Link 16 Secure Voice J-Voice for the Entire Operations Team
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
WHY the RCAF SHOULD FOCUS on INTEROPERABILITY THROUGH DATALINK Ltcol Seongju Kim
WHY THE RCAF SHOULD FOCUS ON INTEROPERABILITY THROUGH DATALINK LtCol Seongju Kim JCSP 44 PCEMI 44 SERVICE PAPER ÉTUDE MILITAIRE Disclaimer Avertissement Opinions expressed remain those of the author and Les opinons exprimées n’engagent que leurs auteurs do not represent Department of National Defence or et ne reflètent aucunement des politiques du Canadian Forces policy. This paper may not be used Ministère de la Défense nationale ou des Forces without written permission. canadiennes. Ce papier ne peut être reproduit sans autorisation écrite. © Her Majesty the Queen in Right of Canada, as © Sa Majesté la Reine du Chef du Canada, représentée par represented by the Minister of National Defence, 2018. le ministre de la Défense nationale, 2018. CANADIAN FORCES COLLEGE – COLLÈGE DES FORCES CANADIENNES JCSP 44 – PCEMI 44 2017 – 2018 SERVICE PAPER - ÉTUDE MILITAIRE Why the RCAF Should Focus on Interoperability through Datalink LtCol Seongju Kim “This paper was written by a student “La présente étude a été rédigée par un attending the Canadian Forces College stagiaire du Collège des Forces in fulfilment of one of the requirements canadiennes pour satisfaire à l'une des of the Course of Studies. The paper is a exigences du cours. L'étude est un scholastic document, and thus contains document qui se rapporte au cours et facts and opinions, which the author contient donc des faits et des opinions alone considered appropriate and que seul l'auteur considère appropriés et correct for the subject. It does not convenables au sujet. Elle ne reflète pas necessarily reflect the policy or the nécessairement la politique ou l'opinion opinion of any agency, including the d'un organisme quelconque, y compris le Government of Canada and the gouvernement du Canada et le ministère Canadian Department of National de la Défense nationale du Canada. -
TB 380-41 Final!
klg DISTRIBUTION RESTRICTION STATEMENT The technical or operational information in this manual is required solely for official use; therefore, distribution is authorized to U.S. Government agencies only. This determination was made on 1 January 1993. For further information, see page i of this document. WARNING: Military or civilian personnel who misuse or disclose to unauthorized persons information marked For Official Use Only (FOUO) may be subject to administrative sanctions brought under UCMJ Article 92, or in accor- dance with AR 690-700, Chapter 751, Table 1-1. Elec- tronic copies made of any publication herein must (1) bear the Four Official Use Only marking, and (2) include this WARNING in its entirety. Protective marking is in accordance with paragraph 3-200, Exemption 3a, AR 25-55. Destroy by any method that will prevent disclosure of contents or reconstruction of the document. Headquarters, Department of the Army Date of this Publication is 1 August 2003. Current as of 1 July 2003. This bulletin supersedes TB 380-41, October 1994 and rescinds the use of DA Forms 2008 and 2009. FOR OFFICIAL USE ONLY TB 380-41 DISTRIBUTION RESTRICTION STATEMENT OUTSIDE THE U.S. GOVERNMENT RELEASE: Requests from outside the U.S. Government for release of this publication under the Foreign Military Sales Program must be made to Commander, U.S. Army Security Assistance Center, ATTN: AMSAC-MI/I, 5002 Eisenhower Ave., Alexandria, VA 22333-0001. Request from outside the U.S. Government for release of this publication under the Freedom of Information Act must be made to the Director, Communications-Electronics Command (CECOM), Communications Security Logistics Activity (CSLA) at ATTN: SELCL-ID-P3, U.S. -
Ky-57 Vinson
KY-57 VINSON Homepage Crypto KY-57 (VINSON) Index Voice encryption unit Enigma The KY-57 was a wide-band voice encryption unit that was developed in the USA during the 1970s as a replacement of the NESTOR cryptographic products, such as the KY-38. It was suitable for use with a Hagelin wide range of military radios and telehone lines. As part of the VINSON family of devices, it was the main Fialka crypto 'workhorse' of the US Army during the 1980s. Even today, many radios and voice encryption devices are still backwards compatible with the KY-57, that is also known as the TSEC/KY-57. The Siemens airborne version of the KY-57 is called the KY-58. Philips The KY-57 uses the NSA-developed Type-1 KY-57 voice encryption unit Nema SAVILLE cryptographic algorithm. When used in combination with a radio transceiver, such as the Racal SINCGARS non-ICOM RT-1439/VRC, the KY-57 STK allows signal fades or losses for up to 12 seconds without losing synchronization. Transvertex The KY-57 was eventually superceeded by the KY- Gretag 99 that offered newer - more advanced - Telsy cryptographic algorithms, but that was still backwards compatible with the KY-57. Later Tadiran SINCGARS ICOM radios, such as the RT-1523, had built-in KY-57 (VINSON) compatibility. USA USSR Both voice and data can be encrypted with the KY-57. Voice data is digitized using Continuous Variable Slope Delta modulation (CVSD), similar to other voice crypto systems of the same era, such as the UK Philips Spendex-10 , the Spendex 50 and the Telsy TS-500. -
