Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

Longer titles found: Nautilus (secure telephone) (view)

searching for Secure telephone 37 found (64 total)

alternate case: secure telephone

Secure Terminal Equipment (454 words) [view diff] case mismatch in snippet view article find links to article

typical STE terminal cost about $3,100, not including the crypto card. "Secure Telephone Unit Third Generation (STU-III) / Secure Terminal Equipment (STE)"
Security (1,849 words) [view diff] exact match in snippet view article find links to article
potential damage or harm (e.g. secure foundations); as secrecy (e.g., a secure telephone line); as containment (e.g., a secure room or cell); and as a state
STU-I (71 words) [view diff] exact match in snippet view article find links to article
STU-I, like its successors sometimes known as a "stew phone", was a secure telephone developed by the U.S. National Security Agency for use by senior U
SAVILLE (247 words) [view diff] case mismatch in snippet view article find links to article
provide Saville I. Some devices and protocols that implement SAVILLE: Secure Telephone Equipment (STU) The VINSON family (voice encryption) UK Lamberton (BID/250)
National Cryptologic Museum (1,622 words) [view diff] exact match in snippet view article find links to article
STU-I secure telephone desk set (electronics were housed in a separate cabinet) KY-3 secure telephone system Navajo I secure telephone STU-II secure telephone
Firefly (key exchange protocol) (49 words) [view diff] exact match in snippet view article
Agency public-key key exchange protocol, used in EKMS, the STU-III secure telephone, and several other U.S. cryptographic systems. RFC 2522 Communications
Photuris (protocol) (82 words) [view diff] exact match in snippet view article
developed by the National Security Agency and used in the STU-III secure telephone, which is believed to operate by similar principles. FIREFLY RFC 2522
Navajo I (89 words) [view diff] exact match in snippet view article find links to article
The Navajo I is a secure telephone built into a briefcase that was developed by the U.S. National Security Agency. According to information on display
Defense Switched Network (450 words) [view diff] case mismatch in snippet view article find links to article
DSN will provide transmission, switching, and support services for Secure Telephone Units, Third Generation (STU-IIIs, now obsolete), the Secure Terminal
National Operational Intelligence Watch Officer's Network (121 words) [view diff] exact match in snippet view article find links to article
National Operational Intelligence Watch Officer's Network ('NOIWON) is a secure telephone conference-call system between major Washington national security watch
STIR/SHAKEN (3,361 words) [view diff] case mismatch in snippet view article find links to article
systems, which can be located anywhere in the world. STIR, short for Secure Telephone Identity Revisited, has been defined as a series of RFC standards documents
Iconectiv (1,219 words) [view diff] case mismatch in snippet view article find links to article
Code (CSC) Registry Services, effective January 1, 2016. In 2019, the Secure Telephone Identity Governance Authority (STI-GA) selected iconnectiv as the U
Cryptography standards (498 words) [view diff] exact match in snippet view article find links to article
based on portable crypto token in PC Card format STE secure telephone STU-III older secure telephone TEMPEST prevents compromising emanations IPsec Virtual
Vocoder (4,186 words) [view diff] exact match in snippet view article find links to article
21st century secure telephone. Adaptive Differential Pulse Code Modulation (ADPCM), former ITU-T G.721, 32 kbit/s used in STE secure telephone Modern vocoders
Worldwide Military Command and Control System (2,049 words) [view diff] case mismatch in snippet view article find links to article
transmissions were secured (aka 'scrambled') using Secure Telephone Unit (STU) or Secure Telephone Element modems. The Joint Chiefs of Staff issued JCS
Polo Lounge (573 words) [view diff] exact match in snippet view article find links to article
an Air Force base in Los Angeles to reach a private setting and a secure telephone line. In the event, McGruder merely left the lounge and went to one
KY-68 (193 words) [view diff] exact match in snippet view article find links to article
KY-68 tactical secure telephone
The Black Windmill (1,355 words) [view diff] exact match in snippet view article find links to article
has departed, he breaks into his office and impersonates Harper on a secure telephone – arranging to have the diamonds made available. He then takes them
