GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Transmission Security (TRANSEC)

We at iDirect recognize the critical need to protect the flow of communications to wherever the military and government agencies may operate. Wherever this may be, threat actors readily stand by to monitor, exploit or intercept communications for malicious intent. To mitigate this threat, we have been providing Transmission Security (TRANSEC) capabilities since the initial release of the Evolution software. With the release of 4.2, we have further enhanced our TRANSEC capabilities by extending protection to cover both one-way and two-way networks.

In combatant situations, where even a small “spike” in traffic can be a critical piece of intelligence, the need to mask any communications activity becomes apparent. The National Security Agency (NSA) has outlined the following vulnerabilities inherent in an IP-based TDMA transmission that must be addressed in order to provide true TRANSEC: Channel Activity – The ability to secure transmission energy to conceal traffic volumes. Control Channel Information – Disguise traffic volumes to secure traffic source and destination. Hub and Remote Unit Validation – Ensure remote terminals connected to the network are authorized users.

  • Author(s):
  • iDirect
  • Share this:
  • Share on Facebook
  • Share on Twitter
  • Share via Email
  • Share on LinkedIn
Transmission Security (TRANSEC)
Format:
  • White Paper
Topics:
Website:Visit Publisher Website
Publisher:iDirect Government
Published:February 1, 2019
License:Copyrighted
Copyright:© 2019 ST Engineering iDirect Inc. dba iDirect | All rights reserved.

Featured Content

Contact Publisher

Claim Content