It is compatible with standard modular or multiline (key system) connectors and operates full-duplex over a single telephone circuit. The STU-III/Low Cost Terminal (LCT) was designed for use in the office environment among a broad spectrum of military, civil, government, and selected private sector users. The STU-III Family consists of some of the following devices: The data throughput between two STU-IIIs can only be as great as the slowest STU-III connected. Secure data can be transmitted at speeds of 2.4, 4.8, and 9.6 kbps. STU-IIIs come equipped with 2.4 and 4.8 kbps code-excited linear prediction (CELP) secure voice. STU-III operates in full-duplex over a single telephone circuit using echo canceling modem technology. The terminals are designed to operate reliably, with high voice quality, as both ordinary telephones and secure instruments over the dial-up public switch telephone network. The Secure Telephone Unit - Third Generation (STU-III) is a low-cost, user-friendly, secure telephone device. Government initiative to secure all classified and sensitive information, the STU-III program, has blossomed into a strong global organization which is recognized worldwide as an innovative leader in communications security. What began in 1985 as a small project responding to a U.S. It should however, be pointed out that legitimate encryption products are not inexpensive or easy to obtain, and you can expect to pay several thousand dollars for even the most basic equipment. To ensure widespread use, the STU-III was designed to be about the size of a conventional telephone desk set, user-friendly, and relatively low-cost. In fact, the Secure Telephone Unit, Third Generation (STU-III) was developed and produced by 1987. In 1984, the National Security Agency (NSA) initiated the Future Secure Voice System (FSVS), an aggressive, accelerated program to button up US voice communications by the end of the 1980s. In 1970, the Secure Telephone Unit, First Generation or STU-I was launched, followed in 1975 by the STU-II, which mustered some 10,000 users. In the 1960s the KY-3, one of the first practical voice encryption devices, came on the market (which was the size of a short refrigerator or fat two drawer filing cabinet). Secure transmissions whether telephone conversations, facsimile (fax) copies, or automated information systems (AIS) communications have long been possible through encryption, but for many years the equipment was bulky, complex, and expensive.
![two way radio scrambler chip pair two way radio scrambler chip pair](https://s3.manualzz.com/store/data/056435172_1-b701813017d1d881bd9069b73c158733-360x466.png)
Products and services range from desktop secure phones and data modems, to fax encryptors and secure video.
![two way radio scrambler chip pair two way radio scrambler chip pair](https://m.media-amazon.com/images/I/71FRx5Nxp4S._AC_SX522_.jpg)
Government, local law enforcement agencies, banks, universities, multinational corporations and foreign governments. Granite Island Group provides a broad spectrum of information security protection protecting information transmission in a variety of mediums for the Secure Telephone Units, Crypto Key Generators, STU-III Secure Telephone Units, Crypto Key Generators, Encryption Equipment and Scramblers