Donate $25 for two DVDs of the Cryptome collection of files from June 1996 to the present

Natsios Young Architects


16 January 2010

Related:

kahn-tapping.htm      Tapping Computers by David Kahn                  January 4, 2010
kahn-crypto.htm       Cryptology Goes Public by David Kahn             January 3, 2010


Study of Vulnerability of Electronic Communication Systems to Electronic Interception

MITRE Corporation
Mclean, VA
Matrek Division

January 1977

ABSTRACT

This report is a summary of the findings of a study performed for the Office of Telecommunications Policy, Executive Office of the President, by The MITRE Corporation, to investigate the vulnerability of commonly available electronic communications to unauthorized interception. Common and specialized carrier and privately-owned communications systems were studied. Various forms of communication such as analog and digital communications carried by dedicated service and switched service systems were analyzed. The transmission modes considered were terrestrial and satellite microwave systems, mobile radio systems and wire and cable (multi-pair and coaxial) systems. The capability required to target a specific person's or corporation's communications and extract the information content of these communications was addressed.

Study of Vulnerability of Electronic Communication Systems to Electronic Interception. Volume 1
NTIS PB264447

This report consists of two volumes. Volume I presents the general findings and conclusions of the study. Technical details supporting the findings of Volume I are presented in appendices in Volume II.

http://cryptome.org/interception-study-01.zip (PDF, 200 pp, 10MB)

Study of Vulnerability of Electronic Communication Systems to Electronic Interception. Volume 2
NTIS PB264448

This document is Volume II of a two-volume report. Volume I presents the analyses, a summary of findings and the conclusions of the study. This volume contains three appendices that present additional descriptive background information and the detailed derivations of some of the analyses discussed in Volume I. The descriptive material is given to indicate the variety and complexity of communication systems confronting the interceptor. It also demonstrates the level of sophistication required of potential interceptors.

http://cryptome.org/interception-study-02.zip (PDF, 150 pp, 6.6MB)