Communications security explained

Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended recipients.

In the North Atlantic Treaty Organization culture, including United States Department of Defense culture, it is often referred to by the abbreviation COMSEC. The field includes cryptographic security, transmission security, emissions security and physical security of COMSEC equipment and associated keying material.

COMSEC is used to protect both classified and unclassified traffic on military communications networks, including voice, video, and data. It is used for both analog and digital applications, and both wired and wireless links.

Voice over secure internet protocol VOSIP has become the de facto standard for securing voice communication, replacing the need for Secure Terminal Equipment (STE) in much of NATO, including the U.S.A. USCENTCOM moved entirely to VOSIP in 2008.[1]

Specialties

Related terms

Types of COMSEC equipment:

DoD Electronic Key Management System

The Electronic Key Management System (EKMS) is a United States Department of Defense (DoD) key management, COMSEC material distribution, and logistics support system. The National Security Agency (NSA) established the EKMS program to supply electronic key to COMSEC devices in securely and timely manner, and to provide COMSEC managers with an automated system capable of ordering, generation, production, distribution, storage, security accounting, and access control.

The Army's platform in the four-tiered EKMS, AKMS, automates frequency management and COMSEC management operations. It eliminates paper keying material, hardcopy Signal operating instructions (SOI) and saves the time and resources required for courier distribution. It has 4 components:

Key Management Infrastructure (KMI) Program

KMI is intended to replace the legacy Electronic Key Management System to provide a means for securely ordering, generating, producing, distributing, managing, and auditing cryptographic products (e.g., asymmetric keys, symmetric keys, manual cryptographic systems, and cryptographic applications).[4] This system is currently being fielded by Major Commands and variants will be required for non-DoD Agencies with a COMSEC Mission.[5]

See also

References

  1. USCENTCOM PL 117-02-1.
  2. Web site: AIR FORCE AIR INTELLIGENCE, SURVEILLANCE AND RECONNAISSANCE AGENCY INSTRUCTION 33-203 . May 25, 2011 . The Air Force ISR Agency Tempest and Emission Security Program . . https://web.archive.org/web/20131020063028/http://static.e-publishing.af.mil/production/1/afisra/publication/afisrai33-203/afisrai33-203.pdf . October 20, 2013 . dead . October 3, 2015 .
  3. INFOSEC-99
  4. Web site: FY20 DOD PROGRAMS – Key Management Infrastructure (KMI) . 2023-08-21.
  5. Web site: Archived copy . 2016-09-16 . 2016-09-17 . https://web.archive.org/web/20160917081345/http://www.dote.osd.mil/pub/reports/FY2013/pdf/dod/2013kmi.pdf . dead .

External links