HOME
*





Black Room
__NOTOC__ A black room is part of a communication center (e.g. a post office) used by state officials to conduct clandestine interception and surveillance of communications. Typically, all letters or communications pass through the black room before being passed to the recipient. This practice had been in vogue since the establishment of postal and telegraph services, and was frequently used in France by the ministers of Louis XVIII and his followers as the ''cabinet noir'' (French for "black room"). In modern American network operations centers, optical splitters divert a percentage of the laser light from all incoming and outgoing fiber-optic cables to the secret room. An example is Room 641A in the SBC Communications building in San Francisco. The term ''black room'' or ''black chamber'' has also been used to refer to any place or organisation dedicated to code-breaking. See also *Bulgarian medieval cryptography *Black Chamber *Black site * ECHELON *Postal censorship *Secrec ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Post Office
A post office is a public facility and a retailer that provides mail services, such as accepting letters and parcels, providing post office boxes, and selling postage stamps, packaging, and stationery. Post offices may offer additional services, which vary by country. These include providing and accepting government forms (such as passport applications), and processing government services and fees (such as road tax, postal savings, or bank fees). The chief administrator of a post office is called a postmaster. Before the advent of postal codes and the post office, postal systems would route items to a specific post office for receipt or delivery. During the 19th century in the United States, this often led to smaller communities being renamed after their post offices, particularly after the Post Office Department began to require that post office names not be duplicated within a state. Name The term "post-office" has been in use since the 1650s, shortly after the ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

SBC Communications
The history of AT&T dates back to the invention of the telephone. The Bell Telephone Company was established in 1877 by Alexander Graham Bell, who obtained the first US patent for the telephone, and his father-in-law, Gardiner Greene Hubbard. Bell and Hubbard also established AT&T Corporation, American Telephone and Telegraph Company in 1885, which acquired the Bell Telephone Company and became the primary telephone company in the United States. This company maintained an effective monopoly on local telephone service in the United States until anti-trust regulators agreed to allow AT&T to retain Western Electric and enter general trades computer manufacture and sales in return for its offer to Breakup of the Bell System, split the Bell System by divesting itself of ownership of the Bell Operating Companies in 1982. AT&T Corporation was eventually purchased by one of the Regional Bell Operating Companies, the former Southwestern Bell Company, in 2005, and the combined company became ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Privacy Of Telecommunications
__NOTOC__ The secrecy of correspondence (german: Briefgeheimnis, french: secret de la correspondance) or literally translated as secrecy of letters, is a fundamental legal principle enshrined in the constitutions of several European countries. It guarantees that the content of sealed letters is never revealed, and that letters in transit are not opened by government officials, or any other third party. The right of privacy to one's own letters is the main legal basis for the assumption of privacy of correspondence. The principle has been naturally extended to other forms of communication, including telephony and electronic communications on the Internet, as the constitutional guarantees are generally thought to also cover these forms of communication. However, national telecommunications privacy laws may allow lawful interception, i.e. wiretapping and monitoring of electronic communications in cases of suspicion of crime. Paper letters have, in most jurisdictions, remained outsi ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Secrecy Of Correspondence
__NOTOC__ The secrecy of correspondence (german: Briefgeheimnis, french: secret de la correspondance) or literally translated as secrecy of letters, is a fundamental legal principle enshrined in the constitutions of several European countries. It guarantees that the content of sealed letters is never revealed, and that letters in transit are not opened by government officials, or any other third party. The right of privacy to one's own letters is the main legal basis for the assumption of privacy of correspondence. The principle has been naturally extended to other forms of communication, including telephony and electronic communications on the Internet, as the constitutional guarantees are generally thought to also cover these forms of communication. However, national telecommunications privacy laws may allow lawful interception, i.e. wiretapping and monitoring of electronic communications in cases of suspicion of crime. Paper letters have, in most jurisdictions, remained outside ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Postal Censorship
Postal censorship is the inspection or examination of mail, most often by governments. It can include opening, reading and total or selective obliteration of letters and their contents, as well as covers, postcards, parcels and other postal packets. Postal censorship takes place primarily but not exclusively during wartime (even though the nation concerned may not be at war, e.g. Ireland during 1939–1945) and periods of unrest, and occasionally at other times, such as periods of civil disorder or of a state of emergency. Both covert and overt postal censorship have occurred. Historically, postal censorship is an ancient practice; it is usually linked to espionage and intelligence gathering. Both civilian mail and military mail may be subject to censorship, and often different organisations perform censorship of these types of mail. In 20th-century wars the objectives of postal censorship encompassed economic warfare, security and intelligence. The study of postal censorsh ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

