Body of Secrets: Anatomy of the Ultra-Secret National Security Agency (130 page)

Read Body of Secrets: Anatomy of the Ultra-Secret National Security Agency Online

Authors: James Bamford

Tags: #United States, #20th Century, #History

BOOK: Body of Secrets: Anatomy of the Ultra-Secret National Security Agency
3.87Mb size Format: txt, pdf, ePub

223 Rowe, William E., 332,

335 Rowlett, Frank B., 2, 6,

22-23, 136, 355, 477,

526 Rowley, Charles L., 208,

210, 215, 220 Rudman, Warren B.,
476 Rusk, Dean, 100, 108, 120,

191, 194,297 Russell, Richard, 103
Russell, Stu, 254, 257, 267,

269

Ryan, John, 319 Ryan 147 drone,
119, 321 RYCOM, 176 Rye system, 589

SA-2 missile, 47, 49, 102,
106-7,321-22,324, 342-43, 370

Sabertooth, 289-90

Sadat, Anwar, 475

Safire, William L., 380-81,

386

Samford, John, 92, 93 Sample, Tim,
567
Samuel R. Aitken,
92, 94 Sandia National Laboratory, 593, 595 San
Francisco Conference

(1945), 21-23 Sannes, Mike, 127
San Roman, Pepe, 77—78
Saratoga,
211, 212, 222, 224 satellites and
satellite espionage, 359-69, 393, 460, 615 decline of, 549 giant antennas used
for,

361-63 ground stations for,

368-69

INTELSAT, 404-11, 414 microwave
communications detected by, 366-69, 466 Solar-Rad, 365-66 technology revolution

and, 466-67 toxic experiment for,

360-61 training courses for,

408-9

Zircon, 400-401 Schatz, James R.,
558, 559 Schlesinger, Arthur, Jr.,

116-17

Schlesinger, James R., 436
Schwartz, Frederick A. O.,

438-39 Schwarzkopf, H. Norman,

512

Scorpion,
105, 246
Searchlight program, 509 Secret Intelligence Service

(MI-6), British, 421 Security
Affairs Support Association (SASA), 523

Seigrist, Connie M., 144—45

Semantic Forests program, 556

Senate, U.S., 60, 68, 231 Foreign
Relations Committee, 55, 56, 58, 59, 60-61, 80, 300 Intelligence Committee,
377-78,381,384, 542 military's right-wing extremists investigated by, 80-81

Senghor, Leopold, 178

Sevareid, Eric, 66

Seven Days in May,
67, 80

Seven Nations Manila

Summit Conference (1966), 315-16

Shamrock program, 133, 434, 436-40

Sharon, Ariel, 202-3

Sheck, Gene, 197, 240-41, 244,
248, 249-50, 258-59, 263, 268, 269-72, 280

Sheehy, Mary Ann, 565-67

Shelton, William, 44-45

Shkval,
111, 114

SIGABA code machine, 18

Sigint, 8

Sigint Communications System, 588

SIGINT Summary, 515

Signal Intelligence Agency, German,
15

Signal Intelligence Division,
U.S., 8

Signal Intelligence Service, U.S.,
1, 3, 526

Signal Security Agency

(SSA), 24, 426, 579-80 Language
branch of, 19

Silicon Graphics, Inc.

(SGI), 599, 601,602

Silkworth, 490

Simons, Howard, 380

Single-Scope Background

Investigation (SSBI), 535-36

Sinkov, Abraham, 2, 477

Six-Day War, 154, 190-97

El Arish and, 201-3,

236, 238-39

Israeli electronic surveillance
in, 237-38 Soviets and, 192-93,

208-9
see also Liberty,
Israeli

attack on

"Six Point Program for
Improved Intercept," 360 Sixth Fleet, U.S., 211,

221-22, 226, 227, 236 Smith,
Burton, 600, 602 Smith, James E, 140-41,

144-46

Smith, Melvm, 199 Smith, Walter
Bedell, 30 Snepp, Frank, 350 Snider, L. Britt, 434-35,

436, 438, 439-40 Snyder, Sam, 582
Solar-Had satellite, 365-66 Solomatin, Boris A.,

276-77, 307 Sone, lun'ichi, 611—12
Sonntag, William I., 565 Soviet Union, 7, 18, 19, 23-24, 28, 42, 71, 93, 134,
153, 186, 352, 368, 402, 450, 492, 502, 540, 553, 555 Afghanistan invaded by,

389, 398, 399 arctic listening
posts of,

142-43 arms shipments to Cuba

of, 76-77 Barents Sea surveillance

of, 167-70 computer development

in, 589-90 Homerun and, 35-37

Korean War and, 25, 27 manned
space program

of, 154-55

microwave communications used by,
366-67 one-time pad security

breach of, 20-21
Pueblo
intelligence
coup

and, 275-77, 307-8 Six-Day War
and,

192-93,208-9
Sputnik
launched
by,

360, 588 spy ship fleet of, 93,

308-9

Suez crisis and, 39, 42 tapping of
submarine

cables of, 370-74 U-2 affair and,
see
U-2

crisis Venona program against,

21, 23, 303, 355 Spain, 19, 23, 40
Special Collection Service

(SCS), 477, 479-80 Special Comint
Committee,

356

Special U.S. Liaison Officers
(SUSLOs), 498 Spoon Rest radar, 106,

117-18

Sputnik 1,
360, 588
spy ships, 94-95, 339 off Africa, 175, 180-84,

313 in Cuban missile crisis,

99, 100, 102-3,

107-12, 125-26 moon-bounce antenna

of, 94

Russian, 93, 308-9 off South
America,

175-78 U.S. Navy program for,

240-43

in Vietnam War, 313-16
see also
Liberty,
Israeli

attack on;
Pueblo
incident
SR-71 Blackbird, 149,

273/z, 318, 323-25 Stahr, Elvis J,
Jr., 68 Stapleton-Gray, Ross, 511 Stassen, Harold, 41 State Department, U.S.,
3,

31, 75, 147, 175, 192,

193, 225, 230, 235,

286, 287, 355, 409,

417,420,424,502,

516

Steakley, Ralph, 249-50
Stephanopoulos, George,

386, 387

Stevens, Robert E., 522 Stevenson,
Adlai E., 59-60,

128

Stimson, Henry, 3 Stockmeier,
Mike, 147 Strategic Air Command

(SAC), 112-13, 117,

131, 508-9, 322 Stretch, 586-87
Stroiazzo-Mougin, Bernard,

415

Strott, Robert R., 5 Studeman,
William O., 5,

393-94,411,423-24,

425, 523, 544-45, 549,

550 STU-III security telephone,

482, 508-9, 573 submarine cables,
tapping

of, 370-74

Suez crisis (1956), 38-41 Sugar
Grove antenna,

362-63, 404-5 Sulzberger, A. O.,
379    . supercomputers, 578 Automated Cartridge

System for, 603-4 biological
processes in,

612-13 Cray's development of,

590-93, 596-602

data storage and, 603—4,

606-7 Harvest system and,
see

Harvest computer Japan and,
594-96,

598-99 miniaturization and,

609-12 NSA's facility for, 579,

602-6 parallel processing and,

596-98 quantum computing

and, 609-12 speed measure used in,

592-93 speeds attained by,

607-8 Supercomputer Systems,

597

Supplementary Radio System, 396
Swordfish cipher machine,

14 SX-4 supercomputer,

598-99 Syria, 19, 40, 134, 191,

197

System-V intercept equipment, 44

SYSTRAN translation program,
555—56

Takkoush, Abed, 238 Talbott,
Strobe, 386 Tall King missile system,

149-50, 154 Tattletale, 364-65
Taylor, James R. (Rich),

499-500

Taylor, Keith, 113 Taylor,
Maxwell, 69, 87,

118, 131

Taylor, William, Jr., 278 Teaball
warning system,

319-20 Technical Extracts of Traf-

fic Analysis (TEXTA), 112

Tellman processing system, 504

Tempest emissions, 110

Tenet, George J, 418, 476-77, 496,
542

Tera Computer, 600, 602

Terek,
111, 112

Tester, Ralph, 15

Tet offensive, 284, 332-40
casualties in, 336 growth of NSA and,

339-40 warnings of, 332—33

Thailand, 19, 322, 325

Thatcher, Margaret, 398, 399, 400

Thinking Machines Corporation, 597

3rd Radio Research Unit, U.S.,
288-91, 318

Thompson, Terry, 464, 465, 481,
533, 554, 557, 574, 575, 576-77

Thorn, Larry B., 220

303 Committee, 246, 250

TICOM (Target Intelligence
Committee) missions, 8—12, 583

cryptologic targets and objectives
of, 9-10

Nazi codebreakers interrogated by,
17-18 Russian Fish machines discovered by, 15—17, 18

