NATIONAL SECURITY AGENCY

Signals Intelligence (SIGINT)

A - G

 

Click for materials dealing with U.S.-Chinese cooperation in Sigint activities.

Aid, Matthew M. "All Glory Is Fleeting: Sigint and the Fight against International Terrorism." Intelligence and National Security 18, no. 4 (Winter 2003): 72-120.

The author points to some lessons learned from reviewing the performance of U.S. intelligence prior to 9/11: (1) "an urgent need for more clandestine or unconventional Sigint collection resources"; (2) a need for intelligence services to "break down the barriers that have historically existed between Humint agencies and Sigint services"; (3) "the critical need to improve Sigint's ability to handle the ever-increasing volume of communications traffic being intercepted"; (4) a need for "Sigint processing, reporting and analysis [to] become faster and more efficient"; and (5) a need for "international cooperation among national Sigint agencies," especially in Europe.

Aid, Matthew M. "In the Right Place at the Right Time: US Signals Intelligence Relations with Scandinavia, 1945-1960." Journal of Strategic Studies 29, no. 4 (Aug. 2006): 575-605.

From abstract: "US-Scandinavian intelligence relations in general, and Signals Intelligence (Sigint) relations in particular, during the period 1945 through 1960 were more extensive and complicated than had previously been believed.... This paper covers the quantity, quality, and types of intelligence information provided to the US by each of the Scandinavian nations [Norway, Denmark, and Sweden], demonstrating that the nature of US intelligence relations with these countries changed substantially as time went by."

Aid, Matthew M., and Cees Wiebes, eds.

Click for Table of Contents.

1. "Special Issue on 'Secrets of Signals Intelligence during the Cold War and Beyond.'" Intelligence and National Security 16, no. 1 (Spring 2001): Entire issue.

2. Secrets of Signals Intelligence during the Cold War and Beyond. London and Portland, OR: Frank Cass, 2001.

This volume comes out of a conference on "The Importance of Sigint in Western Europe during the Cold War 1945-1999," organized by the Netherlands Intelligence Studies Association (NISA) in Amsterdam in November 1999. ("Preface")

For Jonkers, Intelligencer 13.1, this work is "very useful for understanding the worldwide intelligence world." The editors provide "a series of essays covering the US, British, Canadian, German, French, Danish, Norwegian, Swedish and Dutch SIGINT services and liaison programs." Kruh, Cryptologia 26.2, sees "[t]his excellent book" as providing "an abundance of interesting information." It "should be read leisurely for maximum enjoyment."

Alvarez, David. "Behind Venona: American Signals Intelligence in the Early Cold War." Intelligence and National Security 14, no. 2 (Summer 1999): 179-186.

A collection of documents at the National Archives from the records of the Chief of Naval Operations in the period 1947-1949 suggests that "there remains a range of still secret Sigint operations that were central to the intelligence history of the early Cold War."

Ball, Desmond J. Signals Intelligence in the Post-Cold War Era: Developments in the Asia-Pacific Region. Singapore: Institute of Southeast Asian Studies, 1993.

Bienk, Dieter, and Christoph Nehrkorn. "Wideband Sensor Systems Revolutionise HF COMINT." Military Technology, May 1998, 19-23.

"The HF frequency band is employed by both military and civil organisations for strategic, operational and tactical radio communication.... Because of the significance of the transmitted information, this frequency range is of great importance for communications surveillance (COMINT) activities."

Brewin, Bob. "Web Docs Show NSA Forecast Bloody Tet Offensive." Federal Computer Week, 2 Oct. 1998. [http://www.fcw.com]

According to Ford, CIA and the Vietnam Policy Makers (1998), "[i]ntercepts of enemy radio communications collected and collated" by NSA "provided U.S. commanders in Vietnam with more than two weeks' notice of the bloody 1968 Tet Offensive.... [Ford] told Federal Computer Week that he received permission from NSA to refer to its still-classified history of NSA operations in Vietnam."

Carlock, Paul G., Steven C. Decker, and Robert E. Fenton. "Agency-Level Systems Engineering for 'Systems of Systems.'" Defense Intelligence Journal 9, no. 2 (Summer 2000): 63-74.

This article offers one approach to achieving a unified SIGINT system, based on a top-level strategic plan.

Carroll, John M.

1. Secrets of Electronic Espionage. New York: Dutton, 1966.

2. The Third Listeners: Personal Electronic Espionage. New York: Dutton, 1969.

Wilcox: "Updating of Secrets of Electronic Espionage."

Day, Dwayne A.

1. "Ferrets Above: American Signals Intelligence Satellites during the 1960s." International Journal of Intelligence and Counterintelligence 17, no. 3 (Fall 2004): 449-467.

"Throughout the 1960s, signals intelligence satellites were designed, developed, and operated by the U.S. Navy and the U.S. Air Force, working within the framework of the National Reconnaissance Office."

2. "Listening from Above: The First Signals Intelligence Satellite." Spaceflight 41, no. 8 (Aug. 1999): 339-346.

de Arcangelis, Mario. Electronic Warfare: From the Battle of Tsushima to the Falklands. Poole, Dorset, UK: Blandford, 1985.

David, James. "Bourbon Operations in China Following World War II." Cryptologia 31, no. 3 (Jul. 2007): 254-262.

"The small and short-lived [U.S. Navy] Tsingtao intercept site provides an important glimpse into the joint U.S.-British post-World War II Comint effort against the USSR codenamed BOURBON."

Defense Intelligence Journal. "SIGINT." 9, no. 2 (Summer 2000): Entire issue.

Click for the individual articles in this issue.

Gerson, N.C. "SIGINT in Space." Studies in Intelligence 28, no. 2 (Spring 1984): 41-48. [Richelson, Wizards (2002)]

Return to NSA Table of Contents