Home

Spycraft. Part 28

Spycraft. - novelonlinefull.com

You’re read light novel Spycraft. Part 28 online at NovelOnlineFull.com. Please use the follow button to get notification about the latest chapter next time when you visit NovelOnlineFull.com. Use F11 button to read novel in full-screen(PC only). Drop by anytime you want to read free – fast – latest novel. It’s great if you could leave a comment, share your opinion about the new chapters, new novel with others on the internet. We’ll do our best to bring you the finest, latest novel everyday. Enjoy

3 "Cover" refers to the a.s.sumed or created ident.i.ty, occupation and background of an intelligence operative. An operative can be a.s.signed an occupational cover in his true name or can be placed "under cover" in an alias ident.i.ty. The "backstopping" of cover refers to all the personal and official doc.u.mentation as well as confidential arrangements made with government or private organizations to verify the operative's legitimacy. "Cover" refers to the a.s.sumed or created ident.i.ty, occupation and background of an intelligence operative. An operative can be a.s.signed an occupational cover in his true name or can be placed "under cover" in an alias ident.i.ty. The "backstopping" of cover refers to all the personal and official doc.u.mentation as well as confidential arrangements made with government or private organizations to verify the operative's legitimacy.

4 Doc.u.menting the alias ident.i.ties of officers and agents has remained a core mission of OTS throughout its history. Doc.u.menting the alias ident.i.ties of officers and agents has remained a core mission of OTS throughout its history.

5 Strahle interview. Strahle interview.

6 During disguise presentations, particularly for middle-aged audiences, OTS briefers had one a.s.sured laugh line. "Here in the OTS disguise shop we specialize in making you look older and fatter. If you want to look younger and thinner, we recommend you talk with the Office of Medical Service." There was truth in the humor. No matter how tight the corset, body weight did not change. No matter the direction of push, flesh would not move more than an inch or two. Graying the hair of a thirty-five-year-old and adding a salt-and-pepper beard could make a twenty-year difference. Coloring jet-black the graying hair of a paunchy fifty-year-old produced little more than the appearance of a middle-aged guy unsuccessfully dealing with his midlife crisis. During disguise presentations, particularly for middle-aged audiences, OTS briefers had one a.s.sured laugh line. "Here in the OTS disguise shop we specialize in making you look older and fatter. If you want to look younger and thinner, we recommend you talk with the Office of Medical Service." There was truth in the humor. No matter how tight the corset, body weight did not change. No matter the direction of push, flesh would not move more than an inch or two. Graying the hair of a thirty-five-year-old and adding a salt-and-pepper beard could make a twenty-year difference. Coloring jet-black the graying hair of a paunchy fifty-year-old produced little more than the appearance of a middle-aged guy unsuccessfully dealing with his midlife crisis.

7 For a more detailed treatment of "exfiltrations" and disguise, see: Mendez, For a more detailed treatment of "exfiltrations" and disguise, see: Mendez, The Master of Disguise. The Master of Disguise.



CHAPTER TWENTY-TWO.

1 David Kahn, David Kahn, The Codebreakers The Codebreakers (New York: Macmillan, 1967), 122. (New York: Macmillan, 1967), 122.

2 Center for the Study of Intelligence, "Intelligence in the War of Independence" monograph (Washington, D.C.: Central Intelligence Agency, undated), 33. Center for the Study of Intelligence, "Intelligence in the War of Independence" monograph (Washington, D.C.: Central Intelligence Agency, undated), 33.

3 Ibid. Ibid.

4 Anthony Cave Brown (editor), Anthony Cave Brown (editor), The Secret War Report of the OSS The Secret War Report of the OSS (New York: Berkley, 1976), 76-77. (New York: Berkley, 1976), 76-77.

5 Ibid., 77. Ibid., 77.

6 Ibid. Ibid.

7 McLean, McLean, The Plumber's Kitchen The Plumber's Kitchen, 11.

8 Ibid., 239-242. Ibid., 239-242.

9 For more on MIS-X see: Lloyd R. Shoemaker, For more on MIS-X see: Lloyd R. Shoemaker, The Escape Factory: The Story of MIS-X The Escape Factory: The Story of MIS-X (New York: St. Martin's Press, 1990). (New York: St. Martin's Press, 1990).

