Provides for the Procurement of Secure Communications Equipment to Navy Ships, Shore Sites, Aircraft, Marine Corps, and United States Coast Guard

Total Page:16

File Type:pdf, Size:1020Kb

Provides for the Procurement of Secure Communications Equipment to Navy Ships, Shore Sites, Aircraft, Marine Corps, and United States Coast Guard UNCLASSIFIED BUDGET ITEM JUSTIFICATION SHEET DATE May 2009 APPROPRIATION/BUDGET ACTIVITY P-1 ITEM NOMENCLATURE SUBHEAD OP,N - BA2 COMMUNICATIONS & ELECTRONIC EQUIPMENT 3415 Information Systems Security Program (ISSP) 52DA FY 2008 FY 2009 FY 2010 FY 2011 FY 2012 FY 2013 FY2014 FY2015 TO COMP TOTAL QUANTITY COST (in millions) 121.319 100.855 119.054 Continuing Continuing Spares 0.442 0.425 0.319 PROGRAM COVERAGE: The Information Systems Security Program (ISSP) provides for the procurement of secure communications equipment to Navy ships, shore sites, aircraft, Marine Corps, and United States Coast Guard. ISSP protects information systems from unauthorized access or modification of information, and against the denial of service to authorized users or provision of service to unauthorized users. Information Assurance (IA) is a layered protection strategy, using Commercial Off-The-Shelf (COTS) and Government Off-The-Shelf (GOTS) hardware and software products that collectively provide an effective Network Security Infrastructure (multiple level security mechanisms and ability to detect and react to intrusions). IA is critical in protecting our ability to wage Network Centric Warfare (NCW). The following ISSP specific efforts will be funded under this program: SECURE VOICE: The Secure Voice program procures equipment that provides secure voice communication capabilities. Equipment to be procured in FY10-FY11 includes various secure voice strategic/tactical products (VINSON/Advanced Narrowband and Digital Voice Terminal (VACM), KSV-21, Next Generation Internet Protocol Phones (Next Gen IP Phones), Call Manager, Internet Protocol Tactical Shore Gateway (IP TSG), Navy Certificate Validation Infrastructure (NCVI) cards, and Secure Communication Interoperability Protocol (SCIP) Inter-Working Function (IWF). Tactical secure voice products include Tactical Shore Gateway (TSG) to allow communication between telephony users and tactical radio users as well as secure conference capabilities. The SCIP IWF provides sea-shore secure telephony communication capabilities. Associated ancillary items for Secure Voice products include handsets, power supplies, upgrade kits, production support, and installation. SECURE DATA: The Secure Data program procures equipment to secure record and data communications. Equipment to be procured in FY10-FY11 includes Computer Network Defense (CND) and Cryptographic Communication Security (COMSEC) equipment. The CND program procures equipment to secure Navy network information systems. Procurements within the CND equipment line include: Firewall components which provide protection for networks from unauthorized users, Virtual Private Networks (VPNs) which provide encrypted "Point-to-Point" virtual communication networks, IPS' (Intrusion Prevention Systems), Administrator Access Control, Network Security tools and Filtering routers. CND procurement will also include DoD Information Assurance Certification and Accrediation Process (DIACAP) end-to-end Certification and Accreditation Support Tool (CAST), to provide enterprise-wide visibility into security posture. Procurements within the COMSEC equipment line include various family of crypto products to include KIV-7M (replacing WALBURN, SAVILLE DATA, KW-46 and KL-51 crypto devices), Cryptographic Universal Enclosures (CUE), KGV-136B, KG-3X (KG-333, KG-334, and KG-361), In-Line Network Encrypters (INE): KG-175A and KG-175D, KOV-26 (TALON), KIV-54, KG-45A, KGV-135A, KL-51 (Laptop, Suitcase and Components), Link-16 Common Crypto Module (CCM), Link-22, associated ancillary testers, rack mounts an parts, production support, integration, and installation are also included. Electronic Key Management System (EKMS) / KEY MANAGEMENT INFRASTRUCTURE (KMI): EKMS provides for cryptographic key management with the Department of Navy (DON). This program provides for the procurement, fielding and sustainment of software and hardware management system, which consists of Interoperable Joint Service and Civil Agency key management components. The National Security Agency (NSA) established the EKMS program to meet multiple objectives which include supplying electronic key in a secure and operationally responsive manner and