Are you over 18 and want to see adult content?
4
More Annotations
![A complete backup of urbanoutfitters.com](https://www.archivebay.com/archive2/21d99d18-23be-453b-8a0b-303651c75fbd.png)
A complete backup of urbanoutfitters.com
urbanoutfitters.com
Are you over 18 and want to see adult content?
1
![A complete backup of marketing-pr.biz](https://www.archivebay.com/archive2/624f9954-472d-450c-a49b-0d925c99e751.png)
A complete backup of marketing-pr.biz
marketing-pr.biz
Are you over 18 and want to see adult content?
5
Favourite Annotations
4
![A complete backup of eiga.com/news/20200210/20/](https://www.archivebay.com/archive2/c1d87a32-6d28-445f-9242-794f86be115b.png)
A complete backup of eiga.com/news/20200210/20/
eiga.com/news/20200210/20/
Are you over 18 and want to see adult content?
![A complete backup of www.cbssports.com/nba/news/warriors-vs-lakers-score-andrew-wiggins-golden-state-debut-marks-fresh-start-for](https://www.archivebay.com/archive2/c75a0969-c846-43f1-a887-43015132b4a6.png)
A complete backup of www.cbssports.com/nba/news/warriors-vs-lakers-score-andrew-wiggins-golden-state-debut-marks-fresh-start-for
www.cbssports.com/nba/news/warriors-vs-lakers-score-andrew-wiggins-golden-state-debut-marks-fresh-start-for-maligned-former-top-pick/
Are you over 18 and want to see adult content?
5
Text
ELECTROSPACES.NET
The Second Party partners of the NSA are the signals intelligence agencies of the United Kingdom, Canada, Australia and New Zealand. These five countries are also known as the Five Eyes. Their SIGINT systems are highly integrated and the partners are not supposed to spy on each other. Canada Information paper: NSA Intelligence Relationship with Canada's CSEC, April 3, 2013 ELECTROSPACES.NET: THE US CLASSIFICATION SYSTEM Exceptionally Controlled Information (ECI) This sub-control system protects highly sensitive information and sources and contains compartments, which are identified by a classified codeword. In the classification line there's a three-letter abbreviation ELECTROSPACES.NET: THE BRITISH CLASSIFICATION MARKING STRAP The STRAP codeword itself is not classified. Some intelligence information, handled within the STRAP System, require more stringent protection than others. To assure this, there are three levels of STRAP protection. These levels are designated, in ascending order of sensitivity and, hence, access control: STRAP 1, STRAP 2 and STRAP 3. ELECTROSPACES.NET: SIGINT ACTIVITY DESIGNATORS (SIGADS) SIGINT Activity Designators (SIGADs) A SIGINT Activity Designator (or SIGAD) is a alphanumeric designator which identifies a facility that is used for collecting Signals Intelligence (SIGINT). These facilities have many different forms, ranging from satellite intercept stations, spy ships and satellites, to sites where internet cables are tapped. ELECTROSPACES.NET: NSA'S ORGANIZATIONAL DESIGNATIONS NSA's organizational designations. (Updated: April 16, 2021) After providing lists of NSA-related codenames, abbreviations and SIGADs, we now publish a list of the designations of the numerous divisions and units of the NSA organization itself. Unlike other intelligence agencies such as CIA or DIA, NSA never disclosed its internal ELECTROSPACES.NET: FAIRVIEW: COLLECTING FOREIGN FAIRVIEW: Collecting foreign intelligence inside the US. (Updated: April 19, 2021) On August 15, The New York Times and Pro Publica published a story in which the big US telecommunications company AT&T was identified as a key partner of the NSA. Interesting details about this cooperation and the cable tapping were already in the 2008 bookThe
ELECTROSPACES.NET: A NEW SECURE PHONE FOR OUTSIDE THE Meanwhile this type of Cisco telephones is about 15 years old, so the replacement may not come as a surprise. It seems that with the modified Cisco IP Phone 8841 all the old phone sets for secure and non-secure calls, used both inside and outside the White House, have now been replaced by new devices from Cisco's 8800-series. ELECTROSPACES.NET: AN NSA EAVESDROPPING CASE STUDY An NSA eavesdropping case study. On September 1, the popular Brazilian television news magazine Fantástico reported about an NSA operation for wiretapping the communications of the presidents of Mexico and Brazil. Fantástico is part of the Globo network, which already disclosed various top secret NSA presentations last July. ELECTROSPACES.NET: NSA STILL USES THE UMBRA COMPARTMENT NSA still uses the UMBRA compartment for highly sensitive intercepts. Three days ago, on July 5, 2014, The Washington Post published some of the most important stories from the Snowden-leaks so far. It revealed that Snowden did had access to the content of data collected under FISA and FAA authority - a fact that had been kept secret until now. ELECTROSPACES.NET: HOW NSA TARGETED CHANCELLOR MERKEL'S How NSA targeted chancellor Merkel's mobile phone. (Updated: June 28, 2016) Last week, the German weekly Der Spiegel revealed that NSA intercepted the mobile phone of the German chancellor Angela Merkel. Although most details were not known yet, the fact itself caused a severe crisis in the relationship between the United States andGermany.
ELECTROSPACES.NET
The Second Party partners of the NSA are the signals intelligence agencies of the United Kingdom, Canada, Australia and New Zealand. These five countries are also known as the Five Eyes. Their SIGINT systems are highly integrated and the partners are not supposed to spy on each other. Canada Information paper: NSA Intelligence Relationship with Canada's CSEC, April 3, 2013 ELECTROSPACES.NET: THE US CLASSIFICATION SYSTEM Exceptionally Controlled Information (ECI) This sub-control system protects highly sensitive information and sources and contains compartments, which are identified by a classified codeword. In the classification line there's a three-letter abbreviation ELECTROSPACES.NET: THE BRITISH CLASSIFICATION MARKING STRAP The STRAP codeword itself is not classified. Some intelligence information, handled within the STRAP System, require more stringent protection than others. To assure this, there are three levels of STRAP protection. These levels are designated, in ascending order of sensitivity and, hence, access control: STRAP 1, STRAP 2 and STRAP 3. ELECTROSPACES.NET: SIGINT ACTIVITY DESIGNATORS (SIGADS) SIGINT Activity Designators (SIGADs) A SIGINT Activity Designator (or SIGAD) is a alphanumeric designator which identifies a facility that is used for collecting Signals Intelligence (SIGINT). These facilities have many different forms, ranging from satellite intercept stations, spy ships and satellites, to sites where internet cables are tapped. ELECTROSPACES.NET: NSA'S ORGANIZATIONAL DESIGNATIONS NSA's organizational designations. (Updated: April 16, 2021) After providing lists of NSA-related codenames, abbreviations and SIGADs, we now publish a list of the designations of the numerous divisions and units of the NSA organization itself. Unlike other intelligence agencies such as CIA or DIA, NSA never disclosed its internal ELECTROSPACES.NET: FAIRVIEW: COLLECTING FOREIGN FAIRVIEW: Collecting foreign intelligence inside the US. (Updated: April 19, 2021) On August 15, The New York Times and Pro Publica published a story in which the big US telecommunications company AT&T was identified as a key partner of the NSA. Interesting details about this cooperation and the cable tapping were already in the 2008 bookThe
ELECTROSPACES.NET: A NEW SECURE PHONE FOR OUTSIDE THE Meanwhile this type of Cisco telephones is about 15 years old, so the replacement may not come as a surprise. It seems that with the modified Cisco IP Phone 8841 all the old phone sets for secure and non-secure calls, used both inside and outside the White House, have now been replaced by new devices from Cisco's 8800-series. ELECTROSPACES.NET: AN NSA EAVESDROPPING CASE STUDY An NSA eavesdropping case study. On September 1, the popular Brazilian television news magazine Fantástico reported about an NSA operation for wiretapping the communications of the presidents of Mexico and Brazil. Fantástico is part of the Globo network, which already disclosed various top secret NSA presentations last July. ELECTROSPACES.NET: NSA STILL USES THE UMBRA COMPARTMENT NSA still uses the UMBRA compartment for highly sensitive intercepts. Three days ago, on July 5, 2014, The Washington Post published some of the most important stories from the Snowden-leaks so far. It revealed that Snowden did had access to the content of data collected under FISA and FAA authority - a fact that had been kept secret until now. ELECTROSPACES.NET: HOW NSA TARGETED CHANCELLOR MERKEL'S How NSA targeted chancellor Merkel's mobile phone. (Updated: June 28, 2016) Last week, the German weekly Der Spiegel revealed that NSA intercepted the mobile phone of the German chancellor Angela Merkel. Although most details were not known yet, the fact itself caused a severe crisis in the relationship between the United States andGermany.
ELECTROSPACES.NET: THE US CLASSIFICATION SYSTEM Exceptionally Controlled Information (ECI) This sub-control system protects highly sensitive information and sources and contains compartments, which are identified by a classified codeword. In the classification line there's a three-letter abbreviation ELECTROSPACES.NET: WHAT THE NSA PROVIDES TO ITS FOREIGN The cooperation between (signals) intelligence agencies of different countries is strictly quid pro quo, which means what you get is equivalent to what you give.This is perfectly illustrated by a small series of documents from the Snowden trove, which summarize what the NSA provides to its foreign partners, along what they provide to theNSA.
ELECTROSPACES.NET: MAXIMATOR AND OTHER EUROPEAN SIGINT The Maximator alliance An interesting aspect to start with is that the existence of the Maximator alliance was revealed in an article by prof. dr. Bart Jacobs in Intelligence and National Security, which is an academic journal about intelligence and national security.Usually, this kind of revelations are published by major newspapers, but they didn't even pick up this story. ELECTROSPACES.NET: THE SERIAL NUMBERS OF NSA REPORTS On January 14, the NSA disclosed a serious vulnerability in the CryptoAPI service of the Windows 10 operating system (vulnerability identifier: CVE-2020-0601).In a rare public Cybersecurity Advisory the agency even offered further details about this issue. An interesting detail is that this Cybersecurity Advisory has two serial numbers in the same format as the NSA uses on their Top ELECTROSPACES.NET: FAIRVIEW: COLLECTING FOREIGN FAIRVIEW: Collecting foreign intelligence inside the US. (Updated: April 19, 2021) On August 15, The New York Times and Pro Publica published a story in which the big US telecommunications company AT&T was identified as a key partner of the NSA. Interesting details about this cooperation and the cable tapping were already in the 2008 bookThe
ELECTROSPACES.NET: THE COMMUNICATIONS EQUIPMENT IN TRUMP'S A similar Cisco IP phone can be recognized at the left side of Trump, in front of the Chairman of the Joint Chiefs of Staff. This telephone doesn't have the additional box on the back, but does have a bright yellow faceplate, which is the color code for the highest classification level: Top Secret/SCI. Therefore, this telephone is for secure calls, through the dedicated Executive Voice over ELECTROSPACES.NET: UNNOTICED LEAK ANSWERS AND RAISES Unnoticed leak answers and raises questions about operation Eikonal. (Last edited: November 23, 2015) Almost unnoticed, the Austrian member of parliament Peter Pilz recently disclosed new information about operation Eikonal, under which NSA and BND cooperated in tapping some fiber-optic cables at a switching center of Deutsche Telekom in ELECTROSPACES.NET: HOW NSA TARGETED CHANCELLOR MERKEL'S How NSA targeted chancellor Merkel's mobile phone. (Updated: June 28, 2016) Last week, the German weekly Der Spiegel revealed that NSA intercepted the mobile phone of the German chancellor Angela Merkel. Although most details were not known yet, the fact itself caused a severe crisis in the relationship between the United States andGermany.
ELECTROSPACES.NET: NSA STILL USES THE UMBRA COMPARTMENT NSA still uses the UMBRA compartment for highly sensitive intercepts. Three days ago, on July 5, 2014, The Washington Post published some of the most important stories from the Snowden-leaks so far. It revealed that Snowden did had access to the content of data collected under FISA and FAA authority - a fact that had been kept secret until now. ELECTROSPACES.NET: DANIEL HALE ARRESTED FOR BEING THE Printing classified documents According to the indictment, Daniel Hale used his classified work computer at the National Geospatial-Intelligence Agency (NGA) to print classified documents for the first time on February 28, 2014 and he continued to do so until August 5, 2014. In total, he printed 36 documents, including four duplicates. Nine documents were related to his work at NGA, but 23 didMAY 18, 2021
WHAT THE NSA PROVIDES TO ITS FOREIGN PARTNERS, AND VICE VERSA The cooperation between (signals) intelligence agencies of different countries is strictly quid pro quo , which means what you get is equivalent to what you give. This is perfectly illustrated by a small series of documents from the Snowden trove, which summarize what the NSA provides to its foreign partners, along what they provide tothe NSA.
Two of these documents are about the NSA's Second Party partners (better known as the Five Eyes): Canada and New Zealand, and six about Third Party partners: Germany, Israel, Norway, Saudi Arabia, Sweden and Turkey. Another NSA document provides some characteristics of these relationships. The documents about the various NSA partners are information papers prepared by the Country Desk Officer (CDO) for the particular country at the NSA's Foreign Affairs Directorate (FAD). All but one date from April 2013, which is just a month before Snowden left the agency. It's not known whether there are also papers about other NSA partners amongthe Snowden files.
The information papers describe the relationship between the NSA and the foreign partner in a standardized way: they all start with an introduction, mention some "Key Issues", followed by "What NSA Provides to Partner" and "What Partner Provides to NSA". The papers end with "Success Stories" and "Problems/Challenges with the Partner". For readability, the portion markings with the classification level for each paragraph have been removed and some abbreviations arewritten in full.
Second Party partners > The Second Party partners>
> of the NSA are the signals intelligence agencies of the United > Kingdom, Canada, Australia and New Zealand. These five countries are > also known as the Five Eyes. Their SIGINT systems are highly> integrated
>
> and the partners are not supposed to spy on each other.Canada
INFORMATION PAPER: NSA Intelligence Relationship with Canada's CSEC,
April 3, 2013
(Published by CBC
on December 9, 2013) WHAT NSA PROVIDES TO THE PARTNER: SIGINT: NSA and CSEC cooperate in targeting approximately 20 high-priority countries . NSA shares technological developments, cryptologic capabilities, software and resources for state-of-the-art collection, processing and analytic effots, and IA capabilities. The intelligence exchange with CSEC covers worldwide national and transnational targets. No Consolidated Cryptologic Program (CCP) money is allocated to CSEC, but NSA at times pays R&D and technology costs on shared projects with CSEC. WHAT THE PARTNER PROVIDES TO NSA: CSEC offers resources for advanced collection, processing and analyss, and has opened covert sites at the request of NSA. CSEC shares with NSA their unique geographic access to areas unavailable to the U.S. , and provides cryptologic products, cryptanalysis, technology, and software. CSEC has increased its investment in R&D projects of mutual interest. . -------------------------New Zealand
INFORMATION PAPER: NSA Intelligence Relationship with New Zealand,
April 2013
(Published by NZ Heraldon March 11, 2015)
WHAT NSA PROVIDES TO THE PARTNER: NSA provides raw traffic, processing, and reporting on targets of mutual interest, in addition to technical advice and equipment loans. WHAT THE PARTNER PROVIDES TO NSA: GCSB provides collection on China, Japanese/North Korean/Vietnamese/South American diplomatic communications, South Pacific Island nations, Pakistan, India, Iran, and Antarctica; as well as, French police and nuclear testing activities in New Caledonia . Third Party partners > The Third Party partners>
> of the NSA are the signals intelligence agencies of some 33 > countries. Cooperation is based on formal, bilateral agreements, but > the actual scope of the relationship varies from country to country > and from time to time. Unlike the Second Party partners, Third Party > partners do spy on each other.Germany
INFORMATION PAPER: NSA Intelligence Relationship with Germany,
January 17, 2013
(Published by Der Spiegelon June 18, 2014)
WHAT NSA PROVIDES TO THE PARTNER: NSA has provided a significant amount of hardware and software at BNDexpense,
as well as associated analytic expertise to help the BND independently maintain its FORNSAT capability. NSA also exchanges intelligence reporting on both military and non-military targets. WHAT THE PARTNER PROVIDES TO NSA: NSA is provided access to FORNSAT communications supporting counter-narcotics (CN), counter-terrorism (CT), , and Weapons of Mass Destruction (WMD) missions and is an important source of information on drug trafficking and force protection in Afghanistan. The BND provides Igbo language support by translating NSA collection of a high-value, time-sensitive target. NSA is seeking the proper approvals to accept BND language support in . In addition to the day-to-day collection, the Germans have offered NSA unique accesses in high interest target areas. -------------------------Israel
INFORMATION PAPER: NSA Intelligence Relationship with Israel,
April 19, 2013
(Published by The Intercepton
August 4, 2014)
WHAT NSA PROVIDES TO THE PARTNER: The Israeli side enjoys the benefits of expanded geographic access to world-class NSA cryptanalytic and SIGINT engineering expertise, and also gains controlled access to advanced U.S. technology and equipment via accomodation buys and foreign military sales. WHAT THE PARTNER PROVIDES TO NSA: Benefits to the U.S. include expanded geographic access to high priority SIGINT targets, access to world-class Israeli cryptanalytic and SIGINT engineering expertise, and access to a large pool of highlyqualified analysts.
