESF 18
Army plan for Cyber Offensive Operations -- ESF 18
 
Polaris H4D Stanford 2018
Polaris H4D Stanford 2018Polaris H4D Stanford 2018
Polaris H4D Stanford 2018
 
Time Flies H4D 2020 Lessons Learned
Time Flies H4D 2020 Lessons LearnedTime Flies H4D 2020 Lessons Learned
Time Flies H4D 2020 Lessons Learned
 
Agile and the DoD
Agile and the DoDAgile and the DoD
Agile and the DoD
 
Tgs capabilities brief
Tgs capabilities briefTgs capabilities brief
Tgs capabilities brief
 
Seacurity Hacking for Defense 2017
Seacurity Hacking for Defense 2017Seacurity Hacking for Defense 2017
Seacurity Hacking for Defense 2017
 
Guardian Week 6 H4D Stanford 2016
Guardian Week 6 H4D Stanford 2016Guardian Week 6 H4D Stanford 2016
Guardian Week 6 H4D Stanford 2016
 
Jose Davila Cv 060309
Jose Davila Cv 060309Jose Davila Cv 060309
Jose Davila Cv 060309
 
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
 
Innovation fund themed competition webinar - session 2
Innovation fund themed competition webinar - session 2Innovation fund themed competition webinar - session 2
Innovation fund themed competition webinar - session 2
 
Austra Lumina Hacking for Defense 2017
Austra Lumina Hacking for Defense 2017Austra Lumina Hacking for Defense 2017
Austra Lumina Hacking for Defense 2017
 
CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013
 
CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013
 
Skynet Week 3 H4D Stanford 2016
Skynet Week 3 H4D Stanford 2016Skynet Week 3 H4D Stanford 2016
Skynet Week 3 H4D Stanford 2016
 
Broadcom - Hacking for Defense - Stanford 2017
Broadcom - Hacking for Defense - Stanford 2017Broadcom - Hacking for Defense - Stanford 2017
Broadcom - Hacking for Defense - Stanford 2017
 
7 Software Development Security
7 Software Development Security7 Software Development Security
7 Software Development Security
 
Anthro Energy H4D 2020 lessons learned
Anthro Energy H4D 2020 lessons learnedAnthro Energy H4D 2020 lessons learned
Anthro Energy H4D 2020 lessons learned
 
Guardian Week 4 H4D Stanford 2016
Guardian Week 4 H4D Stanford 2016Guardian Week 4 H4D Stanford 2016
Guardian Week 4 H4D Stanford 2016
 
AV Combinator H4D 2020 Lessons Learned
AV Combinator H4D 2020 Lessons LearnedAV Combinator H4D 2020 Lessons Learned
AV Combinator H4D 2020 Lessons Learned
 
US military report on cyber guard use of National Guard
US military report on cyber guard use of National GuardUS military report on cyber guard use of National Guard
US military report on cyber guard use of National Guard
 

Destacado

Costello kenneth
Costello kennethCostello kenneth
Costello kennethNASAPMC
 
Fred.ouellette
Fred.ouelletteFred.ouellette
Fred.ouelletteNASAPMC
 
Kothari.d.mitchell.r
Kothari.d.mitchell.rKothari.d.mitchell.r
Kothari.d.mitchell.rNASAPMC
 
Lisa mc cann
Lisa mc cannLisa mc cann
Lisa mc cannNASAPMC
 
Randy.lovell
Randy.lovellRandy.lovell
Randy.lovellNASAPMC
 
Biess ted
Biess tedBiess ted
Biess tedNASAPMC
 
Michael.hazen
Michael.hazenMichael.hazen
Michael.hazenNASAPMC
 
Rovinsky final
Rovinsky finalRovinsky final
Rovinsky finalNASAPMC
 
Randall.taylor
Randall.taylorRandall.taylor
Randall.taylorNASAPMC
 
Zimmerman barbier
Zimmerman barbierZimmerman barbier
Zimmerman barbierNASAPMC
 
Vipavetz.kevin
Vipavetz.kevinVipavetz.kevin
Vipavetz.kevinNASAPMC
 
Krahula john
Krahula johnKrahula john
Krahula johnNASAPMC
 
Ipao great houseetc-programmatic analysis ll
Ipao great houseetc-programmatic analysis llIpao great houseetc-programmatic analysis ll
Ipao great houseetc-programmatic analysis llNASAPMC
 
Yew manson
Yew mansonYew manson
Yew mansonNASAPMC
 
Gwyn.smith
Gwyn.smithGwyn.smith
Gwyn.smithNASAPMC
 
Anderson.joel
Anderson.joelAnderson.joel
Anderson.joelNASAPMC
 
Dumbacher
DumbacherDumbacher
DumbacherNASAPMC
 
Engelbrecht.joe
Engelbrecht.joeEngelbrecht.joe
Engelbrecht.joeNASAPMC
 

Destacado (20)

