Cryptologic Technician Training Series
Author : Suzanne Richter
Publisher :
Page : 108 pages
File Size : 12,65 MB
Release : 1992
Category :
ISBN :
Author : Suzanne Richter
Publisher :
Page : 108 pages
File Size : 12,65 MB
Release : 1992
Category :
ISBN :
Author : United States. Naval Education and Training Command
Publisher :
Page : 466 pages
File Size : 39,8 MB
Release : 1990
Category : Naval education
ISBN :
Author : Mark Borgerson
Publisher :
Page : 185 pages
File Size : 31,1 MB
Release : 2019-01-11
Category :
ISBN : 9781791546175
What was it like to work for the largest US intelligence agency during the Cold War? This memoir covers five years in the Naval Security Group, one of the Service Cryptologic Agencies contributing to the National Security Agency. It covers two years of training and service as a linguist and radiotelephone intercept operator and 3 years as a cryptologic officer collecting signal intelligence on French nuclear testing and Soviet missile testing.
Author :
Publisher :
Page : 286 pages
File Size : 30,79 MB
Release : 1995
Category : Naval art and science
ISBN :
Author : Sharon A. Maneki
Publisher : CreateSpace
Page : 34 pages
File Size : 31,62 MB
Release : 2013-12-16
Category : Political Science
ISBN : 9781494245467
The following paper will examine the nature of the Soviet electronic penetration and the damage assessment of Soviet access to typewriters at the U.S. embassy in Moscow. This history of Project GUNMAN will also answer such questions as how the typewriter bugs were discovered and how they worked.
Author : Marty Skovlund, Jr.
Publisher : HarperCollins
Page : 380 pages
File Size : 49,93 MB
Release : 2024-05-07
Category : Biography & Autobiography
ISBN : 0063039915
The extraordinary story of American special operator and trailblazer Shannon Kent, who hunted high value targets on classified missions in the most dangerous locales on earth while trying to balance her life as a wife and mother. Of the 1.3 million active-duty service members in the US military, only a tiny fraction are selected as “operators.” Shannon Kent was one of the first women to serve at this level and was widely recognized as one of the best. Shannon served as a Navy cryptologic technician, responsible for signals intelligence and electronic warfare, but her proficiency with language set her apart. She was assigned to a unit so secretive that its name can’t even be printed here, where she worked clandestinely to hunt the most wanted terrorists in the world. Send Me is Shannon’s heroic life story, revealing the truth of both her work and the challenges she faced while trying to raise a family with her husband Joe, himself a Special Forces soldier. He and Shannon met in a war zone, their love forged during a special operations training course, their dedication spanning multiple combat deployments and the birth of their two boys. It is the legacy of an extraordinary woman who rose to the apex of the military, working with the most elite forces in the world, lifting the veil from the life of a Special Forces family to share their duty, sacrifice, and humanity.
Author : United States. Superintendent of Documents
Publisher :
Page : pages
File Size : 21,97 MB
Release : 1985
Category : Government publications
ISBN :
February issue includes Appendix entitled Directory of United States Government periodicals and subscription publications; September issue includes List of depository libraries; June and December issues include semiannual index
Author : Benjamin Wittes
Publisher : Amberley Publishing Limited
Page : 417 pages
File Size : 13,33 MB
Release : 2016-03-15
Category : History
ISBN : 1445655942
The terrifying new role of technology in a world at war
Author : David P. Mowry
Publisher : Military Bookshop
Page : 104 pages
File Size : 45,4 MB
Release : 2012-08
Category : History
ISBN : 9781782661610
This publication joins two cryptologic history monographs that were published separately in 1989. In part I, the author identifies and presents a thorough account of German intelligence organizations engaged in clandestine work in South America as well as a detailed report of the U.S. response to the perceived threat. Part II deals with the cryptographic systems used by the varioius German intelligence organizations engaged in clandestine activities.
Author :
Publisher :
Page : 630 pages
File Size : 10,71 MB
Release : 1989
Category : Government publications
ISBN :