This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages) The examples and perspective in this article deal primarily with the United States and do not represent a worldwide view of the subject. You may improve this article, discuss the issue on the talk page, or create a new article, as appropriate. (March 2014) (Learn how and when to remove this template message) This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: "Communications security" – news · newspapers · books · scholar · JSTOR (May 2023) (Learn how and when to remove this template message) (Learn how and when to remove this template message)
PRC-77 VHF radio with digital voice encryption device

Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications[1] in an intelligible form, while still delivering content to the intended recipients.

In the North Atlantic Treaty Organization culture, including United States Department of Defense culture, it is often referred to by the abbreviation COMSEC. The field includes cryptographic security, transmission security, emissions security and physical security of COMSEC equipment and associated keying material.

COMSEC is used to protect both classified and unclassified traffic on military communications networks, including voice, video, and data. It is used for both analog and digital applications, and both wired and wireless links.

Voice over secure internet protocol VOSIP has become the de facto standard for securing voice communication, replacing the need for Secure Terminal Equipment (STE) in much of NATO, including the U.S.A. USCENTCOM moved entirely to VOSIP in 2008.[2]

Specialties

Related terms

Types of COMSEC equipment:

DoD Electronic Key Management System

The Electronic Key Management System (EKMS) is a United States Department of Defense (DoD) key management, COMSEC material distribution, and logistics support system. The National Security Agency (NSA) established the EKMS program to supply electronic key to COMSEC devices in securely and timely manner, and to provide COMSEC managers with an automated system capable of ordering, generation, production, distribution, storage, security accounting, and access control.

The Army's platform in the four-tiered EKMS, AKMS, automates frequency management and COMSEC management operations. It eliminates paper keying material, hardcopy Signal operating instructions (SOI) and saves the time and resources required for courier distribution. It has 4 components:

Key Management Infrastructure (KMI) Program

KMI is intended to replace the legacy Electronic Key Management System to provide a means for securely ordering, generating, producing, distributing, managing, and auditing cryptographic products (e.g., asymmetric keys, symmetric keys, manual cryptographic systems, and cryptographic applications).[4] This system is currently being fielded by Major Commands and variants will be required for non-DoD Agencies with a COMSEC Mission.[5]

See also

References

  1. ^ a b "AIR FORCE AIR INTELLIGENCE, SURVEILLANCE AND RECONNAISSANCE AGENCY INSTRUCTION 33-203" (PDF). The Air Force ISR Agency Tempest and Emission Security Program. Air Force Intelligence, Surveillance and Reconnaissance Agency. May 25, 2011. Archived from the original (PDF) on October 20, 2013. Retrieved October 3, 2015.
  2. ^ USCENTCOM PL 117-02-1.
  3. ^ INFOSEC-99
  4. ^ "FY20 DOD PROGRAMS – Key Management Infrastructure (KMI)" (PDF). Retrieved 2023-08-21.
  5. ^ "Archived copy" (PDF). Archived from the original (PDF) on 2016-09-17. Retrieved 2016-09-16.((cite web)): CS1 maint: archived copy as title (link)
This article includes a list of general references, but it lacks sufficient corresponding inline citations. Please help to improve this article by introducing more precise citations. (July 2010) (Learn how and when to remove this template message)