Costello kenneth
Costello kennethCostello kenneth
Costello kenneth
 
Heard
HeardHeard
Heard
 
Fred.ouellette
Fred.ouelletteFred.ouellette
Fred.ouellette
 
Kothari.d.mitchell.r
Kothari.d.mitchell.rKothari.d.mitchell.r
Kothari.d.mitchell.r
 
Lisa mc cann
Lisa mc cannLisa mc cann
Lisa mc cann
 
Randy.lovell
Randy.lovellRandy.lovell
Randy.lovell
 
Biess ted
Biess tedBiess ted
Biess ted
 
Michael.hazen
Michael.hazenMichael.hazen
Michael.hazen
 
Rovinsky final
Rovinsky finalRovinsky final
Rovinsky final
 
Randall.taylor
Randall.taylorRandall.taylor
Randall.taylor
 
B leach
B leachB leach
B leach
 
Zimmerman barbier
Zimmerman barbierZimmerman barbier
Zimmerman barbier
 
Vipavetz.kevin
Vipavetz.kevinVipavetz.kevin
Vipavetz.kevin
 
Krahula john
Krahula johnKrahula john
Krahula john
 
Ipao great houseetc-programmatic analysis ll
Ipao great houseetc-programmatic analysis llIpao great houseetc-programmatic analysis ll
Ipao great houseetc-programmatic analysis ll
 
Yew manson
Yew mansonYew manson
Yew manson
 
Gwyn.smith
Gwyn.smithGwyn.smith
Gwyn.smith
 
Anderson.joel
Anderson.joelAnderson.joel
Anderson.joel
 
Dumbacher
DumbacherDumbacher
Dumbacher
 
Engelbrecht.joe
Engelbrecht.joeEngelbrecht.joe
Engelbrecht.joe
 

Similar a Seftas.george

WE1.L10 - TERRA, AQUA, AND AURA DIRECT BROADCAST – PROVIDING EARTH SCIENCE DA...
WE1.L10 - TERRA, AQUA, AND AURA DIRECT BROADCAST – PROVIDING EARTH SCIENCE DA...WE1.L10 - TERRA, AQUA, AND AURA DIRECT BROADCAST – PROVIDING EARTH SCIENCE DA...
WE1.L10 - TERRA, AQUA, AND AURA DIRECT BROADCAST – PROVIDING EARTH SCIENCE DA...grssieee
 
Satellite Network Hacking & Security Analysis
Satellite Network Hacking & Security AnalysisSatellite Network Hacking & Security Analysis
Satellite Network Hacking & Security AnalysisCSCJournals
 
NICE_DRS_presentation_060710 (1)
NICE_DRS_presentation_060710 (1)NICE_DRS_presentation_060710 (1)
NICE_DRS_presentation_060710 (1)Stefano Coltellacci
 
body_The_Case_for_APNT_Development_for_Aviation
body_The_Case_for_APNT_Development_for_Aviationbody_The_Case_for_APNT_Development_for_Aviation
body_The_Case_for_APNT_Development_for_AviationAriel Scheirer
 
Defense technology writing sample
Defense technology writing sampleDefense technology writing sample
Defense technology writing sampleBernie Adelsberger
 
Can Humans Survive 1000 Days in Space?
Can Humans Survive 1000 Days in Space? Can Humans Survive 1000 Days in Space?
Can Humans Survive 1000 Days in Space? mtnadmin
 
Space Weather And International Civil Space Situational Awareness ( Met...
Space  Weather And  International  Civil  Space  Situational  Awareness ( Met...Space  Weather And  International  Civil  Space  Situational  Awareness ( Met...
Space Weather And International Civil Space Situational Awareness ( Met...Western Governors University
 
N9 Anselmo - "security in space"
N9 Anselmo - "security in space"N9 Anselmo - "security in space"
N9 Anselmo - "security in space"IAPS
 
DARPA TTO Office- wide BAA Technology Requirements Apr 2013
DARPA TTO Office- wide BAA Technology Requirements Apr 2013DARPA TTO Office- wide BAA Technology Requirements Apr 2013
DARPA TTO Office- wide BAA Technology Requirements Apr 2013Tom "Blad" Lindblad
 
High-Altitude Solar Glider for Internet Access
High-Altitude Solar Glider for Internet AccessHigh-Altitude Solar Glider for Internet Access
High-Altitude Solar Glider for Internet AccessJeffrey Funk
 
3309_Space_Situational_Awareness_2015_4pp
3309_Space_Situational_Awareness_2015_4pp3309_Space_Situational_Awareness_2015_4pp
3309_Space_Situational_Awareness_2015_4ppTiziana Casinelli
 
Teledyne Brown Engineering Slides
Teledyne Brown Engineering Slides Teledyne Brown Engineering Slides
Teledyne Brown Engineering Slides CASIS
 
NOAA, UAH, EMA, NWS enrGies article
NOAA, UAH, EMA, NWS enrGies articleNOAA, UAH, EMA, NWS enrGies article
NOAA, UAH, EMA, NWS enrGies articleKenneth Harvey
 