-------------------------Norway
INFORMATION PAPER: NSA Intelligence Relationship with Norway,
April 17, 2013
(Published by Dagbladet on December 17, 2013) WHAT NSA PROVIDES TO THE PARTNER: - Daily TS//SI-level counter-terrorism (CT) reports sharedmultilaterally;
- Frequent exchanges of technical data and analytic expertise on CT targets, and other threats to Norway's nationalsecurity;
- Daily force protection support in Afghanistan and technical expertise to support target development of Afghan insurgent targets; - Regular reporting on counter-proliferation (CP) topics - Ad-hoc reporting and analytic expertise on - Exchanges of reporting, tech data and analytic expertise on - Tech data and expertise on cryptanalytic topics of mutual interest;and
- FORNSAT communications metadata WHAT THE PARTNER PROVIDES TO NSA: - SIGINT analysis as well as geolocational and communications metadata specific to Afghan targets of mutual interest (this analysis also supports Norwegian Special Operations Forces (when deployed); - All-source analysis specific to Afghan targets of mutual interest. The analysis is based on operations conducted jointly between Norway and local and/or coalition authorities; - Potential to leverage NIS FORNSAT capabilities to augment NSA collection against high priority CP SIGINTtargets;
- Potential to leverage NIS unique access to SIGINT on high priorityCT targets;
- SIGINT reports on Russian civil targets of mutual targets, particularly Russian energy policy; - FORNSAT communications metadata; and-
-------------------------Saudi Arabia
INFORMATION PAPER: NSA Intelligence Relationship with Saudi Arabia,
April 8, 2013
(Published by The Intercepton July 25, 2014)
WHAT NSA PROVIDES TO THE PARTNER: NSA/CSS provides technical advice on SIGINT topics such as data exploitation and target development to TAD as well as a sensitive source collection capability. NSA/CSS provides a sensitive decryption service to the Ministry of Interior against terrorist targets of mutual interest. WHAT THE PARTNER PROVIDES TO NSA: NSA leverages MOD RRD access to remote geography in the Arabian Gulf but provides no finished SIGINT reporting to NSA/CSS, however; they have provided unencrypted collection against the IRGC QODS Maritime Force targets of mutual interest from their collection system . TAD provides sensitive access to unique collection containing AQAP terrorist targets of mutual interest. -------------------------Sweden
INFORMATION PAPER: NSA Intelligence Relationship with Sweden,
April 18, 2013
(Published by SVT Nyheter on December 5, 2013) WHAT NSA PROVIDES TO THE PARTNER: - Technical support, collection, processing equipment and training - NSA accepts selectors from FRA and tasks them to approved NSA collection sites-
-
- Accomodation purchases of equipment - Membership in multinational forums WHAT THE PARTNER PROVIDES TO NSA: - Unique intelligence on Russia, the Baltic, Middle East, and counter-terrorism (CT) - Outstanding and unique input of ELINT signals - Access for special collection initiatives - Collaboration on cryptanalytic issues -------------------------Turkey
INFORMATION PAPER: NSA Intelligence Relationship with Turkey,
April 15, 2013
(Published by Der Spiegelon August 31, 2014)
WHAT NSA PROVIDES TO THE PARTNER: - NSA provides equipment, technology, training, and U.S. SIGINT requirements and reporting to the Turkish partner to better assist NSA in fulfilling U.S. intelligence requirements. - In terms of equipment and technology NSA provides both collection and cryptographic equipment. A Cryptographic Modernization program is under way with both partners to upgrade encryption on all shared and some non-shared communications links. A High Frequency Direction Finding (HFDF) collection site is NSA also provides decryption of DHKP/C internet traffic the Turks collect. - U.S. SIGINT requirements and reporting cover military and paramilitary targets in and the KGK . This reporting is a mixture of near-real time and product "Tear Line" reports and analysis. - NSA provides daily interaction and actionable intelligence on foreign fighter Sunni extremists, against both Turkish and non-Turkish individuals. NSA provides regional Tactical reporting in two hour increments. WHAT THE PARTNER PROVIDES TO NSA: - The partner provides near real time reporting on military air, naval, ground, and paramilitary targets in Russia, Georgia, Ukraine, and on KGK targets, as well as daily summary reporting of Black Sea and CIS Naval and Air activity and - NSA enjoys joint operational access to the HFDF site in which, in turn, functions as a node on NSA's world-wide CROSSHAIR HFDF geolocation service. The U.S. and 2nd Parties receive approximately 400,000 fixes yearly utilizing Lines-of-Bearing from the site while the Turks receive approximately 5000 fixes yearly from its regional usage of CROSSHAIR, an 80 to 1 ratio in FVEY's favor. - NSA receives Turkish transcripts of KGK voice collection. Cooperation on the KGK target by the U.S. Intelligence Community in Ankara has increased across the board since the May 2007 DNI Memorandum encouraged all to do so. Section from the information paper about the NSA's relationship withTurkey
------------------------- Some characteristics According to the _quid pro quo_-principle, we see that for each of these foreign partners, the things that NSA provides to the partner roughly equal what the partner provides to the NSA - at least according to the length of the sections in the information papers. The actual content of what each party provides is often very different, as was described in an internal interviewfrom 2009 about
the nature of the NSA's Third Party relationships: "Generally speaking, our Third Party partners want access to our technology, as well as our regional/global reach. In exchange for providing unique accesses, regional analytical expertise, foreign language capabilities and/or I&W support, we provide them with technical solutions (e.g., hardware, software) and/or access to related technology." The partners usually "know their regional hoods better than we do and they exponentially add to our foreign language capability." When the information papers speak about providing data about "targets of mutual interest", the interview explains: "We must keep in mind that our partners are attempting to satisfy their own national intelligence requirements; with the exception of the assistance we provide during crises, we can only move our SIGINT relationships forward, when U.S. requirements intersect with theirs." This also depends on how long and deep such a relationship is: "Many of our relationships have, indeed, spanned several decades, allowing us to establish higher degrees of trust with and reliance on one another. This, in turn, has led to greater levels of cooperation, where, for instance, NSA might be willing to share advanced techniques with a proven and reliable partner, in return for that partner's willingness to do something politically risky. Trust requires years to build up but can be lost in a very short period of time." And finally, the interview also explains: "For a variety of reasons, our intelligence relationships are rarely disrupted by foreign political pertubations, international or domestic. First, we are helping our partner address critical intelligence shortfalls, just as they are assisting us. Second, in many of our foreign partners' capitals, few senior officials outside of their defense-intelligence apparatuses are witting to an SIGINT connection to the U.S./NSA." > See also: NSA's Foreign PartnershipsGeplaatst door P/K
op 22:01
2 comments:
Email This
BlogThis!
Share
to Twitter
Share
to Facebook
Share
to Pinterest
Labels: NSA PartnershipsAPRIL 7, 2021
THE COMMUNICATIONS SYSTEMS AT THE US CENTRAL COMMAND HEADQUARTERS (Updated: April 11, 2021) Previously, this weblog provided a close look at the phones used by USpresident Biden
.
This time we turn to another end of the line and look at the communications equipment which is used at the HEADQUARTERS OF THE US CENTRAL COMMAND in Tampa, Florida. A recent 60 Minutes television report provides an unprecedented look inside the Central Command's operations center, where we see the general MILITARY COMMUNICATIONS EQUIPMENT, followed by some more special DEVICES USED BY THE COMMANDER, who also has access to the virtual DESKTOP ENVIRONMENT for the US intelligence agencies. Large operations center in the Central Command headquarters, January2021
(still from 60 Minutes - click to enlarge) The 60 Minutes television report shows never-before-seen video footage of the Iranian ballistic missile attack from January 7, 2020 on the Al Asad Airbase in Iraq, where 2000 US troops were stationed. The attack was a retaliation for the Americandrone strike
from
January 3, which killed the Iranian general Qasem Soleimani , commander of the QudsForce.
