textfiles-politics/src-xml/hopp.xml
2023-04-28 08:02:24 -04:00

167 lines
11 KiB
XML

<?xml version="1.0" encoding="UTF-8"?>
<xml>
<div class="article">
<p>NEW <ent type='ORG'>FBI</ent> ATTEMPTS AT SECURE COMMUNICATION</p>
<p>COPYRIGHT (C) 1991 BY FULL DISCLOSURE. ALL RIGHTS RESERVED.</p>
<p>The <ent type='ORG'>FBI</ent> has spent many millions of dollars attempting to obtain secure
communications by various voice encryption methods, with limited success.</p>
<p>The GAO Report of March 8, 1988, "<ent type='ORG'>FBI</ent> Voice Privacy, Cost, Status, and
Future Direction'' provides much insight into the difficulties the <ent type='ORG'>FBI</ent> has
had establishing a secure communications system.</p>
<p>The <ent type='ORG'>FBI</ent>'s original estimate for establishing a digial voice protection system
was $79.3 million.</p>
<p>The March 8th report indicates that "[b]ecause the <ent type='ORG'>FBI</ent>'s estimated savings
cited in the table are very preliminary and are not supported by formal field
surveys or other documentation, we continue to believe that the $204.4
million and the latest $205.8 million estimate for the nationwide voice
privacy program appear to be unrealistic.''</p>
<p>A big part of the major cost overrun was a lack of technological review of
what they were getting into.</p>
<p>"Our Feburary 1987 report explains that the technological impact of range
loss on the DVP system was one factor that increased the <ent type='ORG'>FBI</ent> cost estimates
from $79.3 million to $204.4 million. In the report, we say that 'the <ent type='ORG'>FBI</ent>
recognized in its 1979 to 1981 research that the communications range of DVP
technology was less than the range of the old, unsecure system, but it did
not consider the impact of this reduction.' The <ent type='ORG'>FBI</ent> says that this statement
is 'totally in error because we did recognize range loss and did consider its
impact.</p>
<p>"In a follow-up discussion, a key <ent type='ORG'>FBI</ent> official who is knowledgable about the
voice privacy cost estimate process told us that the <ent type='ORG'>FBI</ent> did not consider
range loss in the $79.3 million estimate and emphasized that an engineering
consultant firm developed the estimate as part of a comparison of analog
versus digital voice privacy technologies. According to this official, range
loss was not serious considered until the <ent type='ORG'>FBI</ent> prepared the $132.4 million
estimate. The <ent type='ORG'>FBI</ent> says that its methodology for developing the $132.4 million
estimate included doubled the number of repeaters to compensate for the DVP
range loss.</p>
<p>However, a 1984 from the Deputy Assistant Director, Technical Services
Division, the following range loss problems were described: "The Motorola
DVP/DES [Data Encryption Standard] system has a loss in range as a penalty
for the effectiveness of the digital voice privacy. Experience in the six
cities has demonstrated that to equal the existing geographic coverage, there
is an 80%-100% increase in so called fixed station equipment (e.g. repeaters,
cross band sites, and backbone equipment).''</p>
<p>Much of the <ent type='ORG'>FBI</ent>'s difficults seems to be from a lack of proper management.
According to the GAO report, "[d]uring our review, we could not find any
evidence that a long range plan for the nationwide DVP program had been
prepared, and <ent type='ORG'>FBI</ent> officials confirmed that a written plan did not exist. The
<ent type='ORG'>FBI</ent> contends that it was not feasable to prepare a formal plan for the DVP
program, within time and manpower constraints. In follow-up discussions about
their response to our report, <ent type='ORG'>FBI</ent> official emphasized that DVP is a threat
driven system and told us that it was a management decision to go full speed
ahead rather than plan.</p>
<p>Now, the <ent type='ORG'>FBI</ent> is trying to solve the problem with frequency hopping radios.
According to Daniel Miller, Contracting Officer for the <ent type='ORG'>FBI</ent>, 45 PH-26
(portable frequency hopping radios) and 20 MH-26 (mobile frequency hopping
radios) along with numerous accessories, including 2 repeaters were purchased
on September 24, 1990.</p>
<p>These radios are not FCC approved radio equipment and the <ent type='ORG'>FBI</ent> has a
sole-source contract for them with Transcrypt International, Inc., 1440
Buckingham Dr, Lincoln, NE 68506, Phone: (402) 483-2961, Fax: (402) 435-6780,
Telex: 466146.</p>
<p>According to Transcrypt's brochure, "encryption insures that no outside
party can understand radio transmissions, an encrypted radio signal has a
very distinctive sound; and with the right equipment, it can be jammed,
intercepted, or the source located.''</p>
<p>Transcrypt refused to provide Full Disclosure with pricing information and
that information was not available from the Government by press time. The
going rate for this type of equipment, however is said to be approximately
$10000 per radio. Transcrypt will only sell the radio within the United
States to law enforcement agencies.</p>
<p>Even though their brochure claims that both the public and private sectors
outside the United States have the need for this type of secure
communications (no mention is made that the private sector within the United
States has such needs), a company spokesman seemed skeptical that the State
Department would approve the radios for export.</p>
<p>The idea behind frequency hopping radios is that rather than transmitting
constantly on one frequency, the frequency is changed many times per second
in a pseudo-random fashion. These radios switch from 12 to 50 times per
second, between any channels in a programmable window of the 148-174Mhz band.
