Quantcast
Channel: SIGINT CHATTER
Viewing all 111 articles
Browse latest View live

The Billion Dollar Spy

$
0
0
In January 1977, CIA chief of station Robert Fuller was filling up his car at a gas station in Moscow when a Russian man approached him, asked to talk with him and immediately dropped a note on Fuller's car seat. In the note he explained that he wanted to discuss strictly confidential matters with a U.S. official and proposed to arrange a meeting. Fuller reported the contact to CIA headquarters. They feared that the man was a dangle, a trap by the KGB to expose CIA operatives. Fuller was instructed to ignore the man.

The Russian man however persisted. He made two more attempts in February, each time dropping a note, proposing a signal and meeting. After being ignored again in May, it seemed that the KGB gave up the dangle. That summer, Gus Hathaway succeeded Fuller as chief of station Moscow. On December 10, the Russian man spotted a car with embassy licence plate, approached the driver and urged him to deliver his letter to a U.S. official. In that letter, delivered to Hathaway, the mysterious man explained that he had access to research into look-down radar and that he could also provide schematics for the new MiG-25 radar.

This information finally tickled CIA headquarter's interest. They assigned the codename CKSPHERE to the Russian man but did not find him worth the risk of exposing a CIA operations officer. Hathaway, by then convinced that CKSPHERE was most likely an engineer at a secret research laboratory, insisted on meeting the man. CIA however again ordered Hathaway to ignore the requests for a meeting.

On February 16, 1978, more than a year after the first contact, CKSPHERE again dropped a note, this time in Hathaway's car. By then, the man was desperate but afraid to reveal more personal information. Meanwhile, the Pentagon expressed to the CIA their great interest in Soviet aircraft electronics and radar. On March 1, the Russian man once again approached Hathaway, who was just unlocking his car, and pushed a packet into Hathaway's hand. It contained all the personal details that convinced the station chief and the CIA that he was a genuine spy.

CKSPHERE now had a name. Adolf Tolkachev, engineer and leading designer at the Scientific Research Institute for Radio Engineering in Moscow, and he resented the Soviet system. The next seven years, Tolkachev provided a tremendous amount of highly sensitive information on Soviet research related to aircraft electronics, radar and weapons systems.

For Tolkachav it was a race against the clock. He knew that his game would eventually end and therefore tried to pass as much information as possible, often taking great risks with disregard for his own safety and despite his case officers urging him to be cautious. In the end, his information saved the Pentagon and the U.S. Air Force billions of dollars in research and development and made sure the West had a critical technological and military advantage over the Soviets.

The Billion Dollar Spy, researched and written by David Hoffman, brings Tolkachev's story, based on declassified documents and many interviews with the CIA personnel involved in the CKSPHERE case. Hoffman's extensive research resulted in a highly detailed account that isn't limited to the spy story itself but also provides a better understanding in how the CIA handled the case, the events that lead to the fall of CKSPHERE and consequent fall-out, all placed in the broader context.

The book offers a fascinating insight in the modus operandi of CIA station Moscow. It details the tricks of the spy trade, how the case officers set up meetings and performed surveillance detection runs, the various ways they communicated covertly with Tolkachev, and the spy gear the CIA developed and provided him over the course of eight years. The reader learns in detail how they ran such operations in Moscow station.

The book truly excels in the details and background information on the characters involved. You get to know Adolf Tolkachev through the many operations notes and letters with personal information he wrote to his handlers and you discover the reasons why he became so resentful against the Soviet state. Tolkachev was a complex man. He was intelligent and wanted to do things his way.

He declined the proposed use of dead drops or a spy radio. They gave him a SRAC (short range agent communications) to send messages by burst-transmission, and later even provided him with a novel satellite message system, but he never used them. He preferred meetings in person, despite the according risks. CIA gave him the most advanced spy cameras, but he insisted to use his own Pentax camera. He regarded money as a token of respect, rather than a means to get rich, but complained each time when he received too little money for what he believed to deserve.

His fear for getting caught alive contradicted with the ever increasing risks he willingly took. He therefore was worried about his wife and son but had already decided he would never leave Russia. There were also the little things. He often asked his handlers for music records from western bands, books or ink pens and gums for his son.

Hoffmann explains why the CIA, paralysed by James Angleton's paranoia in the 1950s and 60s, was so reluctant to set up operations in Moscow, the frustration of Gus Hathaway with CIA headquarters and his efforts to protect the man behind the source. Tolkachev's case officers, John Guilsher, David Rolph and Bill Plunkert had to operate and arrange face to face meetings despite overwhelming KGB surveillance. The meetings later became so risky that CIA decided to use Robert Morris, a deep cover, to meet Tolkachev. You can't get it more exciting.

The reader gets plenty of backgound information to understand how the CIA handled the cased. Hoffman also delves into the history of other spies, like GRU Colonel Oleg Penkovsky (HERO and YOGA), and Soviet diplomat Alexander Ogorodnik (TRIGON), and tells the stories of Marti Peterson, the first female CIA operations officer in Moscow and the exfiltration of KGB Major Victor Sheymov by David Rolph. Many more relevant people from the intelligence community are given a place in the book.

The fall of CKSPHERE is credited to Edward Lee Howard, a former CIA officer in training who was assigned to Moscow station but was fired before his departure to Moscow. He offered his services and all his knowledge about Moscow station to the Soviets. His downfall is also written down in this very comprehensive book that reads like a spy thriller. If you like to know the real deal, this well researched book is it.

The Billion Dollar Spy by David E. Hoffman, ISBN 9780345805973.

More book reviews at my website.

Operation Tinkel Bell - Wall of Fame

$
0
0
Operation Tinker Bell is running for almost seven years now, and the feedback and page stats have shown ever more people discovered the thrill of decrypting operational spy messages. That's why I now decided to create a Wall of Fame.

Operation Tinker Bell, the cryptologic challenge, starts in 1964 at the height of the Cold War. KGB colonel Alexander Rogozin defect and his knowledge of communications technology and cryptology could be valuable to U.S. intelligence. A first covert meeting in Moscow ends disastrous. A missing CIA operative and no trace of the KGB colonel.

The challenge immerses you in a true Cold War espionage atmosphere with many historically accurate and authentic details. It's up to you, to figure out what happened. For more about the challenge, visit the Operation Tinker Bell intro page with its Wall of Fame.

New, from January 2020! All participants who decrypt all messages correctly can now send all plaintext solutions together in a single e-mail to Cipher Machines and Cryptology, and will be registered in the Wall of Fame. We advise you to keep a record of all decrypts and investigate all information like places, units and names that you find in the messages.

Shoutout to all those who completed the challenge before 2020 and might still have the decrypts, or not. Contact me by e-mail to get registered in the Wall of Fame!

Side note: due to several reasons, both nice ones and accidents, I didn't had the opportunity last year to publish much on SIGINT Chatter and the website. I wish all readers a great 2020 in good health, and will do my best to add more new things.

Legacy Edition Cipher Machines and Cryptology

$
0
0
After running the Cipher Machines and Cryptlogy website for sixteen years, I decided to create a Legacy Edition of my website. The original site remains active and updated, but the Lagacy Edition ensures that all information and downloads remain accessible in the future, whatever may come. Hold your horses, I'm going nowhere, and planning to live another 50 years, at least!

You can stick to the original site without problem. Know that, in contrast to the original, the Legacy Editions isn't easily found by Google yet, so make sure to bookmark the Lagacy Edition. Over the years, my website has also been archive by the Internet Archive (shoutout to founder Brewster Kahle) but not all pages might be up-to-date.

Cipher machines and Cryptology Legacy Edition, just like the real thing!

The idea came after an unexpected flirt with the eternal on my bike (that's at least what I was told later). Hence the long period of inactivity. No worries, I'm back on track now and will continue to write stuff and update the website. I did realize that, if you don't want to vanish without a trace, you should take precautions for any digital traces on the web that you would like to keep sharing with family or friends.

After so many years, millions of visits and downloads, all the kind people who contacted me, some of which wasted so much precious time on the various crypto challenges, and the many interesting people I got to know, I just have to leave some traces.

A Google account is a good place to start. Their Inactive Account Manager makes sure that Google knows what to do when your account becomes inactive. You can let Google notify different people, including a message from you, what those persons should do with your data, photos, blogs, and whether Google should keep or delete all your stuff on the web. Other companies have similar solutions for your legacy.

Nothing to leave on the internet? Then still backup, backup, backup and share your backups to keep them safe!

CRYTPTO AG Fallout

$
0
0
The bombshell news about the rigged Crypto AG equipment is spreading. The renowned Switzerland based crypto firm, a world leader on commercial crypto equipment throughout the Cold War, already came under suspicion in the 1992 Hans Buehler case. Iran, one of the many countries using Crypto AG equipment, became suspicious after some of their secret communications had leaked. Buehler, a salesman for Crypto AG, was arrested in Iran and imprisoned for nine months. This was only the tip of the iceberg.

Six years ago, declassified NSA documents showed a close cooperation between Boris Hagelin, founder of Hagelin Cryptos (later named Crypto AG) and his close friend William Friedman. Friedman, a brilliant U.S. cryptologist, already had a career from SIS over AFSA to chief cryptologist for NSA (National Security Agency). Their 1950's gentlemens agreement ensured that Boris Hagelin would sell  to "questionable states" only crypto machines of which the message could be decrypted (read) by NSA. The Gentlemen's Agreement seemed to extend into the 1990's, as the Hans Buehler case showed. This cooperation between Crypto AG and NSA was pretty big news in the cryptologic world.

The current bombshell revelations, although more of the same, surpass the old suspicions by far. As it turns out, the cooperation eventually resulted in the 1970 joint-purchase and full control over Crypto AG by the CIA and the BND (Bundesnachrichtendienst), the West-German Federal  Intelligence Service. Eventually, this intelligence coup, called operation RUBICON, reached such proportions that BND decided to pull out. CIA became the sole owner of Crypto AG. The rest is history.

Journalists from German television ZDF and American news­paper The Washington Post now uncovered the last pieces of the puzzle and put the BND and CIA documents together. Crypto Museum, who took part in the investigations in cooperation with the Dutch investigative VPRO radio Argos, has an excellent overview of the case and press coverage and many links to detailed information about Boris Hagelin, Crypto AG and the secret alliance with BND, NSA and CIA.

Crypto AG was liquidated in 2018 and two companies independently acquired part of the Crypto AG assets. Both firms state explicitly that they are completely different firms, until now unaware of the links between Grypto AG, CIA and BND.

CRYPTO AG Alternatives?

$
0
0
The latest news about insecure Crypto AG equipment, sold not only to foes, but also to some friends, was not that surprising, given the warning signs that popped up in the past. The scale and duration of the operation is a surprise, but it's all part of the game called intelligence collection.

Despite those early red flags, Crypto AG, and its owners CIA and BND, managed to convince customers to maintain confidence in their crypto products. The reputation of the firm and its location in "neutral" Switzerland helped. The question is whether those customers had any choice, or alternatives?

In reality, truly secure communications is all but easy. Communications security is a highly specialised discipline, comprising a whole range of rules, regulations, technical requirements and equipment. Special dedicated equipment can provide such security, but trusting the manufacturer is essential. However, in the field of cryptography, so intertwined with security and intelligence collection, trusting others is not that smart. What are the alternatives? For a start, they are always costly, either in money or in effort.

Since people tend to prefer easy, they often choose cheap and simple. Today, that’s an application from their app store, or an add-on for their e-mail or browser software. Some diligent distrustful might download actual encryption software and have decent anti-virus software. In general, this creates more problems than solve them, and here’s why.

Normal computers, laptops, tablets and smartphones are absolutely not suitable to run encryption software, despite some vendors claiming otherwise. All these devices have numerous processes running in the background. Plug-ins, add-ons and other unidentified software, often downloaded automatically, for the sake of compatibility, convenience, or at the request of the user.

Software developers who claim their software provides secrecy and privacy on your personal computer or smartphone actually do not know what they are talking about. Not because of incompetence, but simply because they really have no idea of all the processes running before or after installing their software. Often, the user is both cause and problem, with kind assistance of your OSI layers, or Open Systems Interconnection (what's in a name). Seven layers of security nightmare.

Therefore, running crypto software might prevent your wife or neighbour from reading your e-mails, but won’t prevent state actors or professional hackers from doing so. Theoretically it takes far too long to crack strong encryption, but in 95% of the cases they don’t waste time and retrieve your data before encryption.

The most secure solution is off-line encryption on a dedicated computer or device. which is never connected to the security nightmare called Internet. This will make it harder, but not always impossible. Should you use commercial software or develop your own crypto algorithm, and would that be secure? Various publicly available algorithms are peer-reviewed and pretty secure. They take far too much time to crack, in theory. There are however always actors with more brain power and resources who might discover and exploit a mathematical shortcut. It's important that the user fully understands how the encryption works and can verify its performance, which is very hard. So he just has to trust the manufacturor? What's left?

There’s one type of encryption, truly unbreakable today, and in the future, no matter what technology might arise. Unbreakable because it's an equation with two unknowns, mathematically impossible to solve. It’s called one-time pad (OTP). Hailed in the past for protecting communications for diplomacy, military and intelligence, and still used for special purposes, this encryption method, performed on machines or with pencil and paper, provides secure communications, under the condition that it is implemented properly.

The famous Cold War Washington-Moscow hotline, encrypted with ETCRRM one-time tape machines, is a well known example. The paper version, shown below, was the favorite spy encryption for decades, often used in numbers stations. One-time pad has never been broken, and some erroneous claims are in fact cases of implementation errors.

One-time letter pad booklet with reciprocal encryption table.
Image © Dirk Rijmenants
One-time pad has two main drawbacks, which are however not technically insurmountable: true randomness and key distribution. OTP encryption requires truly random keys, as long as the message, and used only once. This creates logistical issues.

In the heydays of one-time pad, this meant a special courier from the organisation – usually state actors – that securely transports the keys. Secure key logistics is the sole reason why this unbreakable encryption is not generally used today, because secure logistics means costs.