A Summary Of NASA Architecture Studies Utilizing Fission Surface Power Techno...
A Summary Of NASA Architecture Studies Utilizing Fission Surface Power Techno...A Summary Of NASA Architecture Studies Utilizing Fission Surface Power Techno...
A Summary Of NASA Architecture Studies Utilizing Fission Surface Power Techno...Lori Moore
 
Communication Systems Proposal- Final
Communication Systems Proposal- FinalCommunication Systems Proposal- Final
Communication Systems Proposal- FinalChristine Odenwald
 
Inadequate Security Practices Expose Key NASA Network to Cyber Attack
Inadequate Security Practices Expose Key NASA Network to Cyber AttackInadequate Security Practices Expose Key NASA Network to Cyber Attack
Inadequate Security Practices Expose Key NASA Network to Cyber AttackBill Duncan
 

Similar a Seftas.george (20)

WE1.L10 - TERRA, AQUA, AND AURA DIRECT BROADCAST – PROVIDING EARTH SCIENCE DA...
WE1.L10 - TERRA, AQUA, AND AURA DIRECT BROADCAST – PROVIDING EARTH SCIENCE DA...WE1.L10 - TERRA, AQUA, AND AURA DIRECT BROADCAST – PROVIDING EARTH SCIENCE DA...
WE1.L10 - TERRA, AQUA, AND AURA DIRECT BROADCAST – PROVIDING EARTH SCIENCE DA...
 
Satellite Network Hacking & Security Analysis
Satellite Network Hacking & Security AnalysisSatellite Network Hacking & Security Analysis
Satellite Network Hacking & Security Analysis
 
NICE_DRS_presentation_060710 (1)
NICE_DRS_presentation_060710 (1)NICE_DRS_presentation_060710 (1)
NICE_DRS_presentation_060710 (1)
 
CLIM Program: Remote Sensing Workshop, Satellites and Stovepipes - Jay Morris...
CLIM Program: Remote Sensing Workshop, Satellites and Stovepipes - Jay Morris...CLIM Program: Remote Sensing Workshop, Satellites and Stovepipes - Jay Morris...
CLIM Program: Remote Sensing Workshop, Satellites and Stovepipes - Jay Morris...
 
body_The_Case_for_APNT_Development_for_Aviation
body_The_Case_for_APNT_Development_for_Aviationbody_The_Case_for_APNT_Development_for_Aviation
body_The_Case_for_APNT_Development_for_Aviation
 
Defense technology writing sample
Defense technology writing sampleDefense technology writing sample
Defense technology writing sample
 
Systems Engineering Update - Dr. Ron Sega
Systems Engineering Update - Dr. Ron SegaSystems Engineering Update - Dr. Ron Sega
Systems Engineering Update - Dr. Ron Sega
 
Can Humans Survive 1000 Days in Space?
Can Humans Survive 1000 Days in Space? Can Humans Survive 1000 Days in Space?
Can Humans Survive 1000 Days in Space?
 
Space Weather And International Civil Space Situational Awareness ( Met...
Space  Weather And  International  Civil  Space  Situational  Awareness ( Met...Space  Weather And  International  Civil  Space  Situational  Awareness ( Met...
Space Weather And International Civil Space Situational Awareness ( Met...
 
N9 Anselmo - "security in space"
N9 Anselmo - "security in space"N9 Anselmo - "security in space"
N9 Anselmo - "security in space"
 
DARPA TTO Office- wide BAA Technology Requirements Apr 2013
DARPA TTO Office- wide BAA Technology Requirements Apr 2013DARPA TTO Office- wide BAA Technology Requirements Apr 2013
DARPA TTO Office- wide BAA Technology Requirements Apr 2013
 
High-Altitude Solar Glider for Internet Access
High-Altitude Solar Glider for Internet AccessHigh-Altitude Solar Glider for Internet Access
High-Altitude Solar Glider for Internet Access
 
3309_Space_Situational_Awareness_2015_4pp
3309_Space_Situational_Awareness_2015_4pp3309_Space_Situational_Awareness_2015_4pp
3309_Space_Situational_Awareness_2015_4pp
 
Teledyne Brown Engineering Slides
Teledyne Brown Engineering Slides Teledyne Brown Engineering Slides
Teledyne Brown Engineering Slides
 
Remotesensing 04-01671
Remotesensing 04-01671Remotesensing 04-01671
Remotesensing 04-01671
 
NOAA, UAH, EMA, NWS enrGies article
NOAA, UAH, EMA, NWS enrGies articleNOAA, UAH, EMA, NWS enrGies article
NOAA, UAH, EMA, NWS enrGies article
 
A Summary Of NASA Architecture Studies Utilizing Fission Surface Power Techno...
A Summary Of NASA Architecture Studies Utilizing Fission Surface Power Techno...A Summary Of NASA Architecture Studies Utilizing Fission Surface Power Techno...
A Summary Of NASA Architecture Studies Utilizing Fission Surface Power Techno...
 
Communication Systems Proposal- Final
Communication Systems Proposal- FinalCommunication Systems Proposal- Final
Communication Systems Proposal- Final
 
Moore chris[1]
Moore chris[1]Moore chris[1]
Moore chris[1]
 
Inadequate Security Practices Expose Key NASA Network to Cyber Attack
Inadequate Security Practices Expose Key NASA Network to Cyber AttackInadequate Security Practices Expose Key NASA Network to Cyber Attack
Inadequate Security Practices Expose Key NASA Network to Cyber Attack
 

Más de NASAPMC

Bejmuk bo
Bejmuk boBejmuk bo
Bejmuk boNASAPMC
 
Baniszewski john
Baniszewski johnBaniszewski john
Baniszewski johnNASAPMC
 
Yew manson
Yew mansonYew manson
Yew mansonNASAPMC
 
Wood frank
Wood frankWood frank
Wood frankNASAPMC
 
Wood frank
Wood frankWood frank
Wood frankNASAPMC
 
Wessen randi (cd)
Wessen randi (cd)Wessen randi (cd)
Wessen randi (cd)NASAPMC
 
Vellinga joe
Vellinga joeVellinga joe
Vellinga joeNASAPMC
 
Trahan stuart
Trahan stuartTrahan stuart
Trahan stuartNASAPMC
 
Stock gahm
Stock gahmStock gahm
Stock gahmNASAPMC
 
Snow lee
Snow leeSnow lee
Snow leeNASAPMC
 
Smalley sandra
Smalley sandraSmalley sandra
Smalley sandraNASAPMC
 
Seftas krage
Seftas krageSeftas krage
Seftas krageNASAPMC
 
Sampietro marco
Sampietro marcoSampietro marco
Sampietro marcoNASAPMC
 
Rudolphi mike
Rudolphi mikeRudolphi mike
Rudolphi mikeNASAPMC
 
Roberts karlene
Roberts karleneRoberts karlene
Roberts karleneNASAPMC
 
Rackley mike
Rackley mikeRackley mike
Rackley mikeNASAPMC
 
Paradis william
Paradis williamParadis william
Paradis williamNASAPMC
 
Osterkamp jeff
Osterkamp jeffOsterkamp jeff
Osterkamp jeffNASAPMC
 
O'keefe william
O'keefe williamO'keefe william
O'keefe williamNASAPMC
 
Muller ralf
Muller ralfMuller ralf
Muller ralfNASAPMC
 

Más de NASAPMC (20)

Bejmuk bo
Bejmuk boBejmuk bo
Bejmuk bo
 
Baniszewski john
Baniszewski johnBaniszewski john
Baniszewski john
 
Yew manson
Yew mansonYew manson
Yew manson
 
Wood frank
Wood frankWood frank
Wood frank
 
Wood frank
Wood frankWood frank
Wood frank
 
Wessen randi (cd)
Wessen randi (cd)Wessen randi (cd)
Wessen randi (cd)
 
Vellinga joe
Vellinga joeVellinga joe
Vellinga joe
 
Trahan stuart
Trahan stuartTrahan stuart
Trahan stuart
 
Stock gahm
Stock gahmStock gahm
Stock gahm
 
Snow lee
Snow leeSnow lee
Snow lee
 
Smalley sandra
Smalley sandraSmalley sandra
Smalley sandra
 
Seftas krage
Seftas krageSeftas krage
Seftas krage
 
Sampietro marco
Sampietro marcoSampietro marco
Sampietro marco
 
Rudolphi mike
Rudolphi mikeRudolphi mike
Rudolphi mike
 
Roberts karlene
Roberts karleneRoberts karlene
Roberts karlene
 
Rackley mike
Rackley mikeRackley mike
Rackley mike
 
Paradis william
Paradis williamParadis william
Paradis william
 
Osterkamp jeff
Osterkamp jeffOsterkamp jeff
Osterkamp jeff
 
O'keefe william
O'keefe williamO'keefe william
O'keefe william
 
Muller ralf
Muller ralfMuller ralf
Muller ralf
 

Último

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Último (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Seftas.george