The window size is programmable between 100Khz and 1.6Mhz. Therefore, if the
window size was set to 1.6Mhz and the window was located at 165.000mhz, the
transmissions would occur only on frequencys between 165.000mhz and
166.600mhz.</p>
<p>Therefore, with a standard scanner one would not notice the existence of such
transmission, nor be able to pin point them. Monitoring one of the
frequencies it used in its hopping sequence would result only in a burst of
noise 1/12 to 1/50 of a second in duration.</p>
<p>Another brochure from Transcrypt quotes from Communications Africa a claim
that "there are very few countries in which the equipment and expertise are
available to try to break these systems.''</p>
<p>Finally, the <ent type='ORG'>FBI</ent> has a solution to is desire for secure communications or
does it? The first glimpse to a line of attack is in the same brochure that
quotes from Communications Africa. It explains how other (in use) frequencies
in an urban environment gives the transmissions extra cover. Any kind of
transmission made in an urban environment gets extra cover from all the other
surrounding transmissions.</p>
<p>The fact that the transmissions need or gain from having "cover'' indicates
that they are not invisible.</p>
<p>Technical sources suggested the following as a method of detecting use of
frequency hopping radios in the area. Hook a cable ready TV set to an
appropriate antenna and tune it to the federal band (160-172mhz). Cable
channels G, H and I. Each channel will display a 5mhz spectrum of the federal
band. The complete frequency range of the radio would be cable channels A
through I and 7.</p>
<p>The sources indicated that operation of a frequency hopping radio in the area
will show a distinct pattern on the screen. To test this theory, Full
Disclosure hooked up a low power programable RF oscillator to switch
frequencies 15 times per second in the 160mhz range and powering the unit on
showed a distinct change (unique unsynchronized horizontal lines) in the
display on a TV set tuned to that frequency.</p>
<p>Because of the narrow window the units use, after locating the frequency of
the window, jamming the unit could be accomplished with a wide bandwidth
transmitter. (1.6mhz isn't real wide, compared to a 5mhz video transmitter).
If a little used portion of the VHF band was selected for operation by the
frequency hopping radios, jamming could be accomplished with little
interference to other transmissions. </p>
<p>There is some dispute over the effectiveness of using a spectrum analyzer to
spot the use of frequency hopping radios. One technical source aptly pointed
out "why worry about whether a spectrum analyzer works when a $100 TV set
does?''</p>
<p>As with any new surveillance technology, there is a gap between its
introduction and the availablity of countermeasures. Unlike spread spectrum
radios that switch frequencies over the entire RF spectrum, frequency hopping
radios operate in a very small window making detection, jamming, and
direction finding a much simpler task.</p>
<p>The following are selected specifications for the PH-26 and MH-26 radios.
Figures in ()'s are for the MH-26 when different.</p>
<p>Frequency Programming Range: 148-174MHz. Frequency stability: .0005%.
Frequency spacing: 5, 6.25, 12.5, 15, 25 or 30KHz. Transmitter: Power Output:
1 or 5 watts (30 watts). Modulation: FM. Receiver: Sensitivity 12 db. Sinad:
.25uv. Selectivity @30Khz: 70 db. Audio Output: 500mw (5 watts). Frequency
Agil Mode: Number of channels: 4096. Frequency series: Pseudorandom (PR).
Dwell time: 20 to 100 milliseconds. Synchronization: Continuous digital.</p>
<p>The above is reprinted from Full Disclosure Newspaper. Subscribe today and
get interesting articles like the above, plus more... pictures, graphics,
advertisement, and more articles. Full Disclosure is your source for
information on the leading edge of surveillance technology. Print the
following form, or supply the information on a plain piece of paper:</p>
<p>Please start my subscription to Full Disclosure for:</p>
<p>[ ] Sample issue, $2.00</p>
<p>[ ] 12 issue subscription, $18.00</p>
<p>[ ] 24 issue subscription, $29.95
With 24 issue susbcription include free one of the following:
[ ] Directory of Electronic Surveillance Equipment Suppliers
[ ] Citizen's Guide on How to Use the Freedom of Info/Privacy Acts
[ ] Maximizing PC Performance</p>
<p>Also available separately:</p>
<p>[ ] Directory of Electronic Surveillance Equipment Suppliers, $6.00</p>
<p>[ ] Citizen's Guide on How to Use the Freedom of Info/Privacy Acts, $5.00</p>
<p>[ ] Maximizing PC Performance, $6.00</p>
<p> Illinois residences, add 6.5% sales tax on above 3 items.</p>
<p>Enclosed is payment in the form of:</p>
<p>[ ] Check/Money order, [ ] Visa, [ ] Mastercard</p>
<p>Card no:___________________________________ Exp date:_______</p>
<p>Signature:__________________________________________________</p>
<p>Phone:______________________________________________________
(required for credit card orders)</p>
<p>My name/address:</p>
<p>Name:_______________________________________________________</p>
<p>Street:_____________________________________________________</p>
<p>City/State/Zip:_____________________________________________</p>
<p>Return to: Full Disclosure, Box 903, Libertyville, Illinois 60048
</p>
</div>
</xml>