10 David Crawford, David Crawford, Volunteers: The Betrayal of National Defense Secrets by Air Force Traito Volunteers: The Betrayal of National Defense Secrets by Air Force Traitors (Washington, D.C.: Air Force Office of Special Investigations, 1988), 24.

11 See: Melton, See: Melton, CIA Special Weapons and Equipment CIA Special Weapons and Equipment, 113, for photographs of a concealment desk.

12 See: Melton, See: Melton, Ultimate Spy Ultimate Spy, 162, for photographs.

13 See: Melton, See: Melton, Ultimate Spy Ultimate Spy, 161, for photographs.

14 Mendez, Mendez, The Master of Disguise The Master of Disguise, 224.

15 The concealment techs could prepare virtually any type of wild or domesticated animal as "host carca.s.ses" for dead drops. The DO case officers, however, were squeamish and agreed to proceed only with pigeons and rats. Mendez, The concealment techs could prepare virtually any type of wild or domesticated animal as "host carca.s.ses" for dead drops. The DO case officers, however, were squeamish and agreed to proceed only with pigeons and rats. Mendez, The Master of Disguise The Master of Disguise, 224-225, presents more examples.

16 An "exfiltration" is a clandestine operation to move an officer, defector, or agent across international borders without the knowledge of any hostile security service. An "exfiltration" is a clandestine operation to move an officer, defector, or agent across international borders without the knowledge of any hostile security service.

17 Mendez, Mendez, The Master of Disguise The Master of Disguise, 140.

18 The al-Qaeda terrorist organization used a Trojan-horse concealment to a.s.sa.s.sinate Ahmed Shah Ma.s.soud, the leader of the Afghanistan's anti-Taliban Northern Alliance in Afghanistan, on September 9, 2001. Two al-Qaeda operatives posing as journalists secured an audience with Ma.s.soud. One carried a video camera packed with explosives. During the "interview" the explosive was detonated and Ma.s.soud killed. The al-Qaeda terrorist organization used a Trojan-horse concealment to a.s.sa.s.sinate Ahmed Shah Ma.s.soud, the leader of the Afghanistan's anti-Taliban Northern Alliance in Afghanistan, on September 9, 2001. Two al-Qaeda operatives posing as journalists secured an audience with Ma.s.soud. One carried a video camera packed with explosives. During the "interview" the explosive was detonated and Ma.s.soud killed.

19 Rustmann, Rustmann, CIA, INC., CIA, INC., 53-56. 53-56.

20 Actor Desmond Llewelyn became Q beginning with Actor Desmond Llewelyn became Q beginning with From Russia with Love From Russia with Love in 1963 and continued in the Bond movies until his accidental death in a car accident in 1999. in 1963 and continued in the Bond movies until his accidental death in a car accident in 1999.

21 On occasion, senior CIA executives would visit the lab and be treated to a "show and tell" to demonstrate the value of concealments. During one such visit, a lab engineer proudly displayed a laptop computer that had been configured as an active concealment device for use by a Soviet agent. The electronics for the intelligence function had been masterfully integrated into the overall unit and even when the computer was disa.s.sembled, the fact that any modification had been made was not apparent or visible. The executive visitor asked, "How long did this take?" "Two hundred work days," replied the tech. "How many did you make?" "Only this one." "Well, if you made a hundred, you can be a lot more efficient," came the response. The operational imperative for one-of-a-kind concealments for Soviet operations seemed lost to the visitor. On occasion, senior CIA executives would visit the lab and be treated to a "show and tell" to demonstrate the value of concealments. During one such visit, a lab engineer proudly displayed a laptop computer that had been configured as an active concealment device for use by a Soviet agent. The electronics for the intelligence function had been masterfully integrated into the overall unit and even when the computer was disa.s.sembled, the fact that any modification had been made was not apparent or visible. The executive visitor asked, "How long did this take?" "Two hundred work days," replied the tech. "How many did you make?" "Only this one." "Well, if you made a hundred, you can be a lot more efficient," came the response. The operational imperative for one-of-a-kind concealments for Soviet operations seemed lost to the visitor.

22 For images and a description of a concealment desk see: Melton, For images and a description of a concealment desk see: Melton, CIA Special Weapons and Equipment, CIA Special Weapons and Equipment, 113. 113.

CHAPTER TWENTY-THREE.

1 A target staying at a little-used hotel might be surveilled from OP's setup temporarily to monitor the hotel's entrances. Covert video cameras could be concealed in parked cars outside each hotel entrance and feed "live video" to the watcher team set up in an adjacent hotel. Conversely, a "long-term" stationary OP might be established for the purpose of photographing all individuals entering and leaving a radical mosque that is a known transit point for new recruits departing Europe for terrorist training in the Middle East. A target staying at a little-used hotel might be surveilled from OP's setup temporarily to monitor the hotel's entrances. Covert video cameras could be concealed in parked cars outside each hotel entrance and feed "live video" to the watcher team set up in an adjacent hotel. Conversely, a "long-term" stationary OP might be established for the purpose of photographing all individuals entering and leaving a radical mosque that is a known transit point for new recruits departing Europe for terrorist training in the Middle East.

2 There are two types of telephoto lenses, refractive and reflex mirror (catadioptric). Refractive lenses (as in a telescope) are usually much larger than "mirror" lenses which have a system of mirrors and lenses to fold up the optical path causing the light pa.s.sing through the instrument to do so in a zigzag fashion and greatly reduce the physical size and length of the unit. The compactness of a mirror lens is often desirable for surveillance photography. "Fast" lenses have larger areas of gla.s.s to gather more light, but are more difficult to conceal. "Slow" lenses are easier to hide, but require longer exposure times to take acceptable images and are vulnerable to vibration. See: Raymond P. Siljander, There are two types of telephoto lenses, refractive and reflex mirror (catadioptric). Refractive lenses (as in a telescope) are usually much larger than "mirror" lenses which have a system of mirrors and lenses to fold up the optical path causing the light pa.s.sing through the instrument to do so in a zigzag fashion and greatly reduce the physical size and length of the unit. The compactness of a mirror lens is often desirable for surveillance photography. "Fast" lenses have larger areas of gla.s.s to gather more light, but are more difficult to conceal. "Slow" lenses are easier to hide, but require longer exposure times to take acceptable images and are vulnerable to vibration. See: Raymond P. Siljander, Fundamentals of Physical Surveillance: A Guide for Uniformed and Plainclothes Personnel Fundamentals of Physical Surveillance: A Guide for Uniformed and Plainclothes Personnel (Springfield, Illinois: Charles C. Thomas, 1977), 182. (Springfield, Illinois: Charles C. Thomas, 1977), 182.

3 Telephoto lenses amplify any vibrations present and require firm support of the lens and camera a.s.sembly. The longer the lens on the camera, however, the more difficult it is to use and the more likely is a loss of image quality. Inclement weather, dust, and haze can significantly degrade the quality of the image. See: Siljander, Telephoto lenses amplify any vibrations present and require firm support of the lens and camera a.s.sembly. The longer the lens on the camera, however, the more difficult it is to use and the more likely is a loss of image quality. Inclement weather, dust, and haze can significantly degrade the quality of the image. See: Siljander, Fundamentals of Physical Surveillance, Fundamentals of Physical Surveillance, 195. 195.

4 Each doubling of film speed represents a doubling in the film's sensitivity to light. "Push processing" allows film to be exposed at higher than rated ASA levels and developed using special processes to artificially "push" the ASA sensitivity to match exposure levels. It is possible to "push process" a commercially available ASA 6400 film to ASA 12800, ASA 25600, or even higher and still take an acceptable photograph of a target to produce a positive identification. Each doubling of film speed represents a doubling in the film's sensitivity to light. "Push processing" allows film to be exposed at higher than rated ASA levels and developed using special processes to artificially "push" the ASA sensitivity to match exposure levels. It is possible to "push process" a commercially available ASA 6400 film to ASA 12800, ASA 25600, or even higher and still take an acceptable photograph of a target to produce a positive identification.

5 A conventional strobe flash unit covered with a Kodak Wratten 87C filter emits light in the infrared spectrum at wavelengths from 750 to 900 millimicrons. For an example of clandestine infrared photography using this technique see: Melton, A conventional strobe flash unit covered with a Kodak Wratten 87C filter emits light in the infrared spectrum at wavelengths from 750 to 900 millimicrons. For an example of clandestine infrared photography using this technique see: Melton, CIA Special Weapons and Equipment CIA Special Weapons and Equipment, 37.

6 Melton, Melton, CIA Special Weapons and Equipment CIA Special Weapons and Equipment, 71.

7 Pheromones, chemicals secreted by an animal, especially an insect, are used as aids for surveillance tracking. Pheromones, chemicals secreted by an animal, especially an insect, are used as aids for surveillance tracking.

8 A well-known "spy shop" in New York City in the 1980s advertised repackaged, commercial-grade products, using unsubstantiated claims of technical capability that bordered on the unbelievable, such as: "Tell if any phone call anywhere in the world is bugged or recorded using this all-in-one briefcase counterspy kit!" Even more amazing was its "graduated" concept of pricing that produced catalogs and pricelists in English, Spanish, and Arabic. The same equipment was in all catalogs, only the prices changed; the prices in Spanish were double those in the English, and the Arabic version was four times higher! A well-known "spy shop" in New York City in the 1980s advertised repackaged, commercial-grade products, using unsubstantiated claims of technical capability that bordered on the unbelievable, such as: "Tell if any phone call anywhere in the world is bugged or recorded using this all-in-one briefcase counterspy kit!" Even more amazing was its "graduated" concept of pricing that produced catalogs and pricelists in English, Spanish, and Arabic. The same equipment was in all catalogs, only the prices changed; the prices in Spanish were double those in the English, and the Arabic version was four times higher!

9 Contractors and employees who have successfully undergone background investigations are provided with varying levels of security clearances in order to be able to work with the CIA. Contractors and employees who have successfully undergone background investigations are provided with varying levels of security clearances in order to be able to work with the CIA.

10 In 1827, Sir Charles Wheatstone coined the phrase "microphone." See: In 1827, Sir Charles Wheatstone coined the phrase "microphone." See: inventors.about.com/od/mstartinventions/a/microphone.htm. When sound waves contact a microphone, they cause the thin flexible internal diaphragm to vibrate. These vibrations are converted into an electrical signal, which varies in voltage, amplitude and frequency in an a.n.a.log of the original sound. See: http://www. edinformatics.com/inventions_inventors/microphone.htm.

11 For photographs and technical descriptions see: Melton, For photographs and technical descriptions see: Melton, CIA Special Weapons and Equipment, CIA Special Weapons and Equipment, 65. 65.

12 For photographs and information on the fine-wire kit see: Melton, For photographs and information on the fine-wire kit see: Melton, CIA Special Weapons and Equipment, CIA Special Weapons and Equipment, 67, and Melton, 67, and Melton, Ultimate Spy Ultimate Spy, 102.

13 Richard Tomlinson, Richard Tomlinson, The Big Breach: From Top Secret to Maximum Security The Big Breach: From Top Secret to Maximum Security (Moscow: Narodny Variant Publishers, 2000), 104. (Moscow: Narodny Variant Publishers, 2000), 104.

14 Ibid., 104-105. Ibid., 104-105.

15 Rustmann, Rustmann, CIA, INC., CIA, INC., 54. 54.

16 For a photograph of a disposable "quick plant" writing pen, see: Melton, For a photograph of a disposable "quick plant" writing pen, see: Melton, Ultimate Spy, Ultimate Spy, 103. 103.

17 Rustmann, Rustmann, CIA, INC., CIA, INC., 57. 57.

18 Melton, Melton, Ultimate Spy Ultimate Spy, 96, 105.

19 Bob Woodward, Bob Woodward, Veil, Veil, 147. 147.

20 A "wood block" is an audio eavesdropping device usually consisting of a microphone, transmitter, and batteries built inside a hollow section of wooden molding or part of a table support or chair leg. Such devices are intended to be quickly exchanged with their identical counterpart inside the target location. A "wood block" is an audio eavesdropping device usually consisting of a microphone, transmitter, and batteries built inside a hollow section of wooden molding or part of a table support or chair leg. Such devices are intended to be quickly exchanged with their identical counterpart inside the target location.

21 For photographs of "wood blocks" inside modified furniture components see: Melton, For photographs of "wood blocks" inside modified furniture components see: Melton, Ultimate Spy Ultimate Spy, 105.

22 See: Melton, See: Melton, Ultimate Spy Ultimate Spy, 103.

23 Experience taught that the ideal book to be swapped was on the top shelf where it was harder for the target to reach and less likely to be read and examined. Experience taught that the ideal book to be swapped was on the top shelf where it was harder for the target to reach and less likely to be read and examined.

24 Glinsky, Glinsky, Theremin, Theremin, 273; see also: Melton, 273; see also: Melton, Ultimate Spy Ultimate Spy, 104, for photos of the Great Seal and diagrams of the resonator.

25 See: a.s.sociated Press article by Ted Bridis "CIA Gadget Museum Showcase Robot Fish, Pigeon Camera, Tiger Dropping Microphone" on See: a.s.sociated Press article by Ted Bridis "CIA Gadget Museum Showcase Robot Fish, Pigeon Camera, Tiger Dropping Microphone" on www.mind-fully.org/Technology/2003/CIA-Museum26dec03.htm.

26 A "provocation" would be an act by the officer to elude surveillance such as getting on, and then immediately off a subway car, or speeding through an urban area to "lose" the trailing vehicle. A "provocation" would be an act by the officer to elude surveillance such as getting on, and then immediately off a subway car, or speeding through an urban area to "lose" the trailing vehicle.

27 Floyd L. Paseman, Floyd L. Paseman, A Spy's Journey: A CIA Memoir A Spy's Journey: A CIA Memoir (St. Paul, Minnesota: Zenith Press, 2004), 61. (St. Paul, Minnesota: Zenith Press, 2004), 61.

28 Planar eyegla.s.s lenses are noticeably thick, but do not provide any optical magnification. The contents of a portable disguise kit issued to a CIA officer going abroad can be seen in Melton, Planar eyegla.s.s lenses are noticeably thick, but do not provide any optical magnification. The contents of a portable disguise kit issued to a CIA officer going abroad can be seen in Melton, CIA Special Weapons and Equipment CIA Special Weapons and Equipment, 105, and Melton, Ultimate Spy Ultimate Spy, 131.

29 The sculpted facial disguises were remarkably lifelike. OTS received a.s.sistance from Oscar-winning mask designer John Chambers ( The sculpted facial disguises were remarkably lifelike. OTS received a.s.sistance from Oscar-winning mask designer John Chambers (Planet of the Apes) to help create disguises for intelligence officers. See: by Michael E. Ruane, "Seeing is Deceiving," "Seeing is Deceiving," Washington Post Washington Post, February 15, 2000.

CHAPTER TWENTY-FOUR.

1 An agent requires the ability to both receive and send covert communications. A shortwave radio with a one-time pad is an example of an "agent-receive" system. Secret writing carbons and accommodation addresses represent an "agent-send" system. An agent requires the ability to both receive and send covert communications. A shortwave radio with a one-time pad is an example of an "agent-receive" system. Secret writing carbons and accommodation addresses represent an "agent-send" system.

2 Steganography is defined as "covered writing" or the art of communicating in a way that masks the very existence of the communication. See: Eric Cole, Steganography is defined as "covered writing" or the art of communicating in a way that masks the very existence of the communication. See: Eric Cole, Hiding in Plain Sight: Steganography and the Art of Covert Communication Hiding in Plain Sight: Steganography and the Art of Covert Communication (Indianapolis, Indiana: Wiley Publishing, 2003) for a detailed description of the uses of steganography for clandestine communication. Cole is a former CIA officer who specialized in the development of secure communication systems. (Indianapolis, Indiana: Wiley Publishing, 2003) for a detailed description of the uses of steganography for clandestine communication. Cole is a former CIA officer who specialized in the development of secure communication systems.

3 Through the 1970s, personal meetings also became increasingly technology dependent. Electronic signaling and nonattributable telephone calls replaced chalk marks and lipstick smears to trigger clandestine meetings. Case officers wore earpieces to listen for surveillance transmissions to determine if they were being followed. Ident.i.ty-altering clothing and accessories were among other technical tools applied to a.s.sure the security of "low tech" personal meetings. Through the 1970s, personal meetings also became increasingly technology dependent. Electronic signaling and nonattributable telephone calls replaced chalk marks and lipstick smears to trigger clandestine meetings. Case officers wore earpieces to listen for surveillance transmissions to determine if they were being followed. Ident.i.ty-altering clothing and accessories were among other technical tools applied to a.s.sure the security of "low tech" personal meetings.

4 "Unnatural acts" appear out-of-the-ordinary or suspicious when observed and serve as a "flag" to alert counterintelligence. For example, making a large chalk X on a telephone pole or repeatedly looking over one's shoulder while walking down a street are uncharacteristic actions and could prompt further attention from security or law enforcement officials. "Unnatural acts" appear out-of-the-ordinary or suspicious when observed and serve as a "flag" to alert counterintelligence. For example, making a large chalk X on a telephone pole or repeatedly looking over one's shoulder while walking down a street are uncharacteristic actions and could prompt further attention from security or law enforcement officials.

5 Crawford, Crawford, Volunteers, Volunteers, 26. 26.

6 Ibid., 27. Ibid., 27.

7 Weiser, Weiser, A Secret Life, A Secret Life, 74. 74.

8 Ibid. Ibid.

9 For visual examples of sophisticated criminal "brush pa.s.ses" see the 1973 movie For visual examples of sophisticated criminal "brush pa.s.ses" see the 1973 movie Harry in Your Pocket Harry in Your Pocket.

10 Weiser, Weiser, A Secret Life, A Secret Life, 81. 81.

11 Ibid., 75. Ibid., 75.

12 Crawford, Crawford, Volunteers Volunteers, 27.

13 Victor Suvorov, Victor Suvorov, Inside Soviet Military Intelligence Inside Soviet Military Intelligence (New York: Macmillan, 1984), 119. (New York: Macmillan, 1984), 119.

14 Crawford, Crawford, Volunteers, Volunteers, 28. 28.

15 British intelligence (MI6) refers to them as "dead letter boxes" (DLBs). British intelligence (MI6) refers to them as "dead letter boxes" (DLBs).

16 CIA officer Aldrich Ames, a mole for the KGB and Russian Intelligence Service (SVR), sharply complained to his handler about the size of the dead drop site (code name PIPE) they had selected for his use along a horse path in Maryland's Wheaton Regional Park. Ames communicated that he needed more money and estimated that the size of the drainpipe used for the dead drop would accommodate up to $100,000. See: Wise, CIA officer Aldrich Ames, a mole for the KGB and Russian Intelligence Service (SVR), sharply complained to his handler about the size of the dead drop site (code name PIPE) they had selected for his use along a horse path in Maryland's Wheaton Regional Park. Ames communicated that he needed more money and estimated that the size of the drainpipe used for the dead drop would accommodate up to $100,000. See: Wise, Nightmover, Nightmover, 220. 220.