  • 1. National Policy Guidance for Protecting NASA Space Systems Randy Seftas Code 599.0, Mission Engineering and Systems Analysis Division E-Mail: george.r.seftas@nasa.gov Phone: 301-286-5765
  • 2. 2010 National Space Policy (Protection) Principles The United States will employ a variety of measures to help assure the use of space for all responsible parties, and, consistent with the inherent right of self-defense, deter others from interference and attack, defend our space systems and contribute to the defense of allied space systems, and, if deterrence fails, defeat efforts to attack them. Goals Increase assurance and resilience of mission-essential functions enabled by commercial, civil, scientific, and national security spacecraft and supporting infrastructure against disruption, degradation, and destruction, whether from environmental, mechanical, electronic, or hostile causes. Inter-Sector Guidelines Assurance and Resilience of Mission-Essential Functions. The US shall: Assure space-enabled mission-essential functions by developing the techniques, measures, relationships, and capabilities necessary to maintain continuity of services Such efforts may include enhancing the protection and resilience of selected spacecraft and supporting infrastructure Develop and exercise capabilities and plans for operating in and through a degraded, disrupted, or denied space environment for the purposes of maintaining mission-essential functions Address mission assurance requirements and space system resilience in the acquisition of future space capabilities and supporting infrastructure
  • 3. Protection Categories NASA’s existing protection policies and requirements basically fall into two very distinct (and in some cases, mutually exclusive) categories, which are: Protecting the terrestrial and space environments from naturally occurring events, and activities associated with the operation of NASA space systems. This protection category is strategic in nature and delineates environmental policies and requirements for protection domains ranging from any place on the Earth to planets in our solar system. Earth Environment - The Earth or terrestrial environment protection domain includes subsea regions, the surface of the planet and extends out 50 statute miles above mean sea level (MSL). Near Earth Space – The near Earth space protection domain begins at 50 statute miles above MSL and extends out to geosynchronous orbit altitude (approximately 22,300 miles). This protection domain includes the area of space that has the highest concentration of orbiting man-made satellites and launch vehicle upper stages. Interplanetary Space – The interplanetary space protection domain begins at geosynchronous orbit altitude and extends beyond our solar system. This domain includes spacecraft orbiting around the Moon and planets. Protecting NASA space assets from intentional or unintentional disruption, exploitation or attack, whether natural or man-made is the second NASA protection category. This category delineates policies to achieve sustained mission assurance/survivability of NASA space systems through the reduction of susceptibilities and the mitigation of vulnerabilities.
  • 4. Environmental Protection Policy Decomposition (Terrestrial)
  • 5. Space Asset Protection Policy Decomposition (Ground Segment) Analysis –Space Asset Protection Policies and Requirements (Ground Segment) Institutional Security – The national space policy does not specifically provide guidance on protecting the ground segment of US space systems, even though there are interagency issues regarding this topic, such as critical commercial infrastructure support to NASA space flight Centers. NASA has policy directives and requirements documents that provide guidance on implementing institutional security disciplines to protect the Agency’s people and property however, this guidance is more focused on providing institutional security for large NASA organizations, i.e., Headquarters, Centers and Flight Facilities. What is really needed is a more tailored security focus on the high value missions that the Agency acquires and flies.
  • 6.
  • 7. NASA Example: A hard drive that contained an old version of the AQUA flight software was stolen from the AQUA/AURA hardware/software flight simulator (which is a critical node and single point-of-failure for the AQUA/AURA operational space systems).
  • 8. Physical security was inadequate as there were two entrances to the simulator room and only one entrance required a key card.
  • 9. IT security was inadequate since the very sensitive software on the hard drive could be downloaded to personal computers owned by personnel working in the lab.
  • 10. Asymmetric Attack on Critical Commercial Infrastructure – Negates a space system’s mission performance by attacking it’s supporting commercial infrastructure.
  • 11. NASA Example: An aerial fiber-optic cable that supports space operations from buildings 3, 13 and 14 at GSFC crosses Greenbelt road from the manhole trunk main-7 (single point-of-failure) and is susceptible to traffic accidents, weather and sabotage.
  • 12. Open Source Example: For the fourth time in a week, an undersea communications cable has apparently been cut (or "failed due to a power outage," as some sources suggest), and while no official reports of subversion have surfaced just yet, things are beginning to get suspicious.Agency Approval Project Formulation Project Implementation Phase E: Phase B: Phase D: System Phase F: Phase A: Concept Phase C: Final Pre - Phase A: Operations and Preliminary Design Assembly, Closeout and Technology Design and Concept Studies Sustainment &Technology Integration, Test Development Fabrication Completion and Launch Affected Phases of a Typical Mission’s Lifecycle
  • 13. Space Asset Protection Policy Decomposition (Comm/Info Segment) Analysis –Space Asset Protection Policies and Requirements (Comm/Info Segment) Information Systems and Network Security – Much like the other NASA institutional security disciplines the Agency’s IT Security organizations are focused on providing IT security for large NASA groups, i.e., Headquarters, Centers and Flight Facilities. What is really needed is a more tailored IT security focus on the projects that the Agency acquires and flies so as to counter Computer Network Attacks (CNA) and Exploitations (CNE) against these high-value space assets
  • 14.
  • 15. Open Press Example: "While the Fort Belvoir site was the only downlink for the KH-11, additional sites were apparently in Hawaii and Europe"...“ In contrast, the signals from the LACROSSE/VEGA system are relayed via NASA's Tracking and Data Relay Satellites (TDRS), of which there are three in orbit. The signals are then transmitted to a ground station at White Sands, New Mexico.
  • 16. Open Press Example: “The U.S. Navy is leading an initiative to exploit advanced new NASA and commercial environmental satellite imagery and data to aid time-critical strike planning-including weapons selection-for Afghanistan and potential other target areas in the Middle East, such as Iraq”.
