Skip to main content

Telephone Scrambler

Telephone Scrambler

A telephone scrambler encrypts phone conversations, keeping unauthorized users from tapping into or monitor calls with any success. Scrambling involves the encryption of data, using unique codes that render it possible only for authorized personnel to unscramble transmissions. In order for scrambling technology to work, it is necessary that both authorized participants in a conversation possess a scrambler/descrambler. Scramblers are available on the consumer market, but most of these are vastly inferior to the technology used by operatives of elite U.S. intelligence services.

In a phone scrambling system, information sent over a public switched telephone network, or PSTN, is scrambled. The authentication of the unscrambling device at the receiving end is checked, and when an incoming message is received, it remains inaccessible until a special code or identification number is entered. One consumer system, according to a report in the trade journal Security, uses voice coding technology as a further security measure.

The principle of telephone scrambling is similar to that applied in making a Web site secure so that users can enter financial information without fear that this data will be intercepted. In both cases, sophisticated encryption makes it all but impossible for interlopers to obtain the desired information.

It is a safe bet that decryption technology and techniques available to an upper-echelon intelligence organization such as the National Security Agency, on the other hand, could easily break into even the best civilian systems. Likewise, U.S. intelligence services in hostile environments such as Iraq during the 2003 war have at their disposal telephone scrambling and decryption technology that would make their transmissions virtually impenetrable.



Baldauf, Scott. "Where to Find the Perfect Gift for Your 007 Wannabe." Christian Science Monitor. (December 7, 1999): 2.

"How Secure Are Your Phone, Fax, Data Transmission Systems?" Security 34, no. 6 (June 1997): 7576.

Nolte, Carl. "Spy Store a Boon for Paranoid Public." San Francisco Chronicle. (January 18, 2002): A23.


Domestic Intelligence
Encryption of Data
Privacy: Legal and Ethical Issues
Telephone Tap Detector

Cite this article
Pick a style below, and copy the text for your bibliography.

  • MLA
  • Chicago
  • APA

"Telephone Scrambler." Encyclopedia of Espionage, Intelligence, and Security. . 22 Apr. 2019 <>.

"Telephone Scrambler." Encyclopedia of Espionage, Intelligence, and Security. . (April 22, 2019).

"Telephone Scrambler." Encyclopedia of Espionage, Intelligence, and Security. . Retrieved April 22, 2019 from

Learn more about citation styles

Citation styles gives you the ability to cite reference entries and articles according to common styles from the Modern Language Association (MLA), The Chicago Manual of Style, and the American Psychological Association (APA).

Within the “Cite this article” tool, pick a style to see how all available information looks when formatted according to that style. Then, copy and paste the text into your bibliography or works cited list.

Because each style has its own formatting nuances that evolve over time and not all information is available for every reference entry or article, cannot guarantee each citation it generates. Therefore, it’s best to use citations as a starting point before checking the style against your school or publication’s requirements and the most-recent information available at these sites:

Modern Language Association

The Chicago Manual of Style

American Psychological Association

  • Most online reference entries and articles do not have page numbers. Therefore, that information is unavailable for most content. However, the date of retrieval is often important. Refer to each style’s convention regarding the best way to format page numbers and retrieval dates.
  • In addition to the MLA, Chicago, and APA styles, your school, university, publication, or institution may have its own requirements for citations. Therefore, be sure to refer to those guidelines when editing your bibliography or works cited list.