KY-58 (Vinson)
KY-58 (Vinson) The KY-57/58 is a member of the VINSON family. The VINSON family consists of wideband secure voice (WBSV) units developed by the National Security Agency to provide line of sight half-duplex voice and data encryption at 16 Kbps. The KY-57/58 provides security for AM/FM, VHF, UHF, half-duplex PTT combat net radios and tactical wireline systems when used with the HYX-57. Also used by non-tactical users for high-level communications in the local wideband telephone networks and wideband satellite terminals. The KY-57 is the manpack/vehicular model and the KY-58 is the airborne/shipborne version. The KY-57/58 is certified to pass data up to TOP SECRET and accepts key from the family of Common Fill Devices and also incorporates remote keying. KY-57/58 production was completed in 1993. No further production is planned. KY-58 photo by Tim Tyler Tim Tyler comments."The photo above depicts the KY-58 unit inside a USCG HH-65C 'Dolphin' helicopter taken in September 2008. It is currently configured just for use on their 225-400MHz aircraft band radio. Supposedly, they're in the process of upgrading the HH-65 helos into an MH-65 (Special Ops capable) configuration which will have APCO P-25 compliant radios (with AES crypto, for talking to other DHS agencies) as well as ANDVT / KY-100 type crypto for communicating with the military-side of USCG ops". The photo above depicts a KY-58 RCU installation in an A-10 attack aircraft. -
Inter-Island Communications
SOUTH CHINA SEA MILITARY CAPABILITY SERIES A Survey of Technologies and Capabilities on China’s Military Outposts in the South China Sea INTER-ISLAND COMMUNICATIONS J. Michael Dahm INTER-ISLAND COMMUNICATIONS J. Michael Dahm Copyright © 2020 The Johns Hopkins University Applied Physics Laboratory LLC. All Rights Reserved. This study contains the best opinion of the author based on publicly available, open- source information at time of issue. It does not necessarily represent the assessments or opinions of APL sponsors. The author is responsible for all analysis and annotations of satellite images contained in this report. Satellite images are published under license from Maxar Technologies/DigitalGlobe, Inc., which retains copyrights to the original images. Satellite images in this report may not be reproduced without the express permission of JHU/APL and Maxar Technologies/DigitalGlobe, Inc. See Appendix A for notes on sources and analytic methods. NSAD-R-20-048 July 2020 Inter-Island Communicaitons Contents Introduction .................................................................................................................. 1 Troposcatter Communications, 散射通信 ..................................................................... 2 VHF/UHF and Other Line-of-Sight Communications ...................................................... 6 4G Cellular Communications ........................................................................................ 7 Airborne Communications Layer ................................................................................. -
A History of U.S. Communications Security (U)
A HISTORY OF U.S. COMMUNICATIONS SECURITY (U) THE DAVID G. BOAK LECTURES VOLUME II NATIONAL SECURITY AGENCY FORT GEORGE G. MEADE, MARYLAND 20755 The information contained in this publication will not be disclosed to foreign nationals or their representatives without express approval of the DIRECTOR, NATIONAL SECURITY AGENCY. Approval shall refer specifically to this publication or to specific information contained herein. JULY 1981 CLASSIFIED BY NSA/CSSM 123-2 REVIEW ON 1 JULY 2001 NOT RELEASABLE TO FOREI6N NATIONALS SECRET HA~mLE YIA COMINT CIIA~HJELS O~JLY ORIGINAL (Reverse Blank) ---------- • UNCLASSIFIED • TABLE OF CONTENTS SUBJECT PAGE NO INTRODUCTION _______ - ____ - __ -- ___ -- __ -- ___ -- __ -- ___ -- __ -- __ --- __ - - _ _ _ _ _ _ _ _ _ _ _ _ iii • POSTSCRIPT ON SURPRISE _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ I OPSEC--------------------------------------------------------------------------- 3 ORGANIZATIONAL DYNAMICS ___ -------- --- ___ ---- _______________ ---- _ --- _ ----- _ 7 THREAT IN ASCENDANCY _________________________________ - ___ - - _ -- - _ _ _ _ _ _ _ _ _ _ _ _ 9 • LPI _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ I I SARK-SOME CAUTIONARY HISTORY __ --- _____________ ---- ________ --- ____ ----- _ _ 13 THE CRYPTO-IGNITION KEY __________ --- __ -- _________ - ---- ___ -- ___ - ____ - __ -- _ _ _ 15 • PCSM _ _ _ _ _ _ _ _ _ _ _ _ _ _ -
Department of Defense Program Acquisition Cost by Weapons System