  • 17. Computer Network Exploitation - operations and intelligence collection capabilities conducted through the use of computer networks to gather data from target or adversary automated information systems or networks
  • 18. Open Press Example: Officials at APL discovered "penetration from an unwanted source" last year on its external Web site, prompting them to take the site offline. APL officials are trying to figure out exactly what information was accessed.Agency Approval Project Formulation Project Implementation Phase E: Phase B: Phase D: System Phase F: Phase A: Concept Phase C: Final Pre - Phase A: Operations and Preliminary Design Assembly, Closeout and Technology Design and Concept Studies Sustainment &Technology Integration, Test Development Fabrication Completion and Launch Affected Phases of a Typical Mission’s Lifecycle
  • 19.
  • 20. Open Press Example: Telstar-12 was successfully jammed while attempting to broadcast a Persian news TV program into Iran under the stewardship of the State Department. The U.S. was able to trace the jamming signal to Bejucal - the former Soviet signals intelligence base in Cuba. Despite protests from the State Department Cuba continued to allow the Iranian diplomatic presence in Cuba to jam Telstar-12 for weeks.
  • 21. Open Press Example: Libya has waged a jamming war against the West in a successful effort to stop an opposition radio station and also blocked dozens of television and radio stations in Europe.
  • 22. Command Link Intrusions - Only 3 NASA space systems provide protection for their command links, i.e., Space Station, Shuttle and the TDRSS
  • 23. Civil Space Examples: Between November 2007 and October 2008 the Terra and Landsat-7 spacecraft experienced four command link intrusion attempts. These attempts all occurred in the Arctic region close to the Svalbard Archipelago. The source of the intruder was never attributed.Agency Approval Project Formulation Project Implementation Phase E: Phase B: Phase D: System Phase F: Phase A: Concept Phase C: Final Pre - Phase A: Operations and Preliminary Design Assembly, Closeout and Technology Design and Concept Studies Sustainment &Technology Integration, Test Development Fabrication Completion and Launch Affected Phases
  • 24.
  • 25. Open Press Example: "The Tamil Tigers in Sri Lanka have been hacking the Intelsat that hangs over the Indian Ocean to transmit propaganda. Intelsat is trying very hard to figure out how they did it, and then keep them from doing it again”.
  • 26. Open Press Example: “Members of a hacking group called the Masters of Downloading claim to have broken into a Pentagon network and stolen software that allows them to control a military satellite system. They threaten to sell the software to terrorists. The Pentagon denies that the software is classified or that it would allow the hackers to control their satellites, but later admits that a less-secure network containing "sensitive" information had been compromised”.
  • 27. Open Press Example: One Federal Government agency warned, “One person with a computer, a modem, and a telephone line anywhere in the world can potentially…cause a power outage in an entire region.” At about the same time this statement was made, a computer hacker publicly announced that he would release a document outlining how to break into power company networks and shut down the power grids of 30 United States utility companiesAgency Approval Project Formulation Project Implementation Phase E: Phase B: Phase D: System Phase F: Phase A: Concept Phase C: Final Pre - Phase A: Operations and Preliminary Design Assembly, Closeout and Technology Design and Concept Studies Sustainment &Technology Integration, Test Development Fabrication Completion and Launch Affected Phases of a Typical Mission’s Lifecycle
  • 28. Space Asset Protection Policy Decomposition (Space System) Analysis –Space Asset Protection Policies and Requirements (Space System) Protection of Space Systems – NASA does not have any policies or requirements that address the protection of space systems and their supporting infrastructures. Assurance and Resilience – NASA does not have any policies or requirements that directly complies with the mission assurance guidance in the national space policy.
  • 29. Recommendations to Close Protection Gaps Tailor the implementation of institutional security (physical, personnel, operational) functions to space mission criticality, guided by: NPR 7120.5 - Projects are either Category 1, 2, or 3 and are assigned to a category based initially on: The project life-cycle cost (LCC) estimate, the use of nuclear power sources, and whether or not the system being developed is for human space flight Priority level, which is related to the importance of the activity to NASA, the extent of international participation (or joint effort with other government agencies), the degree of uncertainty surrounding the application of new or untested technologies, and spacecraft/ payload development risk classification NPR 8705.4 - Classification levels define a hierarchy of risk combinations for NASA payloads by considering such factors as criticality to the Agency Strategic Plan, national significance, availability of alternative research opportunities, success criteria, magnitude of investment, etc. Tailor the implementation of IT security functions guided by: NPR 7150.2 - NASA-wide definitions for software classes are based on: Usage of the software with or within a NASA system Criticality of the system to NASA's major programs and projects Extent to which humans depend upon the system Developmental and operational complexity Extent of the Agency's investment
  • 30. Recommendations to Close Protection Gaps (cont) Increase NASA’s interaction with other US Govt Agencies and Departments to protect the our ground segment mission facilities Greater collaboration between NASA and DHS to identify our mission’s critical nodes and single points-of-failure It is DHS’ responsibility to protect the critical commercial infrastructures that support NASA facilities Prioritize the allocation of law enforcement resources to protect the Agency’s highest priority sites when intelligence information indicates an elevated threat Review and expand Agency guidance (policy/requirements) on the protection of communications links Communications security (COMSEC) requirements are currently found in NPR 2810.1, Security of Information Technology Wrong NPR for COMSEC requirements – there are significant differences between the COMSEC and IT security disciplines COMSEC requirements currently found in NPR 2810.1 only address encryption as a means of protecting communication links and overlook other technical approaches Be proactive in addressing the growing threats of electromagnetic interference and jamming NASA’s existing policies and requirements may quickly become outdated by new technology, proliferation, criminal activity.

