Over the past decade, military, intelligence community and civilian agencies have been transitioning to network-centric applications to support their operations. As a result, these agencies are under tremendous pressure from their end users to support commercial, consumer-grade mobile devices.
The most important of these applications reside on tactically secret networks, such as the U.S. Department of Defense SIPRNET. Older, wired SIPRNet infrastructure is being evaluated for replacement and upgrade, and the latest classified communications technologies and architectures are being pursued for this replacement rather than relying on expensive and logistically intensive alternatives.
NSA has developed a program called Commercial Solutions for Classified (CSfC) and has 1) established architecture guidelines for point-to-point VPN, campus WLAN, and mobile access, 2) established policy and processes for the approval of commercial products to be used in these architectures, and 3) established policy and processes for approval of companies to develop, implement, and support CSfC architectures as NSA Trusted Integrators.
CSfC architectures, when implemented properly and approved by NSA, provide the ability to transmit secret and top secret information over commercial networks. As of November 2015, there are 94 approved products in 19 categories and there are 24 Trusted Integrators.
Telos Corporation can provide a full line of professional services capabilities to design, develop, and implement CSfC architectures, coordinate efforts between the end user and NSA representatives, and provide necessary documentation to complete the CSfC package.
Telos is a NETCENTS-2 Network Operations (NetOps) contract holder with 20 years’ experience delivering wireless and mobile solutions. The CSfC services are available under this contract for Air Force and any other DoD customer.
|Red Network — A Red network contains unencrypted classified data and is logically located behind an Inner VPN Gateway. The networks connected to end user devices through the campus WLAN solution are Red networks.||Black Network — A Black network contains classified data that has been encrypted twice. The wireless network between the end user device and the wireless system in which data is protected with two layers of encryption is a Black network.|
|Gray Network — A Gray network contains classified data that has been encrypted once. The network between an inner VPN gateway and the wireless system is a Gray network.||End User Device — The end user device is a commercial tablet, laptop computer, or similar computing device that supports Wi-Fi connectivity options. It may run applications that make use of local processing or local persistent storage.|