language:
Find link is a tool written by Edward Betts.Longer titles found: Nautilus (secure telephone) (view)
searching for Secure telephone 37 found (64 total)
alternate case: secure telephone
Secure Terminal Equipment
(454 words)
[view diff]
case mismatch in snippet
view article
find links to article
typical STE terminal cost about $3,100, not including the crypto card. "Secure Telephone Unit Third Generation (STU-III) / Secure Terminal Equipment (STE)"Security (1,849 words) [view diff] exact match in snippet view article find links to article
potential damage or harm (e.g. secure foundations); as secrecy (e.g., a secure telephone line); as containment (e.g., a secure room or cell); and as a stateSTU-I (71 words) [view diff] exact match in snippet view article find links to article
STU-I, like its successors sometimes known as a "stew phone", was a secure telephone developed by the U.S. National Security Agency for use by senior USAVILLE (247 words) [view diff] case mismatch in snippet view article find links to article
provide Saville I. Some devices and protocols that implement SAVILLE: Secure Telephone Equipment (STU) The VINSON family (voice encryption) UK Lamberton (BID/250)National Cryptologic Museum (1,622 words) [view diff] exact match in snippet view article find links to article
STU-I secure telephone desk set (electronics were housed in a separate cabinet) KY-3 secure telephone system Navajo I secure telephone STU-II secure telephoneFirefly (key exchange protocol) (49 words) [view diff] exact match in snippet view article
Agency public-key key exchange protocol, used in EKMS, the STU-III secure telephone, and several other U.S. cryptographic systems. RFC 2522 CommunicationsPhoturis (protocol) (82 words) [view diff] exact match in snippet view article
developed by the National Security Agency and used in the STU-III secure telephone, which is believed to operate by similar principles. FIREFLY RFC 2522Navajo I (89 words) [view diff] exact match in snippet view article find links to article
The Navajo I is a secure telephone built into a briefcase that was developed by the U.S. National Security Agency. According to information on displayDefense Switched Network (450 words) [view diff] case mismatch in snippet view article find links to article
DSN will provide transmission, switching, and support services for Secure Telephone Units, Third Generation (STU-IIIs, now obsolete), the Secure TerminalNational Operational Intelligence Watch Officer's Network (121 words) [view diff] exact match in snippet view article find links to article
National Operational Intelligence Watch Officer's Network ('NOIWON) is a secure telephone conference-call system between major Washington national security watchSTIR/SHAKEN (3,361 words) [view diff] case mismatch in snippet view article find links to article
systems, which can be located anywhere in the world. STIR, short for Secure Telephone Identity Revisited, has been defined as a series of RFC standards documentsIconectiv (1,219 words) [view diff] case mismatch in snippet view article find links to article
Code (CSC) Registry Services, effective January 1, 2016. In 2019, the Secure Telephone Identity Governance Authority (STI-GA) selected iconnectiv as the UCryptography standards (498 words) [view diff] exact match in snippet view article find links to article
based on portable crypto token in PC Card format STE secure telephone STU-III older secure telephone TEMPEST prevents compromising emanations IPsec VirtualVocoder (4,186 words) [view diff] exact match in snippet view article find links to article
21st century secure telephone. Adaptive Differential Pulse Code Modulation (ADPCM), former ITU-T G.721, 32 kbit/s used in STE secure telephone Modern vocodersWorldwide Military Command and Control System (2,049 words) [view diff] case mismatch in snippet view article find links to article
transmissions were secured (aka 'scrambled') using Secure Telephone Unit (STU) or Secure Telephone Element modems. The Joint Chiefs of Staff issued JCSPolo Lounge (573 words) [view diff] exact match in snippet view article find links to article
an Air Force base in Los Angeles to reach a private setting and a secure telephone line. In the event, McGruder merely left the lounge and went to oneKY-68 (193 words) [view diff] exact match in snippet view article find links to article
KY-68 tactical secure telephoneThe Black Windmill (1,355 words) [view diff] exact match in snippet view article find links to article
has departed, he breaks into his office and impersonates Harper on a secure telephone – arranging to have the diamonds made available. He then takes themEast Germany–United States relations (3,240 words) [view diff] exact match in snippet view article find links to article