Are costs really a problem? Today’s technology enables easy production and secure physical transport of vast amounts of key material (read bytes) on a small carrier, to provide year-long encryption before fully consumed, making it pretty cheap per byte. It's a question of willing to provide the technical infrastructure and funding. Even quantum key distribution already exists and is operational.

Secure transport might cost more than free exchange of  asymmetric cryptography's public-keys, but costs are relative. Ask Crypto AG customers, both adversaries and friendly states. Their costs for the equipment they bought, the training they received, maintenance and, last but least, the costs and damage caused by their compromised communications... for decades. Extremely expensive in terms of security and possibly also economic losses through industrial espionage.

Crypto AG HC-7845 world's first 1 Gigabit VPN encryption in 2009... can we trust it?
Earlier Cold War Hagelin/Crypto AG machines at the History of Hagelin page.
If they had used one-time pad encryption, common practice until the early 1980s, instead of Crypto AG equipment, it would have been less practical, a bit more costly, but in the end far cheaper than trusting their most critical secrets to outsiders and man-made algorithms with all their flaws, weaknesses and, as history showed, hidden intentional weaknesses. One-time pad, on the other hand, is simple, fast, transparent, easy to verify its proper functioning when applied in machines and yes, less practical.

However, if we talk about vital secure communications, what’s most important? Cheap, easy and insecure, or costly, hard and secure. One lesson throughout history is that real security is never cheap, always requires effort, but pays off. Unfortunatelly, little Joe, big companies and government agencies all want it to be easy and cheap, and they are at the same time addicted to producing and sending ever larger amounts of sensitive information. Weak security? We acutally asked for it, and we got it.

Visit the one-time pad page on Cipher Machines and Cryptology to learn more about the history and use of unbreakable encryption. You want to use encryption that is – clearly – more secure than rigged Crypto AG machines? You can, but only if you strictly follow all the one-time pad rules! Read about it in the Guide to Secure Communications with One-time Pad (pdf). It’s unbreakable, free, transparent and fun, if you have some time to spare.

If you want to know why public-key cryptography solved the key exchange problem but not the actual security of our communications, check out Is One-time Pad History? (pdf). This was written many years ago, and a note was added in 2015 about how reality had surpassed our greatest fears by far. Well, we doubled down on that one again.

Enigma Machine Project at Olin College

$
0
0
Libby Tawes, an engineering student at Olin College, contacted me in June 2018. She worked that summer as an intern at the Graveyard of the Atlantic Museum. Her major assignment was to research and design an exhibit about the Enigma machine. The museum displays the well known naval Enigma with serial M2946. Libby asked permission to use my Enigma simulator at the museum, but her work as an intern turned out far more interesting.

Her goal was to design an interactive visualisation of the Enigma. After trying some digital solutions, she decided that creating a physical replica of the encryption process would make the whole more approachable and engaging to a more broad audience. It is indeed challenging to understand the encryption process and electrical signals inside an Enigma machine. The final design idea was to demonstrate the encryption process in real time with electroluminescent wire that represented the Enigma rotors and their internal wiring. The fun and hands on interaction was met with excitement by museum patrons and directors.

When Libby's summer internship ended, she and the museum directors agreed that the exhibit would be put on hold and that she would continue to work on a prototype of the interactive Enigma if the opportunity presented itself. Her chance came when she returned that fall to her Principles of Engineering class at Olin College. The main object of the class was to build an electromechanical system.

When the project started, she was randomly assigned a team of five and proposed her interactive visualisation of the Enigma as the team's class project. Her teammates Dan, Bryce, Corey and Shyheim were enthused and they set off to build the interactive Enigma.

Corey co-lead the electrical subteam with Bryce, who also contributed to the software subteam. Daniel was the lead for the mechanical subteam and also contributed to programming. Shyheim worked mainly in the mechanical subteam but also on CAD and programming. Libby, as resident mechanical engineer, contributed mainly to the overall organisation and in managing the team. After eight weeks of intense work they had created a operational version and posted their progress on a website.

You can visit the The Enigma Machine project from the Olin team of engineers, but make sure to click all the "Learn More" links to discover all the nuts and bolts of their fantastic project. The Enigma Machine, A Fresh Take on an Historic Machine is an interactive visualisation project from the Principles of Engineering class at Olin College of Engineering. The class stimulates students to work as a team to design, construct and test electromechanical systems while learning development and production processes.

Libby's story is another wonderful example of how Enigma and its history can inspire young people. When she learned about the Enigma machine at the museum, she was not only inspired to visualise the machine's encryption process. She also tickled the interest of her team members to embark on a project that in turn is designed to interactively get others interested in Enigma and its history.

A resident student in a museum is all you need to turn seemingly boring subjects like cryptography and WW2 history into a fascinating project by engineering students. Or how history can spark the imagination of young people to become better students. That's why we document history and make it available at Cipher Machines and Cryptology. History is there to share!

The Enigma machine that inspired Libby comes with a fascinating story. Divers recovered Enigma M2946 in 2001 from the wreck of the German U-boat U-85. The destroyer USS Roper sunk U-85 by gunfire on April 14, 1942 in the North Atlantic near Cape Hatteras where the museum is located. U-85 was part of Operation Drumbeat (Unternehmen Paukenschlag) to attack American ships in their own coastal waters. U-85 was lost with all hands aboard. More about U-85 at the U-boat Archive.

The Enigma is now displayed at the Graveyard of the Atlantic Museum.

Podcast Nuggets Episode 5

$
0
0
Click for more podcasts
After a long break, we're at it again. Three podcast nuggets to spoil the ears and mind. Recent news as a starter. The renowned company Crypto AG that turned out to be a CIA & BND subsidiary. Next stop, a talk about how you make it possible for U.S. spooks to operate in Moscow, and finally the former CIA chief of station Moscow about handling their top Russian spy. Almost three hours of fascinating spy mania. Get your headphones, listen very carefully... and watch your back!

NPR - Uncovering The CIA's Operation To Steal State Secrets. Washington Post reporter Greg Miller was one of the investigative journalists who uncovered the truth about the highly respected Swiss company Crypto AG, once world leader of encryption equipment with customers in more than 120 countries. CIA documents revealed that Crypto AG was joint-purchased by the CIA and BND, the West-German Federal Intelligence, as early as 1970. It was the start of the largest ever worldwide compromise of secure communications for many decades. See also my previous posts Crypto AG Fallout and Crypto AG Alternatives.

SPYCAST - Moscow Rules with Jonna Mendez. The story of CIA operations officer Tony Mendez (the real Argo) and his wife Jonna, both experts in disguise who were ground-breaking experts in developing techniques that enables American spies to operate under the noses of the almighty KGB’s countersurveillance. Cloack is the vital part of cloack and dagger. Tony sadly past away in 2019. The book is also a tribute to his work. I recently bought the book The Moscow Rules, and I can highly recommended.

SPYCAST- Conversation with David Rolph. This Former CIA Chief of Moscow station was one of the case officers that handled Adolf Tolkachev, probably the most valuable CIA assets ever in the Soviet Union. The CIA had to operate and have meetings with Tolkachev, despite overwhelming KGB surveillance. If you liked this podcast and want to know more about Tolkachev, you definitely have to read the book The Billion Dollar Spy from David Hoffman (see my book review).  There's More about Tolkachev on this blog.

