unit 8200

back to index

description: Israeli Intelligence Corps SIGINT unit

22 results

pages: 1,071 words: 295,220

Rise and Kill First: The Secret History of Israel's Targeted Assassinations
by Ronen Bergman
Published 30 Jan 2018

Ronen Bergman, “AMAN Chief to PM Barak,” Yedioth Ahronoth, February 12, 2016. They planned to have him assassinated A Unit 8200 communications monitor by the name of Mor, a fluent Arabic speaker, was the expert on identifying Mughniyeh’s voice. Out of respect for Mor’s ability, experience, and dedication, the code name given to Mughniyeh in those years, “Maurice,” echoed her name. However, for many years, Imad Mughniyeh had seemingly vanished, and Unit 8200 could find no trace of him in Hezbollah’s communications traffic. On May 21, 2000, Mor, stationed at a Unit 8200 Grizim base in northern Israel, identified his voice while listening in to the communications of a tour by Hezbollah leaders along the border of Israel’s security zone in Lebanon, probably in preparation for Israel’s anticipated withdrawal.

“has taken hold among the cedars” Interview with Weissglass, December 23, 2014. CHAPTER 31: THE REBELLION IN UNIT 8200 Amir (not his real name) was an NIO Interview with “Amir,” March 2011. He asked to remain anonymous for fear that revealing his identity could cause him harm where he is working and studying now. “Our role in the selection of targets for assassination was dramatic” Interview with “Globus,” April 2011. the intention was simply to kill someone—anyone Unit 8200, Center 7143, Reaction of Unit 8200 to Information Request Regarding the Bombing of Fatah Facility in Khan Yunis, March 4, 2003 (author’s archive, received from “Globus”)

Sharon instructed AMAN, which was several times larger than the Shin Bet, and the Mossad, whose relations with the Shin Bet were patchy at best, to put themselves at the Shin Bet’s disposal for as long as they required. Unit 8200, the SIGINT arm of AMAN, underwent the biggest change. Previously, it had dealt mainly with Israel’s external enemies, mainly Syria. Now, many of its powerful antennas, surveillance facilities, and code-breaking and computer-hacking departments were focused on the war against suicide terror. Turban, one of the unit’s listening bases, which had been close to shutting down at the beginning of the peace process, was converted and put entirely at the disposal of the Shin Bet. It became Unit 8200’s largest base, and effectively a production line for targeted killings.

pages: 350 words: 115,802

Pegasus: How a Spy in Your Pocket Threatens the End of Privacy, Dignity, and Democracy
by Laurent Richard and Sandrine Rigaud
Published 17 Jan 2023

By the time Israel’s under-resourced Seventh Armored Brigade halted the Syrian tanks’ advance on the Golan Heights and reinforcements helped push them back to the edge of Damascus (and “saved the State of Israel,” according to Defense Minister Moshe Dayan), the IDF had determined they would never again suffer that kind of intelligence failure. Over the next five decades, Israel fed the best of its brainpower into its elite military intelligence service, known as Unit 8200, to make sure there would be no repeat disaster. The top-secret unit—its members were not allowed to speak its name or tell their closest family about their assignment—evolved with technology, from analog to digital, from landline to cell phone, and always one step ahead. Innovation mattered above all in Unit 8200, and innovation could come from anywhere in the ranks. The rosh gadol who landed in 8200 weren’t selected merely for their phenomenal test scores in math and physics.

By far it was the period in my life where I had the most responsibility and the most impact to other people.” “You’re also part of this secret thing,” says another former member of Unit 8200. “Sometimes you know about special operations or special abilities that nobody knows about outside and you feel you’re special and part of this special ring.… Maybe the prime minister of Israel and the defense minister and a few others know, but not a lot of others. So it’s pretty big.” * * * IN THE FEW years after Apple set up its new R&D facility in the Promised Land and peopled it with the highly trained rosh gadol from Unit 8200, the Israeli cybersecurity industry boomed. The data was all there in the charts that Prime Minister Benjamin Netanyahu liked to flash on the big screen every year during his speeches at Cybertech and Cyber Week in Tel Aviv.

Shalev and Omri met in the mid-1990s while both were studying arts and theater at a high school in Haifa (after Shalev washed out of a program for gifted students because of congenital misbehavior). Both completed their compulsory service in the Israeli military and then some, though neither had served in the elite counterintelligence force—Unit 8200. Shalev and Omri remained in touch and passed through their late twenties together, the two men spinning hard to make themselves machers in the hottest industry in Israel. Shalev and Omri sometimes described themselves as “serial entrepreneurs” or “early adopters of technologies.” Roughly translated, this was two guys in a bar dreaming up ways to cash in on the newest computer tech.

pages: 383 words: 105,021

Dark Territory: The Secret History of Cyber War
by Fred Kaplan
Published 1 Mar 2016

The Israelis managed to pull off the attack—code-named Operation Orchard—because, ahead of time, Unit 8200, their secret cyber warfare bureau, had hacked the Syrian air-defense radar system. They did so with a computer program called Suter, developed by a clandestine U.S. Air Force bureau called Big Safari. Suter didn’t disable the radar; instead, it disrupted the data link connecting the radar with the screens of the radar operators. At the same time, Suter hacked into the screens’ video signal, so that the Unit 8200 crew could see what the radar operators were seeing. If all was going well, they would see blank screens—and all went well.

A decade earlier, during the campaign against Serbian President Slobodan Milosevic, IOC spies gained entry to Belgrade’s telephone exchange and planted devices, which the NSA’s SIGINT teams then hacked, giving them full access to the nation’s phone system. These sorts of joint operations had blossomed with the growth of TAO. The NSA also enjoyed close relations with Israel’s Unit 8200, which was tight with the human spies of Mossad. If it needed access to a machine or a self-contained network that wasn’t hooked up to the Internet, it could call on any of several collaborators—IOC, Unit 8200, the local spy services, or certain defense contractors in a number of allied nations—to plant a transmitter or beacon that TAO could home in on. In Olympic Games, someone would install the malware by physically inserting a thumb drive into a computer (or a printer that several computers were using) on the premises—in much the same way that, around this same time, Russian cyber warriors hacked into U.S.

The challenge was to devise a worm that would infect the Natanz system but no other Siemens systems elsewhere, in case the worm spread, as worms sometimes did. Bush was desperate for some way out; this might be it; there was no harm in trying. So he told Alexander to proceed. This would be a huge operation, a joint effort by the NSA, CIA, and Israel’s cyber war bureau, Unit 8200. Meanwhile, Alexander got the operation going with a simpler trick. The Iranians had installed devices called uninterruptible power supplies on the generators that pumped electricity into Natanz, to prevent the sorts of spikes or dips in voltage that could damage the spinning centrifuges. It was easy to hack into these supplies.

pages: 285 words: 81,743

Start-Up Nation: The Story of Israel's Economic Miracle
by Dan Senor and Saul Singer
Published 3 Nov 2009

Eli Barkat, one of the founding partners of BRM, explained to us his theory behind the company’s future value: “The first generation of technology security was protecting against a virus invading your PC. The second generation was building a firewall against hackers.” Barkat knew something about both these threats, having funded and built companies to protect against them. One of them, Checkpoint—an Israeli company also started by young alumni from Unit 8200—is worth $5 billion today, is publicly traded on the NASDAQ, and includes among its customers the majority of Fortune 100 companies and most national governments around the world. The third generation of security would be protecting against hacking into e-commerce activity. “And this would be the biggest market yet,” Barkat told us, “because up until then, hackers were just having fun—it was a hobby.

How do you train and mature a twenty-year-old to shoulder such responsibility?” The degree to which authority devolves to some of the most junior members of the military has at times surprised even Israeli leaders. In 1974, during the first premiership of Yitzhak Rabin, a young female soldier from the IDF’s Unit 8200—the same unit in which the founders of Fraud Sciences later served—was kidnapped by terrorists. Major General Aharon Zeevi-Farkash (known as Farkash), who headed the unit—Israel’s parallel to the U.S. National Security Agency—recalled Rabin’s disbelief: “The kidnapped girl was a sergeant. Rabin asked us to provide him an itemization of what she knew.

When he saw the briefing paper, Rabin told us we needed an immediate investigation; it’s impossible that a sergeant would know so many secrets that are critical to Israel’s security. How did this happen?” Rabin’s reaction was especially surprising since he had been the IDF chief of staff during Israel’s Six-Day War. Farkash continued the story: “So I told him, ‘Mr. Prime Minister, this individual sergeant is not alone. It was not a mistake. All the soldiers in Unit 8200 must know these things because if we limited such information to officers, we simply would not have enough people to get the work done—we don’t have enough officers.’ And in fact, the system was not changed, because it’s impossible for us, given the manpower constraints, to build a different system.”7 Farkash, who today runs a company that provides innovative security systems for corporate and residential facilities, quipped that compared to the major powers, Israel is missing four “generals”: “general territory, general manpower, general time, and general budget.”

pages: 651 words: 186,130

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
by Nicole Perlroth
Published 9 Feb 2021

And because there were no rules to this market, the bulk of their suppliers were hackers in Eastern Europe. “With the breakup of the Soviet Union, you had a lot of people with skills, without jobs,” Sabien explained. But the most talented hackers, he told me, were based in Israel, many of them veterans of Israel’s Unit 8200. I asked Sabien how old his youngest supplier was, and he recalled a transaction with a sixteen-year-old kid in Israel. It was a secretive business, and mind-blowingly convoluted. Sabien’s team couldn’t exactly call up hackers, ask them to send their exploit by email, and mail them back a check.

And their cyber skills started to rival even those of TAO. Over the next few weeks, Olympic Games came together. Some say it was an NSA computer algorithm that came up with the name. Others said it was purposely chosen for the five Olympic rings, symbolizing the unprecedented five-way cooperation between NSA, Israel’s Unit 8200, the CIA, Mossad, and the national energy labs. For months, teams of hackers, spies, and nuclear physicists traveled back and forth between Fort Meade, Langley, Tel Aviv, Oak Ridge, and Israel’s own nuclear test site, Dimona, where the Israelis had built their own giant replica of Natanz. They planned out their entire mission like a SEAL Team Six operation: navigation, entry and exit strategies, delivery vehicles, and customized weapons equipment.

But once the human touch triggered the attack, the rest could be accomplished using the magic of seven zero-day exploits, four in Microsoft software and three in the German Siemens software inside the PLCs. We still do not know where—with two glaring exceptions—these zero-days came from, whether they were developed “in-house” by TAO or Israel’s Unit 8200 or procured off the underground market. What we do know is that the worm—in its final form, 500 kilobytes—was fifty times bigger than anything discovered before it. It was one hundred times the kilobytes required to send Apollo 11 to the moon. And it was pricey, easily worth millions of dollars.

pages: 472 words: 145,476

The Land of Hope and Fear: Israel's Battle for Its Inner Soul
by Isabel Kershner
Published 16 May 2023

Either way, much of the know-how was gained in the army. Computer geeks and freelance hackers were often spotted during high school and plucked from the annual intake of conscripts for the army’s cyber units. Speaking at a cyber-security conference at Tel Aviv University in 2022, the deputy commander of Unit 8200 said that nearly three-quarters of the current personnel were under the age of twenty-three, which he described as a magic ingredient that set the unit apart from other agencies abroad. These hothouses of innovation had invented ways of nurturing talent. There was seemingly a contradiction between an army’s ingrained military structure and rigid chains of command and the looser kind of environment that generally encouraged creativity and out-of-the-box thinking.

Her presentation followed a long line of cyber companies’, and investors instantly perked up and asked pertinent questions about logistics and whether the chickpea protein set off an allergy that was common in the region to certain legumes. She seemed taken aback by the interest, remarking, as we crossed paths, “Who’d have thought?” The next task, she said, was “to build trust, which is like building peace.” The investors’ interest was similarly piqued by Yehonatan Ben-Hamozeg, a gray-haired, retired veteran of Unit 8200 and now the CEO of an agricultural intelligence company, Agrint. Dubbed the “tree listener,” he had developed a sensor for the early detection of red weevils, a pest that ate away at date palms from the inside, ultimately destroying them. Of the four billion palm trees in the world, some forty-three million were said to be in the United Arab Emirates, where a third of the world’s dates were grown.