The report also includes an interview with general Frank McKenzie, combatant
commander of the US Central Command, who leads the US armed forces in the Middle East. McKenzie followed the Iranian missile attack on the Al Asad Airbas at his headquarters, from where he had ordered the killing of general Soleimani six days earlier. The Central Command headquarters The United States Central Command (USCENTCOM) was established in 1983 and is one of the eleven unified combatant commands of the US Armed Forces. Its Area of Responsibility (AOR) includes the Middle East, Egypt, Central Asia and parts of SouthAsia.
CENTCOM's main headquarters is not in its area of operations, but at MacDill Air Force Basein Tampa,
Florida, where a new 282,200-square-foot headquarters building wascompleted
in
2012.
The new building includes specialized mission critical spaces like the Command Joint Operations Center, Joint Planning Cell and Operational Planning Element, Network Operations Center and the Command Secure Communications Operations Center. The headquarters of the US Central Command at MacDill Air Force Base (photo: Burns & McDonnell - click to enlarge) The new headquarters building includes more than 109,000 square feet of Sensitive Compartmented Information Facility (SCIF) and space constructed according to sound transmission class(STC) 45 and
50 to support secured operations. Relevant antiterrorism standards, including progressive collapse mitigation by means of tie forces, were also incorporated in the new headquarters. All concrete contains ground granulated blast furnace slag and fly ash for LEEDcompliance.
On the website of the construction company there's an earlier photo of the interior of the building showing standard workstations equipped with two computer screens, an Avocent SwitchView KVM switch , a smartcard reader, the ubiquitous HP keyboard, a mouse and two telephone sets: a Nortel Meridian 3903 and a Cisco 7975 IPPhone
,
one for secure and one for non-secure calls: Interior of the Central Command headquarters at MacDill Air ForceBase
(photo: Burns & McDonnell - click to enlarge) Military communications equipment The communications equipment that is currently used at the Central Command headquarters can be seen in the 60 Minutes television report, which shows shots from inside a large and a small operations room. In the large operations room we see big video screens along the walls and several rows of workstations, each with two sets of communications equipment, one set for access to classified telephone and computer networks and another set for unclassified networks. According to the color codes of the US classification system the telephones and the smartcard readers have the green label for Unclassified systems and the red label for Secret systems. Large operations center in the Central Command headquarters, January2021
(still from 60 Minutes - click to enlarge)COMPUTER SYSTEMS
Some of the computer screens show a bright red lock screen with the text "This information system is accredited to process - SECRET - For authorized purposes only", which means that they are part of SIPRNet , the main classified secure network of the US military for tactical and operational information. The military's unclassified non-secure computer network is known asNIPRNet .
Identifying authorized users for NIPRNet is done through the CommonAccess Card , which
is the standard identification for active US defense personnel. Access to SIPRNET requires the SIPRNet token,
which is also a smartcard, but without visible identificationinformation.
COALITION NETWORKS
Besides NIPRNet and SIPRNet, the Central Command also has separate computer networks for collaboration with foreign partners. For the members of bilateral and multinational coalitions, the United States provides a network architecture called Combined Enterprise Regional Information eXchange System (CENTRIXS), which operates at the classification level Secret/Releasable to . The first CENTRIXS networks were establishedas of late
2001 by the US Central Command in order to support coalition operations under Operation Enduring Freedom(OEF). This
resulted in CENTRIXS-ISAF for operations in Afghanistan and CENTRIXS-GCTF for the Global Counter Terrorism Forces. Meanwhile, both systems have been integrated in the CENTCOM Partner Network (CPN). > See also US military and intelligence computer networks The various networks in CENTCOM's area of responsibility(source
-
click to enlarge)
A CENTRIXS network consists of servers and thin clients and provides users with at least the following computer applications, giving them the same basic capabilities as users of classified US systems: > - Microsoft Office > - Command and Control Personal Computer>
> (C2PC)
> - Integrated Imagery and Intelligence> (I3)
These applications allow accessto the
releasable Near-Real Time (NRT) order of battle from the MIDB database(to be replaced
by MARS) and imagery databases and to display the data on a map background. They can also access various browser-based products, send e-mails with attachments and conduct collaboration sessions. For US military users, these applications are part of the Global Command and Control System (GCCS), which encompasses a suite of over 200 client-server tools and applications for fusing data from multiple sensors and intelligence sources to produce a graphical representation of the battlespace. Interface of the Command and Control Personal Computer (C2PC)application
(source
- click to enlarge)
TELEPHONE SYSTEMS
In the large operations center at CENTCOM's headquarters there are also a range of Cisco IP phones, some being the older 7975,
others the current 8841.
The Cisco 8841 IP phones look like the ones that are commercially available, but are actually modified versions from the small telecommunications security company CIS Secure Computing Inc. These modified phones are approved for use in SCIF and SAPF environments and offer additional on-hook security features which can be engaged for the 'hold' and 'mute' functions while in a call. Speakerphone functionality isn't disabled, but is protected with the on-hook security of the positive disconnect electronics. Several workstations even have a third telephone set: a Cisco IP Phone8845
,
which has a video camera on top for video calls. According to their display background, these phones appear to be for the video conferencing service of the Desktop Environment (DTE, see below) which runs on the Top Secret/SCI intelligence sharing network JWICS.
Operations center in the Central Command headquarters, January 2021 (still from 60 Minutes - click to enlarge) The commander's communications equipment The 60 Minutes television report followed general McKenzie into a small room off his main operations center in the Central Command headquarters. There we see similar equipment as in the large room, like computers connected to SIPRNet, in this case for senior staffofficers, like the:
> - Director of Operations (J3) > - Commander's Action Group (CAG) > - Command Senior Enlisted Leader> (CSEL)
> - Staff Judge Advocate> (SJA)
General McKenzie entering a small operations room, January 2021 (still from 60 Minutes - click to enlarge) In this small room, commander McKenzie has additional communications equipment that seems not available for the personnel in the large operations center. When he is being interviewed at his place at the table (see the televison still below), we see from left to right: > - A Cisco DX 70>
> video screen with video camera, probably for the Secure Video > Teleconferencing System (SVTS) which is part of the Crisis > Management System (CMS) and allows top-level video meetings.>
> - A Cisco IP Phone 8841>
> with a distinctive yellow bezel for the highly secure Executive > Voice over Secure IP-network which is also part of the Crisis > Management System (CMS) and connects the President, the National > Security Council, Cabinet members, the Joint Chiefs of Staff, > various intelligence agency watch centers, headquarters, and > Continuity of Operations>
> (COOP) sites.
>
> - A Touchscreen Executive Phone>
> (TXP) with two additional 50-button Touchscreen Line Expansion>
> units (TLE), manufactured by the small telecommunications security > company Telecore, Inc. , which also made > the Integrated Services Telephone>
> (IST-2) that was on the Oval Office desk of presidents Bush and > Obama. These devices are specifically designed for the Defense Red> Switch Network
> (DRSN),
> which offers full command and control and conferencing capabilities > for military commanders up to the level of Top Secret/SCI.>
> - A Cisco IP Phone 8865>
> with video camera and a Key Expansion Module> .
> The phone has labels for Top Secret (orange) and Top Secret/SCI > (yellow) and appears to be for the video conferencing service of the > Desktop Environment (DTE, see below) which runs on JWICS> ,
> the main network for intelligence sharing within the US military and > the US intelligence community.>
> - A Cisco IP Phone 8851>
> with a Key Expansion Module>
> and a label for the classification level Secret (red), which means > it runs on SIPRNet and is therefore Voice over Secure IP (VoSIP). General McKenzie's communications equipment in the small operationsroom
(still from 60 Minutes - click to enlarge) According to the 60 Minutes report, it was in this small room where during the missile attack on the Al Asad Airbase, commander McKenzie "could talk directly to the only two people above him in the chain of command" - the Secretary of Defense and the President. To illustrate this, the speed dial buttons on the commander's Touchscreen ExecutivePhone were shown.
Normally such buttons are blurred out, but here we can clearly see that McKenzie has direct lines to the White House, the Secretary of Defense (SecDef), his house (SecDef Home) and his communicationscenter (SecDef
Cables), as well as to the National Military Command Center (NMCC) and the Chairman of the Joint Chiefs of Staff (CJCS XO), amongothers:
The speed dial buttons on general McKenzie's Touchscreen ExecutivePhone
(still from 60 Minutes - click to enlarge) THE COMMANDER'S COMPUTERS The same telephones as in the small room appear on McKenzie's place in the large operations room, but here he also has two computer screens connected to a Vertiv Cybex Secure MultiViewer KVM switch which allows access to networks of different classifications levels on a single screen. Apparently the commander was logged in on one of the classified computer networks, as we can see the desktop background with several application icons - quite remarkable because usually during photo ops or television recordings only unclassified images should be visible. At the top of the desktop background is a yellow bar which means it'sJWICS
,
the intelligence sharing network for the US military and the US Intelligence Community at the classification level Top Secret/SCI.
Unlike NIPRNet and SIPRNet, access to JWICS doesn't require a smartcard, but a software certificate: military users have to identify themselves with a DoD PKI certificate, others need
an IC PKI certificate . General McKenzie's workstation in the large operations center (still from 60 Minutes - click to enlarge) The IC Desktop Environment The desktop background on the commander's computer is deep blue and has the term "DESKTOP ENVIRONMENT (DTE)" with an image of the earth covered by a stylized network. In the bottom left corner we see the seals of the Defense Intelligence Agency(DIA) and
the National Geospatial-Intelligence Agency (NGA) and some text. This "Intelligence Community Desktop Environment" (IC DTE) wasconceived
in 2012 as a single, identical platform for the US Intelligence Community. As such it's the heart of a huge modernization project called Intelligence Community IT Enterprise (IC ITE), under which data will be stored and processed at the Commercial Cloud Services (C2S) managed by the CIA and the IC GovCloudmanaged by the NSA.
The implementation of the DTE was managed by the Joint Program Management Office (JPMO) led by DIA and NGA, while the software systemwas built
by BAE Systems under a $300 million contract for five years. This had to result in the Next Generation Desktop Environment (NGDE), which hasto bring virtual
desktops at different classification levels to one physical computer. Multiple computers for networks at different classification levels,ca. 2008.
(source -
click to enlarge)
With the Desktop Environment (DTE) analysts at DIA, NGA and other US intelligence agencies can go anywhere within these organizations, sit down at any Top Secret workstation, log in, authenticate, and get access to their e-mail, home directories, shared files, etc., which were previously stored on thick client computers at eachworkstation.
Besides a virtual desktop, the DTE also comes with a common suite of desktop applications and access to common services, including Unified Communications as a Service.
Among the first applications were standard e-mail, collaboration tools and video conferencing capabilities. The NSA is responsible for an Apps Mall that incorporates apps stores of the various agencies. The common collaboration tool for the DTE provides a single interface for secure voicemail integration with e-mail, peer-to-peer file sharing, a screen capture tool and Outlook calendar integration. When additional users transition into the common operating environment, this tool could serve as a single interface for community-wide collaboration. In 2014, there were already some 4.000 DTE users at DIA and NGA. However, in 2018, John Sherman, chief information officer of the Intelligence Community, said they had come to the realization that it no longer made sense to deliver a standard capability to every agency and user given the differing architectures, security requirements and mission needs. In order to reach the outcomes for which the DTE was initially created, the Collaboration Reference Architecture (CRA) was created.
Agencies can now build applications which fit their own needs as long as they comply with the standards set by the CRA in order to ensure compatibility throughout the different systems. Finally, the DTE is also a step towards an environment where security and tagging of data will be done at the data level, as opposed to the network level. Traditionally, access to information was based on which network you were on: DIA data were only accessible on the DIA's network, etc. The idea is that there will be a common Intelligence Community network for which the Identification, Authentication and Authorization (IAA) project of the IC ITE provides access to data and information based on the different credentials of each individual user, so on who you are, what role you have and what accesses are available to you.LINKS AND SOURCES
- Yahoo! News: 'Conspiracy is hard': Inside the Trump administration's secret plan to kill Qassem Soleimani(2021)
- American News: Biden Allows “60 Minutes” to Release Military Imagery Secrets that Saved US Lives(2021)
- DIA: Striking a balance between compatibility and flexibility in the intelligence community(2018)
- Joint Publication: Joint and National Intelligence Support toMilitary Operations
(2017)
- CSIS: New Tools for Collaboration, The Experience of the U.S. Intelligence Community(2016)
- Raytheon: When Secure KVM Isn’t Enough(2015)
- Defense Systems: How cloud is changing the spy game(2014)
- Deep Dive Intelligence: Interview: Mike Mestrovich – FullTranscript (2012)
- Burns & McDonnell: Joint Intelligence Center, Central Command(2009)
- AFCEA Signal: Desktop System Streamlines Analysis Work(2004)
- MITRE Corporation: Intelligence Community Public Key Infrastructure(IC PKI) (2002)
Geplaatst door P/K
op 17:23
No comments:
Email This
BlogThis!
Share
to Twitter
Share
to Facebook
Share
to Pinterest
Labels: Red Phone
, Secure voice
MARCH 3, 2021
THE TELEPHONE CONTACTS OF PRESIDENT GEORGE W. BUSH Always wanted to know who are on the contact list of the President of the United States? In the George W. Bush Presidential Library one can see the telephone from the president's desk in the Oval Office with a clear view of all the speed dial buttons from the final years of theBush presidency.
Here I will tell a bit more about this special telephone set, followed by a list and a short discussion of all the contacts behind the over 40 speed dial buttons. Finally, the phone used by president Bush is compared with the one from the first years of Barack Obama. The IST-2 phone at the president's desk in the George W. Bush Presidential Library (photo: Ron Plante - click to enlarge) The George W. Bush Presidential Library Like all US presidents since Herbert Hoover, president George W. Bushalso established a
presidential librarywhich holds the
papers, records, collections and other historical materials from his presidency. Several presidents have been buried on the grounds of their library, which will also happen after the death of George Bushand his wife Laura.
The George W. Bush Presidential Library and Museum was opened in April 2013 and is located on the campus of the Southern Methodist University (SMU) near Dallas, Texas. Like other presidential libraries, it includes an exact replica of the Oval Office in the White House. This allows visitors a close look at the paintings and the furniture and they may also sit behind a reproduction of the Resolute deskfor a photograph.
Some visitors of the replicated Oval Office took a photo of the telephone on former president Bush' desk, probably not only because it's a quite impressive device, but also because it has all the names of the president's contacts on its many speed dial buttons. A visitor tries the phone in the replica of the Oval Office in the George W. Bush Presidential Library (photo: instagram/t.ryanmartinez - click to enlarge)The IST-2 telephone
What most visitors of the Bush Presidential Center won't know is that the phone is an Integrated Services Telephone version 2 (IST-2), which is a so-called "red phone". Unlike the popular image, such a red phone isn't used for the Hotline between Washington andMoscow
,
but for secure communications with military command centers through the Defense Red Switch Network(DRSN).
For this network there are large telephone consoles which can be used for both secure and non-secure calls. However, the encryption of classified calls isn't done by the phone, but by a separate network encryptor. The IST-2 was designed by defense contractor Raytheonand subsequently
manufactured by Telecore Inc. , a small company from Richardson, Texas, that took over the production of these telecommunication devices somewhere around 2003. As part of a military telephone network, the IST-2 also has the distinctive 4 red buttons for the four levels of a system called Multilevel Precedence and Preemption (MLPP). This allows to make phone calls that get precedence over ones with a lower priority, with "Flash Override" to allow the President, the Secretary of Defense and the Joint Chiefs of Staff to preempt any other traffic in the network. The speed dial buttons on Bush' Oval Office telephone The IST-2 telephone on president Bush' desk in the Oval Office had 50 line buttons, with labels for the following contacts, grouped according to the colors of the labels: > • BOLTEN - Joshua B. Bolten > , White House Chief of > Staff from 2006 to 2009. > • FIELDING - Fred F. Fielding> , White House
> Counsel from 2007 to 2009. > • GILLESPIE - Ed Gillespie > , Counselor to the > President from 2007 to 2009. > • HADLEY - Stephen J. Hadley > , National Security > Advisor from 2005 to 2009. > • GOTTESMAN - Blake L. Gottesman > , Deputy Chief of > Staff from 2008 to 2009. > • JACKSON - Barry S. Jackson > , Senior Advisor > to the President from 2007 to 2009. > • JEFFREY - James F. Jeffrey> ,
> Assistant to the President and Deputy National Security Advisor from> 2007 to 2009.
