Most of these are CISCO IP phones, or Avaya telephone sets.
Amazing complex instrument with some simply lovely security holes that an eavesdropper can exploit.
http://www.cisco.com/en/US/products/ps9748/index.htmlhttp://www.cisco.com/en/US/products/ps8538/index.htmlhttp://www.cisco.com/en/US/products/hw/ ... index.htmlhttp://www.cisco.com/en/US/products/hw/ ... index.htmlA lot of these phones are also Lucent MLS of Definite phones (all an eavesdroppers paradise).
I really hate to have to mention this, but in the followign image:
http://cryptome.org/2012-info/obama-phones/pict52.jpgYou will notice is using a cell phone right next to a STE
Same here:
http://cryptome.org/2012-info/obama-phones/pict30.jpgUsing cell phone in close proximity to a secure telephone.
When you place a concentrated RF signal transmitter in close proximity to a piece of cryptographic gear (like a STU or STE) the RF signals and strong enough to intermix with the RF or magnetic signals and create a third signal. This is most valuable with cryptographic equipment that used cables that was not in conduit as the cable (seem in these pictures) provides a high threat access point where all kinds of havoc can be caused if a cell phone is brought within 8-12 feet of a STU, or 16+ feet of a STE. You will notice that the moron holding the phone is well within those distances.
Observers with sharp eyes will also notice the profoundly sloppy jobs of TSCM that is being done on these phones as well, and how the routing requirements for cables are not beign observered,