Learning From the Enemy: The Gunman Project - Espionage at the Moscow U.S. Embassy, Soviet Spying, IBM Selectric Typewriter Bugs, Great Seal Implant

Nonfiction, Social & Cultural Studies, Political Science, International
Cover of the book Learning From the Enemy: The Gunman Project - Espionage at the Moscow U.S. Embassy, Soviet Spying, IBM Selectric Typewriter Bugs, Great Seal Implant by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310860683
Publisher: Progressive Management Publication: April 26, 2014
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310860683
Publisher: Progressive Management
Publication: April 26, 2014
Imprint: Smashwords Edition
Language: English

This NSA paper examines the nature of the Soviet electronic penetration and the damage assessment of Soviet access to typewriters at the U.S. embassy in Moscow. This history of Project GUNMAN will also answer such questions as how the typewriter bugs were discovered and how they worked.

Countries have spied on each other by gathering information from embassies for centuries. The United States and the Soviet Union were of course archenemies during the Cold War (1945 to the fall of the Soviet Union in 1991), and there is a long history of attempts by the Soviets to gain access to information from the U.S. embassy and its diplomatic apparatus. Perhaps the most famous incident of Soviet espionage was the Great Seal implant.

On 4 August 1945, Soviet schoolchildren presented a carving of the Great Seal of the U.S. to Averell Harriman, the U.S. ambassador to the Soviet Union. The carving hung in Spaso house, the ambassador's residential office in Moscow, until 1952, when the U.S. State Department discovered that there was a microphone hidden inside the carving that the Soviets turned on at will. This bug was not a standard microphone and could not be detected unless it was in use. For six years the Soviets were able to eavesdrop on the conversations of the U.S. ambassador. The Soviet threat to U.S. embassy security was both well documented and real.

The typewriter bugs marked a new level of sophistication because they were electromechanical. For the first time, the Soviets gathered information from a piece of equipment that held written plain text information. Prior to the discovery of these bugs, the U.S. believed that the Russians had only used room audio bugs with microphones or listening devices to eavesdrop on American embassy activities. As a totalitarian society, the Soviet Union valued eavesdropping and thus developed ingenious methods to accomplish it.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This NSA paper examines the nature of the Soviet electronic penetration and the damage assessment of Soviet access to typewriters at the U.S. embassy in Moscow. This history of Project GUNMAN will also answer such questions as how the typewriter bugs were discovered and how they worked.

Countries have spied on each other by gathering information from embassies for centuries. The United States and the Soviet Union were of course archenemies during the Cold War (1945 to the fall of the Soviet Union in 1991), and there is a long history of attempts by the Soviets to gain access to information from the U.S. embassy and its diplomatic apparatus. Perhaps the most famous incident of Soviet espionage was the Great Seal implant.

On 4 August 1945, Soviet schoolchildren presented a carving of the Great Seal of the U.S. to Averell Harriman, the U.S. ambassador to the Soviet Union. The carving hung in Spaso house, the ambassador's residential office in Moscow, until 1952, when the U.S. State Department discovered that there was a microphone hidden inside the carving that the Soviets turned on at will. This bug was not a standard microphone and could not be detected unless it was in use. For six years the Soviets were able to eavesdrop on the conversations of the U.S. ambassador. The Soviet threat to U.S. embassy security was both well documented and real.

The typewriter bugs marked a new level of sophistication because they were electromechanical. For the first time, the Soviets gathered information from a piece of equipment that held written plain text information. Prior to the discovery of these bugs, the U.S. believed that the Russians had only used room audio bugs with microphones or listening devices to eavesdrop on American embassy activities. As a totalitarian society, the Soviet Union valued eavesdropping and thus developed ingenious methods to accomplish it.

More books from Progressive Management

Cover of the book The History of the U.S. Army Corps of Engineers: From the Revolutionary War to the Space Race, West Point, Flood Control, Hydropower, Combat Operations, Panama Canal, World War I and II, Apollo by Progressive Management
Cover of the book For the Common Defense of Cyberspace: Implications of a U.S. Cyber Militia on Department of Defense Cyber Operations - Is Threat Overblown, Privateers, Contractors, Legal Overview, Operating Concept by Progressive Management
Cover of the book NSA Secrets Declassified: Eavesdropping on Hell: Historical Guide to Western Communications Intelligence and the Holocaust 1939-1945 - Enigma, Codebreakers, World War II, Jewish Refugees, Nazi Gold by Progressive Management
Cover of the book 21st Century U.S. Military Documents: Air Force B-52 Bomber - Operations Procedures, Aircrew Evaluation Criteria, Aircrew Training Flying Operations by Progressive Management
Cover of the book 21st Century Textbooks of Military Medicine - Medical Aspects of Chemical Warfare - Nerve Agents, Incapacitating Agents, Riot Control, Toxins, Defense, Decontamination (Emergency War Surgery Series) by Progressive Management
Cover of the book 2012 Guide to Natural Gas Hydraulic Fracturing from Shale Formations: Improving the Safety and Performance of Hydraulic Fracturing and Fracking by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Multiservice Tactics, Techniques, and Procedures for Risk Management Field Manual - FM 3-100.12 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Cold War in South Florida Historic Resource Study: CIA, Cuba and Castro, Bay of Pigs, Cuban Missile Crisis, Radio Marti, Arbenz, Guatemala, Everglades, Counterinsurgency Technology Research by Progressive Management
Cover of the book The USAF in the Persian Gulf War: Lucrative Targets - The U.S. Air Force in the Kuwaiti Theater of Operations, Desert Storm, Iraq War plus Operation Desert Shield: The Deployment of USAF Forces by Progressive Management
Cover of the book 2011 Deficit Reduction Plans: The Moment of Truth, Final Report of National Commission on Fiscal Responsibility and Reform, Speech by President Obama, House Republican Roadmap by Congressman Ryan by Progressive Management
Cover of the book Emergency Support Function 15: Communication Synchronization during Defense Support of Civil Authorities Operations - Whole-of-Government External and Public Affairs, Lessons from 9/11 and Katrina by Progressive Management
Cover of the book 2011 Essential Guide to Electromagnetic Pulse (EMP) Attack - Reports of the EMP Commission on the Threat and Critical National Infrastructure - The Danger from High-Altitude Nuclear Explosions by Progressive Management
Cover of the book 1961 History of the Early Era of Space and Rocket Development: Chronology of Missile and Astronautic Events, Time Capsule of Fascinating News and Milestones, Mercury, Atlas, Titan ICBM, Soviet Claims by Progressive Management
Cover of the book On The Frontier: Flight Research at Dryden, 1946-1981 - Exploring the Supersonic Frontier, Muroc, Into Space, X-15, Serving Gemini and Apollo, Lifting Bodies Prelude to Shuttle, Center at Crossroads by Progressive Management
Cover of the book NSA Secrets Declassified: Speech Coding, Cipher Disk, German Cipher Machines in World War II, Women in Cryptology, Electronic Intelligence (ELINT), Missile and Space Intelligence, Secure Voice Coding by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy