" COMMAND AND CONTROL " U.S. ARMY SACCS COLD WAR COMPUTER NETWORK FOR STRATEGIC COMMAND 29434 Xx

Поделиться
HTML-код
  • Опубликовано: 16 окт 2024

Комментарии • 5

  • @spyhunt
    @spyhunt 6 лет назад +3

    I served from 1981 to 1987 and served in every shred codes of the 465L system. I started with he EDTCC repairs and maintenance, then got shifted to an RCC/Sub-A shop after they lost 3/4th of their guys after a drug bust. Then, when the new assigned RCC folks came in to fill the RCC I was moved back the LCC, then to the DDC, and then back to the TCC, earning a 5 level in each and every one of these work centers. Then I figured out a technical flaw in the KG-13s we used on the system, so I was quickly sent to a fast track of the crypto school (piece of cake as I was already a 7 level in both Computer and Switching Systems), and then spent some time getting certified as a crypto tech, and was assigned to a maintencance supervision role, with a special focus on the extemely costly workcenters where I have worked at one time or another, and was duty a duty AFSC as a 9 level, even though it was way about my pay grade, and repairs an E9, E8, two E6's, and two E5s, even though I was still only an E4 myself at the time. I routinely wrote TS official white papers of cryptographic vulnerabilities based on actual measurements, and weak points (in TS reports) where the classified facilities could be covertly accessed, or problems should shielding or cipher strength was the facility to including harpooning the KG-13 that were just gain popular usage. Our commander even obtained black funds to provide my office with the most sophisticated spectrum analyzers that we stashed in the area of concern, but which was kept locked down and out of view. He also equipment some specialized received needed to facility my classified reports on signal leakage (usually due to improper maintenance, or some fool (Captains, Majors, and other people who should know better) bring their laptops into classified equipment areas as I could tell the make and model of laptop from the signals leaking from the laptop and used a sliding gate to drastically push up time domain gain. It used to severely annoy the OSI TSCM when they would come in as the classified equipment areas, command posts, etc were not found to be as leaky as they were finding at other bases due to my active signals vigilance, and then they (AFOSI) picked a fit as we had purchased two million dollars of gear and were a rack of gear 7/24 at four locations and documented anything and everything as to date, time and signal geometry that was popping up inside these classified work centers. Amusingly, or rather no so amusingly the equipment which we had hidden and which was operating 7/24 would be also operating during official TSCM inspections after which my commander would submit a list of signals that were active and which were not detected with the AFOSI teams coming through. The really funny ones where the inspectors could be heard over the air with their various alerting devices (like a non-linear junction detector) and My equipment a mile away in four different locations were logging the signals and mapping out their location. After a few political tiffs, the Colonel told me to reveal the locations and the configurations I was using to catch things, and it got elevated to me testifying before Congress in a closed session that ripped apart the TSCM program that was in effect at the time and which was missing so much stuff. Good times.​

  • @jaminova_1969
    @jaminova_1969 4 месяца назад

    "Gentleman, you cant fight in here , this is the war room ! "

  • @hckyplyr9285
    @hckyplyr9285 8 лет назад +2

    Very interesting. Thank you. Did not know anything about this.

  • @17630973
    @17630973 7 лет назад +1

    Our new website SAC465L.org is now up and running for reuniting troops who worked on the 465L system.

  • @johnhopkins6260
    @johnhopkins6260 4 года назад +1

    Skynet vs. 485L... (27671 - ECM/ECCM)