Secure Mobile Phone

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 16 November 2012

Commander Petraeus' phones

Posted on 13:32 by Unknown
Last week, David Petraeus resigned as director of the Central Intelligence Agency (CIA), after admitting he had an extramarital affair with his biographer Paula Broadwell. This led to many news reports and also many pictures on the internet.

Some of them give a nice look at the telecommunications equipment which general Petraeus used when, from July 2010 to July 2011, he was commander of the International Security Assistance Force (ISAF) in Kabul, Afghanistan:


ISAF Commander Petraeus being interviewed by Paula Broadwell
(Photo: paulabroadwell.com, date unknown)

In this picture we see the following telecommunication devices:

Video conferencing screens
On Petraeus' desk we see two Centric 1700 MXP video teleconferencing screens, made by the Norwegian manufacturer Tandberg. In 2010 this company was bought by Cisco Systems, and so the 1700 MXP screens are often used by US military officials. They are equipped with a HD camera and have a widescreen LCD screen, which operates both as a video conferencing system and PC display.

STE
Left of the personal computer screen we see a Secure Terminal Equipment (STE), made by L3 Communications. The STE is a phone capable of encrypting calls up to the level of Top Secret/SCI. This phone can be used to have a secure line to anyone with a similar device.

IST-2
Right behind the chair of commander Petraeus is an Integrated Services Telephone 2 (IST-2), made by Telecore Inc. This is a so called "red phone", which is part of the Defense Red Switch Network (DRSN), connecting the President, the Secretary of Defense and all mayor US command centers. This is the primary telephone network for military command and control communications.

VoIP phones
In the picture above we see three of four Voice over IP (VoIP) phones: at the right end a Cisco SPA and the other three being phones from the Cisco 7970-series. It's likely each of these phones is part of a separate telephone network. Nowadays many military phone networks use Voice over IP, often with Cisco IP phone sets. These phones have no encryption capability, but their voice data networks can easily be secured with specific network encryptors.
In the picture below we can see al four VoIP phones, neatly aligned on a shelf and with an organizational chart at the left side of them:


General David Petraeus in his office at the ISAF headquarters in Kabul.
(Photo: Adam Ferguson/The New York Times, March 8, 2011)

Printers
Also in this picture we see three printers on a table at the left side of the room. Apparently there are separate printers for different computer networks, in order to keep documents of different classification levels separated.
At the upper left corner of the front of at least the first two printers we can see the colored classification labels: a green sticker for Unclassified materials on the printer in the foreground and a red sticker for materials classified as Secret on the printer in the middle. The third printer seems to have no marking, but we can assume this one is for Top Secret (orange sticker) or Top Secret/SCI (yellow sticker) documents.


This kind of communications equipment is typical for US military commanders in similar positions. Therefore one can quite easily recognize it also on other pictures of American military commanders and command centers. Contrarily, pictures in which we can see the equipment used in Petraeus' last office, that of director of the CIA, are very rare - but we keep looking!


UPDATE February 5, 2013:

A reader of this weblog kindly noticed me of another picture of general Petraeus in his office, with clearly visible another kind of communications device. It's an HH2G Tetrapol handheld radio device, sitting in a desktop adapter, so it can be more or less used like a phone:


General David Petraeus in his office in ISAF headquarters in Kabul, Afghanistan
(Photo: Chris Hondros/Getty Images Europe, October 21, 2010)

The Tetrapol secure voice and data radio network was installed in 2004 by Cogent Defence and Security Networks, the UK operating company of EADS Defence and Communications Systems Group. This trunked Tetrapol ISAF Command Network, with end-to-end security, provides command communications coverage for the NATO Area of Responsibility in the Kabul region.

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in ISAF, IST, Red Phone, STE, VoIP | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • The Ratters - men who spy on women through their webcams
    The woman is visible from thousands of miles away on a hacker's computer.   The hacker has infected her machine with a remote administr...
  • Google Glass Hacked - Everything You See and Hear Transmitted to Anyone
    Google's Glass wearable computer have been hacked so video and audio can be transmitted online to anyone. Hackers have been able to remo...
  • This Week in Spy News
    The chairman of Stow College in Glasgow has resigned after a row over a recorded conversation on a device branded a "spy-pen". ( m...
  • CONTEST (ENDED) - Who Is This Man?
    We have a winner! Congratulations!! Answer below. Clues... • Born 1897. • Died 1973. • Expert wiretapper.  • Good high speed driver.  • Shar...
  • The US classification system
    (Updated: October 12, 2013) Top Level Telecommunications often involve information that has to be kept secret. To ensure that, governments h...
  • When Paranoids Collide they Blow the Whistle on Tea Kettles
    Customs agents in Russia found tea kettles and irons bugged with tiny Spyware chips that exploit WiFi connections , reports a local news out...
  • "1984" Gets a New Look
    via creativity-online.com ... You can't judge a book by its cover, but there's no denying that a thoughtful, bold packaging can mak...
  • Watergate's Next Watergate
    A history professor hopes that a federal court's recent order to release long-sealed Watergate documents will shed light on the motivati...
  • Laser Beam Eavesdropping - In the News Again
    Since the 1970's, stories about laser listeners have periodically popped up in the news. The common thread is their magical ability to e...
  • Spybusters Tip # 723 - Be Smart - Use a Dumb Phone to Thwart Spyware
    Sometimes you just need a dumb phone that can't spy on you.   inKlien Global's tiny phone 6.5mm Ultra Thin AIEK M3 Cool Card Cell Ph...