providing EKMS / COMSEC managers with an automated system capable of ordering, generating, distributing, storing, security, accounting, and access control. Equipment to be procured in FY10-FY13 includes Local Management Devices (LMDs), Local COMSEC Management System (LCMS) software, Common User Application Software (CUAS), EKMS Upgrades (hardware and software), Tier 3 Simple Key Loader (SKL), Tactical Key Loader (TKL), Tier 3 Data Management Device (DMD), advanced Key Processor (KP), and other next generation EKMS Phase V products. Associated ancillary, production support and installation are also included. KMI is the next generation key management system that provides for net-centric, web based architecture for the ordering, management and distribution of all cryptographic key material to support Department of the Navy (DON) users. KMI is an NSA program, with the services procuring and deploying the Manager Client (MGC)/Advanced Key Processor (AKP) or Manager Only Clients to replace the EKMS LMD/KP platforms in the out years. The LMD is a Commercial Off-the-Shelf (COTS) computer that runs Santa Cruz Operations (SCO) Unix and LCMS/CUAS software which controls the Key Processor (KP) and provides the EKMS/COMSEC manager with improved security and enhanced management capabilities. The SKL stores, manages, transfers and loads cryptographic key material and COMSEC data through automatic loading of End Crypto Units (ECUs). Specifically, the SKL and its predecessor Data Transfer Device (DTD) provides the next generation DTD, which is based on a Personal Computer Memory Card International Association (PCMCIA) card (crypto engine) and COTS notebook / palmtop computer running GOTS software. DMD provides for intermediate key management to incorporate Mission Planning capabilities to the key packages. TKL- Begin procurement of TKL, a modernized KYK-13, in FY 10. Development of the TKL resulted from Special Warfare (SPECWAR) and United States Marine Corp (USMC) requirements for a new tactical fill device. Production scheduled to begin FY10. In FY11, begin procurement of KMI products, specifically the MGC / AKP and High Assurance Internet Protocol Equipment (HAIPE). Exhibit P-40, Budget Item Justification P-1 Shopping List - Item No. 86 Unclassified Page 1 of 18 Classification UNCLASSIFIED BUDGET ITEM JUSTIFICATION SHEET DATE May 2009 APPROPRIATION/BUDGET ACTIVITY P-1 ITEM NOMENCLATURE SUBHEAD OP,N - BA2 COMMUNICATIONS & ELECTRONIC EQUIPMENT 3415 Information Systems Security Program (ISSP) 52DA Public Key Infrastructure (PKI): PKI provides digital certificate management to authenticate the identity of users on networks as well as to encrypt electronic information flowing over those networks. Procurements include: Real-Time Automated Personnel Identification System (RAPIDS) capability on Integrated Shipboard Network Systems (ISNS) platforms. Card/Token readers & middleware (including Homeland Security Presidential Directive-12 (HSPD-12) and Secret Information Protocol Router Network (SIPRNet) development, Online Certificate Status Protocol (OCSP) hardware and software including server hardware, responder/repeaters hardware security modules, Secret Information Protocol Router Network / Non- Classified Information Protocol Router Network (SIPRNet / NIPRNet). Alternate Token Personal Identification Number (PIN) reset workstations, SIPRNet, Middleware, Navy Proxy Certificate Authority (CA) and Tactical Registration Authority (TRA) In addition, this includes procurement of smart card (system administrator) capabilities along with other PKI modernization efforts such as Internet Protocol Version 6 (IPv6). JUSTIFICATION OF BUDGET YEAR REQUIREMENTS: The procurement profile has been phased in accordance with validated requirements for Navy, Marine Corps, and Coast Guard implementation plans and availability of National Security Agency (NSA) procured key management items. FY10 procurements include procurement and fielding of Secure Voice Secure Communication Interoperability Protocol (SCIP) Inter-Working Function (IWF); Computer Network Defense (CND) firewalls, Intrusion Detection/Protection Systems, Gateway virus scanning hardware and software tools, DoD Information Assurance Certification and Accrediation Process (DIACAP) end-to-end Certification and Accreditation Support Tool (CAST); Cryptographic devices; Electronic Key Management System (EKMS) Tactical Key Loaders (TKLs), Key Management Infrastructure (KMI) workstations, and Simple Key Loaders (SKL); and Public Key Infrastructure (PKI) RAPIDS workstations, servers