> • KAPLAN - Joel Kaplan > , Deputy Chief of Staff > from 2006 to 2009. > • LUTE - Douglas E. Lute > , Assistant to the > President and Deputy National Security Advisor for Iraq and > Afghanistan from 2007 to 2013. > • MEYER - Daniel P. Meyer > , Assistant to the > President for Legislative Affairs from 2007 to 2009. > • PERINO - Dana M. Perino > , White House Press > Secretary, 2007 to 2009. > • THIESSEN - Marc A. Thiessen> , Director of
> Speechwritng from 2008 to 2009. > • TUBB - Richard J. Tubb > , Physician to the > President from 2002 to 2009. > • WAINSTEIN - Kenneth L. Wainstein> , Homeland
> Security Advisor from 2008 to 2009. > • YANES - Raul F. Yanes> ,
> Assistant to the President and Staff Secretary from 2006 to 2009.>
> • VICE PRESIDENT - Dick Cheney > , Vice President of the > United States from 2001 to 2009. > • Secretary Of STATE - Condoleezza Rice > , Secretary of State > from 2005 to 2009. > • Secretary Of DEFENSE - Robert M. Gates > , Secretary of Defense > from 2006 to 2011. > • DNI - Mike McConnell> ,
> Director of National Intelligence from 2007 to 2009. > • Director CIA - Michael V. Hayden> ,
> Director of the CIA from 2006 to 2009.>
> • VP HOME - The house of Vice President Cheney, the Naval > Observatory in Washington. > • BOLTEN HOME - The house of Chief of Staff Joshua Bolten. > • HADLEY HOME - The house of National Security Advisor Stephen> Hadley.
> • RICE HOME - The house of Secretary of State Condoleezza Rice. > • GILLESPIE HOME - The house of Counselor Ed Gillespie.>
> • Situation Room - The Situation Room in the basement of the West> Wing.
> • HOS Conference - Head of State Conference call. > • SIGNAL OPERATOR - Operator at the Signal Switchboard for > non-secure calls. > • Secure OPERATOR - Operator at the Signal Switchboard for secure> calls.
> • White House OPERATOR - Operator at the White House switchboard > for unclassified calls.>
> • MRS BUSH - Laura Bush > , wife of the president. > • 41 - George H. W. Bush > , 41st president of > the United States and father of the president. > • JWB - Jenna W. Bush > , daughter of the> president.
> • BPB - Barbara P. Bush> ,
> daughter of the president. > • CRAWFORD - The Prairie Chapel Ranch> of president
> Bush near Crawford, Texas. > • Secretary EVANS - Donald L. Evans > , Secretary of Commerce> from 2001-2005.
>
> • ROBERT - ? > • JARED - Jared Weinstein, special assistant and personal aide > from 2006 to 2009.> • SAM - ?
> • KAREN - (Karen Hughes?) > • ASHLEY - (Ashley Kavanaugh?) > • USHERS - Stephen W. Rochon > , Chief Usher of > the White House from 2007 to 2011.>
> • LINE 1 - Outgoing or incoming phone line > • LINE 2 - Outgoing or incoming phone line > • LINE 3 - Outgoing or incoming phone line President Bush' primary contacts The names on these speed dial buttons give us some insights into the people president Bush was in contact with. In the first place, represented by the first two rows of buttons, this were West Wing staff members, like the Chief of Staff, his deputies, seniors advisors and assistants. In the third row we see the press secretary and the president's speechwriter as well as the Physician to the President. The buttons of the fourth row show that president Bush had direct lines only to the Secretary of State and the Secretary of Defense. The same group includes buttons for the Director of National Intelligence (DNI) and the director of the Central Intelligence Agency (CIA), despite the fact that in 2005, the newly created DNI replaced the director of the CIA as a Cabinet member. George W. Bush using the IST-2 telephone for calling the British prime minister Gordon Brown, October 7, 2008 (White House photo by Eric Draper - click to enlarge) The next five speed dial buttons show which people president Bush could call directly even when they were at home: Vice President Cheney, Chief of Staff Bolten, National Security Advisor Hadley, Secretary of State Condoleezza Rice and Counselor Ed Gillespie. After these first five rows, there's one row in which the buttons are blank - apparently there were no more people who president Bush needed to call directly (unlike Obama, who used all 50 buttons - see below). The lower half of the speed dial buttons were used for mixed sets ofcontacts:
Five buttons positioned in an L-shape connected the President to the various communication centers of the White House: first the famousSituation Room
in the basement of the West Wing, which is not only a conference room, but also includes a watch center that is operational 24/7. Another button was labeled "HOS Conference" which means it was used to conduct phone calls to foreign Heads Of State (HOS). These areconference calls
because translators, advisers and staffers from the National SecurityCouncil
(NSC) listen in to translate and take notes of the content of suchconversations.
Aides listening in to a phone call by president Obama, March 29,2009.
(White House photo by Pete Souza - click to enlarge) The next three speed dial buttons are for switchboard operators, who can connect the President to anyone who cannot be reached through one of the direct line buttons on the Oval Office phone: > First there's the so-called SIGNAL SWITCHBOARD operated by military > personnel of the White House Communications Agency>
> (WHCA). The phone buttons show that this switchboard has an operator > for non-secure calls and one for secure communications.>
> A third button is for the operator of the WHITE HOUSE SWITCHBOARD,> which manages
>
> the internal telephone system of the White House which is used for > internal and external unclassified phone calls. Another group of buttons is for family members of president Bush: his wife Laura, his father ("41"), and his daughters Jenna and Barbara, as well as Bush' ranch in Crawford, Texas. Interesting is the button for Donald L. Evans who seems to be included here not because of his job as Secretary of Commerce from 2001-2005, but because of his longtime friendship with Bush. This brings us to the final group of buttons, with labels that only mention first names, probably of Bush' more personal advisors. One of them was Jared Weinstein, his special assistant and personal aide, but it's less clear who the other four (Robert, Sam, Karen, Ashley) were. When readers of this blog post think they can identify them, pleaseleave a comment.
A final speed dial button is for the ushers of the White House, led by the Chief Usher, who is the general manager of the building andoversees
the butlers, maids, housekeepers, chefs, cooks, doormen, and manyothers.
The IST-2 telephone under Obama In January 2009, the office of President of the United States was taken over by Barack Obama . On his desk in the Oval Office he found an IST-2 telephone like the one used by his predecessor, but now of course with labels for all the new staff members, cabinet secretaries and other people who Obama liked to call. The IST-2 telephone on Obama's desk, March 29, 2009 (White House photo by Pete Souza) Another difference with the IST-2 used by president Bush was that the speed dial buttons on Obama's phone had a different color scheme: while under Bush there was a different color for each type of contacts, under Obama the buttons were only yellow or green. The arrangement, however, was roughly the same, as can be recognized by the three line buttons, which were pink under Bush and white underObama.
Comparing the other buttons indicate that the colors on Obama's IST-2 represent the classification level:
green for Unclassified and yellow for Top Secret/SCI. This is confirmed by the three buttons above the white line buttons: Signal Operator: green; Secure Operator: yellow; White House Operator: green. It shows that most of the president's contacts could be reached via a secure line, likely not much different than under Bush. The IST-2 phone on Obama's desk, March 24, 2009 - photo rotated forcomparison
(photo: Brooks Kraft LLC/Corbis via Getty Images - click to enlarge) Although it was certainly useful to have just one telephone for both secure and non-secure calls, the IST-2 was probably found a bit too military looking for Obama. Maybe the speed dial buttons also attracted a bit too much attention, so a custom cover plate was made in order to prevent visitors from seeing who the president's primary phone contacts were: Obama's IST-2 telephone with cover plate, August 31, 2010. (photo: J. Scott Applewhite/AP - click to enlarge) In the Spring of 2011, the IST-2 on Obama's desk was eventually replaced by two more common, commercially available phone sets: a black Avaya/Lucent 8520T that had been part of the internal White House telephone network already since 1996, and a Cisco 7975G UnifiedIP Phone for
the new Executive Voice over Secure IP-network which is used for TopSecret phone calls.
> See: The presidential communications equipment under Barack ObamaLINKS AND SOURCES
- Weblog: About The White House Communications Agency from 1965 to1974... and Beyond
- Jerry Proc: Hotline Telephones - Making Sense of the Colours andtheir Use (2018)
- Cryptome: Obama Phones(2012)
Geplaatst door P/K
op 23:35
1 comment:
Email This
BlogThis!
