Ste secure phone manual




















The SDD provides protection for facsimiles, e-mail, and computer communications. The "keying stream" is a polymorphic regenerating mathematic algorithm which takes a initialization key and mathematically morphs it into a bit stream pattern.

A portion of the "keying stream" are then mixed back into to the original key, and process repeated. The results is a pseudo-random bit stream that if properly implemented is extremely difficult but not impossible to decrypt.

Even the most sophisticated cryptographic algorithm can be easily expressed in the form of a simple equation in boolean algebra, with the "initialization keys" being used to define the initial key generator settings, and to provide morphing back to the equation. While STU-III audio quality could be better, conversations can take place at a distance over an insecure phone system that would otherwise require a face to face meeting.

While the quality can be improved by using a purely digital STE, the communications infrastructure is rarely able to support their widespread usage. If you are interested in purchasing any of the equipment listed on this page then please contact us. Granite Island Group offers a full line of communications and technical security products ranging from inexpensive body worn bug detectors and encryption equipment, to full TSCM deployment kits suitable for high threat corporate and diplomatic TSCM inspections.

Our prices and terms are very competitive, and we offer only the highest quality equipment available in the industry no Spy Shop toys. While most individual conversations are unclassified in themselves, sensitive information can be gathered through analysis of daily routine voice communications. Examples of sensitive information that require protection are logistics, new systems acquisition, contract information, executive movements, and private information concerning personnel matters.

The CSD is a full featured and highly secure telephone for government applications. It operates in full and half duplex modes, over any public or government switched telephone network, the Inmarsat B and M satellite networks, AMPs cellular networks, as well as radio channels. It is compatible with CSD secure telephone system. The CSD has a variety of security layers for optimum communications protection.

A new key is negotiated at each communications session using public key encryption, while private key system adds message authentication and certification. Complete security is confirmed when the receiving security device is identified and indicates that the intended recipient received the call. An easy to read display also shows if the call is or is not protected. Key generation, transport, storage and access control are centrally managed via Windows TM based key management system - the KCA For optimum security, serial numbers are assigned to each telephone unit and key bank.

Only users with a crypto ignition key matching the serial number programmed into the CSD can operate the secure unit. Additionally, a secure call can only be established if the sending and receiving devices are authorized to communicate. The CSD has all the telephone features needed by busy executives. Combines secure voice and secure data in one convenient product.

Provides superior voice quality. Protects phone calls, facsimiles, electronic mail and computer communications. Models and S for U. Government use only can control access to your computer or fax machine and can screen out unauthorized phone calls. On the other hand the Model P and F are not Controlled Classified COMSEC items and as such they are perfect for government applications where classified information is not being protected, but a high level of privacy is still required.

An optional cellular briefcase for remote operation is also available. The is the classic government STUIII design suitable for "sensitive but unclassified" information , which we can normally ship right from stock. This product is the ideal solution for most corporate and government requirements. Simply plug in the power cord and the telephone jack. This full function unit works at speeds of 2.

The unit can be controlled directly or remotely from a PC or computer terminal. Unauthorized calls are terminated without compromising information. Normally factory stock and available for immediate shipment. With a push of a button, the phone call is protected by Bell Labs high grade cryptographic algorithm and public key encryption. The CSD generates and distributes keys using negotiated public key encryption. With public key technology, manual key loading and maintenance is not necessary, thus enabling immediate communications protection.

Every time the secure button is pushed, the CSD generates a new key. This key is unique to the session and to the two communicating CSD s. To further secure the call, random variables derived from the unique key are displayed. By comparing the variables, the sender and receiver can detect if the public key negotiation is being tampered with or spoofed. Connection to the Handset of a Typical Telephone By snapping select modules into the rear of the CSD , universal telephone compatibility is achieved.

Users can keep the phone of their choice and operate with analog and digital telephone lines and switches. Voice clarity during the encrypted call provides speaker recognition. Superior voice quality is the result of a sophisticated speech encoding algorithm developed especially for the CSD by Bell Laboratories. The CSD is as small as a hand-held calculator and extremely lightweight. It can be easily carried in a briefcase for use at home or while traveling - even internationally.