W., 281 C Café Albi, 69–70, 72 Café Paula, 109 cannabis, 21 Cave of the Patriarchs, 24 Cellebrite, 314 Central Bureau of Statistics, 304, 307 Cherkassky-Nnadi, Zoya, 290–92, 343 chickpeas, 318, 320 Christians, 141, 179, 185, 197, 242, 274 Ethiopians and, 324, 325, 335, 342 Evangelical, 128, 131–32 Restorationist, 169 Christmas, 277, 278 Chromatis, 306 Chwierut, Janusz, 46 Circassians, 158, 179, 242 Climate group, 45 Cohen, Israel, 226–28, 237 Cohen, Shmuel Eliyahu, 224 communism, 87, 100, 277 coral, 14–16, 28 CoreBone, 15 coronavirus pandemic, 26, 27, 81, 93, 112, 159, 167, 168, 298, 304, 308, 311, 314, 317, 321, 341–43 Haredi and, 201, 202, 213–21, 223, 236 Coronet, 315, 316, 320–21 crime, 186–90 CyberArk, 306 Cyprus, 274, 281 D Dadon family, 162 Dahamshe Mosque, 163 Damri, Yael, 136 Damri, Yochai, 136–39 Dan, tribe of, 324, 325 Darawshe, Mohammad, 193 Darwish, Mahmoud, 196 date palms, 319 Davar, 102 Dawabsheh family, 141–42 Dayan, Moshe, 84, 269 Dead Sea, 6, 7 Degania Aleph, 100, 107 Degel HaTorah, 203 Deir Yassin, 56 Dekel, Hannah, 252–53 Dekel, Yaron, 72–73 Deri, Aryeh, 90, 215 Deri, David, 78–81 development towns, 78–82, 93 Diaspora Museum, 279 Dikla, 73 Dimona, 8, 9, 80–82 Dolgopyat, Artem, 294 Dolphinarium, 289–90 Dome of the Rock, 142, 323 Dorfman, Yevgenia, 289–90 Dosh, 44 driverless cars, 299 Druze, 158, 179–80, 185, 242, 303 Dubai, 144, 296–98, 304, 313, 315–21 Duda, Andrzej, 13 Duke, David, 14 Duma, 141, 142 E Edelstein, Gershon, 219 Edelstein, Yuli, 96, 288 education, 75, 80–81, 166–68, 304, 306, 307 Bedouin and, 311–12 Haredi and, 90, 204–5, 208, 211, 227–30, 234, 237–38, 304 women and, 197, 230, 234, 238 Egypt, 18, 23, 46, 63, 243, 251, 262, 264, 265, 313, 316–17, 319, 321 Eichmann, Adolf, 41, 42, 55, 56 Eilat, 7–9, 327 Ein Gev, 115 Einstein, Arik, 70 Ein Yahav, 5–11, 14, 19–23, 26–28, 29 Eisenkot, Gadi, 257 Eizenman, Julia, 280 El Al, 39, 305 elections, 17–18, 66, 82–90, 96, 108, 149, 171–72, 178, 181, 185 Haredi and, 201, 203, 207, 218–19, 228 Russians and, 282–84 Eliav, Aryeh, 79 El Mal, 169, 170, 172, 178 Elmaleh, Khen, 69–75 Elmaleh, Ohad, 70 engineers, 273, 295, 298, 300–302, 307, 308, 311 Erdan, Gilad, 96 Eretz Nehederet, 285, 289 Eshel, Amir, 244 Esh Kodesh, 120–21, 124–28, 131–33, 141, 142, 144, 149 Ethiopian immigrants, 37, 64, 81, 94, 161, 164, 307, 322–44 airlifts of, 326, 328, 342–44 Christianity and, 324, 325, 335, 342 in criminal justice system, 332–33 Jerusalem and, 322–23, 326, 327, 340 Jewish status of, 324, 325, 328, 334–35, 340 kessim, 322, 328, 337, 340, 343 marriage and, 328, 333, 335 musicians, 341 police and, 329–38 poverty among, 335 protests and riots by, 329–35, 340, 342 racism against, 324, 328–31, 332–34, 336, 337, 339, 340, 343 Sigd holiday of, 322–23, 327, 328 Ettinger, Meir, 142 Etzel Museum, 31, 181 Etzion bloc, 134 Evyatar, 144–45 exits (mergers and acquisitions or initial public offerings), 110, 298, 299, 308, 314 F Familia, La, 40–41, 156 Farber, Clara, 200 Farber, Yanki, 200–201, 203–4, 208, 210–12, 214, 216, 221, 227, 237 Fauda, 193 fedayeen, 7–8 Feinstein, Meir, 85–86 fertility rates, 197, 201, 207, 304, 308 Fikadey, Demas, 329–32, 340 First Israel, 64, 92, 93, 97 fish farming, 21, 61, 112 Flags over the Warsaw Ghetto (Arens), 38 Floyd, George, 193, 334 Fogel family, 140 Forbes, 69 Forbes Midas List, 305 Frank, Zvi, 102 Frankfort-Smith, Elisheva, 196 Free the Asi campaign, 61, 62, 65, 66, 96–97 Frei, Danny, 147 Friends of Itamar, 141 G Gabbay, Avi, 87–89 Galilee, 67, 157, 158, 169, 172, 173, 184 Galili, Lily, 282 Gantz, Benny, 183, 263, 266–67 Garbuz, Yair, 86, 89–91 Gardosh, Kariel, 43–44 Garin Torani movement, 160–61, 163–65 Gattegno, Iris, 91–92 Gavrieli, Matanya, 139 gay and LGBTQ communities, 184, 185, 226, 229, 252 Gaydamak, Arcadi, 40 Gaza, 11, 18, 22, 23, 82–84, 91, 111, 124, 129, 145, 156, 165, 175–77, 180, 243, 246–47, 255, 259, 267, 269, 289, 303, 304, 313, 320 Israeli withdrawal from, 150–51, 259 Mengistu in, 330–31, 338–39 2014 war in, 83, 111, 243, 260, 302, 336, 338 Geffen, Aviv, 220 Geneva Conventions, 128 Gesher Theater, 289 Getahun, Zion, 339–40 Ghetto Fighters’ House, 42, 47 Gilboa prison, 176, 177 Gilmore, Esh Kodesh, 124 Givatayim, 30, 35 Givat Halfon Eina Ona, 251 Glazer, Shlomo, 61–63 Golan, Eyal, 69, 71, 73 Golan Heights, 18, 88, 122 Goldbach, Tamar, 117–18 Goldberg, Elazar, 224 Goldin, Hadar, 339 Goldsmith, Leah, 141 Goldsmith, Moshe, 140–41, 143 Goldstein, Baruch, 24, 148 Goldstein, Bat-El and Yonatan, 75 Gottex, 43 Gottlieb, Lea, 43 Gouri, Aliza, 47–53, 57–58 Gouri, Gila, 48, 49 Gouri, Haim, 47–59, 83, 135, 157, 244 Ben-Gurion’s letter to, 55–57 death of, 58–59 Gouri, Israel, 48 Great March of Return, 84 Great Rift Valley, 28 Greenbaum, Avraham Dov, 209 Green Line, 135, 176, 281–83 Grossman, David, 255 Gulf War, 211, 218, 281 gun violence, 186–90 Gush Emunim, 54, 134–35 Gvaot Olam, 126 H Haaretz, 41, 46, 87, 104, 110, 223, 282 Haber, Avi, 103 Haber, Shoshana, 102–5, 112 HaCohen, Akiva, 131, 139 Hadad, Perah, 65, 96 Hadash, 181, 182 HaDerech, 209 Hadid, Gigi and Bella, 130 Haganah, 29, 32, 36–38, 44, 115, 194, 243 Palmach, see Palmach Hagee, John, 132 Haifa, 25, 67, 98, 103, 157, 181, 344 Haifa University, 171 Halevi, Tzahi, 193 Hall of Remembrance, 18, 19 Hamad, Maryam Hassan Abd al-Karim, 151 Hamas, 24, 82–84, 91, 124, 156, 176, 243, 246–47, 255, 269, 289, 314 Mengistu and, 330–31, 339 Hamed, Atallah Abd al-Hafez, 151–52 Hamevaser, 210 Haredi (ultra-Orthodox Jews), 16–17, 26, 61, 74, 87, 90, 95, 123, 166, 169, 185, 200–239, 267, 285, 292, 303, 304, 313 coronavirus pandemic and, 201, 202, 213–21, 223, 236 departures from community of, 220–21 economic system of, 232 education and, 90, 204–5, 208, 211, 227–30, 234, 237–38, 304 elections and, 201, 203, 207, 218–19, 228 Gulf War and, 211, 218 Internet and, 202, 209–10, 217–20, 224, 232, 234, 237 military and, 201, 205–8, 210–12, 215–17, 235, 238, 239, 242, 245, 249–51, 253, 261, 266, 267 Mount Meron disaster and, 222–26, 229 Netanyahu and, 87, 201–2, 206–7, 214, 226–28 New, 238–39 in popular culture, 221–22 population growth of, 207, 239, 242, 249 Russians and, 273 sexual abuse and harassment among, 233, 235–38 tech and, 307, 313 women, 207–10, 213, 219, 227, 229–35, 238, 307 “HaReut” (Gouri), 53, 58 Harman, Juta, 38 Harmel, Kristin, 221 Harris, Tahel, 162 Hasan, Roy, 72 Hasdei Amram, 217 Hashomer, 36 Hasidim, 202, 203, 210, 225, 231 see also Haredi Haskel, Amir, 27 Hassouneh, Mousa, 156–57, 164–65 Hatzerim, 9 Hauser, Zvi, 93 Hawara, 140 Al-Hawashleh, Rabaa, 309–12 Haza, Ofra, 69 Hebrew Labor, 20 Hebrew language, 16, 17, 27, 36, 37, 48, 72, 74, 75, 80, 166, 168, 177–78, 205, 271, 317, 335 Hebron, 24, 37, 122, 134–36, 142, 148, 256 Heilbronn, Avigayil, 231–35, 237–39 Heilbronn, Hananel, 231–33 Heilbronn, Rachel, 231–32, 239 Herut, 55 Herzliya, 15, 45 Herzog, Isaac, 86, 255, 343 Hezbollah, 243, 246 hijacking plot, 286–87 Hijazi, Ahmad, 186 hilulah, and Mount Meron disaster, 222–26, 229 al-Hinawi, Shirin, 163 Hitler, Adolf, 36, 38, 55, 56, 62, 103 Hogeg, Moshe, 40–41 Holocaust, 38, 41–43, 45, 47, 55, 78, 80, 244, 293, 300 Haredi and, 203–5 Holocaust survivors, 25, 29, 30, 36, 41–47, 52, 55, 65, 111, 158, 195, 244, 294, 327, 335 reparations for, 55, 74–75, 104–5, 113 homicides, 186–90 Hujayrat, Ammar, 190 human rights organizations, 95, 123–24, 133, 144, 149, 256, 257, 259 al-Huzayel, Laila, 192 I “I Am a Civil War” (Gouri), 47–49 Ibn Sina (Avicenna), 167 Ibrahimi Mosque, 24 ICQ, 299, 300 Ifargan, Yaacov, 91 immigration, immigrants, 304, 334, 341–42 Arab Revolt against, 101 development towns and, 78–82, 93 Ethiopian, see Ethiopian immigrants illegal, 102 kibbutzim and, 102, 107, 108 Law of Return and, 36–37, 180–81, 272, 274, 295, 324, 342, 343 Lithuanian, 203, 204, 214, 219–20, 227–29 Nation State Law and, 179 Russian, see Russian immigrants Im Tirzu, 259 Independence Day, 156, 161, 217, 236, 238, 253, 254, 345 Innovation Authority, 303, 307 InnovoPro, 318, 320 Intel Israel, 311, 312 Internet, 299, 300, 309 Haredi and, 202, 209–10, 217–20, 224, 232, 234, 237 In the Tunnel, 289 intifadas First, 11, 182, 246, 282 knife, 235, 256, 257 Second, 24, 51, 86, 175, 176, 243, 246, 248, 289, 305 Iran, 68, 87, 143, 176, 243, 247, 298–99, 314, 315, 316 nuclear program of, 12, 16, 189, 246, 298 Iraq, 211, 218 Irgun, 29–34, 37–40, 56, 85 Iron Beam, 247 Iron Dome, 88, 247 Islam, 179 see also Muslims Islamic Jihad, 24, 176 Islamic Movement, 195 Israel Advanced Technology Industries, 307 Israel Defense Forces (IDF), 29, 31–36, 39, 109, 145, 147, 174, 180, 188, 222, 240–69, 310, 336, 345 Air Force, 244, 261, 308 alleged brutality and lack of accountability in, 259 Azaria affair and, 256–59, 268 Bahad 1, 240–41, 243, 244, 264 Ben-Gurion and, 31, 33, 34, 241, 242, 244–45, 260 Caracal Battalion, 263–65 draft and mandatory service in, 10, 205, 207, 208, 210–12, 215, 239, 241–43, 245, 249, 251–52, 260, 266, 267 ethical code of, 256–57, 266 Haredi and, 201, 205–8, 210–12, 215–17, 235, 238, 239, 242, 245, 249–51, 253, 261, 266, 267 Irgun and, 31–33 Kirel in, 253–54 in Lebanon, 243, 246 Mamram, 300, 315 modern Orthodox and, 260, 265 Netanyahu and, 240 as People’s Army, 241, 251, 266, 267, 269, 299 professional volunteer force proposals and, 249–50, 266 public relations campaign of, 252–53 public rituals around, 254–55 reserve duty in, 251 Russian immigrants in, 251–52, 276, 277, 279–80, 293 selective objection and, 260 Shalit incident and, 255–56 Shmueli incident and, 267–69 Talpiot program, 300 tech and, 298, 300–303 Unit 81, 300 Unit 8200, 300, 301, 319 in West Bank, 243, 244, 246–48, 264 women in, 242, 245, 249–51, 261–66, 303 Israel Democracy Institute, 249, 257 Israel Hayom, 94, 110 Israeli Black Panther movement, 67, 70, 72–74, 182, 334 Israeli Declaration of Independence, 26, 31, 158, 179, 198, 232 Israel Innovation Authority, 303, 307 Israel Museum, 45 Cherkassky exhibition at, 290–92 Israel Prize, 236, 254–55 Israel Women’s Network, 250 Itamar, 140, 141, 143 J Jabali, Saad, 188–89 Jabali, Watfa, 188–89 Jabotinsky, Ze’ev, 30, 31, 34, 36–38, 40, 58, 93, 179, 183 Jaffa, 157, 160, 170, 181, 187 Jalud, 126 Jeffress, Robert, 132 Jenin, 211, 258 Jeremiah, 127, 148 Jericho, 6 Jerusalem, 6, 25, 32, 37, 45, 122, 134, 142, 144, 156, 168, 306 Armon Hanatziv neighborhood of, 322–23 Dome of the Rock in, 142, 323 East, 139, 175, 282, 304 Ethiopians and, 322–23, 326, 327, 340 Hass Promenade in, 322–23, 327 Margalit Startup City in, 297, 306 Mea Shearim neighborhood of, 202, 205, 211, 216–17, 221, 230, 235 Mount Herzl in, 18, 86, 345 Old City in, 18, 23, 48, 50, 53–54, 74, 156, 211, 316, 322, 323 siege of, 50–53, 59 Temple Mount (Noble Sanctuary) in, 54, 195, 323 U.S. embassy in, 128, 132 West, 24 Western Wall in, 170, 211, 226 Zion Square in, 55 Jerusalem corridor, 51, 52 Jerusalem Day, 156 Jerusalem Faction, 212 Jewish Agency, 79, 94, 290, 342, 343 Jewish National Fund, 194, 199 Jewish Nation State Law, 41, 178–80, 198 Jisr al-Zarqa, 115, 119 Joint List, 179, 181–85 Jordan, 7, 10, 18, 63, 134, 194, 313, 316–17 Israel’s border with, 5, 6, 8, 9, 243, 262 Jordan Valley, 122, 134, 146, 148, 149 Joshua, 127, 141, 213 Judea, 135, 139 JVP, 296, 305, 306, 313, 317–18, 320 K Kachlili, Ron, 72 Kadima, 96 Kahane, Meir, 142, 148 KamaTech, 307 Kaminitz Law, 180, 186 Kanievsky, Chaim, 214, 215, 218, 219 Kantor, Itzik, 112 Kashua, Sayed, 159 Katsav, Moshe, 64, 94 Katsof, Aaron, 131–33, 139, 142, 144, 149 Katz, Israel, 96 Kaufman, Mendel, 30 Kedumim, 21 Keissar, Adi, 72 kessim, 322, 328, 337, 340, 343 Kfar Etzion, 134 Kfar Vitkin, 33 Kfir Brigade, 211 Khaldi, Ishmael, 193 Khomeini, Ayatollah Ruhollah, 68 kibbutzim, 17, 98–119, 121, 221, 246–47, 287 Begin and, 107–8 children in, 103–4, 106, 114, 116, 117, 119 decline of, 106–7, 117 Degania Aleph, 100, 107 Hatzerim, 9 immigrants and, 102, 107, 108 industry and, 107, 108, 110–14 Kibbutz Movement and, 106–8, 112 Kvutzat Shiller, 107 Lohamei HaGetaot, 38, 41–42, 110–11, 261 Maagan Michael, 100, 103, 106, 110, 112–17, 119 Maayan Zvi, 98–105, 111–13, 115–19 Megiddo, 199 Nahal Oz, 84, 111, 269 Nir David, 61–66, 83, 85, 95–97, 101, 107, 108 Peres and, 108 privatization of, 100, 101, 106, 107, 115, 117–19 “renewed,” 106 revival of, 101, 111, 132 Sde Boker, 25, 108–10 Kibbutznikim, 119 Kikar HaShabbat, 209, 219 King David Hotel, 56 Kingsley, Patrick, 268 Kippat Barzel, 222 Kirel, Noa, 253–54 Kiryat Arba, 122 Kiryat Gat, 312 Kiryat Malachi, 275, 276, 326–27, 329 Kiryat Moshe, 335–37 Kiryat Shemona, 161, 306, 313 Klagsbald, Shmuel Zvi, 224 Knesset, 14, 18, 23, 27, 48, 55, 56, 58, 76, 88–90, 107, 171, 178, 179, 181–84, 188, 230, 255, 262, 282, 288, 306, 328, 329, 341 Knesset Research Center, 81 knife intifada, 235, 256, 257 Knipsel, Gershon, 174 Kochavi, Aviv, 269, 345 Kollek, Teddy, 305–6 Korkevados, Yoram, 93 kosher laws, 20–21, 204, 208, 212, 218, 229, 249, 277, 278, 317, 335 al-Krenawi, Talal, 192 Kupat Ha’ir, 219 Kushner, Jared, 143 Kvutzat Shiller, 107 L Labor Party, 23, 24, 58, 66, 74, 85–89, 95, 122, 134, 282, 288, 295, 306, 325 Labor Zionism, 6, 7, 12, 20, 30, 34, 54, 56 Lag ba’Omer, and Mount Meron disaster, 222–26, 229 LaMerhav, 55 Land Day, 170–72, 174, 178, 182 Land of Israel Movement, 54 Lapardin, Ira, 271 Lapid, Yair, 202, 208, 212, 228, 267, 286, 346 Lavi fighter jet, 301 Law of Return, 36–37, 180–81, 272, 274, 295, 324, 342, 343 League of Nations, 169 Lebanon, 18–19, 161, 180, 243, 246, 298, 313, 319 Lehava, 192–93 Lehi, 37, 38, 85 Leifer, Malka, 213 Levinger, Moshe, 122 Levinstein, Yigal, 265 Levy, David, 63–64 Levy, Edmund, 148 Levy, Yagil, 248–49, 262 LGBTQ communities, 184, 185, 226, 229, 252 Liberman, Avigdor, 228, 258, 267, 283–86, 288 Likud, 17, 23, 26, 30, 38, 40, 55, 56, 61, 64, 66, 69, 75, 80–89, 92–97, 122, 135, 143, 148, 204, 206, 219, 282–84, 288, 343 Lilay, Tamar, 327 Lipa, Dua, 130 Lithuanian immigrants, 203, 204, 214, 219–20, 227–29 Litzman, Yaakov, 213–15 Livni, Tzipi, 89 Liwer, Dror, 315–16, 320–21 Lod, 155–70, 175 HaRakevet neighborhood of, 165–67 Ramat Eshkol neighborhood of, 155–56, 159–61, 163 Lohamei HaGetaot, 38, 41–42, 110–11, 261 Lo Tishtok movement, 235 Lubetkin, Zivia, 261 Lydda, 160 M Maagan Michael, 100, 103, 106, 110, 112–17, 119 Maaleh Michmash, 146–48 Maayan Zvi, 98–105, 111–13, 115–19 al-Mabhouh, Mahmoud, 314 Madar, Erez, 94 Magen, 235 Malach, Nir, 330 Malachi, Kiryat, 94–95 Malassa, Eli, 329 Malcolm X, 70, 182–83 Mamram, 300, 315 Mapai, 34, 39, 48, 55, 56, 58, 67, 83, 86, 135 Margalit, Erel, 296–98, 305–6, 313, 319 Margalit Startup Cities, 297, 306 marijuana, 21 Mark, Michael “Miki,” 137 Markovitz, Yitzhak, 217 marriage, 274–75, 280–81, 293, 294, 328, 333, 335 Masada, 6 MasterChef, 153 Matlon, Shlomo, 224 May 2021 outbreak of violence, 156, 189–90, 193, 199 Megiddo, 199 Meidan, David, 313–14 Meir, Dafna, 137 Meir, Golda, 67 Meir, Nir, 106–8, 112 Meiri, Lavi, 63–65, 97 Memorial Day, 62, 156, 168, 217, 238, 254, 255, 346 Mendelsohn, Amitai, 291 Mendelsohn-Lessel, Adam, 280 Mengistu, Avera, 330–31, 338–39 Meprolight, 113 Meretz, 66, 74, 145, 185 Mergui, Jonathan, 253 Merkel, Angela, 210 Meshi-Zahav, Yehuda, 235–37 Message for Peace, 319 #MeToo movement, 235 Migdalim, 125 millennials, outpost, 120–54 Miller, Alice, 261 Million Lobby, 294 Million That Changed the Middle East, The (Galili and Bronfman), 282 Mimouna, 64 Ministry of Economy, 311 Mirabilis, 299, 300, 305 Mitzna, Amram, 81 Mitzpe Danny, 146–48 Mitzpe Ramon, 81 Mizrahi Democratic Rainbow, 65–66 Mizrahi Jews, 10, 37, 56, 58, 60–69, 71, 73–78, 80, 81, 83, 85–92, 95, 96, 101, 107, 108, 206, 257, 327, 334 Ars Poetica movement of, 72, 276 musicians, 68–69, 71–73 Netanyahu and, 58, 62, 64, 66, 85 ringworm affair and, 77–78 Yemenite, Mizrahi, and Balkan Children Affair and, 76–77 mobile phones, 218, 232 Mobileye, 299 Modiin Illit, 123, 219 Mohammed bin Rashid Al Maktoum, Sheikh, 315 Morocco, 12, 93, 143, 319 Mossad, 313, 314, 325–26 Mount Hebron Regional Council, 136 Mount Herzl, 18, 86, 345 Mount Meron disaster, 222–26, 229 Mount of Olives, 86, 323 Moyne, Walter Guinness, Lord, 38 Muallem, Uri, 329 murders, 186–90 music, 68–73, 341 Muslims, 24, 40, 54, 83, 156, 158, 160, 173, 174, 177, 179, 181, 185, 192, 195, 197, 242, 274, 304, 317 Sunni, 298–99 mystics, 91 N Nablus, 141 Nachman, Ron, 283 Nachmias, Yafa, 33–35, 39 Nachmias, Yosef “Yoske,” 29–35, 37–40, 83 Nahal, 7, 8, 10, 109, 269 Nahalat Yitzhak Cemetery, 30, 35 Nahal Oz, 84, 111 Nakba, 18, 158, 160, 163, 168, 175, 194–96 Nasraldeen, Lutfi, 180 Nasraldeen, Shadi, 180 National Center for the Development of Holy Sites, 222 National Water Carrier, 9 Nation State Law, 41, 178–80, 198 Natour-Hafi, Muhammad, 167 Natour-Hafi, Shirin, 166–69 Nazareth, 184, 312 Nazis, 36, 38, 43, 101, 102, 239 Nuremberg Laws of, 36, 274 Nazlah, 102 Nechushtan, Taly, 318, 320 Negev, 9, 25, 27, 50, 67, 73, 80, 157, 160, 191, 240, 308, 309, 311 Abu Krinat in, 309–12 Tamar Center in, 311–12 Nehama, Avraham, 34 Neias, 209 Netafim, 9, 111 Netanya, 25 Netanyahu, Benjamin “Bibi,” 3, 4, 12–14, 18, 24, 27, 30, 41, 61, 66, 80, 82, 88, 90–94, 96, 110, 128, 143, 146, 183, 186, 224, 256, 267, 283, 284, 293, 296, 305, 321, 346 Altalena and, 35 Arab community and, 171–72, 178, 179, 185 Azaria family and, 258 corruption allegations against, 13, 92, 93 Ethiopian community and, 331, 342, 343 Gantz and, 263, 266 Gouri eulogized by, 58–59 Haredi and, 87, 201–2, 206–7, 214, 226–28 IDF and, 240 Liberman and, 283–86 lifestyle of, 13, 26, 39 military acquisitions and, 306 Mizrahi base of, 58, 62, 64, 66, 85 protests against, 3, 27–28, 144 Russians and, 277, 290 settlements and, 124, 129, 144, 147–49 Shaar Hagai and, 51 Shmueli family and, 268 Netanyahu, Sara, 13, 26, 39 Netanyahu, Yair, 14, 28, 66, 171 Netivot, 91–93 Nevsu, 341 New Year’s Eve, 277–79 Nir David, 61–66, 83, 85, 95–97, 101, 107, 108 Nizri, Tamar, 153 Nizri, Yohayada, 153 Nnadi, Sunny, 291 Noble Sanctuary (Temple Mount), 54, 195, 323 Novy God, 277–79, 289 Nsasra, Ibrahim, 311 nuclear facilities and weapons, 8, 184, 247, 346 in Iran, 12, 16, 189, 246, 298 Nudel, Ida, 294 Nuremberg Laws, 36, 274 O Obama, Barack, 12 October 2000 riots, 175, 181 Odeh, Ayman, 179, 181–85, 188 Odessa, 279 Od Yosef Hai, 139 Ofer, Tovah, 52–53 Ofra, 150, 152–54 Ohana, Tal, 81 Ohayon, Rachel, 221 oil, 314, 317 O.K.

pages: 295 words: 84,843

There's a War Going on but No One Can See It
by Huib Modderkolk
Published 1 Sep 2021

What would enable them to do so? The Five Eyes weren’t the only ones wrestling with this problem. Other agencies were encountering similar obstacles. Dutch sources suspect Israel dealt with it by mobilising a secret arsenal of sorts. They’d noticed that from the 1990s onwards a remarkably large number of former Israeli Unit 8200 intelligence personnel were starting up high-tech companies to supply surveillance software. Were they simply capitalising on their acquired know-how or carving out the perfect position from which to spy? Many of these companies were based in other countries, since not everyone is keen to do business with Israeli firms.

But submarine deployment was also time-consuming and expensive, and hence an ongoing bone of contention among senior Dutch defence officials. Even a ‘minor’ spy mission to Iran could easily be six months in the making, including the trip of several weeks. By the summer of 2011, more and more communication was digital. And, unlike the MIVD, other agencies that once did radio interception – like the NSA, GCHQ and Israel’s Unit 8200 – had all switched to digital techniques. In the month that the navy’s Pieter Bindt became the MIVD’s new director, its staff newsletter was peppered with warnings about the new digital threats: ‘Never Underestimate a Cyberspy!’ And about social media: ‘Did you know that when you link your “smartphone” to your account on a social networking site, like Facebook, it shows your exact location from moment to moment?’

pages: 317 words: 98,745

Black Code: Inside the Battle for Cyberspace
by Ronald J. Deibert
Published 13 May 2013

As one might expect, given its cloistered character, the political economy of this cyber exploit, data mining, and surveillance industry is woven through with former staffers of the very agencies it serves – thousands of replicas of former NSA director Kenneth Minihan. For example, the Israeli intelligence services elite Unit 8200, responsible for that country’s advanced electronic warfare capabilities, has spawned numerous alumni who have gone on to create leading-edge companies in the cyber exploit and surveillance business. Many of them, like Gil Shwed, the CEO of Check Point Software Technologies, have become billionaires.

Capitalizing on the cyber security boon, Check Point’s shares have risen more than 70 percent over the past two years. “It’s almost impossible to find a technology company in Israel without people from 8200, and in many cases the entrepreneur, the manager, or the person who had an idea for the project will be from 8200,” says Yair Cohen, a former brigadier general who once commanded Unit 8200. In the United States, meanwhile, the NSA partners with “cleared” universities to train students in cyber operations for intelligence, military, and law enforcement jobs. Though run at the universities, the programs are secret to all but a select group of faculty and students who pass the necessary national security clearances.

pages: 337 words: 100,541

How Long Will Israel Survive Threat Wthn
by Gregg Carlstrom
Published 14 Oct 2017

He wanted to limit the benefit to Israelis who had served in the army, or the officially sanctioned “national service” program, which offers a civilian alternative to military service. Some employers use army service as a criterion for hiring, which effectively discriminates against Christian and Muslim applicants. And the army can provide useful skills: many of Israel’s high-tech entrepreneurs, for example, are veterans of Unit 8200, an elite branch of the intelligence services. (It cocreated the Stuxnet virus that wreaked havoc on Iran’s nuclear facilities, causing centrifuges to spin out of control.) Yet these benefits have not accrued to the Arab communities that send their sons into the army. The Druze have a higher unemployment rate than Jews or Christians, and their villages have historically been underfunded.

