Soviet Bloc and Western Bugging of Opponents’ Diplomatic Premises During the Early Cold War

@article{Easter2016SovietBA,
  title={Soviet Bloc and Western Bugging of Opponents’ Diplomatic Premises During the Early Cold War},
  author={David Easter},
  journal={Intelligence and National Security},
  year={2016},
  volume={31},
  pages={28 - 48}
}
  • D. Easter
  • Published 2 January 2016
  • History
  • Intelligence and National Security
This article examines Soviet Bloc and Western bugging of their opponents’ diplomatic premises in the early Cold War, from 1945 to the late 1960s. It explains the process of audio surveillance, identifies significant cases of bugging and describes the countermeasures taken by Western states. The paper concludes that the Soviet Union was able to gather a considerable amount of intelligence from bugging Western embassies in Moscow during the early Cold War. In particular, bugging enabled the… 
Protecting secrets: British diplomatic cipher machines in the early Cold War, 1945–1970
  • D. Easter
  • History
    Intelligence and National Security
  • 2018
ABSTRACT This article examines how effectively Britain secured its diplomatic communications against hostile decryption during the early Cold War. It shows that between 1945 and 1970 the Foreign
Soviet intelligence and the 1957 Syrian crisis
Abstract This article assesses a claim by Khrushchev that warnings from the Soviet intelligence services enabled to him to deter a Turkish invasion of Syria in 1957. The article shows that the United
The impact of ‘Tempest’ on Anglo-American communications security and intelligence, 1943–1970
TLDR
The British and Americans were forced to develop security measures to protect their encrypted communications but the Soviet Union was still able to exploit Tempest emissions from cipher machines in Western embassies in Moscow and read their diplomatic traffic.
British Intelligence and the Fear of a Soviet Attack on Allied Communications
TLDR
British intelligence fears about a Soviet attack on Allied communications are considered, including a reproduction of a 1959 assessment by the Joint Intelligence Committee focusing on the means of communication across the Atlantic and the means by which the Soviet Union could interfere or intercept them.
Arming Iran from the heart of Westminster? The Iranian military procurement offices, rumours and intelligence, 1981–1987
ABSTRACT During the Iran-Iraq war there were extensive rumours in the press regarding Iran’s use of Iranian Military Procurement Offices (IMPOs) in London to purchase arms. This article seeks to
Application of Information Technology in the Problems and Countermeasures of Kindergarten Science Education
TLDR
It is proposed to introduce information technology into early childhood education, and to enhance intellectual development, safety management and teamwork spirit in early Childhood education through information technology, multimedia technology, information monitoring technology and human-computer interaction technology in information technology.
Selective SIGINT: Collecting Communications Intelligence While Protecting One’s Own
  • John A. Gentry
  • Computer Science, Education
    International Journal of Intelligence and CounterIntelligence
  • 2019
The literature on intelligence contains a significant, little explored puzzle: countries have long maintained large signals intelligence (SIGINT) services, achieving successes that have become wide...

References

SHOWING 1-10 OF 33 REFERENCES
Enemies: A History of the FBI
The epic, disturbing story of how the FBI is America's real secret service. "Such creatures of passion, disloyalty, and anarchy must be crushed out. The hand of our power should close over them at
Privileged and Confidential: The Secret History of the President's Intelligence Advisory Board
Above the politics and ideological battles of Washington, D.C., is a committee that meets behind locked doors and leaves its paper trail in classified files. The President's Intelligence Advisory
Inside a Company
A History of the Marconi CompanyBy W. J. Baker. Pp. 414 + 23 plates. (Methuen: London, September 1970.) 100s.
The Mitrokhin archive
Out of the wilderness.
  • C. Davis
  • Engineering, Geography
    Emergency nurse : the journal of the RCN Accident and Emergency Nursing Association
  • 2012
Memorandum 'Observations on Possible Damage to United States' Security from Microphones in Embassy Chancery
  • 1961
Portrait of a Cold Warrior: Second Thoughts of a Top CIA Agent
  • 1981
POL: 17-2 to POL 23-6, Box 2827, Minute Downey to Director Security, CIA, 'Estimate of Damage to US Foreign Policy Interests
  • Central Foreign Policy Files
...
...