PULLING THE PLUG ON SOVIET EAVESDROPPERS

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP90-00965R000403330002-0
Release Decision: 
RIPPUB
Original Classification: 
K
Document Page Count: 
1
Document Creation Date: 
December 22, 2016
Document Release Date: 
January 12, 2012
Sequence Number: 
2
Case Number: 
Publication Date: 
April 8, 1985
Content Type: 
OPEN SOURCE
File: 
AttachmentSize
PDF icon CIA-RDP90-00965R000403330002-0.pdf152.68 KB
Body: 
STAT Declassified in Part - Sanitized Copy Approved for Release 2012/01/12 : CIA-RDP90-00965R000403330002-0 WIN F. F,P~tti~-RED Pulling the Plug on Soviet Eavesdroppers U . .' 'S 1c:OR1D REPOPT 8 April 1985 another in the U.S. and even to pick up some inter- national messages carried by the Intelsat network. Other communications are simply plucked from the air by banks of anten- nas at the present Soviet Embassy in Washington and posts in New York and San Francisco. Scooped up wholesale from the ether, these mes- sages are run through computers programed to recognize certain phone numbers and names. If the message is sent by ma- chine, such as a telex, the computer prints it out. If the intercept is a tele- phone conversation, it must be transcribed and translated. Moscow is said Electronic spies will get an earful of gobbledygook rather than vital secrets once a new U.S. plan is implemented. A Pentagon consultant telephones a defense contractor, asking about a new missile's supersecret guidance system. Across town, one of a half-dozen an- tennas bristling atop the Soviet Embas- sy intercepts the call and feeds the sig- nal into a computer. Sensing a familiar dial-tone sequence, the computer re- cords the conversation for analysis. The incident is hypothetical. But U.S. officials say real episodes of this kind happen daily as the Soviets expand an already impressive capacity to carry out a wide range of esoteric snooping. Now, the Reagan administration is fighting back. A plan was announced on March 26 to develop a better type of secure phone that would foil Soviet electronic spies. The aim is to install hundreds of thousands of these phones in offices of government security agen- cies and defense contractors. Typewriters bugged. The decision reflects widespread concern in Wash- ington over a possible hemorrhage of secrets to Moscow. "The Soviet Union is making major efforts to intercept and walk away with our secrets," as- serts Donald Latham, the Pentagon's communications-security chief. Latest example: It was confirmed in late March that the Soviets had placed i tiny transmitters in typewriters shipped to the American Embassy in Moscow. Sensors hidden in the embassy's walls apparently picked up the tapping of keys being struck, thus revealing to the Kremlin what was written. Often, there is no need to plant a bug or tap a phone line. Huge volumes of secret information simply go through the air, free for the taking. Soon, the Soviets may have an even better listening post in Washington. Moscow's new embassy, now nearing completion, sits atop a 350-foot hill with a clear line of sight to the White House, the Pentagon and commercial commu- nications towers. Antennas there will be able to pick up any messages sent through the airwaves. Giant antennas in Cuba permit the Soviets to listen in on most messages carried by satellite from one point to to have assigned thou- sands to this task. tractors have at least one Antennas on roof of new Soviet Embassy will secure phone. But, for a of sight to intercept secret Washington calls. busy manager or engineer, it is always easier to pick up the insecure phone a few inches away. "People are way too careless with their use of phones," Latham says. They are also careless with facsimile machines that send drawings and other documents over phone circuits. "The tendency is to say, 'This is sensitive, so I'll send it by fax.' That's just giving it to them in writing," says J. Michael Nye, president of Marketing Consul- tants International, a Maryland com- munications-security firm. Officials are reluctant to cite in- stances of secrets purloined in this way. But the interception and decoding of enemy communications in wartime has been demonstrated on many occasions. Most recently, the North Vietnamese made use of intercepted messages to warn their troops of U.S. attacks. Yet it was not until the late '70s that officials full' awoke to the fact that hostile intelligence agencies were 'able to listen in as government officials and defense contractors chatted over unse- cured phones in this country. The Carter administration reacted by.connecting key offices in Washing- ton and several other cities with under- ground wires rather than relying on microwaves, which travel through the atmosphere from one point to another. . The government also equipped a few offices with phones that scramble and unscramble conversations. But these instruments, still in use, cost $9,000 or more apiece, are awkward to handle and produce distorted sounds. And the vast majority of government communications still take place over ordinary phones. In Washington's new drive against electronic spying, the National Securi- ty Agency announced on March 26 that three companies-RCA, AT&T and Motorola-would share a 44-mil- lion-dollar grant to develop improved scrambler phones. The government ex- pects to buy half a million of them for less than $2,000 apiece. Tiny coded key. The new phones, when they come into use in 1987, will be easy to use and will sound like an ordi- nary phone. A coding device about the size of a pack of gum is inserted in the phone while it is in use and can be locked away in a safe at other times. Even for top-secret security, the coded key will only have to be changed once a year. When a call is made, one phone que- ries the other and tells the user-with a light or electronic-display panel-what level of security is being provided. "Our goal is to put one of these on every guy's desk," says Latham. Once production lines are running full speed, the'secure phones will go into other government offices and be sold to financial institutions and other firms whose messages, while not classi- fied as secret, are still sensitive. No one thinks the secure phones, by themselves, will prevent a determined foe from trying to listen in. But it will no longer be the free ride that it is today. ^ Declassified in Part - Sanitized Copy Approved for Release 2012/01/12 : CIA-RDP90-00965R000403330002-0