Peter: 15 Levanon, Elyakim: 36 Levy, Gideon: 49; hara’im l’tayyis, 50–1 Lieberman, Avigdor: xv, xvii–xviii, 115–16, 118, 156, 217; background of, 177; Israeli Defence Minister, xiii, 168, 178; Israeli Foreign Minister, 58, 73, 106, 113 Likud Party: xv–xvi, xvii–xviii, 11, 27, 29, 32, 51, 60, 103, 108, 185, 211, 218, 229; Central Committee of, 58; electoral campaign of (2009), 107–8; electoral campaign of (2015), 119–20, 234; electoral performance of (1981), 125; electoral victory of (1977), 17, 43, 124, 201; electoral victory of (1996), 121; members of, 32–3, 87, 98, 106, 117, 170, 175–6, 180, 189, 228, 232; supporters of, 112, 125 Lipkin-Shahak, Amnon: 159–60; background of, 158–9; meeting with Yasser Arafat (1994), 159 Lithuania: 28 Litzman, Ya’akov: Israeli Health Minister, 137 Livni, Tzipi: 7–8, 105, 119, 121–2, 187, 219; firing of (2014), 90–1; opposition to, 113 Luntz, Frank: 130 Ma’ale Adumim: 234 Ma’ale Shomron: 118 Ma’arachot: 168 Macau Daily Times: 177 Macro Center for Political Economics: reports of, 235 Madrid Conference (1991): 152 Makor Rishon: purchased by Sheldon Adelson (2015), 176 Malaysia: 231 Mali, Eliyahu: 196; rabbi of Shirat Moshe, 195 mamlachtiyut: concept of, 18 Mandatory Palestine (1920–48): demolition of homes in, 70; territory of, 16 Mandelblit, Avichai: Israeli Attorney General, 184 Mansour, Bahij: 89 Maoz, Ze’ev: 160 Mapai: 185; members of, 200 Maronites: 20–1 Maroun, Saint: 20 Marzel, Baruch: 65, 170 Matzliach, Rima: 104 May, Theresa: 232 McCain, John: 140–1; Israeli public support for, 141 Meir, Golda: 10, 77, 132, 135 Melman, Yossi: 38 Meretz: 100–1, 104, 109, 221–2; electoral performance of (2015), 120; members of, 196; supporters of, 125 Merkel, Angela: 236 Meron, Theodor: 15–16 Mesha’al, Khaled: 59; attempted assassination of (1997), 163 Microsoft Corporation: 138 Migron: demolition of (2012), 226 Mimran, Arnaud: alleged role in carbon-trading fraud, 182; funding of Benjamin Netanyahu reelection campaign (2016), 182 Mishpacha: editorial staff of, 191 Mitchell, George: 152 Mitchell Report: findings of, 152 mizrahim: 99, 112; insulting of, 122 Mohammed, Prophet: 67 Mola, Shula: Chair of Israeli Association for Ethiopian Jews, 76 Molcho, Yitzhak: 31 Moldova: Kishinev, 38 Monte Carlo: 182 Mordechai, Yitzhak: 160 Mossad: 4, 16, 158, 163; personnel of, 109, 144, 161, 163, 167–9 Mozes, Noni: 103 Mu’awiyah: 21 Mubarak, Hosni: 28 Mughniyeh, Imad: assassination of, 161 Muslim Brotherhood: 18, 84, 141–2; electoral victory of (2012), 89 Nachman, Yossi: 21 Naddaf, Father Gabriel: 23–4 Nafar, Tamer: co-founder of DAM, 115, 174 Nagosa, Avraham: xv–xvi Nahal Oz (kibbutz): 55, 59 Naim, Bassem: xviii Naor, Miriam: 138, 155; Israeli Chief Justice, 230 Narkis, Naor: 81 National Front (France): 210 National Public Radio (NPR): 130 National Religious Party: electoral performance of (2015), 117; members of, 117 nationalism: xv, 8, 45, 123, 146, 186, 217–18, 236; Arab, 29, 213; Jewish, 62, 66; ultranationalism, 41; white, 141 Navon, Yitzhak: presence at Ben-Gurion-Karelitz Meeting (1952), 94; President of Israel, 26; visit to Cairo (1980), 26 neoliberalism: 213, 215 Netanyahu, Benjamin: xiii, xv–xvi, 4–5, 14, 17, 23, 27, 36–7, 42, 48, 57, 59–60, 64, 79, 84, 86, 88–9, 95, 100, 103, 106–7, 110–12, 116–17, 119, 135–8, 146, 150, 155, 159–61, 164–7, 177–80, 189–90, 204–5, 219–21, 227, 231–3; address to Jewish Federations of North America (2015), 164; administration of, 6, 25, 27, 99–100, 168–9, 178–9, 185; allegations of personal corruption, 108, 182; background of, 218; collapse of administration (1998), 160; electoral campaign of (2015), 112–13, 119–21; electoral victory of (1996), 121–2; family of, 27, 108, 169, 183, 220; meetings with John Kerry and Mahmoud Abbas (2014–15), 31; opposition to, 58; opposition to Reuven Rivlin’s presidential candidacy, 27–8; presence at funeral of Shimon Peres (2016), 198; proposal for nation-state bill (2014), 86–7; speech to Congress (2011), 109, 112, 162; visit to Moscow (2016), 181–2 Netanyahu, Sara: civil lawsuits filed against (2016), 183; family of, 27, 108, 169, 183; ‘Sara Stories’, 183–4 Netanyahu, Yair: family of, 220 New York Times: 5, 28, 100, 134, 186, 230, 234 New Zealand: 231 Newsweek: 130 Nir, Amiram: 44; death of (1988), 45 Nir-Mozes, Judy Shalom: 117 Nirim (kibbutz): 56 non-governmental organizations (NGOs): 76, 181, 186, 221, 229; liberal, 176 Nordau, Max: 91 Norquist, Grover: 143 North Atlantic Treaty Organization (NATO): 140 Obama, Barack: 17, 26, 113, 142–3, 164–5, 203, 232, 236; administration of, 231; foreign policy of, 139, 143, 152; Israeli public support for, 141; Shabbat address of (2015), 10; speech at funeral of Shimon Peres, 197–8, 204 Od Yosef Chai (‘Joseph Still Lives’): 20; shuttering of (2014), 14, 19; students of, 149 Odeh, Ayman: 116; background of, 114–15; members of, 111 Ofra: 200, 225, 229; establishment of (1975), 26–7 Ofran, Hagit: 54 Ohana, Eli: 118 Olmert, Ehud: 17, 218–19, 229; imprisonment of, 183; Mayor of Jerusalem, 159 Operation Brother’s Keeper (2014): 46 Operation Cast Lead (2008–9): 2, 46, 50, 107 Operation Protective Edge (2014): 2, 5, 44–6, 48–9, 52–3, 56, 60, 87, 176, 185; casualties of, 46–7, 61; political impact of, 61–2; use of ‘Hannibal doctrine’, 49 Ophir Awards: 174 Or, Theodor: head of Or Commission, 73 Or Commission: findings of, 73–5; members of, 73, 75 Oren, Michael: 110, 135–6, 186, 231 Organization for Economic Cooperation and Development (OECD): 4, 107, 184 Oslo Accords: 6, 32, 82, 152, 159, 177, 199; implementation of, 44; signing of (1993), 117 Ottoman Empire: 21, 70; fall of (1923), 216–17; Jewish population of, 191–2 Oz, Amos: 176, 199 Pakada, Damas: attack on (2014), 75–6; background of, 76 Palestine: xviii, 5, 152–3, 191, 213, 232; Douma, 20, 145, 149; Ramallah, 2, 33, 141, 153, 200, 204, 225; Urif, 18 Palestine Center for Policy and Survey Research: 59 Palestine Riots (1929): 66 Palestine Liberation Organization (PLO): 30, 43, 151, 159, 173; members of, 167 Palestinian Authority (PA): 14, 21, 57–8, 64–5, 116, 206 Palmor, Yigal: 81 Pardo, Tamir: 167; retirement of, 169 Peace Now: protests organised by, 44–5, 53, 201 Peres, Shimon: 23, 26, 30–1, 93, 199, 202–5, 218; authorization of Ofra (1975), 26–7; awarded Medal of Freedom (2012), 26, 203; background of, 199–200; death of (2016), 197–8, 200; economic stabilization plan (1985), 202; electoral defeat of (1996), 121; funeral of (2016), 197–8, 204; Israeli Defence Minister, 26, 200–1; power-sharing agreement with Yitzhak Shamir (1984), 198, 202; role in furthering of Camp David Accords (1978), 202; role in negotiating Oslo Accords, 199; Tomorrow Is Now (1978), 201 Peretz, Amir: 113 Persian Empire: xi Persico, Oren: 177, 185 Pew Research Center: 6, 10–11, 133; polling efforts of, 146 Pfeffer, Anshel: 177, 221 Piron, Shai: Israeli Education Minister, 91 Plesner, Yohanan: President of IDI, 125 Poland: 9–10; Katowice (Kattowitz), 92 Porat, Hanan: 15 Power, Samantha: US Ambassador to UN, 231 ‘price tag’ attacks: 17, 20, 148; concept of, 14 Putin, Vladimir: 181, 216–17 Al-Qaeda: 107; Jabhat Fatah al-Sham, 25 Qatar: Doha, 48, 59 Qattoush, Jawad: 208 Rabin, Yitzhak: 1, 44, 158–9, 198, 218; administration of, 200; assassination of (1995), xiv, 18, 35, 38, 159–60, 221; Israeli Defense Minister, 152; no-confidence vote against (1976), 190; resignation of (1977), 184; role in ethnic cleansing of Lydda/Lod, 167; signing of Oslo Accords (1993), 117 Rabinovich, Beni: 190–1 al-Rai, Bishara: 22–3 Ravid, Barak: 110 Regev, Mark: 70 Regev, Miri: 170, 180; background of, 171–2; Israeli Culture Minister, 171, 176; restriction of funding for Israeli cultural institutions unwilling to perform in underdeveloped regions, 172, 221 Reider, Dimi: 221 Remley, Rennick: 100 Republican Party (USA): 6, 210; ideology of, 125; support for sanctions, 142; supporters of, 140–1 Reshet: 179 Revisionism: 9 Rivlin, Reuven: xv, 27, 29–31, 38–9, 78–9, 87, 98, 125–7, 146, 181, 204; election to Knesset (1988), 28; family of, 28–9; opposition to ‘Boycott Law’ (2011), 29 Rivlin, Ya’akov: 191 Rivlin, Yosef: family of, 28–9 Romney, Mitt: 141; Israeli public support for, 141 Rosenblum, Herzl: 44 Rosner, Shmuel: 230 Russian Federation: 216; Kremlin, 181; Moscow, 181–2 Sa’ad, Omar: 88 Sa’ar, Gideon: 32–3 Sabbah, Michel: 24 Saban Forum: 9 Sabra/Shatila Massacres (1982): 83, 132; political impact of, 201–2 Salafism: 18 Samri, Luba: 73 Sarid, Yossi: 173 Sarna, Yigal: 183 Saudi Arabia: 135 Sayeret Matkal: background of, 117 Schneider, Tal: 57, 114 Sea of Galilee: 148 Second Intifada (2000–5): 14, 33, 70, 151; casualties of, 152–3; political impact of, 52; riots prior to (2000), 73 Second World War (1939–45): 92, 125; Holocaust, xvii, 10, 28–9, 82, 146, 212 Segal, Amit: 106, 121, 179–80 Seidemann, Daniel: 72 Seif, Zidan: death of (2014), 87 Senegal: 231–2 settler movement/settlements: 19–20, 33, 104–5, 142, 172, 226–7, 233–4; boycotting of, 132; dismantling of, 118, 148, 226; establishment of, 15–16; lobbying efforts, 118; violence and arson committed by inhabitants, 13–15, 42 Shaer, Gilad: abduction of (2014), 33–4, 117 Shaffir, Stav: 8, 84 Shaked, Ayelet: 8, 36–7, 135, 234; Israeli Justice Minister, 171, 175, 212, 226 Shalem Center: funding of, 187 Shalev, Chemi: 51, 203 Shalit, Gilad: capture of (2006), 46, 56, 61, 188 al-Shalloudi, Abdel Rahman: family of, 69; role in Ammunition Hill Attack (2014), 64, 69, 72–3 Shamir, Yitzhak: power-sharing agreement with Shimon Peres (1984), 198, 202 Shani, General Udi: 70 Shani Commission: 70; findings of, 71 Shapira, Yitzhak: Torat HaMelech (‘The King’s Torah’), 14 Shapira, Yosef: 184 Shapiro, Dan: US Ambassador to Israel, 138, 232 al-Sharif, Abdel Fattah: shooting conducted by (2015), xii Sharon, Ariel: 17, 231; dismantling of settlements in Gaza (2005), 148, 218; Israeli Defence Minister, 44, 167; visit to Temple Mount (2000), 73 Shas: Council of Sages, 130; ideology of, 114; members of, 65, 114, 130 Shavit, Ari: 113 Sheinman, Hanoch: 52 Shikaki, Dr Khalil: Director of Palestine Center for Policy and Survey Research, 59 Shimron, David: 182 Shin Bet: xiii, 19, 149, 158, 208, 230; personnel of, 4, 90, 148, 161, 167, 169 Shinui: members of, 220 Shirat Moshe: founding of (2008), 195 Shkolnik, Melania: 113 Shlissel, Yishai: Attack on Jerusalem Gay Pride Parade (2016), 98 shmita: concept of, 191–2 Shmueli, Eitan: 196 Shoval, Zalman: 142–3 Silwan: 41–2, 67, 69, 72; purchasing of homes in, 70–1 Simha, David: Head of Israeli-Palestinian Chamber of Commerce, 135 al-Sisi, Abdel Fattah: 156–7, 231 Six-Day War (1967): 10, 12, 43, 132; political impact of, 131–2, 144; territory occupied during, 15, 66, 201, 231 Smotrich, Bezalel: 157 Social Justice Protests (2011): 109; development of tent city during, 82–4 socialism: 92, 184, 202, 215 Soviet Union (USSR): 79, 177, 179; collapse of (1991), 216–17 Sprung, Brachie: 69 StandWithUs: advertising campaign in New York Times (2014), 99–100 Steinitz, Yuval: Israeli Intelligence Minister, 57 Stern, Yedidia: 86 Streisand, Barbara: 26 Stuxnet (computer virus): use of, 25 Sudan: asylum seekers from, 171 Suleiman, General Muhammad: assassination of, 161 Supreme Court: xiv, 37, 90, 117, 168, 218, 226–7; ruling on military seizure of land for civilian settlements (1979), 226; upholding of legality of admission committees (2014), 74 Sweden: Stockholm, 221 Sweid, Hana: 115 Switzerland: 101, 123 Syria: 24, 68; borders of, 107; Civil War (2011–), 24–5, 212; Damascus, 21, 161; Raqqa, 68 Ta’al: members of, 116 Taub Center: 84 Taybeh: 225 Tebeka: personnel of, 76 tefillin: 64 Temple Institute: aims of, 64 Temple Mount: xiv–xv, 66–7, 73, 150; campaigns for Jewish access to, 64; police raiding of compound (2015), 150 Thailand: 55 Third Reich (1933–45): xvii, 54, 164; Schutzstaffel (SS), 30 ThyssenKrupp: 182 Tibi, Ahmad: 29, 42, 77; head of Ta’al, 116 Tikvah Fund: Mosaic, 187 Times, The: 1 Times of Israel: editorial staff of, 212 Toner, Mark: 124 Tragerman, Daniel: 56 Trajtenberg, Manuel: 83 Transparency International: 183; branches of, 184 Trump, Donald: 6, 171, 231, 236; administration of, 196; electoral victory of (2016), 188–9; family of, 142; US Presidential Election Campaign of (2016), 140–1, 210, 212 Trump, Ivanka: 143 Tubi, Ezri: 15 Tunisia: Tunis, xviii, 159 Turkey: 216; attempted military coup (2016), 210; Istanbul Suicide Bombing Attack (2016), 210; Kurdish population of, 218; postmodern coup (1997), 217 Twitter: 190 Tzabari, Yossi: 174 Ukraine: 37; Russian annexation of Crimea (2015), 80 ultra-Orthodox Jews (haredim): xv, 4, 11, 32, 47, 82, 94–5, 98, 101, 106, 126, 129, 136–7, 141, 190–2, 194–7, 213–14, 222, 235; exemption from military service, 91–3, 219; lack of conventional education, 95–6; political representation of, 65, 111, 114; territory inhabited by, 63 Union for Reform Judaism (Union of American Hebrew Congregations): members of, 131 Unit 8200: 25 United Kingdom (UK): 43, 80, 200; Brexit Referendum (2016), 209–13; Jewish diaspora in, 79; London, 1, 10, 22, 70, 184, 187; Northern Ireland, 110 United Kingdom Independence Party (UKIP): 209 United Nations (UN): 14, 17–18, 67, 219, 232; Convention against Corruption, 31; General Assembly, 150, 231; Geneva Conventions, 19, 71; Security Council, 139, 230–2 United States of America (USA): 5–6, 9, 39, 67, 129, 137, 144, 167, 186, 206, 210, 231; 9/11 Attacks, xiv; Congress, 109, 162, 164–5, 226; Jewish diaspora in, 5, 79–80, 131–3, 140–2, 163–4, 212; Los Angeles, CA, 80; Miami, FL, 80; New York, 10, 41, 119, 133, 187, 192, 200, 214, 216; Pentagon, 143; Pulse Nightclub Shooting (2016), 210; Securities and Exchange Commission (SEC), 182; State Department, 108, 117, 124, 139, 227; Washington DC, 2, 9–10, 17, 111, 133, 135, 141, 143, 184, 197 United Torah Judaism: 111, 137, 190 Venezuela: 231 Veolia: 40 Vorspan, Albert: 131 Walla: 181 Wasserstein, Bernard: 66 Waxman, Dov: Trouble in the Tribe (2016), 132 al-Wazir, Khalil: death of (1988), xviii Weinstein, Esti: suicide of, 96–8 Weinstein, Yehuda: 171; Israeli Attorney General, 184 Weiss, Dana: 113 Weizmann, Chaim: 7, 91; Chairman of Zionist Commission for Palestine, 66 West Bank: 1, 3, 18, 23, 37, 75, 116, 118, 147–8, 152–3, 169, 201, 225, 229; Amona, 170, 225–30, 234; Area C, 3–4, 32, 73; Beit El, 141; Bil’in, 167; Israeli Occupation of, 3, 6, 15–17, 32–3, 151; Qalandia, 167; settlements in, 142, 172; standard of living conditions in, 52 Western Wall: 65–6, 129, 143, 214, 222; ultra-Orthodox supervision of, 136 WhatsApp: xvi, 230 Wolfson, Noah: 206 World Jewish Congress: personnel of, 79 World Zionist Organization: 7, 215 Wye River Memorandum: 160 Ya’akov, Doron: 83–4 Ya’alon, Moshe: xvii–xviii, 166, 182; Israeli Defence Minister, xvi, 3, 19, 71, 171, 185; relations with settler movement, 19–20; resignation of (1997), 178, 217 Yachad: formation of, 114; ideology of, 17; supporters of, 17 Yachimovich, Shelly: 8 Yadlin, Amos: 57, 166 Yated Ne’eman: editorial staff of, 190–1 Yatom, Danny: head of Mossad, 163 Yediot Aharonot: 20, 103–4, 135, 159, 177, 179, 183, 186; anti-BDS summit sponsored by, 133–4; editorial staff of, 44; founding of (1939), 185 Yesh Atid: 178, 222; members of, 32, 220; supporters of, 125 Yesh Din: appeal filed against development of new Amona site, 229 Yesh Gvul: 44 Yesha Council: members of, 19, 111 yeshiva: 14–15, 19, 33, 94, 98, 195 Yifrach, Eyal: abduction of (2014), 33–4, 117 Yishai, Eli: 114 Yisrael Beiteinu: 178, 222; members of, 113; supporters of, 125 Yitzhar (settlement): attacks carried out by, 14–15, 18–20; relationship with Israeli military, 18; residents of, 14, 17 Yom Kippur War (1973): xiv, 43, 51 Yosef, David: member of Shas Party’s Council of Sages, 130 Yosef, Ovadia: 114 Yosef, Yitzhak: xvi YouTube: xii, 56, 130 Zaher, Sawsan: 25–6 ZAKA: personnel of, 63–4 Zalzberg, Ofer: 197 Zamir, Ifat: 184 Zertal, Idith: Lords of the Land, 16 Zionism: xv, 8, 24, 45, 58–9, 65–6, 77, 91, 103, 110, 115, 123–6, 144, 167, 192, 216, 235; anti-Zionism, 92; definitions of, 9; liberal, 5–6, 10–12, 203; political, 7, 66; religious, 185; secular, 9, 213–14 Zionist Camp: 110, 112–13, 116, 119; electoral performance of (2015), 119–21, 234; members of, 104, 166 Zionist Commission for Palestine: members of, 66 Zionist Organization of America: 142 Zionist Union: 156; electoral performance of (1981), 124; internal conflicts within, 157 Zivan, Yair: 220 Zoabi, Hanin: 117; participation in Turkish aid flotilla to Gaza, 29; suspension from Knesset (2014), 117 el-Zoubi, Abd el-Aziz: 24 Zuckerberg, Mark: 203

pages: 409 words: 112,055

The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
by Richard A. Clarke and Robert K. Knake
Published 15 Jul 2019

In any event, one possibility is that, using a backdoor in Kaspersky Anti-Virus on Harold Martin’s home computer, the Russian GRU found a ton of NSA attack tools, perhaps including the EternalBlue exploit. Now, how would anybody know that the Russian GRU did that? Well, it just could be that Israel’s military intelligence Unit 8200 was sitting inside Kaspersky’s network watching it all go down. The Israelis would have told the NSA pretty quickly if that happened. It is also possible that the Russian GRU hacked a secret server outside of the NSA that was used to store attack tools, a so-called staging server, in the autumn of 2013.

walking out of NSA facilities: Josh Gerstein, “Judge Won’t Release Ex-NSA Contractor Accused of Hoarding Classified Data,” Politico, October 21, 2016, www.politico.com/story/2016/10/hal-harold-martin-nsa-classified-data-230168. Kaspersky denies that this is what happened: Shane Harris and Gordon Lubold, “Russian Hackers Stole NSA Data on U.S. Cyber Defense,” Wall Street Journal, October 5, 2017, www.wsj.com/articles/russian-hackers-stole-nsa-data-on-u-s-cyber-defense-1507222108. Israel’s military intelligence Unit 8200: Alex Hern and Peter Beaumont, “Israel hack uncovered Russian spies’ use of Kaspersky in 2015, report says,” Guardian, October 11, 2017, www.theguardian.com/technology/2017/oct/11/israel-hack-uncovered-russian-spies-use-kaspersky-lab-2015-report-us-software-federal-government. no one in the U.S. government: Brad Smith, “The Need for Urgent Collective Action to Keep People Safe Online: Lessons from Last Week’s Cyberattack,” Microsoft Blog, May 14, 2017, blogs.microsoft.com/on-the-issues/2017/05/14/need-urgent-collective-action-keep-people-safe-online-lessons-last-weeks-cyberattack.

pages: 427 words: 127,496

Mossad: The Greatest Missions of the Israeli Secret Service
by Michael Bar-Zohar and Nissim Mishal
Published 1 Jan 2010

General Eli Zeira, the handsome, confident chief of Aman, was convinced that there was no danger of war, in spite of the worrying reports by intelligence sources. He believed that the huge concentrations of Egyptian soldiers and armor on the African shore of the Suez Canal were nothing but a part of a large army maneuver. Zeira also admitted, in a conversation with Zamir, that he had “no explanation” as to why a report by Unit 848 (later renamed Unit 8200, 848 was the listening and monitoring installation of the IDF) stated that the families of the Russian military advisers in Syria and Egypt were urgently leaving those countries—a surefire indication of imminent war. The chief of Aman and most of the defense community leaders were firm believers in “conception”—a theory that Egypt would not attack Israel but under two conditions: first, that it would receive from the Soviet Union fighter jets able to face the Israeli fighter aircraft, as well as bombers and missiles that would reach Israel’s population centers; and second, that it would assure the participation of the other Arab countries in the onslaught.

A video that Israel shared with the United States showed that the cores of both reactors were identical, including the way in which the uranium rods were placed inside the structure. Other videos even showed the faces of North Korean engineers working inside the reactor. Additionally, the Aman intercept department, Unit 8200, produced full transcripts of hectic exchanges between Damascus and Pyongyang. All this evidence was relayed to Washington, but the United States still demanded irrefutable proof that the facility was indeed a nuclear reactor and that radioactive materials were actually in place. Israel felt it had no choice but to obtain this information as well.

pages: 598 words: 134,339

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
by Bruce Schneier
Published 2 Mar 2015

Even when the NSA touts its counterterrorism successes, most of them are foreign threats against foreign countries, and have nothing to do with the US. It should come as no surprise that the US shares intelligence data with Israel. Normally, identities of Americans are removed before this data is shared with another country to protect our privacy, but Israel seems to be an exception. The NSA gives Israel’s secretive Unit 8200 “raw SIGINT”—that’s signals intelligence. Even historical enemies are sharing intelligence with the US, if only on a limited basis. After 9/11, Russia rebranded the Chechen separatists as terrorists, and persuaded the US to help by sharing information. In 2011, Russia warned the US about Boston Marathon bomber Tamerlan Tsarnaev.

