Media

 

Listening In - Electronic Eavesdropping in the Cold War Era

Introduction

During the Cold War, intelligence services on each side of the conflict attempted to gather as much information as possible on their opponent's capabilities and intentions. From 1955 to 1985, a number of U.S. embassies were penetrated by listening devices, primarily wired microphones and radio transmitters. Teams of specially trained engineers were sent out to hunt for these devices, carrying specialized equipment to inspect for "bugs". These examples were used by U.S. Department of State countermeasures teams during the Cold War. Also depicted were wired microphones and models of transmitters recovered during that period.

Read the full article

 

Technical Specification for Construction and Management of Sensitive Compartmented Information Facilities

Purpose

This Intelligence Community (IC) Technical Specification sets forth the physical and technical security specifications and best practices for meeting standards of Intelligence Community Standard (ICS) 705-1 (Physical and Technical Standards for Sensitive Compartmented Information Facilities). When the technical specifications herein are applied to new construction and renovations of Sensitive Compartmented Information Facilities (SCIFs), they shall satisfy the standards outlined in ICS 705-1 to enable uniform and reciprocal use across all IC elements and to assure information sharing to the greatest extent possible. This document is the implementing specification for Intelligence Community Directive (ICD) 705, Physical and Technical Security Standards for Sensitive Compartmented Information Facilities (ICS-705-1) and Standards for Accreditation and Reciprocal Use of Sensitive Compartmented Information Facilities (ICS-705-2) and supersedes Director of Central Intelligence Directive (DCID) 6/9.

The specifications contained herein will facilitate the protection of Sensitive Compartmented Information (SCI) against compromising emanations, inadvertent observation and disclosure by unauthorized persons, and the detection of unauthorized entry.

Applicability

IC Elements shall fully implement this standard within 180 days of its signature.

SCIFs that have been de-accredited but controlled at the SECRET level (IAW 32 Code of Federal Regulations (CFR) parts 2001 and 2004) for less than one year may be reaccredited one time using the previous standard. The IC SCIF repository shall indicate that the accreditation was based upon the previous standards.

Read the full document

 

The Spying Game - "Walls Have Ears"

 

Understanding TSCM - Red Balloon by Charles Taylor