+1 303 670 1099
Sound Masking Systems | White Noise | Speech Privacy Systems
Hours of Operation: 8:00 a.m. to 5:00 p.m. Mountain Time (MT)
Serving Department of State and Corporate America
TSG Standard 6 Disconnect / Isolation Device: Sensitive and Classified Discussion Areas
Analog Firewall Model FWA101H (TSG 5S0204) is a US Government approved (NSA Labs) secure telephonic ‘Disconnect/Isolation’ device for use with ALL analog tip and ring devices (phone, fax, modem, teleconference) requiring full time protection and active countermeasures from unauthorized listening and acoustic monitoring during any ‘On-Hook’ condition.
When you're looking for the best in Security Access, speech privacy devices, and high tech security systems, look no further than AVLELEC.com. Since 1989, we've proudly been offering the best Sound Masking White Noise systems that help greatly increase speech privacy and security of your business or organization. We're GSA licensed, and are the chosen provider of sound masking systems by a number of government organizations and businesses.
Analog Firewall Model FWA101H (TSG 5S0204)
Is a US Government approved (NSA Labs) secure telephonic ‘Disconnect/Isolation’ device for use with ALL analog tip and ring devices (phone, fax, modem, teleconference) requiring full time protection and active countermeasures from unauthorized listening and acoustic monitoring during any ‘On-Hook’ condition.
White noise machines and noise generators
to correct office noise
Specify the FWA101H
whenever protection of financial transactions, trade secrets, intellectual property, ideas or any critical and confidential information must remain private to ensure the organizations a competitive edge, earnings, and growth.
Commercial / Industrial Application
Telephone Analog - Secure "On Hold"
TSG-5S0204 MODEL FWA101H
Telco Room PBX / KTS
Telephone shown in "On-Hook" mode
PSTN - Public Switched Telephone Network
Sensitive Compartmented Information (SCI)
Classified information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems established by the Director of Central Intelligence.
SCI Facility (SCIF)
An accredited area, room, group of rooms, buildings, or installation where SCI may be stored, used, discussed, and/or processed.
Cognizant Security Agency (CSA)
AIntelligence organizations or agencies as defined in E.0.12333 that have the authority and are responsible for all aspects of security program management with respect to the protection of intelligence sources and methods and for implementation of the DCIDs for activities under their purview.
Senior Officials of the Intelligence Community (SOIC)
The head of an agency, office, bureau, or intelligence element listed in Section 3.4(f) (1 through 6) of Executive Order 12333 or successor orders, directives or laws.
Is government tested for products passing (XXX) agency requirements for TSG security certification. Started that work in 2004 under sponsorship of Dept of State. Today, and still holds certification and manufactures under DOS sponsorship. Would regularly tear apart VOIP phones to add security protocols.
1. Be aware of it's limitations. Limitations to this platform are not widely discussed by Users.
2. Be aware that within 5 years all (VOIP phones ) of this type will likely be replaced with a more security
durable communications platform (my prediction).
3. Any replacement may well not have the same user conveniences but be much more durable to Cyber attack. VOIP is on the middle of the Cyber radar screen and very friendly to hacking techniques. See, "Wire Shark", it's a free hacking platform and widely disseminated.
4. To a user, a TSG rated secure phone set should be treated as a non- improved security platform. There are so many vulnerabilities to this phone when On or Off hook that it must at all times be viewed as a threat.
5. Be sceptical of VOIP phones in your proximity.
6. Sensitive voice conversations in their proximity are to be treated as a non secure environment. (worse).
7. An completely enclosed network is a security threat and is the preferred pathway for hackers. The primary access point is 3rd party contractors. While your building may be secure, vendors may well use a cleaning service. (A favorite access methodology for threats)
8. VOIP is a target of cyber warfare, they are constantly evolving meaning, a secure phone set this month may be a threat next month.
9. Treat a conference room with VOIP phone as a threat. Treat the same room as a threat even if it's
secure rated. I would say, disconnect the VOIP phone from the wall when conversations are happening in a conference room but, the phone would then unregister from the system and have to be re registered later.
You could place it in a closet with masking noise ON even when on-hook. If it's absolutely necessary to be private, pull the plug and let a tech worry about re-registering to the system.
10. SIP, H.323 it does not matter, Cyber threats are evolving every month and the odds are in their favor , not ours.
11. Talk to your security professional for a pathway to a secure phone system. It may not be as elegant but necessary to protect your environment.
SoundMasking for Speech Privacy PRODUCTS