Crypto AG & Operation RUBICON at Crypto Museum

$
0
0
The Crypto Museum just released the full story about Operation RUBICON, the CIA and BND joint-purchase of Crypto AG, once world leader of secure encryption equipment. The Crypto Museum took part in the investigations with Dutch investigative VPRO radio Argos, and cooperated with various media like the Washington Post and the German ZDF.

They compiled a tremendously detailed page with a wealth of information about the people and organisations involved, the secret agreements with AFSA, NSA, and later CIA and BND, the intelligence operations, legal constructions to disguise the true owners of Crypto AG, the targetted countries and various timelines.

Crypto Museum also provides extensive information about the rigged equipment with links to additional information at their vast website collection. All this based on years of research and many disclosed documents. The RUBICON page is a true treasure trove and historical reference.

Visit the Crypto Museum RUBICON page to learn everything about the Crypto AG spy scandal. If you already visited their RUBICON page before, make sure you refresh the page in your browser, as the page has been expanded quite a bit!

Before you dive into the fascinating Crypto Museum information, Swiss Radio and TV SRF has an excellent intro on the Crypto AG case. You can select English subtitles.

 

Cold War Propaganda on Shortwave Radio

$
0
0
A true Cold War icon
An important part of the Cold War was fought over radio waves. This battle was not limited to communications signals in voice, Morse or data, technical signals, espionage and signals intelligence. There was also a fierce open battle of words that raged through the world. A battle for the minds and hearts of the enemies' people.

Just as people could not easily cross the borders between East and West, accurate political and economic information and news could neither travel freely. This was solved by using powerful shortwave transmitters that either spread truthful information to those who were denied access to free press, or spread disinformation to turn the population against their government. Some shortwave world service stations, like Radio Moscow, Voice of America, Radio Havana or Radio Free Europe became true Cold War icons.

Check out the updated Cold War Signals page, now expanded with the Cold War of Words, fought over shortwave radio, including some fascinating audio samples. The page also explains the electronic battle between East and West, SIGINT collection, eavesdropping on the enemy, and mysterious signals of the Cold War. Another new addition is MAXIMATOR, the secret European SIGINT alliance between Germany, the Netherlands, France, Denmark and Sweden. More on Radio Moscow here.

Listen and learn... but don't believe everything you hear!

Podcast Nuggets Episode 6

$
0
0
Click for more podcasts
It's podcast time again, but these ones will spoil the ears for many hours, or rather weeks. The Cold War is an historically important period. Much has been written about it in books and on the Internet, but there are also some excellent podcasts. Today we have three podcast series that delve deeper into the entire Cold War period. One advice before you hit the play button, scroll down to their first podcast to discover the history of the Cold War chronologically.

The Cold War Vault by DJ Kinney, one of my favorites. He holds a PhD in history with specializations in the history of science and the Cold War, as you will notice in his podcasts. Start with his Introduction podcast, View from Ground Zero and The Last of the Cold War Kids which explains his fascination with the Cold War and why he created this podcast. Also available at Player FM and more at facebook. Higly recommended!

The History of the Cold War by Jeff Hogue, who has a BA and Masters in history. His series focusses more on the countries involved, their culture, politics and ideology, and how this influenced their positions in the Cold War. He also bring the story of the protagonists, how and why they came to power and how they determined the course of the Cold War. Also available at Player FM. and more at facebook.

Cold War Conversations by Ian Sanders are interviews and discussions with guests who lived through and experienced the Cold War first hand, and people that are fascinated by it. Instead of focussing on the well known events and stories, he brings the personal stories and lesser known aspects of the Cold War. Also available at Player FM and more at facebook.

Radio Moscow and the Cold War

$
0
0
Radio Moscow
Geopolitics and international conflicts during the Cold War made it important for the United states and the Soviet Union to inform people or influence their political views, and this in many countries around the world. But how did they reach their audience?

Today, we can hardly imagine a world without Internet, cable and satellites that brings all the news and information from across the globe in your lap. Yet, during most of the Cold War, people only had newspapers, local TV, FM and AM radio. The only solution to spread ideas was shortwave radio, as these waves travel around the globe and can listened to by everyone with a shortwave radio. You can also listen them here (all off-site audio links open in new tab).

Both East and West had, and still have, shortwave radio stations with a world service. The best known are Voice of America, Radio Free Europe and Radio Liberty on one side, and Radio Moscow, Radio Havana Cuba and Radio Peking on the other side. Everyone had their own truth and accused the other side of expansion drift, disinformation and inciting across the world. See also Cold War Signals.

One truly iconic station was Radio Moscow World Service. Their foreign service broadcasting started in 1929 with transmitters in Moscow and Leningrad, and later also relay stations in Vladivostok and Magadan. Radio Moscow reached whole Eurasia, Africa and North and South America. During the Cold War, their broadcasts reached across the world with transmitters in the Soviet Union, Eastern Europe and Cuba, and this in more than 70 languages.

Joe Adamov
Their most popular program was without doubt Moscow Mailbag with Joe Adamov answering letters from Americans. They dared to asked a wild range of questions, some critical and some truly hilarious, but Joe handled them all.

The iconic radio host started working for Radio Moscow in 1942, began hosting Moscow Mailbag in the 1950’s and did this for more than forty years. Raised in England and fluent in English, Adamov interviewed many important western politicians and was official translator at the trial of downed U-2 pilot Gary Powers. There's a  CBS audio interview with Joe Adamov at Expo 67 in Canada (alternative link) and one at PBS Red Files. Moscow Mailbag clearly intended to disprove claims that circulated in the western world, but also gave an interesting view on the Soviet mindset.

Unfortunately, few broadcast recordings survived the pre-digital Cold War era, and sometimes you need a stroke of luck, like studio recordings of Radio Moscow that surfaced in New York.


It all started in the 1960s, when New York Public Radio WNYC tried to bridge the cultural and political gap between the Soviet Union and the United States. They broadcast recordings on reels they received from Radio Moscow. Their content and sometimes obvious propaganda eventually caught the attention of the FBI, ending the propaganda party. Fortunately, many tapes survived and are now available at the New York Municipal Archives and you can listen to many audio samples that immerse you in the Cold War atmosphere.

The WNYC archive has some hundred recordings, so I selected some gems for you to get a taste of the collection. In 1960, Joe Adamov explained in one of the many Moscow Mailbag episodes that there are no shortages in the USSR. In 1965, he countered rumours about the ousted Nikita Khrushchev and explains life in the USSR.

Vladimir Pozner, another well known journalist, discussed bread and its historic and cultural significance in Moscow Meridian. Nina Petrovna Khrushcheva, the wife of Soviet Premier Nikita Khrushchev, addressed in 1962 the concerns in letters of American women and explained the good intentions of the Soviets.

Radio Moscow discussed in 1960 the automation of Soviet industries and benefits for the workers. Moscow Radio wasn't always in the defensive, they also attacked the U.S. involvement in Vietnam and western propaganda in 1960. The Weekly Press Review (there are many episodes) are another gem that leaks the Soviets sentiment.

The complete archive is available at WNYC's New York Municipal Archives. They also explain how the tapes ended up in New York and the stir they eventually caused. Whether the broadcasts of Radio Moscow actually influenced the opinion of people remains a question. Mark Winek examined this in Radio Moscow and the Early Cold War.


Shortwave and DX enthusiasts also recorded many shortwave stations on reel-to-reel tapes or cassettes, and these are preserved in the fascinating digital Shortwave Radio Audio Archive (SRAA). They have recordings of Radio Moscow and their American counterparts Voice of America (VOA), Radio Free Europe (RFE), Radio Liberty (RL) and many other stations.

There are quite a few interesting VOA recordings. The 1981 assassination attempt on President Reagan, a 1979 news broadcast that covers the 10th anniversary Apollo 11 moonlanding and four news reports on the 1970 Palestinian aircraft hijacking in Jordan, to name a few. Over the years, RFE and RL have broadcast in 54 languages of the targeted countries and regions, such as Russian, Turkmen, Belorussian and many more.

Some fascinating recordings of Radio Moscow are the 1968 crisis in Czechoslovakia with the invasion of Soviet and Warsaw Pact forces and the 1981 Polish crisis with declaration of martial law and the Soviet view on the situation in Poland.

SRAA also has various Radio Havana Cuba recordings, such as the 1974 speech by Fidel Castra, both in Spanish and English, and the 2016 commemoration on Castro's death. They also have many Radio Peking recordings, such as China's First Satellite in 1970.

You can search the SRAA database for any broadcast station, or search all Radio Moscow recordings or all Voice of America recordings. If “no results found” is returned, simply refresh their page to find the stations anyway..

More about the battle over radio waves on Cold War Signals. Interested in shortwave listening? The SWL Shortwave Listening page gives you an introduction. SWLing.com has a ton of information and the great SWLing Post blog about shortwave, receivers and broadcast stations. Radio Moscow is still in the air, but changed its name in 1993 into Voice of Russia and renamed it again in 2014 into Radio Sputnik.

Side note: The archived historical recordings are not intended to promote any point of view. Bear in mind that these stations had specific propaganda purposes in the Cold War era, and might not portrait the facts accurately. In hindsight it's easy to dismiss presented facts, but back then, people had far less means to fact-check. Still, influence through news and social media remains a problem to this day, despite an abundance of news, albeit with varying accuracy.

Happy listening... and don't believe everything you hear!

Murphy's Law at the National Security Agency

$
0
0
Five years ago the National Security Agency (NSA) once again released David Boak's History of U.S. Communications Security, this time almost completely unredacted. A most interesting document with lectures about various crypto topics. Fascinating read, but at the very end there are three pages, titled "Murphy’s Law", and they are a fun read.

Communications security compasses extensive technical requirements and procedures that must be followed. It’s an enormous technical and procedural challenge for NSA to cover all possible safety risks and they do their best, but no matter how hard you try, there’s always Murphy.

Here are some security violations, no jokes but real events that ended up in the COMSEC lectures. They even kept records of security violations, publicized them and ran contests to see what organization could go longest without violation. I won't reveal how they end, you'll have to read it yourself, and there are more stories to discover...

They once suspected the unauthorized use of crypto materials, and a TOP SECRET key list was examined for fingerprints in their chemical lab. They placed the key list on a bench underneath a powerful ventilation system and, you guessed, the list got sucked up and disappeared. They quickly dispatched some people to the roof to inspect the exit of the duct, but no secret key list. Flown away or stuck somewhere in the hundreds of feet of ducting?

NSA, we have a problem! A small step for man, a giant violation for COMSEC.

NSA had a warehouse in Fort Holabird where they stored a lot of cryptomaterial. The warehouse was fenced and protected by armed guards. One evening, a man was detected inside the fence. The guard shouted “Halt!” but the man climbed over the fence and escaped. The guard could not shoot him, and the reason? You won’t believe.

There’s also the story of one-time tapes, produced by NSA in huge amounts. These punched tapes inevitably produced a lot of waste product, tiny round pieces of paper, and these chads were collected in burn bags. Some genius had the brilliant idea to give that confetti to high school kids for use at football games. It ended with a school girls’ father emergency destroying and flushing TOP SECRET keys.

A technical team once had to do a sweep of a Naval Security Station, to trace suspected wiring. The inspector opened a floor access plate for telephone wiring and saw a wire that moved. He grabbed the wire, pulled it out a few feet but then the wire began to fight back. What was going on?

You want to know how the mishaps ended? These and other Murphy stories are at the end of History of U.S. COMSEC Volume II page 55 (pdf p313), hosted on the Governmentattic.org. Alternative link for the document here. Don't forget there's also a lot of interesting serious suff to read in that document.

If you're in for more fun with crypto equipment, do visit Jerry Proc's Crypto Humour page. with real stories from the fringes of communications security. Jerry hosts the excellent Crypto Machines website with extensive information about countless crypto devices.

Nuking the Moon

$
0
0
This is one of the books where I had no clue where or how to start my review. Vince Houghton, historian and curator of the Spy Museum, encountered many stories, some absurd, some ridiculous and some plain nonsense... or weren’t they?

Many impressive late night stories were told by people from the intelligence community, but Vince knows quite a few of them and, as any serious historian, interviewed experts, researched archives and scrolled through declassified documents to find the truth behind utmost secret World War II and Cold War inventions and operations. Brilliant men, inventors and exceptional innovators created some of the well-known and most advanced technology ever build, but it's not about these inventions...

Because at some point, they were asked to come up with solutions that required exceptional out-of-the-box thinking for problems the government desperately wanted solved. And when a nation is desperate, any solution, I really mean any solution, is justified and approved. A cat, turned into a listening device (yes, I wrote turned into, not wearing), recruiting one-armed trappers with a pilot license as stay-behind forces, swarms with thousands of pebbles with electronic eyes in space, waiting to bump into Soviet ICBM’s, using nuclear power as agricultural machinery or fly around nuclear reactors and many many more stories.

Complete nonsense and awful stories. The book contains many implausible ideas that are just terrible. And the worst of all... they are all true! And they worked, sort of, or not quite. Fortunately, at some point, some guy said nah, too crazy, too dangerous or too mad, and the plan was scrapped. Vince not only found the history, organisations and men behind these unbelievable plans, but also brings these stories in such an entertaining, colourful and sometimes hilarious way, I could actually sue him for more than one torn abdominal muscle.

However, although you might dismiss these awfully stupid ideas at first glance, you cannot turn a blind eye for how desperate these solutions were needed, the era and circumstances that - almost - justified those ideas, and how brilliant and innovative some of those solutions were. This book will make you chuckle at almost every page but will also astonish you with fascinating ideas, far ahead of their time, that would actually work, but for some reason never left the drawing board. Brilliant ideas, brilliantly told by Vince.

To get a taste of the book, listen the interviews with Vince Houghton at the Spy Museum's SpyCast and at Cold War Conversations.

Nuking the Moon by Vince Houghton, ISBN 0525505172

More book reviews on my website.

Podcast Nuggets Episode 7

$
0
0
Click for more

We're back with another selection of excellent podcasts to spoil the ears.  The first one is a fascinating two-part insight in the recruiting, training and deep cover life of former KGB illegal Jack Barsky in the United States. Next is a national bank robbery that counts, literally, into to billions. Finally, the story of project Cybersyn, the creation of Cybernet to modernise Salvador Allende's Chile.

COLD WAR CONVERSATIONS - I was a deep cover KGB spy Part 1 is an interview with Jack Barsky about his remarkable career as a spy. In this first part he talks about his early childhood and life in East Germany. As a bright student at the university of Jena he was scouted by the Stasi and recruited by the KGB. After two years of training in Berlin he was sent to Moscow to be trained as a deep cover illegal and develop his new identity. The legendary Soviets spies Morris and Lona cohen, also known as Peter and Helen Kroger, helped him to become American.

COLD WAR CONVERSATIONS - I was a deep cover KGB spy - Part 2 continues with Jack Barsky's arrival in the United States. He had to build a new fictitious life and a succesfull career. He regularly received encrypted radio messages from the KGB. His assignment was to develop contacts with people of interest. Ten years later, married and having a daughter, he decided to break with the KGB. It took the FBI almost ten years to catch him. To learn more about Jack Barsky's life and spy career I can highly recommend his book Deep Undercover with a very detailed account of his life and work as a KGB spy in the United States.

DARKNET DIARIES - Bangladesh Bank Heist is a guide to rob a billion dollars without anyone ever noticing. At least, that's the plan. Jack Rhysider interviewed investigative journalist Geoff White about the National Bank of Bangladesh who had a foreign currency reserve in the Federal Reserve Bank of New York. To work with that reserve, the bank used SWIFT, an international bank transfer network to send payment orders between banks all over the world. This is where the troubles start.

DAMN INTERESTING - Nineteen Seventy Three brings the story of Chilean president Salvador Allende and British theorist Stafford Beer. The world-renowned cybernetician proposed to develop a network with thousands of terminals that feed the complete Chilean economy and industry into a central mainframe computer with software that would optimize the country's resources and economy. However, this promising boost for Allende's socialist economy was not met with enthusiasm by the U.S. Central Intelligence Agency.

SR-71 – Not Average Plane for Not Average Brian Shul

$
0
0

Lockheed SR-71 Blackbird
source: USAF Judson Brohmer
It took a special kind of men to fly the SR-71 Blackbird, in essence spy missions with the fastest ever aircraft, packed with Electronic Intelligence (ELINT) equipment.

Brian Shul was more than not average, and flew 212 close air support missions in Vietnam. He was shot down, could not eject and had a horrible crash in the jungle. Brian suffered severe burns when his plane burst in flames. He was rescued and spent a year in a military hospital in Okinawa.

Despite his injuries, he passed the flight physical after months of physical therapy. Now flying the A7 Corsair and A-10 Thunderbolt, and being instructor pilot on the A-10... still wasn’t enough. Sadly, they told him he could not pass the tough astronaut-like physical for the SR-71. Nevertheless, against all odds, he passed the tests and flew four years SR-71 missions.

The origins of the SR-71 are found in my OXCAR and ELINT Research post. ELINT spy missions are risky business and quite a few pilots and crew lost have their life on these secret missions, as you can read in the Silent Warriors post.

Brian Shul gave a fascinating talk at Lawrence Livermore National Laboratory. An amazing story of perseverance, but also quite funny. Worth every minute of watching!

James Hall – The Spy Within Field Station Berlin

$
0
0
James W Hall III
James Hall was a U.S. Army warrant officer and Signals Intelligence analyst, stationed from 1982 to 1985 at Field Station Berlin, the SIGINT listening post at Teufelsberg.

The station collected signals (SIGINT) and electronic (ELINT) intelligence from East German and Soviet radio communications, microwave links, satellite transmissions, and captured and analysed different types of Radar.

Initially operated by the U.S. Army Security Agency (ASA), the Army Intelligence and Security Command (INSCOM) took over in 1977 and the National Security Agency (NSA) provided most of the personnel.

Given its strategic importance and secretive mission, the well-guarded Field Station Berlin was an important target of both the Soviet KGB and the East German foreign intelligence service Hauptverwaltung Aufklärung (HVA), at the time lead by the legendary Markus Wolf.

Working at Field Station Berlin, James Hall realised that he could make a lot of money by selling top secret information. In 1982 he dropped a letter in the Soviet conculate mailbox. After a first covert meeting with his KGB contact, Hall started his spying career for the KGB to increase his low pay, but wasn't quite happy with the cumbersome KGB tradecraft.

Meanwhile, the HVA recruited walk-in Huseyin Yildirim, a Turkish national who worked as mechanic in the Army Car Shop inside Adrews Barracks in Berlin. Yildirim, codename BLITZ, was the ideal man to approach people who worked at the SIGINT station. He was a very skilled mechanic, but even more skilled in profiling people and making money fast.
 
In 1984, then 27 year old Sergeant Hall got acquainted with Yildirim and proved to be an extremely valuable source for the HVA. He now had an additional and easier source of income. From 1982 to 1988, Hall, worked for both KGB and HVA, and Yildirim served as middleman between Hall and HVA agents, as his courier and paymaster. Although less known to the public, Hall became one the most damaging spies of the Cold War.

Field Station Berlin on top of Teufelsberg (source: INSCOM)

James Hall, now codename PAUL, passed huge amounts of classified information to the HVA and their  KGB friends. He compromised ELINT systems to locate and identify enemy aircraft, missiles and vehicles, identified SIGINT targets and provided the complete National SIGINT Requirements List (NSRL).

The massive 4258-page NSRL was a catalog of all NSA activities, a list of targets and a U.S. government wish list of intelligence and capabilities that they wanted to be targetted. In 1986, Hall was reassigned to Frankfurt and continued to pass large amounts of classified SIGINT information to the HVA though his his trusted courier Yildirim. Hall meticulously copied classified documents during his working hours or smuggled them out to photocopy them.

When Hall applied for an appointment as warrant officer, he was subjected to a routine background investigation. A supervising officer complained that Hall apparently spent more than his wage could afford, but Hall told him that a rich aunt had died and left him a large trust from which he received each year $30,000.

Thanks to the warrant officer rank, he would have an even greater access to classified material. In 1987, Hall was reassigned to Fort Stewart in Georgia, United states for his training as warrant officer. That same year, Yildirim also move to the United States, but the tide had turned for both men.

East German professor Manfred Severin, who was hired by Stasi as interpreter for Hall, defected in 1988 and offered his services to the CIA. He revealed Hall’s spying, who was put under surveillance by the FBI and Army counterintelligence for several months. In December 1988, the FBI set up a meeting in a hotel between Hall and FBI agent Dimitry Droujinsky, posing as KGB agent Vladimir, who was introduced to Hall by Manfred Severin.

FBI mugshot
During that meeting, videotaped by the FBI, Hall believed he was talking to a genuine Soviet contact and explained to “Vladimir” that he made a lot of money by selling secrets and bragged about his work as an agent. The FBI agent assured him that Moscow would pay better than the East Germans, and Hall handed over several top secret documents in exchange for $60.000. When Hall walked out the hotel he was arrested by the FBI and Huseyin Yildirim was arrested simultaneously in Tampa.

