[ Pobierz całość w formacie PDF ]
.Nonetheless, as a result of theintelligence center's releasing raw intelligence on call-signs, rather than finished intelligence on thelocations of forces, the Germans achieved their purpose.The British fleet delayed sailing and thebattle, which might have been a major British victory, was indecisive (Beesley 1977).26.(p.93) In 1961, William Martin and Bernan Mitchell, two NSA cryptanalysts, defected toMoscow and gave a press conference in which they revealed interception by the US of its allies'communications.According to David Kahn, the loss of intelligence was felt immediately (Kahn1967, p.694).27.(p.94) In the mid 1970s a panel headed by Nelson Rockefeller determined concluded that theSoviets were intercepting conversations on microwave telephone channels from Capitol Hill.Eventhough congressmen were not supposed to discuss classified information over their telephones, theintercepted information, when taken in aggregate, has tremendous intelligence potential.It has beenspeculated that the Soviet activity was detected because the volume of traffic intercepted wassufficient to permit correlations between fluctuation in the Capitol Hill traffic and communicationsfrom the Soviet Embassy to Moscow to be observed.28.(p.94) Bobby Inman remarked in an informal discussion after his talk at AFCEA West inAnaheim, California on January 8, 1981 that NSA's product had never been better.29.(p.94) Speaking at IEEE Wescon in 1980, Robert Morris (then at Bell Labs and later ChiefScientist of the National Computer Security Center) said: "We are just leaving a period of relativesanity in cryptography that began shortly after the First World War.During that time people spoke ofcryptosystems that were secure for hours, days, weeks, months, and sometimes, years.Before it andafter it, they spoke of cryptosystems that were unbreakable."30.(p.94) In the 1980s, for example, NSA built two new operations buildings, a new research andengineering building, a chip fabrication facility, and two advanced laboratories away from FortMeade to be operated by a contractor.31.(p.95) Kim Philby is believed to have had access to information on the Venona program; theSoviets would thus have learned about it soon after it began.32.(p.95) This laboratory is the subject of Aleksandr Solzhenitsyn's novel The First Circle (1968)and of a later memoir by Lev Kopelev (who was Rubin in the novel).It is Kopelev (1983, pp.52-55)who discusses the remarkable technique of assessing the security of mosaic or two-dimensional (timeand frequency) voice scramblers they were developing by printing out a sonogram (a plot of energyand frequency over time) and measuring the time it took to solve the sonogram as though it were ajigsaw puzzle and reassemble it into one representing human voice.In The First Circle, which takes place around Christmas 1948, Solzhenitsyn and his fellow workersare under the gun from Stalin to deliver "secret telephony" within about six months.The year I read itwas 1974.That year, digitized speech (pre-requisite to high-quality secret telephony or as we call it"secure voice") was the main topic at the ARPA Principal Investigators' Conference.-WD33.(p.97) In the 1980s, US companies were not permitted to export optical-fiber communicationssystems to the USSR, presumably on the ground that communications carried by fiber would replaceradio communications and could not be intercepted.34.(p.98) The raw data rate of the V.fast standard is 28 kilobits-per-second, but it incorporates real-time data compression and can often achieve effective throughput of 200 kbps-far more that isavailable on many current leased line networks.35.(p.98) The difficulty of separating the two signals in the communication of autocancellingmodems is a function of the size of the constellation, the number of combinations of amplitude andphase used in communication.V26ter uses four points, V32bis uses 32 and the newly introducedV.fast uses 64.36.(p.98) Much of dynamic routing technology was developed for another purpose: it increases thesurvivability of networks against direct attack, a phenomenon that occurs primarily, though notentirely, during open hostilities.37.(p.99) AT&T developed a specialized cryptographic device for protecting signaling channels(Myers 1979; Brickell and Simmons 1983, pp.4-5).38.(p [ Pobierz całość w formacie PDF ]
