The Eavesdroppers Britain's Largest Spy Network Organis­ Cations Between Them

Total Page:16

File Type:pdf, Size:1020Kb

The Eavesdroppers Britain's Largest Spy Network Organis­ Cations Between Them SEVEN DAYS The Eavesdroppers Britain's largest spy network organis­ cations between them. Each country's Mozambique to monitor the Frelimo return-they had been flying a 'pro· ation is not MIS or MI6 but an electron­ signals intelligence (SIGINT) agency guerillas. (Information on the signals vocative' mission into the Soviet • ic intelligence network controlled from has authority to monitor communi· and positions of Frelimo transmitters Caspian Sea Special Missile Test Range a country town in the Cotswolds. With cations in one area. Europe west of the was then passed on to the Portuguese and on to test the Soviet air defences. the huge US National Security Agency Urals and Africa come under Britain's via NATO.) Deliberate intrusion into foreign as partner, it intercepts and decodes representative in the UKUSA pact­ In Cyprus ten years earlier, Foreign territory is not new. In 1958, two communications throughout the world. Government Communications Head· Office radio teams were also found to be Oxford University students exposed Freelance writer Duncan Campbell and quarters, known as GCHQ. operating in interesting proximity to the some of Britain's clandestine intel· Mark Hosenball trace the rise to power monitoring station and the BBC there. Iigence gathering in an article in the of the electronic eavesdroppers. After the abortive Suez operation the University magazine. isis. They de· RAF Chicksands, between Bedford and Foreign Office-furious with the BBC's scribed a fleet of spy boats manned by Hitchin, could be a pleasant day trip . calm objectivity-took over a British Germans and captained by Britons, from London. The sixteenth century priory is open, and you won't be dis· Policing the airwnes A series of fixed Post Office and turbed by overflying aircraft. Instead The Home Office is the only Brit ish Home Office monitoring stations also Chicksands is dominated by a giant hill· agency with a legal right to monitor listen oul for illicit transmissions. The top monolith, a steel circle a quarter communications. The Home Office's equipment is similar to the open Inter­ Radio Te chnology Directorate carries ference Division , but the activities are mile wide. Not far off, in a long low oul several monitoring tasks to keep lnore JOl1cealed. Around London, a chain building, 200 operators of the United the airwaves free of pollution-and of direction finding aerials can be used States Air Force Security Service sit illcgnl transmitters. The Radio Tech­ to track down pirates and others. Such over radios monitoring the ether from nology Directorate employ 400 Post stations are at Ewell, near Epsom, Office radio officers throughout Sanderstead near Croydon, Frinton in their giant 'Steelhenge'. Britain to track down an unwanted Essex, and elsewhere around Britain. Chicksands is the largest listening Home Office interference tracing is done signal. It s hllerferem:e Division traces One is even on the roof of the Director­ post in Britain of the US National over 40.000 complaints of interference ate's Headquarters at Waterloo Bridge by a fleet of 320 specially equipped a year all for the price of a form filled House. Security Agency. NSA is responsible vans. The larger ones carry a 30 foot in at the local Post Office. With 300 At Baldock in Hert fordshire. the for directing American inte.lligence from telescope mast with directional aerials special vans. many equipped with tele­ Home Office runs an 'International satellites to spy ships. Last summer, sl'opic din.~cl ion finding aerials and Frequency Monitoring Station' called and wide coverage receiving equipment special surveillance equipment, they Radcontrol, which fulfils Britain's treaty former CIA director William Colby to pinpoint any interfering signal. can Iral:k down SO lln.:es of interference. obligations to check on interference told a US Senate Committee that NSA In import,lOt cases, such as the time a caused to radio overseas. With two monitored all phone calls to and from From two modern office blocks on local factory was accidentally jamming direction finding substations in the cOlllmunications to aircraft landing at south of England, Radcontrol is the the US, intercepted commercial com· the outskirts of Cheltenham, the direc· Manchester. they have spent six months HOrPe Office's communications interpol, muncations, and raided embassies for tors of GCHQ manage a world·wide pinning down the source of dangerous investigating complaints of serious long codebooks. network of listening posts. Thcy have interference. range interference. No one is immune, not even America's directed aircraft and ships into foreign closest allies. Former NSA analyst air and sea space to obtain information Winslow ~eck (below) worked in the late on their communications and defences The listening posts are often found in the most remote places- Cyprus, Hong Kong, Singapore, Oman, Belize, St Helena, the Ascension Islands and Botswana among