Operation Easy Chair was a joint covert operation of the US Central Intelligence Agency, the Dutch Internal Security Service (BVD), and the Dutch Radar Laboratory (NRP) from 1958-1962. The goal of the operation was to place a covert listening device in the office of the Russian Ambassador in The Hague. [1] Named for a bug the CIA claimed to have found in a chair, [2] the operation was a response to the discovery of The Thing—a passive covert listening device discovered in the Great Seal gifted to the American Embassy in Moscow by the Young Pioneer organization of the Soviet Union. The operation resulted in the creation of several devices, notably Easy Chair Mark I (1955), Mark II (1956), Mark III (1958), Mark IV (1961) and Mark V (1962). Although initially they could not get the resonant cavity microphone to work reliably, several products involving passive elements were developed for the CIA, as a result of the research. In 1965, the NRP finally got a reliably working pulsed cavity resonator, but by that time the CIA was no longer interested in passive devices, largely because of the high levels of RF energy involved. [3]
On 10 April 1987, the Soviets held a press conference and revealed that their embassy in Washington had been bugged by the Americans. The image of the bug has been identified as an SRT-56, a bug developed by NRP, speculated to be part of the Easy Chair program. [4]
Name | Function |
---|---|
Easy Chair I | Passive element |
Easy Chair II | Added two-way communication |
Easy Chair III | Extended range |
Easy Chair IV | High power |
Easy Chair V | Multi-channel |
TEC | Path loss survey system |
WEC | Room bugging via telephone set |
Rocking Chair (RC) | Room bugging via telephone line |
Cavity | Pulsed microphone |
CIA cryptonyms are code names or code words used by the U.S. Central Intelligence Agency (CIA) to refer to projects, operations, persons, agencies, etc.
A covert listening device, more commonly known as a bug or a wire, is usually a combination of a miniature radio transmitter with a microphone. The use of bugs, called bugging, or wiretapping is a common technique in surveillance, espionage and police investigations.
Q-switching, sometimes known as giant pulse formation or Q-spoiling, is a technique by which a laser can be made to produce a pulsed output beam. The technique allows the production of light pulses with extremely high (gigawatt) peak power, much higher than would be produced by the same laser if it were operating in a continuous wave mode. Compared to modelocking, another technique for pulse generation with lasers, Q-switching leads to much lower pulse repetition rates, much higher pulse energies, and much longer pulse durations. The two techniques are sometimes applied together.
Crypto AG was a Swiss company specialising in communications and information security founded by Boris Hagelin in 1952. The company was secretly purchased for US $5.75 million and jointly owned by the American Central Intelligence Agency (CIA) and West German Federal Intelligence Service (BND) from 1970 until about 1993, with the CIA continuing as sole owner until about 2018. The mission of breaking encrypted communication using a secretly owned company was known as "Operation Rubikon". With headquarters in Steinhausen, the company was a long-established manufacturer of encryption machines and a wide variety of cipher devices.
The Special Activities Center (SAC) is a division of the United States Central Intelligence Agency responsible for covert and paramilitary operations. The unit was named Special Activities Division (SAD) prior to 2015. Within SAC there are two separate groups: SAC/SOG for tactical paramilitary operations and SAC/PAG for covert political action.
A limpet mine is a type of naval mine attached to a target by magnets. It is so named because of its superficial similarity to the shape of the limpet, a type of sea snail that clings tightly to rocks or other hard surfaces.
The non-linear junction detector, or an NLJD, is a device that illuminates a small region of space with high-frequency RF energy. Any "non linear junction" in the vicinity—for example, and particularly, the p–n junction—will receive this energy, and because of the asymmetric response of the junction to an electric field, it will mangle it, re-emitting some of it on multiples of the illumination frequency. The detector has a sensitive receiver tuned to these harmonics, as well as appropriate processing and displays to make their presence known to the user of the device. Because the basis of almost all semiconductor electronics is the p-n junction, an NLJD is correspondingly capable of detecting almost any unshielded electronic device containing semiconductors, whether the electronics are actively powered or not.