zanotowane.pl doc.pisz.pl pdf.pisz.pl odbijak.htw.pl
.Nonetheless, as a result of theintelligence center's releasing raw intelligence on call-signs, rather than finished intelligence on thelocations of forces, the Germans achieved their purpose.The British fleet delayed sailing and thebattle, which might have been a major British victory, was indecisive (Beesley 1977).26.(p.93) In 1961, William Martin and Bernan Mitchell, two NSA cryptanalysts, defected toMoscow and gave a press conference in which they revealed interception by the US of its allies'communications.According to David Kahn, the loss of intelligence was felt immediately (Kahn1967, p.694).27.(p.94) In the mid 1970s a panel headed by Nelson Rockefeller determined concluded that theSoviets were intercepting conversations on microwave telephone channels from Capitol Hill.Eventhough congressmen were not supposed to discuss classified information over their telephones, theintercepted information, when taken in aggregate, has tremendous intelligence potential.It has beenspeculated that the Soviet activity was detected because the volume of traffic intercepted wassufficient to permit correlations between fluctuation in the Capitol Hill traffic and communicationsfrom the Soviet Embassy to Moscow to be observed.28.(p.94) Bobby Inman remarked in an informal discussion after his talk at AFCEA West inAnaheim, California on January 8, 1981 that NSA's product had never been better.29.(p.94) Speaking at IEEE Wescon in 1980, Robert Morris (then at Bell Labs and later ChiefScientist of the National Computer Security Center) said: "We are just leaving a period of relativesanity in cryptography that began shortly after the First World War.During that time people spoke ofcryptosystems that were secure for hours, days, weeks, months, and sometimes, years.Before it andafter it, they spoke of cryptosystems that were unbreakable."30.(p.94) In the 1980s, for example, NSA built two new operations buildings, a new research andengineering building, a chip fabrication facility, and two advanced laboratories away from FortMeade to be operated by a contractor.31.(p.95) Kim Philby is believed to have had access to information on the Venona program; theSoviets would thus have learned about it soon after it began.32.(p.95) This laboratory is the subject of Aleksandr Solzhenitsyn's novel The First Circle (1968)and of a later memoir by Lev Kopelev (who was Rubin in the novel).It is Kopelev (1983, pp.52-55)who discusses the remarkable technique of assessing the security of mosaic or two-dimensional (timeand frequency) voice scramblers they were developing by printing out a sonogram (a plot of energyand frequency over time) and measuring the time it took to solve the sonogram as though it were ajigsaw puzzle and reassemble it into one representing human voice.In The First Circle, which takes place around Christmas 1948, Solzhenitsyn and his fellow workersare under the gun from Stalin to deliver "secret telephony" within about six months.The year I read itwas 1974.That year, digitized speech (pre-requisite to high-quality secret telephony or as we call it"secure voice") was the main topic at the ARPA Principal Investigators' Conference.-WD33.(p.97) In the 1980s, US companies were not permitted to export optical-fiber communicationssystems to the USSR, presumably on the ground that communications carried by fiber would replaceradio communications and could not be intercepted.34.(p.98) The raw data rate of the V.fast standard is 28 kilobits-per-second, but it incorporates real-time data compression and can often achieve effective throughput of 200 kbps-far more that isavailable on many current leased line networks.35.(p.98) The difficulty of separating the two signals in the communication of autocancellingmodems is a function of the size of the constellation, the number of combinations of amplitude andphase used in communication.V26ter uses four points, V32bis uses 32 and the newly introducedV.fast uses 64.36.(p.98) Much of dynamic routing technology was developed for another purpose: it increases thesurvivability of networks against direct attack, a phenomenon that occurs primarily, though notentirely, during open hostilities.37.(p.99) AT&T developed a specialized cryptographic device for protecting signaling channels(Myers 1979; Brickell and Simmons 1983, pp.4-5).38.(p [ Pobierz całość w formacie PDF ]