17 Weiser, Weiser, A Secret Life, A Secret Life, 58. 58.

18 Before the FBI arrested Ames on February 21, 1994, they attempted to lure a SVR officer into a trap by leaving a horizontal chalk mark on the side of a U.S. Postal Service mailbox located at the corner of R Street and 37th Street in Washington, D.C. Unbeknownst to the FBI, however, the SVR had changed the location of the signal site. The horizontal mark left by the FBI meant nothing and the SVR didn't respond. See: Wise, Before the FBI arrested Ames on February 21, 1994, they attempted to lure a SVR officer into a trap by leaving a horizontal chalk mark on the side of a U.S. Postal Service mailbox located at the corner of R Street and 37th Street in Washington, D.C. Unbeknownst to the FBI, however, the SVR had changed the location of the signal site. The horizontal mark left by the FBI meant nothing and the SVR didn't respond. See: Wise, Nightmover, Nightmover, 272-273. 272-273.

19 Crawford, Crawford, Volunteers, Volunteers, 30. The most famous instance of a botched signal occurred on May 19, 1985, when KGB spy John Walker was partic.i.p.ating in a complicatedsignal and drop sequence in rural Montgomery County, Maryland. The KGB officer arrived in the general area and left a soda can at the base of a stop sign to signal his presence. Walker left a second can at the base of another stop sign as a signal to the KGB. Walker saw the can left by the KGB officer and proceeded to leave his secret doc.u.ments at the base of a telephone pole some distance away. Unbeknownst to the KGB, the FBI had Walker under surveillance and made the mistake of removing the signal can he left at the stop sign. When the KGB officer could not see Walker's can to confirm that he was in the area, he followed his instructions and aborted the operation. After leaving the secret doc.u.ments, Walker proceeded to a second drop location where the KGB was to have left money for him. He found nothing and when he returned to retrieve the doc.u.ments, they were gone as well. Walker was arrested early the next morning at the Ramada Hotel in nearby Rockville, Maryland, and the KGB officer departed the country for the Soviet Union the following day. See: Jack Kneece, 30. The most famous instance of a botched signal occurred on May 19, 1985, when KGB spy John Walker was partic.i.p.ating in a complicatedsignal and drop sequence in rural Montgomery County, Maryland. The KGB officer arrived in the general area and left a soda can at the base of a stop sign to signal his presence. Walker left a second can at the base of another stop sign as a signal to the KGB. Walker saw the can left by the KGB officer and proceeded to leave his secret doc.u.ments at the base of a telephone pole some distance away. Unbeknownst to the KGB, the FBI had Walker under surveillance and made the mistake of removing the signal can he left at the stop sign. When the KGB officer could not see Walker's can to confirm that he was in the area, he followed his instructions and aborted the operation. After leaving the secret doc.u.ments, Walker proceeded to a second drop location where the KGB was to have left money for him. He found nothing and when he returned to retrieve the doc.u.ments, they were gone as well. Walker was arrested early the next morning at the Ramada Hotel in nearby Rockville, Maryland, and the KGB officer departed the country for the Soviet Union the following day. See: Jack Kneece, Family Treason, The Walker Spy Case Family Treason, The Walker Spy Case (New York: Stein and Day, 1986), 109-123. (New York: Stein and Day, 1986), 109-123.

20 Polmar and Allen, Polmar and Allen, Spy Book Spy Book, 573, describes secret writing. Spy Book Spy Book attributes to Ovid in "Art of Love" counsel that one's missive "can escape curious eyes when written in new milk [then] touch it with [charcoal] dust and you will read." attributes to Ovid in "Art of Love" counsel that one's missive "can escape curious eyes when written in new milk [then] touch it with [charcoal] dust and you will read."

21 Joseph B. Smith, Joseph B. Smith, Portrait of a Cold Warrior: Second Thoughts of a Top CIA Agent Portrait of a Cold Warrior: Second Thoughts of a Top CIA Agent (New York: G.P. Putnam's Sons, 1976), 130-131. (New York: G.P. Putnam's Sons, 1976), 130-131.

