moja polska zbrojna
Od 25 maja 2018 r. obowiązuje w Polsce Rozporządzenie Parlamentu Europejskiego i Rady (UE) 2016/679 z dnia 27 kwietnia 2016 r. w sprawie ochrony osób fizycznych w związku z przetwarzaniem danych osobowych i w sprawie swobodnego przepływu takich danych oraz uchylenia dyrektywy 95/46/WE (ogólne rozporządzenie o ochronie danych, zwane także RODO).

W związku z powyższym przygotowaliśmy dla Państwa informacje dotyczące przetwarzania przez Wojskowy Instytut Wydawniczy Państwa danych osobowych. Prosimy o zapoznanie się z nimi: Polityka przetwarzania danych.

Prosimy o zaakceptowanie warunków przetwarzania danych osobowych przez Wojskowych Instytut Wydawniczy – Akceptuję

Controlled Attack

It took the army over a year to test whether the purchased new model of ICT nodes, the most important devices in the command and communication network, meets all cybersecurity requirements. 

It used to be simple in the old days – administrative functioning of any army was based on paper. Today, paper has been superseded by electronic devices. There is probably no army left in the world which does not use less or more complex ICT systems. They are the basis of logistics (in accountancy, human resources and when managing various types of warehouses) or training (simulators, training equipment, educational laboratories). Most importantly, armies all over the world use ICT systems to execute combat tasks – from navigation systems, through communications, to solutions applied in command support and battle management. As recently as 15 years ago, top secret orders and reports were still delivered from point A to point B in a briefcase and under escort; now, they are “wandering” through cyberspace via satellite, optical fiber, cable or radio routes.

Due to the omnipresent digitization, commanders have received warfare tools their predecessors could only dream about. They now have the capability to manage their subordinates in real time, while being hundreds or even thousands of kilometers away from them. However, every rose has its thorn. This ICT revolution brought with it the risk of orders and reports being intercepted by the enemy, without us even knowing about it. What is worse, our adversary might also jam (though at least we can be aware of that), or in extreme cases even paralyze our command and communication systems.

Media reports show how real the threat actually is. In 2015, Bloomberg, the world’s biggest information agency, revealed that the motherboards of servers produced by Supermicro included special chips which made it possible to steal data. A journalistic investigation revealed that outside the Pentagon such devices were delivered to, i.a., the US Navy Command, a drone command center, American armament consortia and technological giants, such as Apple and Amazon. The whole thing was revealed by Amazon. While preparing for another tender to deliver Data Clouds for American services, they performed a security audit of a company they were planning to acquire. The discovery of the microchips was reported to appropriate services which initiated an investigation. Although no one was caught red-handed, the American services managed to establish that the Chinese Intelligence was responsible for the whole situation.

Poland on the Cyber Front

Ensuring cyberspace security has become one of the priorities of the modern world. In 2014, at the NATO Wales Summit, the heads of NATO member states decided that if any of the member states becomes a victim of a cyber attack, they can ask the Allies for help, invoking Article 5 of the North Atlantic Treaty. In 2016, the Warsaw Summit took things one step further – not only was cyberspace recognized as a domain of warfare, but it was also decided that defending it must be considered as one of the main tasks of the Treaty.

Poland has been active in this area for several years. In July 2018, the National Cyber Security System Act came into force (Journal of Laws 2018, item 1560), on the strength of which a new military component was created – the Cyber Defense Forces.

The most important institution responsible for the forming and functioning of the component is the National Cyber Security Center (NCSC), while the only unit in the Polish Armed Forces that can perform the whole spectrum of activities and military operations in cyberspace is the Cyber Operations Center. As emphasized by BrigGen Karol Molenda, the Director of NCSC, one of the most important tasks awaiting the Polish Cyber Defense Forces is looking after ICT networks, which are used by the Polish army to exchange classified and non-classified information with military units, as well as various institutions and commands.

In order for the ICT data transmission networks used by the army to be safe, they must meet three basic criteria: confidentiality (only authorized personnel can have access to information), integrity (guaranteed accuracy, cohesion and completeness of information), and accessibility (ensuring access to information and related resources to authorized users in the necessary extent). They translate into specific technical requirements that have to be met by the solutions applied in the army, such as access control mechanisms, protection against installation and activation of unauthorized equipment and software, as well as mechanisms monitoring user activity and collecting security violation data.

Key Tests

The command and communication network used by the Polish army comprises of various types of more or less advanced ICT systems used by all service branches of the Polish Armed Forces. They can work together due to the network of Jasmine Integrated Data Transmission Nodes stretching across Poland. These devices allow for transferring information with the highest security classification, “Secret” and “NATO Secret.” They are one of the most important elements in the command and communication network of the Polish Armed Forces, and thus face the biggest risk of cyber attacks. That is why, when a contract to deliver the new version of the ICT nodes was signed with Teldat three years ago, the priority was to check their level of cybersecurity.

In order to run necessary tests, at the beginning of 2019 the Head of the MOND’s Armament Inspectorate created a special group of the representatives of the Command Support and Signals Directorate of the Inspectorate of the Branches of the Armed Forces General Command, the Armament Inspectorate, Board VI of the Military Counterintelligence Service, the National Cyber Security Center, the 7th Regional Military Representation, the Command Systems Support Center of the Armed Forces General Command, and the Communication, IT and Electronic Warfare Equipment Operation Directorate of the Armed Forces Support Inspectorate.