The CSD connects to the telephone handset and not to the telephone network. As a result, it can be used conveniently, worldwide, without global network approvals. One-button operation to toggle between secure and non-secure calls.

By pressing a button, the user can "go secure" and protect sensitive information shared in the conversation. Small, lightweight and portable. Plug-in modules provide compatibility with phones used at work, at home or on the road. All PABX features of the existing telephone system will operate as before.

This unit works well for businessmen who travel and need a compact unit they can use on the phone in their hotel room. Great for executive travel. However, for improved audio quality and interoperability the is preferred. Model Integrated into a Cellular System Also, available in a transportable cellular configuration Model Works as a button phone for voice calls - and as a security device for your most sensitive voice calls and data transmissions.

Only available as a special order item. Links up to 16 secure telephones on a single call. Components include special software and PC-based conferencing and bridging boards. Optional software package allows you to broadcast data and facsimiles. This is a special order item. Displays sharp, motion images - up to eight frames per second with colors. The secure speaker-phone or an external camera or monitor can open your conversation to others in the room.

Transmits still images from a video camera or scanner as high-resolution graphics. Unique coding and compression techniques eliminate the smearing that's common to many low bandwidth video-conferencing units. The inputs and outputs on the unit also allow connection of auxiliary monitors, cameras, and video recorders. Perfect for field reports, teleconferences, and similar activities.

Can be ordered with a four-inch or six-inch screen. Electronic keys verify your fax is sent where you intended. Establishes a protected, closed network, and eliminates the problem of transmission to wrong numbers. Can be attached between any Group 3 fax machine and phone jack. This is a scrambler that is installed between the telephone line and the fax machine, it allows regular unsecure and secure faxes to be received on the same machine. Great for Executive Travel. Touch-screen display makes the product simple to operate.

Electronic mailbox Model stores facsimiles until you are ready to retrieve them with your personal PIN number. Generates an audit trail of all facsimiles sent and received. The CSD enables highly secure and automatic transmission of fax messages. Once received the messages can be stored securely in optional non-volatile memory until the authorized recipient enters their PIN code.

Compact and easy to use, the CSD operates with any Group 3 fax machine. Under public key exchange, a new random key is produced with each fax transmission. This session key is unique to the two communicating parties. No other unit can generate this key. Open networks allow any two people with the CSD system to send secure faxes. No previous keying relationship is required. Open networks are ideal for industrial use, where an ever-changing number of companies need to communicate with each other.

Closed networks support government and other high security applications, where only specified people are allowed to send and receive sensitive information. The CSD adds a network private key to the public key exchange to form a closed network. Only machines with the same network key can communicate, and each unit can store up to 20 network keys.

The CSD is easily configured to meet each organization's preferences via a touch-screen display. A password is required for administrator entry and all configuration settings are protected by this password. A wide variety of send and receive configuration options are available. Sending a secure fax with the CSD is as easy as sending an unprotected one.

In fact, the CSD can send faxes without being touched. It operates automatically and in realtime, avoiding the need for operator training and intervention. The CSD is also compatible with all Group 3 fax machines. It simply attaches between the fax machine and the wall telephone jack. Once the power supply is connected and the administrator sets basic configuration options, secure faxing is possible.

The electronic mailbox provides internal security by eliminating the danger of unattended, confidential fax messages in the fax output tray. The sender or receiver of an encrypted fax message can direct the fax to be stored in encrypted form in the receiving unit's mailbox.

Stored messages are released deciphered and printed only after the entry of a valid Personal Identification Number PIN. The CSD supports up to 50 mailboxes and pages of text.

A high-capacity memory upgrade is also available. Mailbox memory is protected and retained in the event of power outages. Weight: CSD 2. Rugged housing features shielded design and special mounting to resist damage during transport and use in the field. One product offers cellular capability for both secure voice and data. Gives you wireless operation for facsimiles, electronic mail and computer communications. This has been replaced by the CSD see below. Uses state-of-the-art encryption technology.