others. Another base was recently identified in Australia, On {'\-cry wavelength when after a typhoon hit Darwin, large The Composite Signals Organisallon was numbers of RAF personnel were dis· set up 111 1963 to brin g all dandcstinc radiO and llIonlloringoperations undcr covered on a nearby off·shore island. conlrol of (;CIIO. Two of its siles arc The GCHQ network comprises an wllhin ten miles of Belfast, and may be estimated 50 stations. In 1963 it won a involved in monitoring IRA radio. At Morwenstow, ncar Bude, Cornwall, secret battle to take control of all army, two lOO-foot sa tellite terminals report­ air force, and navy monitoring and edly re c.:eive pictures from American clandestine radio stations. reconnaissance satellites. Most, if not all , of the Composite sixties at the US Air Force installation GCHQ's director Bill Bonsall, Signals Organisation stations in Britain­ near Istanbul, another station in the although nominally responsible to the and there are more overseas-are in· chain of 12 k;ey NSA sites that includes Foreign Office, sits on the Joint Intel· volved in monitoring the airwaves, using ligence Committee and probably works computer controlled radio receivers. Chicksands. On a recent visit to Britain At Poundon. near Bicester in Oxford­ he described to Time Out top secret lists for Cabinet intelligence chiefs. His pre· shire, a well-guarded radio station of monitored UK commercial com· decessor, Sir Leonard Hooper, KCMG , marked ' Foreign and Commonwealth munications kept at the Turkish site. now works in the Cabinet Office after Office' is situated miles from the near­ est town. Two long sheds inside a Called TEXTA, these lists revealed that 32 years with GCHQ-a clear indication fenced-off compound house the listen­ the UK business communications were of the modern pre·eminence of SIGINT. ers and their radio sets, while outsid e Loop aerials at the Foreign Office's 'training' establishment I apparently being intercepted from east· But since the Labour government took stands one of Plessey's ' Pusher' aerials communications intelligence, at Poundon Lane, Bicester. for direction finding, and much o lhe r ern England. power in 1974, GCHQ's secret budget sophisticated equipment. Another ex-NSA serviceman, who has been reduced, and its listening posts served three years in Chicksands recent· east of Suez considered for closure. Iy, described how British representatives The worldwide intelligence collec­ SIS undercover anti· Nasser station to sailing under Swedish colours. These were effectively excluded from checking tion by GCHQ provides Britain with run the 'Voice Of Britain', which reo made regular patrols in Russian terri· on NSA work- and how one of two key considerable power. At Francistown layed the Foreign Office view in op· torial waters. On one occasion, a British monitoring controllers were responsible in Botswana, the RAF operates an position to the BBC. The radio side captain took his boat into Leningrad for intercepting communications from electronic intelligence base on behalf of Brilain's dirty tricks agencies are harbour. The authors, who had worked France! of GCHQ, which, with powerful apparently run by the Composite in a Royal Navy monitoring station in NSA is partnered in a worldwide antennae, can monitor the signals of Signals Orga nisation (CSO), which is Germany, were sentenced to six months electronic intelligence pact by four guerilla movements and government run by the ubiquilous GCHQ. imprisonment shortly afterwards for other powers: Britain, Canada, forces from its strategic position in In the early '60s, according to Peck, breaking the Official Secrets Act. Aus~ralia and New Zealand. By a 1947 the centre of Southern Africa. They ore two RAF aircraft equipped with e1ec· Their article also identified a 'chain secret agreement, UKUSA, these five much bet·ter placed than the NSA, who, tronic intelligence equipment took off of monitoring stations from Iraq to the English·speaking nations have divided according to Winslow Peck, had to use a from a base on the Caspian seacoast of Baltic- in flagrant breach of the Geneva the monitoring of the world's communi· Pueblo type spy ship on patrol off Iran. The planes and their crew didn't convention'. The stations recorded the 8 TIME OLiT MAY 21·27 1976 -- SEVE effects when British and American air­ GCIIO. In 1968 t hey set up a new com­ record and anal yse it, army and GCHQ same for GCHO. In Germany bored craft new over the borders to trigger pany called Racal (Slough) specifically electronic warfare experts can simulate intercept operators sitting in front of off a Soviet response. These flights were to manufacture secret communications the 'quite sophisticated' control signal­ their dials and switches would forget conducted regularly- 'there is no con­ equipment in co-operation with the making the bomb go off prematurely. about the Soviet Air Force and tune trolling the appetite of the statistical government. In just four years Racal Or they can devise a way of jamming along the band for the orchestra from anarysers at Cheltenham,' the students (Slough)'s turnover giew sixfold.
