Menu English Ukrainian russian Home

Free technical library for hobbyists and professionals Free technical library


ENCYCLOPEDIA OF RADIO ELECTRONICS AND ELECTRICAL ENGINEERING
Free library / Electrician

Telephone line security. Encyclopedia of radio electronics and electrical engineering

Free technical library

Encyclopedia of radio electronics and electrical engineering / Security devices and object signaling

Comments on the article Comments on the article

Heads of various organizations, entrepreneurs and other business people cannot do without a telephone. Quite often they communicate, make various decisions, and clarify emerging issues using the telephone, so it is not surprising that they want to make sure that conversations are not available to outsiders. However, it should be noted that today in the market of technical means you can see many types ofdevices for intercepting telephone messages both domestic and foreign manufacturers.

Methods for intercepting telephone messages

There are six main listening areas on a telephone line. These include:

- telephone set;

- telephone line, including junction box;

- cable zone;

- ATS;

- multichannel cable;

- radio channel.

A diagram of a telephone line with listening zones is shown in fig. 122.

Telephone line security
Rice. 122. Diagram of a telephone line.

It is easiest to connect in the first three zones. For listening, a parallel device is most often used. In the cable zone, connection is more difficult, since for this you need to penetrate the telephone communications system, consisting of pipes with cables laid inside them, and choose the right pair among many others.

Telephone repeaters

Telephone radio repeaters are radio extenders for transmitting telephone conversations over radio channels. Bookmarks installed in phones are automatically activated when you pick up the handset and transmit information to the interception and recording point. The radio transmitter is powered by the telephone network voltage. Due to the lack of batteries and microphone in the repeater, it may be small in size. The disadvantages of these devices include the fact that they are easy to detect by radio emission, therefore, to reduce the probability of their detection, the radiation power of the transmitter installed on the telephone line is reduced. A powerful repeater is installed in a separate room. It re-radiates the signal in encrypted form. Radio repeaters can be made in the form of capacitors, filters, relays and other standard units and elements that are part of telephone equipment.

To listen to the telephone line, it is possible to use a telephone with a radio extender consisting of two radio stations. The first is located in the handset, the second - in the telephone. The receiver is tuned to the desired frequency.

Room eavesdropping

With the help of a telephone line, you can also listen to the premises. For this, special devices are used. A diagram of possible listening to premises via a telephone line is shown below (Fig. 123).

Telephone line security
Rice. 123. Scheme of listening to premises on a telephone line.

The principles of operation of such a device are as follows: the subscriber's number is dialed. The first two beeps are absorbed by the device, i.e. the phone does not ring. The handset is placed on the lever, and after a minute they begin to dial the same number again. After that, the system enters listening mode. On fig. 124 shows one such device.

Telephone line security
Rice. 124. Box-T device.

"Box-T" is able to control the room by phone at any distance.

There are also no-way systems for transmitting acoustic information over telephone lines, which make it possible to listen to premises without installing any additional equipment.

Technical means of information protection

Regardless of what kind of activity a person is engaged in, for example, whether he is the head of a large enterprise or a commercial bank, he will certainly be interested to know how information can be leaked and how to protect himself from it.

Protection of telephone sets and communication lines

The telephone has long become an integral part of human life, telephone lines carry a variety of information flows, and that is why it is important to protect them from being used to harm. The telephone set and the PBX communication line are the main channels for information leakage.

1. Changes are made to the design of the phone to transmit information or special equipment is installed with high-frequency radiation in a wide frequency band, modulated by an audio signal, which serves as a channel for information leakage.

2. The shortcomings of the designs of telephone sets are taken into account and are used to obtain information.

3. There is an external influence on the phone, as a result of which information is leaked.

Phone Protection

Ring chain protection. An information leakage channel may occur due to electro-acoustic conversion. When talking in a room, acoustic vibrations act on the pendulum of the bell connected to the armature of the electromagnetic relay. Sound signals are transmitted to the anchor, and it makes micro-oscillations. Further, the vibrations are communicated to the anchor plates in the electromagnetic field of the coils, as a result of which microcurrents appear, modulated by sound. The amplitude of the EMF induced in the line, in some types of telephone sets, can reach several millivolts.

For reception, a low-frequency amplifier with a range of 300-3500 Hz is used, which is connected to the subscriber line. To protect the ringing circuit, a device with the circuit shown in Fig. 125.

Telephone line security
Rice. 125. Ringing circuit protection circuit: VD1 and VD2 - silicon diodes; B1 - telephone set; R1 is a resistor.

Silicon diodes are connected in anti-parallel to the bell circuit of telephone set B1. A dead zone for micro-EMF is formed, which is explained by the fact that in the range of 0-0,65 V the diode has a large internal resistance. Therefore, low-frequency currents induced in the apparatus circuit will not pass into the line. At the same time, the subscriber's audio signal and the call voltage freely pass through the diodes, since their amplitude exceeds the opening threshold of the diodes VDl, VD2. Resistor R1 is an additional noisy element. Such a circuit, connected in series to the communication line, suppresses the micro-EMF of the coil by 40-50 dB (decibels).

Microphone circuit protection

Receiving information through the microphone circuit is possible due to the method of high-frequency imposition.

The scheme for protecting the microphone device using this method is shown in fig. 126.

Telephone line security
Rice. 126. Microphone protection circuit: M1 - microphone; C1 is a capacitor.

Microphone M1 is a modulating element, for the protection of which it is necessary to connect a capacitor C1 with a capacity of 0,01-0,05 μF in parallel with it. In this case, capacitor C1 shunts the microphone capsule M1 at high frequency. The modulation depth of high-frequency oscillations is reduced by more than 10 times, which makes further demodulation almost impossible.

Comprehensive protection scheme

The integrated protection scheme includes the constituent elements of the first and second schemes above. In addition to capacitors and resistors, this device also contains inductors (Fig. 127).

Telephone line security

Diodes VD1-VD4, connected in anti-parallel, protect the ringing circuit of the phone. Capacitors and coils form filters C1, L1 and C2, L2 to suppress high frequency voltages.

Details are mounted in a separate case by surface mounting. The device does not need to be configured. At the same time, it does not protect the user from direct eavesdropping by direct connection to the line. In addition to all these schemes, there are others that are close to similar devices in their technical characteristics. Many of them are designed for complex protection and are often used in practice.

Cryptographic methods and means of protection

To prevent listening to conversations on a telephone line, you can use a cryptographic method, which is perhaps the most cardinal measure of protection.

There are two methods:

1) conversion of analog speech parameters;

2) digital encryption.

Devices that use these methods are called scramblers.

An analog scrambler involves changing the characteristics of the original audio signal in such a way that it becomes unintelligible as a result, while at the same time occupying the same frequency band. This allows it to be transmitted over conventional telephone communication channels.

The signal change is manifested in the following:

- frequency inversion;

- frequency permutation;

- temporary change.

A digital scrambler involves changing the characteristics of the original audio signal so that it becomes unintelligible as a result. This device contributes to the preliminary conversion of an analog signal into a digital form. After that, the signal is encrypted using special equipment.

Author: Korshevr N.G.

See other articles Section Security devices and object signaling.

Read and write useful comments on this article.

<< Back

Latest news of science and technology, new electronics:

Artificial leather for touch emulation 15.04.2024

In a modern technology world where distance is becoming increasingly commonplace, maintaining connection and a sense of closeness is important. Recent developments in artificial skin by German scientists from Saarland University represent a new era in virtual interactions. German researchers from Saarland University have developed ultra-thin films that can transmit the sensation of touch over a distance. This cutting-edge technology provides new opportunities for virtual communication, especially for those who find themselves far from their loved ones. The ultra-thin films developed by the researchers, just 50 micrometers thick, can be integrated into textiles and worn like a second skin. These films act as sensors that recognize tactile signals from mom or dad, and as actuators that transmit these movements to the baby. Parents' touch to the fabric activates sensors that react to pressure and deform the ultra-thin film. This ... >>

Petgugu Global cat litter 15.04.2024

Taking care of pets can often be a challenge, especially when it comes to keeping your home clean. A new interesting solution from the Petgugu Global startup has been presented, which will make life easier for cat owners and help them keep their home perfectly clean and tidy. Startup Petgugu Global has unveiled a unique cat toilet that can automatically flush feces, keeping your home clean and fresh. This innovative device is equipped with various smart sensors that monitor your pet's toilet activity and activate to automatically clean after use. The device connects to the sewer system and ensures efficient waste removal without the need for intervention from the owner. Additionally, the toilet has a large flushable storage capacity, making it ideal for multi-cat households. The Petgugu cat litter bowl is designed for use with water-soluble litters and offers a range of additional ... >>

The attractiveness of caring men 14.04.2024

The stereotype that women prefer "bad boys" has long been widespread. However, recent research conducted by British scientists from Monash University offers a new perspective on this issue. They looked at how women responded to men's emotional responsibility and willingness to help others. The study's findings could change our understanding of what makes men attractive to women. A study conducted by scientists from Monash University leads to new findings about men's attractiveness to women. In the experiment, women were shown photographs of men with brief stories about their behavior in various situations, including their reaction to an encounter with a homeless person. Some of the men ignored the homeless man, while others helped him, such as buying him food. A study found that men who showed empathy and kindness were more attractive to women compared to men who showed empathy and kindness. ... >>

Random news from the Archive

Smartphone with built-in thermal imager 26.02.2016

Bullitt has announced the world's first smartphone with a built-in thermal imager from FLIR Systems.

The S60 is part of a line of gadgets under the Cat brand. The thermal imaging module for the device is supplied by FLIR Systems, a company specializing in thermal imaging systems.

The smartphone displays a thermal image on the screen in real time at a resolution of 640 by 480 pixels. You can save readings in the form of pictures or videos.

The Cat S60 is designed, for example, to be used in rescue operations, in case you need to search for people under foliage or in conditions of heavy smoke.

In addition, the gadget can withstand a fall from a height of 1,8 meters and immersion in water to a depth of 5 meters. The Cat S60 is expected to be available in late May 2016 for $599.

In February 2015, the American company Torrey Pines Logic introduced the T10 compact budget thermal imager, which can be mounted on various types of weapons, including pistols. The device is presented in two "civilian" versions - T10-S and T10-N - and "military" T10-M.

Other interesting news:

▪ The best decisions are made on an empty stomach

▪ New series of wet tantalum capacitors with maximum capacitance

▪ Microbes against caries

▪ Happiness gene found

▪ Pleasure centers help the immune system

News feed of science and technology, new electronics

 

Interesting materials of the Free Technical Library:

▪ section of the site Protection of electrical equipment. Article selection

▪ article The question is, of course, an interesting one. Popular expression

▪ article Which mammals have a social organization like an ant's? Detailed answer

▪ Ammi's article is great. Legends, cultivation, methods of application

▪ article The electronic unit of the car economizer. Encyclopedia of radio electronics and electrical engineering

▪ article Voltage converter on microcircuits, 12/24 volts. Encyclopedia of radio electronics and electrical engineering

Leave your comment on this article:

Name:


Email (optional):


A comment:





All languages ​​of this page

Home page | Library | Articles | Website map | Site Reviews

www.diagram.com.ua

www.diagram.com.ua
2000-2024