Share
to Twitter
Share
to Facebook
Share
to Pinterest
Labels: POTUS
JANUARY 26, 2021
THE PHONES IN PRESIDENT BIDEN'S OVAL OFFICE (Updated: February 21, 2021) On January 20, Joseph R. Biden Jr. was inaugurated as the 46th president of the United States. As such he has access to the presidential communications system, including secure and non-securetelephone lines.
Here, I will discuss a small and unnoticed change in the TELEPHONES on the desk of the new president, as well as what happened to the CALL DEVICE that became known as Trump's "Diet Coke Button". President Joe Biden in the Oval Office, January 20, 2021.(click to enlarge)
The telephones on Biden's desk Already on his first day as president, Biden went to the Oval Officeof the
White House to sign a range of executive orders. By then, this famous room had already been redecorated with new paintings, busts and photographs, while Trump's beige rug had been replaced by the deep blue one from Bill Clinton's Oval Office. The flags of the five branches of the US Armed Forces have also been removed. A close look at the photos shows that there was also a small change in the telephone equipment. On Biden's presidential desk there are now two identical phone sets, which can be identified as the high-endCisco IP 8851 Phone
:
Both phones are not the standard commercially available model, however, as they have been modified by a small communications security company called Advanced Programs, Inc. (API). This can be recognized by the dark gray metal box at the back side of the phone's color display and an additional red button on the front panel of the phone: The purpose of these modifications is to provide on-hook security for the handset and the speakerphone and probably also for TEMPESTprotection - to
make sure that the phone cannot, either accidentally or deliberately, pick up and transmit audio when the handset is on-hook. Comparing the two phones on Biden's desk with the ones used by president Trump, we see that under Trump only one of the Cisco 8851 IP phones had the aforementioned modifications. The other phone was thestandard model:
Former president Donald Trump in the Oval Office, December 3, 2020. (photo: Doug Mills/The New York Times - click to enlarge) > See also: Trump's "beautiful" Oval Office phones and what waschanged on them
UNCLASSIFIED PHONE CALLS The modified Cisco 8851 IP phone was placed on the president's desk by the end of 2016, replacing an old Avaya/Lucent 8520T of the internal White House telephone network which is used for all kinds of unclassified phone calls. This telephone connects to the regular White House switchboard in the basement of the Eisenhower Executive Office Building,
where operators can set up calls to whoever the president wants tospeak with.
CLASSIFIED PHONE CALLS The standard, unmodified Cisco 8851 IP phone on Trump's desk was for the highly secure Executive Voice over Secure IP-network which is part of the Crisis Management System (CMS) and connects the President, the National Security Council, Cabinet members, the Joint Chiefs of Staff, various intelligence agency headquarters and watch centers, as well as Continuity of Operations(COOP) sites.
This telephone replaced an old Cisco 7975 IP phone in September 2017 and connects to the so-called Signal switchboard of the White House Communications Agency (WHCA). The WHCA is a joint military unit that provides the president with secure and non-secure communications in Washington as well as during presidential travels. The Signal board also connects to the White House Situation Room.
Despite being used for classified conversations, the Cisco 8851 IP phone for secure calls wasn't equipped with the additional security features like the non-secure telephone - probably because secure calls travel over a separate, encrypted network, which mitigates the risk that adversaries can abuse the phone's microphones for eavesdropping. But now, under president Biden, the phone for secure calls also has the modifications for on-hook security. Maybe this was considered safer, or maybe it's just to make both phone sets look the same, so outsiders cannot see whether the president is making a classified or an unclassified phone call based upon which telephone he is using. Usually, the phones for the secure top-level telephone network can be recognized by a bright yellow faceplate, as can be seen at the modified Cisco IP phone that is used when the president is outside the White House, forexample.
Yellow is the color code for the highest classification category: TopSecret/SCI
,
but in the Oval Office this would probably stand out too much, so here this phone just has the presidential seal in the bottom left corner of the black display section: Close-up of the presidential seal on a Cisco 8851 IP phone> UPDATE #1:
>
> Around the first of February 2021, there was another small change in > the phone on Biden's desk in the Oval Office: as can be seen in the > picture below, the Cisco IP phone on the left, probably the one for > unclassified conversations, now has an Key Expansion Module>
> attached to it, which provides 14 additional programmable direct> line buttons.
>
>
>
> President Biden's desk in the Oval Office. One of the Cisco 8851 IP> phones
> having an additional Key Expansion Module, February 2, 2021 > (photo: AFP via Getty Images - click to enlarge)>
> Under Obama, the old Cisco 7975 IP Phone for secure calls had a > similar expansion module, but under president Trump that module was > removed. Apparently he saw no need for having the extra direct line > buttons, probably because he could always make calls via the White > House switchboard operator, but it also symbolized that there was > only a very small group of people he was in contact with.>
> UPDATE #2:
>
> On February 18, 2021, the White House released> a photo in
> which we see president Biden in the office>
> of his secretary, just outside the Oval Office. On the desk in front > of him are the same modified Cisco 8851 IP phone sets as on his own > desk, although here, _both_ have an additional Key Expansion Module.>
> In the Oval Office, the phones have brown network cables to blend in > with the furniture, but in the secretary's office the cables are > color-coded: green for the Unclassified network and yellow for the > Top Secret/SCI telephone network:>
>
>
> President Biden watches the landing of NASA's Perseverance vehicle> on Mars
> (White House photo, February 18, 2021 - click to enlarge) The president's call button While the small change in phones wasn't noticed, there was quite some media attention for something that appeared missing on the desk of president Biden: the wooden box with the presidential seal and a red push-button, which became known as Trump's "Diet CokeButton".
The removal of this box was just temporarily though, because meanwhile it has been placed back on the president's desk, as can be seen in this photo from January 25: President Joe Biden at his desk in the Oval Office, January 25, 2021(click to enlarge)
TRUMP'S "DIET COKE BUTTON" There are a lot of stories about how president Trump used the button. Former White House communications aide Cliff Sims, for example, wrote in his 2019 book _Team of Vipers_ that Trump would prank visitors by hitting the button and suggesting it was related to the country’s nuclear weapons arsenal. "Out of nowhere, he'd suddenly press the button," Sims wrote. "Not sure what to do, guests would look at one another with raised eyebrows" he added. "Moments later, a steward would enter the room carrying a glass filled with Diet Coke on a silver platter, and Trump would burst out laughing." On Twitter, Times Radio political commentator Newton Dunn recalleda similar
situation: "When Tim Shipman and I interviewed Donald Trump in 2019, we became fascinated by what the little red button did. Eventually Trump pressed it, and a butler swiftly brought in a Diet Coke on asilver platter."
Trump's glass of Diet Coke in front of the Cisco 8851 IP phone forsecure calls
(photo: Jonathan Ernst/Reuters - click to enlarge) EARLIER USAGE OF THE CALL BUTTON The box with the call buttonis in the
Oval Office already since the presidency of Bill Clinton and it's not only on the president's desk, but also on a side table in the seating area and in the small presidential dining room nearby the Oval Office. The button has nothing to do with nuclear command and control, but can be used by the president to summon assistance. According to earlier sources, it was meant to alert the Secret Service, while
others say that pushing the button makes an aide come in for whatever the president may need. In his autobiography _Finding My Virginity_ from 2017, billionaire Richard Branson recalled what president Obama once said during a lunch in the Oval Office: "As we stood up to leave I noticed the red buttons on his desk. Obama saw me looking at them," Branson wrote. "He said, 'They used to be there for emergencies, but now I use them for ordering tea for my guests.' " > See also: The presidential communications equipment under BarackObama
President George W. Bush in the small dining room near the OvalOffice
On the table is the wooden box with the call button(click to enlarge)
LINKS & SOURCES
- Homepage of the White House Communications Agency - Politico: Trump hid his calls with Putin. Now, Biden has access tothem.
(2021)
- Secrecy News: Biden Issues National Security Directive 1(2021)
- Reuters.com: Phone calls with Trump: more risky venture thandiplomatic boon
(2019)
- People.com: Richard Branson Reveals the Real Purpose for Barack Obama's Oval Office Red Button(2017)
- The Week: Who answers the White House phone, anyway?(2010)
- The New York Times: Whitehouse; A Switchboard That is Justly Fabled(1983)
Geplaatst door P/K
op 21:27
2 comments:
Email This
BlogThis!