East Germany–United States relations (3,240 words) [view diff] exact match in snippet view article find links to article
Documents he handed over included intercepting and translating non-secure telephone communications of U.S. military commanders as well as the East German
Electronic Key Management System (959 words) [view diff] case mismatch in snippet view article find links to article
the foundation of EKMS. Traditional paper-based keys, and keys for Secure Telephone Unit – Third Generation (STU-III), STE, FNBDT, Iridium, Secure Data
KSD-64 (581 words) [view diff] exact match in snippet view article find links to article
STU-III secure telephone with CIK inserted
Operation London Bridge (4,385 words) [view diff] exact match in snippet view article find links to article
the code phrase "London Bridge is down" to the prime minister using secure telephone lines. The cabinet secretary and the Privy Council Office would also
Caller ID spoofing (3,626 words) [view diff] case mismatch in snippet view article find links to article
Signature-based Handling of Asserted Information Using toKENs (SHAKEN) and the Secure Telephone Identity Revisited (STIR) standards. The FCC has mandated that telecom
Esterline (1,814 words) [view diff] exact match in snippet view article find links to article
communications equipment ranging from noise-canceling communication headsets to secure telephone networks for use in active battlefields. R. Bradley "Brad" Lawrence
Defense Red Switch Network (389 words) [view diff] exact match in snippet view article find links to article
Dedicated secure telephone network for U.S. Armed Forces
Robocall (6,023 words) [view diff] case mismatch in snippet view article find links to article
certification implemented via a methodology called SHAKEN/STIR.(SHKEN/STIR (Secure Telephone Identity Revisited and Signature-Based Handling of Asserted Information
Robocall (6,023 words) [view diff] case mismatch in snippet view article find links to article
certification implemented via a methodology called SHAKEN/STIR.(SHKEN/STIR (Secure Telephone Identity Revisited and Signature-Based Handling of Asserted Information
National Security Agency (22,385 words) [view diff] exact match in snippet view article find links to article
voice encryptor KG-84 Dedicated Data Encryption/Decryption STU-III secure telephone unit, phased out by the STE The NSA oversees encryption in the following
Jeffrey Carney (1,382 words) [view diff] exact match in snippet view article find links to article
Stasi (HVA Abt. XI and HA III) by intercepting and translating non-secure telephone communications of U.S. military commanders as well as the East German
Joint Force Headquarters National Capital Region (2,202 words) [view diff] exact match in snippet view article find links to article
"We had no vehicle then that was capable of anything more than a non-secure telephone connection. The EOC was basically an unclassified environment. (Jackson)
Ahmed Zaki Yamani (3,958 words) [view diff] exact match in snippet view article find links to article
the meeting and flew to London on his private jet in order to find a secure telephone. This incident was widely publicized. At an OPEC meeting in May 1976
Orly Air Base (4,159 words) [view diff] exact match in snippet view article find links to article
transportation and drivers, luncheons, photographers, press rooms, secure telephone communications, and security police. At four summit meetings, arrangements
NSA encryption systems (3,078 words) [view diff] exact match in snippet view article find links to article
KY-68 tactical secure telephone
La Mort de Staline (1,707 words) [view diff] exact match in snippet view article find links to article
Joseph Stalin, the General Secretary of the Communist Party, from a secure telephone line, ordering that a recording of the concert be delivered to him
Walt Rostow (16,477 words) [view diff] exact match in snippet view article find links to article
Ho Chi Minh to open peace talks. Speaking on what he thought was a secure telephone line from the Soviet embassy in London to the Kremlin, Kosygin told
London in World War II (10,774 words) [view diff] exact match in snippet view article find links to article
Churchill and US President Franklin D. Roosevelt to communicate on a secure telephone line across the Atlantic Ocean. Grosvenor Square became the station
Black Panther Party, Winston-Salem, North Carolina Chapter (3,511 words) [view diff] exact match in snippet view article find links to article
it rarely ever had extra money, and at one point was even unable to secure telephone service in their headquarters. The legal and financial problems faced