Information Assurance Menu

About IA at NSA Partners Rowlett Awards Award Recipients Background Nomination Procedures Links IA News IA Events Open for Registration Closed for Registration Scheduled IA Guidance Media Destruction Guidance Security Configuration Guides Applications Archived Guides Cisco Router Guides Current Guides Database Servers Fact Sheets IPv6 Operating Systems Apple Mac Operating Systems Linux Microsoft Windows Sun Solaris Supporting Documents Switches VoIP and IP Telephony Vulnerability Technical Reports Web Server and Browser Guides Wireless Standards Profiles System Level IA Guidance TEMPEST Overview TEMPEST Products: Level I Certified Confirmed Deficiencies Suspended Terminated No Longer Produced TEMPEST Products: Level II Certified Confirmed Deficiencies Suspended Terminated No Longer Produced TEMPEST Company POCs Certified Suspended Terminated TEMPEST Zoned Equipment IA Academic Outreach National Centers of Academic Excellence in IA Education CAE/IAE Program Criteria CAE-R Program Criteria Colloquium Institutions SEAL Program Applying FAQs IA Courseware Evaluation Program Institutions FAQs Student Opportunities IA Business and Research IA Business Affairs Office Certified Product Sales and Support Commercial COMSEC Evaluation Program Commercial Satellite Protection Program Independent Research and Development Program User Partnership Program National IA Research Laboratory Partnerships with Industry NIAP and COTS Product Evaluations IA Programs Global Information Grid High Assurance Platform Releases Computing Platform Architecture and Security Criteria IA Training and Rating Program Inline Media Encryptor Suite B Cryptography IA Careers Contact Information
.
Skip Search Box

Inline Media Encryptor

Fiber Optics

The Inline Media Encryptor (IME) is a government-developed media encryption device. It is positioned "in line" between the computer processor and hard drive to ensure that anything stored to the hard drive gets encrypted and anything retrieved from the hard drive gets decrypted. The IME protects data classified Top Secret and below. Data stored on the hard drive is considered unclassified when encrypted. The IME was certified 26 November 2006.


How the IME Works

The IME provides Type 1 Encryption on a computer's Integrated Device Electronic (IDE) hard drive. It encrypts all physical sectors, including the Operating System (OS). With the IME physically positioned between the computer system and its hard drive, all data must pass through the IME and is stored encrypted on an IDE hard drive. Only those files "called" from the hard drive get decrypted. The hard drive always remains encrypted.

The IME meets emergency zeroization requirements for the rapid zeroization of data - without destroying the computer or rendering the data completely unrecoverable. Once the emergency zeroization mechanism is initiated, an adversary will have no way to obtain the information stored on the hard drive without the Crypto-Ignition Key (CIK). However, methods are in place to restore data if zeroized.

There are two types of IMEs, the KG200 and KG201.

  • The KG200 fits into the standard 5.25" drive bay
  • The KG201 is slightly modified for use with a laptop and requires a USB boot.

IME Features and Benefits

  • Certifiable GOTS Type 1 Encryptor
  • Meets Crypto Modernization Initiative (CMI) standards
  • Protects data-at-rest classified up to TS/SCI
  • Provides Emergency Data Destruction without destroying equipment or losing data
  • Has mechanisms in place for data recovery and retrieval
  • Provides Authentication
  • Tamper protected
  • TEMPEST tested
  • Hardware and software independent
  • Works with any OS
  • Can be used in conjunction with any computer that uses an IDE hard drive
  • Requires no software drivers
  • IME use is transparent to the user
  • Use of the IME does not slow down the laptop or workstation
  • 800 Mbit/sec throughput speed
  • Data is secure (stored encrypted) when at rest (unclassified)
  • Classified data can be transported via unclassified methods
  • Requires a Personal Identification Number (PIN)
  • Up to 10 user accounts can be assigned to each IME

For Mobile Users

  • Protects data in the event the laptop is lost or stolen
  • Encrypted hard drive does not have to be couriered
  • Time and cost savings through use of commercial carrier vs. Defense Courier System

IME Key Management

  • Self-Generating Storage Key
  • No key distribution required
  • Instantaneous key zeroization
  • Recovery key stored off site for reconstitution of data
  • Crypto-Ignition Key (CIK) is exclusive to the individual IME
  • When separated, the IME and CIK are unclassified
  • Key management conforms to NSA's Key Management Infrastructure

IME Purchasing Options

Customers can purchase the IME through NSA's IDIQ contract. Contract number is H98230-08-D-0096. Customers also may purchases devices directly from General Dynamics C4 Systems, Inc. and/or ViaSat, Inc.

To learn more about the IME and purchasing, contact:

ViaSat, Inc.
6155 El Camino Real
Carlsbad, CA 92009

Carl Hansen
(410) 689-6208
(410) 689-6301 fax
carl.hansen@viasat.com

Dennis Dunn
(760) 476-2631
(760) 929-3938 fax
dennis.dunn@viasat.com

General Dynamics
C4 Systems, Inc.

8201 E. McDowell Rd.
Scottsdale, AZ 85257

Debbie Cremin
(781) 455 - 5411
(781) 455-4480 fax
debbie.cremin@gdc4s.com

John Bacher
(781) 455-4833
(781) 455-4002 fax
john.bacher@gdc4s.com

Information Assurance Product Acquisition Center
9800 Savage Road, Suite 6718
Ft. George G. Meade, MD 20755-6718

(410) 854-6871
(410) 854-7179 FAX

 

 

Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009

 
bottom

National Security Agency / Central Security Service