KY-3
   HOME
*



picture info

KY-3
The KY-3 (TSEC/KY-3) is a secure telephone system developed by the U.S. National Security Agency in the early 1960s. It was one of the first widely accepted voice voice encryption systems. The "TSEC" prefix to the model number indicates NSA's Telecommunications Security nomenclature system. It was made by the Bendix Corporation according to specifications of the NSA. According to information on display in 2002 at the NSA's National Cryptologic Museum, the KY-3 provided high fidelity secure voice over special wide-band circuits known as "4-wire dedicated drops", since it used pulse-code modulation encoding for the audio which gave it "high-quality speech". Its overall high power requirements and physical size limited its "tactical" use but gained popularity among executives, diplomats, military leaders and the intelligence community. More than 2,500 units were produced between 1965 and 1967 and it was one of the first telecommunication security devices to use transistors packaged ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Ky-3
The KY-3 (TSEC/KY-3) is a secure telephone system developed by the U.S. National Security Agency in the early 1960s. It was one of the first widely accepted voice voice encryption systems. The "TSEC" prefix to the model number indicates NSA's Telecommunications Security nomenclature system. It was made by the Bendix Corporation according to specifications of the NSA. According to information on display in 2002 at the NSA's National Cryptologic Museum, the KY-3 provided high fidelity secure voice over special wide-band circuits known as "4-wire dedicated drops", since it used pulse-code modulation encoding for the audio which gave it "high-quality speech". Its overall high power requirements and physical size limited its "tactical" use but gained popularity among executives, diplomats, military leaders and the intelligence community. More than 2,500 units were produced between 1965 and 1967 and it was one of the first telecommunication security devices to use transistors packaged ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

STU-III
STU-III (Secure Telephone Unit - third generation) is a family of secure telephones introduced in 1987 by the NSA for use by the United States government, its contractors, and its allies. STU-III desk units look much like typical office telephones, plug into a standard telephone wall jack and can make calls to any ordinary phone user (with such calls receiving no special protection, however). When a call is placed to another STU-III unit that is properly set up, one caller can ask the other to initiate secure transmission. They then press a button on their telephones and, after a 15-second delay, their call is encrypted to prevent eavesdropping. There are portable and militarized versions and most STU-IIIs contained an internal modem and RS-232 port for data and fax transmission. Vendors were AT&T Corporation, AT&T (later transferred to Lucent, Lucent Technologies), RCA (Now L-3 Communications, East) and Motorola. STU-III are no longer in service with the U.S. Government, with t ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


National Cryptologic Museum
The National Cryptologic Museum (NCM) is an American museum of cryptologic history that is affiliated with the National Security Agency (NSA). The first public museum in the U.S. Intelligence Community, NCM is located in the former Colony Seven Motel, just two blocks from the NSA headquarters at Fort George G. Meade in Maryland. The motel was purchased, creating a buffer zone between the high security main buildings of the NSA and an adjacent highway. The museum opened to the public on December 16, 1993, and now hosts about 50,000 visitors annually from all over the world. The NCM is open Tuesday through Saturday, 10am-4pm (hours are extended Wednesdays to 7pm). It is closed on Sundays, Mondays. and all federal holidays, and operates on NSA's emergency/weather closure schedule (i.e. if NSA is closed, the museum is closed as well). The NCM includes a gift store whose operational hours coordinate with the museum's operational schedule (i.e., if the museum is closed altogether, o ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


STU-I
The STU-I, like its successors sometimes known as a "stew phone", was a secure telephone developed by the U.S. National Security Agency for use by senior U.S. government officials in the 1970s. See also *KY-3 *Navajo I * STU-II *STU-III STU-III (Secure Telephone Unit - third generation) is a family of secure telephones introduced in 1987 by the NSA for use by the United States government, its contractors, and its allies. STU-III desk units look much like typical office telephone ... * SCIP References External linksCrypto Museum - STU IDelusion.org - National Cryptologic Museum pictures
National S ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