The Central Intelligence Agency (CIA), known informally as the Agency, metonymously as Langley and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States tasked with gathering, processing, and analyzing national security information from around the world, primarily through the use of human intelligence (HUMINT) and conducting covert action through its Directorate of Operations. The agency is headquartered in the George Bush Center for Intelligence in Langley, Virginia.
The Special Collection Service (SCS), codenamed F6, is a highly classified joint U.S. Central Intelligence Agency–National Security Agency program charged with inserting eavesdropping equipment in difficult-to-reach places, such as foreign embassies, communications centers, and foreign government installations. Established in the late 1970s and headquartered in Beltsville, Maryland, the SCS has been involved in operations ranging from the Cold War to the Global War on Terrorism.
Radiofrequency MASINT is one of the six major disciplines generally accepted to make up the field of Measurement and Signature Intelligence (MASINT), with due regard that the MASINT subdisciplines may overlap, and MASINT, in turn, is complementary to more traditional intelligence collection and analysis disciplines such as SIGINT and IMINT. MASINT encompasses intelligence gathering activities that bring together disparate elements that do not fit within the definitions of Signals Intelligence (SIGINT), Imagery Intelligence (IMINT), or Human Intelligence (HUMINT).
Operation PBHistory was a covert operation carried out in Guatemala by the United States Central Intelligence Agency (CIA). It followed Operation PBSuccess, which led to the overthrow of Guatemalan President Jacobo Árbenz in June 1954 and ended the Guatemalan Revolution. PBHistory attempted to use documents left behind by Árbenz's government and by organizations related to the communist Guatemalan Party of Labor to demonstrate that the Guatemalan government had been under the influence of the Soviet Union, and to use those documents to obtain further intelligence that would be useful to US intelligence agencies. It was an effort to justify the overthrow of the elected Guatemalan government in response to the negative international reactions to PBSuccess. The CIA also hoped to improve its intelligence resources about communist parties in Latin America, a subject on which it had little information.
The Thing, also known as the Great Seal bug, was one of the first covert listening devices to use passive techniques to transmit an audio signal. It was concealed inside a gift given by the Soviet Union to W. Averell Harriman, the United States Ambassador to the Soviet Union, on August 4, 1945. Because it was passive, needing electromagnetic energy from an outside source to become energized and active, it is considered a predecessor of radio-frequency identification (RFID) technology.
The Congo, short for the Democratic Republic of the Congo, is an equatorial country located in central Africa. As of July 2018, the CIA World Factbook lists the Congo containing over 85 million inhabitants representing over 200 African ethnic groups. French is the country's official language, and Catholics comprise the largest religious group at fifty percent. The Congo was colonized by King Leopold II of Belgium in 1885, and known as Belgian Congo until it gained independence. Both the Soviet Union and United States had kept a close watch on the mineral-rich country until on June 30, 1960, the Congo finally gained independence under the democratically elected Prime Minister Patrice Lumumba. Lumumba was a charismatic nationalist who led the only party in parliament with a nationwide base, rather than a regional or ethnic base.
This is a list of activities carried out by U.S. intelligence agencies in Greater China.
This is a list of activities carried out by the U.S. Central Intelligence Agency in Indonesia.
While the CIA cooperates with its French counterpart, the DGSE, the countries do collect information on one another, especially in the economic and scientific areas.
The Central Intelligence Agency (CIA) has been involved in Italian politics since the end of World War II. The CIA helped swing the 1948 general election in favor of the centrist Christian Democrats and would continue to intervene in Italian politics until at least the early 1960s.
With Europe stabilizing along the Iron Curtain, the CIA attempted to limit the spread of Soviet influence elsewhere around the world. Much of the basic model came from George Kennan's "containment" strategy from 1947, a foundation of US policy for decades.
At various times since the creation of the Central Intelligence Agency, the Federal government of the United States has produced comprehensive reports on CIA actions that marked historical watersheds in how CIA went about trying to fulfill its vague charter purposes from 1947. These reports were the result of internal or presidential studies, external investigations by congressional committees or other arms of the Federal government of the United States, or even the simple releases and declassification of large quantities of documents by the CIA.
Operation Monopoly was a covert plan by the United States Federal Bureau of Investigation (FBI) to build a tunnel underneath the Soviet Embassy in Washington, D.C., to gather secret intelligence in effect from 1977 until its public discovery in 2001.