Communications
Communication is commonly defined as the transmission of information. Its precise definition is disputed and there are disagreements about whether Intention, unintentional or failed transmissions are included and whether communication not onl ...
security is the discipline of preventing unauthorized interceptors from accessing
telecommunications
Telecommunication, often used in its plural form or abbreviated as telecom, is the transmission of information over a distance using electronic means, typically through cables, radio waves, or other communication technologies. These means of ...
in an intelligible form, while still delivering content to the intended recipients.
In the
North Atlantic Treaty Organization
The North Atlantic Treaty Organization (NATO ; , OTAN), also called the North Atlantic Alliance, is an intergovernmental transnational military alliance of 32 member states—30 European and 2 North American. Established in the aftermat ...
culture, including United States Department of Defense culture, it is often referred to by the abbreviation COMSEC. The field includes cryptographic security,
transmission security, emissions security and
physical security
Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). Physi ...
of COMSEC equipment and associated keying material.
COMSEC is used to protect both
classified
Classified may refer to:
General
*Classified information, material that a government body deems to be sensitive
*Classified advertising or "classifieds"
Music
*Classified (rapper) (born 1977), Canadian rapper
* The Classified, a 1980s American ro ...
and
unclassified traffic on
military communications
Military communications or military signals involve all aspects of communications, or conveyance of information, by armed forces. Examples from '' Jane's Military Communications'' include text, audio, facsimile, tactical ground-based communica ...
networks, including voice, video, and data. It is used for both analog and digital applications, and both wired and wireless links.
Voice over secure internet protocol
VOSIP
Voice over Internet Protocol (VoIP), also known as IP telephony, is a set of technologies used primarily for voice communication sessions over Internet Protocol (IP) networks, such as the Internet. VoIP enables voice calls to be transmitted as ...
has become the de facto standard for securing voice communication, replacing the need for
Secure Terminal Equipment
Secure Terminal Equipment (STE) is the U.S. government's current (), encrypted telephone communications system for wired or "landline" communications. STE is designed to use ISDN telephone lines which offer higher speeds of up to 128 kbit/s ...
(STE) in much of NATO, including the U.S.A.
USCENTCOM moved entirely to VOSIP in 2008.
Specialties
* Cryptographic security: The component of communications security that results from the provision of technically sound
cryptosystems
In cryptography, a cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, such as confidentiality (encryption).
Typically, a cryptosystem consists of three algorithms: one for key generation, one fo ...
and their proper use. This includes ensuring message confidentiality and authenticity.
*
Emission security (EMSEC): The protection resulting from all measures taken to deny unauthorized persons information of value that might be derived from communications systems and cryptographic equipment intercepts and the interception and analysis of compromising emanations from cryptographic equipment, information systems, and telecommunications systems.
*
Transmission security (TRANSEC): The component of communications security that results from the application of measures designed to protect transmissions from interception and exploitation by means other than
cryptanalysis
Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic se ...
(e.g.
frequency hopping
Frequency-hopping spread spectrum (FHSS) is a method of transmitting radio signals by rapidly changing the carrier frequency among many frequencies occupying a large spectral band. The changes are controlled by a code known to both transmitter ...
and
spread spectrum
In telecommunications, especially radio communication, spread spectrum are techniques by which a signal (electrical engineering), signal (e.g., an electrical, electromagnetic, or acoustic) generated with a particular Bandwidth (signal processi ...
).
* Physical security: The component of communications security that results from all
physical measures necessary to safeguard classified equipment, material, and documents from
access
Access may refer to:
Companies and organizations
* ACCESS (Australia), an Australian youth network
* Access (credit card), a former credit card in the United Kingdom
* Access Co., a Japanese software company
* Access International Advisors, a hed ...
thereto or observation thereof by unauthorized persons.
Related terms
* AKMS – the Army Key Management System
* AEK – Algorithmic Encryption Key
* CT3 – Common Tier 3
* CCI –
Controlled Cryptographic Item - equipment which contains COMSEC embedded devices
* ACES – Automated Communications Engineering Software
* DTD –
Data Transfer Device
* ICOM – Integrated COMSEC, e.g. a radio with built in encryption
* TEK – Traffic
Encryption
In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
Key
* TED – Trunk Encryption Device such as the WALBURN/KG family
* KEK – Key Encryption Key
* KPK – Key production key
* OWK – Over the Wire Key
* OTAR –
Over the Air Rekeying
* LCMS – Local COMSEC Management Software
*
KYK-13
The KYK-13 Electronic Transfer Device is a common fill device designed by the United States National Security Agency for the transfer and loading of cryptographic keys with their corresponding check word. The KYK-13 is battery powered and uses the ...
– Electronic Transfer Device
*
KOI-18 – Tape Reader General Purpose
* KYX-15 – Electronic Transfer Device
* KG-30 – family of COMSEC equipment
* TSEC – Telecommunications Security (sometimes referred to in error transmission security or TRANSEC)
* SOI –
Signal operating instructions
Signal operating instructions (SOI) or Communications-Electronics Operation Instructions (CEOI) are U.S. military terms for a type of combat order issued for the technical control and coordination of communications within a command. They include c ...
