(C) Daily Kos
This story was originally published by Daily Kos and is unaltered.
. . . . . . . . . .
The heads of the U.S. Security Agencies chose to expose our secrets. Intentional or ignorance? [1]
['This Content Is Not Subject To Review Daily Kos Staff Prior To Publication.']
Date: 2025-03-25
Secure communication systems have been available for years. For some reason our leaders chose to utilize a methodology that provides little protection and opens information to be easily gathered by one and all. I wonder if their advisers have any basic understanding of how communications systems work. Apparently, they used Signal because they heard the word “encrypted” and assumed that everything was completely secure.
Signal or any other encryption ap merely encrypts the text of the data in a message or document. The text remains unencrypted on the originator or recipient’s device. If the devices are not in an electronically protected area, information can be easily gathered by those that intend to do so. The switching location devices are also not electronically protected so the sender and receiver addresses can be ascertained there or from the originating and receiving devices. This provides a clue as to which messages to read.
During the many discussion sessions and analysis from experts and other listeners heard many unexplained terms mentioned. It might be helpful to provide a basic understanding of the need for security systems and what must be protected.
During the early and mid-1980s I served as a Telecommunication Consultant for the Air Force Communications Battalion assigned to support the Air Force Space Systems Division. The mission was to provide communications advice and assistance in the implementation of new systems or the required integration with the developing Internet aka: ARPAnet, Defense Data Network, Milnet, etc.). The primary reason for developing the Internet was to enable any computer or terminal device to be able to communicate seamlessly between all devices. At the time, each manufacturer had different communication protocols that depended on a proprietary method of control by a central computer.
The Internet at the time was only utilized for the exchange of unclassified information. One of the 32 Space Program Offices came to me with a problem. The Space Defense Initiative Office (aka: Star Wars) wanted to be able to be able to be able to exchange information between the various contractors developing the missile defense umbrella without having to physically travel and meet in a secure facility.
I felt that using the Internet methodology and adding secure protection would solve the problem. I wrote a proposal to the Defense Communication Agency with my analysis and a request for support. I was surprised to receive an immediate response to my request. DCA had already developed and tested my methodology suggestion and were trying to find the funding to implement a new secure network worldwide for the Department of Defense. We became the initial location for the implementation and management of the project. Instead of one node to provide switching for the Space Defense Initiative Project Office, we received a second node with connections to most DoD installation throughout the Western U.S. and the Pacific. The third node was installed at the Pentagon to which we became connected. The remainder of the worldwide military installation became connected and continue to be connected as improvements in technology have been enhanced during the following 40 years. Ultimate security continues to be the priority of DoD networking.
During the initial implementation of the classified network, several DEA sites were connected to our nodes. The Dea was trying to avoid network hacking by the cartels that were exposing their drug enforcement plans. The DEA sites never got included because they violated the requirement to not integrate military and civilian assets and participation.
The military classified network methodology differentiates itself from unclassified networking using the requirements utilized in our initial implementation at the Air Force Space Systems Division. The location where the unencrypted form of classified data is present must be protected. This is why the originator and receiver of the data must be in facility that is protected from external electronic spying. Any electronic device must not be allowed in the SCIF or Secure Classified Information Facility to prevent the removal of data from the facility. A SCIF can be set up for the use of a single person or a group. The switching nodes are also protected from external information gathering by being encased in protective cases and/or the entire facility. The network address locations and the volume of messages to and from certain addresses are classified because the volume of messages can indicate activity involving those locations or persons.
To also ensure that the addressee information and the encrypted text are not exposed outside of the closed system. Each circuit between the SCIFs and nodes is encrypted. The encrypted data in the documents and messages becomes double-encrypted during this phase of the security process. The encryption codes on the circuit devices are changed on a revolving schedule so that any possible successful breaking of the code would be valuable for a limited period. The encryption of the data in each message is synchronized with the intended receivers. Each following message is synchronized using a different algorithm and synchronization only with those users.
The information regarding the implementation of a secure military network describes my knowledge and experience 40 years ago. The evolving technology enhancing communications with improved bandwidth, switching capabilities, improved encryption methods, etc. make the components less identifiable. The basic requirements remain the same and show what makes using Signal over an unclassified network from unsecure locations a criminal activity by those in charge of protecting our nation.
[END]
---
[1] Url:
https://www.dailykos.com/stories/2025/3/25/2312544/-The-heads-of-the-U-S-Security-Agencies-chose-to-expose-our-secrets-Intentional-or-ignorance?pm_campaign=front_page&pm_source=more_community&pm_medium=web
Published and (C) by Daily Kos
Content appears here under this condition or license: Site content may be used for any purpose without permission unless otherwise specified.
via Magical.Fish Gopher News Feeds:
gopher://magical.fish/1/feeds/news/dailykos/