Navajo-I
   HOME

TheInfoList



OR:

The Navajo I is a
secure telephone A secure telephone is a telephone that provides Secure voice, voice security in the form of end-to-end encryption for the telephone call, and in some cases also the mutual authentication of the call parties, protecting them against a man-in-the-mi ...
built into a
briefcase A briefcase is a narrow hard-sided box-shaped bag or case used mainly for carrying papers and equipped with a handle. Lawyers commonly use briefcases to carry briefs to present to a court, hence the name. Businesspeople and other white collar ...
that was developed by the U.S.
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
. According to information on display in 2002 at the NSA's
National Cryptologic Museum The National Cryptologic Museum (NCM) is an American museum of cryptologic history that is affiliated with the National Security Agency (NSA). The first public museum in the U.S. Intelligence Community, NCM is located in the former Colony Sev ...
, 110 units were built in the 1980s for use by senior government officials when traveling. It uses the
linear predictive coding Linear predictive coding (LPC) is a method used mostly in audio signal processing and speech processing for representing the spectral envelope of a digital signal of speech in compressed form, using the information of a linear predictive model. ...
algorithm LPC-10 at 2.4 kilobits/second. The name is most likely a reference to the
Navajo The Navajo (; British English: Navaho; nv, Diné or ') are a Native American people of the Southwestern United States. With more than 399,494 enrolled tribal members , the Navajo Nation is the largest federally recognized tribe in the United ...
code talkers A code talker was a person employed by the military during wartime to use a little-known language as a means of secret communication. The term is now usually associated with United States service members during the world wars who used their k ...
of
World War II World War II or the Second World War, often abbreviated as WWII or WW2, was a world war that lasted from 1939 to 1945. It involved the vast majority of the world's countries—including all of the great powers—forming two opposin ...
.


Sources

Display labels fro


See also

*
STU-II The STU-II (Standard Telephone Unit II) is a secure telephone developed by the U.S. National Security Agency. It permitted up to six users to have secure communications, on a time-shared (e.g.: rotating) basis. It was made by ITT Defense Communi ...
* SCIP National Security Agency encryption devices {{crypto-stub