Categories

  • advice
  • aerial
  • amateur
  • Android
  • App
  • Apple
  • art
  • biometric
  • BlackBerry
  • blackmail
  • Bluetooth
  • Boeing
  • book
  • business
  • BYOD
  • CALEA
  • cartoon
  • cautionary tale
  • CCTV
  • cell phone
  • CIA
  • Classification
  • Clothing
  • computer
  • contest
  • counterespionage
  • Darwin
  • data
  • detection
  • drone
  • dumb
  • eavesdropping
  • email
  • employee
  • encryption
  • ERII
  • espionage
  • extortionography
  • FBI
  • fiber-optic
  • find
  • food
  • FREE
  • fun
  • FutureWatch
  • General Dynamics
  • Germany
  • Gold Phone
  • government
  • GPS
  • GSM
  • Hack
  • historical
  • Hotline
  • humor
  • IAPSC
  • IMCPB
  • Infrared
  • Internet
  • ISAF
  • Israel
  • IST
  • IT
  • just coincidence?
  • KDM
  • keystroke
  • KGB
  • Kremlin
  • laser
  • law
  • lawsuit
  • leaks
  • malware
  • marketing
  • MI6
  • mind reading
  • miscellaneous
  • mores
  • movie
  • nature
  • Netherlands
  • North Korea
  • NSA
  • Obama
  • optics
  • OSS
  • password
  • PI
  • police
  • political
  • poll
  • POTUS
  • PRISM
  • privacy
  • product
  • quiz
  • quote
  • Ra-parents
  • Ray-Gun
  • recording
  • Red Phone
  • religion
  • RFID
  • Russia
  • sabotage
  • satire
  • scam
  • shredder
  • Situation Room
  • social engineering
  • software
  • sports
  • Spy Museum
  • spy school
  • spybot
  • spycam
  • spyware
  • SpyWarn
  • statistics
  • STE
  • steganography
  • STU-II
  • STU-III
  • surveillance
  • survey
  • telephone
  • TEMPEST
  • Tips
  • toy
  • tracking
  • trade secret
  • TSCM
  • Twitter
  • UMTS
  • USA
  • USB
  • USSR
  • Vatican
  • VoIP
  • voyeurism
  • Watergate
  • weird
  • White House
  • Wi-Fi
  • Wireless
  • wiretapping
  • X-Ray Vision

Blog Archive

  • ►  2013 (455)
    • ►  November (47)
    • ►  October (53)
    • ►  September (31)
    • ►  August (50)
    • ►  July (50)
    • ►  June (47)
    • ►  May (35)
    • ►  April (40)
    • ►  March (29)
    • ►  February (33)
    • ►  January (40)
  • ▼  2012 (84)
    • ►  December (33)
    • ▼  November (33)
      • The Smartphone Turns 20
      • Security Alert: Patch Your Samsung Printers
      • Everything You Need to Know About Shredding Sensit...
      • Police Strip Cut Shreds Used as Parade Confetti
      • TSCM Bug Sweeps: When, and When Not To - Part I
      • Spying Accusations Stoke America's Cup Rivalries
      • Is Your Cell Phone Protected by the 4th Amendment?
      • Mannequin Spies - Will Dummy Shoppers Revolt?
      • Bilateral Hotlines Worldwide
      • Patent Wars - VoIP Wiretaps
      • Spy College... for your 21st Century careers
      • From our "Persistence is Futile" file...
      • Student Balks at Stalk (Psst. Just make the tags m...
      • Holiday Shopping Safety Infographic
      • Defending Privacy at the U.S. Border: A Guide for ...
      • The Wall Street Wiretap Sword Of Damocles
      • Researchers Find iOS is Rich Target for Spying Sof...
      • Cyber Espionage Infographic
      • Commander Petraeus' phones
      • City Hall Fingered for Eavesdropping - Claims 'Ina...
      • What the Well Dressed Spy Wants for Christmas
      • Scientific Breakthrough Gives Paranoids Another Th...
      • 2012 China Report Released... no surprises.
      • This Week in Spy News
      • Email Security - The Petraeus Case
      • Watergate's Next Watergate
      • Get Alerts from your Local Police & 5,000 other Pu...
      • More iPhone Security Tips
      • Government Strength Mobile Spyware
      • Meet the Superheroes Fighting for Your Right to Mo...
      • A Salute to Our Native American Code Talkers
      • Security Quote of the Day
      • How to Surf the Web in Secret
    • ►  October (12)
    • ►  June (2)
    • ►  May (2)
    • ►  February (1)
    • ►  January (1)
Powered by Blogger.

About Me

Unknown
View my complete profile