Recommended publications
  • The CIA Rigged Foreign Spy Devices for Years. What Secrets Should It Share
    The CIA rigged foreign spy devices for years. What secrets shouldnow/2020/02/28/b570a4ea-58ce-11ea-9000-f3cffee23036_story.html it share now? By Peter Kornbluh/ senior analyst at the National Security Archive, a nonprofit research center in Washington that advocates for declassification and freedom of information/ Twitter: @peterkornbluh February 28, 2020 The revelation that the CIA secretly co-owned the world’s leading manufacturer of encryption machines, and rigged those devices to conduct espionage on more than 100 nations that purchased them for more than half a century, has generated a number of historical and ethical questions: What did U.S. officials know, and when did they know it, about key episodes in recent world history? How did U.S. policymakers act on the intelligence that was gathered? Did U.S. officials have an obligation, as The Washington Post’s Greg Miller put it, to “expose or stop human rights violations unfolding in their view”? Should the United States have been spying on friends and foes alike? But the most immediate question has yet to be answered: What should the United States do with the massive trove of intercepted communications it obtained and decrypted, along with the thousands of secret intelligence reports those intercepts generated? Those files are gathering dust in the SCIFs — the sensitive compartmented information facilities — of the CIA and the National Security Agency. Hidden away, the documents represent a history held hostage; they have the potential to significantly advance the historical record, not only on U.S. foreign policy but on key world crises and events (wars, coups, terrorist attacks, peace accords) over more than five decades.
    [Show full text]
  • Hagelin) by Williaj-1 F
    .. REF ID :A2436259 Declassified and approved for release by NSA on 07-22 2014 pursuant to E.O. 1352e REF ID:A2436259 '!'UP SECRE'l' REPORT"OF.VISIT 1Q. CRYPTO A.G. (HAGELIN) BY WILLIAJ-1 F. FRIEDI.W.if SPECIAL ASSISTANT TO THE DIRECTOR, NATIONAL SECURITY AGENCY 21 - 28 FEBRUARY 1955 ------------------ I -:-· INTRO:bUCTIOI~ 1. In accordance with Letter Orders 273 dated 27 January 1955, as modified by L.0.273-A dated~ February 1955, I left Washington via MATS at 1500 houri' on 18 'February 1955, arrived at Orly Field, Pe,ris, at 1430 hours on 19 February, ' • • f • I ' -,-:--,I." -'\ iII ~ ~ ,.oo4 • ,. ,.. \ • .... a .. ''I •:,., I I .arid at Zug, Switzerland, at 1830 the same day. I sp~~~ th~· ~e~t .few da;s· ~ Boris Hagelin, Junior, for the purpose of learning the status of their new deyelop- ' ments in crypto-apparatus and of makifie an approach and a proposal to Mr. Hagelin S~, 1 / as was recently authorized by.USCIB and concurred in by LSIB. ~ Upon completion of that part of my mission, I left Zug at 1400 hours on ··'··· 28 February and proceeded by atrb-eme:Bfle to Zll:N:ch, ·1.'fteu~ I l3e-a.d:ee: a s~f3:es ah3::i:nMP plE.t;i~ie to London, arriving i:n mndo-l't' at 1845 that evening, f;the schedu1 ed p1anli ed 2_. The following report is based upon notes made of the subste.nce of several talks with the Hagel~ns, at times in separate meetings with each of them and at other times in meetings with both of them.
