Read Body of Secrets: Anatomy of the Ultra-Secret National Security Agency Online
Authors: James Bamford
Tags: #United States, #20th Century, #History
337
classified materials abandoned and
lost in, 352-53 French colonialization
and, 284-86 jungle Sigint missions
in, 325-30
North Vietnamese cryptography in,
288-89, 303-4, 306-7 NSA buildup in, 301-2 OPLAN-34A in, 291-92,
293, 298
Pueblo
security
breach
and, 307-8 Sigint in, 289-90,
292-93, 295, 301-6
U.S. bombing raids compromised in,
308-11 U.S. evacuation from,
346-52
U.S. security shortcomings in,
304-7, 311-12
see also
Gulf of Tonkin
incident; Tet offensive Vint Hill
Farms Station (Monitoring Station Number 1), 19-20, 133
Vogt, John, 319
Volador,
273-75
von Neumann, John, 582 VQ-2, 195, 204
Walcott, John, 378 Walker, Edwin
A., 66, 79 Walker, John (James Harper), 244-45, 276-77, 307-8, 353 Walker,
Walton H., 26 Wallace, F. Harrison,
152-53
Walsh, Lawrence E., 391 Ward,
Joseph, 210-11, 224 War Department, U.S., 18 Confidential Code Number 2 of, 18
Warren, Earl, 66, 69 Warren Commission, 135,
136 Washington- Moscow
Emergency Communications Link,
192-93
Washington Post,
365, 378,
379-80
Watergate scandal, 431,
434
wavelength division multiplexing
(WDM), 461,
463, 465 Weaver, Larry, 200, 207,
209,213-14,217-18,
219, 228
Webworld, 512, 606 Weinberger,
Caspar W,
388, 389 Weisband, William, 24,
29,
30
Wescott, Gary, 344-46 Western
Union, 22, 133,
434 Westmoreland, William,
284, 330-33, 334 Wetwash cable,
302 Weyand, Frederick C.,
334
Wheatley, Robert, 159 Wheeler,
Earle G., 271 Whiff radar, 100 Whitaker, Paul K., 12-15 White, Lincoln, 53, 54
White, Stan, 208, 210-11,
214,217,219,228 White Birch, 289
White Cloud satellite program, 165-66 Whitman, Ann, 53 Whitworth, Jerry, 277
Wieland, Daniel T., 182-83 Wigglesworth, Michael I,
566 Williams, Penny Gamble,
561 Wilson, Craig L., 554
Wilson, Ralph, 66-67 Wilson,
Robert L., 227-28 Winchester, Simon, 164—65 Winters, Robert C., 246-47 WLR-1
intercept receiver,
255 Wobensmith, John C.,
391-92
Woelk, Steven, 264 Wood, Jack, 155
Woodward, Bob, 379-80 Woodward, Gilbert, 278 Woolsey, R. James, 425 World Trade
Center attack,
617-45 World War II, 160, 285,
312, 355-56, 397, 403,
486, 587
Wright, Beverly, 472-73 Wright,
Wesley, 155
Xerox, 606-7
Y2K problem, 452-54 Yardley,
Herbert O., 3 Yasson, Phillip, 163 Yitzhaki, Aryeh, 202,
203 Yom Kippur War of 1973,
153
Yugoslavia, 19, 147, 554 Yurke,
Bernard, 612
Zaslow, Milton S., 28,
269-70, 341 Zimmer, Jeanne Y,
500-501
Zircon satellite, 400-401
ZR/RIFLE, 477-79
[1]
As
for Powers, a Soviet court found him guilty of espionage and sentenced him to
ten years in prison. But in 1962 he was set free as part of an exchange with
the United States for the Russian master spy Colonel Rudolf Abel.
[2]
On
May 8, while the
Pueblo
crew was imprisoned near Pyongyang, CIA pilot
Jack Layton flew another A-12 mission over North Korea. (Although he did not
know it, this was to be the last operational flight of the CIA's prize A-12.
The fleet of the spy planes was to be scrapped for a newer, two-seat version
being built for the Air Force, the SR-71.)
[3]
To
protect the privacy of the salesman, a pseudonym has been used.
[4]
The
Pentagon report also criticized the NSA for wasting millions of dollars on
warehousing old magnetic tapes, failing to manage properly its highly secret
special-access programs, and not adequately measuring whether the intelligence
being collected matched the intelligence that was being asked for. Four years
later, in 1996, the agency still had not corrected several of the problems.
[5]
Despite
the capabilities of massively parallel computers, supercomputers are still
useful for attacking specific codebreaking problems.
[CD1]
fired
by an Iraqi Mirage F-1. Republican Senator Bob Dole demanded that President
Reagan explain what US ships were doing in the Gulf. The ships commander was
relieved and forced to reture.