Edgar, attempted intimidation of King by, 98, 102–3 hop searches, 37–38 HTTPS Everywhere, 215, 216 Huawei, 74, 86, 182 Human Rights Watch, 96, 178 IBM, 104, 122 iCloud, 58 ICREACH, 67 identification, anonymity and, 131–33 identity theft, 116–19 iMacs, 58 imperfection, systemic, resilience and, 163–64 IMSI-catchers, 68, 165–66 independence, oversight and, 162–63, 169, 177–78 India, 76 individuals, data rights of, 192–93, 200–203, 211, 232 data storage by, 18–19 see also mass surveillance, individual defenses against inferences, from data mining, 34–35, 258, 259 and correlation of data sets, 40–42 error rates in, 34, 54, 136–37, 269 information fiduciaries, 204–5 information middlemen: Internet’s empowering of, 57–58 monopolistic nature of, 57 Information Technology and Innovation Foundation, 121–22 InfoUSA, 53 Initiate Systems, 41 Instagram, 58 intelligence community, US, 67 budget of, 64–65, 80 fear and, 228 international partnerships of, 76–77 private contractors in, 80, 228 revolving door in, 80 see also specific agencies Internal Revenue Service, US (IRS), 137, 159 International Association of Privacy Professionals, 124 International Principles on the Application of Human Rights to Communications Surveillance, 167, 168–69 International Telecommunications Union, 106, 187 Internet: anonymity on, 43–44, 131–33 benefits of, 8 commons as lacking on, 188–89 cyberattacks on, see cyberwarfare deliberate insecurity of, 7, 146–50, 182 early history of, 119 fee-based vs. ad-based business model of, 50, 56, 206 freedom of, 107, 188 government censorship and control of, 94–95, 106–7, 187–88, 237 identification and, 131–33 information middlemen and, see information middlemen international nature of, 6–7, 187–88, 209, 220–21 laws and, 220–21 as media source, 15 physical wiring of, 64 privacy and, 203–4, 230–31 traditional corporate middlemen eliminated by, 56–57 trust and, 181–82 Internet companies, transparency reports of, 207–8 Internet Movie Database, 43 Internet of Things, 15–17 Internet searches, NSA collection of data on, 22 Internet surveillance, 47–51 advertising and, see advertising, personalized cable companies and, 48–49 cookies and, 47–48, 49 global, 69–71 NSA and, 62, 64–65, 78, 122, 149–50, 188, 207 ubiquity of, 32 see also mass surveillance, corporate iPads, 58 iPhones, 31, 42, 58 Iran: government surveillance in, 71–72 Stuxnet cyberattack on, 75, 132, 146, 150 Iraq War, 65 IRC, 119 Israel: mass surveillance by, 182 Stuxnet cyberattack by, 75, 132, 146, 150 US intelligence data shared with, 77 Israeli assassination team, identification of, 43 ISS (Intelligence Support Systems) World, 81 iTunes store, 57 Jawbone, 16 Jay-Z, 48 Joint Terrorism Task Forces, 69 journalists, government surveillance and, 96 JPMorgan Chase, 116 judiciary, surveillance and, 168, 170, 179–80 justice, as core American value, 230 Justice Department, US, 184, 186 Kerry, John, 101 keyboard loggers, 25 key escrow, 120–21 keyword searches, 28, 261 Kindle, 28, 59 King, Martin Luther, Jr., 237 Hoover’s attempted intimidation of, 98, 102–3 Kinsey, Alfred, database of, 44 Klein, Mark, 250, 288 Kunstler, James, 206 Kurds, 76 Lanier, Jaron, 201 Lavabit, 83–84, 209 law enforcement, state and local: abuse of power by, 135, 160 IMSI-catchers used by, 68 location data and, 2, 243 militarization of, 184 predictive algorithms used by, 98–99, 100, 137, 159 racism in, 184 secrecy of, 100, 160 transparency and, 170 lawyers, government surveillance and, 96 legal system: as based on human judgment, 98–99 government surveillance and, 168, 169 secrecy and, 100 Lenddo, 111, 113 Level 3 Communications, 85 Levison, Ladar, 84 liberty: commons and, 189 as core American value, 230 social norms and, 227 liberty, government surveillance and, 6, 91–107, 184 abuses of power in, 101–5, 160, 234–35 anonymity and, 133 censorship and, 94–95, 106–7, 187–88 and changing definition of “wrong,” 92–93, 97–98 discrimination and, 103–4 fear and, 4, 7, 95–97, 135, 156–57, 171, 182–83, 222, 226, 227–30 Internet freedom and, 106–7, 188 political discourse and, 97–99 secrecy and, 99–101 security and, 135, 157–59, 361–62 ubiquitous surveillance and, 92, 97 Library of Congress, 199 Libya, 81 license plate scanners, 26–27, 40 storage of data from, 36 lifelogging, 16 Lincoln, Abraham, 229 Little Brother (Doctorow), 217 location data, 1–3, 28, 39, 62, 243, 339 advertising and, 39–40 de-anonymizing with, 44 embedded in digital photos, 14–15, 42–43 selling of, 2 Locke, John, 210 Los Angeles Police Department, 160 LOVEINT, 102, 177 Lower Merion School District, 104 LulzSec hacker movement, 42 MAC addresses, 29 MacKinnon, Rachel, 210, 212 Madrid Privacy Declaration (2009), 211–12 Magna Carta, information age version of, 210–12 manipulation, surveillance-based, 113–16 Manning, Chelsea, 101 marijuana use, 97 MARINA, 36 Mask, The, 72 Massachusetts Group Insurance Commission, 263 mass surveillance: algorithmic-based, 129–31, 159, 196 as automated process, 5, 129–31 dangers of, 4–5, 6 economic harms from, 6–7, 121–22, 151 false positives in, 137, 138, 140, 323–24 fatalism and, 224–25 lack of consent in, 5, 20, 51 metadata in, 20–23 minimum necessary, 158–59, 176, 211 moratorium urged on new technologies of, 211 noticing, 223 security harmed by, 7, 146–50 social norms and, 226–38 society’s bargains with, 4, 8–9, 47, 49–51, 58–59, 60–61, 158, 226, 235–38 speaking out about, 223–24 targeted surveillance vs., 5, 26, 139–40, 174, 179–80, 184, 186 transparency and, 159–61, 169, 170–71, 176 ubiquity of, 5, 26–28, 32, 40, 53, 92, 97, 224, 233 urgency of fight against, 233–35 see also data collection; data mining mass surveillance, corporate, 46–61, 86–87 advertising and, see advertising, personalized business competitiveness and, 119–24 cost of, to US businesses, 123–24 customers as products in, 53, 58 customer service and, 47 data brokers and, see data brokers discrimination and, 109–13 error rates in, 54 feudal nature of, 58–59, 61, 210–12 free services and convenience exchanged for, 4, 49–51, 58–59, 60–61, 226, 235–36 growth of, 23–24 harms from, 108–18 lobbying and, 233 manipulation and, 113–16 manipulation through, 6 market research and, 47 privacy breaches and, 116–18, 142, 192, 193–95 secrecy and, 194 see also mass surveillance, public-private partnership in mass surveillance, corporate, solutions for, 7, 190–212 accountability and liability in, 192, 193–95, 196–97, 202 data quality assurance and, 181, 192, 194, 202 government regulation in, 192, 196–99, 210 individual participation and, 192 and limits on data collection, 191, 192, 199–200, 202, 206 and limits on data use, 191, 192, 194, 195–97, 206 lobbying and, 209, 222–23 and resistance to government surveillance, 207–10 and respect for data context, 202 rights of individuals and, 192, 200–203, 211 salience and, 203–4 security safeguards and, 192, 193–95, 202, 211 specification of purpose and, 192 transparency and, 192, 194, 196, 202, 204, 207–8 mass surveillance, government, 5–6, 62–77 chilling effects of, 95–97 in China, 70, 86, 140, 209 cloud computing and, 122 corporate nondisclosure agreements and, 100 corporate resistance to, 207–10 cost of, 91 cost of, to US businesses, 121–23 democracy and, 6, 95, 97–99 discrimination and, 4, 6, 93 encryption technology and, 119–23 fear-based justification for, 4, 7, 95–97, 135, 156–57, 171, 182–83, 222, 226, 227–30, 246 fishing expeditions in, 92, 93 in France, 79 fusion centers in, 69, 104 gag orders in, 100, 122 geopolitical conflicts and, 219–20 global, 69–71 growth of, 24–25 hacking in, 71–74 as harmful to US global interests, 151 as ineffective counterterrorism tool, 137–40, 228 international partnerships in, 76–77, 169 lack of trust in US companies resulting from, 122–23, 181–83 liberty and, see liberty, government surveillance and location data used in intimidation and control by, 2 mission creep and, 104–5 oversight and accountability in, 161–63, 169 in Russia, 70, 187, 188, 237 mass surveillance, government ( continued) secrecy of, 99–101, 121, 122 subversion of commercial systems in, 82–87 in UK, 69, 79 US hypocrisy about, 106 see also mass surveillance, public-private partnership in; specific agencies mass surveillance, government, solutions for, 7, 168–89 adequacy and, 168 and breakup of NSA, 186–87 due process and, 168, 184 illegitimate access and, 169, 177 integrity of systems and, 169, 181–82 international cooperation and, 169, 180, 184 judicial authority and, 168, 179–80 legality and, 168, 169 legitimacy and, 168 limitation of military role in, 185–86 lobbying and, 222 “Necessary and Proportionate” principles of, 167, 168–69 necessity and, 168 oversight and, 169, 172–78 proportionality and, 168 separation of espionage from surveillance in, 183–84 targeted surveillance and, 179–80, 184, 186 transparency and, 169, 170–71, 176 trust and, 181–83 user notification and, 168 whistleblowers and, 169, 178–79 mass surveillance, individual defenses against, 7, 213–25 avoidance in, 214 blocking technologies in, 214–17 breaking surveillance technologies, 218–19 distortion in, 217–18 fatalism as enemy of, 224–25 political action and, 213, 222–24, 237–38 mass surveillance, public-private partnership in, 6, 25, 78–87, 207 government subversion of commercial systems in, 82–87 nondisclosure agreements and, 100 privately-made technology in, 81–82, 100 sale of government data in, 79–80 and value neutrality of technology, 82 material witness laws, 92 McCarthyism, 92–93, 229, 234 McConnell, Mike, 80 McNealy, Scott, 4 media: fear and, 229 pre-Internet, 15 medical devices, Internet-enabled, 16 medical research, collection of data and, 8 Medtronic, 200 memory, fallibility of, 128, 320 Merkel, Angela, 151, 160–61, 183, 184 metadata, 216 from cell phones, see cell phone metadata data vs., 17, 23, 35, 251 from Internet searches, 22–23 in mass surveillance, 20–23, 67 from tweets, 23 Michigan, 2, 39 Microsoft, 49, 59–60, 84, 148, 221, 272, 359 customer loyalty to, 58 government demands for data from, 208, 359 increased encryption by, 208 transparency reports of, 207 Mijangos, Luis, 117 military, US: ban on domestic security role of, 185–86 Chinese cyberattacks against, 73 “Don’t Ask Don’t Tell” policy of, 197 drone strikes by, 94 see also Army, US; Cyber Command, US; Defense Department, US MINARET, 175 Minority Report (film), 98 mission creep, 104–5, 163 Mitnick, Kevin, 116 Moglen, Eben, 95, 318 money transfer laws, 35–36 Monsegur, Hector, 42 Mori, Masahiro, 55 MS Office, 60 Multiprogram Research Facility, 144 Muslim Americans, government surveillance of, 103–4 MYSTIC, 36 Napolitano, Janet, 163 Narent, 182 narrative fallacy, 136 Nash equilibrium, 237 Natanz nuclear facility, Iran, 75 National Academies, 344 National Counterterrorism Center, 68 National Health Service, UK, 79 National Institute of Standards and Technology (NIST), proposed takeover of cryptography and computer security programs by, 186–87 National Reconnaissance Office (NRO), 67 National Security Agency, US (NSA): backdoors inserted into software and hardware by, 147–48 Bermuda phone conversations recorded by, 23 “Black Budget” of, 65 cell phone metadata collected by, 20–21, 36, 37, 62, 138, 339 “collect” as defined by, 129, 320 “collect it all” mentality of, 64–65, 138 COMSEC (communications security) mission of, 164–65, 346 congressional oversight of, 172–76 “connect-the-dots” metaphor of, 136, 139 cost to US businesses of surveillance by, 121–22, 151 counterterrorism mission of, 63, 65–66, 184, 222 counterterrorism successes claimed by, 325 cryptanalysis by, 144 cyberattacks by, 149–50 drug smugglers surveilled by, 105 economic espionage by, 73 encryption programs and, 85–86, 120–21 encryption standards deliberately undermined by, 148–49 expanding role of, 24, 165 FISA Amendments Act and, 174–75, 273 foreign eavesdropping (SIGINT) by, 62–63, 76, 77, 122–23, 164–65, 186, 220 Germany surveilled by, 76, 77, 122–23, 151, 160–61, 183, 184 Gmail user data collected by, 62 historical data stored by, 36 history of, 62–63 inadequate internal auditing of, 303 innocent people surveilled by, 66–67 insecure Internet deliberately fostered by, 146–50, 182 international partnerships of, 76–77 Internet surveillance by, 22, 62, 64–65, 78, 86–87, 122–23, 149–50, 188, 207 keyword searches by, 38, 261 legal authority for, 65–66 location data used by, 3, 339 Multiprogram Research Facility of, 144 Muslim Americans surveilled by, 103 parallel construction and, 105, 305 Presidential Policy Directives of, 99–100 PRISM program of, 78, 84–85, 121, 208 proposed breakup of, 186–87 QUANTUM program of, 149–50, 329–30 relationship mapping by, 37–38 remote activation of cell phones by, 30 secrecy of, 99–100, 121, 122 SIGINT Enabling Project of, 147–49 Snowden leaks and, see Snowden, Edward SOMALGET program of, 65 Syria’s Internet infrastructure penetrated by, 74, 150 Tailored Access Operations (TAO) group of, 72, 85, 144, 149, 187 UN communications surveilled by, 102, 183 National Security Agency, US (NSA) ( continued) Unitarian Church lawsuit against, 91 US citizens surveilled by, 64, 66, 175 US global standing undermined by, 151 Utah Data Center of, 18, 36 vulnerabilities stockpiled by, 146–47 National Security Letters (NSLs), 67, 84, 100, 207–8 Naval Criminal Investigative Service, 69 Naval Research Laboratory, US, 158 Nest, 15–16 Netcom, 116 Netflix, 43 Netsweeper, 82 New Digital Age, The (Schmidt and Cohen), 4 newsgroups, 119 New York City Police Department, 103–4 New York State, license plate scanning data stored by, 36 New York Times, Chinese cyberattack on, 73, 132, 142 New Zealand, in international intelligence partnerships, 76 Nigeria, 81 9/11 Commission Report, 139, 176 Nineteen Eighty-Four (Orwell), 59, 225 NinthDecimal, 39–40 NIST, see National Institute of Standards and Technology Nixon, Richard, 230 NOBUS (nobody but us) vulnerabilities, 147, 181 Nokia, 81 nondisclosure agreements, 100 North, Oliver, 127–28 Norway, 2011 massacre in, 229–30 NSA, see National Security Agency, US Oak Ridge, Tenn., 144 Obama, Barack, 33, 175 NSA review group appointed by, 176–77, 181 Obama administration: Internet freedom and, 107 NSA and, 122 whistleblowers prosecuted by, 100–101, 179 obfuscation, 217–18 Occupy movement, 104 Ochoa, Higinio (w0rmer), 42–43 OECD Privacy Framework, 191–92, 197 Office of Foreign Assets Control, 36 Office of Personnel Management, US, 73 Off the Record, 83, 215 Olympics (2014), 70, 77 Onionshare, 216 openness, see transparency opt-in vs. opt-out consent, 198 Orange, 79 Orbitz, 111 Organized Crime Drug Enforcement Task Forces, 69 Orwell, George, 59, 225 oversight, of corporate surveillance, see mass surveillance, corporate, solutions for, government regulation in oversight, of government surveillance, 161–63, 169, 172–78 Oyster cards, 40, 262 packet injection, 149–50 PageRank algorithm, 196 Palmer Raids, 234 Panetta, Leon, 133 panopticon, 32, 97, 227 panoptic sort, 111 parallel construction, 105, 305 Pariser, Eli, 114–15 Parker, Theodore, 365 PATRIOT Act, see USA PATRIOT Act pen registers, 27 Peoria, Ill., 101 personalized advertising, see advertising, personalized personally identifying information (PII), 45 Petraeus, David, 42 Petrobras, 73 Pew Research Center, 96 PGP encryption, 215, 216 photographs, digital, data embedded in, 14–15, 42–43 Pirate Party, Iceland, 333 Placecast, 39 police, see law enforcement, state and local police states, as risk-averse, 229 political action, 7, 213, 222–24, 237–38 political campaigns: data mining and, 33, 54 personalized marketing in, 54, 115–16, 233 political discourse, government surveillance and, 97–99 politics, politicians: and fear of blame, 222, 228 technology undermined by, 213 Posse Comitatus Act (1878), 186 Postal Service, US, Isolation Control and Tracking program of, 29 Presidential Policy Directives, 99–100 prices, discrimination in, 109–10 PRISM, 78, 84–85, 121, 208 privacy, 125–33 algorithmic surveillance and, 129–31, 204 as basic human need, 7, 126–27 breaches of, 116–18, 192, 193–95 as fundamental right, 67, 92, 126, 201, 232, 238, 318, 333, 363–64 of healthcare data, 193 Internet and, 203–4, 230–31 loss of, 4, 7, 50–51, 96, 126 and loss of ephemerality, 127–29 “nothing to hide” fallacy and, 125 and proposed Consumer Privacy Bill of Rights, 201, 202 security and, 155–57 social norms and, 227, 230–33 third-party doctrine and, 67–68, 180 as trumped by fear, 228 undervaluing of, 7–8, 50, 156, 194, 203–4 Privacy and Civil Liberties Oversight Board, 176, 177 privacy enhancing technologies (PETs), 215–16, 217 Privacy Impact Notices, 198, 211 probable cause, 184 Protect America Act (2007), 275 public-private partnership, see mass surveillance, public-private partnership in Qualcomm, 122 QUANTUM packet injection program, 149–50, 329–30 radar, high-frequency, 30 “ratters,” 117 Reagan, Ronald, 230 redlining, 109 Red October, 72 Regulation of Investigatory Powers Act (UK; 2000), 175 relationships, mapping of, 37–38 remote access Trojans (RATs), 117 resilience, systemic imperfections and, 163–64 retailers, data collected by, 14, 24, 51–52 revenge porn, 231 RFID chips, 29, 211 Richelieu, Cardinal, 92 rights, of consumers, see consumer rights risk, police states as averse to, 229 risk management, 141–42 Robbins, Blake, 104 robotics, 54–55 Rogers, Michael, 75 Roosevelt, Franklin D., 229, 230 Rousseff, Dilma, 151 RSA Security, 73, 84 rule of law, 210, 212 Russia: cyberwarfare and, 180 mandatory registration of bloggers in, 95 mass surveillance by, 70, 187, 188, 237 salience, 203–4 San Diego Police Department, 160 Sarkozy, Nicolas, 96 Saudi Arabia, 76, 187, 209 Saudi Aramco, 75 Schmidt, Eric, 4, 22, 57, 86, 125 schools, surveillance abuse in, 104 Schrems, Max, 19, 200 search engines, business model of, 113–14, 206 secrecy: corporate surveillance and, 194 of government surveillance, 99–101, 121, 122, 170–71 legitimate, transparency vs., 332–33 security, 135–51 airplane, 93, 158 attack vs. defense in, 140–43 balance between civil liberties and, 135 complexity as enemy of, 141 cost of, 142 data mining as unsuitable tool for, 136–40 and deliberate insecurity of Internet, 146–50 encryption and, see encryption fear and, 4, 7, 95–97, 135, 156–57, 171, 182–83, 222, 226, 227–30 hindsight and, 136 mass surveillance as harmful to, 7, 146–50 and misguided focus on spectacular events, 135 narrative fallacy in, 136 privacy and, 155–57 random vs. targeted attacks and, 142–43 risk management and, 141–42 social norms and, 227 surveillance and, 157–59 vulnerabilities and, 145–46 security cameras, see surveillance technology self-censorship, 95 Senate, US, Intelligence Committee of, 102, 172, 339 Sensenbrenner, Jim, 174 Sense Networks, 2, 40 September 11, 2001, terrorist attacks, 63, 65, 136, 156, 169, 184, 207, 227, 229 SHAMROCK, 175 Shirky, Clay, 228, 231 Shutterfly, 269 Siemens, 81 SIGINT (signals intelligence), see National Security Agency, US, foreign eavesdropping by SIGINT Enabling Project, 147–49 Silk Road, 105 Skype, 84, 148 SmartFilter, 82 smartphones: app-based surveillance on, 48 cameras on, 41 as computers, 14 GPS tracking in, 3, 14, 216–17 MAC addresses and Bluetooth IDs in, 29 Smith, Michael Lee, 67–68 Snowden, Edward, 177, 178, 217 e-mail of, 94 Espionage Act and, 101 EU Parliament testimony of, 76 NSA and GCHQ documents released by, 6, 20, 40–41, 62, 65, 66, 67, 72, 74, 78, 96, 99–100, 121, 129, 144, 149, 150, 160–61, 172, 175, 182, 207, 223, 234, 238 Sochi Olympics, 70, 77 Socialists, Socialism, 92–93 social networking: apps for, 51 customer scores and, 111 customer tracking and, 123 data collected in, 200–201 government surveillance of, 295–96 see also specific companies social norms: fear and, 227–30 liberty and, 227 mass surveillance and, 226–38 privacy and, 227, 230–33 security and, 227 software: security of, 141, 146 subscription vs. purchase models for, 60 Solove, Daniel, 93 SOMALGET, 65 Sophos, 82 Sotomayor, Sonia, 95, 342 South Korea, cyberattack on, 75 spy gadgets, 25–26 SSL encryption, 85–86 SSL (TLS) protocol, 215 Standard Chartered Bank, 35–36 Staples, 110 Stasi, 23 Steinhafel, Gregg, 142 strategic oversight, 162, 172–77 StingRay surveillance system, 100, 165 Stross, Charles, 128 Stuxnet, 75, 132, 146 collateral damage from, 150 Supreme Court, US, 26, 180, 361–62 third-party doctrine and, 68 surveillance: automatic, 31–32 benefits of, 8, 190 as business model, 50, 56, 113–14, 206 cell phones as devices for, 1–3, 14, 28, 39, 46–47, 62, 100, 216–17, 219, 339 constant, negative health effects of, 127 cost of, 23–26 espionage vs., 170, 183–84 government abuses of, 101–5 government-on-government, 63, 73, 74, 75, 76, 158 hidden, 28–30 legitimate needs for, 219–20 as loaded term, 4 mass, see mass surveillance oversight and accountability in, 161–63, 169, 172–78 overt, 28, 30 perception of, 7–8 personal computers as devices for, 3–4, 5 politics and, 213 pre-Internet, 64, 71 principles of, 155–66 targeted, see targeted surveillance transparency and, 159–61, 169, 170–71, 176 surveillance technology: cameras, 14, 17, 31–32 cost of, 25–26 shrinking size of, 29 Suspicious Activity Reports (SAR), 138 Sweeney, Latanya, 44, 263–64 SWIFT banking system, 73 Swire, Peter, 160 Syria, 81 NSA penetration of Internet infrastructure in, 74, 150 System for Operative Investigative Measures (SORM; Russia), 70 tactical oversight, 162, 177–79 Tailored Access Operations group (TAO), 72, 85, 144, 149, 187 Taleb, Nassim, 136 Target, 33, 34, 55 security breach of, 142, 193 targeted advertising, see advertising, personalized targeted surveillance: mass surveillance vs., 5, 26, 139–40, 174, 179–80, 184, 186 PATRIOT Act and, 174 tax fraud, data mining and, 137 technology: benefits of, 8, 190–91 political undermining of, 213 privacy enhancing (PETs), 215–16, 217 see also surveillance technology telephone companies: FBI demands for databases of, 27, 67 historical data stored by, 37, 67 NSA surveillance and, 122 transparency reports of, 207–8 see also cell phone metadata; specific companies Teletrack, 53 TEMPORA, 79 Terrorism Identities Datamart Environment, 68, 136 terrorists, terrorism: civil liberties vs., 135 government databases of, 68–69 as justification for mass surveillance, 4, 7, 170–71, 226, 246 mass surveillance as ineffective tool for detection of, 137–40, 228 and NSA’s expanded mission, 63, 65–66 terrorists, terrorism ( continued) overly broad definition of, 92 relative risk of, 332 Uighur, 219, 287 uniqueness of, 138 see also counterterrorism; security; September 11, 2001, terrorist attacks thermostats, smart, 15 third-party doctrine, 67–68, 180 TLS (SSL) protocol, 215 TOM-Skype, 70 Tor browser, 158, 216, 217 Torch Concepts, 79 trade secrets, algorithms as, 196 transparency: algorithmic surveillance and, 196 corporate surveillance and, 192, 194, 196, 202, 207–8 legitimate secrecy vs., 332–33 surveillance and, 159–61, 169, 170–71, 176 Transparent Society, The (Brin), 231 Transportation Security Administration, US (TSA), screening by, 136, 137, 159, 231, 321 Treasury, US, 36 Truman, Harry, 62, 230 trust, government surveillance and, 181–83 truth in lending laws, 196 Tsarnaev, Tamerlan, 69, 77, 139 Turkey, 76 Turla, 72 Twitter, 42, 58, 199, 208–9 metadata collected by, 23 Uber, 57 Uighur terrorists, 219, 287 Ukraine, 2, 39 Ulbricht, Ross (Dread Pirate Roberts), 105 “uncanny valley” phenomenon, 54–55 Underwear Bomber, 136, 139 UN High Commissioner on Human Rights, 96 Unit 8200, 77 United Kingdom: anti-discrimination laws in, 93 data retention law in, 222 GCHQ of, see Government Communications Headquarters in international intelligence partnerships, 76 Internet censorship in, 95 license plate scanners in, 27 mission creep in, 105 Regulation of Investigatory Powers Act (2000) of, 175 United Nations: digital privacy resolution of, 232, 363–64 NSA surveillance of, 102, 183 United States: data protection laws as absent from, 200 economic espionage by, 73 Germany’s relations with, 151, 234 intelligence budget of, 64–65, 80 NSA surveillance as undermining global stature of, 151 Stuxnet cyberattack by, 75, 132, 146, 150 Universal Declaration of Human Rights, 232 USA PATRIOT Act (2001), 105, 221, 227 Section 215 of, 65, 173–74, 208 Section 505 of, 67 US Cellular, 177 Usenet, 189 VASTech, 81 Verint, 2–3, 182 Verizon, 49, 67, 122 transparency reports of, 207–8 Veterans for Peace, 104 Vigilant Solutions, 26, 40 Vodafone, 79 voiceprints, 30 vulnerabilities, 145–46 fixing of, 180–81 NSA stockpiling of, 146–47 w0rmer (Higinio Ochoa), 42–43 Wall Street Journal, 110 Wanamaker, John, 53 “warrant canaries,” 208, 354 warrant process, 92, 165, 169, 177, 180, 183, 184, 342 Constitution and, 92, 179, 184 FBI and, 26, 67–68 NSA evasion of, 175, 177, 179 third-party doctrine and, 67–68, 180 Watson, Sara M., 55 Watts, Peter, 126–27 Waze, 27–28, 199 weapons of mass destruction, overly broad definition of, 92, 295 weblining, 109 WebMD, 29 whistleblowers: as essential to democracy, 178 legal protections for, 162, 169, 178–79, 342 prosecution of, 100–101, 178, 179, 222 Wickr, 124 Wi-Fi networks, location data and, 3 Wi-Fi passwords, 31 Wilson, Woodrow, 229 Windows 8, 59–60 Wired, 119 workplace surveillance, 112 World War I, 229 World War II, 229 World Wide Web, 119, 210 writers, government surveillance and, 96 “wrong,” changing definition of, 92–93 Wyden, Ron, 172, 339 XKEYSCORE, 36 Yahoo, 84, 207 Chinese surveillance and, 209 government demands for data from, 208 increased encryption by, 208 NSA hacking of, 85 Yosemite (OS), 59–60 YouTube, 50 Zappa, Frank, 98 zero-day vulnerabilities, 145–46 NSA stockpiling of, 146–47, 180–81 ZTE, 81 Zuckerberg, Mark, 107, 125, 126 Praise for DATA AND GOLIATH “Data and Goliath is sorely needed.

pages: 492 words: 153,565

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
by Kim Zetter
Published 11 Nov 2014

“Cartwright’s role was describing the art of the possible, having a view or a vision,” the official told the Washington Post. But Alexander had the “technical know-how and carried out the actual activity.”28 The code was then developed by an elite team of programmers at the NSA, at least initially. Later versions reportedly combined code from the NSA with code from the Israeli Defense Force’s Unit 8200—Israel’s version of the NSA. Once the code was designed, however, it would have been handed off to the CIA to oversee delivery to its destination, since only the CIA has legal authority to conduct covert operations. The technical challenges of the operation were daunting, but there were legal issues to work out as well, since they were proposing to attack another country’s infrastructure outside of a declaration of war.

A 2003 letter from one Iranian firm to another, which Western sources later obtained, revealed that Siemens S7-300 and S7-400 controllers, along with the SIMATIC software needed to communicate with them, had been procured by a company named Kimia Maadan that was involved in uranium processing in Iran.9 It was believed the controllers were purchased for Iran’s Gachin mine, where Iran planned to mine natural uranium for processing in centrifuges.10 All of this information would have been known to the United States and Israel. Although the initial plot might have been hatched by US Strategic Command under Gen. James Cartwright, it was up to the cyberwarriors of the NSA and US Cyber Command, working in conjunction with coders from Israel’s elite Unit 8200, to execute it. To pull off the attack required a lot more intelligence than just knowledge of the equipment at Natanz. The attackers needed to know, for example, the exact frequency at which the converters operated and the exact configuration of the equipment. They couldn’t rely only on old blueprints and plans that might be out of date.

pages: 282 words: 81,873

Live Work Work Work Die: A Journey Into the Savage Heart of Silicon Valley
by Corey Pein
Published 23 Apr 2018

.… Since you have already been in an organization that does similar things, I would be thrilled if you could join me as a co-founder to this endeavor. I would love to hear from you as soon as you can … Aron Cohen It was a strange note. I was cautious. But I was also curious. I did some quick research on Aron. His LinkedIn résumé claimed he had worked for Israeli Army intelligence unit 8200, which is that country’s version of the National Security Agency—a sophisticated, secretive, and ambitious electronic surveillance organization that happens to produce a lot of tech entrepreneurs. Aron looked young, but he was older than me. His photo showed him avoiding eye contact with the camera and wearing a straight-brimmed fedora, a fashion accessory associated with a certain type of charmless chauvinist techie.

pages: 826 words: 231,966

GCHQ
by Richard Aldrich
Published 10 Jun 2010

This so-called Special Collection Element within UNSCOM was suggested by Scott Ritter, a former US Marine officer who had been working with UNSCOM since 1995. It often recorded Iraqi warnings to weapons facilities that the inspectors were on their way, but given that the material took weeks to process, this was of little help to the inspectors on the ground. Arguments soon developed. Israel’s sigint agency, called Unit 8200, was helpful and provided the inspectors with complete transcripts, but the Americans only returned small amounts of redacted material to UNSCOM.17 NSA and GCHQ would use UNSCOM as short-range collectors up until 1996, but predictably they were paranoid about sharing any decrypted product which carried the ominous caveat ‘Special Compartmented Intelligence – Top Secret/Final Curtain’.

