GD’s Newest Defense Against Cyber Attack

General Dynamics C4 Systems has a new encryptor device to help military or government personnel protect their data from cyber attack.

The new TACLANE-1G (KG-175G) encryptor is now certified by the National Security Agency to secure classified information at the Top Secret level and below. The high-speed encryptor secures large data and image files 40 times faster than information moving through a commercial 4G network and weighs just eight pounds, GDC4S announced in a recent press release.

The TACLANE-1G is rugged enough to be used in vehicles, remote command posts, data centers or wherever government and military personnel travel or work, GD officials maintain.

“Supporting NSA’s cyber defense strategy, the TACLANE-1G helps keep classified networks operating securely and at top speed,” said Mike Guzelian, vice president of Secure Voice and Data Products for General Dynamics C4 Systems, in the release. “Lightweight and power efficient, the TACLANE-1G also delivers unprecedented network security and efficiency when it comes to moving large classified files in vehicles or office environments.”

With advanced encryption technology, the TACLANE-1G is capable of alerting network personnel when potentially threatening software code, deep within a message “packet,” is detected.  It also has enhanced routing capabilities to ensure that classified information reaches its destination, even if part of the network is inoperable or unavailable.

The TACLANE-1G can also be controlled and remotely managed by the GEM X™ encryptor manager for greater cyber defense and agility when network operations or conditions change. It is available to U.S. government agencies, the Department of Defense and qualified allied nations.

About the Author

Matt Cox
Matthew Cox is a reporter at He can be reached at
  • U.SA

    yes finaly some good news about cyber warfare. maby we can lower the amount of data stolen by the chines

    • Spelling Nazi

      Ouch, my brain. *USA or *U.S.A, *Yes, *finally, *Maybe, *Chinese

    • tmb2

      As far as cybe security, there wasn’t anything wrong with the previous model. The Chinese don’t steal data directly from Army classified computers. They’ve been getting it from the contractors’ corporate networks.

  • We Play God

    Just a question, this isnt the actual machine thats used right? i mean that would be kinda stupid to tell them what machine they actually use, or…..

    • EW3

      Just looking at a machine doesn’t tell anyone anything of value.

      The magic sauce is the hardware and the firmware running on it plus knowledge of the codes that key the encryption.

      • We Play God

        Yeah but they give the name of the company and a starting point with which to start their hacking or espionage…. it cant be the actual name of the company/computer/people involved…..right? lol

  • Rob

    Encryption still has it’s limits and if one of these units gets to any country friendly with China, they can get access easily. This includes some in NATO.

    For real time battle scenarios, to prevent your enemy from getting live intel you just need to flood the signal with loads of misinformation and have these type of units programmed to only extract the true data from it.

    I understand in today’s battlefields we cannot use shortwave radio to broadcast our mission details but it’s obvious that the Taliban cannot even disable a drone or take over any of our bases anyways.

    I’ve never been a soldier but believe they would just 100% want a system that works and has least possibility of failure after enduring damage to the unit.

    Otherwise the costs of units like this mean nothing if China/Iran/Russia can tap the signals.

    • EW3

      Rob, When the NORKs grabbed the Pueblo they had also got a lot of sophisticated crypto gear. To make it useless the USN only had to reissue the code settings.
      This made the job of untangling the encrypted messages beyond the computer technology of the day. Ultimately the USN replaced some key hardware pieces (PCB boards) to further complicate things for the bad guys.
      Despite the growth of supercomputers to crack encrypted messages the hardware we have now makes breaking encryption even more difficult. Instead of discrete circuits designed to work in a finite number of ways we have microprocessors that change their behaviors over time giving them almost an infinite number of combinations.
      In addition, back in the day, the way to destroy circuit boards was to pull them out and hit them with a hammer, then if possible through them overboard. With the
      circuitry available today it would be a simple task to have a destructive voltage smoke components on the board (like the micro) making it useless. Even without a destructive voltage, you can clear flash memory with a few instructions from the micro. If we don’t get the right code every so often, the micro goes into “self destruct” mode. Just erasing it’s memory makes it useless to anyone.

      • anonymous

        Bravo Zulu. Listen to an EW.

        • EW3

          Probably should be CTT3 now ;)

  • tiger

    So…….. When can I pick one up at RADIO SHACK?

  • jay

    The Chinese may be the #1 hacker of US secrets but Russia and Israel are close behind.

  • tmb2

    Hopefully this one won’t overheat like its predecessor did. Unless you had the KG-175D in an air conditioned room or put a fan in front of it, it would burn up and shut down. Remote management and intrusion detection will be a nice features though.

  • aaron.michael

    is this the new scrambler for defeating Chinese people and Korean people? Thank you for defending country!!

  • Barry

    Great. Only one problem: it’s Made in China.

  • oblat

    Wow hello 1985 technology. LOL

  • SJE

    It is particularly useful when used in a swinging motion upside the head against Pentagon employees who take work home on thumb drives and think that there is no problem trolling through the internet while at work

  • s_N

    A piece of hardware that accounts for and defends, real-time, against user error / lack-of-training would be impressive.

  • Vaporhead

    Maybe we are just using this system as “bait”. Send out news stories about it and see who tries to steal its information. Throw the other guy off type of thing.

  • Navbm7

    So are the components made in the US or China? If the chips are made in China then this is an expensive exercise in frustration.