E C U R I T Y; P H Y S I C A L S E C U R I T Y; G E N E R A L Z E R O I S E - Philips SPENDEX 40 Operating Instructions Manual

Speech encryption decryption equipment
Hide thumbs Also See for SPENDEX 40:
Table of Contents

Advertisement

NATO RESTRICTED
S P E N D E X
4 0
U A
8 2 5 1 / 0 1
O P E R A T I N G
M A N U A L
3
S E C U R I T Y
3 . 1 P h y s i c a l S e c u r i t y
The terminal can operate in a secure mode only if the CIK module
corresponding specifically to the terminal is connected. In this way
the CIK module represents physical security against unauthorised use
in the secure mode. Without the CIK module, the terminal can be used
only as a normal telephone for nonsecure communication.
The CIK module is tested automatically each time it is connected. If
its contents (i.e. the CIK) are valid, then "CIK OK " (terminal
loaded) or "NUL.CIK " (terminal empty and CIK=0) appears in the
display for 3 s. If the CIK is not valid, then "ILL.CIK " or
"ERR.CIK " appears in the display.
3 . 2 G e n e r a l Z e r o i s e
Pressing of the ZEROIZE push button makes all stored key variables
unusable, whether the supply is switched on or off. If the supply
voltage is present, "%ALARM " appears in the display and shortly
after that "ZEROISED". Furthermore the contents of a CIK module that
may be connected will be destroyed.
Only after new key variables have been loaded will it be possible to
use the terminal again for secure communication.
9 9 2 2
1 5 4
1 3 0 6 1
3 - 1
NATO RESTRICTED

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ua 8251/01

Table of Contents