The estimated cost of this report or study for the Department of Defense is approximately $36,000 for the 2019 Fiscal Year. This includes $11,000 in expenses and $25,000 in DoD labor. Generated on 2019FEB14 RefID: B-1240A2B FY 2020 Program Acquisition Costs by Weapon System Major Weapon Systems Overview The performance of United States (U.S.) weapon systems are unmatched, ensuring that U.S. military forces have a tactical combat advantage over any adversary in any environmental situation. The Fiscal Year (FY) 2020 acquisition (Procurement and Research, Development, Test, and Evaluation (RDT&E)) funding requested by the Department of Defense (DoD) totals $247.3 billion, which includes funding in the Base budget and the Overseas Contingency Operations (OCO) fund, totaling $143.1 billion for Procurement and $104.3 billion for RDT&E. The funding in the budget request represents a balanced portfolio approach to implement the military force objective established by the National Defense Strategy. Of the $247.3 billion in the request, $83.9 billion finances Major Defense Acquisition Programs (MDAPs), which are acquisition programs that exceed a cost threshold established by the Under Secretary of Defense for Acquisition and Sustainment. To simplify the display of the various weapon systems, this book is organized by the following mission area categories: • Aircraft and Related Systems • Missiles and Munitions • Command, Control, Communications, • Shipbuilding and Maritime Systems Computers, and Intelligence (C4I) • Space Based Systems Systems • Science and Technology • Ground Systems • Mission Support Activities • Missile Defeat and Defense Programs FY 2020 Investment Total: $247.3 Billion $ in Billions Numbers may not add due to rounding Introduction FY 2020 Program Acquisition Costs by Weapon System The Distribution of Funding in FY 2020 for Procurement and RDT&E by Component and Category* $ in Billions $ in Billions * Funding in Mission Support activities are not represented in the above displays. -
Air Defense Artillery Reference Handbook
HEADQUARTERS FM 3-01.11 (FM 44-100-2) DEPARTMENT OF THE ARMY AIR DEFENSE ARTILLERY REFERENCE HANDBOOK DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. ∗FM 3-01.11 (FM 44-1-2) Field Manual Headquarters No. 3-01.11 Department of the Army Washington, DC, 31 OCTOBER 2000 Air Defense Artillery Reference Handbook Contents Page Preface ........................................................................................................................ iii Chapter 1 AIR DEFENSE ARTILLERY MISSION .....................................................................1-1 Mission.......................................................................................................................1-1 Air and Missile Defense in Relation to Army Tenets .................................................1-2 Air and Missile Defense in Force Protection..............................................................1-3 Air Defense Battlefield Operating System .................................................................1-3 Chapter 2 THREAT.....................................................................................................................2-1 The Evolving Threat...................................................................................................2-1 Electronic Warfare .....................................................................................................2-8 Weapons of Mass Destruction...................................................................................2-9 Summary....................................................................................................................2-9 -
Tadil-A Tadil-B Tadil-C Tadil-J Nato Link 1
APPENDIX A. TACTICAL DIGITAL INFORMATION LINKS A tactical digital information link (TADIL) is a Joint Staff-approved, standardized communications link TADIL-C that transmits digital information. Current practice is to characterize a TADIL by its standardized message formats and transmission characteristics. TADILs TADIL-C is also known as Link 4A. It is an unsecure, time-division digital data link conducted between an interface two or more command and control or air defense controlling unit; e.g., TAOC or airborne weapons systems via a single or multiple network warning and control system (AWACS) and architecture and multiple communication media for appropriately equipped aircraft. Information exchange exchange of tactical information. (JP 1-02) at 5,000 bps can occur in one of three modes: full two- way (ground to air to ground), one way air to ground, In AAW operations,TADILs share air track informa- or one way ground to air. tion to build a comprehensive picture of the current air situation in a near real time basis. TADILs used by the MACCS in air defense operations follow. TADIL-J TADIL-J is also known as Link 16. It is a secure, high- TADIL-A speed digital data link. It uses the joint tactical information distribution system transmission (JTIDS) characteristics and protocols, conventions, and fixed- TADIL-A is also known as Link 11. It is a secure, length message formats defined by the JTIDS half-duplex (poll-response) netted digital data link that technical interface design plan. TADIL-J is intended uses parallel transmission frame characteristics and to replace or augment many existing TADILs as the standard message formats. -
FM 3-01.11 Air Defense Artillery Reference Handbook