ECHELON
ECHELON, originally a secret government code name, is a surveillance program (signals intelligence/SIGINT collection and analysis network) operated by the five signatory states to the UKUSA Security Agreement:Given the 5 dialects that use the terms, UKUSA can be pronounced from "You-Q-SA" to "Oo-Coo-SA", AUSCANNZUKUS can be pronounced from "Oz-Can-Zuke-Us" to "Orse-Can-Zoo-Cuss". :From Talk:UKUSA Agreement: "Per documents officially released by both the Government Communications Headquarters and the National Security Agency, this agreement is referred to as the UKUSA Agreement. This name is subsequently used by media sources reporting on the story, as written in new references used for the article. The NSA press release provides a pronunciation guide, indicating that "UKUSA" should not be read as two separate entities.(National Security Agency)" Australia, Canada, New Zealand, the United Kingdom and the United States, also known as the Five Eyes. Created in the late 196 ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Black Site
In military terminology, a black site is a location at which an unacknowledged black operation or black project is conducted. According to the Associated Press, "Black sites are clandestine jails where prisoners generally are not charged with a crime and have no legal recourse, with no bail or court order." Egypt Black sites are used extensively by the Egyptian security services. During the Egyptian Crisis (2011–2014) hundreds of protesters alleged that torture occurred at these black sites. The Egyptian security service also operated black sites involved with the CIA’s counter-terror black site program. Russia In Chechnya, gay men have alleged been tortured at black sites by Chechen security forces. Gay men in other parts of Russia have been kidnapped and transported to sites in Chechnya, where over 100 have been tortured, and some killed. Chechen authorities have thwarted attempts by the Russian LGBT Network to help gay people in Chechnya escape to safe location ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Black Chamber
The Black Chamber (1919–1929), also known as the Cipher Bureau, was the United States' first peacetime cryptanalytic organization, and a forerunner of the National Security Agency. The only prior codes and cypher organizations maintained by the US government had been some intermittent, and always abandoned, attempts by Armed Forces branches prior to World War I. History Headed by Herbert O. Yardley (1889–1958), the Black Chamber was founded in May 1919 following World War I. Yardley had commanded the U.S. Army cryptographic section of Military Intelligence (MI-8) during World War I. MI-8 was disbanded after the war. Jointly funded by the Army and the State Department, the Cipher Bureau was disguised as a New York City commercial code company; it actually produced and sold such codes for business use. Its true mission, however, was to break the communications (chiefly diplomatic) of other nations. During the Washington Naval Conference, it aided American negotiators by ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Code-breaking
Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown. In addition to mathematical analysis of cryptographic algorithms, cryptanalysis includes the study of side-channel attacks that do not target weaknesses in the cryptographic algorithms themselves, but instead exploit weaknesses in their implementation. Even though the goal has been the same, the methods and techniques of cryptanalysis have changed drastically through the history of cryptography, adapting to increasing cryptographic complexity, ranging from the pen-and-paper methods of the past, through machines like the British Bombes and Colossus computers at Bletchley Park in World War II, to the mathematically advanced compu ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Black Chamber
The Black Chamber (1919–1929), also known as the Cipher Bureau, was the United States' first peacetime cryptanalytic organization, and a forerunner of the National Security Agency. The only prior codes and cypher organizations maintained by the US government had been some intermittent, and always abandoned, attempts by Armed Forces branches prior to World War I. History Headed by Herbert O. Yardley (1889–1958), the Black Chamber was founded in May 1919 following World War I. Yardley had commanded the U.S. Army cryptographic section of Military Intelligence (MI-8) during World War I. MI-8 was disbanded after the war. Jointly funded by the Army and the State Department, the Cipher Bureau was disguised as a New York City commercial code company; it actually produced and sold such codes for business use. Its true mission, however, was to break the communications (chiefly diplomatic) of other nations. During the Washington Naval Conference, it aided American negotiators by ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Room 641A
Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency, as part of its warrantless surveillance program as authorized by the Patriot Act. The facility commenced operations in 2003 and its purpose was publicly revealed in 2006. Description Room 641A is located in the SBC Communications building at 611 Folsom Street, San Francisco, three floors of which were occupied by AT&T before SBC purchased AT&T. The room was referred to in internal AT&T documents as the ''SG3 tudy Group 3Secure Room''. The room measures about and contains several racks of equipment, including a Narus STA 6400, a device designed to intercept and analyze Internet communications at very high speeds. It is fed by fiber optic lines from beam splitters installed in fiber optic trunks carrying Internet backbone traffic. In the analysis of J. Scott Marcus, a former CTO for GTE and a former adviser to the Federal Communications Commission, it has access to ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Clandestine Operations
A clandestine operation is an intelligence or military operation carried out in such a way that the operation goes unnoticed by the general population or specific enemy forces. Until the 1970s, clandestine operations were primarily political in nature, generally aimed at assisting groups or nations favored by the sponsor. Examples include U.S. intelligence involvement with German and Japanese war criminals after World War II. Today these operations are numerous and include technology-related clandestine operations. The bulk of clandestine operations are related to the gathering of intelligence, typically by both people (clandestine human intelligence) and by hidden sensors. Placement of underwater or land-based communications cable taps, cameras, microphones, traffic sensors, monitors such as sniffers, and similar systems require that the mission go undetected and unsuspected. Clandestine sensors may also be on unmanned underwater vehicles, reconnaissance (spy) satellites (s ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]