* SKL –
Simple Key Loader
* TPI –
Two person integrity
*
STU-III
STU-III (Secure Telephone Unit - third generation) is a family of secure telephones introduced in 1987 by the NSA for use by the United States government, its contractors, and its allies. STU-III desk units look much like typical office telephon ...
– (obsolete secure phone, replaced by STE)
* STE –
Secure Terminal Equipment
Secure Terminal Equipment (STE) is the U.S. government's current (), encrypted telephone communications system for wired or "landline" communications. STE is designed to use ISDN telephone lines which offer higher speeds of up to 128 kbit/s ...
(secure phone)
Types of COMSEC equipment:
* Crypto equipment: Any equipment that embodies
cryptographic
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adversarial behavior. More gen ...
logic or performs one or more cryptographic functions (key generation, encryption, and authentication).
* Crypto-ancillary equipment: Equipment designed specifically to facilitate efficient or reliable operation of crypto-equipment, without performing cryptographic functions itself.
* Crypto-production equipment: Equipment used to produce or load keying material
* Authentication equipment:
DoD Electronic Key Management System
The
Electronic Key Management System (EKMS) is a
United States Department of Defense
The United States Department of Defense (DoD, USDOD, or DOD) is an United States federal executive departments, executive department of the federal government of the United States, U.S. federal government charged with coordinating and superv ...
(DoD) key management, COMSEC material distribution, and logistics support system. The
National Security Agency
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
(NSA) established the EKMS program to supply electronic key to COMSEC devices in securely and timely manner, and to provide COMSEC managers with an automated system capable of ordering, generation, production, distribution, storage, security accounting, and access control.
The Army's platform in the four-tiered EKMS, AKMS, automates frequency management and COMSEC management operations. It eliminates paper keying material, hardcopy
Signal operating instructions
Signal operating instructions (SOI) or Communications-Electronics Operation Instructions (CEOI) are U.S. military terms for a type of combat order issued for the technical control and coordination of communications within a command. They include c ...
(SOI) and saves the time and resources required for courier distribution. It has 4 components:
* LCMS provides automation for the detailed accounting required for every COMSEC account, and electronic key generation and distribution capability.
* ACES is the
frequency management portion of AKMS. ACES has been designated by the Military Communications Electronics Board as the joint standard for use by all services in development of frequency management and crypto-net planning.
* CT3 with DTD software is in a fielded, ruggedized hand-held device that handles, views, stores, and loads SOI, Key, and electronic protection data. DTD provides an improved net-control device to automate crypto-net control operations for communications networks employing electronically keyed COMSEC equipment.
* SKL is a hand-held PDA that handles, views, stores, and loads SOI, Key, and electronic protection data.
Key Management Infrastructure (KMI) Program
KMI is intended to replace the legacy Electronic Key Management System to provide a means for securely ordering, generating, producing, distributing, managing, and auditing cryptographic products (e.g., asymmetric keys, symmetric keys, manual cryptographic systems, and cryptographic applications). This system is currently being fielded by Major Commands and variants will be required for non-DoD Agencies with a COMSEC Mission.
See also
*
Dynamic secrets Dynamic Secrets is a novel key management scheme for secure communications. It was proposed by Sheng Xiao, Weibo Gong, and Don Towsley. The first academic publication had been nominated for INFOCOM 2010 best paper award.Xiao, Sheng, Weibo Gong, and ...
*
Electronics technician (United States Navy)
*
Information security
Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data ...
*
Information warfare
Information warfare (IW) is the battlespace use and management of information and communication technology (ICT) in pursuit of a competitive advantage over an opponent. It is different from ''cyberwarfare'' that attacks computers, software, and ...
*
List of telecommunications encryption terms
*
NSA encryption systems
The National Security Agency took over responsibility for all US government encryption systems when it was formed in 1952. The technical details of most NSA-approved systems are still Classified information in the United States, classified, but m ...
*
NSA product types
*
Operations security
Operations security (OPSEC) is a process that identifies critical information to determine whether friendly actions can be observed by enemy intelligence, determines if information obtained by adversaries could be interpreted to be useful to th ...
*
Secure communication
Secure communication is when two entities are communicating and do not want a third party to listen in. For this to be the case, the entities need to communicate in a way that is unsusceptible to eavesdropping or interception. Secure communication ...
*
Signals intelligence
Signals intelligence (SIGINT) is the act and field of intelligence-gathering by interception of ''signals'', whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly u ...
*
Traffic analysis
Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted. In general, the greater the number of messages observ ...
References
External links
*
*
National Information Systems Security Glossary Committee on National Security Systems Instruction No. 4009, National Information Assurance Glossary, published by the United States federal government, is an unclassified glossary of Information security terms intended to provide a common vocabula ...
*
*
*
* https://web.archive.org/web/20121002192433/http://www.dtic.mil/whs/directives/corres/pdf/466002p.pdf
* {{cite web , archive-url=https://web.archive.org/web/20100930082920/http://peoc3t.monmouth.army.mil/netops/akms.html , archive-date=September 30, 2010 , url-status=dead , url=http://peoc3t.monmouth.army.mil/netops/akms.html , title=Army Key Management Systems (AKMS) , publisher=Project Manager NETOPS Current Force
Cryptography machines
Cryptography
Military communications
Military radio systems
Encryption devices