Home » Cyber » Comms » GD’s Newest Defense Against Cyber Attack

GD’s Newest Defense Against Cyber Attack

by Matt Cox on February 1, 2013

General Dynamics C4 Systems has a new encryptor device to help military or government personnel protect their data from cyber attack.

The new TACLANE-1G (KG-175G) encryptor is now certified by the National Security Agency to secure classified information at the Top Secret level and below. The high-speed encryptor secures large data and image files 40 times faster than information moving through a commercial 4G network and weighs just eight pounds, GDC4S announced in a recent press release.

The TACLANE-1G is rugged enough to be used in vehicles, remote command posts, data centers or wherever government and military personnel travel or work, GD officials maintain.

“Supporting NSA’s cyber defense strategy, the TACLANE-1G helps keep classified networks operating securely and at top speed,” said Mike Guzelian, vice president of Secure Voice and Data Products for General Dynamics C4 Systems, in the release. “Lightweight and power efficient, the TACLANE-1G also delivers unprecedented network security and efficiency when it comes to moving large classified files in vehicles or office environments.”

With advanced encryption technology, the TACLANE-1G is capable of alerting network personnel when potentially threatening software code, deep within a message “packet,” is detected.  It also has enhanced routing capabilities to ensure that classified information reaches its destination, even if part of the network is inoperable or unavailable.

The TACLANE-1G can also be controlled and remotely managed by the GEM X™ encryptor manager for greater cyber defense and agility when network operations or conditions change. It is available to U.S. government agencies, the Department of Defense and qualified allied nations.

Share |

{ 20 comments… read them below or add one }

U.SA February 1, 2013 at 6:14 pm

yes finaly some good news about cyber warfare. maby we can lower the amount of data stolen by the chines

Reply

Spelling Nazi February 1, 2013 at 10:42 pm

Ouch, my brain. *USA or *U.S.A, *Yes, *finally, *Maybe, *Chinese

Reply

tmb2 February 4, 2013 at 11:09 am

As far as cybe security, there wasn't anything wrong with the previous model. The Chinese don't steal data directly from Army classified computers. They've been getting it from the contractors' corporate networks.

Reply

We Play God February 1, 2013 at 8:45 pm

Just a question, this isnt the actual machine thats used right? i mean that would be kinda stupid to tell them what machine they actually use, or…..

Reply

EW3 February 1, 2013 at 11:01 pm

Just looking at a machine doesn't tell anyone anything of value.

The magic sauce is the hardware and the firmware running on it plus knowledge of the codes that key the encryption.

Reply

We Play God February 2, 2013 at 9:41 pm

Yeah but they give the name of the company and a starting point with which to start their hacking or espionage…. it cant be the actual name of the company/computer/people involved…..right? lol

Reply

Rob February 1, 2013 at 9:15 pm

Encryption still has it’s limits and if one of these units gets to any country friendly with China, they can get access easily. This includes some in NATO.

For real time battle scenarios, to prevent your enemy from getting live intel you just need to flood the signal with loads of misinformation and have these type of units programmed to only extract the true data from it.

I understand in today’s battlefields we cannot use shortwave radio to broadcast our mission details but it’s obvious that the Taliban cannot even disable a drone or take over any of our bases anyways.

I’ve never been a soldier but believe they would just 100% want a system that works and has least possibility of failure after enduring damage to the unit.

Otherwise the costs of units like this mean nothing if China/Iran/Russia can tap the signals.

Reply

EW3 February 1, 2013 at 11:34 pm

Rob, When the NORKs grabbed the Pueblo they had also got a lot of sophisticated crypto gear. To make it useless the USN only had to reissue the code settings.
This made the job of untangling the encrypted messages beyond the computer technology of the day. Ultimately the USN replaced some key hardware pieces (PCB boards) to further complicate things for the bad guys.
Despite the growth of supercomputers to crack encrypted messages the hardware we have now makes breaking encryption even more difficult. Instead of discrete circuits designed to work in a finite number of ways we have microprocessors that change their behaviors over time giving them almost an infinite number of combinations.
In addition, back in the day, the way to destroy circuit boards was to pull them out and hit them with a hammer, then if possible through them overboard. With the
circuitry available today it would be a simple task to have a destructive voltage smoke components on the board (like the micro) making it useless. Even without a destructive voltage, you can clear flash memory with a few instructions from the micro. If we don't get the right code every so often, the micro goes into "self destruct" mode. Just erasing it's memory makes it useless to anyone.

Reply

anonymous February 2, 2013 at 12:59 pm

Bravo Zulu. Listen to an EW.

Reply

EW3 February 2, 2013 at 2:54 pm

Probably should be CTT3 now ;)

Reply

tiger February 1, 2013 at 9:38 pm

So…….. When can I pick one up at RADIO SHACK?

Reply

jay February 1, 2013 at 11:20 pm

The Chinese may be the #1 hacker of US secrets but Russia and Israel are close behind.

Reply

tmb2 February 2, 2013 at 11:23 am

Hopefully this one won't overheat like its predecessor did. Unless you had the KG-175D in an air conditioned room or put a fan in front of it, it would burn up and shut down. Remote management and intrusion detection will be a nice features though.

Reply

aaron.michael February 2, 2013 at 1:49 pm

is this the new scrambler for defeating Chinese people and Korean people? Thank you for defending country!!

Reply

Barry February 2, 2013 at 1:54 pm

Great. Only one problem: it's Made in China.

Reply

oblat February 3, 2013 at 6:43 am

Wow hello 1985 technology. LOL

Reply

SJE February 4, 2013 at 9:09 pm

It is particularly useful when used in a swinging motion upside the head against Pentagon employees who take work home on thumb drives and think that there is no problem trolling through the internet while at work

Reply

s_N February 5, 2013 at 4:14 am

A piece of hardware that accounts for and defends, real-time, against user error / lack-of-training would be impressive.

Reply

Vaporhead February 7, 2013 at 7:17 am

Maybe we are just using this system as "bait". Send out news stories about it and see who tries to steal its information. Throw the other guy off type of thing.

Reply

Navbm7 February 8, 2013 at 6:14 pm

So are the components made in the US or China? If the chips are made in China then this is an expensive exercise in frustration.

Reply

Leave a Comment

Previous post:

Next post: