Defense

August 12, 2013

New devices keep Army communications safe

A soldier tries out a Simple Key Loader, or SKL, fielded by Project Director Communications Security, known as PD COMSEC, at Aberdeen Proving Ground, Md. PD COMSEC is in the process of replacing the SKL with a Next Generation Load Device, which will be nearly half the size and have more capabilities and features.

 

Project Director, Communications Security is moving closer to fielding a new handheld device which will be used to deliver electronic keys to secure the Army’s phone, radio, computer and satellite networks.

The Next Generation Load Device-Small, or NGLD-Small, comes with a new digital display on the front and is smaller than previous devices used for encryption, but still gives the same security protection as larger devices. It replaces older models that were no longer able to handle the Army’s encryption key delivery requirements.

“The NGLD are a family of devices, with a small, medium and large version,” said Aaron Clayton, the Tier 3 Fill Devices project leader at Project Director, Communications Security, or PD COMSEC, which is assigned to the Army Program Executive Office for Command, Control, Communications-Tactical, or PEO C3T. “Those don’t relate to their physical size but their capabilities. The NGLD-Small in particular is targeted to replace a legacy device that Soldiers currently use. The legacy device doesn’t have the security features that we would like to see today like the NGLD-Small can provide.”

The NGLD devices are used to receive, store, manage and export electronic keys that are used for cryptography. The keys are loaded into communications devices such as radios and satellite terminals to secure networks.

When building or procuring a new device such as an NGLD-Small, PD COMSEC must account for many factors because of the secure information involved.

“These devices are certified by the National Security Agency (NSA) to be able to handle and store electronic keys classified up to the Top Secret level,” Clayton said. “We work very closely with the NSA to make sure what we’re doing is in sync with their security requirements.”

PD COMSEC also has to ensure the devices can stand up to the wear and tear put on them by Soldiers during a deployment. To ensure that the devices can meet the vigorous environmental requirements, the PD COMSEC team took several samples of potential NGLD-Small devices to the Network Integration Evaluation, or NIE, at Fort Bliss, Texas, and White Sands Missile Range, N.M., where troops conduct realistic mission threads in order to evaluate communications equipment in an operational environment.

“We took approximately 10 of each device with us and they all came back with the paint worn off and all scratched up, but they still worked,” Clayton said.

At first, soldiers appeared reluctant to use the new device over the larger, yet more familiar, Simple Key Loader, or SKL, they had used previously. Those devices were able to provide the security required, but were larger, and at times more cumbersome than the NGLD-Small.

“We had trainers come in with the different devices and teach the Soldiers how to use them,” said Stan Scofield, PD COMSEC special projects officer for the PEO C3T Technical Management Division. “It didn’t take very long to get them up and running on the new devices. Once they learned how to use them and got to see some of the upgrades, they didn’t want to give them back.”

While the soldiers were happy with the new devices, there is still potential for improvement that PD COMSEC will recommend to manufacturers. These improvements will ensure that soldiers have every advantage possible while securing military networks in hostile environments.

“We got a lot of feedback and found some shortcomings in the new devices,” Clayton said. “We’re making suggestions for enhancements to the device so they will meet Army requirements. We want to make sure they can completely load, interface and configure the new Army software defined radios.”

Clayton said he believed the new devices should be field ready by the end of the year.

 




All of this week's top headlines to your email every Friday.


 
 

 
Air Force photograph by MSgt. J. Scott Wilcox

Aerial target QF-16 takes to the sky

Air Force photograph by MSgt. J. Scott Wilcox The first unmanned QF-16 Viper struck down over the Gulf of Mexico Sept. 5, 2014, was part of a joint effort between the Test and Training Division at Eglin Air Force Base, Fla., an...
 
 
Air Force photograph by SSgt. Annie Edwards, Utah Air National Guard

DRAGON ‘fires up’ for flight

Air Force photograph by SSgt. Annie Edwards, Utah Air National Guard A NATO E-3A AWACS aircraft approaches a Utah Air National Guard KC-135R Stratotanker for air refueling during a training exercise over Germany in May 2014. Th...
 
 
Air Force photograph by Ethan Wagner

C-17 treads into new territory

Air Force photograph by Ethan Wagner A C-17 Globemaster III performs a wet-runway performance test Aug. 20, 2014, on the flightline at Edwards Air Force Base, Calif. Since Dunlop Tire was selected as the replacement tire for th...
 

 
Air Force photograph by SrA. Damon Kasberg

C-17 crew gets Army Strykers into the ‘fight’

Air Force photograph by SrA. Damon Kasberg An Army Stryker assigned to the 2nd Cavalry Regiment, off loads from a C-17 Globemaster III in support of Steadfast Javelin II on Ramstein Air Base, Germany, Sept. 4, 2014. Steadfast J...
 
 
Navy photograph

Navy integrates common software into next-generation unmanned carrier-based system

Navy photograph Navy flight test pilot demonstrates functionality of new software for the future Unmanned Carrier-Launched Airborne Surveillance and Strike system at the program’s Naval Air Station Patuxent River, Md. lab...
 
 
Air Force photograph by TSgt. Christopher Marasky

Investing in the Army’s future

Army photograph An M142 High Mobility Artillery Rocket System, or HIMARS, fires a missile downrange. The U.S. Army vision for lethality science and technology investment is to enable overmatch in weapon systems for both offensi...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>