Notas del editor

  1. Earth Environment - Identify Areas for Potential International Cooperation. Departments and agencies shall identify potential areas for international cooperation that may include, but are not limited to: Earth science and observation; environmental monitoring; disaster mitigation and relief; search and rescue.Earth Environment – Intersector Guidelines: Space Nuclear Power. The United States shall develop and use space nuclear power systems where such systems safely enable or significantly enhance space exploration or operational capabilities.Earth Environment – Civil Space Guidelines: Space Science, Exploration, and Discovery. (1) Continue a strong program of space science for observations, research, and analysis of our Sun, solar system, and universe to enhance knowledge of the cosmos, further our understanding of fundamental natural and physical sciences. (2) Pursue capabilities, in cooperation with other departments, agencies, and commercial partners, to detect, track, catalog, and characterize near-Earth objects to reduce the risk of harm to humans from an unexpected impact on our planet and to identify potentially resource-rich planetary objects Earth Environment – Civil Space Guidelines: Environmental Earth Observation and Weather. The NASA Administrator, in coordination with other appropriate departments and agencies, shall conduct a program to enhance U.S. global climate change research and sustained monitoring capabilities, advance research into and scientific knowledge of the Earth by accelerating the development of new Earth observing satellites, and develop and test capabilities for use by other civil departments and agencies for operational purposes.Near Earth – Goals: Strengthen stability in space. Strengthening measures to mitigate orbital debris.Near Earth – Intersector Guidelines: Preserve the Space Environment. Pursue research and development of technologies and techniques, through the Administrator of the National Aeronautics and Space Administration (NASA) and the Secretary of Defense, to mitigate and remove on-orbit debris, reduce hazards, and increase understanding of the current and future debris environment .Near Earth – Intersector Guidelines: Identify Areas for Potential International Cooperation . Departments and agencies shall identify potential areas for international cooperation that may include, but are not limited to: long-term preservation of the space environment for human activity and use .Near Earth – Intersector Guidelines: Space Nuclear Power. The United States shall develop and use space nuclear power systems where such systems safely enable or significantly enhance space exploration or operational capabilities.Planetary Space - Civil Space Guidelines: Space Science, Exploration, and Discovery. Set far-reaching exploration milestones. By 2025, begin crewed missions beyond the moon, including sending humans to an asteroid. By the mid-2030s, send humans to orbit Mars and return them safely to Earth
  2. Earth Environment - Identify Areas for Potential International Cooperation. Departments and agencies shall identify potential areas for international cooperation that may include, but are not limited to: Earth science and observation; environmental monitoring; disaster mitigation and relief; search and rescue.Earth Environment – Intersector Guidelines: Space Nuclear Power. The United States shall develop and use space nuclear power systems where such systems safely enable or significantly enhance space exploration or operational capabilities.Earth Environment – Civil Space Guidelines: Space Science, Exploration, and Discovery. (1) Continue a strong program of space science for observations, research, and analysis of our Sun, solar system, and universe to enhance knowledge of the cosmos, further our understanding of fundamental natural and physical sciences. (2) Pursue capabilities, in cooperation with other departments, agencies, and commercial partners, to detect, track, catalog, and characterize near-Earth objects to reduce the risk of harm to humans from an unexpected impact on our planet and to identify potentially resource-rich planetary objects Earth Environment – Civil Space Guidelines: Environmental Earth Observation and Weather. The NASA Administrator, in coordination with other appropriate departments and agencies, shall conduct a program to enhance U.S. global climate change research and sustained monitoring capabilities, advance research into and scientific knowledge of the Earth by accelerating the development of new Earth observing satellites, and develop and test capabilities for use by other civil departments and agencies for operational purposes.Near Earth – Goals: Strengthen stability in space. Strengthening measures to mitigate orbital debris.Near Earth – Intersector Guidelines: Preserve the Space Environment. Pursue research and development of technologies and techniques, through the Administrator of the National Aeronautics and Space Administration (NASA) and the Secretary of Defense, to mitigate and remove on-orbit debris, reduce hazards, and increase understanding of the current and future debris environment .Near Earth – Intersector Guidelines: Identify Areas for Potential International Cooperation . Departments and agencies shall identify potential areas for international cooperation that may include, but are not limited to: long-term preservation of the space environment for human activity and use .Near Earth – Intersector Guidelines: Space Nuclear Power. The United States shall develop and use space nuclear power systems where such systems safely enable or significantly enhance space exploration or operational capabilities.Planetary Space - Civil Space Guidelines: Space Science, Exploration, and Discovery. Set far-reaching exploration milestones. By 2025, begin crewed missions beyond the moon, including sending humans to an asteroid. By the mid-2030s, send humans to orbit Mars and return them safely to Earth
