Resource Request Form:

"Securing the Blurry Line between Classified and Unclassified Data"
Now more than ever, data transmissions are an increasingly prevalent part of every military mission. From Headquarters to Tactical Operations Centers to the individual warfighter, the amount of data is massive and clear distinctions between classified and unclassified data transmission methods are progressively blurred. Top Secret and Secret classifications of data are well established and the methods for transporting these data types are known. But new methods are required to protect classified data as a result of the sheer volume of data, the time sensitive nature of the data, the number of data recipients, and the constraints associated with classified encryption devices. Debate over commercial encryption and double-commercial encryption methods for these new data classes continues. This paper will present a data transmission security strategy that can protect sensitive and unclassified data while preserving the integrity of established classified standards with minimal impact on network overhead and performance.

Please complete the request form below and click Continue. An email containing the link to the Resource will be sent to the email provided. This request form information will only be shared with the sponsor of the resource that you have requested.

Confirm Email 
First Name 
Last Name 
Org Type 

To ensure delivery of this email, please whitelist An important note about this link to the Resource Library document: it will contain a cookie that maintains the information included in the request form for 30 days. We’ve added this convenience so that you will not have to re-enter the request information when you access the other documents in the Resource Library. If your computer is set up not to allow cookies, this function won’t work, but it will not keep you from accessing the Resource.