Secure Terminal Equipment
Secure Terminal Equipment (STE) is the U.S. government's current (), encrypted telephone communications system for wired or "landline" communications. STE is designed to use ISDN telephone lines which offer higher speeds of up to 128 kbit/s and are all digital. The greater bandwidth allows higher quality voice and can also be utilized for data and fax transmission through a built-in RS-232 port. STE is intended to replace the older STU-III office system and the KY-68 tactical system. STE sets are backwards compatible with STU-III phones, but not with KY-68 sets. STE sets look like ordinary high-end office desk telephones and can place unsecured calls to anywhere on the public switched telephone network (PSTN), as well as secured calls on it via the phone's backwards compatible STU-III mode. There is a PC Card slot in the STE that allows a Fortezza Plus ( KOV-14) Crypto Card or KSV-21 Enhanced Crypto Card to be inserted. When an NSA-configured Crypto Card is present, sec ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
KOV-14
The KOV-14 Fortezza Plus is a US National Security Agency-approved PC card which provides encryption functions and key storage to Secure Terminal Equipment and other devices. It is a tamper-resistant module based on the Mykotronx Krypton chip, including all of the cryptographic functionality of the original Fortezza card plus the Type 1 algorithms/protocols BATON and Firefly, the SDNS signature algorithm, and the STU-III protocol. It was developed by Mykotronx as part of the NSA's MISSI program. As of 2008, the KOV-14 is beginning to be phased out and replaced by the backwards compatible KSV-21 The KSV-21 Enhanced Crypto Card is a US National Security Agency-approved PC card that provides Type 1 encryption functions and key storage to the STE secure telephones and other devices. The KSV-21 was originally built by SafeNet but has sinc ... PC card. References {{crypto-stub National Security Agency encryption devices ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Voice Over Internet Protocol
Voice over Internet Protocol (VoIP), also known as IP telephony, is a set of technologies used primarily for voice communication sessions over Internet Protocol (IP) networks, such as the Internet. VoIP enables Voice call, voice calls to be transmitted as data packets, facilitating various methods of voice communication, including traditional applications like Skype, Microsoft Teams, Google Voice, and VoIP phones. Regular telephones can also be used for VoIP by connecting them to the Internet via Analog telephone adapter, analog telephone adapters (ATAs), which convert traditional telephone signals into digital data packets that can be transmitted over IP networks. The broader terms Internet telephony, broadband telephony, and broadband phone service specifically refer to the delivery of voice and other communication services, such as fax, SMS, and voice messaging, over the Internet, in contrast to the traditional public switched telephone network (PSTN), commonly known as plain ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Defense Red Switch Network
The Defense Red Switch Network (DRSN) is a dedicated telephone network which provides global secure communication services for the command and control structure of the United States Armed Forces. The network is maintained by the Defense Information Systems Agency (DISA) and is secured for communications up to the level of Top Secret SCI. The DRSN provides multilevel secure voice and voice-conferencing capabilities to the National Command Authority (NCA, being the President and the Secretary of Defense of the United States), the Joint Chiefs of Staff, the National Military Command Center (NMCC), Combatant Commanders and their command centers, warfighters, other DoD agencies, government departments, and NATO allies. Department of Defense and federal government agencies can get access to the network with approval of the Joint Staff. Upon approval by the Joint Staff, DISA will work with the customer and the appropriate military department to arrange the service. The Defense Red ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Red/black Concept
The red/black concept, named in comparison to a typewriter ribbon and sometimes called the red–black architecture or red/black engineering, refers to the careful segregation in cryptographic systems of signals that contain sensitive or Classified information, classified plaintext information (red signals) from those that carry encrypted information, or ciphertext (black signals). Therefore, the red side is usually considered the internal side, and the black side the more public side, with often some sort of Guard (information security), guard, Firewall (computing), firewall or Unidirectional network, data-diode between the two. In NSA jargon, encryption devices are often called Blacker (security), blackers, because they convert red signals to black. Tempest (codename), TEMPEST standards spelled out in Tempest/NSTISSAM TEMPEST/2-95, 2-95 specify shielding or a minimum physical distance between wires or equipment carrying or processing red and black signals. Different organizati ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Secure Communications Interoperability Protocol
The Secure Communications Interoperability Protocol (SCIP) is a US standard for secure voice and data communication, focircuit-switchedone-to-one connections, not packet-switched networks. SCIP derived from the US Government Future Narrowband Digital Terminal (FNBDT) project. SCIP supports a number of different modes, including national and multinational modes which employ different cryptography. Many nations and industries develop SCIP devices to support the multinational and national modes of SCIP. SCIP has to operate over the wide variety of communications systems, including commercial land line telephone, military radios, communication satellites, Voice over IP and the several different cellular telephone standards. Therefore, it was designed to make no assumptions about the underlying channel other than a minimum bandwidth of 2400 Hz. It is similar to a dial-up modem in that once a connection is made, two SCIP phones first negotiate the parameters they need and then comm ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
