269 lines
11 KiB
Plaintext
269 lines
11 KiB
Plaintext
|
BROUGHT TO YOU BY TAXMAN / SC<53><43>PEX
|
|||
|
THANX YOU FOR AB-USING AT&T CARDZ
|
|||
|
|
|||
|
Subject: Telephone Security Device release
|
|||
|
|
|||
|
Content-Length: 10971
|
|||
|
|
|||
|
|
|||
|
For Immediate Release: September 10, 1992
|
|||
|
|
|||
|
|
|||
|
AT&T INTRODUCES BREAKTHROUGH IN TELEPHONE SECURITY
|
|||
|
|
|||
|
|
|||
|
GREENSBORO, N.C. (September 10, 1992) -- AT&T has brought
|
|||
|
security to the phone you use every day.
|
|||
|
|
|||
|
The AT&T Telephone Security Device Model 3600 provides
|
|||
|
advanced encryption technology to standard telephones, allowing
|
|||
|
businesses to discuss sensitive matters without fear that their
|
|||
|
words can be intercepted.
|
|||
|
|
|||
|
"The Telephone Security Device is a breakthrough in
|
|||
|
telephone communications," said Ed Hickey, AT&T Vice President
|
|||
|
for Secure Communications Systems. "It makes your everyday phone
|
|||
|
a secure device, and it makes protecting your conversation as
|
|||
|
easy as making a regular phone call."
|
|||
|
|
|||
|
In showing the device to corporate clients, AT&T has
|
|||
|
received an overwhelmingly positive reaction.
|
|||
|
|
|||
|
"We've gotten the strongest reaction we've ever seen for a
|
|||
|
secure communications product," Hickey says. "This is the
|
|||
|
product they've been waiting for."
|
|||
|
|
|||
|
The Model 3600 is compatible with both digital and analog
|
|||
|
phones. Designed for portability and ease of use, it's slightly
|
|||
|
larger than a hand-held calculator and weighs only about 1.5
|
|||
|
pounds. Its small size and light weight allow it to be carried
|
|||
|
in a briefcase and used in the office, at home and when travel-
|
|||
|
ling.
|
|||
|
|
|||
|
To use the device, simply disconnect your handset's cord
|
|||
|
from the phone and plug that cord into the Telephone Security
|
|||
|
Device. Plug the device's line into your phone and its power
|
|||
|
cord into an outlet, and it's ready to operate.
|
|||
|
|
|||
|
To secure a call, simply press a button and the signal is
|
|||
|
automatically encrypted. An easy-to-read display indicates that
|
|||
|
the call has been secured.
|
|||
|
|
|||
|
The Model 3600 uses an advanced encryption algorithm to turn
|
|||
|
the audio signal from your telephone handset into a digital
|
|||
|
stream of encrypted information that can be decrypted only by a
|
|||
|
Telephone Security Device attached to the phone you're calling.
|
|||
|
|
|||
|
AT&T Bell Laboratories also designed an advanced voice-
|
|||
|
sampling algorithm that delivers superior voice quality on secure
|
|||
|
calls, rivaling the clarity of regular phone conversations.
|
|||
|
|
|||
|
AT&T stands behind the Telephone Security Device with a full
|
|||
|
one-year warranty and optional extensions.
|
|||
|
|
|||
|
The device will be shown publicly for the first time Monday
|
|||
|
at the American Society for Industrial Security seminar in San
|
|||
|
Antonio.
|
|||
|
|
|||
|
The device retails for $1,195. It is available directly
|
|||
|
from the AT&T Secure Communications Customer Service Center (1
|
|||
|
800 952-4082).
|
|||
|
|
|||
|
For a more detailed look at communications security, the
|
|||
|
growing risks businesses face and AT&T's role in providing secure
|
|||
|
communications to business, call David Arneke, 919 279-7680 or
|
|||
|
Bill Jones, 919 279-6511, at AT&T.
|
|||
|
|
|||
|
# # #
|
|||
|
|
|||
|
|
|||
|
COMMUNICATIONS SECURITY: A GROWING CONCERN FOR BUSINESS
|
|||
|
|
|||
|
|
|||
|
GREENSBORO, N.C. (September 10, 1992) -- How big an issue
|
|||
|
is communications security for businesses? Far bigger than most
|
|||
|
of the business community realizes.
|
|||
|
|
|||
|
Theft of proprietary information is estimated to cost U.S.
|
|||
|
and Canadian businesses $20 billion a year. Some of the
|
|||
|
largest -- and most technologically sophisticated -- U.S. cor-
|
|||
|
porations have lost billions in the theft of trade secrets.
|
|||
|
|
|||
|
But it's not just business competitors that companies have
|
|||
|
to be concerned about. Many nations are defining their national
|
|||
|
security as economic security, and they're putting their intel-
|
|||
|
ligence agencies into the business of industrial and economic
|
|||
|
espionage.
|
|||
|
|
|||
|
"And yet, our experience in the market, and every study
|
|||
|
we've seen, indicates that top executives' awareness of the
|
|||
|
problem is low to non-existent," says Ed Hickey, AT&T Vice
|
|||
|
President, Secure Communications Systems.
|
|||
|
|
|||
|
"Most businesses think it just won't happen to them."
|
|||
|
|
|||
|
The FBI reports that foreign intelligence agencies already
|
|||
|
are actively spying on businesses to collect U.S. technology and
|
|||
|
proprietary information, posing a major national security threat.
|
|||
|
|
|||
|
French intelligence agents, for example, have stolen computer
|
|||
|
secrets from IBM and Texas Instruments. Foreign governments have
|
|||
|
tried to steal fiber optic secrets from Corning.
|
|||
|
|
|||
|
"The next war will not be fought with bombs and bullets; it
|
|||
|
will be fought with bits and bytes," Hickey says.
|
|||
|
|
|||
|
Communications and computer systems are moving massive
|
|||
|
amounts of information more quickly and routinely, making those
|
|||
|
systems increasingly valuable to spies. With voice, fax, data
|
|||
|
and video to choose from, businesses can communicate virtually
|
|||
|
any information in any form, even over standard phone lines.
|
|||
|
|
|||
|
As businesses depend on their communications systems more
|
|||
|
and more, they use them in more varied ways -- cellular phones to
|
|||
|
link mobile personnel, teleconferences and videoconferences to
|
|||
|
bring remote locations together, LANs and WANs for transmitting
|
|||
|
computer data.
|
|||
|
|
|||
|
Those systems are delivering ever-greater volumes of infor-
|
|||
|
mation, much of it proprietary and extremely valuable to com-
|
|||
|
petitors.
|
|||
|
|
|||
|
"Any company in a competitive business needs to be aware of
|
|||
|
what it's doing when it communicates sensitive information,"
|
|||
|
Hickey says.
|
|||
|
|
|||
|
"When you pick up the phone and talk about new-product
|
|||
|
development, strategic planning, financial transactions or any
|
|||
|
competition-sensitive matter, you need to know that your words
|
|||
|
are reaching only the people you want them to reach.
|
|||
|
|
|||
|
Contract negotiations, legal actions and personnel issues
|
|||
|
all require confidentiality. And they often require discussions
|
|||
|
over the telephone.
|
|||
|
|
|||
|
"It's not just extraordinary occasions that require
|
|||
|
security. How much information do you talk about on the phone
|
|||
|
every day that competitors or third parties could exploit to
|
|||
|
their advantage -- or to your disadvantage?" Hickey asks.
|
|||
|
|
|||
|
"The same holds true for faxes, videoconferences, data
|
|||
|
transmission and any other electronic communication. It doesn't
|
|||
|
take much to tap a line for any of them."
|
|||
|
|
|||
|
Interception and penetration technology is racing side by
|
|||
|
side with advances in communications technology. And the more
|
|||
|
powerful communications systems become, the higher the stakes
|
|||
|
rise.
|
|||
|
|
|||
|
But most U.S. businesses are barely aware of the risks. And
|
|||
|
many business that are aware -- even some that have been vic-
|
|||
|
timized -- are not facing up to those risks.
|
|||
|
|
|||
|
"Some businesses are simply unsophisticated. They don't
|
|||
|
realize the danger they're putting themselves in by not protec-
|
|||
|
ting their sensitive communications," Hickey says.
|
|||
|
|
|||
|
"But many that are aware of the risks are simply practicing
|
|||
|
denial, choosing to believe that they don't need to do anything,"
|
|||
|
Hickey says. "Some executives say their work 'isn't important
|
|||
|
enough to protect.' Others insist that everything is all right
|
|||
|
because they haven't been victimized yet -- as far as they know.
|
|||
|
|
|||
|
"And, of course, some just don't think their proprietary
|
|||
|
information is important enough to protect if there's a price
|
|||
|
involved."
|
|||
|
|
|||
|
A wide variety of products and services already exist to
|
|||
|
protect communications systems.
