U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Keeping Your Secrets Secret

NCJ Number
109040
Journal
Security Management Volume: 31 Issue: 2 Dated: (February 1987) Pages: 71-77
Author(s)
S Reddick
Date Published
1987
Length
7 pages
Annotation
Voice encryption is a useful method for preventing eavesdroppers from obtaining a company's valuable information that is transmitted over telephone wires or radio airwaves.
Abstract
An eavesdropper intercepting an encrypted signal hears only bursts of incoherent noise. The encryption transforms analog voice signals into digital signals and rearranges them as they travel over the wire or radio airwaves. This scrambling is reversed at the other end of the network. An eavesdropper must have an identical encryptation device to break into the conversation. Programmable codes called 'keys' can protect encryptations even when the eavesdropper has obtained identical equipment. Changing a 'key' is quick and easy with data encryption products. A telephone with an encryption devise looks and acts like a regular telephone. The government has set standards for encryption design. Purchasers of systems should identify their specific needs in the areas of security, packaging, and performance. Guidelines on making choices and diagrams of sample security systems.