National Security Agency
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for global intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The NSA has roughly 32,000 employees. Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Between then and the end of the Cold War, it became the largest of the U.S. intelligence organizations in terms of personnel and budget. Still, information available as of 2013 indicates that the C ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
KSV-21
The KSV-21 Enhanced Crypto Card is a US National Security Agency-approved PC card that provides Type 1 encryption functions and key storage to the STE secure telephones and other devices. The KSV-21 was originally built by SafeNet but has since been purchased by Raytheon as a tamper-resistant reprogrammable module and is backwards compatible with the KOV-14 Fortezza Plus card. It adds features including support for SCIP, Enhanced Firefly and NSA's 21st century Key Management Initiative. It can perform Type 1 encryption and hash operations at 80 Mbit/s. As of 2008, the KOV-14 is beginning to be phased out and replaced by the KSV-21. The US version is certified to protect classified data through the Top Secret/SCI level as well as unclassified sensitive information. Versions are available for use with other nations, including: *Canadian national (KSV-22) *Combined Communications Electronics Board (CCEB) (KSV-30) *NATO The North Atlantic Treaty Organization (NAT ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Fortezza
Fortezza is an information security system that uses the Fortezza Crypto Card, a PC Card-based security token. It was developed for the U.S. government's Clipper chip project and has been used by the U.S. Government in various applications. Each individual who is authorized to see protected information is issued a ''Fortezza card'' that stores private keys and other data needed to gain access. It contains an NSA approved security microprocessor called '' Capstone'' ( MYK-80) that implements the Skipjack encryption algorithm. The original Fortezza card (KOV-8) is a Type 2 product which means it cannot be used for classified information. The most widely used Type 1 encryption card is the KOV-12 Fortezza card which is used extensively for the Defense Message System (DMS). The KOV-12 is cleared up to TOP SECRET/SCI. A later version, called KOV-14 or Fortezza Plus, uses a Krypton microprocessor that implements stronger, Type 1 encryption and may be used for information clas ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Integrated Services Digital Network
Integrated Services Digital Network (ISDN) is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the digitalised circuits of the public switched telephone network. Work on the standard began in 1980 at Bell Labs and was formally standardized in 1988 in the CCITT "Red Book". By the time the standard was released, newer networking systems with much greater speeds were available, and ISDN saw relatively little uptake in the wider market. One estimate suggests ISDN use peaked at a worldwide total of 25 million subscribers at a time when 1.3 billion analog lines were in use. ISDN has largely been replaced with digital subscriber line (DSL) systems of much higher performance. Prior to ISDN, the telephone system consisted of digital links like T1/ E1 on the long-distance lines between telephone company offices and analog signals on copper telephone wires to the customers, the " last mile". At the time, t ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
PC Card
PC Card is a technical standard specifying an expansion card interface for laptops and personal digital assistants, PDAs. The PCMCIA originally introduced the 16-bit Industry Standard Architecture, ISA-based PCMCIA Card in 1990, but renamed it to PC Card in March 1995 to avoid confusion with the name of the organization. The CardBus PC Card was introduced as a 32-bit version of the original PC Card, based on the Peripheral Component Interconnect, PCI specification. CardBus slots are Backward compatibility, backwards compatible, but older slots are not Forward compatibility, forward compatible with CardBus cards. Although originally designed as a standard for memory-expansion cards for computer storage, the existence of a usable general standard for notebook peripherals led to the development of many kinds of devices including network cards, modems, and hard disks. The PC Card port has been superseded by the ExpressCard interface since 2003, which was also initially developed by t ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Public Switched Telephone Network
The public switched telephone network (PSTN) is the aggregate of the world's telephone networks that are operated by national, regional, or local telephony operators. It provides infrastructure and services for public telephony. The PSTN consists of telephone lines, fiber-optic cables, microwave transmission links, cellular networks, communications satellites, and undersea telephone cables interconnected by switching centers, such as central offices, network tandems, and international gateways, which allow telephone users to communicate with each other. Originally a network of fixed-line analog telephone systems, the PSTN is now predominantly digital in its core network and includes terrestrial cellular, satellite, and landline systems. These interconnected networks enable global communication, allowing calls to be made to and from nearly any telephone worldwide. Many of these networks are progressively transitioning to Internet Protocol to carry their telephony traffi ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |