language:
Find link is a tool written by Edward Betts.Longer titles found: Automatic Secure Voice Communications Network (view)
searching for Secure voice 64 found (163 total)
alternate case: secure voice
Sectéra Secure Module
(278 words)
[view diff]
exact match in snippet
view article
find links to article
Sectéra is a family of secure voice and data communications products produced by General Dynamics Mission Systems which are approved by the United StatesSlidex (187 words) [view diff] exact match in snippet view article find links to article
tactical code, which, in turn has been largely made obsolete by the Bowman secure voice radios. Slidex used a series of vocabulary cards arranged in a grid ofVoice over IP (9,910 words) [view diff] exact match in snippet view article find links to article
VoIP traffic, such as voice over secure IP (VoSIP), secure voice over IP (SVoIP), and secure voice over secure IP (SVoSIP). The distinction lies in whetherDavid Maher (227 words) [view diff] exact match in snippet view article find links to article
is also a Bell Labs Fellow and was chief architect for AT&T's STU-III secure voice, data and video products used by the White House and the United StatesHomer Dudley (915 words) [view diff] exact match in snippet view article find links to article
Bell Labs in the 1930s and led the development of a method of sending secure voice transmissions during World War Two. His awards include the Franklin Institute'sOver-the-air rekeying (1,310 words) [view diff] exact match in snippet view article find links to article
communications traffic. Now also adopted for civilian and commercial secure voice use, especially by emergency first responders, OTAR has become not onlyNetwork Voice Protocol (617 words) [view diff] exact match in snippet view article find links to article
high-quality, low-bandwidth, secure voice handling capability as part of the general military requirement for worldwide secure voice communication." NVP’s firstBoeing C-40 Clipper (1,614 words) [view diff] exact match in snippet view article find links to article
The aircraft features two-way broadband data communications, including secure voice and data communication; elements include internet and network accessDefense Information System Network (751 words) [view diff] case mismatch in snippet view article find links to article
available in a variety of bit rates and interfaces. Voice Multilevel Secure Voice (DRSN) SBU Voice (VoIP and DSN) TS/SCI Voice (JWICS) Voice ISP-PSTN VoiceJoint Network Node (281 words) [view diff] exact match in snippet view article find links to article
routers, with NIPRNet and SIPRNet capabilities, plus secure and non-secure voice systems, VTC, and the ability to link in older "legacy" systems, suchCompanding (969 words) [view diff] exact match in snippet view article find links to article
— A. B. Clark patent In 1942, Clark and his team completed the SIGSALY secure voice transmission system that included the first use of companding in a PCMFishbowl (secure phone) (351 words) [view diff] case mismatch in snippet view article
architecture developed by the U.S. National Security Agency (NSA) to provide a secure Voice over IP (VoIP) capability using commercial grade products that can be1964th Communications Group (821 words) [view diff] exact match in snippet view article find links to article
teletype, microwave, cryptographic/dighal subscriber terminal element, secure voice communications, long range navigation, maintenance, and operations withinDefense Information Systems Agency (3,679 words) [view diff] case mismatch in snippet view article find links to article
secure SIPRNet) TS/SCI Voice (formerly known as JWICS Voice) Multilevel Secure Voice (formerly known as DRSN) DISA Enterprise CVVoIP Video: Global Video ServicesBlackphone (1,133 words) [view diff] exact match in snippet view article find links to article
was increased to US$799.00. A one-year subscription to Silent Circle’s secure voice and video calling and text messaging services, plus a one-year "Friend30th Operations Group (1,225 words) [view diff] exact match in snippet view article find links to article
spectrum management, missile silo communications, base secure and non-secure voice/video/data network operations, network defense, computer systems supportTALC+ (240 words) [view diff] exact match in snippet view article find links to article
communication. TALC+ can call almost any telephone worldwide for non-secure voice communication, talk up to Secret with STEs (or other SCIP-based telephones)Defense Satellite Communications System (789 words) [view diff] exact match in snippet view article find links to article
failure in August 1966. DSCS II, developed under Program 777 provided secure voice and data transmission for the United States Armed Forces. The programM1131 fire support vehicle (568 words) [view diff] exact match in snippet view article find links to article
Four combat radio nets (Co Cmd, Mortar Plt, FECC, Fires 1-4) allow secure voice and digital communications with, Initial Fire Support Automation SystemBoeing VC-25 (3,528 words) [view diff] exact match in snippet view article find links to article
and the cockpit are on the upper deck. There are also secure and non-secure voice, fax and data communications facilities. While the aircraft's luggageElectronic counter-countermeasure (1,486 words) [view diff] exact match in snippet view article find links to article
This system, together with advanced microelectronics, also provided secure voice, data, and text communications under the most severe electronic warfareNaval Computer and Telecommunications Area Master Station Pacific (1,483 words) [view diff] case mismatch in snippet view article find links to article
Makalapa (CINCPACFLT), Camp Smith (CINCPAC), Moanalua (FLEWEACEN), Secure Voice Pearl Harbor, and Consolidated Maintenance came under an Officer-in-ChargeParakeet (communication system) (63 words) [view diff] exact match in snippet view article
considered (at the time) advanced military communications. This included secure voice and data trunking services. Project JP2072 has been recently raised toSikorsky HH-60 Pave Hawk (3,025 words) [view diff] exact match in snippet view article find links to article
navigation/global positioning/Doppler navigation systems, satellite communications, secure voice, and Have Quick communications. The term PAVE stands for Precision AvionicsByron's letters (1,642 words) [view diff] exact match in snippet view article find links to article
Massachusetts Press. p. 49. ISBN 1558491384. Retrieved 27 December 2017. secure voice of the confirmed skeptic. Marchand 1973, p. 18. Lansdown, Richard (2012)Chester Nez (844 words) [view diff] exact match in snippet view article find links to article
Elliot, California, where they were tasked with creating a code for secure voice tactical (battlefield) communications. At the time, tactical radios wereNational Cryptologic Museum (1,622 words) [view diff] exact match in snippet view article find links to article
Information Assurance, which deals with the rise of satellite technology, secure voice communications, tamper-evident technologies, nuclear command and controlLena Horne (5,199 words) [view diff] exact match in snippet view article find links to article
producer Rodney Jones, the recordings featured Horne with a remarkably secure voice for a woman of her years, and include versions of such signature songsExelis Inc. (1,461 words) [view diff] exact match in snippet view article find links to article
& Communications Solutions (NVCS) provided products and services for secure voice and data communications, battlefield situational awareness, and nightSkype for Business Server (2,169 words) [view diff] exact match in snippet view article find links to article
Connectivity Establishment for NAT traversal and TLS encryption to enable secure voice and video both inside and outside the corporate network. Skype for BusinessEDO Corporation (6,584 words) [view diff] exact match in snippet view article find links to article
validating and testing military data links, and the Wideband Secure Voice Equipment (WSVE) for secure voice radio transmission. The Defense Systems business unitGeneral Dynamics F-16 Fighting Falcon variants (16,800 words) [view diff] exact match in snippet view article find links to article
the scope of the modernization include: a Turkish mission computer, secure voice radio module, and IFF system; and upgrades to various other instrumentationJoint Communications Support Element (2,547 words) [view diff] exact match in snippet view article find links to article
Node: A modular IP based package capable of providing secure and non-secure voice, data and video for a myriad of operations ranging from small initialGeorg Poplutz (707 words) [view diff] exact match in snippet view article find links to article
of Schubert's Winterreise noted, that the singer, with an absolutely secure voice and attention to diction, created an intense atmosphere full of tensionNSA encryption systems (3,078 words) [view diff] exact match in snippet view article find links to article
speech encoders became possible in the mid-1960s. The first tactical secure voice equipment was the NESTOR family, used with limited success during theSD card (12,926 words) [view diff] exact match in snippet view article find links to article
in 2012. microSD cards with Secure Elements have also been used for secure voice encryption on mobile devices, which allows for one of the highest levelsNational Policing Improvement Agency (2,024 words) [view diff] exact match in snippet view article find links to article
training for high-tech crime, forensics and major investigations Clear and secure voice communication through the Airwave service Round the clock specialistAirbus Group, Inc. (1,465 words) [view diff] exact match in snippet view article find links to article
a purpose-built, high-capacity voice encryption device that enables secure voice communications among geographically disparate users and between unclassifiedGuardian Project (software) (1,172 words) [view diff] exact match in snippet view article
of free, open protocols, standards and software, to power end-to-end secure voice communications on mobile devices, as well as with desktop computers.Joint Electronics Type Designation System (3,570 words) [view diff] exact match in snippet view article find links to article
viewers, trackers, alignment equipment SY Speech, secure Devices that secure voice transmission/receiving equipment T Transmitters Transmitters, all typesMultifunctional Information Distribution System (1,028 words) [view diff] exact match in snippet view article find links to article
can vary between 108 and 238 kbit/s, depending on the interface used. Secure voice messages are available with two different rates: 16 kbit/s and 2.4 kbit/sShipboard Integrated Communications System (286 words) [view diff] case mismatch in snippet view article find links to article
The underlying technology of SHINCOM 2100 contributed to the AN/ON-568 Secure Voice System, which was a part of the USN Aegis Combat System. SHINCOM 2100194th Engineer Brigade (United States) (1,161 words) [view diff] exact match in snippet view article
also supported units of the 80th Troop Command by installing digital secure voice telephones (DSVT). The DSVT allowed the units to maintain voice communicationsQuantum network (5,886 words) [view diff] exact match in snippet view article find links to article
high enough data rates to support popular end-user application such as secure voice and video conferencing. Previous large-scale QKD networks typically usedUSS Sterett (CG-31) (1,730 words) [view diff] exact match in snippet view article
hostile aircraft over North Vietnam to the Talos ship via the Navy RED secure voice (KY-8) net and the NTDS Link 14 teletype. Although this missile trapAN/PRC-113 (465 words) [view diff] exact match in snippet view article find links to article
consists of the RT-1319 transceiver and minor components. It can provide secure voice communications with the external TSEC/KY-57 device and is compatibleVictor B. Lawrence (2,843 words) [view diff] no match in snippet view article find links to article
were used in AT&T Paradyne's ACCUCOM modem and AT&T Federal System's secure-voice terminal and line-encryptor modem. It was also incorporated into theYou're Everything (album) (375 words) [view diff] exact match in snippet view article
produced CD. Contributing flattering, powerful, and despite his youth, a secure voice and soulful interpretations that are not too corny, just as did the rousingUTSA College of Engineering and Integrated Design (1,199 words) [view diff] exact match in snippet view article find links to article
extensively in the areas of cyber security and homeland defense. Reliable and secure voice and data communications are important in mission success and in providingMahlon E. Doyle (431 words) [view diff] exact match in snippet view article find links to article
Campbell, Joseph P. Jr.; Dean, Richard A. (July 1993). "A history of secure voice coding: Insights drawn from the career of one of the earliest practitionersBritish Armed Forces communications and information systems (4,410 words) [view diff] exact match in snippet view article find links to article
five minutes by one soldier, even in darkness, to provide long-range secure voice, data and messaging services, as well as a store and forward (e-mail-type)Home Office radio (409 words) [view diff] exact match in snippet view article find links to article
Airwave now has a nationwide network of more than 3,000 sites and provides secure voice and data communications to over 300 public safety organisations. "Home"Home Office radio (409 words) [view diff] exact match in snippet view article find links to article
Airwave now has a nationwide network of more than 3,000 sites and provides secure voice and data communications to over 300 public safety organisations. "Home"List of the United States military vehicles by model number (10,451 words) [view diff] case mismatch in snippet view article find links to article
Digital Terminal No. 2 Equipment, 10-Ton, 4-Wheel XM849 Semitrailer, Van: Secure Voice-Dlectronic Equipment, 10-Ton, 4-Wheel XM850 Semitrailer, Van: Voice SwitchMcDonnell Douglas F/A-18 Hornet in Australian service (9,791 words) [view diff] exact match in snippet view article find links to article
replaced with the improved AN/APG-73, and the aircraft were fitted with a secure voice encryption communications system and various updates to their computer2007 Iranian arrest of Royal Navy personnel (10,509 words) [view diff] exact match in snippet view article find links to article
from the Iranian authorities. In addition, British equipment, including secure voice communication kit and navigational hardware, has not been reported asSignals intelligence operational platforms by nation (14,708 words) [view diff] no match in snippet view article find links to article
commercial or military satellites to receive, transmit, and process secure, voice, data, video teleconferencing (VTC), and facsimile communications. ItList of communications and reconnaissance equipment of the British Army (1,924 words) [view diff] exact match in snippet view article find links to article
Skynet V, Cormorant and FALCON. Commanders at all levels are given secure voice and data communications as well as an integrated Global Positioning SystemUSS Koelsch (8,004 words) [view diff] exact match in snippet view article find links to article
equipment and installed bypass cables to increase the number of non-secure voice circuits. All Chemical, Biological, and Radiological (CBR) equipment44th Medical Brigade (30,968 words) [view diff] case mismatch in snippet view article find links to article
1969, the S-2 as project officer for the implementation of the NESTOR Secure Voice Program, published and distributed implementing instructions to brigadeUSS Davis (DD-937) (12,990 words) [view diff] exact match in snippet view article
to the installation of variable depth sonar (VDS) and AN/WSA-1C and a secure voice system, as well as modifications that would allow the ship to have aI Don't Know a Thing About Love (521 words) [view diff] no match in snippet view article find links to article
Howard's "irresistible" songs, the musicianship and Nelson's "remarkably secure" voice. Tom Dunne of The Irish Examiner listed this as one of his six favoriteList of fellows of IEEE Communications Society (86 words) [view diff] exact match in snippet view article find links to article
speech coding, and to the standardization of digital technology for secure voice, cellular radio, and telephony applications 1991 Charles Einolf For leadershipCyberwarfare (15,858 words) [view diff] exact match in snippet view article find links to article
Putin agreed to install a secure Cyberwar-Hotline providing "a direct secure voice communications line between the US cybersecurity coordinator and the