An audible tone and easy-to-read display let you know your call is protected. Offers superior voice quality. Optional handset modules allow you to use the security features of the with phones you use at the office, at home or wherever you travel.

This is a standard cellular telephone, and a Series scrambler in one case. Device syncing is necessary for all services to operate properly, and to have the latest builds and updates. If you want to force-sync your Secure Phone, tap right next to the timestamp of your last successful sync. There is a limit to failed sync attempts.

However, if you fail to sync your device more than the preset value, Secure Phone wipes its storage! This value is configured in SAS. Contact your SAS administrator or distributor to learn more about the number of permitted failed sync attempts of your Secure Phone. The Secure Phone User guide includes a collection of articles. Follow this link for more info. To quickly jump to topics like adding contacts and communicating safely with people, check out these Getting started articles and learn how to:.

Prerequisites Before you get started with Secure Phone, you need: Secure Phone device Secure Phone subscription Internet connection Your distributor is responsible for setting up your account subscription and delivering to you your Secure Phone device. Secure Phone Enrollment The Secure Phone enrollment is the process when your device is configured with your account and settings. When signing in for the first time or after a device wipe: Turn on the device and select your preferred language.

Tap to see the list of available languages: Select your Internet connectivity. If you have a SIM card, select Mobile connection and proceed. For mobile data connectivity, we recommend that you subscribe to the Secure SIM international unlimited data plan. We strongly recommend you to use a trusted Wi-Fi network for all internet connections.

When the device connects to the Internet tap the Next button to continue. Was this article helpful? Yes No. The display is critical because each party uses it to authenticate the distant party. For this reason, the identification information is also referred to as "authentication data. The Command Authority defines the DAO description, which specifies the terminal user's parent department, agency, or organization. The DAO description may be one or two lines:.

This line is displayed on the terminal of the distant party throughout a secure call. It is displayed briefly to the distant user during the secure call setup. The User Representative next enters the second part of the user identification: the Additional Identification Data, or "free form" information.

The STU-III user determines this information, such as a specific location, section, position title , or project, even the user's name, and notifies the User Representative. In all, three lines are available for authentication data. If the Command Authority has already specified a two-line DAO description, then there can be only one line of free form information:. See inside back cover for further information. You'll find some obvious differences, such as price, and others that are more subtle.

Certify your facility's eligibility to the vendor and provide the following:. Tailor the SPP to your specific operation. Remember that although the user will be briefed on the use of the STU-III and the security precautions for the unit, the user's primary source of information will be the SPP. To get you started, the contents might include:. If there is any difficulty, call the EKMS immediately at Take delivery of the additional KSDAs, if any, that you ordered from a vendor.

No special protection requirements apply to these blank devices, which will become CIKs. Once they become CIKs, however, they are locally accountable items. Just follow the directions the vendor provides. Attach the handset cord to the handset and main unit. Then insert the telephone cord into an RJ jack household telephone jack. Finally, supply the power plug the unit into a V wall outlet. That's all there is to it. Specific data port and computer security requirements are provided by DIS.

To test the nonsecure operation of each unit, place a nonsecure call. Once you start the keying sequence you will have from three to ten minutes to complete the sequence and make your first CIK. If this occurs, you will lose your seed key. Remember, there is ample time to complete the keying process.

Do not rush. After checking the nonsecure operation of the unit s to be filled, load operational key s , if any, into the appropriate STU-III s. For each keyset to be established within the STU-III terminal, follow the same procedures provided for loading seed key.

While it is not necessary to call the EKMS rekey number , you are urged to do so. When using the yellow card, ensure that both sides are completed. Local CIK account-ability records must be retained until the terminal s is zeroized. Destruction reports will seldom be required. Protect each keyed STU-III unit that contains key and that has a CIK inserted in it at the highest security level of the information that the operational key can protect. The briefing must cover at least the following:.

Substantial amounts of classified and sensitive unclassified information have leaked to our adversaries over nonsecure telecommunications circuits.



0コメント

  • 1000 / 1000