    [Show full text]
  • History, It Is Checkered
    Historical Notes ----------------------------------------------------------------------------------------------------------- Date: Mon, 3 Nov 1997 23:30:10 +0500 From: "Chuck Rippel" <crippel@...> Subject: [R-390] BA Receiver Fun - Targets Thanks for the many notes I received about posting some targets for our BA receivers. I was astounded at the number of affirmative replies received. As many know, I find listening a great deal of fun and very challenging. There are basically two styles of listening. Short Wave Listening is where the operator tunes in to a particular program. Short Wave Broadcast DX'ing is listening for very weak or seasonally challenging radio broadcasts or stations. In most cases, the language used by the broadcaster is not english as they are serving the local population. It is DX'ing v/s Listening where I intend to focus. Being a good SWBC DX'er is a bit like being a good detective. Various clues are pieced together to arrive at a conclusion. In our case, identifying an unknown station. Some of those clues are: Time Frequency Language Programming Music Style Time: Audibility of a station depends on the time it is broadcasting and the frequency it is on. Typically, the frequencies over 10 mhz are best during local day light and below, local dark. Signals below 7 mhz generally require darkness between the transmitter and receiver locations. However, not always and we will explore the opportunities when that rule can be expanded a bit. Frequency: Armed with the time and knowledge of propagation, frequency is the next big clue. There is general frequency consideration or band consideration. An example might be if a station on 4915 were being heard at 2200UTC on the East Coast.
    [Show full text]
  • International Default Location Field the Country Column Displays The
    Country Descr Country Descr AUS CAIRNS BEL KLEINE BROGEL AUS CANBERRA BEL LIEGE AUS DARWIN, NORTHERN BEL MONS TERRITOR Belgium BEL SHAPE/CHIEVRES AUS FREMANTLE International Default Location Field BEL ZAVENTEM AUS HOBART Australia BEL [OTHER] AUS MELBOURNE The Country column displays the most BLZ BELIZE CITY AUS PERTH commonly used name in the United States of BLZ BELMOPAN AUS RICHMOND, NSW Belize America for another country. The Description BLZ SAN PEDRO AUS SYDNEY column displays the Default Locations for Travel BLZ [OTHER] AUS WOOMERA AS Authorizations. BEN COTONOU AUS [OTHER] Benin BEN [OTHER] AUT GRAZ Country Descr Bermuda BMU BERMUDA AUT INNSBRUCK AFG KABUL (NON-US FACILITIES, Bhutan BTN BHUTAN AUT LINZ AFG KABUL Austria BOL COCHABAMBA AUT SALZBURG AFG MILITARY BASES IN KABUL BOL LA PAZ AUT VIENNA Afghanistan AFG MILITARY BASES NOT IN BOL SANTA CRUZ KABU AUT [OTHER] Bolivia BOL SUCRE AFG [OTHER] (NON-US FACILITIES AZE BAKU Azerbaijan BOL TARIJA AFG [OTHER] AZE [OTHER] BOL [OTHER] ALB TIRANA BHS ANDROS ISLAND (AUTEC & Albania OPB BIH MIL BASES IN SARAJEVO ALB [OTHER] BHS ANDROS ISLAND Bosnia and BIH MIL BASES NOT IN SARAJEVO DZA ALGIERS Herzegovina Algeria BHS ELEUTHERA ISLAND BIH SARAJEVO DZA [OTHER] BHS GRAND BAHAMA ISLAND BIH [OTHER] American Samoa ASM AMERICAN SAMOA BHS GREAT EXUMA ISL - OPBAT BWA FRANCISTOWN Andorra AND ANDORRA Bahamas SI BWA GABORONE AGO LUANDA BHS GREAT INAGUA ISL - OPBAT Angola Botswana BWA KASANE AGO [OTHER] S BWA SELEBI PHIKWE ATA ANTARCTICA REGION POSTS BHS NASSAU BWA [OTHER] Antarctica ATA MCMURDO STATION
    [Show full text]
  • The First Americans the 1941 US Codebreaking Mission to Bletchley Park
    United States Cryptologic History The First Americans The 1941 US Codebreaking Mission to Bletchley Park Special series | Volume 12 | 2016 Center for Cryptologic History David J. Sherman is Associate Director for Policy and Records at the National Security Agency. A graduate of Duke University, he holds a doctorate in Slavic Studies from Cornell University, where he taught for three years. He also is a graduate of the CAPSTONE General/Flag Officer Course at the National Defense University, the Intelligence Community Senior Leadership Program, and the Alexander S. Pushkin Institute of the Russian Language in Moscow. He has served as Associate Dean for Academic Programs at the National War College and while there taught courses on strategy, inter- national relations, and intelligence. Among his other government assignments include ones as NSA’s representative to the Office of the Secretary of Defense, as Director for Intelligence Programs at the National Security Council, and on the staff of the National Economic Council. This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other US government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Cover: (Top) Navy Department building, with Washington Monument in center distance, 1918 or 1919; (bottom) Bletchley Park mansion, headquarters of UK codebreaking, 1939 UNITED STATES CRYPTOLOGIC HISTORY The First Americans The 1941 US Codebreaking Mission to Bletchley Park David Sherman National Security Agency Center for Cryptologic History 2016 Second Printing Contents Foreword ................................................................................