and security tokens. FY11 procurements include procurement and fielding of Secure Voice SCIP-IWF; CND firewalls, DIACAP end-to-end CAST; Intrusion Detection/Protection Systems, Gateway virus scanning hardware and software tools; Cryptographic devices; EKMS TKLs, KMI workstations, SKL; and PKI RAPIDS workstations, servers and security tokens. INSTALLING AGENT: The Information System Security Program (ISSP) equipment will be installed by the In-Service Engineering Activity (ISEA). Exhibit P-40, Budget Item Justification P-1 Shopping List - Item No. 86 Unclassified Page 2 of 18 Classification UNCLASSIFIED DATE COST ANALYSIS May 2009 APPROPRIATION ACTIVITY SUBHEAD OP,N - BA-2 COMMUNICATIONS AND ELECTRONIC EQUIPMENT 52DA TOTAL COST IN THOUSANDS OF DOLLARS PY FY 2008 FY 2009 FY
Recommended publications
  • A Comparison of Some Existing Radios with Implications for Public Safety Interoperability
    Chameleonic Radio Technical Memo No. 4 A Comparison of Some Existing Radios with Implications for Public Safety Interoperability S.W. Ellingson June 1, 2006 Bradley Dept. of Electrical & Computer Engineering Virginia Polytechnic Institute & State University Blacksburg, VA 24061 Contents 1 Introduction 1 2 Methodology 1 3 Findings 2 4 Concluding Remarks 3 A Summary of Radio Speci¯cations 5 B Brochures 7 ii 1 Introduction Presently, public safety communications infrastructure in the U.S. consists of a dis- parate collection of radio technologies operating over a wide range of frequencies and using a variety of incompatible protocols [1]. This situation impairs interoperability between public safety agencies, which is particularly apparent during periods of crisis. One possible approach to mitigating this di±culty is to employ mobile radios that are capable of operating over multiple frequency bands and protocols (modes), as opposed to being limited to one frequency range and one protocol [2]. However, this problem is not unique to the public safety community. A simi- lar problem has arisen in military radio communications, which has led to the de- velopment of military radios with multiband/multimode capabilities [3]. Also, for somewhat di®erent reasons, multiband/multimode mobile radios are prevalent in the amateur radio community. Therefore, there may be something to be learned by com- paring the characteristics of these existing multiband/multimode radios to existing public safety mobile radios. This report is a ¯rst attempt. 2 Methodology The summary of this brief, informal study is reported in the form of a table in Ap- pendix A. Ten radios were selected, including 6 from the public safety market, 3 from the military market, and 1 from the amateur radio market.
    [Show full text]
  • Secure Terminal Equipment)
    STE (Secure Terminal Equipment) GENERAL Secure Terminal Equipment (STE) is the next generation STU-III being designed to provide services far beyond the present STU-III devices. The STE offers backward compatibility with STU-III, while taking advantage of digital communications protocols like ISDN and future ATM. The initial release of STE will be an ISDN terminal. STE is designed to take advantage of the key and privilege management infrastructure developed under the Multi-level Information Systems Security Initiative (MISSI) Fortezza Plus Cards. The cryptographics for STE will be located on a removable Personal Computer Memory Card International Associate (PCMCIA) card. This card will be procured separately. SECURE TERMINAL EQUIPMENT (STE) TACTICAL This tactical terminal, manufactured by L-3 Communications, (a division of Lockheed Martin) currently provides secure digital communication for military operational environments. The design is based on an open modular architecture common with the L-3 STE-Office. STE-Tactical is compatible with the Portable Uninterruptable Power Supply System (PUP). The terminal offers backward compatibility with STU-III and DNVT and provides connectivity to ISDN, PSTN, TRI-TAC/MSE and RS-530A ( eg. MILSTAR) networks. Cryptography for the STE is provided by a removable PCMCIA ( Fortezza Plus) based card. The STE as it appeared in 1994. (Photo courtesy Lockheed Martin, now L-3 Communications) SPECIFICATIONS Security Features: Information Protected by PCMCIA Crypto Card . U.S.. Government FORTEZZA Plus, Top Secret to Protected . Secure Access Control System (SACS) - Access Control List (ACL) - Maximum and Minimum Security Levels . Alphanumeric Display for Identification and Authentication . Tempest Design Integrity . Telephone Security Group (TSG) Qualified .
