![]()
|
||
16 January 2010 Related: kahn-tapping.htm Tapping Computers by David Kahn January 4, 2010 kahn-crypto.htm Cryptology Goes Public by David Kahn January 3, 2010
Study of Vulnerability of Electronic Communication Systems to Electronic Interception
MITRE Corporation January 1977 ABSTRACT This report is a summary of the findings of a study performed for the Office of Telecommunications Policy, Executive Office of the President, by The MITRE Corporation, to investigate the vulnerability of commonly available electronic communications to unauthorized interception. Common and specialized carrier and privately-owned communications systems were studied. Various forms of communication such as analog and digital communications carried by dedicated service and switched service systems were analyzed. The transmission modes considered were terrestrial and satellite microwave systems, mobile radio systems and wire and cable (multi-pair and coaxial) systems. The capability required to target a specific person's or corporation's communications and extract the information content of these communications was addressed.
Study of Vulnerability of Electronic Communication Systems to Electronic
Interception. Volume 1 This report consists of two volumes. Volume I presents the general findings and conclusions of the study. Technical details supporting the findings of Volume I are presented in appendices in Volume II. http://cryptome.org/interception-study-01.zip (PDF, 200 pp, 10MB)
Study of Vulnerability of Electronic Communication Systems to Electronic
Interception. Volume 2 This document is Volume II of a two-volume report. Volume I presents the analyses, a summary of findings and the conclusions of the study. This volume contains three appendices that present additional descriptive background information and the detailed derivations of some of the analyses discussed in Volume I. The descriptive material is given to indicate the variety and complexity of communication systems confronting the interceptor. It also demonstrates the level of sophistication required of potential interceptors. http://cryptome.org/interception-study-02.zip (PDF, 150 pp, 6.6MB)
|