Hall received an estimated $300.000 from East German and Russian agents between 1982 and 1988. On 9 March 1989, James Hall was court-martialed and sentenced to 40 years in prison for espionage. Huseyin Yildirim was convicted for conspiring with Hall to carry classified intelligence to East Bloc agents, and was sentenced to life. An NSA official later estimated the case caused $3 billion worth of damage to the United States.

Hall served 22 years in Leavenworth military prison and was released in 2011. Yildirim was released after 14 years in a secret 2003 prisoner exchange with Turkey, under the condition that he would serve his sentence. The Turkish government however set him free for humanitarian reasons.

The New York Times archived the 1989 investigation of James Hall and a report on Hall's trial. Smithsonian Magazine brings the story of FBI agent Dimitry Droujinsky who posed as KGB agent Vladimir (mid-page, after Robert Lipka case). You can also read about James Hill at the DOD PERSEREC website.

Der Spiegel published three fascinating interviews with James Hall after his release. Hunt for the Stasi Superstar (translation) and many photos of the FBI arrest, the follow-up interview The Treasure from Teufelsberg (translation) and the interview (in English) The Scope of NSA Surveillance Surprised Me with former Stasi agent Klaus Eichner who monitored the cooperation between NSA and the German foreign intelligence service BND.

After the reunification of Germany, 13088 classified documents that were stolen by James Hall, marked Top Secret and Top Secret Umbra and stored in a steel container in the Stasi archives, were returned to the U.S. government. Read Der Spiegel's Destruction of traces in office (translation).

More about the Teufelsberg SIGINT station in the Field Station Berlin post. There are several posts on legenday HVA chief Markus wolf. The damage Hall inflicted on U.S. military and intelligence was comparable to the betrail by naval communications specialist John Walker.

In a German documentary (subtitles available), former HVA Chief Markus Wolf talks about James Hall. Jump directly to Part 2 segment at 21:16 or watch the fascinating two-part documentary. (enable CC Subtitles with Settings > Subtitles > Auto-translate > English).
There's also a documentary, Deckname Blitz, about Huseyin Yildirim and the James Hall spy case, which includes video footage of the actual meeting between the covert FBI agent and Hall (at 36:00). The doc is in German, but no subtitles.

Reading Tips for Winter Days

$
0
0

The winter days are getting shorter, darker and colder, but no worries! Here are six books about espionage and intelligence that will make time fly fast. This is the real stuff, told by people involved and thorough research. I really enjoyed reading these books. Highly recommended! Don't waste that winter, make it exciting and fascinating!

Must read books on intelligence (click to enlarge)

📖 The Billion Dollar Spy - A True Story of Cold War Espionage and Betrayal, by David Hoffman (read my review)
📖 The Widow Spy - My CIA Journey from the Jungles of Laos to Prison in Moscow, by Martha Peterson. More about Martha Peterson.
📖 Nuking the Moon  -  And Other Intelligence Schemes and Military Plots Left on the Drawing Board, by Vince Houghton (read my review)
📖 Russians Among Us - Sleeper Cells, Ghost Stories, and the Hunt for Putin’s Spies, by Gordon Corera.
📖 Deep Undercover - My Secret Life and Tangled Allegiances as a KGB Spy in America, by Jack Barsky (read my review)
📖 The Moscow Rules - The Secret CIA Tactics That Helped America Win the Cold War, Antonio and Jonna Mendez.

More books on SIGINT Chatter and Cipher Machines and Cryptology.

Arduino PicoEnigma Simulator

$
0
0
PicoEnigma
by @arduinoenigma

Arduino Enigma recently developed the tiny PicoEnigma, a universal physical Enigma simulator only 4 inch or 10 cm in size. He already made the Enigma Uno, Mega Enigma, Enigma Z30, and even build the Enigma Uhr switch for the plugboard.

Visit his PicoEnigma page for more details. The Arduino Enigma blog has the complete family of Enigma sims and many technical details on all projects. The circuit boards are found at Oshpark. Arduino Enigma is also on Youtube. The unique hand-made PicoEnigma and other types are available on eBay and on tindle.

Meanwhile, there's a race going on at the Enigma World Code Group forum to see who can build the smallest physical Enigma simulator. Incredible how they manage to build those tiny things. Just for fun, but technically true pieces of art.

I already wrote about his tiny touch screen Enigma Uno in 2014,  but he just couldn't stop creating different new versions in various sizes.

Visit Cipher Machines and Cryptology to learn everything about the fascinating Enigma cipher machine, how it was used by the German military during WWII and the Enigma Sim software for PC.

2020 Twilight Summary

$
0
0

This quite strange year is nearing its end, but we're still alive and kicking. It wasn’t easy for anyone. Many lost a bit of personal freedom in 2020, and no idea for how long, but let's put that in perspective. There's always far worse, elsewhere, at any given moment.

1950 winter in Korean very Cold Cold War (source: US Army, also see video)

So what have we been up to this year? Above all, I was happy to finally start writing again in early 2020, as the long 2019 break was not planned. We did manage to finally arrive at 250 posts.

The blog also had some tweaks. New visitors might get lost, scrolling through all posts, so I created the Recommended Posts page as introduction to this blog, and to highlight posts. This page will change occasionally. There's now an Updates page. Old posts are updated regularly with new information, videos or links, but if you don't know, you missed it. You’ll never miss new bits with the Updates page.

The Internet Archive is another victim of my urge to preserve a tiny bit of history. This enabled replacing many dead links with their archived version, and enabled saving existing links, posts and web pages, also from the Cipher Machines and Cryptology website.

Also, keeping the Enigma Challenge running has always been a joy. Meanwhile, already 311 people from 39 different countries joined the challenge. Over the years, we've registered 1360 solutions. No chance to get bored. The most recent to crack all messages was Matthias Schoop on December 19. Well done! Now there's also a Wall of Honor for the Cold War spy adventure Operation Tinker Bell.

All the best for 2021 to all readers!

Unfortunately, there’s also some bad news about Christmas. It’s not clear whether Santa will make it in time. There’s an unexpected delay, caused by some misunderstanding about his mission. let's hope he gets things sorted out.

The Cold War Vogelsang Twins

$
0
0

There are quite a few places in Germany called Vogelsang, but two of them became part of Cold War history. They were located on opposite sides of the Iron Curtain that divided the world into East and West. Although both are named Vogelsang, these twins were quite different, as twins often are.

The first Vogelsang, a place between the villages Einruhr and Gemünd in the Eifel National Park, is located 55 km (35 mi) southwest of the city Cologne (Köln) in Germany, and close to the Belgian border. Until 2006, this place was known as Camp Vogelsang, a military training area. The camp however first had a more sinister history.

BEFORE THE COLD WAR

The history of the Vogelsang twins starts in 1933. Adolf Hitler, then chancellor of Germany, decided to create four Ordensburg, training centers for the offspring of the leadership of the NSDAP (National Socialist German Workers Party).