AB Cryptoteknik 213 ‘ABC’ trial (1977–78) 8, 359–61, 423, 459 Abernethy, Barbara 70 Abu Hamza al-Masri 542 Abyssinia (Ethiopia) 19 Adams, Gerry 500 Aden (Yemen) 6, 156, 164, 345 Admiralty Signals Division 137 Admoni, Nahum 471 Adye, John 427, 431, 476, 483, 494, 495, 598, 608 aerial reconnaissance 31, 59 Afghanistan 387, 420, 421, 510, 511, 533–9 Africa 99, 148, 182, 268, 299, 336, 454–5, 479 Aid, Matthew 521 Aiken, John 326, 327, 328, 331 Airborne Rafter programme 267, 538 Aitken, Jonathan 493–5 al-Badr, Imam 163–4 al-Jazeera 513–14 al-Qaeda 9, 509–11, 513–14, 517, 532 Alanbrooke, Field Marshal Lord 45 Aldeburgh (Suffolk) 286 Aldridge, Peter 449 Alexander, A.V. 123–4 Alexander, Hugh 25, 27, 78, 96, 599 Allen, Lew 357 Allied Commission for Austria and London 170 Alp, Saffet 314 Alvear, Soledad 519 American Office of Naval Intelligence 143 American Type-777 satellite 348 Amery, Julian 162–3, 295 Ames, Aldrich 385, 444 Amory, Robert 158 Amsterdam 487 Anaya, Admiral Jorge 389, 393, 395 Anderson, Jack 344 Andrew, Christopher 2, 362 Anglo-American-Commonwealth sigint 64, 82, 152 Anglo-American relations 7–8; and Balkans 472–5; and Berlin tunnel operation 172–6; changing nature of 441–3, 449–50; and cost of cooperation 222–3; and Cuba 341–2; deterioration in 281–95, 333; and Far East 151–2; and global sigint 89–101; gradual improvement in 295–8; impact of politics on 278; and liberating of Axis sigint 47–56; and Nimrod programme 268–70, 273–4; and Project Sandra 322–3; and public disclosure of sigint material on 355–7, 358, 361–2; and sale of cypher machines 209–15; shared problems 333–4; and sigint 7–8, 38–46, 91–2; and sigint satellite and computer revolution 347–54, 437–8; successful Russian intercepts 279–81; and Suez crisis 157–9; and Third World bases 334–9; and trade unions at GCHQ 421–2, 429; in Turkey 302; and Venona Project 72–88; in wartime 38–46 Angola 357, 454–5 Ankara 58, 254, 302, 303, 305, 310–11, 313, 315, 318, 330 Annan, Kofi 523–4 Antalya (Turkey) 326 Anti-Christ Doom Squad 487 Anti-Smuggling Task Force (Hong Kong) 477 AQ Khan network 531 Aquarius (computer) 349 Arab-Israeli War (1973) see Yom Kippur War Arab states 109 Arafat, Yasser 277 Aral Sea 306 Arbuthnot, Mrs 70 Arctic Circle 133, 136–9, 144–6, 147, 265 Argentina 307–8, 388–415 Argentine Air Force 401, 408, 410, 415 Argentine Army 396 Argentine Navy 395, 405, 408 Argus satellite 377 Arlington Hall (US Army code-breaking centre, Washington) 45, 74, 77, 80, 83 arms control 203, 257, 287, 288, 290 Armstrong, Sir Robert 416, 425, 427, 428, 430–1 Army Intelligence Corps 230 Army Security Agency 80 as-Sallal, Abdullah 163–4 Ascension Island 162, 278, 321, 392, 414 Ash, Timothy Garton 465 Athens 324, 330 Atlantic, Battle of (WWII) 42, 60 Atlas (computer) 349–50 Atomic Demolition Munitions (ADMS) 249 Atomic Energy Authority (AEA) 261 Atomic Energy Intelligence 155 atomic and nuclear weapons 2, 5, 36, 45; and Anglo-US arms control 287–9; at Los Alamos 75, 76, 82; British 163, 249; Chinese 155; need for better intelligence on 253, 255, 321–3; Soviet 107–8, 112, 114, 116, 119, 131–2, 148, 157, 173, 301–2; spiralling of arms race 438–9; US 249; US put on alert (1973) 293–4 Atomic Weapons Establishment (Aldermaston, Berkshire) 418–19 Attlee, Clement 73, 86 ATV 432 Aubrey, Crispin 358–9, 360 Auckland (New Zealand) 487 Audiotel 480 Augsburg (Germany) 48 Austin, Harris M. 115 Australia 79, 80, 85–8, 89, 90, 92–4, 98, 154, 164, 165, 167, 168, 213, 467, 477, 487, 533; Australian Security Intelligence Organisation (ASIO) 86–7, 88; Central Bureau 92; Defence Signals Branch (DSB) 151, 153, 213; Defence Signals Department (DSD) 348; Royal Australian Air Force 150; Royal Australian Navy 266; Royal Australian Signals 166 Austria 96, 371, 384 Automatic Data Processing 353 Ayios Nikolaos (Cyprus) 156, 162, 163, 230, 234, 327, 328, 358–9, 360, 383, 384 Azerbaijan 109 Bad Aibling (Germany) 423 Bad Godesberg (Germany) 215 Badger’s Lair (SAS training exercise) 249–50 BAE Systems Ltd 544 Baghdad (Iraq) 161, 468, 469, 471, 524 Baghdad Pact 161 Bahia Paraios (Argentinean ship) 394, 395 Bahrain 347 Baillie, George 122 Bain, Helen 445 Baldwin, Stanley 18, 72, 400 Balgat (Turkey) 303 Bali bombing (2002) 511, 513 Balkanabteilung (German code-breaking HQ) 50 Balkans 51 Baltic 112, 114, 116, 125, 285 Baltic Sea 273 Bamford, James 263, 361–2, 521 Bandaranaike, Solomon 160 Bank of England 241, 487 Banner, Gordon 312–16, 318 Barbieri, Major 52, 53–4 Barents Sea 114, 115 Barker, Nick 391–2 Barkley, Howard 77 Barsby, Mrs 374–5 Basra (Iraq) 466, 525 Battle of Britain 29 Bay of Pigs crisis (1961) 8, 226 BBC 330, 348, 429, 501, 517, 523–4; BBC Scotland 459 Beach, Sir Hugh 380, 381 Bearman, Sid 595 Beasley, Tony 133–9 Beaumanor Hall (Leicestershire) 63 Beijing 476 Belbasi (Turkey) 302 Belfast 261, 500, 501 Belgium 442, 492 Bell, Rod 409, 410 Benitez, Rafael 114, 115 Benjamin, Ralph 216 Benn, Tony 227 Bennett, Ralph 59 Bentinck, Victor Cavendish 67 Bergen (Norway) 450 Bergold, Harry 295 Beria, Lavrentii 107 Berlin 112, 127–8, 130, 196–7, 227, 228, 253, 270, 369, 370, 372, 478; Berlin Blockade (1948) 71, 113; Berlin Cryptographic Centre 50; Berlin tunnel 169, 170, 172–6, 373, 477 Berlusconi, Silvio 532 Berry, John 358–9, 360 Betts, Richard 600 Beulmann, Major 50 Bevin, Ernest 70 BfV (German domestic security service) 452–3 bin Laden, Osama 511, 513, 514, 549 Binalshibh, Ramzi 514 Bingham, Lord 481 Birch, Frank 43 Bitburg (Germany) 131 Black, Jeremy 407, 408 black chambers 4, 14 ‘Black Friday’ (29 October 1948) 81, 108, 119, 169, 280 Black Sea 112, 131–2, 301, 302, 311, 313, 317, 319 Blair, Tony 4, 436, 497–8, 500, 504, 506, 509, 515, 517, 519, 530, 532 Blake, George 173, 174–5, 176, 178, 179, 238, 385 Bleckede 127 Bletchley Park 103, 186, 188, 221, 354, 549; Americans at 39, 43; and breaking ‘Red’ 25–6; closure of 67–71; and cypher security 54–9; expansion and reorganisation 27–8, 62–3; GCHQ as successor to 1, 5; Huts Three and Six 23, 25, 36, 48, 64–5, 119, 121, 356, 362–3, 364, 387; and machine-based espionage 5; military emphasis at 22–3; post-war role 60–1, 63–7; release of records on 355; SIS GC&CS moves to 22–8; takeover of Axis sigint effort 47–54; tight security measures at 69; unmasking of 362–3; wartime value and achievements 59–60, 61–3; wartime work of 1–2, 5, 25–9, 30, 31–46, 109–10 Blix, Hans 520 Block, Lieutenant 145 Bloomer-Reeve, Carlos 394, 412 ‘Blue Book’ 2–3, 395–6 Bluff Cove (Falklands) 400 Blum, Eberhard 450, 452 Blunkett, David 510, 522 Blunt, Anthony 36, 37, 83, 188, 224, 225, 364, 367 Board of Trade 241 Bodsworth, William 69, 80 Boizenburg (Germany) 127 Bolivia 52, 300 Bonnet, Georges 52 Bonsall, Arthur ‘Bill’ 110 Bontoft, Gerry 352 Borehamwood (aka ‘Department B’, London) 181, 182, 190 Borisenko, Alexsandr Ivanovich 236, 237 Borneo 6, 148, 164–8, 250 Bosnia 8, 9, 471–4, 512 BOSS (South African secret service) 357 Bourbon (Soviet radio intercepts) 75 Boyce, Ed 377 Bracknell (Berkshire) 113 Bradley, General Omar 116 Bradshaw, Mike 423 Brauntoltz, George 432 Bremerhaven (Germany) 116 Brezhnev, Leonid 245, 247 Brezhnev Doctrine 244 Bride (UK code-name for Venona) 80 Bridges, Sir Edward 42, 141–2, 181 Brinks Mat bullion robbery (1983) 505 British Army 14–15, 63, 451, 469, 472; 9 Signals Regiment 162, 327, 383–4; 13 Signals Regiment 166, 228, 493; 14 Signals Regiment 524, 525, 534; 40 Commando 525; British Army on the Rhine 248, 412; First Armoured Division 467, 525; Queen’s Dragoon Guards 525; ‘Rhino Force’ 467; Royal Armoured Corps 248; satellites 198, 208–9, 223, 243, 258, 262–3, 340, 342, 344, 345–8, 347–8, 376, 377, 401, 415, 421, 437–8, 441, 442–3, 445–7, 460–1, 478; sigint units 162, 166–7, 218–19, 228, 327, 383–4, 493, 524, 525, 534; Special Air Service (SAS) 164, 165, 168, 248–51, 359, 409, 410, 411, 468, 472, 475, 536, 583; Special Boat Service (SBS) 333, 409, 410, 411, 443, 468; Special Operations Executive (SOE) 36, 51; Special Reconnaissance Squadron 248 British European Airways (BEA) 129 British Indian Ocean Territories (BIOT) 334 ‘British Intelligence and Weapons of Mass Destruction’ (Butler Report) 2 British Leyland 367–8 British Military Mission (Brixmis) 123, 245–6, 247, 252 British Nuclear Fuels Ltd 500 British Psychological Society 433–4 British Tabulating Machine Company 349 British Telecom 545; Medium Wave Tower (Holyhead) 500 Britten, Douglas 230–8, 369, 382 Broadcasting Standards Authority 481 Broadside operation (US Embassy intercepts in Moscow) 280–1 Brockway, Ernst 383 Brook, Sir Norman 142, 219–20 Brooks, Richard 399 Brooks Field (Michigan) 120 Brown, Gordon 498 Brundrett, Sir Frederick 177, 178 Brunei, Sultan of 164, 586 BRUSA agreement (1943) 43, 44, 121, 151 Brussels 179, 253 Brzezinski, Zbigniew 448 Buffham, Benson 381, 424 Bufton, Air Vice Marshal 207 bugging operations 176–82, 193, 196–7, 473–4, 479, 482, 499 Bulganin, Nikolai 140 Bulgaria 518, 519 Bundesnachrichtendienst (BND, German foreign intelligence service) 214–15, 422–3, 438, 447–51, 452–4, 455, 456, 471, 472, 524 Bundy, William ‘Bill’ 50, 356, 363, 364 Bunyan, Tony 361 Burgess, Guy 8, 37, 73, 82, 83, 84–5, 224, 225, 238, 367 Burma 65 Burrough, John 598 Burton, Sir Edmund 527 Burton-Miller, T.R.W. 57, 191, 577 Bush, George H.W. 356–7 Bush, George W. 511, 517, 532 Butler, Lord 2, 428, 482, 529–31, 610 Byers, Stephen 506–7 Byrnes, Jimmy 53 ‘C’ (head of SIS) 16, 24, 67 Cabell, Charles 96 Cabinet Office Intelligence Coordinator 241, 245, 264, 353, 354, 360, 387, 399, 504 Cable, Danielle 505, 506 Cable, James 278 cable vetting 238–41 Cable & Wireless 240, 312, 392 Caccia, Harold 171 Cadogan, Sir Alexander 23–4, 26, 39, 45, 70 Cairncross, John 36–7, 73, 82, 364 Cairo (Egypt) 58, 159, 179, 185 Callaghan, James 324, 325, 330, 333, 361, 391 Calvi, Roberto 407 Calvocoressi, Peter 59, 61 Cameron, Stephen 505 Campaign for Nuclear Disarmament (CND) 368 Campbell, Alastair 517, 523, 530 Campbell, Duncan 8, 358, 360, 361, 362, 423, 458–9 Canada 38, 89, 93, 95, 97–8, 178, 447, 533; Canadian CBNRC 348; Canadian Communications Security Establishment (CSE) 381, 447; Canadian Joint Intelligence Committee 92 Canine, Ralph 101, 174, 336 Canyon satellite 376 Cape Canaveral (Florida) 322, 437, 461 Cape Matapan, Battle of (1941) 60 Capenhurst Tower (Cheshire) 500–1 Caraman, Mihai 253–4 Carey-Foster, William 185, 188, 228 Carlile of Berriew, Lord 543–4 Carpenter, Harry 598 Carrington, Lord 282–3, 284, 294, 389, 394, 396, 423–4 Carsamba (Turkey) 311–12 Carter, Jimmy 390, 448 Carter, Marshall 264, 272, 273–4, 350 Carter, Pat 448 Cartwright, Ian 328 Carver, Michael 334 Casey, Bill 457 Caspian Sea 112, 132, 161, 301, 302 Castle, Barbara 240 Castro, Fidel 226, 341 Catroux, Georges 52 Caucasus 131, 157 Caviar (Soviet encyphered traffic) 49, 69 Cayan, Mahir 309, 310–15, 314 Caygill, David 445 Celebes 167 Cellnet 481 Cemgil, Sinan 306 Central Gunnery School (Leconfield) 126 Central Signals Establishment 113–14 Ceylon 58, 69, 160, 259, 352 Chagos Islands 278, 335 Chamberlain, Neville 3, 18 Charles, Prince 482 Cheadle (Cheshire) 34, 63, 231 Chechnya 494–5 chemical weapons 470–1, 516 Chevaline project (upgrading of Polaris) 438–40, 459 Cheyne, Bill 166 Chicago Islands 278 Chicksands (Bedfordshire) 63, 360, 535 Chifley, Ben 86, 88, 94 Chile 357, 394, 396, 517 China 98, 129, 150–5, 193–5, 256, 273, 277, 282, 285, 376, 475–8; Chinese Communist Party 150; People’s Liberation Army 151 Chinese language teaching 598 Ching Peng 149, 150 Chippewa Falls (Minnesota) 350 Chirac, Jacques 520–1 Chitty, Brigadier 55 Chiverton, Roy 476 Chum Hom Kok (Hong Kong) 475–6 Church, Frank 356, 357 Church Committee 356, 357 Churchill, Winston 84; addiction to ‘Ultra’ intelligence 1; and airborne incidents 128, 129; and bugging operations 177; comments on the Belgians and Dutch 52; and cypher security 56; and diplomatic intelligence 41; and elint airborne operations 124; and Kuznetsov-Marshall affair 187, 189; meets Stalin 47; as recipient of sigint 3, 5, 40; supports work at Bletchley 26–7, 59, 65, 362 CIA (Central Intelligence Agency) 85, 87, 91; and Bay of Pigs 8, 226; and Berlin-Vienna tunnel operations 169–76; and counter-espionage coup 253–4; and Cyprus 324, 326–7; Foreign Broadcast Information Service 155; and invasion of Czechoslovakia 246; and invasion of the Falklands 399; Jewish sympathisers in 97; and Korean War 100; and Libyan terrorism 457; and Middle East 157, 158; and Nixon administration 4, 278; Office of National Estimates 151; revelations concerning 356–8; Russian spies in 444; security measures 101, 381; and shooting of Che Guevara 300; and Soviet weapons 108, 439; Special Activities Division 514–15; and Turkey 472; and U-2 spy planes 142, 226, 292, 296; and use of communication satellites 348; and Venona Project 77, 82; and Zinnia 322 Cianchi, Commander 54 CIB3 (Metropolitan Police anti-corruption squad) 506 City of London 487, 510 Civil Service 381, 421, 427; Civil and Public Servants Association (CPSA) 419–20; Civil Service Medical Officers Group 382; Civil Service Order in Council (1982) 431; Civil Service Union (CSU) 418, 420, 422–3; First Division Association 435; Society of Civil and Public Servants 426 Claret operations (1964–66) 165–8 Clarke, Kenneth 481, 482 Clarke, Liam 608 Clarke, Peter 266–7 Clarke, William F. 66 Cleveland, Paul 444–5 Clifford, Clark 333 Clinton, Bill 492 Clipper Chip (encryption bypass system) 492 Cobra (Cabinet emergency planning committee) 509–10, 527, 532, 610 Cobra Mist (Over the Horizon Radar) 285–7 code-breakers 2, 6, 198; and Anglo-American relationship 38–46; Australian 92; and Berlin tunnel operation 174; collaboration with Baltic states 31; combined operations 15–16; and computers 340, 348–9, 350–1; and decypherment of ‘Fish’ messages 28; diplomatic 27–8, 37, 43–4, 52–3; during WWII 25–9, 30–46, 58–9; Egyptian 164; and ending of WWII 61; expansion of 63–4; Far Eastern 40; Finnish 32, 35, 91; and French intercepts 52, 53, 209; and global sigint 96; importance of Hong Kong to 151; international work 16–17; and internet 493; Italian 52–4; military operations 14–15, 19–20; move from Bletchley to Cheltenham 5; naval 15; and Pelton affair 444; and personal computing and the internet 488; as Post Office department 14; pre-WWII 22–5; and Prime case 380; quadripartite meeting on computer hackers and encryption 489; revival on eve of WWI 14–15; Russian focus 17–19, 33–8, 169; and sale of cypher machines 209–15; and supply of intelligence reports 2–4, 6–7; and telephone tapping 170–1; and use of cypher machines 21–2; value of 60; and Venona Project 72, 74–88; wartime secrecy 354 COINS (Community On-line Intelligence System) 353 Colby, William ‘Bill’ 293, 327, 329, 330 Cold War 47, 377, 420; airborne incidents 125–33; benefits of intelligence in 175–6; Berlin blockade 71; calming of nerves in 257–8; computing in 349; end of 461, 465, 477, 478–9, 493; flashpoints 203; high profile espionage activity in 8; and planning for future war 247–53; seaborne incidents 133–47; secret service operations 484; sigint in 1, 2, 5, 107–24, 125–47, 402; Soviet nuclear weaponry 108; telephone and bugging operations 169–82; thawing of 195–7; and Venona Project 72–88 Cole, David 379, 380 Coleman, Don 131 Coleridge (Soviet teletype system) 78 Colombia 486, 538 Colonial Office 150 Colorob (computer) 349 Colossus (computer) 28, 48, 68, 70, 349 Combined Cypher Machine 98 Comet aircraft 121–2, 268, 273, 295 Cominstum (digest of hot material) 96 comint (communications intelligence) 96, 101, 110, 111, 122, 123, 228, 252–3, 266, 385, 402, 413 Comintern (Communist International) 19, 30, 37–8, 79 Commonwealth 85–8, 89, 92, 95, 97, 148, 266, 352, 447 Communications Branch of the National Research Council (CBNRC) 94 Communications Data Bill (2009) 543 Communications-Electronics Security Department 241–2 Communications Trials Ship (purpose-built sigint ship) 260–2 Communist Party of Great Britain 19, 188, 367–8, 417 Communist Party of India 87 Communist Party of USA 87 Comprehensive Comparative Radar Library 266 computers 198, 219, 220, 222, 340–1, 342–3, 348–54, 458, 486–93, 507, 507–8, 513, 527–8, 546–8 comsec (communications security) 90, 191–3, 195–7, 211, 218, 241–2, 377 Confederation of British Industry (CBI) 241 Conflict (Vienna tunnel code) 171 Congo crisis (1960) 336 Control Orders 543 Cook, Robin 498 Cooney Hill psychiatric hospital (Gloucester) 382 Cooper, Arthur 598 Cooper, Frank 423 Cooper, Josh 20, 34, 213 Coote, John 136, 137, 138, 143 Copenhagen (Denmark) 179 Corona (satellite) 208 Corporal (battlefield missile system) 249 Cosby, Bill 327 Costello, John 364 Cot, Pierre 53 counter-terrorism 456, 516, 528 Cox, Arthur 301 Crabb, Lionel ‘Buster’ 140–3, 207 Cradock, Percy 193–4, 294 Crankshaw, Edward 34, 35–6, 64 Cray super computers 350–1 Crete 157, 265, 292 Croatia 471–4 Croft, John 37–8 Cromer, Rowley 287–8, 294, 297, 337 Croslieve Mountain (Northern Ireland) 501 Crossman, Richard 227 Cruise missiles 511, 513 Crypto AG 212–15, 457 CSE (Communications Security Establishment) Watton 131 Cuba 226, 341–2; Cuban Missile Crisis (1962) 203, 253, 260 Cukr, Baclav 112 Cummings, Mansfield (aka ‘C’) 16 Cunningham, Andrew 91 Current Intelligence Groups 291, 396 Currie, Laughlin 87 Currier, Prescott 39 Curry, John 79 Curzon, George 15, 16, 18 cyber attacks 487–93 cypher machines; capture of 48–9, 264; Chinese capture of 194, 195; commercial origins of 20; development and use of 20–2, 57, 192; military 54; online 28, 210; and proposed Anglo-US collaboration 98–9; radiation or emanation from 215–18; supplying to NATO countries 209–15; see also Enigma Cypher Policy Board 42, 56–7 cypher security 54–9, 98–9, 191 Cyprus 7–8, 154, 155–6, 159, 161, 162–3, 219, 229, 234, 235, 259, 265, 277, 285, 292, 294, 295, 302, 319, 320–34, 337, 338, 345, 348, 356, 359, 369, 372, 382, 383–4, 419, 423, 466, 471, 504; Cyprus Eight 385 Czechoslovakia 203, 244–7, 253, 387; Czech Air Force Association 112 D-Notice affair (1967) 226, 238–41, 242, 362–3 Damascus (Syria) 159, 291, 300 Darwin (Falklands) 410 Data Encryption Standard (DES) 489 data-mining 486, 546–8 Daubney, Claude 103 Davies, Philip 27 de Gaulle, Charles 52, 195 de Grey, Nigel 35, 43 Deaf Aid (elint reception and analysis kit) 123 Dean, Patrick 142 Decabral, Alan 506 Defcon 3 (US nuclear alert) 293–4 Defence Intelligence and Security Centre (Chicksands) 63, 360, 535 Defence Intelligence Staff (DIS) 245, 246, 353, 369, 397, 402, 414, 527–8 Defence Reviews 329 Defence Signals Branch 93, 151, 153, 213, 578 Demos-1 (Hong Kong sigint station) 475–6 Demos-4 (Hong Kong sigint station) 476 Denham, Flight Sergeant 126 Denmark 442, 533 Denmark Hill (Metropolitan Police intercept station, London) 37 Denniston, Alastair 15, 18, 21, 24–5, 27, 28, 31, 34, 38, 40, 43–4, 70, 79 Denton Green, Robert 400, 402, 403, 407 Department of Economic Affairs 241 Department of Trade and Industry (DTI) 487 détente 247 Detica (security company) 544 Dexter, Harry 87 Dhekelia 163, 233, 327 Diana, Princess of Wales 479–83 Dictionary (keywords/predesignated phrases system) 343 Diego Garcia 321, 332, 335–9, 597 Dieppe raid (1942) 55 Diffie, Whitfield 490 Dimbleby, Jonathan 524 Dingli (Malta) 32, 156, 162 diplomatic intelligence 27–8, 37, 43–6, 52–3, 62, 69, 148, 159, 164, 176–82, 349, 355, 377 Diplomatic Protection Squad 506 Diplomatic Wireless Service (DWS) 58–9, 123, 181, 185–90, 192, 262, 417, 418, 585 Director General of Intelligence (DGI) 246 Directorate of Scientific Intelligence 123 Discovery (space shuttle) 437 Diyarbakir (Turkey) 300, 301–2, 306 Dobrynin, Anatoly 454 Domazet, Davor 472 domestic surveillance and intercepts 540–50 Donoughue, Bernard 3, 325 Doran, Frank 126 Doublecross system 229, 255 Douglas-Home, Sir Alec 163, 282, 312–13 Dozier, James 407, 452 Drake, Edward 94 Drew, John 229 drugs 486, 503, 514, 538 Drumheller, Tyler 529–30 Drummond (Argentine frigate) 395 DS.19 (MoD unit) 368 Dubček, Alexander 244 Dublin 501 Dudley-Smith, Russell 49, 55, 261 Duff, Antony 360, 399 Duffton, Nancy 435 Dulles, Allen 157, 158, 174, 176, 203 Dulles, John Foster 157 Dunderdale, ‘Biffy’ 21 Dunlap, Jack 355 Dunnell, Peter 127 Dwyer, Peter 82 East Africa 335–6 East Asia 120 East Germany 123, 131, 195–7, 345, 370, 379, 385, 453, 605 East-West summit (Paris, 1960) 204 Eastcote (London Signals Intelligence Centre) 62, 68–9, 79, 80, 103, 191, 349 Eastern Bloc 123, 175, 244, 245, 247, 256, 267, 282, 447, 465 Eastern Europe 33, 53, 78, 99, 119, 256, 284 Easton, James 82 Eavesdropper revelations (1976) 358, 359 Echelon (Anglo-US communications network) 7 economic intelligence 240–1 Ecuador 52 Eden, Anthony 46, 85, 129, 140, 141, 142–3, 155–6, 160, 178, 189 Eemnes (Netherlands) 415 Eger (Norwegian ship) 117 Egypt 58, 109, 155–9, 259, 263–4, 271, 277, 290–2, 295, 320, 467 Eichmann, Adolf 307–8 Eisenhower, Dwight D. 140, 157, 158, 202, 205, 219 Electrical Trades Union 368 Electronic Warfare Conferences 122, 123, 307–10 elint (electronic intelligence); air-based 111–14, 118–19, 122, 124, 250–2, 267–73; and Anglo-American relations 111–12; and European cooperation 591; in Germany 247, 250–1; and invasion of the Falklands 401, 413; and jamming of Whetstone monitoring station 190; land-based 117–20, 123; naval 114–17; near the Soviet Union 169; postwar expansion 110; rejection of 247; in Turkey 306; wartime use of 110 Elizabeth II, Queen 480, 482 Elkins, Robert 143 Elliott Brothers Ltd 598 Ellis, James 490, 492 Elmers School (GC&CS Diplomatic Sections) 23 email 488, 507, 513–14, 521–3, 541 embassies 151; Anglo-US-Canadian intercepts in Moscow 280–1; attacks and raids on 193–5; as forward listening stations 31; KGB in 82–3, 283–4; and MI5 watcher operations 183–90; security headache 195–7; sifting of waste-baskets in 56; spies in 84; tapping and bugging operations 171, 176–82, 193, 197–8, 281, 477; ultra-secret short-range sigint stations in 244–5; worldwide collection of intercepts from 45, 53, 79, 112, 159, 242–3, 385 Employment Select Committee of the House of Commons 424 Engulf (Egyptian Embassy cypher machine operation) 216 Enigma (German cypher machine) 1, 20–2, 23, 25–6, 27, 35, 38, 39, 42–3, 43, 51, 68, 78, 80, 354, 387 EOKA (Cypriot guerrilla force) 163 Episkopi (Cyprus) 234 Erim, Nihat 306, 312, 315 Eritrean Liberation Front 336 Escobar, Pablo 538, 549 Ethiopia 299, 334, 335–6 European Convention on Human Rights 433, 483 European Economic Community (EEC) 284 European Principals Meeting 450–1 European Union (EU) 540 Evatt, Dr H.V. 85, 86 Evere (NATO-GCHQ cell) 254, 255–7 Exocets (sea-skimming missiles) 390, 406–7, 414, 415 Faisal, King 160–1 Falkland Islands 6, 424, 429, 441, 442, 452, 467; Argentinean ambitions towards 389–92; Argentinean invasion of 392–3, 394–401; British troops on 408–14; comint and elint on 401, 413; diplomatic exchanges with 403–4; effect of war on British sigint 415; French help on 415; improvised communications with GCHQ 402–3; inadequate intelligence on 392–401; leaseback idea 392; naval action 404–8; near-miss air disaster 408; Norwegian help on 401, 442; scrap-metal incident 393–4; surprise attack on 388–9; Task Force sent to 398, 401, 403, 404–8; US denies pre-knowledge 601 Famagusta (Cyprus) 163, 235, 327, 328 Far East 39, 69, 78, 93, 129, 148–51, 164–8 Farrell, Terry 496 Faslane naval base (Scotland) 145, 146 Fatah (Palestinian organisation) 304, 308 FBI (Federal Bureau of Investigation) 76–7, 81 Federation of Malaysia 164–8 Ferranti 349, 598 ‘ferrets’ (flying intelligence stations) 111–14, 203–7 Fetherstone-Haugh, Timothy 383 Fetterlein, Ernst 17–18 Fieldhouse, Admiral 392 Fiji 446 Finland 31, 32, 76, 83, 91, 371, 489 First World War 14, 15, 16–17 Firyubin, Nikolay 279–80 Fischer, David 407 Fish (encyphered teleprinter) 28, 48, 49, 51 Fitz, Harold 127 Fleet Headquarters (Northwood) 400, 401, 402 Fletcher, WPC Yvonne 455–6 Florida 341 Flowers, Tommy 28, 349 Foden, Arthur 242 Foot, Michael 433 Ford, Gerald 297 Foreign and Commonwealth Office 16, 22, 45, 46, 56, 58, 66, 70, 83, 103, 128, 171, 172, 190–1, 192, 220–1, 239, 245, 273, 281, 287, 333, 335, 339, 353, 355, 360, 392–3, 398, 417, 420, 428; South-East European Department 317; Technical Maintenance Service 182 Forest Moor (wireless station near Harrogate) 96 Fort Bridgelands (Kent) 63 Fort Knox (Kentucky) 101 Fort Meade (NSA HQ, Washington) 102, 157, 174, 223, 271, 513, 528 Förvarets Radionstalt (FRA) 91 Foss, Hugh 21, 64 Fox, Katherine 598 FRA (Swedish sigint service) 421, 438, 456, 483–4 France 21, 32, 44, 52, 52–3, 109, 130, 268, 442, 445, 450, 467, 492 Franks, George 382 Free French 28, 52 Freedom of Information Act 482–3 Freeman, John 279 Freeman, Peter 531 French Guyana 415 Friedman, William 39, 44, 95, 213, 214 Friedrich, Lt Colonel 50 Fuchs, Klaus 72, 82, 83, 87, 104, 238 Fyjis-Walker, Richard 316 Fylingdales (Yorkshire) 287 Gaddafi, Muammar 455, 457, 531 Gagarin, Yuri 301 Gaitskell, Hugh 141 Galvin, John 474 Gambier-Parry, Richard 57, 181, 186, 188 Gamma-Guppy (Soviet intelligence intercepts) 244–5 Gardner, Meredith 75, 79, 80 Garner, Joe 249 Gates, Robert 457 GC&CS (Government Code and Cypher School) 361; and Anglo-American collaboration 40–1; civil achievements 28–9; and cypher security 56–7; diplomatic centre at Berkeley Street 27–8, 37, 43–4, 52–3; divided into civil and military sections 27–8; and European collaboration 20–2; military interests 19–20; post-war role 61, 63–7; relocation to Bletchley 22–7; Russian interests 17–19, 30–2; setting up of 16 GCHQ (Government Communications Headquarters) 1, 31, 104; and al Qaeda 511–12; Benhall 350, 360, 497, 526; and Bosnian-Croatian conflict 472–5; Bude (formerly CSO Morwenstow) 342, 343–4; budget figures 587; building of ‘Doughnut’ 9, 497, 526, 527–8; ceases exchanging intelligence with NSA 289–90; and changing nature of global threats 504–5; and closer relationship with MI5 and SIS 503–4; and Cobra Mist/Orford Ness problems 285–7; code-breaking and intelligence-gathering 6–8; combined NATO-GCHQ cell at Evere 254, 255–7; computers in 527–8; cooperation with NSA 222–3, 278, 282–3, 346, 347–54, 438, 448–58, 461; declining position of 422–3, 438, 441; development of new systems 342–54; diplomatic initiatives 108–9; Directors of 551–2; domestic surveillance and interceptions 540–50; DWS operations 186; E Division (Personnel) 425, 427; and economic intelligence 493; Empress Building (Earl’s Court) 382; encryption problems in banking and commerce 487–93; and end of Empire 148–55; expansion of 79, 169; F Division 476; file storage 598; funding of 219–23, 334, 458, 493, 494, 495; Free Trade Union 430; future purpose of 485; and global sigint 92, 94, 95–100; and Gulf War (1991) 466, 469; H Division (mathematicians and cryptographers) 432; and hoax letters prank 469–70; increased intelligence operations 120, 121–4; influence on foreign policy 321; installation of dedicated computer unit 507–8; and internal surveillance 9–10; and internet 100; and invasion of the Falklands 392–403, 405–6, 411; and IRA 498–503; and Iraqi dossiers 516–17, 530; J Division (Special sigint—Russian) 346, 374, 376, 419, 429, 434–5, 438, 495; J-Ops 429, 434–5, 438; K Division (non-Russian sigint) 218, 222, 402, 420–1, 478, 495; and KGB espionage 108, 189, 424–5; and Korean War 101; language problem 512–13, 516; legal identity of 484–5; and Libyan Embassy affair 455, 456; London office (Palmer Street) 192, 497; loss of Hong Kong listening station 475–8; merger with com sec 241–2; and Middle East 155–64; moles in 368–85; move to Cheltenham (1952) 102–3, 120–1, 122, 191; need for 8–9; ‘need to share’ problem 503–4; Nimrod programme 267–70, 271–4; and Noye affair 505–7; Oakley 360, 380, 427, 496, 497, 526; ocean-going activities 6, 136; organisation overviews 563–5; overhaul of operations 493–7; positive vetting at 227–8; post-war organisation and location 67–71; and Princess Diana 482, 483; and problems with ‘special relationship’ 441–3; promotion and career structures 576; purpose-built sigint ship 260–4; R Division (security) 425; reads HVA traffic 605; reinstatement of unions at 497–8; relationship with private companies 240; removal of trade unions at 416–36; and Russian problem 46, 71, 75, 78, 169, 299; S Division 261; secret pact with armed services 5–6, 117–18, 132–3; size of 227; ‘Station X’ 69; as successor to Bletchley Park 1, 5; suicides connected to 382–3; and supply of cypher machines to NATO 209–15; T Division 123; Tempest 216–18; Trade Union Campaign 498; Turkish operations 300–1, 311–19; unmasking of 355–64; use of deaf and dumb civilian personnel 153; use of name ‘GCHQ’ 61, 67; and use of polygraph at 425–6; and Venona Project 77–81; visibility of 1, 2, 8, 341, 436, 484; W Division 261; and War on Terror 533, 539–40; and West German defections 455–6; whistleblower in 521–3; X Division 6, 350, 353; Z Division (use of sigint) 388, 503; Zionist interests 109 GEC-Marconi 433 General Belgrano (Argentine cruiser) 404–6 General Strike (1926) 18 Geneva (Switzerland) 178; Peace Conference (1954) 178 George VI, King 59, 191 Georkadijis, Polycarpos 323–4 Geraldton (DSD site, Australia) 477 Germany 15, 29, 30, 31, 32–3, 44, 47–50, 55, 62, 78, 96, 127–9, 130, 142, 170–1, 219, 229, 247, 256, 270, 492; Army 26, 29, 43, 47; High Command (OKW) 49, 349; Navy 42; see also East Germany; West Germany Gezmiş, Deniz 310, 311 Giant Reach (SR-71 flights from US to Middle East) 292–3 Gibraltar 162, 398, 415 Gibson, Sir Peter 502 Gilbey, James 479–81 Glazebrook, George 92 Glidwell, Mr Justice 430–1 Glover, Sir James 413 Godfrey, Admiral 32 Golan Heights 297 Golden Valley Hotel (Cheltenham) 432–3 Goldsmith, Lord 522–3 Golombek, Harry 25 Goodpaster, Andrew 256 Goonhilly Downs (Cornwall) 342–3, 597 Goose Green (Falklands) 404, 410, 411 Gorbachev, Mikhail 456 Gordievsky, Oleg 385, 478 Gore Booth, Sir Paul 339 Gosport (Hampshire) 134 Gouzenko, Igor 85 Government Communications Staff Federation 428, 429 Government and Overseas Cable and Wireless Operators Association 418 Government Technical Assistance Centre (GTAC) 507, 547 Government Telecommunications Advisory Centre 504 Gow, Ian 482 Gowrie, Lord 428 Grab (Galactic Radiation and Background) satellite 208 Grant (MI5 computer scheme) 528 Grantham, Sir Alexander 152 Granville (Argentine frigate) 395 Grechko, Andrei 245 Gredjeva, Nina Michailovna 189 Greece 163, 259, 319, 320, 324, 334, 450, 472 Green Light (US special atomic demolition munitions programme) 249 Greenhill, Denis 239, 284 Greenock naval base (Scotland) 144 Greenpeace 446 Grey (US diplomatic code) 40 Grindley, Mike 430 Gromyko, Andrei 205, 206 Groupe de Synthèse et Prévision (France) 284 GRU (Soviet Military Intelligence) 88, 173, 230 Guardrail (US airborne tactical sigint systems) 251–2, 272 Guernica bombing (1937) 22 Guevara, (Ernesto) Che 300 Gulf War (1990–91) 452, 465–71, 529 Gulf War (2003) 479, 516–26 Gun, Katharine 521–3 Gurdon, Adam 396 Gurkhas 164–5 Gurney, Sir Henry 149 Habbaniya (Iraq) 20 Hagelin, Boris Jnr 212–13 Hagelin, Boris Snr 212 Hagelin (cypher machine) 56, 78 Haig, Alexander 403–4 Halifax, Lord 24 Hall, Theodore 73 Hallock, Richard 74–5 Hamilton, Alexander 432 Hampshire, Sir Stuart 221–5, 260 Handel, Michael 362 Hankey, Lord 36 Hanley, Michael 361, 587 Hanley, William J. 305, 306 Hanslope Park (Buckinghamshire) 57, 58, 182, 185, 186, 187, 192, 196, 418 Hanssen, Robert 444 Hardy, Tim 166 Harland & Wolff 261 Harman, Harriet 368 Harrier jets 403, 404, 407, 408, 441 Harris, Robert 59 Hart, Herbert 225 Harty, Russell 359 Harvest (computer) 350 Hashmi, Jabron 535 Hastings, Edward 95 Hawaii 92 Hawkes, John 216 Hay, Malcolm 15 Hayden, Michael 508 Hayter, William 97 Healey, Denis 168, 245, 256, 399, 426, 429, 433 Heath, Edward 4, 239, 279, 315, 337, 338, 439 Heliopolis (Egypt) 92, 155, 162 Hellenbroich, Heribert 452–3 Hellman, Martin 490 Helmand province (Afghanistan) 534, 535 Helms, Richard 292, 356 Hemblys-Scales, Roger 86 Henderson, Nicholas 2–3 Hennessy, Peter 90, 577 Herman, Michael 261, 287, 419, 421, 435 Heseltine, Michael 426 Hibberson, Anthony 189 Hill, Jim 86–7 Hill, Major 120 Hillenkoeter, Roscoe 85 Hillgruber, Andreas 59 Hinsley, Harry 59, 64 Hiroshima 2 Hiss, Alger 88 Hitler, Adolf 3, 5, 29, 30, 31, 32–3, 48, 221, 290 Hoad, Norman 132 Hokkaido (Japan) 112 Holden Agreement (1942 & 1944) 43 Hollis, Sir Roger 79, 86, 182, 367 Holmberg, Elena 389–90 Home Office 507, 538, 544 Honest John (battlefield missile system) 249 Honeywell (computers) 458 Hong Kong 19, 30, 32, 96, 100, 151–5, 219, 256, 277, 419, 475–8 Hooper, Joe 191, 222, 223, 228, 273–4, 285–6, 343, 353, 419, 448, 466, 585 Hoover Commission 219 Hosenball, Mark 358 House of Commons Public Accounts Committee 440, 459 House of Commons Select Committee on Employment (1985) 433–4 Howard, Edward Lee 384, 444, 447 Howard, Michael 364 Howarth, Jack 189 Howe, Geoffrey 426, 427–8, 429, 431–2, 436, 460 Howse, Philip 79, 84 Hughes, Chief Inspector 187 Hughes, Robert D. 111 Hungary 46, 158 Hunt, Sir John 329–30, 337–8, 356–7, 361 Hunters Stones Post Office Tower 346 Hurd, Douglas 495 Hurley, Michael 144–6 Hurn, Roger 495, 526 Hussein, King 161, 164, 290 Hussein, Saddam 467, 516, 524, 525 Husum-Milstedt (intercept station, Germany) 50 Hutton, Lord 529 Huxley, Aldous 549 HVA 605 Iacobescu, Ion 253 IBM 350, 352, 489 Igloo White (ground sensors) 252 Imre, Nahit 254 Incirlik (Turkey) 326 India 4, 18, 19, 30, 32, 85, 95, 178, 334 Indonesia 153, 164–8 Information Research Department 156 Ingebrigsten, Jan 450 Ingham, Bernard 428 Inman, Bobby Ray 399, 422, 601 Intelligence Assault Units 47–8 Intelligence and Security Committee 484–5, 529, 539 Intelligence Services Act (1994) 484–5, 488 Intelligence Support Activity 168 Intelsat 342 Intercept Control Centre 250 Intercept Modernisation Programme (IMP) 543–5, 547–8 International Control Commission on Vietnam 178 International Regulations on Sigint (IRSIG) 90 International Security Assistance Force (ISAF) 533 internet 8, 488, 507–8, 541, 544–5 IRA 345, 455, 479, 481–2, 494, 498–503, 593 Iran 109, 112, 155, 268, 295, 299, 302, 421, 467, 472, 605 Iran, Shah of 299 Iraq 155, 156, 160–2, 259, 295, 320, 465–71, 479, 516–17, 528–31; 124 Electronic Warfare Regiment 525 IRSIG (Instructions and Regulations concerning the Security of Signals Intelligence) 503–4 Iscot (wartime Comintern traffic) 37–8 ISI (Pakistani intelligence service) 514 Ismailia (Egypt) 32, 185 Ismay, General Hastings ‘Pug’ 27 Israel 97, 164, 263–4, 277, 290–1, 293, 307–8, 415, 471; Israeli Sea Corps 264–5 Istanbul 307, 309, 310, 316, 318 Italy 19, 44, 52, 96, 345, 452; Italian Cryptographic Bureau 54–5 ITT (telecoms company) 341, 342 Ivy Bells (undersea cable-tapping) 384 Jakarta (Indonesia) 167, 168 Japan 17, 29, 39, 40, 44, 65, 100, 110, 152, 445, 446 Jebb, Gladwyn 64 Jenkins, Roy 51 Johnson, Lyndon B. 50, 238, 353 Johnson, Robert 346 Johnstone, Sir Charles 164 Johnstone, Colonel Hugh 327–8, 359, 360 Joint Intelligence Committee (JIC) 67; and Arab states 109; Chevaline project 440; circulation of BJs 70; collection of elint on Soviet air-defence capabilities 132; considers Soviet threats a bluff 204; Crabb incident 141–2; D-Notice affair 239; deployment of equipment in Eastern Bloc 123; failures and inaccuracies of 108, 245–6, 387–8; focus on economic, technological and scientific subjects 241; French cooperation 284–5; intelligence failures 387–8; and invasion of the Falklands 391, 395–7; and Iraq 466; Joint Intelligence Committee Far East 167; and new technology 353; and Palestine 97; and possible Soviet move inside Eastern Europe 256; rethinking of European targets 345; review of aerial and submarine surveillance 207; review of GCHQ spending 221; and Soviet invasion of Czechoslovakia 245–6; and Soviet Union 46; and surprise Soviet nuclear attacks 321; and Turkish invasion of Cyprus 319, 325; and Vienna tunnel 171; and Yemen Civil War 164 Joint Technical Services Language School (Tangmere, Surrey) 370 Jones, Eric 46, 121, 132, 142, 159, 188, 191, 197, 418, 585 Jones, Colonel H. 411 Jones, R.V. 102–3, 110, 111, 