  3. Earth Environment - Identify Areas for Potential International Cooperation. Departments and agencies shall identify potential areas for international cooperation that may include, but are not limited to: Earth science and observation; environmental monitoring; disaster mitigation and relief; search and rescue.Earth Environment – Intersector Guidelines: Space Nuclear Power. The United States shall develop and use space nuclear power systems where such systems safely enable or significantly enhance space exploration or operational capabilities.Earth Environment – Civil Space Guidelines: Space Science, Exploration, and Discovery. (1) Continue a strong program of space science for observations, research, and analysis of our Sun, solar system, and universe to enhance knowledge of the cosmos, further our understanding of fundamental natural and physical sciences. (2) Pursue capabilities, in cooperation with other departments, agencies, and commercial partners, to detect, track, catalog, and characterize near-Earth objects to reduce the risk of harm to humans from an unexpected impact on our planet and to identify potentially resource-rich planetary objects Earth Environment – Civil Space Guidelines: Environmental Earth Observation and Weather. The NASA Administrator, in coordination with other appropriate departments and agencies, shall conduct a program to enhance U.S. global climate change research and sustained monitoring capabilities, advance research into and scientific knowledge of the Earth by accelerating the development of new Earth observing satellites, and develop and test capabilities for use by other civil departments and agencies for operational purposes.Near Earth – Goals: Strengthen stability in space. Strengthening measures to mitigate orbital debris.Near Earth – Intersector Guidelines: Preserve the Space Environment. Pursue research and development of technologies and techniques, through the Administrator of the National Aeronautics and Space Administration (NASA) and the Secretary of Defense, to mitigate and remove on-orbit debris, reduce hazards, and increase understanding of the current and future debris environment .Near Earth – Intersector Guidelines: Identify Areas for Potential International Cooperation . Departments and agencies shall identify potential areas for international cooperation that may include, but are not limited to: long-term preservation of the space environment for human activity and use .Near Earth – Intersector Guidelines: Space Nuclear Power. The United States shall develop and use space nuclear power systems where such systems safely enable or significantly enhance space exploration or operational capabilities.Planetary Space - Civil Space Guidelines: Space Science, Exploration, and Discovery. Set far-reaching exploration milestones. By 2025, begin crewed missions beyond the moon, including sending humans to an asteroid. By the mid-2030s, send humans to orbit Mars and return them safely to Earth
  4. Earth Environment - Identify Areas for Potential International Cooperation. Departments and agencies shall identify potential areas for international cooperation that may include, but are not limited to: Earth science and observation; environmental monitoring; disaster mitigation and relief; search and rescue.Earth Environment – Intersector Guidelines: Space Nuclear Power. The United States shall develop and use space nuclear power systems where such systems safely enable or significantly enhance space exploration or operational capabilities.Earth Environment – Civil Space Guidelines: Space Science, Exploration, and Discovery. (1) Continue a strong program of space science for observations, research, and analysis of our Sun, solar system, and universe to enhance knowledge of the cosmos, further our understanding of fundamental natural and physical sciences. (2) Pursue capabilities, in cooperation with other departments, agencies, and commercial partners, to detect, track, catalog, and characterize near-Earth objects to reduce the risk of harm to humans from an unexpected impact on our planet and to identify potentially resource-rich planetary objects Earth Environment – Civil Space Guidelines: Environmental Earth Observation and Weather. The NASA Administrator, in coordination with other appropriate departments and agencies, shall conduct a program to enhance U.S. global climate change research and sustained monitoring capabilities, advance research into and scientific knowledge of the Earth by accelerating the development of new Earth observing satellites, and develop and test capabilities for use by other civil departments and agencies for operational purposes.Near Earth – Goals: Strengthen stability in space. Strengthening measures to mitigate orbital debris.Near Earth – Intersector Guidelines: Preserve the Space Environment. Pursue research and development of technologies and techniques, through the Administrator of the National Aeronautics and Space Administration (NASA) and the Secretary of Defense, to mitigate and remove on-orbit debris, reduce hazards, and increase understanding of the current and future debris environment .Near Earth – Intersector Guidelines: Identify Areas for Potential International Cooperation . Departments and agencies shall identify potential areas for international cooperation that may include, but are not limited to: long-term preservation of the space environment for human activity and use .Near Earth – Intersector Guidelines: Space Nuclear Power. The United States shall develop and use space nuclear power systems where such systems safely enable or significantly enhance space exploration or operational capabilities.Planetary Space - Civil Space Guidelines: Space Science, Exploration, and Discovery. Set far-reaching exploration milestones. By 2025, begin crewed missions beyond the moon, including sending humans to an asteroid. By the mid-2030s, send humans to orbit Mars and return them safely to Earth