By 1936, three NS-Ordensburgen were partly build and already in use, Ordensburg Krössinsee in Pomerania, Ordensburg Sonthofen in Allgäu and Ordensburg Vogelsang in the Eifel. The forth in Marienburg was never built. The first Vogelsang NS Junkers (cadets) arrived in 1936.

Ordungsburg Vogelsang (source: VoWo)

The Junkers were lectured, or rather indoctrinated, on Nazi ideology, race science and foreign policy, and they received intensive physical training. The nearby Walberhof airfield provided pilot training.

The Ordensburgen were to become the breeding ground for the future Nazi elite. Regular education in the Ordensburgen ended in 1939 when the Second World War broke out. Vogelsang Castle was handed over to the Wehrmacht and its Junkers drafted in the armed forces.

In the excellent video below you have a 360° view of Vogelsang and inside its buildings. Start the video and grab the video screen with your mouse to look around. The interview is in German, but you can select settings > subtitles > auto-translate and choose your language.

Ordensburg Vogelsang housed troops during the 1940 western campaign and several fighter squadrons were stationed at Walberdorf airfield. From 1941 until 1944, Vogelsang housed several Hitler schools. In 1944, military training was given to boys aged 15 to 16 from the Hitler Youth. Vogelsang was cleared in 1945 after Allied air strikes had destroyed several buildings.

CAMP VOGELSANG TRAINING AREA

After WWII, Ordensburg Vogelsang was in the western part of divided Germany, officially known as the Federal Republic of Germany (FRG). The area was taken over by the British Army in 1946. They initially planned to destroy this symbol of National Socialism but eventually turned it into a 6354 hectares (63km² or 25 sq mi) training area.

The people of the nearby village Wollseifen were ordered to leave the area and the village was then completely destroyed (later rebuild as urban warfare training area). Between 1946 and 1950, the British rebuild the castle, heavily damaged by air strikes. The training area consisted of nine firing ranges and an infantry exercise area. The British handed over Vogelsang to the Belgian Army in 1950.

Belgian 2L tank regiment M47 Pattons. Vogelsang 1962 (source: legerdiensst.be)

After the establishment of NATO in 1956, the Vogelsang training area was used for nearly five decades by the NATO countries Belgium, United Kingdom, United States, Canada, the Netherlands,  Luxemburg, Germany and France.

Belgian insignia Vogelsang
source: Christophe Cobbaut

Parts of the training area were returned to the civilians in 1960, reducing the training area to 4200 hectares. Over the years, the Belgians restored damaged buildings and added new ones. Vogelsang could accommodate 2500 troops and was used extensively for military exercises until 2005, when the camp was handed over completely to the German government.

Since 2006, the facility is open to the public as Vogelsang Internationaler Platz, part of Eifel National Park. You can visit the camp, which has an exhibit about its history and Nazi documentation on Vogelsang. They also organise guided tours. Burg Vogelsang is a protected monument since 1989.

SOVIET BASE VOGELSANG

The military twin of Camp Vogelsang was a Soviet base in Vogelsang near Zehdenick, 55 km (35 mi) north of Berlin, in former East Germany, officially known as the German Democratic Republic (GDR). Although less in size, this one had serious striking power.

Mural monument at the Vogelsang Soviet base (source: Johan van Elk)

After WWII, Vogelsang was still a small village in a vast and dense forest that was difficult to access. The Group of Soviet Occupation Forces in Germany (Rus. Группа советских оккупационных войск в Германии - ГСОВГ ) claimed 2,000 hectares of the forest and commissioned in 1952 the construction of a military base in Vogelsang. The construction of the base was planned, built and paid for by the East German government

Soviet Forces in Germany
The site gradually grew into a town with a population of 15,000 soldiers, their families and civilian personnel. The town included several barracks, medical facilities, shops, a theatre, gym and school, and was basically self-contained. Vogelsang became, next to Wüsdorf, the largest and most expensive garrison of the Group of Soviet Forces in Germany GSFG (Rus. Группа советских войск в Германии or ГСВГ )

The garrison housed the headquarters of the 25th tank division, 162nd tank regiment, 803rd Motor Rifle Regiment, 1702nd anti-aircraft missile regiment and the Tactical Missile Division.

In 1959, the Soviet R-5 and R-5M Pobeda (Rus. Побе́да, NATO name SS-3 Shyster) theatre ballistic missile became the main strike weapons of the garrison. They carried a 300 kt thermonuclear warhead that could reach all strategic targets in Europe. The R-5M missiles mainly targeted the PGM-17 Thor intermediate-range ballistic missile in the United Kingdom. Less than a year later, the Soviets withdrew the R-5's.

From 1983, the  TR-1 Temp (Rus, Темп-С, NATO name SS-12 Scaleboard) mobile theatre ballistic missiles with 1500 kt warhead were stored in Vogelsang. Enough to raise hell across Europe.

All Russian troops, then called Western Group of Forces, withdrew in 1994 and  the abandoned town and the military buildings were partly demolished. What remained of the military town is now gradually reclaimed by the forest, as shown in the aerial video of the base. 

Little was known about secret "object" Vogelsang, but gradually more details surfaced. At the Lenin in Vogelsang website are several memoirs of soldier Serik Kulmeshkenov(translation), Igor Platonov part1& part 2 (translation part 1& part 2), the son of an officer, and Colonel Zharky F.M. from the 25th division (translation),

Growing up on a Soviet base in the GDR is a podcast interview with Andrej, whose father was a lieutenant in the Soviet army. He lived with his parents in the GDR at Soviet base Wünsdorf, and in Rudersdorf and Prenzlau. His story gives an inside view on everyday life of the Soviet families in the GDR.
 
These stories make you realize that those Soviet military and families serving abroad were mostly people just like us, doing the same work, only other leaders and ideology. Cold War Conversations has more podcasts with personal stories.

VOGELSANG vs VOGELSANG

Although we cannot compare Camp Vogelsang training area with the Soviet Vogelsang base and its nuclear strike capabilities, we should consider the British occupation zone, which also included the Belgian Forces Germany, and the American and French occupation zones. These zones stretched from the western border of West Germany to the East German border. They too deployed nuclear missiles.

The MGM-1 Matador surface-to-surface cruise missiles, armed with nuclear warhead, were deployed in 1953 by the 1st Tactical Missile Squadron, based at Bitburg U.S. Air Base. These were withdrawn in 1962, but three U.S. Army battalions in Germany and two German Air Force wings received Pershing 1a nuclear missiles in 1965, and by 1985, the U.S had 108 Pershing II missiles in Germany and 464 nuclear armed cruise missiles in Germany and neighbouring countries.

And we didn't even mention the many unguided nuclear bombs, stored by both NATO and Soviet units on many locations in powder keg Germany, let alone the thousands of ICBMs, both fixed and mobile, in the US and USSR. In the end, all occupation troops left Germany in the 1990s, fortunately without firing a single doomsday-shot. The last troops to leave were the Belgian Forces Germany in 2005. In hindsight, a bit weird that we slept like babies when stationed there.

More info on Ordensburg/Camp Vogelsang (former West Germany)

More info on Soviet base Vogelsang (former East Germany)

Viewing all 111 articles
Browse latest View live


Latest Images