|
|||
|
|
|||
|
Recognizing the need for businesses to protect their com-
|
|||
|
munications, AT&T began migrating the secure communications
|
|||
|
devices it provides to the government into the commercial market
|
|||
|
in 1991. The new AT&T Telephone Security Device, which encrypts
|
|||
|
the voice signals of conventional telephones, is the latest
|
|||
|
business product that AT&T has developed.
|
|||
|
|
|||
|
"We designed the Telephone Security Device to meet the key
|
|||
|
demands that businesses have for secure communications," says
|
|||
|
Robin Hall, manager of commercial sales for AT&T Secure Com-
|
|||
|
munications Systems.
|
|||
|
|
|||
|
"It's easy to use because companies don't want complicated
|
|||
|
equipment that requires time-consuming training or procedures.
|
|||
|
|
|||
|
"It works with conventional phones because we've found that
|
|||
|
many companies don't want to part with the equipment they already
|
|||
|
own.
|
|||
|
|
|||
|
"And it's a small, portable unit that can be carried easily
|
|||
|
in a briefcase because companies that have a good awareness of
|
|||
|
security realize that secure communications are necessary
|
|||
|
everywhere they do business."
|
|||
|
|
|||
|
The Telephone Security Device was designed by AT&T Bell
|
|||
|
Laboratories, which developed the technology for AT&T's highly
|
|||
|
successful secure products for the U.S. government. Bell
|
|||
|
Laboratories also developed an advanced voice-sampling algorithm
|
|||
|
to raise the secure voice quality of the device to nearly the
|
|||
|
level of toll calls.
|
|||
|
|
|||
|
The device joins several other secure products that AT&T has
|
|||
|
introduced to provide end-to-end protection for business com-
|
|||
|
munications. They include:
|
|||
|
|
|||
|
-- The AT&T Model 4100 Secure Voice/Data Terminal, which
|
|||
|
provides secure voice and data communications in one integrated
|
|||
|
package. It works as a full-featured telephone for voice calls
|
|||
|
and as a smart modem for data applications.
|
|||
|
|
|||
|
-- The AT&T Model 4100C Secure Cellular Voice/Data Terminal,
|
|||
|
which provides security wherever cellular coverage exists.
|
|||
|
|
|||
|
-- The AT&T Model 4100M Secure MERLIN TM Voice/Data Ter-
|
|||
|
minal,
|
|||
|
compatible with AT&T Merlin telephone systems.
|
|||
|
|
|||
|
-- The AT&T Model 4100V Secure Voice/Data/Video Terminal, a
|
|||
|
secure videotelephone that operates over standard telephone
|
|||
|
lines. The AT&T secure videophone provides the ultimate in
|
|||
|
authentication -- real-time, color, motion video. It also
|
|||
|
transmits high-resolution still images, including photographs,
|
|||
|
maps, documents or virtually any other printed material.
|
|||
|
|
|||
|
-- The AT&T Gretacoder line of high-speed data encryptors,
|
|||
|
which protect computer transmissions of up to 2 Megabits per
|
|||
|
second.
|
|||
|
|
|||
|
AT&T develops and markets these products through AT&T Secure
|
|||
|
Communications Systems, a business unit headquartered in
|
|||
|
Greensboro, North Carolina. The organization also provides
|
|||
|
secure systems engineering and integration services. Its cus-
|
|||
|
tomers include the governments of the United States and other
|
|||
|
nations, and financial institutions and multinational cor-
|
|||
|
porations around the world.
|
|||
|
|
|||
|
AT&T Secure Communications Systems also develops products
|
|||
|
through two subsidiary companies highly respected in the secure
|
|||
|
communications field: AT&T Datotek, based in Dallas, Texas, which
|
|||
|
develops products for secure mobile communications; and AT&T
|
|||
|
Gretag Data Systems of Regensdorf, Switzerland, which develops
|
|||
|
high-speed data encryptors.
|
|||
|
|
|||
|
"There are pockets of awareness throughout the business
|
|||
|
community," Hickey says. "Aerospace and other defense-related
|
|||
|
industries, for example, have a much higher awareness of security
|
|||
|
than most because of their work with the Department of Defense.
|
|||
|
|
|||
|
"The financial industry is doing better, particularly in
|
|||
|
Europe."
|
|||
|
|
|||
|
The State Department's Overseas Security Advisory Council, a
|
|||
|
group of major U.S. corporations, is working to develop greater
|
|||
|
awareness of the risks, particularly for businesses with
|
|||
|
operations outside the United States.
|
|||
|
|
|||
|
"But until business in general gets the message, immense
|
|||
|
amounts of sensitive information are at risk."
|
|||
|
|