HEADQUARTERS FM 3-01.11 (FM 44-100-2) DEPARTMENT OF THE ARMY AIR DEFENSE ARTILLERY REFERENCE HANDBOOK DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. ∗FM 3-01.11 (FM 44-1-2) Field Manual Headquarters No. 3-01.11 Department of the Arm Washington, DC, 31 OCTOBER 2000 Air Defense Artillery Reference Handbook Contents Page Preface ........................................................................................................................ iii Chapter 1 AIR DEFENSE ARTILLERY MISSION .....................................................................1-1 Mission.......................................................................................................................1-1 Air and Missile Defense in Relation to Army Tenets .................................................1-2 Air and Missile Defense in Force Protection..............................................................1-3 Air Defense Battlefield Operating System .................................................................1-3 Chapter 2 THREAT.....................................................................................................................2-1 The Evolving Threat...................................................................................................2-1 Electronic Warfare .....................................................................................................2-8 Weapons of Mass Destruction...................................................................................2-9 Summary....................................................................................................................2-9 -
L3harris Falcon Iii® An/Prc-117G(V)1(C)
L3HARRIS FALCON III® AN/PRC-117G(V)1(C) Multiband Networking Manpack Radio The L3Harris AN/PRC-117G delivers breakthrough wideband ADVANCED MULTIBAND data speed and legacy narrowband performance. Equipped with NETWORK PERFORMANCE MUOS-ready hardware, this manpack is 30% smaller and 35% lighter than any other currently in field. The AN/PRC-117G is also the industry’s first and only tactical radio with NINE Suite B encryption, KEY BENEFITS allowing sovereign nations to securely interoperate with the U.S., > Expands mission effectiveness NATO and regional tactical partners. This eliminates the time and with wideband, SATCOM and expense of maintenance, training and logistical support for two legacy narrowband separate radio systems. > 30% smaller and 35% lighter than any similar manpack When paired with L3Harris RF-7800B currently in field Broadband Global Area Network > MUOS-ready hardware terminals, the manpack delivers automatic SATCOM BLOS range > Industry’s only radio with NINE extension along with Internet and Suite B encryption remote private network access. > SATURN waveform protects The Multiband Networking Manpack communications against enemy features the Second Generation interference Software defined, with a JTEL-certified Anti-Jam UHF Radio for NATO (SATURN) > Future-proof with SCA v2.2.2 Software Communications Architecture waveform, which is the most up-to-date compliance (no waivers) (SCA), the fully JTRS-compliant Multiband ground-to-air technology for avoiding > L3Harris Sierra II encryption Networking Manpack supports in-field enemy interference. Voice and data are for secure voice and data up to upgrades as new capabilities emerge. secure up to TOP SECRET through the TOP SECRET The AN/PRC-117G is MUOS-ready, Sierra™II encryption module, which extending critical communications also supports all JTRS COMSEC and > Embedded SAASM GPS receiver Beyond-Line-Of-Sight (BLOS) with TRANSEC requirements. -
ADS-B to LINK-16 GATEWAY DEMONSTRATION: an INVESTIGATION of a LOW-COST ADS-B OPTION for MILITARY AIRCRAFT George S
ADS-B TO LINK-16 GATEWAY DEMONSTRATION: AN INVESTIGATION OF A LOW-COST ADS-B OPTION FOR MILITARY AIRCRAFT George S. Borrelli, The MITRE Corporation, Bedford, MA 01730 Disclaimer: “The statements contained herein are that of the author and not of the FAA, nor of the United States Air Force.” Summary A new system was demonstrated as a prototype that provides the advantages of Automatic Dependent Surveillance-Broadcast (ADS-B) for the military, yet totally avoids military aircraft modifications. The system was demonstrated on operational United States Air Force (USAF) aircraft using ADS-B equipped general aviation aircraft as the source. The demonstration was conducted in 2003. The result of the demonstration was highly positive commentary from engineers and the pilots. Although significant work remains prior to full fielding and operations, a decision was made to incorporate the prototype into a future datalinks concept. Introduction In certain regions of the world, military aircraft actively and heavily share airspace with general aviation (GA) aircraft and need deconfliction for improved safety. The ADS-B system demonstrated provides increased situational awareness of GA aircraft to military aircraft and to ground air traffic monitors. Today, that deconfliction is handled primarily by scheduling, public communications, limits and delays to flights, and controlled flight rules. These rules sometimes severely limit where, when, and how both general aviators and military aircraft can fly. However, in spite of the rules, neither the military nor general aviation cockpits have the situational awareness of each other that is needed in busy, shared airspace, thus limiting potential increased levels of safety.