Military commanders need hubs of technology to understand the masses of information with which they are presented.

The insider threat a is a real concern for planners in operational security, who rely on an information technology infrastructure to organise and communicate intelligence, surveillance and reconnaissance materials of a secretive nature.

But as well preventing misuse of the system by cleared personnel, computers on different networks, with different levels of classification, need to be prevented from accessing each other. 

At the C4ISR Global 2024 conference on 17-18 April, Army Technology interviewed Dibs Buckness, Director of Thinklogical, a company that is deep diving this contemporary security issue. 

Within a control room, separate computer terminals may be linked up to different networks, each with their own security classification and pool of potential users. For example, one system might be meant for UK Eyes Only, while another computer is linked to a network involving other security partners. 

Buckness points out that traditional thinking was satisfied if these two systems enjoyed an air-gap between the computers, but that this is not sufficient in the current circumstances. 

To demonstrate this, he draws the parallel between an aerial and a computer mouse cable. Essentially they both allow electricity to run through them, with the mouse cable intended to conduct a signal from device to source along its length, while the aerial emits a signal across its length.

However, the mouse cable is not perfect, and the inefficiency in conducting energy along its length signs out clearly from the computer as a mirror of the signal it is intending to convey privately. Such signals can be intercepted and interpreted by unauthorised persons.

Buckness has 40 years experience in the military with the Royal Navy and Royal Navy reserve, and spent time working with several defence companies before joining Thinklogical three years ago.

He is well aware of the disruption caused by leaks of classified materials, and believes that the technology being developed by Thinklogical can help in the prevention of further breaches.

“The easiest way to describe our technology is a keyboard, video and mouse matrix (KVM) on steroids,” says Bucknell, explaining that their technology is designed to consolidate multiple computers, which could range from ones used for various security levels: “For example, one for Nato secret; one for UK secret; one for UK-US Secret; one for unclassified; one for Nato unclassified… that’s five computers underneath the desk.” 

Thinklogical essentially remove these computers from under the desk, placing them in a server room. Here, each computer is connected to a small device that converts the outputs from the keyboard, video, and mouse into light signals.

“In the matrix, there is a physical switch, with which you, as the operator, have decided what information can go to what location.”

By doing this, the technology minimises the risk of insider threats since the operators no longer have direct access to the physical machines, now securely located in a server room that fewer people can access, ideally those with higher security clearances, explains Bucknell. 

“The first thing you’re able to do is take away the insider threat. So straightaway the operator has not got access to the physical machines; the physical machines are now put elsewhere in a very, very secure server room.” 

“Granted, someone can get in the server room and do some damage, but fewer people can get in to the server room, And hopefully those people that can get in the server room, they’re the people who have got the much higher classifications, much higher security, grading etc.”

This setup also reduces the potential for security breaches at the operator level. Moreover, the technology uses light, which operates at a much higher frequency than traditional electromagnetic emissions, making it harder to intercept, thereby securing the data further.

“The first thing is, you have removed the attack vector from the individual operator…The second is by the fact that … although light is still an electromagnetic emission its much, much, much higher frequency, and thus, the emissions from the fibre optics are so small, you’d need something incredibly sensitive to pick it up. You’re immediately removing another attack vector.”

Bucknell also mentions the development of a new product, the ICT 18, which replaces the equivalent of 18 desktop computers but weighs only 45 kilograms compared to the 450 kilograms of the original equipment.

This product not only significantly reduces size and weight but also achieves a 90% reduction in power usage and a 70% reduction in heat output, offering substantial efficiency benefits. “It’s certainly something that – if you’re conscious of size, weight and power – it’s something that will give you a huge size, weight and power advantage.”