    [Show full text]
  • Virtual Currencies: International Actions and Regulations Last
    Virtual Currencies: International Actions and Regulations Last Updated: January 8, 2021 No Legal Advice or Attorney-Client Relationship: This chart is provided by Perkins Coie LLP’s Decentralized Virtual Currency industry practice group for informational purposes only and is not legal advice. This information is not intended to create, and receipt of it does not constitute, an attorney-client relationship. Recipient should not act upon this information without seeking advice from a lawyer licensed in his/her own state or country. For questions or comments regarding this chart, please contact [email protected]. Developments Over Time Country Current Summary Date Occurrence Sources 2/20/2020 The Financial Services Regulatory Authority has updated and Guidance expanded its guidance through amendments to its cryptoasset regulatory framework. The amendments change the terminology used in the framework from “crypto asset” to “virtual asset,” a change that aligns with those descriptions used by the Financial Action Task Force (FATF) (see Issuers and intermediaries of virtual Financial Action Task Force (below)). The FATF currencies and “security” tokens may be recommendations are an international standard for regulation Abu Dhabi subject to regulation—depending upon of crypto assets including KYC requirements, anti-money the nature of the product and service. laundering and fraud prevention rules, and sanctions and screening controls. The amendments also overhaul regulations to move the applicable rules from a singular category to those respective to the underlying activities. This means that such assets can be regulated according to their idiosyncratic natures and not as a monolithic class. 29032535.40 10/09/2017 The Financial Services Regulatory Authority (FSRA) of Abu Supplementary Dhabi issued guidance on the regulation of initial coin/token Guidance – Regulation offerings (ICO) and digital currency as supplemental of Initial Coin/Token guidance to the existing 2015 Financial Services and Markets Offerings and Virtual Regulations (FSMR).
    [Show full text]
  • Development of Surveillance Technology and Risk of Abuse of Economic Information
    ∋(9(/230(172)6859(,//∃1&( 7(&+12/2∗<∃1∋5,6.2)∃%86( 2)(&2120,&,1)250∃7,21 9ΡΟ 7ΚΗςΗΡΙΚΗΥΛΘΦΡΠΠΞΘΛΦΛΡΘς ,ΘΗΟΟΛϑΗΘΦΗ&20,17ΡΙΞΡΠ∆ΗΓΣΥΡΦΗςςΛΘϑΙΡΥΛΘΗΟΟΛϑΗΘΦΗΣΞΥΣΡςΗς ΡΙΛΘΗΥΦΗΣΗΓΕΥΡΓΕΘΓΠΞΟΛΟΘϑΞϑΗΟΗςΗΓΡΥΦΡΠΠΡΘΦΥΥΛΗΥ ς∴ςΗΠςΘΓΛςΣΣΟΛΦΕΛΟΛ∴Ρ&20,17ΥϑΗΛΘϑΘΓςΗΟΗΦΛΡΘ ΛΘΦΟΞΓΛΘϑςΣΗΗΦΚΥΗΦΡϑΘΛΛΡΘ :ΡΥΝΛΘϑΓΡΦΞΠΗΘΙΡΥΚΗ672∃3ΘΗΟ /Ξ[ΗΠΕΡΞΥϑ2ΦΡΕΗΥ 3(9ΡΟ &ΟΡϑΞΛΘϑΓ 7ΛΟΗ 3∆Υ7ΚΗςΗΡΙΚΗΥΛΘΦΡΠΠΞΘΛΦΛΡΘς ,ΘΗΟΟΛϑΗΘΦΗ&20,17ΡΙΞΡΠ∆ΗΓΣΥΡΦΗςςΛΘϑΙΡΥ ΛΘΗΟΟΛϑΗΘΦΗΣΞΥΣΡςΗςΡΙΛΘΗΥΦΗΣΗΓΕΥΡΓΕΘΓΞΟΛ ΟΘϑΞϑΗΟΗςΗΓΡΥΦΡΠΠΡΘΦΥΥΛΗΥς∴ςΗΠςΘΓΛς ΣΣΟΛΦΕΛΟΛ∴Ρ&20,17ΥϑΗΛΘϑΘΓςΗΟΗΦΛΡΘ ΛΘΦΟΞΓΛΘϑςΣΗΗΦΚΥΗΦΡϑΘΛΛΡΘ :ΡΥΝΣΟΘ5ΗΙ (3,9%672∃ 3ΞΕΟΛςΚΗΥ (ΞΥΡΣΗΘ3ΥΟΛΠΗΘ ∋ΛΥΗΦΡΥΗ∗ΗΘΗΥΟΙΡΥ5ΗςΗΥΦΚ ∋ΛΥΗΦΡΥΗ∃ 7ΚΗ672∃3ΥΡϑΥ∆ΠΠΗ ∃ΞΚΡΥ ∋ΞΘΦΘ&ΠΣΕΗΟΟ,379/ΩΓ(ΓΛΘΕΞΥϑΚ (ΓΛΡΥ 0Υ∋ΛΦΝ+2/∋6:257+ +ΗΓΡΙ672∃8ΘΛ ∋Η 2ΦΡΕΗΥ 3(ΘΞΠΕΗΥ 3(9ΡΟ 7ΚΛςΓΡΦΞΠΗΘΛςΖΡΥΝΛΘϑ∋ΡΦΞΠΗΘΙΡΥΚΗ672∃3ΘΗΟ,ΛςΘΡΘΡΙΙΛΦΛΟΣΞΕΟΛΦΛΡΘΡΙ672∃ 7ΚΛςΓΡΦΞΠΗΘΓΡΗςΘΡΘΗΦΗςςΥΛΟ∴ΥΗΣΥΗςΗΘΚΗΨΛΗΖςΡΙΚΗ(ΞΥΡΣΗΘ3ΥΟΛΠΗΘ I nterception Capabilities 2000 Report to the Director General for Research of the European Parliament (Scientific and Technical Options Assessment programme office) on the development of surveillance technology and risk of abuse of economic information. This study considers the state of the art in Communications intelligence (Comint) of automated processing for intelligence purposes of intercepted broadband multi-language leased or common carrier systems, and its applicability to Comint targeting and selection, including speech recognition. I nterception Capabilities 2000 Cont ent s SUMMARY .............................................................................................................................................................................................
    [Show full text]
  • How the US and Germany Fooled the World for Decades
    How the US and Germany Fooled the World for Decades Cmdr. (res.) Eyal Pinko (Competitive Intelligence and Cyber Consulting, Ph.D. candidate Strategy, Defense and Intelligence studies, Bar Ilan University, Israel) Copyright: Research Institute for European and American Studies (www.rieas.gr) - Publication date: 23 February 2020 Note: The article reflects the opinion of the author and not necessarily the views of the Research Institute for European and American Studies (RIEAS) The American and German intelligence communities used Crypto AG, a Swiss company that made encryption tools, to spy on more than 100 countries. Intelligence gathered through this joint operation is said to have influenced the Israel-Egypt peace talks, the Falklands War, and the Iran-Iraq war, among others Recently uncovered information indicates that the American NSA and the BND (the German foreign intelligence service) have been cooperating since the 1970s, and have conducted joint intelligence gathering operations for decades, collecting information about more than 100 different countries. The cooperative operation was given the codename “Rubikon” and is considered one of the largest of its kind in history. Rubikon involved such activities as remote penetration of radio communications, of landlines, and more recently - of cellular phones. It included tracing phones and listening in on calls. The targets included politicians, senior government officials, members of the military and ambassadors. The NSA-BND cooperation began with a joint investment in a company called Crypto AG, which is registered in Lichtenstein and operated in Switzerland. It was founded by Boris Hagelin – an Azerbaijan-born businessman and inventor of encryption machines. Following the rise of communism, Hagelin and his wife fled the Soviet Union to Norway.