Share
to Twitter
Share
to Facebook
Share
to Pinterest
Labels: POTUS ,
White House
Older Posts
Home
Subscribe to: Posts (Atom) SOME OLDER ARTICLES ON THIS WEBLOG THAT ARE OF CURRENT INTEREST: - Leaked documents that were not attributed to Snowden - About the legality and constitutionality of the Section 215 metadataprogram
WELCOME TO ELECTROSPACES.NET! Here you can read about: - Signals Intelligence,
- Communications Security,
- Top Level Telecommunications,
which means the equipment, from past and present, that makes that civilian and military leaders can safely communicate. ► INDEX of all postson this blog
The main focus will be on the United States and its National SecurityAgency (NSA),
but attention will also be paid to other countries, like Germanyand the
Netherlands
.
Any comments, additions, corrections, questions or suggestions will be very appreciated! There's no login or registration required forcommenting.
twitter.com/electrospaces info (at) electrospaces.netRECENT POSTS
What the NSA provides to its foreign partners, and vice versa The communications systems at the US Central Command headquarters The telephone contacts of president George W. Bush The phones in president Biden's Oval Office The report of a Swiss investigation into the case of Crypto AG The NSA tried to spy on Danish and other European targets via cabletapping in Denmark
_"years of the most fascinating overviews of government security practices, and even-handed reviews of Snowden docs."_— SwiftonSecurity
PAGES
* Home
* INDEX
* Abbreviations and Acronyms * NSA Nicknames and Codewords * NSA's TAO Division Codewords * NSA's organizational designations * NSA's Legal Authorities* NSA Glossary
* The US classification system * SIGINT Activity Designators (SIGADs) * CIA Codewords and Abbreviations * GCHQ Codewords and Abbreviations * CSE Codewords and Abbreviations * BND Codewords and Abbreviations * Telephony Abbreviations * Internet abbreviations* Links
* Books
* About
TOTAL PAGEVIEWS
0
100
1
55
2
54
3
49
4
52
5
60
6
45
7
55
8
62
9
66
10
85
11
51
12
51
13
64
14
53
15
65
16
52
17
62
18
51
19
54
20
41
21
71
22
80
23
79
24
76
25
64
26
59
27
47
28
56
29
17
4,888,908
POPULAR POSTS
* How Obama's BlackBerry got secured * The US Classification System * New phones aboard Air Force One * Danish military intelligence uses XKEYSCORE to tap cables in cooperation with the NSA * INCENSER, or how NSA and GCHQ are tapping internet cables * Trump's "beautiful" Oval Office phones and what was changed onthem
* Dutch-Russian cyber crime case reveals how the police taps theinternet
_"It's actually straight up interesting but also weird how weirdly, wonderfully detailed this blog about hyper secure communications is."_— Gizmodo.com
LABELS
Air Force One
(1)
Austria (2)
BlackBerry (1)
BND-Selectors
(2) Boeing
(1)
BoundlessInformant
(9)
Brazil (1) Britain
(1) Canada
(1) Classification
(12) Club
de Berne
(1)
Cryptography
(2) CSEC (2) Cyber
(1) Denmark
(3) Eikonal
(4) ELINT
(1) FBI
(2) France
(3) GCHQ
(6) General Dynamics(1)
Germany (20) Gold
Phone (1)
GSM (2) Hotline
(8) ISAF
(1) Israel
(2) IST
(4) Kremlin
(1) Main Pages
(4) Metadata
(6) Netherlands
(10) New
Zealand (1)
Non-Snowden-leaks
(5)
North Korea
(2) NSA (46) NSA
Partnerships
(24)
Obama (4) POTUS
(17) PRISM
(9) Red Phone
(6) Russia
(3) SatCom
(2) Section 215
(4) Sectra
(1) Secure voice
(7)
Situation Room
(2)
Snowden (6) STE
(4) STU-II
(1) STU-III
(1) Switzerland
(2) Trump
(6) UMTS
(2) US
(2) USA
(4) USSR
(2) Vatican
(1) VoIP
(1) White House
(9)
Wireless (7)
XKeyscore (2)
SEARCH THIS BLOG
BLOG ARCHIVE
* ▼ 2021 (4)
* ▼ May (1)
* What the NSA provides to its foreign partners, and...* ► April (1)
* ► March (1)
* ► January (1)* ► 2020 (12)
* ► December (1) * ► November (1) * ► October (1) * ► September (1)* ► August (1)
* ► July (1)
* ► June (2)
* ► May (1)
* ► March (1)
* ► February (1) * ► January (1)* ► 2019 (10)
* ► December (1) * ► November (2) * ► October (1) * ► September (2)* ► June (1)
* ► May (1)
* ► April (1)
* ► March (1)
* ► 2018 (5)
* ► November (1) * ► October (1) * ► September (1)* ► July (1)
* ► February (1)* ► 2017 (12)
* ► December (1) * ► November (1) * ► October (1) * ► September (1)* ► August (1)
* ► July (1)
* ► June (1)
* ► May (1)
* ► April (1)
* ► February (1) * ► January (2)* ► 2016 (14)
* ► December (3) * ► November (1) * ► October (1) * ► September (1)* ► August (1)
* ► June (1)
* ► May (1)
* ► March (2)
* ► February (2) * ► January (1)* ► 2015 (20)
* ► December (2) * ► November (2) * ► September (2)* ► August (1)
* ► July (1)
* ► June (2)
* ► May (2)
* ► April (2)
* ► March (2)
* ► February (2) * ► January (2)* ► 2014 (30)
* ► December (2) * ► November (3) * ► October (1) * ► September (3)* ► August (2)
* ► July (4)
* ► June (2)
* ► May (2)
* ► April (1)
* ► March (3)
* ► February (5) * ► January (2)* ► 2013 (33)
* ► December (4) * ► November (3) * ► October (5) * ► September (3)* ► August (3)
* ► July (3)
* ► June (3)
* ► May (1)
* ► April (2)
* ► February (3) * ► January (3)* ► 2012 (10)
* ► December (1) * ► November (2) * ► October (1)* ► June (2)
* ► May (2)
* ► February (1) * ► January (1) _"Consistently interesting (and strangely, calming/uplifting)content"_
— Ryan Lackey
US RED PHONES
Sequence of the real Red Phones, not for the Washington-Moscow Hotline,
but for the US Defense Red Switch Network(DRSN). The
phones shown here were in use from the early eighties up to the present day and most of them were made by Electrospace Systems Inc. They will be discussed on this weblog later. For the record, you see: - Electrospace MLP-1 - Electrospace MLP-1A (since 1983) - Electrospace MLP-2 - Raytheon IST (since 1992) - Telecore IST-2 (since 2003) US CLASSIFICATION LEVELS Color codes for the classification levels used by the government and the armed forces of the Unites States: These color codes are used to mark the classification level of (digital) documents and files and also of the communication devices used for their transmission. SUBSCRIBE TO THIS WEBLOG!Posts
Atom
Posts
All Comments
Atom
All Comments
HOTLINKS
- Electrospaces @ Medium.com - The Dutch virtual Crypto Museum - Steven Aftergood's Secrecy News - European intelligence: About Intel - Bruce Schneier on Security - The weblog emptywheel - Weblog of Matthijs R. Koot - Leaked documents: IC Off the record- Der Spiegel's 53
& 36
documents
- The Intercept: SIDtoday newsletters - The Snowden Surveillance Archive - The Canadian Citizenlab- The Cryptome
> Many more links
CONTACT
For questions, suggestions and other remarks about this weblog in general or any related issues, please use the following e-mail address: info (at) electrospaces.net For sending an encrypted e-mail message, you can use the PGP Public Key under this ID: B4515E04 (fingerprint: ECEC FF63 D036 F415 A0BF A436 661A AC96 B451 5E04) You can also communicate via Twitter: @electrospaces The title picture of this weblog shows the watch floor of the NSA's National Security Operations Center (NSOC) in 2006. The URL of this weblog recalls Electrospace Systems Inc., the company which made most of the top level communications equipment for the US Government. All information on this weblog is obtained from unclassified or publiclyavailable sources.
QW5kIGZpbmFsbHksIHRoaXMgaXMgd2hhdCBhIHRleHQgbG9va3MgbGlrZSwgd2hlbiBpdCdzIG9ubHkgZW5jb2RlZCB3aXRoIHRoZSBzdGFuZGFyZCBCYXNlNjQgc3lzdGVtLiBHdWVzcyBob3cgY29tcGxpY2F0ZWQgaXQgbXVzdCBiZSB3aGVuIGEgcmVhbCBzdHJvbmcgYWxnb3JpdGhtIHdhcyB1c2VkLg== Powered by Blogger .Details
4
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0