    [Show full text]
  • Non-Proprietary FIPS 140-2 Security Policy: KMF/Wave/Traffic Cryptr
    Non-Proprietary FIPS 140-2 Security Policy: KMF/Wave/Traffic CryptR Document Version: 1.5 Date: January 9, 2020 Copyright Motorola Solutions, Inc. 2020 Version 1.5 Page 1 of 30 Motorola Solutions Public Material – May be reproduced only in its original entirety (without revision). Table of Contents KMF/Wave/Traffic CryptR ...................................................................................................... 1 1 Introduction .................................................................................................................... 4 1.1 Module Description and Cryptographic Boundary ......................................................................6 2 Modes of Operation ........................................................................................................ 8 2.1 Approved Mode Configuration ....................................................................................................8 3 Cryptographic Functionality ............................................................................................. 9 3.1 Critical Security Parameters ...................................................................................................... 11 3.2 Public Keys ................................................................................................................................. 15 4 Roles, Authentication and Services ................................................................................ 16 4.1 Assumption of Roles .................................................................................................................
    [Show full text]
  • Secure Communications Interoperability Protocols (SCIP)
    UNCLASSIFIED/UNLIMITED Secure Communications Interoperability Protocols (SCIP) John S. Collura NATO C3 Agency P.O. Box 174 2501 CD The Hague THE NETHERLANDS [email protected] ABSTRACT The concept of NATO Network Enabled Capabilities, (NNEC) including network-ready communications systems requires a fundamental shift in the paradigms and policies used by NATO and the NATO nations. Enabling these concepts down to the tactical mobile user community will be a challenge. Gone are the days where a single nation brings a combat-ready brigade to a NATO sponsored engagement. Modern brigade-level NATO deployed forces may consist of contributions from many nations. This can be highlighted by the fact that one nation might provide command and control capabilities, another logistics, a third special operations, etc. If communications equipments are purchased from multiple sources in multiple nations, and used in-theatre by the nations contributing to a multinational NATO Response Force formation, (brigade, battalion or corps) there are some inherent issues that require resolution to enable efficient network-ready interoperable communications systems. Adding to these issues are the requirements for secure communications and key management. Which nation or entity will provide the security authority in the deployed segment? Will it be the nation supplying command and control, security, logistics, or some other? Or will it be a NATO entity such as NATO HQ, JFHQ Lisbon, JFC Naples, JFC Brunsum, SHAPE, NAMSA, etc.? Who will be responsible for the in-theatre distribution of cryptographic keying material for the operation? When working with coalitions, how does one define communities of interest such that there is appropriate isolation of operations between different coalitions? Can capabilities be eliminated when a coalition member ceases to be friendly? Efficient net-ready interoperable communications systems are one of the core enabling capabilities for future effective NATO engagements.
    [Show full text]
  • KY-58 (Vinson)
    KY-58 (Vinson) The KY-57/58 is a member of the VINSON family. The VINSON family consists of wideband secure voice (WBSV) units developed by the National Security Agency to provide line of sight half-duplex voice and data encryption at 16 Kbps. The KY-57/58 provides security for AM/FM, VHF, UHF, half-duplex PTT combat net radios and tactical wireline systems when used with the HYX-57. Also used by non-tactical users for high-level communications in the local wideband telephone networks and wideband satellite terminals. The KY-57 is the manpack/vehicular model and the KY-58 is the airborne/shipborne version. The KY-57/58 is certified to pass data up to TOP SECRET and accepts key from the family of Common Fill Devices and also incorporates remote keying. KY-57/58 production was completed in 1993. No further production is planned. KY-58 photo by Tim Tyler Tim Tyler comments."The photo above depicts the KY-58 unit inside a USCG HH-65C 'Dolphin' helicopter taken in September 2008. It is currently configured just for use on their 225-400MHz aircraft band radio. Supposedly, they're in the process of upgrading the HH-65 helos into an MH-65 (Special Ops capable) configuration which will have APCO P-25 compliant radios (with AES crypto, for talking to other DHS agencies) as well as ANDVT / KY-100 type crypto for communicating with the military-side of USCG ops". The photo above depicts a KY-58 RCU installation in an A-10 attack aircraft.
