Learning From the Enemy: The Gunman Project - Espionage at the Moscow U.S. Embassy, Soviet Spying, IBM Selectric Typewriter Bugs, Great Seal Implant

Nonfiction, Social & Cultural Studies, Political Science, International
Cover of the book Learning From the Enemy: The Gunman Project - Espionage at the Moscow U.S. Embassy, Soviet Spying, IBM Selectric Typewriter Bugs, Great Seal Implant by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310860683
Publisher: Progressive Management Publication: April 26, 2014
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310860683
Publisher: Progressive Management
Publication: April 26, 2014
Imprint: Smashwords Edition
Language: English

This NSA paper examines the nature of the Soviet electronic penetration and the damage assessment of Soviet access to typewriters at the U.S. embassy in Moscow. This history of Project GUNMAN will also answer such questions as how the typewriter bugs were discovered and how they worked.

Countries have spied on each other by gathering information from embassies for centuries. The United States and the Soviet Union were of course archenemies during the Cold War (1945 to the fall of the Soviet Union in 1991), and there is a long history of attempts by the Soviets to gain access to information from the U.S. embassy and its diplomatic apparatus. Perhaps the most famous incident of Soviet espionage was the Great Seal implant.

On 4 August 1945, Soviet schoolchildren presented a carving of the Great Seal of the U.S. to Averell Harriman, the U.S. ambassador to the Soviet Union. The carving hung in Spaso house, the ambassador's residential office in Moscow, until 1952, when the U.S. State Department discovered that there was a microphone hidden inside the carving that the Soviets turned on at will. This bug was not a standard microphone and could not be detected unless it was in use. For six years the Soviets were able to eavesdrop on the conversations of the U.S. ambassador. The Soviet threat to U.S. embassy security was both well documented and real.

The typewriter bugs marked a new level of sophistication because they were electromechanical. For the first time, the Soviets gathered information from a piece of equipment that held written plain text information. Prior to the discovery of these bugs, the U.S. believed that the Russians had only used room audio bugs with microphones or listening devices to eavesdrop on American embassy activities. As a totalitarian society, the Soviet Union valued eavesdropping and thus developed ingenious methods to accomplish it.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This NSA paper examines the nature of the Soviet electronic penetration and the damage assessment of Soviet access to typewriters at the U.S. embassy in Moscow. This history of Project GUNMAN will also answer such questions as how the typewriter bugs were discovered and how they worked.

Countries have spied on each other by gathering information from embassies for centuries. The United States and the Soviet Union were of course archenemies during the Cold War (1945 to the fall of the Soviet Union in 1991), and there is a long history of attempts by the Soviets to gain access to information from the U.S. embassy and its diplomatic apparatus. Perhaps the most famous incident of Soviet espionage was the Great Seal implant.

On 4 August 1945, Soviet schoolchildren presented a carving of the Great Seal of the U.S. to Averell Harriman, the U.S. ambassador to the Soviet Union. The carving hung in Spaso house, the ambassador's residential office in Moscow, until 1952, when the U.S. State Department discovered that there was a microphone hidden inside the carving that the Soviets turned on at will. This bug was not a standard microphone and could not be detected unless it was in use. For six years the Soviets were able to eavesdrop on the conversations of the U.S. ambassador. The Soviet threat to U.S. embassy security was both well documented and real.

The typewriter bugs marked a new level of sophistication because they were electromechanical. For the first time, the Soviets gathered information from a piece of equipment that held written plain text information. Prior to the discovery of these bugs, the U.S. believed that the Russians had only used room audio bugs with microphones or listening devices to eavesdrop on American embassy activities. As a totalitarian society, the Soviet Union valued eavesdropping and thus developed ingenious methods to accomplish it.

More books from Progressive Management

Cover of the book U.S. Marine Corps Expeditionary Warrior 2013: Future Maritime Operations for the 21st Century Operating Environment - Command and Control, Maneuver, Fires, Logistics/Sustainment, Force Protection by Progressive Management
Cover of the book MH-53J/M PAVE LOW III/IV Systems Engineering Case Study: Challenges of Night Rescue and Night Vision; Technical Details and Program History by Progressive Management
Cover of the book FBI Report: Workplace Violence - Issues in Response, Preventing Violence, Sample Policy, Threat Assessment, Police-Employer Cooperation, Violence Against Health Care Workers by Progressive Management
Cover of the book Short of War: Major USAF Contingency Operations 1947-1997 - Berlin Airlift, Lebanon, Cuban Missile Crisis, Israel Airlift, Vietnam Evacuation, Iranian Hostages, Grenada, Panama, Iraq, Bosnia, Haiti by Progressive Management
Cover of the book The Russian Military and the Georgia War: Lessons and Implications - Ukraine and Crimea, NATO and EU, Putin and Obama, S-300 Missiles, Yushchenko, Yanukovich, Abkhazia, South Ossetia by Progressive Management
Cover of the book NATO's Air War in Libya: A Template for Future American Operations - Operation Unified Protector, Operation Odyssey Dawn, Air Power, Afghan Model, Limited Boots On Ground (LBoG) Model by Progressive Management
Cover of the book 21st Century Pediatric Cancer Sourcebook: Childhood Central Nervous System Embryonal Tumors - Medulloblastoma, Pineoblastoma, Pineal Parenchymal Tumors, PNET, Medulloepithelioma, Ependymoblastoma by Progressive Management
Cover of the book Defense Threat Reduction Agency Foreign Consequence Management Legal Deskbook - Tool for Responders to Weapons of Mass Destruction (WMD) and Terrorism Incidents on Foreign Soil by Progressive Management
Cover of the book United States Federal Guidance on Witness Protection in Human Trafficking: Case Management Model and System Comparison, The Importance of Physical Protection for Witness Cooperation by Progressive Management
Cover of the book Engineering the Organization: Is the U.S. Army Corps of Engineers (USACE) Doing it Right? The Army Engineer Brigade, Project Management and Cost Growth, MILCON and Military Construction by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: OPFOR Opposing Force Organization Guide (FM 7-100.4) - Nation State Forces, Operational, Tactical, Paramilitary, Noncombatants, Order of Battle by Progressive Management
Cover of the book 21st Century FEMA Study Course: Decision Making and Problem Solving (IS-241.a) - Ethics, Brainstorming, Surveys, Problem-Solving Models, Groupthink, Discussion Groups, Case Studies by Progressive Management
Cover of the book Countering Weapons of Mass Destruction: A Preliminary Field Study in Improving Collaboration - WMD Counterproliferation and the Risk of Improvised Nuclear Devices (IND), Use of Additive Manufacturing by Progressive Management
Cover of the book Science Training History of the Apollo Astronauts (NASA SP-2015-626) - Missions, Shoemaker, Meteor Crater, Field Trips, Rover Simulations, Lunar Geology, Rock and Mineral Lessons, Geologist Schmitt by Progressive Management
Cover of the book FBI Report: Serial Murder, Multi-Disciplinary Perspectives for Investigators - From Jack the Ripper to the Beltway Sniper, Psychopathy, Motivations, Forensic Issues, Causality and Types by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy