Page 134 - Gobierno ivisible
P. 134

Date: 4/5/2011                                                                                Page: 134 of 237



            The Office of Communications Security (COMSEC) produced U.S. codes and tried to protect them. And the
            Office of Security (SEC) investigated NSA personnel, conducted lie-detector tests and passed on the loyalty and
            integrity of employees.


            While the NSA was reading the secret communications of over forty nations, including the most friendly, it
            shared some of its secrets through a relationship between its United Kingdom Liaison Office (UKLO) and
            its British counterpart, the GCHQ. The NSA, at least according to Martin and Mitchell, also provided code
            machines to other nations and then intercepted their messages on the basis of its knowledge of the
            construction and wiring of the machines.

            The NSA gathered its raw information through more than 2,000 intercept stations around the world. They
            were designed to pick up every electronic emanation and communication in the Communist bloc:
            countdowns at missile sites, tell-tale sounds of industrial construction, military orders for troop
            movements, and air defense instructions to radar installations and fighter-plane squadrons.

            In addition, the NSA sent its eavesdropping equipment along on flights by the U-2 and other aircraft over the
            Soviet Union (until 1960) and over Communist China. Separate flights, called ELINT (for electronic intelligence)
            missions, skirted Communist borders, picking up the location and characteristics of enemy radar stations.
            Occasionally, the planes would play "foxes and hounds," feinting toward or into Soviet defenses so as to analyze
            the nature of the response on nearby U.S. radar screens and listening gear.

            The NSA also practiced what is known in the trade as "audio surveillance" and in layman's terms as "bugging," or
            "telephone tapping."


            It was clear that the United States had come a long way from that day in 1929 when Secretary of State Henry L.
            Stimson closed the "black chamber," the State Department's primitive code-breaking section, with the
            explanation:

            "Gentlemen do not read each other's mail."


            _______________

            * Codes use symbols or letter groups for whole words or thoughts. Ciphers use letters or numbers for other letters
            or numbers.
   129   130   131   132   133   134   135   136   137   138   139