    [Show full text]
  • A History of U.S. Communications Security (U)
    A HISTORY OF U.S. COMMUNICATIONS SECURITY (U) THE DAVID G. BOAK LECTURES VOLUME II NATIONAL SECURITY AGENCY FORT GEORGE G. MEADE, MARYLAND 20755 The information contained in this publication will not be disclosed to foreign nationals or their representatives without express approval of the DIRECTOR, NATIONAL SECURITY AGENCY. Approval shall refer specifically to this publication or to specific information contained herein. JULY 1981 CLASSIFIED BY NSA/CSSM 123-2 REVIEW ON 1 JULY 2001 NOT RELEASABLE TO FOREI6N NATIONALS SECRET HA~mLE YIA COMINT CIIA~HJELS O~JLY ORIGINAL (Reverse Blank) ---------- • UNCLASSIFIED • TABLE OF CONTENTS SUBJECT PAGE NO INTRODUCTION _______ - ____ - __ -- ___ -- __ -- ___ -- __ -- ___ -- __ -- __ --- __ - - _ _ _ _ _ _ _ _ _ _ _ _ iii • POSTSCRIPT ON SURPRISE _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ I OPSEC--------------------------------------------------------------------------- 3 ORGANIZATIONAL DYNAMICS ___ -------- --- ___ ---- _______________ ---- _ --- _ ----- _ 7 THREAT IN ASCENDANCY _________________________________ - ___ - - _ -- - _ _ _ _ _ _ _ _ _ _ _ _ 9 • LPI _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ I I SARK-SOME CAUTIONARY HISTORY __ --- _____________ ---- ________ --- ____ ----- _ _ 13 THE CRYPTO-IGNITION KEY __________ --- __ -- _________ - ---- ___ -- ___ - ____ - __ -- _ _ _ 15 • PCSM _ _ _ _ _ _ _ _ _ _ _ _ _ _
    [Show full text]
  • 11 =�O U��U = � � � 0 • -· T �� :» �� • Z:! T1 • (11 ;! -- FOREWORD
    � 0 0. 0. � :» .-4 = � (11 =�o u��u = � � � 0 • -· t �� :» �� • z:! t1 • (11 ;! -- FOREWORD This manual is designed to provide the user with easy reference and quick response to Fleet problems by detailing information on Fleet support services and technical assistance capabilities available from SPAWAR. The initial points of contact for SPAWAR supported equipment problems on the waterfront and for shipyard related issues are the Fleet Liaison Officers. Points of contact are provided for all areas discussed. The Fleet Liaison Program interface is to provide "on call" support necessary to assist users in meeting tqeir operational requirements. A. EDWARDS Deputy /Assistant Commander Technical Management i L .. TABLE OF CONTENTS SPAWAR DIRECT FLEET SUPPORT Fleet Liaison Program .................... ........ ..I CSRR (Combat Systems Readiness Review) ...... ...... 3 CSRT (Combat Systems Readiness Test) ...............4 5 CSDE (Combat Systems Demonstration Evaluation) .... Field Change Program (FCIP) .................. ....6 SSEOC (Surface Ship Engineered Operating Cycle) .... 7 SPAW4R ACTIVITIES AND NEEACTS (Addresses, Commanding Officers, Officers in Charge, and Fleet Liaison Officers) NAVELEXSYSENGACT St. Inigoes ....... ..... .... .... ...9 NAVELEXSYSENGACT DET Philadelphia ..... .... ...... .. 9 NAVELEXCEN Charleston .............................. 9 NAVELEXCEN Portsmouth .... ....... .... ..... .....10 NAVELEXCEN San Diego....... .......................10 NAVELEXCEN Vallejo...... ..........................11 NAVELEXCEN DET Mayport . ............
