Workshops Intelligence Secure Communications for Field Operations
Intelligence Full Day Workshop

Quantum-Safe Communications for Intelligence Field Operations

Intelligence field communications operate under constraints more severe than military tactical systems: covert transmission requirements, denied-area key management, burst communication authentication, and the imperative that compromised encryption exposes human sources. This workshop addresses PQC migration specifically for intelligence field communication systems, where standard enterprise and military migration approaches do not apply.

Full day (6 hours)
In person or online
Max 30 delegates

Proud to recommend our expert members

Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IONQ - ID Quantique
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
QIZ
Global Quantum Intelligence
Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IONQ - ID Quantique
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
QIZ
Global Quantum Intelligence

Workshop Description

Intelligence field communications encompass covert radio systems, satellite communication terminals (both dedicated and commercial), encrypted messaging devices, and increasingly, internet-based covert channels. Each system type faces different PQC migration challenges. Covert radios operate on extremely narrow bandwidths where ML-KEM ciphertext sizes (768-1568 bytes) may exceed available capacity. Burst transmissions require authentication within millisecond windows. Denied-area operations may not permit real-time key exchange at all.

This workshop examines PQC deployment for each intelligence field communication type: algorithm selection for bandwidth-constrained covert channels, pre-positioned key strategies for denied-area operations, hybrid deployment for systems that must interoperate with classical equipment, and the specific challenge of protecting agent communications where compromise has immediate human consequences. The interactive demonstration models PQC overhead impact on representative intelligence communication scenarios.

What participants cover

  • ML-KEM and ML-DSA for bandwidth-constrained covert communication channels
  • Burst transmission authentication: PQC signing within millisecond transmission windows
  • Denied-area key management: pre-positioned PQC key material and emergency re-keying protocols
  • Satellite link protection: PQC for intelligence SATCOM including commercial and dedicated terminals
  • Agent communication security: PQC migration for systems where compromise exposes human sources
  • Hybrid deployment for interoperability with classical intelligence communication equipment

Preliminary Agenda

Full day workshop structure with scheduled breaks. Content is configurable to your organisation's technical level and operational environment.

# Session Topics
1 Intelligence Field Communications and Quantum Risk Where quantum threats meet intelligence COMSEC
  • Intelligence communication system types: covert radio, SATCOM, encrypted messaging, internet-based channels
  • HNDL threat to intelligence communications: adversary collection of encrypted agent traffic
  • The human cost dimension: why intelligence COMSEC migration failure has unique consequences
2 PQC for Covert and Constrained Channels Algorithm selection for intelligence-specific constraints
  • ML-KEM ciphertext sizes versus covert channel bandwidth capacities
  • ML-DSA for burst transmission authentication: latency analysis for sub-second windows
  • SLH-DSA for long-lived agent communication certificates
  • Lattice versus hash-based trade-offs for intelligence communication profiles
Break, after 60 min
3 Denied-Area Key Management PQC when real-time key exchange is impossible
  • Pre-positioned key bundles: PQC key material preparation for anticipated denied-area operations
  • Emergency re-keying: procedures when pre-positioned material is exhausted or compromised
  • One-way communication: PQC authentication for broadcast and dead drop scenarios
  • Key hierarchy design for compartmented intelligence operations
4 Interactive Demonstration PQC overhead modelling for intelligence communication scenarios
  • Facilitator-led simulation of PQC deployment across representative intelligence field communication types
  • Measuring bandwidth, latency, and authentication overhead with different PQC parameter sets
  • Identifying which systems require protocol adaptation versus drop-in PQC replacement
Break, after 90 min
5 SATCOM and Network Communication Protection PQC for intelligence satellite and internet channels
  • Intelligence SATCOM protection: dedicated terminals and commercial satellite fallback channels
  • Internet-based covert channels: PQC for TLS-based intelligence communication systems
  • Interoperability: hybrid classical-PQC for communication with allies at different migration stages
6 Case Studies: Intelligence COMSEC Migration Published approaches and lessons learned
  • Intelligence community PQC migration guidance and published timelines
  • Five Eyes COMSEC coordination for post-quantum interoperability
7 Q&A and Migration Planning

Designed and Delivered By

Workshops are designed and delivered by QSECDEF in collaboration with sector specialists. All facilitators have direct experience in both quantum technologies and intelligence systems.

QD

Quantum Security Defence

Workshop design and delivery

QSECDEF brings world-leading expertise in post-quantum cryptography, quantum computing strategy, and defence-grade security assessment. Our advisory membership spans 600+ organisations and 1,200+ professionals working at the intersection of quantum technologies and critical infrastructure security.

IN

Intelligence Sector Partners

Domain expertise and operational validation

Intelligence workshops are co-delivered with sector specialists who bring direct operational experience in intelligence organisations. This ensures workshop content is grounded in regulatory, operational, and technical realities specific to the sector.

Commission This Workshop

Sessions are configured around your organisation's technical level, operational environment, and regulatory jurisdiction. Get in touch to discuss requirements and schedule a date.

Contact Us