Communications Security (COMSEC) develops, tests, procures, fields and sustains COMSEC solutions to secure the Army’s network (Tactical up through Enterprise).
Under the umbrella of the National Security Agency (NSA), the Army provides all users from Enterprise down to tactical units with secure organic key management (ordering, generation, distribution, destruction). The Army Key Management Infrastructure (AKMI) consists of three subcomponents: Management Client (MGC), Automated Communications Engineering Software (ACES) and Next Generation Load Device (NGLD). AKMI provides a system for distribution of COMSEC, electronic protection, mission initialization data, and Signal Operating Instructions (SOI) information from the planning level to the point of use in support of current, interim, and objective force structure. AKMI introduces capabilities and processes to transform operations from manual to secure automated distribution of keys and firmware directly to end devices. New and emerging architectures, cease key dates, and DoD/ Army policy are driving the need to replace legacy devices with technically advanced (network centric GIG compliant) modern devices that incorporate Chairman of the Joint Chiefs and Joints Requirements Oversight Council directed cryptographic standardization, Key Management Infrastructure (KMI) and network centric performance capabilities. This enables the Army to equip the force with critical cryptographic solutions and services during peacetime, wartime, and contingency operations.
- Cryptographic Mission Planner - Provides Crypto network planning; generates SOI data; creates COMSEC key tags; supports emerging requirements.
- Tier 3 Load devices - Small, ruggedized design that allows loading of Cryptographic keys and mission data into SHIELD devices, radios, End Cryptographic Units, interfaces between key generation MGC, and Mission Planners.
- Secure High Assurance Inline Encryption Link Device (SHIELD) - SHIELD encryption systems secure the Army’s data and voice communication networks. SHIELD encryption devices include inline network and inline media, link and trunk, secure voice, and Commercial Solutions for Classified solutions.
- Embedded Cryptographic Modernization Initiative (ECMI) - Retrofit of existing systems with embedded cryptographic capability to ensure they will be able to accept and utilize modern keying material.
Last Updated: October 18, 2017