Ticonderoga,
298-99

Time,
378, 590

Tonkin Gulf Resolution, 299

Tooma, Sam, 242

Top Secret Intranet,
515

Tordella, Louis, 97-99, 103,

136, 222, 223, 232-33, 235, 269,
299, 377, 407, 428, 430-33, 526, 578

NSA's computer development program
and, 580-83, 588-89 Shamrock scheme as outlined by, 436-38

Tordella Supercomputer Facility,
579, 602-3

Torii Station, Okinawa, 156-57,
159

Torricelli, Robert, 446

Tour, James, 611

Tourney, Phillip K, 219-20, 233

Tovey, Brian, 398-99

Tower, John, 435

Trinidad plan, 74

Truman, Harry S., 7, 28, 30, 66,
286, 337, 436

TRW, 367, 523, 552

Turing, Alan, 485-86

Turkey, 19, 44, 48, 49, 51,
120-21, 124, 134, 147, 154, 179

Turner, Stansfield, 383-85, 479

Turner Joy, 297,
346

Twining, Nathan, 54, 57

U-2 crisis, 116-17,322
congressional investigation of, 53-62 Eisenhower's role in, 43,

49-50, 51, 52, 53-54,

55-60, 62 Khrushchev's revelations

to Supreme Soviet in,

50-51, 52-53 Northwoods and, 82-83
Paris summit in, 54-55,

57 perjured testimony in,

60-62

Powers shot down in,

46-48 U-2 spy planes, 37, 43-44,

77, 90, 108, 318 in Cuban missile
crisis, 109, 117, 118-19, 120, 122

successor to, 149-50 in Vietnam
War, 322-24 Ultra, 8-9

Unified Cryptologic Architecture,
522 United Arab Republic (UAR), 147, 186, 191-92,209                 '

United Kingdom-USA

(UKUSA) Communications
Intelligence Agreement, 40, 394-405, 406, 409, 415, 420, 441 dissemination of
names

by, 442-49 industrial espionage
and,

422-24

key targets of, 407-8, 410 privacy
issue and, 427—28
see also
satellites, satellite espionage United
Nations, 21-23, 83,

186, 426, 444, 447 JFK
assassination and,

134

Korean War and, 25 U-2 crisis and,
50 United States Signals Intelligence Directive (USSID), 499 USSID 18, 442,
444, 449 Universe computer system,

452

Urgench,
115, 116
Uruguay, 19, 147, 175 USA-512J, 194, 204, 216,

221, 227

"U.S. Identities in
Sigint," 442-43

Valdez,
132,
179-81, 182,

185, 259

Vallejo, Rene, 129-30 Van Fleet,
James, 30 Vault Type Room (VTR),

507-8 Velasquez, Efrain Bamaca,

446

Venezuela, 19, 133, 511 Venona
program, 21, 23,

303, 355

see also
one-time
pads Vietcong, 288, 313, 315,

327-28, 329, 332 Vietnam,
Democratic Republic of (North Vietnam), 93

creation of, 284-85 Sigint efforts
of, 303-4,

306-7

Vietnam, Republic of (South
Vietnam), 352 Vietnam War, 261,

283-353, 403, 429 airborne Sigint
in,

317-25

Arc Light in, 308-10 CIA and, 331,
333,

Other books

Hollywood by Charles Bukowski
Captive Embraces by Fern Michaels
The Casual Rule by A.C. Netzel
The Web by Jonathan Kellerman
Least of Evils by J.M. Gregson
Death on the Holy Mountain by David Dickinson
Complications by Cat Grant
Love 'Em: A Bad Boy Romance by Harvey, Kelley