    [Show full text]
  • Royal Air Force (County) Football Association
    Royal Air Force (County) Football Association Oicial Handbook 2017-18 Handbook 2017-18 Table of Contents Page Foreword 6 Board of Trustees and Officers 12 Leagues 16 Royal Air Force (County) Football Association 17 Regional Directors and OIC Contacts 20 Objects, Membership and Affiliation of the Association 31 Respect - Codes of Conduct 35 Association Regulations - Travel 39 Rules and Regulations - General 41 Rules and Regulations - Competitions 47 Matches against Foreign Clubs 53 On-Field Disciplinary Procedures 56 Football Debt Recovery 73 Disciplinary Commissions and Appeal Boards 75 Disciplinary Procedures Dealt with by Affiliated Associations 78 Regulations for FA Appeals 81 Safeguarding Adults at Risk 86 Kit and Advertising Regulations 94 Third Generation (3G) Football Turf Pitches 102 The Football Association Equality Policy 103 Referees- Roll of Officers 104 Referees' Committee 105 Guide to Marking Referees 106 Rules Governing RAF Referees 107 Regulations for the Registration and Control of Referees 122 Goalpost Safety Guidelines 138 Goalpost and Pitch Sizes 139 Guidance Notes on Line Marking of Football Pitches 141 Inter-Service Champions 144 Inter-Service Champions (Ladies) 145 Inter-Service Champions (U23) 146 President's Cup Winners 147 Jubilee Cup Winners 148 RAF FA Challenge Cup Winners 149 RAF FA Junior Challenge Cup Winners 150 RAF Inter League / Inter Region (White Cup) Winners 151 RAF FA Festival of Football Winners 152 RAF FA Ladies Inter-Station Cup Winners 153 RAF FA Veterans Cup Winners 154 RAF FA Club of the Year
    [Show full text]
  • Four Decades Airfield Research Group Magazine
    A IRFIELD R ESEARCH G ROUP M AGAZINE . C ONTENTS TO J UNE 2017 Four Decades of the Airfield Research Group Magazine Contents Index from December 1977 to June 2017 1 9 7 7 1 9 8 7 1 9 9 7 6 pages 28 pages 40 pages © Airfield Research Group 2017 2 0 0 7 2 0 1 7 40 pages Version 2: July 2017 48 pages Page 1 File version: July 2017 A IRFIELD R ESEARCH G ROUP M AGAZINE . C ONTENTS TO J UNE 2017 AIRFIELD REVIEW The Journal of the Airfield Research Group The journal was initially called Airfield Report , then ARG Newsletter, finally becoming Airfield Review in 1985. The number of pages has varied from initially just 6, occasio- nally to up to 60 (a few issues in c.2004). Typically 44, recent journals have been 48. There appear to have been three versions of the ARG index/ table of contents produced for the magazine since its conception. The first was that by David Hall c.1986, which was a very detailed publication and was extensively cross-referenced. For example if an article contained the sentence, ‘The squadron’s flights were temporarily located at Tangmere and Kenley’, then both sites would appear in the index. It also included titles of ‘Books Reviewed’ etc Since then the list has been considerably simplified with only article headings noted. I suspect that to create a current cross-reference list would take around a day per magazine which equates to around eight months work and is clearly impractical. The second version was then created in December 2009 by Richard Flagg with help from Peter Howarth, Bill Taylor, Ray Towler and myself.
