Orion engineers have been programming encrypted voice traffic for military operations for over 30 years. Secure mobile communications using VoIP or RoIP technology continues to change and we have blazed new pathways to arrive at solutions that all clients have in common. Protect our voice and data transmissions from non-approved ears and eyes. It is when we layer on multiple agencies that use different protocols that we have increased interoperability issues. Our engineers can make switching and interoperability more seamless when we are aware of the system protocols your partner agencies are using. The more we know upfront, the better security we can offer.
Secure Mobile Communications
Successful interoperability between agencies depends upon how willing are the other agencies to share information about encryption keys, key generation, storage location number assignments and transport protocols. By following a consistent set of standards for encrypting sensitive voice traffic, P25 and tactical radio as outlined by the NIST Resource Center, interoperability challenges are minimized.
In the enterprise VoIP space, encrypting sensitive voice traffic should take place at the internet gateway with session internet protocols (SIP) & a strong transport layer security (TLS) which is often pre-programmed into our voice switch. Data transports often use SRTP and SDP for media packets. Here we insist upon using VPN’s for remote users. We also insist upon strong passwords for those users. A company’s communication’s engineer should be charged with educating users on the importance of changing passwords periodically, deleting saved messages after they have been listened too and immediately reporting anomalies. This helps close back doors crypto-criminals use to gain access to your network. We take care of the encryption algorithms used to separate red from black voice packets in the programming of your gateways.
Secure Radio Communication Systems
For the tactical radio space, It is vital that each agency use best practices for encryption and key management in a consistent manor when collaborating with multiple entities. Here is an example of some best practices we wish to share:
- Adopt a tested standard of key generation and distribution parameters that will enhance interoperability between known mobile radio devices.
- Develop and effective key management structure
- Develop and stick to a storage location number plan that works for all parties
- Nothing less than a AES-2567 advanced encryption standard is best.
- Define a specific Crypto period that all parties can agree upon
- Develop communication plans that employ encryption
- When possible, test these communications in mock scenarios prior to crisis events.
When working with joint task forces and neighboring jurisdictions, it is crucial that interoperability can be achieved while you are all in an encrypted mode. We can make sure that your equipment is configured properly based upon the specs we receive from the other agencies but know that human error is always present, therefore testing and training is very important.
LMR encryption works between two or more units or consoles. Voice or data enters one radio, is encrypted through a process that involves the appropriate encryption algorithm and TEKs. All elements in this process must be synchronized and aligned (common) for the encryption/decryption process to work properly. It becomes complicated when an agency must coordinate these parameters with other agencies or among a number of agencies, such as a task force.
Your team at Orion Systems Inc has the experience and expertise to engineer the right solutions and we understand the data needed to make it all work properly. We invite you to consult with one of our sales engineers when you are ready to improve your communications within your agency or between multiple agencies. Contact a sale engineer here: email@example.com