COMSEC (South Africa)

Last updated

COMSEC (formally Electronic Communications Security (Pty) Ltd) is a company owned by the Government of South Africa through its National Intelligence Agency.

COMSEC's main task is to secure South African government communications against any unauthorized access and also from technical, electronic or any other related threats. The company also provides verification services for electronic communications security systems, products and services used by the South African government .

The company was established by an act of government private company in 2003 in order to ensure that critical electronic communications of South African government were protected and secured. Prior to the establishment of the company, provision of communication security was fragmented in government.

The Chief Executive Officer of COMSEC (as of July 2005) is Ms. Taki Netshitenzhe.


Related Research Articles

Telecommunications in Tanzania include radio, television, fixed and mobile telephones, and the Internet available in mainland Tanzania and the semiautonomous Zanzibar archipelago.

Communications security

Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended recipients.

Digital signature Mathematical scheme for verifying the authenticity of digital documents

A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature, where the prerequisites are satisfied, gives a recipient very strong reason to believe that the message was created by a known sender (authentication), and that the message was not altered in transit (integrity).

Communications Security Establishment

The Communications Security Establishment, formerly called the Communications Security Establishment Canada (CSEC), is the Government of Canada's national cryptologic agency. It is responsible for foreign signals intelligence (SIGINT) and communications security (COMSEC), protecting federal government electronic information and communication networks, and is the technical authority for cyber security and information assurance.

STU-III Telephone

STU-III is a family of secure telephones introduced in 1987 by the NSA for use by the United States government, its contractors, and its allies. STU-III desk units look much like typical office telephones, plug into a standard telephone wall jack and can make calls to any ordinary phone user. When a call is placed to another STU-III unit that is properly set up, one caller can ask the other to initiate secure transmission. They then press a button on their telephones and, after a 15-second delay, their call is encrypted to prevent eavesdropping. There are portable and militarized versions and most STU-IIIs contained an internal modem and RS-232 port for data and fax transmission. Vendors were AT&T, RCA and Motorola.

Thales Australia is a defence contractor based in Australia. It is owned by the French defence technology conglomerate Thales Group.

The National Security Agency took over responsibility for all U.S. Government encryption systems when it was formed in 1952. The technical details of most NSA-approved systems are still classified, but much more about its early systems have become known and its most modern systems share at least some features with commercial products.

The Electronic Key Management System (EKMS) is a United States National Security Agency led program responsible for Communications Security (COMSEC) key management, accounting, and distribution. Specifically, EKMS generates and distributes electronic key material for all NSA encryption system whose keys are loaded using standard fill devices, and directs the distribution of NSA produced key material. Additionally, EKMS performs account registration, privilege management, ordering, distribution, and accounting to direct the management and distribution of physical COMSEC material for the services. The common EKMS components and standards facilitate interoperability and commonality among the armed services and civilian agencies.

Controlled Cryptographic Item (CCI) is a U.S. National Security Agency term for secure telecommunications or information handling equipment, associated cryptographic component or other hardware item which performs a critical communications security (COMSEC) function. Items so designated may be unclassified but are subject to special accounting controls and required markings.

Email privacy is a broad topic dealing with issues of unauthorized access to, and inspection of, electronic mail, or unauthorized tracking when a user reads an email. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user's computer, or when the user reads the message. In countries with a constitutional guarantee of the secrecy of correspondence, whether email can be equated with letters—therefore having legal protection from all forms of eavesdropping—is disputed because of the very nature of email. As more communication occurs via email, as compared to postal mail, this is considered to be an important debate.

The Minister of State Security is a Minister of the South African government, who oversees South Africa's civilian intelligence agencies and national security matters. As of 2019 the Minister of State Security is Ayanda Dlodlo.

<i>Hepting v. AT&T</i>

Hepting v. AT&T is a United States class action lawsuit filed in January 2006 by the Electronic Frontier Foundation (EFF) against the telecommunications company AT&T, in which the EFF alleges that AT&T permitted and assisted the National Security Agency (NSA) in unlawfully monitoring the communications of the United States, including AT&T customers, businesses and third parties whose communications were routed through AT&T's network, as well as voice over IP telephone calls routed via the Internet.

Signals intelligence by alliances nations and industries, many organizations, national or not, are responsible for communications security as well as SIGINT; the organization makes codes and ciphers that it hopes opponents cannot break. There is a synergy between the two components; there is a saying among cryptologists that no one is qualified to create a cipher unless they have successfully cryptanalyzed a cipher of equivalent complexity.

National intelligence programs, and, by extension, the overall defenses of nations, are vulnerable to attack. It is the role of intelligence cycle security to protect the process embodied in the intelligence cycle, and that which it defends. A number of disciplines go into protecting the intelligence cycle. One of the challenges is there are a wide range of potential threats, so threat assessment, if complete, is a complex task. Governments try to protect three things:

Howard C. Barlow (1918–2003) was an American cryptographer, telecommunications expert, and high-ranking civilian employee of the National Security Agency (NSA) of the United States.

The State Security Agency is the department of the South African government with overall responsibility for civilian intelligence operations. It was created in October 2009 to incorporate the formerly separate National Intelligence Agency, South African Secret Service, South African National Academy of Intelligence, National Communications Centre and COMSEC.

United States Air Force Security Service Former signals intelligence service of the US Air Force

Initially established as the Air Force (USAF) Security Group in June, 1948, the USAF Security Service (USAFSS) was activated as a major command on Oct 20, 1948

Cryptographic High Value Product (CHVP) is a designation used within the information security community to identify assets that have high value, and which may be used to encrypt / decrypt secure communications, but which do not retain or store any classified information. When disconnected from the secure communication network, the CHVP equipment may be handled with a lower level of controls than required for COMSEC equipment.

Mahlon E. Doyle was an American cryptologist, inventor, innovator, and author. He enjoyed a three decade career at the National Security Agency and its predecessor organizations.

Human rights and encryption

Human rights applied to encryption is an important concept for freedom of expression as encryption is a technical resource of implementation of basic human rights.