Documents he handed over included intercepting and translating non-secure telephone communications of U.S. military commanders as well as the East GermanElectronic Key Management System (959 words) [view diff] case mismatch in snippet view article find links to article
the foundation of EKMS. Traditional paper-based keys, and keys for Secure Telephone Unit – Third Generation (STU-III), STE, FNBDT, Iridium, Secure DataKSD-64 (581 words) [view diff] exact match in snippet view article find links to article
STU-III secure telephone with CIK insertedOperation London Bridge (4,385 words) [view diff] exact match in snippet view article find links to article
the code phrase "London Bridge is down" to the prime minister using secure telephone lines. The cabinet secretary and the Privy Council Office would alsoCaller ID spoofing (3,626 words) [view diff] case mismatch in snippet view article find links to article
Signature-based Handling of Asserted Information Using toKENs (SHAKEN) and the Secure Telephone Identity Revisited (STIR) standards. The FCC has mandated that telecomEsterline (1,814 words) [view diff] exact match in snippet view article find links to article
communications equipment ranging from noise-canceling communication headsets to secure telephone networks for use in active battlefields. R. Bradley "Brad" LawrenceDefense Red Switch Network (389 words) [view diff] exact match in snippet view article find links to article
Dedicated secure telephone network for U.S. Armed ForcesRobocall (6,023 words) [view diff] case mismatch in snippet view article find links to article
certification implemented via a methodology called SHAKEN/STIR.(SHKEN/STIR (Secure Telephone Identity Revisited and Signature-Based Handling of Asserted InformationRobocall (6,023 words) [view diff] case mismatch in snippet view article find links to article
certification implemented via a methodology called SHAKEN/STIR.(SHKEN/STIR (Secure Telephone Identity Revisited and Signature-Based Handling of Asserted InformationNational Security Agency (22,385 words) [view diff] exact match in snippet view article find links to article
voice encryptor KG-84 Dedicated Data Encryption/Decryption STU-III secure telephone unit, phased out by the STE The NSA oversees encryption in the followingJeffrey Carney (1,382 words) [view diff] exact match in snippet view article find links to article
Stasi (HVA Abt. XI and HA III) by intercepting and translating non-secure telephone communications of U.S. military commanders as well as the East GermanJoint Force Headquarters National Capital Region (2,202 words) [view diff] exact match in snippet view article find links to article
"We had no vehicle then that was capable of anything more than a non-secure telephone connection. The EOC was basically an unclassified environment. (Jackson)Ahmed Zaki Yamani (3,958 words) [view diff] exact match in snippet view article find links to article
the meeting and flew to London on his private jet in order to find a secure telephone. This incident was widely publicized. At an OPEC meeting in May 1976Orly Air Base (4,159 words) [view diff] exact match in snippet view article find links to article
transportation and drivers, luncheons, photographers, press rooms, secure telephone communications, and security police. At four summit meetings, arrangementsNSA encryption systems (3,078 words) [view diff] exact match in snippet view article find links to article
KY-68 tactical secure telephoneLa Mort de Staline (1,707 words) [view diff] exact match in snippet view article find links to article
Joseph Stalin, the General Secretary of the Communist Party, from a secure telephone line, ordering that a recording of the concert be delivered to himWalt Rostow (16,477 words) [view diff] exact match in snippet view article find links to article
Ho Chi Minh to open peace talks. Speaking on what he thought was a secure telephone line from the Soviet embassy in London to the Kremlin, Kosygin toldLondon in World War II (10,774 words) [view diff] exact match in snippet view article find links to article
Churchill and US President Franklin D. Roosevelt to communicate on a secure telephone line across the Atlantic Ocean. Grosvenor Square became the stationBlack Panther Party, Winston-Salem, North Carolina Chapter (3,511 words) [view diff] exact match in snippet view article find links to article
it rarely ever had extra money, and at one point was even unable to secure telephone service in their headquarters. The legal and financial problems faced