    [Show full text]
  • Verschlüsselt : Der Fall Hans Bühler
    Verschlüsselt Der Fall Hans Bühler P R ! S 0 N E R / / Res Strehle WERDVERLAG Digitized by the Internet Archive in 2018 https://archive.org/details/verschlusseltderOOstre Res Strehle Verschlüsselt Der Fall Hans Bühler WERDVERLAG Alle Rechte Vorbehalten, einschliesslich derjenigen des auszugsweisen Abdrucks und der photomechanischen Wiedergabe © 1994 Werd Verlag, Zürich Lektorat: Christina Sieg Gestaltung: Albin Koller, Berikon Printed in Switzerland ISBN 3 85932 141 2 Inhalt Kapitel Seite I 5 II 9 III 18 IV 26 V 38 VI 49 VII 59 VIII 70 IX 79 X 88 XI 98 XII 108 XIII 114 Dokumentarischer Anhang Die Person 125 Die Technik 135 Die Firma 143 Die Gefangenschaft 149 Die Rückkehr 171 Nachwort von Hans Bühler 195 CrypticLabs Accelerator for secure blockchain Whitfield Diffie Co-founder and chief scientist tel. 1.650.714.8669 [email protected] www.crypticlabs.org I Was wollten die von ihm? Einer hatte befohlen, den Stuhl zur Wand zu drehen. Dann war ihm eine grüne Augenbinde aufgesetzt worden. Fortan konnte er nur noch die Schuhe seiner Befrager sehen und einen Streifen Boden, vielleicht fünfzig Zentimeter. Ob er einen Dienstpass habe? Ein gutes Zeichen, die waren auf korrekten Umgang bedacht. Überhaupt schienen das Profis in Verhaftungsaktionen, keine Spur von Nervosität bei diesem Dutzend jüngerer Männer; nicht einer hatte die Hand an der Pistole. War das zivile Polizei, Militärpolizei, oder waren es die Sepah Pas- daran, die «Revolutionswächter»? Kein Entführungskommando je¬ denfalls, vermutete B., sonst hätten sie keinerlei Rücksicht auf diplo¬ matische Gepflogenheiten genommen. Hätte er einen Dienstpass oder gar Diplomatenpass vorzeigen können, er wäre vermutlich gleich wie¬ der freigekommen, damit keine aussenpolitischen Scherereien entstan¬ den.
    [Show full text]
  • Hệ Thống Thông Tin Gián Điệp Toàn Cầu Echelon
    HỆ THỐNG THÔNG-TIN GIÁN-ĐIỆP TOÀN CẦU ECHELON Lê Chánh Thiêm Trong lịch-sử chiến-tranh, từ trước đến nay, chiến-thắng nhiều lúc lại tùy-thuộc vào những tin-tức thu- lượm được về đối phương để có những chiến thuật chiến lược thích hợp để chiến thắng ngoài các yếu-tố khác như tài chỉ huy, vũ-khí, địa-thế trận địa, thiên thời, địa lợi, nhân hòa, v.v... Những tin tức này cho biết mọi tình-trạng về chiến-thuật chiến-lược, quân số, vũ-khí, tiếp-liệu... của phe bên kia để có biện- pháp đối phó ngõ hầu tạo ra chiến thắng. Trong thời đại ngày nay, khi văn-minh nhân-loại đã đến độ khá cao, các phương-tiện phục-vụ cho chiến-tranh lại càng mang lại lợi thế cho đội quân nào có khả- năng áp-dụng khoa-học kỹ-thuật. Một trong các phương-tiện được Hoa-Kỳ đặt lên hàng đầu là hệ-thống thông tin, gián-điệp, tin tức tình báo. Trước đây, giống như mọi nước, Mỹ gởi những điệp viên ra khắp nơi để thu lượm tin-tức. Thời gian sau nầy, một phương-thức khác được áp-dụng, đó là thiết-lập các thiết-bị nghe lén. Một trong các dụng-cụ do-thám mà Mỹ áp dụng vài thập niên qua, đó là hệ-thống nghe lén mang tên “Echelon” mà bài viết nầy đề cập đến. 1. Đại-cương: Hệ-thống Echelon là mạng lưới nghe lén bí-mật có khả năng kiểm-soát toàn thể hệ-thống thông-tin toàn cầu.
    [Show full text]