Vantheman wrote:
Was stationed at an Army Security Agency. It was outside Augsburg at a town named Gerstophen. What I did is still classified (one of those “cradle to grave”) jobs. My wife of 52 years still doesn’t know what I did.
All the ASA stuff was mostly classified. Not so much any more.
Although it makes for a good response to: “What did you do in the war, Gramps?” Answer: “Its classified”.
~~~~~~~~~~~~~~
Many people know WHAT these agencies / organizations do, what is not known is HOW WELL it is done.
That reticence is what almost all (loyal) people who were involved portray.~~~~~~~~~~
The actual Intelligence Gathering process covers a lot of methods:Interception of telecommunications
Intelligence gathering in lieu of interception of telecommunications
Telecommunications surveillance
Procurement of base station data
Technical hardware monitoring
Transmission reproduction
Network traffic intelligence
Systematic monitoring
Covert intelligence gathering
Acquiring intelligence that identifies a telecommunications address or terminal hardware
Undercover operations
Guided human intelligence operations
Duplication
Intercepting a dispatch for the purpose of duplication
On-site audio monitoring
On-site visual monitoring
Technical surveillance
Intelligence gathering on specific locations
[
https://supo.fi/en/intelligence-gathering ]
As well as techniques, e.g.: Communications Signals gathering (“Intercept”)
Direction Finding (DF), (RDF) [
https://www.google.com/searchq=direction+finding&rlz=1C9BKJA ]
Radio Fingerprinting (RFP) [
https://arxiv.org/pdf/2201.00680.pdf#:~: ]
Cryptographic Analysis (CA) [
https://en.m.wikipedia.org/wiki/Cryptanalysis ],
Traffic Analysis (TA) [
https://en.m.wikipedia.org/wiki/Traffic_analysis ],
TEMPEST [
https://en.m.wikipedia.org/wiki/Tempest_(codename) ],
And others.
Most of the information about signals-intelligence (SIGINT)
{Including communications intel (COMINT), electronic communications intel (ELINT), open source intel (OPSINT), image intel (IMINT), acoustic intel (ACINT), human intel (HUMINT), technical intel (TECHINT), measurement and signals intelligence (MASINT), and others} are known and information is available: [
https://www.nsa.gov/Signals-Intelligence/Overview/#: ],
[
https://www.emsopedia.org/entries/signal-intelligence-sigint/ ]
Even information on cryptographic (CRYPTO) systems and devices (machines, programs &c.) is available; as well as information about the various agencies like: the “infamous” National Security Agency (NSA) {‘No Such Agency’} and others { Defense Intelligence Agency (DIA), National Geospatial-Intelligence Agency (NGIA), National Reconnaissance Office (NRO), United States Army Intelligence and Security Command (AISC), Office of Naval Intelligence (ONI), Office of Intelligence and Analysis (OIA), Central Intelligence Agency (CIA), Coast Guard Intelligence (CGI), Air Force Intelligence, Surveillance and Reconnaissance Agency (AFISRA), Bureau of Intelligence and Research (BIR?), Office of the Director of National Intelligence, Office of Terrorism and Financial Intelligence, Office of Intelligence and Counterintelligence }
[
https://www.google.com/search?q=u.s.+intelligence+agencies&rlz=1C9BKJA_enUS832US833&oq= ]
~~~~~~~~~~
Encryption/decryption machines like the KW-7 were used in various com centers to encrypt all traffic over the Military and SIGINT communication nets. (Code & TTY). Additionally, the FM Radio Tranciever (RT-524) was coupled with the Nestor KY-8 for voice security.