Communications security

"COMSEC" redirects here. For the Australian stockbroking firm, see Commonwealth Securities.

Communications Security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended recipients. In the United States Department of Defense culture, it is often referred to by the abbreviation COMSEC. The field includes Cryptographic Security, Transmission Security, Emissions Security and Physical Security of COMSEC equipment and associated Keying Material.

COMSEC is used to protect both classified and unclassified traffic on military communications networks, including voice, video, and data. It is used for both analog and digital applications, and both wired and wireless links.

Voice over secure internet protocol VOSIP has become the de facto standard for securing voice communication, replacing the need for Secure Terminal Equipment (STE) in much of the U.S. Department of Defense. USCENTCOM moved entirely to VOSIP in 2008.[1]

Specialties

Related terms

Types of COMSEC equipment:

DoD Electronic Key Management System

The EKMS is DoD key management, COMSEC material distribution, and logistics support system. The NSA established the EKMS program to supply electronic key to COMSEC devices in securely and timely manner, and to provide COMSEC managers with an automated system capable of ordering, generation, production, distribution, storage, security accounting, and access control.

The Army's platform in the four-tiered EKMS, AKMS, automates frequency management and COMSEC management operations. It eliminates paper keying material, hardcopy SOI, and associated time and resource-intensive courier distribution. It has 4 components:

Key Management Infrastructure (KMI) Program

KMI is intended to replace the legacy Electronic Key Management System (EKMS) to provide a means for securely ordering, generating, producing, distributing, managing, and auditing cryptographic products (e.g., asymmetric keys, symmetric keys, manual cryptographic systems, and cryptographic applications). This system is currently being fielded by Major Commands and variants will be required for non-DoD Agencies with a COMSEC Mission. [4]

See also

References

  1. USCENTCOM PL 117-02-1.
  2. "AIR FORCE AIR INTELLIGENCE, SURVEILLANCE AND RECONNAISSANCE AGENCY INSTRUCTION 33-203" (PDF). The Air Force ISR Agency Tempest and Emission Security Program. Air Force Intelligence, Surveillance and Reconnaissance Agency. May 25, 2011. Archived (PDF) from the original on October 20, 2013.
  3. INFOSEC-99
  4. http://www.dote.osd.mil/pub/reports/FY2013/pdf/dod/2013kmi.pdf
This article is issued from Wikipedia - version of the 11/9/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.