According to legal regulations, in order for the shelter and portable ICT nodes to be introduced into service in the Polish army, they had to undergo security tests, including vulnerability, penetration and verification tests. The first type of test consists in conducting a controlled attack on the system. Its aim is to detect vulnerabilities in software or hardware, check it for faults arising from improper configuration or weak points in adopted and implemented technical and organizational protection measures, and determine if the system is secured against threats arising from the users’ insufficient awareness. Verification tests check whether a given solution meets all technical requirements indicated by the army in tender specifications (initial tactical and technical assumptions). Since the ICT nodes, just like the Jasmine Integrated Data Transmission Nodes, are also to be used in the creation of the Polish Mission Network 2.0 (PMN 2.0), i.e. the command and communication network for foreign missions and multinational operations, they were also tested on whether they meet related NATO requirements.

In order for the devices to start work in the Polish army, they also had to receive electromagnetic protection certificates issued by military services. To this end, they underwent tests using specialist measuring stations equipped with sensitive receivers and chambers that enable detection of unwanted electromagnetic emissions.

They Are Safe!

All the tests, verifications and checks performed on the shelter and portable ICT nodes before they could be introduced into service in the Polish Armed Forces took several months and had a positive outcome.

“We are glad our ICT nodes meet all military standards and guidelines regarding cybersecurity,” emphasizes Sebastian Cichocki, President of Teldat, adding that the nodes were the first product that underwent such extensive and complex testing according to the revised law. “It required a lot of hard work both, on our part and on the part of the Polish Armed Forces. We had to prepare, among other things, new testing and verification methodology, and choose competent laboratories to perform the tests,” he explains.

The first batch of the systems ordered in 2018 (24 shelter [stationary], 15 portable and two training sets) has already been delivered to army units. According to the contract, the deliveries of the ICT nodes will be completed by the end of 2021.

Krzysztof Wilewski

autor zdjęć: Łukasz Blechman / Teldat

dodaj komentarz


Sandhurst: końcowe odliczanie
Morska Jednostka Rakietowa w Rumunii
Kadisz za bohaterów
Wojna w świętym mieście, część druga
Wojna na detale
Rekordziści z WAT
Ukraińscy żołnierze w ferworze nauki
Żołnierze ewakuują Polaków rannych w Gruzji
Wojskowy bój o medale w czterech dyscyplinach
Jakie wyzwania czekają wojskową służbę zdrowia?
Przygotowania czas zacząć
Donald Tusk: Więcej akcji a mniej słów w sprawie bezpieczeństwa Europy
SOR w Legionowie
Więcej pieniędzy dla żołnierzy TSW
Strategiczna rywalizacja. Związek Sowiecki/ Rosja a NATO
Na straży wschodniej flanki NATO
Rozpoznać, strzelić, zniknąć
Operacja „Synteza”, czyli bomby nad Policami
Żołnierze-sportowcy CWZS-u z medalami w trzech broniach
W Italii, za wolność waszą i naszą
Gen. Kukuła: Trwa przegląd procedur bezpieczeństwa dotyczących szkolenia
Szpej na miarę potrzeb
Zmiany w dodatkach stażowych
Morze Czarne pod rakietowym parasolem
Zachować właściwą kolejność działań
Aleksandra Mirosław – znów była najszybsza!
NATO na północnym szlaku
Ustawa o obronie ojczyzny – pytania i odpowiedzi
Wypadek na szkoleniu wojsk specjalnych
Wytropić zagrożenie
Sprawa katyńska à la española
Active shooter, czyli warsztaty w WCKMed
Ramię w ramię z aliantami
Przełajowcy z Czarnej Dywizji najlepsi w crossie
Wojna w świętym mieście, część trzecia
W Rumunii powstanie największa europejska baza NATO
25 lat w NATO – serwis specjalny
Polscy żołnierze stacjonujący w Libanie są bezpieczni
Gunner, nie runner
Święto stołecznego garnizonu
Wojna w Ukrainie oczami medyków
Polak kandydatem na stanowisko szefa Komitetu Wojskowego UE
NATO zwiększy pomoc dla Ukrainy
Znamy zwycięzców „EkstraKLASY Wojskowej”
W Brukseli o wsparciu dla Ukrainy
Wojna w świętym mieście, epilog
Strażacy ruszają do akcji
Kolejne FlyEye dla wojska
Czerwone maki: Monte Cassino na dużym ekranie
Kosiniak-Kamysz o zakupach koreańskiego uzbrojenia
NATO on Northern Track
Ustawa o obronie ojczyzny – pytania i odpowiedzi
Tusk i Szmyhal: Mamy wspólne wartości
Puchar księżniczki Zofii dla żeglarza CWZS-u
Systemy obrony powietrznej dla Ukrainy
Charge of Dragon
Lekkoatleci udanie zainaugurowali sezon
Pod skrzydłami Kormoranów
Front przy biurku
Ustawa o obronie ojczyzny – pytania i odpowiedzi

Ministerstwo Obrony Narodowej Wojsko Polskie Sztab Generalny Wojska Polskiego Dowództwo Generalne Rodzajów Sił Zbrojnych Dowództwo Operacyjne Rodzajów Sił Zbrojnych Wojska Obrony
Żandarmeria Wojskowa Dowództwo Garnizonu Warszawa Inspektorat Wsparcia SZ Wielonarodowy Korpus
Szkolenia Sił Połączonych
Agencja Uzbrojenia

Wojskowy Instytut Wydawniczy (C) 2015
wykonanie i hosting AIKELO