Professional Documents
Culture Documents
developed a system more converging towards intelligence, forensic and inside applications investigation
concept and counter intelligence. A highly qualified staffs in ICT field and intelligence skills are
successfully brought our corporate image into a new dimension and indirectly has created a competitive
market.
• Get tender supply of ICT equipment to Intelligence Branch, Army Base, and Ministry of
Defense. (Develop database security system and database tactical system).
• Supply ICT equipment to Intelligence Branch, Army Base, Ministry of Defense involving
Intelligence Fusion Center's developments(IFC) namely data combination from various
intelligence source and open-source by real time.
• Fed, install and commissioning system biometric access to National Heart Institute in the
month of March 2009.
• Expertise in ICT FORENSIC field.
• Expertise in ICT and counter intelligence field.
• Having business network with a couple foreign companies such as Mills Electronic which
operates in Innsbruck, Austria for crypto systems development in process data
transmission and Sail Labs Technology, Vienna, Austria in translation system
implementation audio by real time.
Mils system 700 is a cipher and communication system that able to handle information exchange
and image inside the network securely by using personal computer (PC) or notebook.
Basic peripheral used to create Mils System 700 is from a PC or notebook that had been
transformed to a cipher machine using ”Key Module M775” that the Mills Electronic company
had created. The Key Module had been created with the PCMCIA Standards that can be loaded to
varieties of computers or notebooks with condition of using suitable adaptor. To make the Mils
system functions as mentioned above, it requires PC with the minimum specification of IBM
compatible Personal Computer 386.
Hardware
This system are made up from two kinds, namely usual consumer station(static or mobile) equipped with
cipher tool while another is individual, which often moved to external work without complete equipment.
This individual consumer can use any cipher station in the network only with the use of "Key Module"
(PCMCIA Card) that programmed for personal use to relate safely with the desired station. Thereby, he
doesn’t need to bring "M730 Terminal" physically when working outstation. This network also able to
handle many cipher stations suit to consumer configuration.
Network pattern can be formed to contain a few "Link" or "Complex Structures" such as "Point-
to-Point Link", "Orcular link" and "Emergency link". Consumer have the freedom of determine
network pattern follow own organisation.
To create safety of the network, this system needs two station type which consists
of cipher stations and network manager station. Role played by each "sub-
system" were as follows.
a.Cipher Machine .
This machine supplied to every station used to provide information "text" and image, edit,
encrypt, decrypt and send "ciphertext" out or vice-versa via needed media of necessity. Choice of
encryption can either be "One- Time-Key" (OTK), " Internal Key Generator" (IKG)or
"Emergency" subject to operator’s choice and the current system usage policy.
b. Network Manager .
It is located Off-line, responsible as administrator and control the whole network. Its role is
preparing and distributing key, and supervises each cipher machine that joins the network.
"Network Manager" is also a personal computer that equipped with "Noise Card" to generate
OTK key for distribution and cipher stations use. For confirmation that OTK key is "Random"
several tests loaded into M705:-
"Key Module" is a PCMCIA card equipped with "micro processor" and "access protected
memory". Same with cryptography "algorithm" and secret key kept in that card have been pinned
with self-defence system (tamper proof). All data in the card will be lost, if there is any threat
establish by physical or hack its content. Hardware and related software with Mils system 700
will also not function without that card. Indirectly, the system security can be defended easily and
suitable for strategic and tactical operation use.
Mils system 700 offers two separate cryptology system, namely "Unbreakable
Random" OTK and "Proprietry stream cipher algorithm" IKG in order to meet
strategic security needs and tactical. Consumer may prescribe high classification
information use OTK while low classification information or image using IKG.
KEY MANAGEMENT
Key management and preparation centrally made and administer
network. Management Manager/network would use "Network
Manager" (M705) to provide OTK key and will test
"randomness" before being channeled to consumer station by
"Off-line" or "On-line" followed by consumer safety directions.
SYSTEM APPLICATION
Consumer be given option either to have Mils system 700 work by "On-line" or "Off-line". That system
application is up to the work requirement and comfort picked by consumer.
Mils system 700 does not require various kind of documents, but this system need to be matched
according to consumer needs and all processing was done by system electronically and automatic.
This system boosting consumer changed paradigm from "conventional system" to "paperless
system" work culture.
MEDIA ROUTING
"Opheltext" that have been processed can be sent and accepted through various kinds
routing telecommunication service media. Consumer has the flexibility to determine the
way of information channeled and also controls consumers by limiting type of permitted
media only.
ACCESS SYSTEM
System also give the option to allow "Network Manager" when necessary to
obtain route to enter the system in order to control consumer if organization
security policy allow that route.
TRAINING PERIOD
Design and software supplied to Mils System 700 easy to understand and handle. For normal consumer,
he/she would just needs two or three days of training to know and run the system.
following:
(2) Produce and test by key statistic "Random" for OTK's system, IKG
and key emergency obtained through "Noise Card".
c. M 730 ("CIPHER MACHINE'1). It was computer software which is used to send and received
information of network station.This software responsible to coordinate the necessary security
level and routing type that would be used subject to operator’s need. Delivery or decoder that had
been rescued through this system could be made through a few media type which encompasses:
such as :
a. QIK . Key method in this most important system is OTK which is recognized as a most safe
cryptography system in the world.
To make it easy to understand, this OTK's system is defined as a system which need to keep features as
following:
(1) Key withdrawn at random and tested by statistic to determine it is fully random.
(2) Key do not repeat and do not have any pattern or rule.
(3) Bit volume in key equal the length with the bit that are included in envoy.
(4) The key that had been used will be deleted automatically.
a. Data Protection System (DPS} . It is an algorithm used to bail OTK key if it fell into foreign
party’s hand or duplicated by foreign party. Its main function are blocking enemy from obtaining
the OTK's key.
b. Message Authentication System (MAS). In short, this algorithm is applied to ensure that any
envoy received is emanate from station that had fixed and it has been undisturbed or being
transformed during intransmission. Its function is similar to digital signature concept system but
use function hash to ensure validity each envoy received.
OTK CRIPTOGRAPHY KEY CONCEPT
19. One Time Letter Pad {OTLP} . Through development history of cryptology technology, One Time
Letter Pad key's concept (OTLP)serves to encrypt and decrypt information, it is the safest cryptography
system in past age. This concept also already used in modern technique cipher system which called by
now cryptography OTK system. Through technological capability, by using "Noise Card" will be able to
produce cipher key in form of cipher stream which his key not recurring (True random key) keep OTK's
features. This cyrptology technique were made and developed by Mils Electronic until they can create
Mils 700 cipher system to use cryptography OTK system.
20. Strong Evidences of OTK System. Concept key of cryptography system OTK is 'Unbreakable
Key" is based on experience practical and perusal (empiricial explanation) or mathematical proof
from inside experts cryptology field mathematics and other. This fact is was conceded by that
experts in book written own by them as :
a. "Cipher System, The Protection of Communication" by Henery Beker and Fred Piper .
SECURITY
24. Real Security (TransDarency) .System 700 is terminal cipher and communication able to
exchange message meaning safely (secure). Its Cryptography Algorithm development based on
the latest technology.
26. Key .With this , the key can be made by consumer and free
from supplier side knowledge.
27 System Function Protected .Each system and process which need rescued (secure) with technology
cryptography, would be built with special algorithm protect that function.
28. General Information .Through general reading process, information on OTK concept is applied in
Mils system 700 to process ciphertext is known by populace in the countries and overseas. They also
know that general information on OTK concept is "Unbreakable Key" since its discovery hundreds year
earlier and this concept strength remain sophisticated in latest cryptology technology.
Pros and cons
A. Technology user cryptography OTK key's system (Unbreakble Key) to protect strategic information
and tactical so that can be channeled safely and the system is certified secured and the information will be
secured.
B. This system has two technology method of encrypt namely OTK and IKG and Multi Hierarchy
Protection to protect stored data in a cipher equipment known as DPS and MAS. This layers of
security is have made this system’ immunity increased.
C. Tempest proof features held in that system, to check act of sabotaging on system, where all
system data will be lost and also may not be copied or being diverted.
D. This system also can be adapt with transmission multimedia provided by consumer
such as modem telephone, radio (HF, VHF, UHF), telex, e'mail, packet switched data and
lain-Iain ISDN service / PSTN. Give consumer choices and flexibility in routing process
information.
J. All keys are needed to run with Mils 700 system is housed in PCMCIA card and key diskette.
Thus consumers don’t need to determine various documentation management key.
K. Paperless concept and shift paradigm in work culture from system conventional to
computerized working style can achieved.
L. Mils Electronic tool manufacturer cryptography which uses OTK system was a private
company and not tied to any organization and policies which control controlled export
goods to other countries.
M. All encrypt and decrypt process in Mils 700 system is being implemented
automatically.