    [Show full text]
  • Unclassified Unclassified
    UNCLASSIFIED Exhibit P-40, Budget Line Item Justification: PB 2019 Air Force Date: February 2018 Appropriation / Budget Activity / Budget Sub Activity: P-1 Line Item Number / Title: 3080F: Other Procurement, Air Force / BA 03: Electronics and Telecommunications 831010 / Comsec Equipment Equip / BSA 1: Comm Security Equipment(Comsec) ID Code (A=Service Ready, B=Not Service Ready): A Program Elements for Code B Items: 0207448F Other Related Program Elements: N/A Line Item MDAP/MAIS Code: N/A Prior FY 2019 FY 2019 FY 2019 To Resource Summary Years FY 2017 FY 2018 Base OCO Total FY 2020 FY 2021 FY 2022 FY 2023 Complete Total Procurement Quantity (Units in Each) - - - - - - - - - - - - Gross/Weapon System Cost ($ in Millions) - 81.738 115.000 114.372 0.000 114.372 97.661 93.321 115.248 117.299 - 734.639 Less PY Advance Procurement ($ in Millions) - - - - - - - - - - - - Net Procurement (P-1) ($ in Millions) - 81.738 115.000 114.372 0.000 114.372 97.661 93.321 115.248 117.299 - 734.639 Plus CY Advance Procurement ($ in Millions) - - - - - - - - - - - - Total Obligation Authority ($ in Millions) - 81.738 115.000 114.372 0.000 114.372 97.661 93.321 115.248 117.299 - 734.639 (The following Resource Summary rows are for informational purposes only. The corresponding budget requests are documented elsewhere.) Initial Spares ($ in Millions) - - - - - - - - - - - - Flyaway Unit Cost ($ in Millions) - - - - - - - - - - - - Gross/Weapon System Unit Cost ($ in Millions) - - - - - - - - - - - - Description: PE 0208064F AIR FORCE Operational HQ-Cyber/Cyberspace Command and Control Mission System (C3MS) Provides the AFCYBER Commander with the tools necessary to effectively and efficiently plan, monitor, and execute missions in the cyber domain.
    [Show full text]
  • Secure Voip Call on Android Platform
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Global Journal of Computer Science and Technology (GJCST) Global Journal of Computer Science and Technology Network, Web & Security Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172 & Print ISSN: 0975-4350 Secure Voip Call on Android Platform By Saruchi Kukkar Lovely Professional University Abstract - In the Secure voice call, the human voice shall be digitized by the Android APIs and the VOIP packets will travel over the SIP layer. The digitization process also includes the encryption phase wherein secure call technique is used in order to generate unique keys every time a call handshake is done. During the Secure Call key exchange, the caller party sends a Secure Call hello packet. Once that packet is positively acknowledged by the recipient party the handshake happens successfully and the call packets get encrypted. Using Secure call, digitized voice data is transformed into cipher text form on third generation GSM data or GPRS servers in android platform which results in a better encrypted voice speed and clarity. GJCST-E Classification: C.2.m Secure Voip Call on Android Platform Strictly as per the compliance and regulations of: © 2012 Saruchi Kukkar. This is a research/review paper, distributed under the terms of the Creative Commons Attribution- Noncommercial 3.0 Unported License http://creativecommons.org/licenses/by-nc/3.0/), permitting all non-commercial use, distribution, and reproduction inany medium, provided the original work is properly cited.
    [Show full text]
  • CSD 3324 SE Secure Telephone, Fax & Data Encryptor
    CSD 3324 SE Secure Telephone, Fax & Data Encryptor Providing integrated voice, fax and data secure communications for mission-critical government applications The CSD 3324 SE is an executive telephone with integrated secure voice, fax and data communications capabilities. The CSD 3324 SE is designed to provide strategic-level security with exceptional voice quality for government office applications. It also interoperates with TCC’s DSP 9000 radio base military encryptor to connect commanders with field forces. Secure Voice Encryption The CSD 3324 SE uses powerful, 128-bit Benefits encryption driving dual, full duplex Teltect-SE data encryption engines. The Strategic-level security DSP-based 9,600 bps vocoder provides Excellent recovered voice excellent voice quality with fallback quality (dual vocoder design) modes to 4,800 bps digital and DSP 9000 analog mode for secure voice Interoperates with DSP 9000 communications over severely degraded radio base military encryptor phone lines and radio channels. Operates over degraded telephone line conditions with Group 3 Fax Encryption auto-fallback Two-wire (RJ-11) Group 3 fax encryption is provided as a standard feature with Easily connects to any Group 3 auto-answer/auto-fax sense, which allows Operational Features fax machine Controlled access — User access to all incoming calls to be screened by the 128-bit encryption (Teltect-SE) telephone. If the call is not a fax call, the secure fax, data and voice communica- telephone rings, giving a user a second tions modes is restricted using user Secret Local Key based — chance to answer incoming voice calls. passwords. 800 keys User-friendly settings allow any incoming User customizable Teltect-SE Menu-based setup — User-friendly menus and outgoing fax call (plain or secure) to crypto algorithm be accepted.
