About IA at NSA
Partners
Rowlett Awards
Award Recipients
Background
Nomination Procedures
Links
IA News
IA Events
Open for Registration
Closed for Registration
Scheduled
IA Guidance
Media Destruction Guidance
Security Configuration Guides
Applications
Archived Guides
Cisco Router Guides
Current Guides
Database Servers
Fact Sheets
IPv6
Operating Systems
Apple Mac Operating Systems
Linux
Microsoft Windows
Sun Solaris
Supporting Documents
Switches
VoIP and IP Telephony
Vulnerability Technical Reports
Web Server and Browser Guides
Wireless
Standards Profiles
System Level IA Guidance
TEMPEST Overview
TEMPEST Products: Level I
Certified
Confirmed Deficiencies
Suspended
Terminated
No Longer Produced
TEMPEST Products: Level II
Certified
Confirmed Deficiencies
Suspended
Terminated
No Longer Produced
TEMPEST Company POCs
Certified
Suspended
Terminated
TEMPEST Zoned Equipment
IA Academic Outreach
National Centers of Academic Excellence in IA Education
CAE/IAE Program Criteria
CAE-R Program Criteria
Colloquium
Institutions
SEAL Program
Applying
FAQs
IA Courseware Evaluation Program
Institutions
FAQs
Student Opportunities
IA Business and Research
IA Business Affairs Office
Certified Product Sales and Support
Commercial COMSEC Evaluation Program
Commercial Satellite Protection Program
Independent Research and Development Program
User Partnership Program
National IA Research Laboratory
Partnerships with Industry
NIAP and COTS Product Evaluations
IA Programs
Global Information Grid
High Assurance Platform
Releases
Computing Platform Architecture and Security Criteria
IA Training and Rating Program
Inline Media Encryptor
Suite B Cryptography
IA Careers
Contact Information
|
Inline Media EncryptorThe Inline Media Encryptor (IME) is a government-developed media encryption device. It is positioned "in line" between the computer processor and hard drive to ensure that anything stored to the hard drive gets encrypted and anything retrieved from the hard drive gets decrypted. The IME protects data classified Top Secret and below. Data stored on the hard drive is considered unclassified when encrypted. The IME was certified 26 November 2006. How the IME WorksThe IME provides Type 1 Encryption on a computer's Integrated Device Electronic (IDE) hard drive. It encrypts all physical sectors, including the Operating System (OS). With the IME physically positioned between the computer system and its hard drive, all data must pass through the IME and is stored encrypted on an IDE hard drive. Only those files "called" from the hard drive get decrypted. The hard drive always remains encrypted. The IME meets emergency zeroization requirements for the rapid zeroization of data - without destroying the computer or rendering the data completely unrecoverable. Once the emergency zeroization mechanism is initiated, an adversary will have no way to obtain the information stored on the hard drive without the Crypto-Ignition Key (CIK). However, methods are in place to restore data if zeroized. There are two types of IMEs, the KG200 and KG201.
IME Features and Benefits
For Mobile Users
IME Key Management
IME Purchasing OptionsCustomers can purchase the IME through NSA's IDIQ contract. Contract number is H98230-08-D-0096. Customers also may purchases devices directly from General Dynamics C4 Systems, Inc. and/or ViaSat, Inc. To learn more about the IME and purchasing, contact:
|
||||
Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009 |