COMSEC equipment

COMSEC equipment

COMSEC equipment is equipment designed to provide security to telecommunications (COMSEC) using cryptography.

ee also

COMSEC Equipment designated as telecommunications security (TSEC), Joint Electronic Type Designation System, and controlled cryptographic item (CCI). They provide security to telecommunications by scrambling information, unintellegible to an unauthorized interceptor, later, converting it to its original form for authorized recipients. The equipment designed to aid in scrambling format. Note: COMSEC equipment includes crypto-equipment, crypto-support equipment, cryptoproduction equipment, and authentication equipment.

* NSA encryption systems

STU-III (Type 1)
Motorola STU-III / SECTEL 1500(July 01, 2007)
AT&T STU-III(March 10, 2006)
STU-III (Type 2)
Type 2 STU-III.(March 10, 2006)
STU-III (Type 3)
Type 3 STU-III.(March 10, 2006)
Motorola STU-III / SECTEL MMT/DNVT Adapter(July 01, 2007)

STE (the new generation).(July 01, 2007)

External links

* [ Cryptography machines]

Wikimedia Foundation. 2010.

Look at other dictionaries:

  • COMSEC — Definition The compound word COMSEC is prevalent in the DoD culture with hundreds of secondary and tertiary words. Historically, it is originated from COMmunications SECurity Communications security; however, in the 21st century, the compound… …   Wikipedia

  • Communications security — Not to be confused with Commonwealth Securities. Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended… …   Wikipedia

  • Controlled Cryptographic Item — A Controlled Cryptographic Item (CCI) is a U.S. National Security Agency term for secure telecommunications or information handling equipment, associated cryptographic component or other hardware item which performs a critical COMSEC… …   Wikipedia

  • TEMPEST — is a codename referring to investigations and studies of compromising emanations (CE). Compromising emanations are defined as unintentional intelligence bearing signals which, if intercepted and analyzed, may disclose the information transmitted …   Wikipedia

  • AN/CYZ-10 — The AN/CYZ 10 Data Transfer Device, often called a Filler, Crazy 10, ANCD or DTD, is a United States National Security Agency developed, portable, hand held fill device, for securely receiving, storing, and transferring data between compatible… …   Wikipedia

  • Small extension node — Prior to the advent of the satellite based Joint Network Node (JNN), the Unites States Army used a system known as Mobile Subscriber Equipment (MSE) in order to provide tactical battlefield communications. MSE is a Line Of Site (LOS) terrestrial… …   Wikipedia

  • ANDVT — The Advanced Narrowband Secure Voice Terminal (ANDVT) has been the workhorse secure voice terminal for low bandwidth secure voice communications throughout U.S. Department of Defene. [ accomp andvt.pdf] Devices in… …   Wikipedia

  • Van-Eck-Phreaking — ist eine Technik zur elektronischen Spionage, bei der unbeabsichtigte elektromagnetische Abstrahlungen empfangen werden. Sie gehört somit zur Gruppe der Seitenkanalattacken. Inhaltsverzeichnis 1 Funktionsweise 2 Geschichtliches 3… …   Deutsch Wikipedia

  • Signals intelligence — SIGINT redirects here. For the UNIX signal, see SIGINT (POSIX). RAF Menwith Hill, a large site in the United Kingdom, part of ECHELON and the UK USA Security Agreement. Signals intelligence (often contracted to SIGINT) is intelligence gathering… …   Wikipedia

  • Signals intelligence by alliances, nations and industries — This article is a subset article under the main article SIGINT, which addresses the unifying conceptual and technical factors in this intelligence discipline. This article describes how the discipline is used by multinational alliances and… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”