    [Show full text]
  • The First Devices to Secure Transmission of Voice Were Developed Just After World War I
    F, 5 January Cabinet War Rooms SIGSALY The first devices to secure transmission of voice were developed just after World War I. They were substitution devices; they inverted frequencies. High frequencies were substituted for low frequencies and low frequencies were substituted for high frequencies. This was easy to do electronically. But, it was also easy to break. In fact, because much voice is in the middle frequencies and the middle frequencies are not changed much by inversion, it was sometimes possible to get a sense of the message just from the ciphertext. The A-3 scrambler … was based upon 1920s concepts. It divided the voice-frequency band into five subbands, inverted each of them, and then shifted the voice from one subband to another every 20 seconds. David Kahn Cryptology and the origin of spread spectrum In 1941, the United States was not at war although we were supporting the Allies, especially Britain, materially. The United States had a device to secure voice transmission called the A-3 Scrambler. This device used both substitution and transposition to encipher voice. Messages were chopped into small pieces, in each piece substitution was made by inverting frequencies, and the pieces were scrambled. This device was broken by the Germans during Fall 1941. The United States military was aware that the A-3 was not secure. On December 7, 1941, cryptanalysts in Washington, D.C., were in the process of breaking a long ciphertext from Tokyo to the Japanese embassy in Washington, D.C. William Friedman’s SIS team had earlier broken the Japanese diplomatic ciphers, but the naval ciphers had not yet been broken.
    [Show full text]
  • AN/PRC-117F(C) Multiband Multimission Radio Applications
    assuredcommunications ® AN/PRC-117F(C) MULTIBAND MULTIMISSION RADIO APPLICATIONS HANDBOOK ® 1 AN/PRC-117F(C) Multiband Radio Introduction For missions requiring reliable, interoperable communications, Harris has developed the FALCON® II AN/PRC-117F(C), the most advanced multiband, multimode manpack radio in the world… period. The AN/PRC-117F(C) integrates the capabilities of several distinct radios into one: VHF-LO FM for combat net radio, VHF-HI AM for public safety and ground-to-air, UHF-AM for military ground-to-air and UHF TACSAT communications. This radio also utilizes the latest technology to embed many advanced features, such as SINCGARS, HAVEQUICK, and DAMA, as well as Type-I encryption. With integrated crypto functions, including black-key management and Crypto Ignition Key (CIK), the AN/PRC-117F(C) is a complete communications package allowing interoperability with all military services in secure and non-secure communications. And being a software-defined radio helps make the FALCON II radios future-proof. As new technology and waveforms are developed, you can upgrade your FALCON II systems to be compatible with future radios such as the Joint Tactical Radio System (JTRS) radios…and they will remain compatible with your radios currently in the field. The AN/PRC-117F(C) manpack can be packaged for vehicular, transit case, or base station applications, and we offer a number of accessories and antennas to complete your system. This Applications Handbook defines the AN/PRC-117F(C) radios and their components, and also helps with your selection of antennas and accessories. 2 17 AN/PRC-117F(C) Multiband Radio AN/PRC-117F(C) ■ External PLGR and NMEA-183 GPS device interface ■ Field software upgradeable ■ Over-the-air HPW, SINCGARS, & HQ Time of day (TOD) ■ SATCOM downlink monitor ■ Replaceable Hold Up Battery (HUB) with voltage level reading and low battery warning Feature/Mode Descriptions The AN/PRC117F(C) is an advanced multiband, multimission, manpack radio which provides reliable tactical communica- SINCGARS tions.
    [Show full text]