STU-II
The STU-II (Standard Telephone Unit II) is a secure telephone developed by the U.S. National Security Agency. It permitted up to six users to have secure communications, on a time-shared (e.g.: rotating) basis. It was made by ITT Defense Communications, Nutley, New Jersey. An OEM partner was Northern Telecom. According to information on display in 2005 at the NSA's National Cryptologic Museum, the STU-II was in use from the 1980s to the present. It uses the linear predictive coding algorithm LPC-10 at 2.4 kilobits/second to digitize voice, and the "Key Distribution Center" (KDC) for key management. The display also stated that the STU-II B is the standard narrow band secure telephone. STU-II replaced the STU-I, KY-3 and the Navajo I. The last was a secure telephone in a briefcase, of which 110 were built in the 1980s for use by senior government officials when traveling. The Navaho I also used LPC-10. Some 10 000 STU-II units were produced. External links Delusion.org ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The existence of the NSA was not revealed until 1975. The NSA has roughly 32,000 employees. Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Between then and the end of the Cold War, it became the largest of the U.S. intelligence organizations in terms of pers ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Joint Electronics Type Designation System
The Joint Electronics Type Designation System (JETDS), which was previously known as the Joint Army-Navy Nomenclature System (AN System. JAN) and the Joint Communications-Electronics Nomenclature System, is a method developed by the U.S. War Department during World War II for assigning an unclassified designator to electronic equipment. In 1957, the JETDS was formalized in MIL-STD-196. Computer software and commercial unmodified electronics for which the manufacturer maintains design control are not covered. Applicability Electronic material, from a military point of view, generally includes those electronic devices employed in data processing, detection and tracking (underwater, sea, land-based, air and space), recognition and identification, communications, aids to navigation, weapons control and evaluation, flight control, and electronics countermeasures. Nomenclature is assigned to: * Electronic materiel of military design * Commercial electronic materiel that has been modifi ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Bendix Corporation
Bendix Corporation is an American manufacturing and engineering company which, during various times in its existence, made automotive brake shoes and systems, vacuum tubes, aircraft brakes, aeronautical hydraulics and electric power systems, avionics, aircraft and automobile fuel control systems, radios, televisions and computers. It was also well known for the name ''Bendix'', as used on home clothes washing machines, but never actually made these appliances. History Early history Founder and inventor Vincent Bendix initially began his corporation in a hotel room in Chicago in 1914 with an agreement with the struggling bicycle brake manufacturing firm, Eclipse Machine Company of Elmira, New York. Bendix granted permission to his invention which was described as "a New York device for the starting of explosive motors." This company made a low cost triple thread screw which could be used in the manufacture of other drive parts. By using this screw with the Eclipse Machine Com ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Secure Voice
Secure voice (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of communication types such as radio, telephone or IP. History The implementation of voice encryption dates back to World War II when secure communication was paramount to the US armed forces. During that time, noise was simply added to a voice signal to prevent enemies from listening to the conversations. Noise was added by playing a record of noise in sync with the voice signal and when the voice signal reached the receiver, the noise signal was subtracted out, leaving the original voice signal. In order to subtract out the noise, the receiver need to have exactly the same noise signal and the noise records were only made in pairs; one for the transmitter and one for the receiver. Having only two copies of records made it impossible for the wrong receiver to decrypt the signal. To implement the system, the army contracted Bell Laboratori ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Pulse-code Modulation
Pulse-code modulation (PCM) is a method used to digitally represent sampled analog signals. It is the standard form of digital audio in computers, compact discs, digital telephony and other digital audio applications. In a PCM stream, the amplitude of the analog signal is sampled regularly at uniform intervals, and each sample is quantized to the nearest value within a range of digital steps. Linear pulse-code modulation (LPCM) is a specific type of PCM in which the quantization levels are linearly uniform. This is in contrast to PCM encodings in which quantization levels vary as a function of amplitude (as with the A-law algorithm or the μ-law algorithm). Though ''PCM'' is a more general term, it is often used to describe data encoded as LPCM. A PCM stream has two basic properties that determine the stream's fidelity to the original analog signal: the sampling rate, which is the number of times per second that samples are taken; and the bit depth, which determines the ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Telecommunication
Telecommunication is the transmission of information by various types of technologies over wire, radio, optical, or other electromagnetic systems. It has its origin in the desire of humans for communication over a distance greater than that feasible with the human voice, but with a similar scale of expediency; thus, slow systems (such as postal mail) are excluded from the field. The transmission media in telecommunication have evolved through numerous stages of technology, from beacons and other visual signals (such as smoke signals, semaphore telegraphs, signal flags, and optical heliographs), to electrical cable and electromagnetic radiation, including light. Such transmission paths are often divided into communication channels, which afford the advantages of multiplexing multiple concurrent communication sessions. ''Telecommunication'' is often used in its plural form. Other examples of pre-modern long-distance communication included audio messages, such as coded drumb ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Relay Rack
A 19-inch rack is a standardized frame or enclosure for mounting multiple electronic equipment modules. Each module has a front panel that is wide. The 19 inch dimension includes the edges or "ears" that protrude from each side of the equipment, allowing the module to be fastened to the rack frame with screws or bolts. Common uses include computer servers, telecommunications equipment and networking hardware, audiovisual production gear, and scientific equipment. Overview and history Equipment designed to be placed in a rack is typically described as rack-mount, rack-mount instrument, a rack-mounted system, a rack-mount chassis, subrack, rack cabinet, rack-mountable, or occasionally simply shelf. The height of the electronic modules is also standardized as multiples of or one rack unit or U (less commonly RU). The industry-standard rack cabinet is 42U tall; however, 45U racks are also common. The term ''relay rack'' appeared first in the world of telephony. By 1911, ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]