579 Jordan 157, 164, 308 Joseph, Keith 286 Jowell, Tessa 498 July Bomb Plot (1944) 221 Kabul (Afghanistan) 533 Kagnew (Ethiopia) 335–6 Kaiser, Michael 240–1 Kapustin Yar (Soviet Union) 112, 131, 301 Karadſić, Radovan 473 Karamursel (Turkey) 301 Karlshorst (Germany) 371 Katanga (Congo) 336 Kazakhstan 107 Keepnet (recording equipment) 458 Keith, Bruce 69, 93, 94 Kelly, Gerry 500 Kennan, George 177 Kennedy, Jacqueline 180 Kennedy, Paul 59 Kenya 125, 334, 370, 511 Ker, Leonard Douglas 189 Kern, Dick 449–50 Kerr, Sir Archibald Clark 84 Key Recovery (or Key Escrow) 492, 506–7 KGB (Russian secret service) 137, 230, 285, 419, 538; agents working for 36–7, 185–90, 224–5, 231–7, 354–5, 369–85; and Airborne Rafter programme 267; defections from 478–9; Eight Directorate 377; expulsion from London embassy 283–4; intercepts on 53, 96; microwave intercepts 281; and miners’ strike (1982) 368; and release of material on GCHQ 355; Sixteenth Directorate 377; surveillance operations 4, 183–5, 190–1; tapping and bugging operations 170, 173, 175–82, 193; and Tempest 216–17; and Venona Project 72–88, 98, 104 Khalid Sheikh Mohammed 514, 515 Khrushchev, Nikita 4, 140, 142, 173, 179, 180, 202, 204 kidnapping and hostage-taking 452, 513–14; in Turkey 302–19; see also terrorists, terrorism Kiev (Soviet Union) 126 Killian, James R. 219 King, Tom 426, 427 Kingsdown (Kent) 34 Kinnock, Neil 433 Kipling, Rudyard 13–14 Kirknewton airbase (Scotland) 118 Kirkpatrick, Sir Ivone 130 Kissinger, Henry 277–81, 283–4, 287–90, 292, 293, 294–7, 319, 324, 326, 329, 330, 331, 337–8, 403, 441, 444 Kizildere (Turkey) 312–19 Klemme, General 50 Klugman, James 36, 188 Knockholt (Kent) 120 Knox, Dilly 21 Kohl, Helmut 453 Kola Peninsula (Soviet Union) 118, 136 Komer, Robert 303 Korea 6 Korean War (1950–53) 99–101, 116, 118–19, 120, 129, 152, 178 Kosovo 8, 512 Kosygin, Alexei 280 Koza, Frank 517–18, 521 Kuala Lumpur (Malaysia) 150–1 Kubat, Ferit 313, 314 Kuching (Malaysia) 166 Kurchatov, Igor 107 Kurku, Ertugrul 313–14, 315 Kursk (Soviet Union) 36–7 Kuwait 465–70, 524 Kuznetsov, Pavel 183–8 La Belle discothèque (West Berlin) 457 Labuan (Malaysia) 166 Lagos, Ricardo 519 Lamphere, Robert 76–7 Lander, Stephen 494 Lange, David 444–5 Langley (Virginia) 292, 441 Laos 446 Larnaca (Cyprus) 384 Latakia (Syria) 331 Law, John 312–16, 318 Lawson, Nigel 460 Le Bailly, Louis 246, 286–7, 291, 439 Leach, Henry 395 Lebanon 161, 308 Lee, Raymond 39, 40–1 Libya 109, 295, 334, 455–8, 531; Libyan People’s Bureau (London) 455–6 Liddell, Guy 367 Light Electronic Warfare Teams (LEWTs) 534–5 Limassol (Cyprus) 325 Lindsay, Michael 151 Little, Peter 420–1 Little, Rod 402 Little Sai Wan (Hong Kong) 153, 475 Livebait (comparison of different signals) 458 Llanos, Gonzales 408 Lobban, Ian 542 Lockerbie incident (1988) 457–8, 605 Lockhart, John Bruce 171 Lockheed 476 Loehnis, Clive 31, 197, 210–11, 223, 466 Lohan, Sammy 239 Lombardo, Juan 393, 395 London bombings (2005) 532–6 London Communications Security Agency (LCSA) 103, 191–3, 210, 211, 213, 217, 585 London Communications Security Board 585 London Processing Group (LPG) 372–3 London Signals Intelligence Board 51–2, 109, 142; London Signals Intelligence Centre 69; London Signals Intelligence Committee 267, 268 Longfellow (Soviet cypher system) 78 Lonsdale, Gordon 238 Lord (Vienna tunnel code) 171 Luanda (Angola) 59, 455 Lucas, George 144, 145 Luftwaffe 26, 33–4, 35, 36, 43, 50 Luga airport (Malta) 295 Luneburg Heath (Germany) 127 Lunn, Peter 171, 172, 174 Lyalin, Oleg 283 Lyttelton, Oliver 149 MacArthur, General Douglas 45 McCormack, Alfred 45 Macdonald, Ken 543, 548 McGuinness, Martin 500 Machon, Annie 456 Mackay of Clashfern, Lord 484–5 Mackenzie King, William Lyon 94 Maclean, Donald 8, 37, 72, 73, 76, 82, 84, 87, 104, 238, 367 McManners, Hugh 409, 410 Macmillan, Harold 3–4, 143, 179, 204–7, 226, 364 McNamara, Robert 168 McNeill, Hector 224 Magdeburg (Germany) 50 Magic (Japanese cypher) 29, 39, 41, 44, 69 Maguire, Harold 268, 269 Major, John 398, 484 Makarios, Archbishop Mihail 163, 296, 320, 323–5, 328, 330 Malatya (Turkey) 306 Malaya 6, 30, 38, 125; Malayan Communist Party (MCP) 149, 150; Malayan Emergency 149–51 Malaysia see Federation of Malaysia Malinovsky, Rodion 204 Malta 156, 162, 295 Maltby, Ted 58, 79, 187 Manchester University 349 Manchuria 19 Mandelson, Peter 498 Manhattan Project (Los Alamos atomic bomb project) 75, 76, 82, 219 Manningham-Buller, Dame Eliza 515 Mao Tse-tung 4, 151, 193, 195 Marchetti, Victor 356 Marconi (company) 311 Marconi, Guglielmo 13 Marenches, Alexandre de 442 Marr-Johnson, Patrick 77 Marshall, George 42 Marshall, William 184–90 Martin, William H. 176, 355, 423 Marychurch, Peter 428, 434, 445, 448, 449, 451, 458–60 Mask operation 19 Mason, Roy 332 Mathison, Alan 25 Mauborgne, Joseph 18 Mauritius 334, 335, 338 Mazzini, Giuseppe 14 Medical Research Council 434 Mediterranean 16, 44, 114, 273, 295, 319 Meir, Golda 290–1 Menendez, Mario 412–13 Mentyukov, Igor 201–2 Menwith Hill (Yorkshire) 345–6, 347, 421, 449 Menzies, Sir Stewart 23–4, 26, 27, 28, 38, 39, 42, 45, 51–2, 55, 67, 82, 142 Methods to Improve (MTI) 220 Mexico 15, 517, 519–20 Meyer, Cord 358, 595 Meyer, John C. 271, 272 MI5 see Security Service MI6 see Secret Intelligence Service Middle East 7, 15, 16, 19–20, 32, 34, 41, 51, 97, 148, 155–64, 181, 182, 271, 277, 282, 290–5, 299, 320, 333, 334, 336, 376, 385, 454, 467, 472, 479, 494; Middle East Technical University (Ankara) 303, 304; Middle East War (1973) see Yom Kippur War Middle Six countries 519 Millward, Bill 63, 121, 221–2, 253 Milne, Alasdair 459 Milner, Ian 86 Milner-Barry, Stuart 25, 27, 364, 387 Milošević, Slobodan 473 Ministry of Defence (MoD) 240, 272, 286–7, 291, 312, 368, 423, 456, 495, 510 missiles see rockets and missiles MIT (Turkish National Intelligence Agency) 304, 314 Mitchell, Bernon F. 176, 355, 423 Mitchell, Graham 367 Mitchell, J.R. 118 Mitterrand, François 414–15 Mladić, Ratko 473, 474 mobile phones 492–3, 505, 538, 541, 548 Modin, Yuri 82–3, 84 Moffit, Bill 296–7 Molotov, Vyacheslav 178–9 Monterey (California) 332 Montgomery, Field Marshal Bernard Law 58, 85 Moon-bounce project 262–3 Morgan, Gerry 78 Moriarty, D.M. 587 Morocco 334 Morris, Gareth 433 Morwenstow (Cornwall) 342 Moscow 4, 18, 19, 30, 33, 35, 36, 37, 45, 47, 53, 59, 74, 82, 84, 86, 104, 126, 148, 151, 175, 176–8, 179, 185, 186, 189, 201, 203, 205, 284, 465; Moscow Peace Treaty (1942) 32 Mossad (Israeli secret service) 291, 299–300, 307–8, 444, 472 Mottram, Richard 577 Mount Tumbledown (Falklands) 413 Mountbatten, Lord Louis 110, 143, 192 Mowlam, Mo 500 Mubarak, Hosni 467 Mullah Dadullah 535 Muller, Wilma 127 Mullet Creek (Falklands) 397 Munich Crisis (1938) 3, 22 Murmansk (Soviet Union) 133, 143 Murray, Len 416–17, 426, 427, 428 Muslims 472, 473, 474, 537, 538, 542 Mustard (Enigma key) 35 Mutual Balanced Force Reduction programme 287–9, 319 Mutual Weapons Development Programme 211 Nagasaki (Japan) 2 Nan-Szu-Pu (Taiwan) 152 Narvik raid (1940) 55 Narwal (Argentine trawler) 407–8 Nasser, Gamal Abdel 155–6, 161, 164 National Central Electronic Reconnaissance Agency (NSEI, Croatia) 473 National Council for Civil Liberties 361 National Criminal Intelligence Service 504 National Infrastructure Security Coordination Centre 609 National Security Agency (NSA) 7; and al Qaeda 510–12; and Berlin tunnel operation 174; and BND 422–3, 438, 447–51, 452–4, 455; and Bosnian-Croatian conflict 472–5; ceases intelligence exchange with GCHQ 289–90; and commercial encryption 488, 489; cooperation with GCHQ 222–3, 278, 282–3, 346, 347–54, 438, 441–3, 448–58, 461; creation of 101–2; data silo in Utah 546; development of new systems 345–6; development of Technical Research Ships 260; and documents on Princess Diana 483; and downing of Powers’ U-2 202–3; elint and comint responsibilities 122–3; funding of 334, 346; influence on foreign policy 321; and internet 8, 508; and invasion of the Falklands 398, 399, 415; and North Korea 100; and polygraph 434; and Prime case 376; public mention of 242–3, 355, 358, 361–2; relationship with US armed services 271–2; and Russian nuclear forces 119; Russian spies in 384–5, 444; and sale of cypher machines 209–15; and strategic elint 267; and Suez crisis 157, 158; and Tempest 216–18; and trade unions at GCHQ 421–2, 424, 429; Turkish operations 300–19; use of security measures 381; visibility of 341; and Yom Kippur War 291–2 National Service 117, 153, 219, 229, 369 NATO 126, 130, 209–15, 217–18, 242, 247, 248, 253–7, 268–9, 270, 272, 283, 300, 319, 328, 345, 429, 448, 452, 456, 467, 533, 534; Military Committee 256; Nuclear Planning Group 332; Special Committee 257 Nauticus Corporation 265 Naval Intelligence 32, 116, 143 Naval Mechanics School (Buenos Aires) 389 Nave, Eric 19 Nazi-Soviet Pact (1939) 31 Neff, Paul 50, 76 Netherlands 442, 443 ‘Never Again’ agreement (1982) 440–1 New People’s Army (Philippines) 452 New Zealand 89, 90, 92, 93, 98, 164, 165, 438, 442, 444–7, 448, 487; Government Communications Security Bureau (GCSB) 445–6 Newman, Dr 145 Newman, Max 28, 70 Nicoll, Douglas 387–8, 396, 421, 529 Nicoll Report (1981) 388 Nicosia (Cyprus) 326 Nimrods 268–70, 271–4, 326, 414, 415, 442, 474, 515, 536, 537 9/11 9, 509–14, 531 Nixon, Richard M. 4, 277–8, 279, 281, 283–4, 288, 290, 293, 297–8, 304–5, 325–6, 337, 338, 434 Noakes, John 348 Noise-Induced Hearing Loss 608 Noise Investigation Bureau 110 Nokia (telecoms company) 489 Norland, Selmer 48, 78 North Atlantic Council 254 North Cape, Battle of (1943) 60 North Korea 100, 120, 129, 175, 264 Northern Ireland 329, 498–503; Peace Process 501 Northwood Hills (communications security establishment) 192, 400, 401, 402, 469 Norway 55, 99, 116–17, 134, 139, 269 Nott, John 395, 396, 397–8, 414–15, 429, 601 Noye, Kenneth 505–6 Nuclear Planning Group 255 Oakleigh Park North (Soviet-radio monitoring station, Whetstone) 190–1 O’Connor, Morris J. 144, 145 Odette (Army intercept equipment) 474, 525, 534, 536–7 Odom, William ‘Bill’ 214, 385, 413, 434, 442–4, 446–52, 454–5, 457, 458, 471, 476 Oedipus (computer) 349 Oeljeschaeger, Major 50 Office of Strategic Services 87, 91 Official Secrets Act 8, 359, 360, 363, 383, 522 oil 298, 336, 356 Okinawa (Japan) 152 OKK-5 (Soviet codebook) 35 Oldfield, Maurice 82, 358 Omagh (Northern Ireland) 501–3 Oman 271, 345 Omand, Sir David 9, 272, 398, 495–7, 498 one-time pads (encryption system) 18–19, 20, 56, 74, 81, 83, 108 Operation Citadel (1943) 36 Operation Claret (1956) 140–2 Operation Damage (Comet sorties in the Mediterranean) 273 Operation Debenture (1954) 152–3 Operation Defiant (1955) 137 Operation Desert Storm (1991) 467–9 Operation Duster (sigint flight operations during Yom Kippur War) 295 Operation Gold (1948) 97 Operation Halfmoon (1948) 96 Operation Hem (sigint flight operations during Yom Kippur War) 295 Operation Musketeer (1956) 156–9 Operation Nigeria (against journalists and their sources) 506 Operation Overlord (1944) 59 Operation Pat (Comet sorties over the Baltic) 273 Operation Sanjak (1955) 137–9 Operation Storm (1995) 472–3 Operation Tartan (1955) 136–7 Operation Trail Hammer 536 Orford Ness (Suffolk) 285–7, 322 Organ, Helena see Prime, Helena Orion (sigint satellite) 437 Ormsby Gore, David 206 Orwell, George 549 Oshima, Baron 29 Ottawa (Canada) 57, 85, 92, 94, 97 Over the Horizon Radar 285–7, 322 Owen, Dr David 299–300, 332–3, 360, 391 Padeborn (Germany) 248 Pakistan 323, 334, 384, 513–14, 519, 537 Palestine 97, 109, 155, 156, 320 Paris 21, 25, 52, 53, 158, 194–5, 243, 284–5, 510 Parker-Bowles, Camilla 480, 482 Parliamentary Select Committee on Foreign Affairs 529 Patagonia 393 Patchett, Brian 228–30, 369 Paterson, Brian 507 Pearl, Daniel 514 Pearl Harbor attack (7 December 1941) 29, 290 Peking 150, 151, 194 Pelton, Ronald 384–5, 443–4, 447 Penkovsky, Oleg 322–3 Penney, William 192 Pepper, David 526, 527, 528, 532, 539 Perkar (Ceylon) 160 Perkins, Alice 495 Permanent Secretaries Committee on the Intelligence Services (PSIS) 219–20, 241, 260, 423 Perrin, Ken 267, 270, 363 Peshawar (Pakistan) 384 Petersfield (Hampshire) 133 PGP (Pretty Good Privacy, code-making programme) 490–1 Philby, Kim 37, 82–3, 84–5, 225, 226, 238, 242, 354–5, 367, 385 Philco (telecoms company) 350 Philippines 445 Phillips, Cecil 75, 79 Pilsey Island (Sussex) 140 Pincher, Chapman 17, 226, 238, 239, 240, 242, 386 Pine Gap (Australia) 345 Pinner (Middlesex) 68, 69 Pinochet, Augusto 519 Pirinclik Air Base (Turkey) 301–2, 306 Pither, Judith 383 Plessey (telecoms company) 212, 267–8, 311, 433 PLO (Palestine Liberation Organisation) 277 Poets Systems (Soviet cypher machines) 78, 81 Poland 21–2, 31, 46, 178, 387, 421, 515 Polaris missile system 266, 322, 335, 337, 438–40 Pollard, Jonathan 444 Polyarnoe (Soviet Union) 34, 36 polygraphs 381, 383, 424–6, 433–4, 444 Port Said (Egypt) 156 Port Stanley (Falklands) 390, 397, 413 Portsmouth (Hampshire) 134 Portugal 44 Poseidon (missile system) 439 positive vetting 88, 227–8, 229, 229–30 Posner, Gerald 483 Post Hostilities Planning (PHP) Committee 46, 85 Post Office 241, 286; develops fibre-optic cables 604; Research Department (Dollis Hill) 28, 68, 171, 172, 349; ‘Secret Department’ 14 Potts, Archie 154–5 Poulden, Teddy 93, 94, 352–3, 354 Powell, Jonathan 500 Powers, Gary 8, 201–7, 208, 226 Prague 244; Prague Spring (1968) 387 Prime, Geoffrey 8, 368–86, 423, 424, 425, 444, 447, 600 Prime, Helena 374–5 Prime, Rhona 375, 378–9 Princeton University 350 Prior, James 422 Profumo affair (1963) 8, 226, 228 Project Clipeus (British ADM programme) 249 Project Cobra Shoe (US intelligence station on Cyprus) 323, 348, 356 Project K (NSA HQ) 102 Project Minaret (US illegal monitoring of domestic radicals) 357 Project Sambo (tracking low-frequency submarine radio transmissions) 378 Project Sandra (intelligence facility on Cyprus) 321–3, 348, 356 Public Interest Immunity certificates 505 Public Key Cryptography 489–93, 508, 512 Public Record Office (Kew) 355 Puerto Belgrano (Argentina) 393 Punta Arenas (Chile) 414 Purple (Japanese cypher machine) 29, 38 Purves, Peter 348 Pym, Francis 423 Pyramider satellite 377 Quinlan, Sir Michael 493 Racal (telecoms company) 401, 433, 469, 524, 590 radar 110, 126, 132, 133, 136, 138, 145, 154, 202, 266, 285–7, 301–2, 306, 406, 408, 466 Radcliffe, Lord 239–40 Radcliffe Inquiry into Security in the Civil Service (1962) 381, 418 Radio Corporation of Cuba 341 Radio Operators (GCHQ) 15, 185, 186, 228, 261, 382, 418, 419, 420, 422, 432, 435, 458 Radio Reconnaissance Teams (Afghanistan) 535 Radio Security Service 37, 58, 79, 221 Radio Warfare Special Branch 133, 134 Rainbow Warrior (Greenpeace ship) 446 Rangoon (Burma) 110 Rattan (Soviet radio intercepts) 75 RC-135 ‘Looking Glass’ aircraft 273 Reagan, Ronald 398, 403, 457 ‘Real IRA’ 501, 502 Reenan, Cyril 479, 480 Rees-Mogg, Lord William 481 Reeve, James 196, 197 Regulation of Investigatory Powers Act (RIPA) (2000) 547 Reid, John 516 Reijn, Joop van der 308 Reilly, Patrick 205, 206 rendition programmes 539–40 Rendle, John 578 Rennie, John 156 Res (reserved cypher material) 44–5 Review of Intelligence Requirements and Resources (1994) 493 Review of Intercept as Evidence (2004) 541 Rhodes, Miriam 378 Rhodesia 3, 209 Ribbentrop, Joachim von 31 Richards, Brooks 387 Richards, Francis 504, 511, 526 Riddington, Tony 598 Ridley, Nicholas 392 Rimington, Stella 372, 494, 521 Ring of Five 442–3 Ritter, Scott 470–1 Riyadh (Saudi Arabia) 513 Roake, Alfie 147, 265 Robinson (computer) 349 Robinson, Robin 493 rockets and missiles 5, 108, 110, 131, 169, 201–2, 203, 207, 266, 271, 301, 306, 315, 322–3, 335, 337, 376, 390, 439–40, 510, 511, 515, 525 Rockex (UK cypher machines) 57–8, 194 Rolf, Vic 213 Romania 52, 256, 257, 284; foreign intelligence service (DGIE) 253–4 Rome 372 Rommel, Erwin 5 Roosevelt, Franklin D. 39, 41, 47, 73, 84, 87 Rose, Michael 472, 473, 474 Rosenberg, Ethel and Julius 83 Rosenheim (Germany) 48 Roussilhe, François 254–5 Rowe, Vivian 402 Rowlands, Ted 390, 399–400, 401 Rowlett, Frank 44, 174 Rowntree Foundation 361 Royal Air Force (RAF) 369, 537: 192 Squadron (monitoring aircraft unit) 113, 122, 125, 149, 159; 199 Squadron (radio wafare unit) 113, 125, 131; invited onto Blue Peter children’s programme 348; loss of Avro Lincoln (1953) 125–9, 580; and Malayan Emergency 149–50; near-miss incidents 131; negotiations on air corridors 129–30; 100 Countermeasure Group 112; as part of GC&CS 20; RAF Akrotiri 273, 295, 296, 323, 325; RAF Brampton 469; RAF Brawdy 377; RAF Brize Norton 204, 375; RAF Celle 128; RAF Crail 369; RAF Digby 230, 231, 237; RAF Gatow 112, 370, 383; RAF Habbaniya 155, 161–2, 230; RAF Hammersley Hayes 231; RAF Lakenheath 116, 142; RAF Leconfield 126; RAF Mildenhall 257, 273, 284, 297; RAF North Luffenham 153; RAF Northolt 537; RAF Oakhanger 262; RAF Pergamos 162, 323; RAF Scharfoldendorf 128; RAF Sharjah 271; RAF Strike Command 270; RAF Upper Heyford 457; RAF Watton 112–14, 122, 125, 131, 159; RAF Wythall 153; RAF Wyton 273, 295; ‘Rock Apes’ Regiment 154; sigint and elint operations 110–14, 116–18, 121–2, 124, 131–3, 153, 154, 206, 218–19, 269–70, 272–3, 285–7; Signals Units 153, 154, 161; surveillance operations 537–8; and U-2 overflight programme 202; Y stations in Kent and Cheshire 34, 63, 111 Royal Commission on Criminal Justice Procedure 425–6 Royal Electrical and Mechanical Engineers 499 Royal Marines 390, 391, 394, 402, 411, 413, 524, 535; Y Troop 524, 525, 535 Royal Navy 159, 441, 474, 477; and Buster Crabb incident 140–2; HMS Affray 133; HMS Albion 259; HMS Anderson (sigint station in Ceylon) 69, 92, 93, 94, 160; HMS Antrim 409, 410; HMS Ardent 410; HMS Conqueror 404; HMS Coventry 406; HMS Dolphin 265; HMS Endurance 391–2, 394, 396; HMS Glamorgan 410; HMS Glasgow 406; HMS Hermes 402–3, 411; HMS Invincible 407; HMS Maidstone 139; HMS Mariner 134; HMS Mercury (RN Signals School) 133, 134, 139; HMS Pickle 134; HMS Pucklechurch 133, 134; HMS Sheffield 406; HMS Sir Galahad 400; HMS Superb 259; HMS Taciturn 144–6; HMS Totem (later Dakar) 137, 264, 265; HMS Truculent 133; HMS Truelove 134; HMS Truncheon 264, 265; HMS Turpin 135–9, 140, 143, 146–7, 264; influence on GC&CS 16; intercept sites at Scarborough and Winchester 63; Kipling story involving 13; Provost Branch 139; and radio station at Polyarnoe 34; ‘Room 40’ code-breakers 15; sigint and elint operations 6, 114, 133–9, 143–7, 218–19, 264–7 Royal Radar Establishment (Malvern) 501 Royal Ulster Constabulary (RUC) 501, 502–3; RUC Special Branch 499, 502, 503 Rumsfeld, Donald 511 Rushworth, Edward 48, 78 Russian Mafia 504 Ryolite satellites 345, 346, 376, 421 Sabah (Borneo) 165 Sabri, Naji 530 Sadat, Anwar 296 Sadi, Sener 314 Safford, Laurance 39 Samford, General 101 Samsun (Turkey) 301, 311 San Carlos Water (Falklands) 408–11 San Francisco 92 Sangin province (Afghanistan) 535 Santa Fe (Argentine submarine) 397 Sarafand (Palestine) 20, 32, 155, 162 Sarajevo (Bosnia and Herzegovina) 473, 474 Sarawak 165 Sarell, Sir Roderick 308, 312, 313, 315, 319 Saudi Arabia 164, 467, 468 Saunders, Andrew 458 Savimbi, Joseph 454 Scan Odd (airborne radar) 121 Scarborough (Yorkshire) 63 Scargill, Arthur 416 Scarman, Lord 431 Scarus (portable interception kit) 534 Schlesinger, James 294–5, 326, 329, 330, 332 Schmidt, Hans 21 Schröder, Gerhard 520 Schulze, Reinhard and Sonja 455–6 Scott-Farnie, G.R. 34 SCUD missiles 251, 468, 469 SDECE (French secret intelligence service) 442 Second World War 135, 335; end of 47–50, 59–60; events leading up to 22; and improved communications 5; and release of sigint material 355–6; Russian interceptions in 30, 31–2; sigint and code-breaking in 2, 5, 28–9, 32–46, 250 Secret Intelligence Service (SIS; MI6) 1, 57, 82, 91, 97; agents sent into the Eastern Bloc 123; at Bletchley 23, 27; and Automatic Data Processing 353; and Berlin-Vienna tunnel operations 169–76; and bungled surveillance operations 140–2; buys missiles on the open market 407; closer relationship with MI5 and GCHQ 503–4; considered organisational basket-case 24; and Cyprus radio station 156; and end of influence over sigint 142; and Enigma decypherment 21; funding of 494; move to Broadway Buildings 17; move to Century House (1966) 195; move to Vauxhall Cross 496–7; no trade unions in 417; obsession with Russia 17, 31; origins of 14; and Penkovsky 322–3; and post-war re-absorption of GC&CS 67; recruitment to 61; Section V 37; Section VIII 57–9; Section Y (Carlton Gardens) 171, 178, 372; Technical Collection Service 132; and Yemen 164 Secret Service Committee 15 Security Commission 368–9, 381–2, 384 Security Service (MI5) 1, 57, 182, 361; and Automatic Data Processing 353; Britten affair 237; bugging operations 177; closer relationship with SIS and GCHQ 503–4; and CND 368; fears concerning Communists in trade unions 418–19; funding of 494; interception of telegrams and telexes 239; and John Cairncross 37; and Libyan Embassy affair 456; no trade unions in 417; origins of 14–17; and Peter Wright 223, 224; and polygraph 433–4; and possible sub-agents 382; problems with Orford Ness 287; and sigint security 70–1; ‘Squidgygate’ affair 482; and Venona 79, 84, 85, 86; ‘watchers’ operations 183–90; and West German defections 455–6; Whetstone radio monitoring station 190–1 Selby-Bennett, Harry 134, 139 Selwyn Lloyd, John 128, 158, 159 Semipalatinsk (Soviet Union) 107, 302 Services Liaison Department 70 Sexton, Jamie 305 Seychelles 334, 335 Shanghai 19 Sharq el-Adna (radio station) 156 Shayler, David 521 Shedden, Sir Frederick 86, 92 Sheldon, Robert 459 Shergold, Harry ‘Shergy’ 142 Short, Clare 523–4 Sidewinder air-to-air missiles 441 Sigaba (US cypher machine) 98–9 Sigdasys project (improved flow of sigint to front-line units) 451, 456 Sigint Conference (1946) 95 Sigint Electronic Warfare Operation Centre (Afghanistan) 535 sigint satellites 437–8 sigint ships 259–67 Sigint/EW Operations Centre in Regional Command (South) 534 SIGMod 539 signals intelligence (sigint); in Afghanistan 534–9; airborne 121–2, 125–33, 144, 202–7, 223, 251–2, 257, 267–74, 295, 377; and allied cut-offs 444–7; American 39–40, 143–4, 271–2, 273–4; benefits of 401–2; blue jackets (BJs) 17, 70–1; bugging 176–82; cost of 218–23; Croatian success 473–5; and Cuba 341–2; cypher security 57, 191–3; in Cyprus 320–39; D-Notice affair 238–41; defections from 228–9; dependence on SAS-type activities 250–1; and ‘Dodgies’ or Mystery Trips 6; and domestic/ international blurring 344; during Cold War 1, 5, 8, 108–24, 125–47, 257–8; during WWII 2, 5, 32–46, 57–8; expansion in India 30; failures of 253–5; and Far East 148–51, 164–8; GCHQ at heart of 5–10; German 35, 49–50, 62; global alliances 89–101; ground-based 117–20, 252–3; and Gulf War (1991) 468; in Hong Kong 151–5; importance of bases 151–5, 277–8; and Indonesia-Malaya confrontation 164–8; and invasion of Czechoslovakia 245–6; and invasion of Falklands 397–415; and Iraq War (2003) 525–6; and Kipling 13–14; legalities of 344; and making/influencing of foreign policy 321; in medieval times 4; and Middle East 155–64; modern formation of 58; and political leaders 2–4, 7; and private companies 17; problem of language 512–13; public disclosure of 356–64; rethinking of targets 345; relations between Western allies 444–7; release of wartime material on 355; and rescuing of enemy matériel 47–56; risks 203; and Russians 33–8, 280–1; seaborne 114–16, 133–47, 208, 259–67, 377–8; security disasters 228–38; size of 227–8; and speed of communication 4–5; support for front-line units 449; tactical units 250–2; and Third World 169; in Turkey 300–19, 330–1; value and importance of 60, 62–71 Signals Intelligence Centre 93 Signals Intelligence Service (USA) 74 Sillitoe, Sir Percy 86, 190 Silvey, Reg 412 Simakov, Alexander 478–9 Simkin, Anthony 187 Sinclair, Hugh ‘Quex’ 16, 22, 23 Sinclair, Sir John 142 Sinews (Sigint NEW Systems) 496 Singapore 19, 40, 96, 164, 166, 167 Singleton, Valerie 348 Sinkov Mission (1941) 39 Sinn Féin 500 Sinop (Turkey) 301 Six-Day War (1967) 253, 263–4, 271, 284 Skardon, William 87, 188 Skynet (communications satellite) 347–8, 403, 408, 438 Slessor, John 190–1 Slim, Field Marshal William 65 Sly, Ken 153–4, 375 Smallwood, Sir Denis 271 Smith, F.M. 302 Smith, Ian 3 Smith, Jack 151 Smith, Jacqui 543 Smith, Rupert 474–5 Smiths Industries 495 Snow, Leading Seaman ‘Snowy’ 135 social intelligence 178–9 Solidarity (Polish trade union) 432, 465 Somerville, John 121, 317–18, 419, 420, 428 Sony 480–1 Soothsayer (Army intercept equipment) 537 SOSUS (undersea microphones) 377 South Africa 209, 446, 454 South Georgia 390, 391, 393–6, 409 South-East Asia Command 110 Southern Thule 389, 390–1 Soviet Air Force 118, 119, 360; Air Defence Command 201; Strategic Air Command 256; Strategic Rocket Force 256 Soviet Army 175, 371; General Staff 255–6 Soviet Communist Party 19, 368 Soviet Navy 114–16, 133, 256, 301; Naval Intelligence 73; Northern Fleet 136 Soviet Union 33–8, 336, 349; apparent war preparations 255–7; and Berlin-Vienna tunnel operations 169–76; and biological weapons 611; capture of German cryptographic assets 50–1; Cold War espionage 8; elint on invasion of the Falklands 401; end of Cold War 493; enters WWII 28; ‘ferret’ programmes 112; Hitler’s invasion of 29, 32–3, 290; invasion of Czechoslovakia 244–7; Italian code-breaking concerning 52, 54; nuclear weapons 107–8, 112, 114, 116; and post-war confrontation 47; raid on Arcos building 18; Red Army 46, 78, 245–6, 249, 319; release of UK intelligence material 355; secret submarine missions against 6; and ‘strayed’ aircraft 126–33; successful sigint operations against 279–81, 344, 361; Turkish (Anglo-US) operations against 301–2; UK-US obsession with 17–19, 30–2, 45–6, 321–3; and Venona Project 72–88; and Yom Kippur War 291 Spain 44, 505, 533 Special Branch 141, 150, 151, 166, 187, 453, 456, 459, 509 Special Liaison Units 57–8 Special Radio Installation Flight (SRIF) 114 Spedding, David 494 spy planes 257, 267–74, 292–3, 296–7, 538 ‘Squidgygate’ affair (1990) 479–82 SR-71 Blackbird Mach 3 reconnaissance aircraft 284, 292–3, 296–7 Stalin, Joseph 31, 33, 46, 47, 173 Standard Cable & Wireless Ltd 17 Standard Telegraph & Cable Ltd 342 Stankovic, Milos 473 Stanmore (Middlesex) 62, 68 Stannard, Robert ‘Fred’ 210–11, 213, 218, 242 Starmer, Keir 543 State Research Association 361 stay-behind patrols 247–50 Stella Polaris (sale of Russian codebooks) 91 Stephanie operation (Canadian embassy intercepts in Moscow) 280–1 Stephenson, Sir Hugh 207, 221 Stevens, Geoffrey 40, 45, 50, 94 Stewart, Brian 353 Stewart, Michael 228 Stockholm 192 Straw, Jack 505, 519 Stripp, Alan 109 submarines 6, 114–17, 125, 133–9, 142–7, 197, 259, 264–7, 337, 377–8, 384, 397, 404 Suez Crisis (1956) 156–9, 160, 181, 182, 213 Sugar (Vienna tunnel code) 171 Sugar Grove (West Virginia) 262 Suharto, President 168 Sukarno, President 164, 165, 167–8 Sunay, Cevdet 311 Super Antelope programme (modernising/upgrading Polaris submarines) 337 Supreme Allied Commander Europe (SACEUR) 256 surveillance operations 4, 183–90, 197, 201–7, 208–9, 247–53, 292–3, 295, 296–7, 322, 368, 406, 421, 472, 480–1, 500, 506, 537–8, 540–50 SUSLO (Special United States Liaison Officer based in UK) 381 Sutton Common (Cheshire) 500 Sweden 31, 212, 214, 269 Switzerland 52, 212, 214, 215, 457, 492 Sykes, Richard 297, 298, 335, 593 Syria 156, 157, 271, 291, 300, 301–2, 304, 308, 336, 344 Tai Mo Shan (New Territories) 154 Taipei 195 Taiwan 152, 195, 323 Taliban 535, 537 Tanzania 511 Taper (Soviet cypher traffic) 54, 108 Tartus (Syria) 331 TASS News Agency 190 Taylor, Telford 43 Tebbit, Kevin 498, 504 Technical Committee of London Signals Intelligence Committee 267 Technical Radio Interception Committee 131 Tedder, Lord 5 Tel Aviv 157–8, 180 telephone tapping and intercepts 170–6, 180, 244–5, 299, 340, 341–6, 376, 377, 474–5, 479–83, 486, 499, 500–1, 523, 541–5 Tempest (radiation/emanation phenomenon) 209, 215–18 Templer, Sir Gerald 150, 219 terrorists, terrorism 9, 168, 277, 307, 320–1, 452, 531; and 9/11 509–15; domestic 539; and Heathrow plot (2003) 515–16; and IRA 498–503; Libyan 455–8; see also kidnapping and hostage-taking Teufelsberg (Germany) 478 Thatcher, Margaret 8; and Falklands conflict 298, 396, 400, 403–4; and mole-mania 363, 367; 1987 general election 433; obsession with secrecy 492; and polygraph 434; and removal of trade unions from GCHQ 415, 416–17, 423, 425, 426, 427, 428, 429, 430–1, 435; and tightening of the Official Secrets Act 363; and Zircon project 442, 460 Third World 203, 259, 334 Thistlethwaite, Dick 255 Thomas, Richard 544 Thomas, Teddy 234 Thompson, Julian 402, 410–12 Thompson, Ralph 94 Thompson-CSF (arms company) 489 Thomson, Mike 131 Thorneycroft, Peter 163 Thorpe, Peter 535 Tiananmen Square massacre (1989) 476 Tickell, Crispin 290 TICOM (Target Intelligence Committee) teams 48–56, 76, 78 Tiltman, John 19, 31–2, 42, 44, 67, 78, 79, 96, 213 Tirpitz (German battleship) 35 Titchner, Lambert 186 Tito, Josip 4 Tomlinson, Richard 521 Tonkin, Derek 330, 333 Tornado Multi-Role Combat Aircraft 345 Toumlin, George 432 Tovey, Brian 167, 414, 415, 421–2, 423, 424, 428, 433, 442, 448, 461, 490 trade unions 317, 368, 389, 416–36, 497–8 Trades Union Congress (TUC) 416, 417, 419, 426, 427, 509 Travis, Edward 27, 28, 36, 43, 48, 49, 53, 56, 60, 67–9, 69, 92, 94, 101, 121 Trawlerman (DIS computer scheme) 527–8 Trend, Burke 221, 240, 241, 242, 269–70, 288, 322–3, 354, 364 Trevor-Roper, Hugh 221 Tromsø 134 Truman, Harry S. 73, 85, 91, 101, 108, 109, 116 TRW Inc (telecoms company) 377 Tryst operation (British Embassy intercepts in Moscow) 280–1 ‘Tunny’ (German cypher machine) 28, 349 Turing, Alan 2, 25, 27, 349, 492 Turkey 52, 109, 131–2, 157, 268, 269, 299–319, 325–8, 330–1, 334, 338, 357, 423, 472; Air Force 312–13, 313; Army 315; Foreign Ministry 312–13 Turkish People’s Liberation Army (TPLA) 300, 303–19 Turkish People’s Liberation Front (TPLF) 300, 308–10, 312 Turnbull, Andrew 524 Turner, Charles 312–16, 318 TUSLOG (US Logistics Organisation in Turkey) 302 Tuxedo (British nuclear weapons stockpile in Cyprus) 163 25 Mayo (Argentine aircraft carrier) 404 Typex (UK cypher machine) 56, 98 Tyuratam (Soviet Union) 306 U-2 spy planes 142, 226, 292, 296, 332, 471 UK-USA Technical Conference (1946) 95 Ukraine 472, 533 UKUSA (UK-USA signals intelligence agreements) 7, 213, 241, 273, 376, 577; combined comsec/sigint agencies 242; and deterioration of Anglo-US relationship 285; development of 89–95; and elint 111; existence of 1948 aagreement 577; and GCHQ 95–9, 222; and Hong Kong 152; and Israel 471; and Korea 99–101; and satellite collection 437–8; second-party members 444, 447; standardisation of equipment in 424; third-party members 209, 447, 452; and tightening of security 381; value of British Empire to 149 Ultra (WWII decrypts) 1, 24, 26, 32–8, 41, 42, 43, 57, 59, 60, 62, 72–3, 113, 354, 362, 363 Underwater Development Establishment 145 Unit 8200 (Israel sigint agency) 470 United Nations 66, 295, 336, 445–6, 472, 523–4; Monitoring, Inspection and Verification Commission 520; Protection Force 472; Security Council 517, 522; Security Council Resolution 1373 511–12; Special Commission (UNSCOM) 470–1 United States; and Cold War espionage 8; Communications Intelligence Board 97, 152; cyphers worked on by GC&CS 17, 29; Department of Defense 295; Division of Scientific Intelligence 322; Europe Command 180; Foreign Intelligence Advisory Board 263; Information Service 305; National Photographic Intelligence Center 296; National Reconnaissance Office 449, 458; National Security Council 334; and proposed German-Mexican alliance 15; and UKUSA intelligence treaty 89 University of Pennsylvania 426 Unye (Turkey) 313, 316 US Air Force 96, 101, 129, 152; 47th Radio Squadron 118; Griffiss Air Force Base (New York) 292; Johnson Air Force Base (North Carolina) 293; Security Service 118, 120, 301; Strategic Air Command 272 US Army 39, 40, 42, 43, 44, 52, 74–5, 77, 91, 94, 99, 102, 336, 413, 474; Intelligence Support Activity 452; Marines 525; Security Agency 99, 152, 302, 345–6; Seventh Army Corps 467; Special Forces 249; US Army Air Force 110–11 US Navy 39, 40, 42, 43, 75, 91, 97, 99, 143, 207; US Naval Intelligence 157; Radio Research Station Program 262; Security Group 115, 301; Sixth Fleet 323–4; USS Belmont 260; USS Cochino 112–17, 135; USS Georgetown 260; USS Jamestown 260; USS Liberty 260, 263–4; USS Muller 260; USS Oxford 260; USS Pueblo 260, 264; USS Stickleback 143; USS Tusk 114–15; USS Valdez 260, 605; USS Vincennes 408 USM-49 (US sigint base in Turkey) 303 Vampire (UK intercept unit) 474, 534 ‘Vasiley’ (KGB officer) 232–4 Vass, Sir Douglas 423 Vassall, John 226, 238 Vatican 52 Venona project (intercepted Russian messages) 445–6; and Anglo-American collaboration 72, 78–80; and British Commonwealth 85–8; exploitation of reprinted pages 74–5; and exposure of agents 80–8; extreme secrecy of 73, 77–8; first code-breaks 75–6; and global sigint 90, 94, 98; and Manhattan Project 76; size and importance of 72–3; Soviets alerted to work on 73, 80–1 Vernon, Mike 422, 423 Viehoff (Germany) 50 Vienna 169, 170–1, 172, 372, 373, 375, 376 Vienna Summit (1961) 180 Vietnam 153, 167, 168, 178, 203, 376, 446 Vietnam War 123, 243, 252, 269, 271–2, 277, 279–80, 298, 356, 387 Virgin 545 Vladivostok 129 Voice of Egypt (radio station) 156 Wait, Dave 385–6 Wal Bin Chang 153 Waldegrave, William 429 Walker, John 264, 377, 384, 447 Walker, Walter 165, 166 War Office 22 War on Terror 533, 539–40 Warsaw Pact 114, 244, 245, 247, 248, 251, 253, 257–8, 319, 321, 369, 402, 465 Washington 7, 38, 39, 40, 41, 42, 43, 44, 45, 47, 57, 64, 74, 77, 82, 83, 90, 92, 96, 97, 99, 101, 102, 111, 119, 121, 143, 151, 157, 203, 205, 212, 243, 253, 292, 325, 329, 335, 355–6, 381, 413 Watchkeeper 450 drone 536 Watergate House (London) 15–16 Watergate scandal (1973) 4, 279, 288, 290, 293, 297, 298, 325–6, 356 Wavendon Manor (radio station, Buckinghamshire) 49 weapons of mass destruction (WMD) 516, 520, 523, 526, 528–31 Weatherill, Bernard 459 Weinberger, Casper 441 Weisband, William 80–1, 169 Welchman, Gordon 25, 26, 27, 43, 57, 61, 64, 65, 362–3, 364, 387 Wenger, Joseph 42, 53, 79, 95, 243 West Germany 345, 442, 447–9, 455–6 West Irian 167 West, Lord 544 West, Nigel 88 Western Union 240 Whaddon Hall (Buckinghamshire) 23, 57, 181 Wharfe, Ken 483 White, Ray 501 White, Sir Dick 142, 176, 181, 187, 225, 241–2, 243, 245, 246, 264, 285–6, 353, 354, 364, 453 Whitelaw, Willie 404, 426, 427 Wieck, George 214 Wiesbaden (Germany) 158 Wigg, George 227–8, 240 Wilkes, Detective Sergeant 378 Wilkinson, Peter 206 Williams, Sir Anthony 392–3 Wilson, Edmund 42, 54, 57, 68, 576 Wilson, Harold 225; and Anglo-US relations 356–7; antagonism towards the press 239, 242; and Chevaline project 440; and Cyprus problem 325, 329; and Diego Garcia 338; fascinated and terrified by intelligence and espionage 3, 168, 226–7, 357; and Radcliffe Committee 239–40; and Skynet 438; and U-2 flights from Cyprus 295–6; and Vietnam War 277 Wilson, Jim 292 Wilson, Richard 527 Winnifrith, John 418 Winterbotham, Frederick 35, 354 Wolfenden, Jack 383 Woodward, Admiral Sandy 402–3, 407, 408, 410–11 Wormwood Scrubs prison 238, 385–6 Wreford-Brown, Christopher 404–5 Wright, Georgina 317 Wright, Peter 216, 223, 224, 267, 363, 492, 538, 587–8 Wyllie, Sean 490 Y services (armed forces listening units) 26–7, 33–5, 63, 68, 103, 111, 117, 411 Yarallakos (Cyprus) 320, 328 Yardley, Herbert O. 38 Yemen 148, 163–4 Yom Kippur War (1973) 277, 290–5, 320, 337, 387 York, Duchess of 482 Young, Courtney 86 Yugoslavia 256, 257, 284, 471–5, 503, 512, 534 Yunnan (China) 151 ‘Yuri’ (KGB officer) 231–3 ‘Zhora’ (Weisband’s code name) 80–1 Zimmermann, Phil 490–1 Zimmermann Telegram (1917) 15 Zinnia (missile-detection system) 322–3 Zinser, Aguilar 519–20 Zionist movement 97, 109 Zircon project (GCHQ sigint satellite) 415, 438, 442–3, 449–50, 458–61 Acknowledgements On 9 December 1993 the Lord Chancellor, Lord Mackay of Clashfern, introduced the Intelligence Services Act in the House of Lords.

pages: 840 words: 224,391

Goliath: Life and Loathing in Greater Israel
by Max Blumenthal
Published 27 Nov 2012

The exclusive environment was largely the byproduct of the influence of Israeli army’s Unit 8200, a hyper-secretive cyber-warfare division that trained soldiers in the dark arts of surveillance and hacking before sending them off into the job market. As Tobias Buck reported in Financial Times, “One important reason for the ubiquity of 8200 alumni in the high-tech sector is personal connections. Many Israeli start-ups are founded by men and women who worked together in the unit. When hiring new engineers and programmers, [start-up founders] typically turn to their former unit [Unit 8200], safe in the knowledge that the military has invested heavily in selecting and training its recruits.”

pages: 364 words: 99,897

The Industries of the Future
by Alec Ross
Published 2 Feb 2016

Europe’s first cybersecurity accelerator, CyLon, was cofounded by two top foreign policy aides to British prime ministers. One of the world’s largest cybersecurity companies, Kaspersky Lab, is full of former Russian military and intelligence officers. Israel has many of the best cybersecurity firms, founded by people who got their start in cyber in the Israeli Defense Forces, especially Unit 8200, Yehida Shmoneh-Matayim, the intelligence corps focused on signals intelligence. In robotics, domain expertise and the early commercial leadership is generally concentrated where there is preexisting domain expertise in electronics and advanced manufacturing—in countries like Japan, South Korea, and Germany.

pages: 363 words: 105,039

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
by Andy Greenberg
Published 5 Nov 2019

It was a tantalizing notion: a piece of code designed to kneecap Iran’s nuclear program as effectively as an act of physical sabotage, carried out deep in the heart of Natanz, and without the risks or collateral damage of a full-blown military attack. Together with the NSA’s elite offensive hacking team, then known as Tailored Access Operations, or TAO, and the Israeli cybersecurity team known as Unit 8200, the Pentagon’s Strategic Command began developing a piece of malware unlike any before. It would be capable of not simply disrupting critical equipment in Natanz but destroying it. By 2007, a collection of Department of Energy national labs had obtained the same P1 centrifuges the Iranians were using, gleaming cylinders as thick as a telephone pole and nearly six and a half feet tall.

Reset
by Ronald J. Deibert
Published 14 Aug 2020

The “intellectual property” of a spyware company like NSO Group consists of methods for taking advantage of these multiple networked connections, and finding and exploiting weak points in the constantly mutating and highly insecure digital infrastructure on which people like Omar depend. Surveillance companies employ thousands of well-paid, highly trained engineers to constantly scour operating systems, software, applications, hardware, platforms, routers, and networks for insecurities (in the case of NSO Group, many of them are veterans of Israel’s sophisticated Unit 8200 signals intelligence group). For their part, targets like Omar lack capacity and resources to defend themselves. They are entirely dependent on consumer products made by technology companies for whom security is often an afterthought, intentionally designed to extract as much data as possible from their customers and follow them around wherever they go.

pages: 394 words: 117,982

The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age
by David E. Sanger
Published 18 Jun 2018

But he was a realist, and knew that the accidental revelation and dissemination of the Stuxnet worm meant the story was not going to disappear. For the CIA, that day’s meeting was an exercise in learning what I had learned, and in directing damage control. Operation Olympic Games was largely the work of the NSA and Israel’s Unit 8200, its military cyber operation. But the CIA, I had learned over time, played a key part, executing a presidential authorization for covert action—known in Washington as a “finding”—to slow Iran’s nuclear program. Because “findings” are secret and intended to be denied publicly, I had no expectation that the agency officials I saw that day would acknowledge their role in deploying the weapon, much less the subsequent destruction of roughly one thousand centrifuges that had been spinning beneath the Iranian desert.

Spies, Lies, and Algorithms: The History and Future of American Intelligence
by Amy B. Zegart
Published 6 Nov 2021

Cartwright, who was then in charge of American nuclear deterrence, had been thinking about new technologies. What if the United States attacked Iran’s centrifuges with a cyberweapon?98 The result was Stuxnet, the most sophisticated cyber weapon in the world, with code fifty times larger than typical malware.99 The CIA, the NSA, and Israel’s elite cyber Unit 8200 reportedly joined forces.100 Forensics revealed that Stuxnet used four rare and valuable “zero day” vulnerabilities (coding flaws unknown to security researchers or software vendors) to find the precise software operating Iran’s centrifuges, spread inside, hide, and destroy without a trace.101 Still, the operation needed humans.

pages: 693 words: 169,849

The Aristocracy of Talent: How Meritocracy Made the Modern World
by Adrian Wooldridge
Published 2 Jun 2021

Abolishing mortgage-interest tax deduction, which helps already wealthy people to buy homes, would allow the government to increase the size of its housing programmes for the poor without putting more pressure on the Exchequer.40 With a bit of imagination new technology can also be used to equalize life chances. During the Second World War, Bletchley Park did an impressive job of discovering untapped female talent by recruiting people who could solve crosswords and other puzzles. Unit 8200 of the Israeli Defense Forces, an elite cyber-security group that is so exclusive global companies such as Google and Facebook compete to hire ‘graduates’ of the unit without expecting them to bother with university, does something similar today. The unit monitors children’s performance in video games in the hope of identifying exceptional young people who aren’t much interested in schoolwork but can produce remarkable scores.