Learning From the Enemy: The Gunman Project - Espionage at the Moscow U.S. Embassy, Soviet Spying, IBM Selectric Typewriter Bugs, Great Seal Implant

Nonfiction, Social & Cultural Studies, Political Science, International
Cover of the book Learning From the Enemy: The Gunman Project - Espionage at the Moscow U.S. Embassy, Soviet Spying, IBM Selectric Typewriter Bugs, Great Seal Implant by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310860683
Publisher: Progressive Management Publication: April 26, 2014
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310860683
Publisher: Progressive Management
Publication: April 26, 2014
Imprint: Smashwords Edition
Language: English

This NSA paper examines the nature of the Soviet electronic penetration and the damage assessment of Soviet access to typewriters at the U.S. embassy in Moscow. This history of Project GUNMAN will also answer such questions as how the typewriter bugs were discovered and how they worked.

Countries have spied on each other by gathering information from embassies for centuries. The United States and the Soviet Union were of course archenemies during the Cold War (1945 to the fall of the Soviet Union in 1991), and there is a long history of attempts by the Soviets to gain access to information from the U.S. embassy and its diplomatic apparatus. Perhaps the most famous incident of Soviet espionage was the Great Seal implant.

On 4 August 1945, Soviet schoolchildren presented a carving of the Great Seal of the U.S. to Averell Harriman, the U.S. ambassador to the Soviet Union. The carving hung in Spaso house, the ambassador's residential office in Moscow, until 1952, when the U.S. State Department discovered that there was a microphone hidden inside the carving that the Soviets turned on at will. This bug was not a standard microphone and could not be detected unless it was in use. For six years the Soviets were able to eavesdrop on the conversations of the U.S. ambassador. The Soviet threat to U.S. embassy security was both well documented and real.

The typewriter bugs marked a new level of sophistication because they were electromechanical. For the first time, the Soviets gathered information from a piece of equipment that held written plain text information. Prior to the discovery of these bugs, the U.S. believed that the Russians had only used room audio bugs with microphones or listening devices to eavesdrop on American embassy activities. As a totalitarian society, the Soviet Union valued eavesdropping and thus developed ingenious methods to accomplish it.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This NSA paper examines the nature of the Soviet electronic penetration and the damage assessment of Soviet access to typewriters at the U.S. embassy in Moscow. This history of Project GUNMAN will also answer such questions as how the typewriter bugs were discovered and how they worked.

Countries have spied on each other by gathering information from embassies for centuries. The United States and the Soviet Union were of course archenemies during the Cold War (1945 to the fall of the Soviet Union in 1991), and there is a long history of attempts by the Soviets to gain access to information from the U.S. embassy and its diplomatic apparatus. Perhaps the most famous incident of Soviet espionage was the Great Seal implant.

On 4 August 1945, Soviet schoolchildren presented a carving of the Great Seal of the U.S. to Averell Harriman, the U.S. ambassador to the Soviet Union. The carving hung in Spaso house, the ambassador's residential office in Moscow, until 1952, when the U.S. State Department discovered that there was a microphone hidden inside the carving that the Soviets turned on at will. This bug was not a standard microphone and could not be detected unless it was in use. For six years the Soviets were able to eavesdrop on the conversations of the U.S. ambassador. The Soviet threat to U.S. embassy security was both well documented and real.

The typewriter bugs marked a new level of sophistication because they were electromechanical. For the first time, the Soviets gathered information from a piece of equipment that held written plain text information. Prior to the discovery of these bugs, the U.S. believed that the Russians had only used room audio bugs with microphones or listening devices to eavesdrop on American embassy activities. As a totalitarian society, the Soviet Union valued eavesdropping and thus developed ingenious methods to accomplish it.

More books from Progressive Management

Cover of the book Big Data: Seizing Opportunities, Preserving Values - Report of the Presidential Big Data and Privacy Working Group, Internet, Computer, Online Communications Privacy Threats by Progressive Management
Cover of the book NASA Report: Sleep on Earth and in Space: Risk Factors, Health and Performance Outcomes, and Countermeasures - Workshop on Lessons Learned from ISS Space Station and Shuttle Human Flights by Progressive Management
Cover of the book Guide to Managing an Emergency Service Infection Control Program: Bloodborne and Airborne Diseases, EMS Policies, Vehicles, Equipment, and Supply Considerations, Training, Patient Protection by Progressive Management
Cover of the book Middle East Security Issues: In the Shadow of Weapons of Mass Destruction Proliferation - WMD, Iran, Iraq, Israel, Persian Gulf, Arab Perspectives by Progressive Management
Cover of the book Strategic Aggression: Conditions That Could Trigger Aggressive Military Action by the People's Republic of China (PRC) - Case Studies of Interwar Germany, Modern China, Secrecy, PLA, Communist Party by Progressive Management
Cover of the book Joint Doctrine Encyclopedia: Part One: Definitions of Critical Joint Force Defense Department Terms, From Active Air Defense to Joint Force Special Operations Component Commander by Progressive Management
Cover of the book Space Launch System (SLS): America's Next Manned Rocket for NASA Deep Space Exploration to the Moon, Asteroids, Mars - Rocket Plans, Ground Facilities, Tests, Saturn V Comparisons, Configurations by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Small Intestine Cancer - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book Countering North Korean Special Purpose Forces: Vast Tunnel Network, Infiltration, Amphibious and Airborne Approaches, DPRK Submarines, Apache Attack Helicopters to the Rescue by Progressive Management
Cover of the book "Good Tuberculosis Men": The Army Medical Department's Struggle with Tuberculosis (TB) - Mycobacterium, Tubercular Troops, World War I and II, Heliotherapy, Hospitals, Antibiotics and Streptomycin by Progressive Management
Cover of the book The Revolutionary United Front (RUF) and Child Soldiers During Sierra Leone's Civil War - Use of Drugged Soldiers to Commit Horrific Atrocities During Guerilla War, Involvement of Libya and Gadhafi by Progressive Management
Cover of the book Apollo and America's Moon Landing Program: Project Apollo: A Retrospective Analysis - A Narrative Account Starting with the Kennedy Decision, Monograph in Aerospace History by Progressive Management
Cover of the book The Relationship Between Islamism and Women in Civil Society: A Look at Turkey and Egypt - Muslims, Tanzimat Reforms, Kemalism, Islamist Faction, Sadat, Mubarak, Arab Spring, What About the Veil? by Progressive Management
Cover of the book 2018 Cybersecurity Reports: Cybercrime and the Darknet, and Multiyear Plan for Energy Sector Cybersecurity - Protecting Electricity Delivery, Energy Reliability, and Power Utilities from Cyber Attack by Progressive Management
Cover of the book Fire Monitoring Handbook (FMH Fire Management Program Center, National Interagency Fire Center) Part 1 - Wildfire and Wildland Fire Environmental and Fire Observation, Vegetation Monitoring Protocols by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy