home *** CD-ROM | disk | FTP | other *** search
-
-
- "How The Soviets Are Bugging America"
- -------------------------------------
-
- By Sen. Daniel Patrick Moynihan
-
- From Popular Mechanics, April 1987
-
- Soviet agents may be listening to your personal telephone
- conversations. If you're involved in the government, in the
- defense industry or in sensitive scientific activity, there
- is a good chance they are.
-
- In fact, a recent unclassified Senate Intelligence
- Committee report on counterintelligence indicates more than
- half of all telephone calls in the United States made over
- any distance are vulnerable to interception. Every American
- has a right to know this.
-
- You should also know that the Reagan administration has
- recognized this threat for a long time now, but so far, the
- bureaucratic response has been piecemeal, and at times
- reluctant.
-
- Consider this as background: In 1975, when I was named
- permanent U.S. representative to the United Nations, Vice
- President Nelson Rockefeller summoned me to his office in the
- Old Executive Office Building. There was something urgent he
- had to tell me. The first thing I must know about the United
- Nations, he said, is that the Soviets would be listening to
- every call I made from our mission and from the ambassador's
- suite in the Waldorf Towers. I thought this a very deep
- secret, and treated it as such. Only later did I learn that
- Rockefeller had publicly reported this intelligence breach to
- the president in June 1975. The Rockefeller "Report to the
- President on CIA Activities Within the United States" notes:
-
- "We believe these countries (communist bloc) can monitor
- and record thousands of private telephone conversations.
- Americans have the right to be uneasy if not seriously
- disturbed at the real possibility that their personal and
- business activities, which they discuss freely over the
- telephone, could be recorded and analyzed by agents of
- foreign powers."
-
- The Soviets conduct this eavesdropping from their
- "diplomatic" facilities in New York City; Glen Cove, Long
- Island; San Francisco; and Washington. By some estimates,
- they have been doing so since 1958. President Reagan knows
- this well. He sat on the Rockefeller Commission and signed
- its final report concluding that such covert activities
- existed.
-
- If we had any doubts about this eavesdropping effort,
- Arkady Schevchenko dispelled them when he came over in 1975
- and subsequently defected in 1978. As you will recall,
- Schevchenko was, at the time, the second-ranking Soviet at
- the United Nations and an up-and-comer in the Soviet
- hierarchy. He describes the listening operation in New York
- City in his book "Breaking With Moscow": "The rooftops at
- Glen Cove, the apartment building in Riverdale, and the
- Mission are bristled with antennas for listening to American
- conversations."
-
- But we have to worry about more than just parabolic dish
- antennas tucked behind the curtains in the Soviet "apartment"
- building in Riverdale, New York.
-
- There are also those Russian trawlers that travel up and
- down our coast. They are fishing, but fishing for what?
- Communications. And now the Soviets have taken their
- eavesdropping a step further and have built two new classes
- of AGI, or Auxiliary Gathering Intelligence, vessels. From
- the hull up, these new vessels are floating antennas, I
- suppose.
-
- Most dangerous of all, perhaps, is the Soviet listening
- complex in Lourdes, Cuba, just outside of Havana. This
- facility is the largest such Soviet listening facility
- outside its national territory. According to the president,
- it "has grown by more than 60 percent in size and capability
- during the past decade."
-
- Lourdes allows instant communications with Moscow, and is
- manned by 2100 Soviet technicians. 2100!
-
- By comparison, our Department of State numbers some 4400
- Foreign Service Officers - total.
-
- Again, to cite the recent Senate Intelligence Committee
- report: "The massive Soviet surveillance efforts from Cuba
- and elsewhere demonstrate ... that the Soviet intelligence
- payoff from the interception of unsecured communications is
- immense." Intelligence specialists are not prone to
- exaggeration, they do not last long that way. You can be
- assured that "massive" and "immense" are not subtle words as
- used in this context.
-
- There are, however, two things you should know.
-
- First, our most secret government messages are now
- protected from interception or are scrambled, and all
- classified message and data communications are secure. In
- addition, protected communications zones are being
- established in Washington, San Francisco and New York by
- rerouting most government circuits and by encrypting
- microwave links which continue to be vulnerable to intercept.
- But there are still communications links which carry
- unclassified, but sensitive, information that we need to
- protect.
-
- Second, it is a truism in the intelligence field that
- while bits of information may be unclassified, in aggregate
- they can present a classified whole. The Senate Intelligence
- Committee informs us, "Due to inherent human weakness,
- government and contractor officials, at all levels,
- inevitable fail to follow strict security rules ... Security
- briefings and penalties were simply not adequate to prevent
- discussion of classified information on open lines." If the
- Soviets CAN piece it together, you must assume they WILL
- given the resources they invest toward this effort.
-
- But the intelligence community needs no reminder that we
- are up against a determined and crafty opponent. In 1983, for
- example, a delegation of Soviet scientists were invited to
- tour a Grumman plant on Long Island. No cameras. No notes.
- All secure, right? Wrong. The delegation had attached
- adhesive tape to the soles of their shoes to gather metal
- fragments from the plant floor for further study at home. The
- Soviets are pretty good at metallurgy - probably the best in
- the world - and we don't need to help them any further.
-
- But concern is not always translated into budgetary
- action, at least not in the realm of communications security.
- Let us take a look at the technical problem confronting us.
-
- As you know, there are two basic ways voice can be
- transmitted over telephone media: digital and analog. Analog
- refers to voice waves which are modulated (amplified) up to a
- very high frequency (HF). That is, they are increased in
- speed from hundreds of cycles per second to thousands of
- cycles per second. This facilitates their passage over
- distance.
-
- Nevertheless, because analog radio waves diminish rapidly
- over distance, it's necessary to periodically amplify, or
- boost, the signal either at a microwave relay tower repeater
- or satellite transponder. (Actually, the signals are
- diminished in frequency to voice quality and then brought
- back up to high frequency.)
-
- Digital transmissions are voice or data vibration signals
- which are converted into a series of on-and-off pulses, zeros
- and ones, as in a computer. Like analog telephone calls,
- digital calls go through a process of modulation and
- demodulation.
-
- For the purposes of this discussion, we need only
- remember two things about analog and digital telephony.
-
- First, analog telephony is fast being replaced by digital
- telephony because it better translates computer language.
- But, more importantly, after a high initial overhaul cost,
- it's possible to send thousands of digital calls (bundles)
- over a single conduit. Therefore, as we expand our digital
- capacity, we must ensure that both our analog and digital
- communications are protected from Soviet eavesdropping.
-
- Second, sending bundles over a single conduit is the base
- block at which we introduce the encryption I am talking
- about.
-
- When you place a long-distance telephone call from point
- A to point B, there are three communications paths, or
- circuits, over which your call might travel: microwave,
- satellite or cable.
-
- Cable is the most secure. However, it is the least
- practical and economical method for bulk transmission over
- long distances. As a result, 90 percent of our long-distance
- telephone traffic is sent by microwave or satellite, and that
- which is in the air can be readily intercepted.
-
- As your signal travels along the cable from your home to
- the local switching station and then on to a long-haul
- switching station, it is combined (stacked and bundled might
- better describe the process) with as many as 1200 other
- signals trying to get to the same region of the country.
-
- This system of stacking and bundling signals is called
- multiplexing and it's how the telecommunications industry
- gets around the problem of 7 million New Yorkers all trying
- to call their senator at the same time on the same copper
- wire or radio frequency.
-
- If you use a common carrier, that is, if you have not
- rented a dedicated channel from a telecommunications company,
- a computer at the long-haul switching station will select the
- first available route to establish a circuit over which your
- call signals may travel.
-
- Therefore, calls that the caller believes to be on less
- vulnerable circuits may be automatically switched to more
- vulnerable ones. All this takes place in 1 to 3 seconds.
-
- So let's follow your call as it goes by either microwave
- or satellite.
-
- If your call goes via microwave, it will be relayed
- across the country as a radio wave in about 25-mile intervals
- from tower to tower (watch for the towers the next time you
- drive on an interstate route) until it eventually reaches a
- distant switching station where it is unlinked from the other
- signals, passed over cable to your friend's telephone, and
- converted back into voice.
-
- The problem with this system: Along these microwave paths
- there is what we call "spill". This measures about 12.5
- meters in width and the full 25 miles between towers. This is
- where the microwave signal is most at risk. Using a well-
- aimed parabolic dish antenna (located, let's say, on the top
- of Mount Alto, one of the highest hills in the District of
- Columbia, and the site of the new Soviet embassy) you can
- intercept this signal and pull it in. And that is just what
- the Soviets are doing.
-
- My solution: Throw the bastards out if they are listening
- to our microwave signals. Nothing technical about it. On
- three occasions I have introduced legislation requiring the
- president to do just that, unless in doing so, he might
- compromise an intelligence source. On June 7, 1985, this
- measure was adopted by the Senate as Title VII to the Foreign
- Relations Authorization Bill, but it was dropped in
- conference with the House of Representatives at the urging of
- the administration.
-
- Nevertheless, I think the administration accepted the
- simple logic behind the proposal when at the end of October,
- 55 Soviet diplomats were ordered to leave the country,
- including, The New York Times tells us, "operatives for
- intercepting communications." Now, let's not let the Soviets
- just replace one agent with another.
-
- The process is much the same for a satellite telephone
- call. Today, approximately eight telecommunications carriers
- offer satellite service using something like 25 satellites.
- Let's suppose your signal has traveled to a long-haul
- switching station and all microwave paths are filled. The
- carrier's computer searches for an alternative path to send
- the signal and picks out a satellite connection. At the
- ground station, your call is sent by a transponder up to a
- satellite and then down again to a distant ground station.
-
- Using an array of satellite dishes at Lourdes, the
- Soviets can seize these signals from the sky just as a
- backyard satellite dish can pull in television (and
- telephone) signals. High speed computers then sort through
- the calls and identify topics and numbers of particular
- interest. And if the information provided is real time
- intelligence, the Soviets have the ability to transmit it
- instantaneously to Moscow. And yes, the Soviets have the
- range at Lourdes to grasp our satellite transmissions as they
- travel from New York to Los Angeles or Washington to Omaha.
-
- Here, too, there is a solution: Develop and procure
- cryptographic hardware for use at the common-carrier long-
- haul switching stations. This hardware will encrypt the
- multiplexed telephone signals (that is, approximately 1200
- calls at a time) before they are transmitted as radio waves
- from ground station to ground station, a technique analogous
- to the cable networks scrambling their signals. This can be
- done for under $1 billion. If we start by encrypting just
- those unclassified signals we categorize as sensitive, those
- having greatest impact on the national defense or foreign
- relations of the U.S. government, it would cost us about half
- as much. It would cost us so much more not to do so.
-
- Communications security has no constituency. There is no
- tangible product and the public can never really be sure that
- we have done anything. But National Security Decision
- Directive 145 says it is a national policy and the national
- responsibility to offer assistance to the private sector in
- protecting communications. It's time to make communications
- security (ComSec in the lingo) a true national security
- priority supported with resources as well as rhetoric. This
- was certainly the conclusion of the comprehensive
- Intelligence Committee report.
-
- I agree, and have suggested a way to get on with it. If
- someone has a better idea - if you have another idea - I
- would be happy to know it. The important thing is that we
- stop this massive leak of sensitive information and protect
- your privacy.
-
-
-
-