22 Ibid., 131. Ibid., 131.

23 Accommodation addresses differed from dead drops in that once a letter was dropped in a mailbox both the agent and the handler lost control of the message. An effective AA would have a constant stream of business or personal correspondence, letters, and postcards going and coming. In some countries, a post office box or a "letter-drop" provided an adequately safe and convenient type of accommodation address. A message can be communicated through an AA without SW if the type, style, or color of a postcard is, in itself, the signal. For example, a recruited agent who has just returned from a posting abroad could signal to the CIA his willingness to begin his clandestine work by mailing a specific type of postcard to an innocuous AA. For the most sensitive agents, AAs were used only once. Accommodation addresses differed from dead drops in that once a letter was dropped in a mailbox both the agent and the handler lost control of the message. An effective AA would have a constant stream of business or personal correspondence, letters, and postcards going and coming. In some countries, a post office box or a "letter-drop" provided an adequately safe and convenient type of accommodation address. A message can be communicated through an AA without SW if the type, style, or color of a postcard is, in itself, the signal. For example, a recruited agent who has just returned from a posting abroad could signal to the CIA his willingness to begin his clandestine work by mailing a specific type of postcard to an innocuous AA. For the most sensitive agents, AAs were used only once.

24 Weiser, Weiser, A Secret Life, A Secret Life, 23. 23.

25 During World War I German agents traveling to the United States impregnated articles of clothing with their secret inks. To recover the ink, a scarf or a shoelace would be soaked in distilled water. During World War I German agents traveling to the United States impregnated articles of clothing with their secret inks. To recover the ink, a scarf or a shoelace would be soaked in distilled water.

26 Tomlinson, Tomlinson, The Big Breach, The Big Breach, 82-83. 82-83.

27 Ibid., 65. Ibid., 65.

28 Ibid., 65-66. Ibid., 65-66.

29 Ibid., 127. The chemical formulation for the reagent was not specified by Tomlinson. Ibid., 127. The chemical formulation for the reagent was not specified by Tomlinson.

30 See: Melton, See: Melton, Ultimate Spy, Ultimate Spy, 150. 150.

31 A microdot communication to an agent would normally carry several identical dots buried in different locations. One longtime microdot user explained, "Three dots to an agent was the minimum. The first he wouldn't find. He would find the next but would drop it or a gust of wind from an open window would blow it away. Hopefully he would find and read the third one." A microdot communication to an agent would normally carry several identical dots buried in different locations. One longtime microdot user explained, "Three dots to an agent was the minimum. The first he wouldn't find. He would find the next but would drop it or a gust of wind from an open window would blow it away. Hopefully he would find and read the third one."

32 The original "bullet" lens was invented by Charles Stanhope in London in the late 1700s. This small magnifying lens (the "Stanhope") was used originally in the textile industry to count the number of cotton fibers in a field, and was further refined by Henry Coddington in 1830. The Stanhope lens was used well into the 1800s and later saw popular use in the making of "peeps" for viewing tiny "girlie pictures" that were sold at carnivals and sideshows, and even for a miniature version of "The Lord's Prayer." The original "bullet" lens was invented by Charles Stanhope in London in the late 1700s. This small magnifying lens (the "Stanhope") was used originally in the textile industry to count the number of cotton fibers in a field, and was further refined by Henry Coddington in 1830. The Stanhope lens was used well into the 1800s and later saw popular use in the making of "peeps" for viewing tiny "girlie pictures" that were sold at carnivals and sideshows, and even for a miniature version of "The Lord's Prayer."

33 Ibid. Ibid.

34 The original magazine is displayed inside Moscow's FSB Counterintelligence Museum. The original magazine is displayed inside Moscow's FSB Counterintelligence Museum.

35 Wise, Wise, Nightmover, Nightmover, 259-260. The message continued to describe each signal site and dead drop to be used in Moscow. Signal site ZVONOK was accessed by boarding a number 10 trolley bus traveling toward Krymsky Most. The agent was to get off at the fifth stop and locate a specific phone booth where he would make his mark, a 10 cm Cyrillic "R" on the building wall to the left of the phone booth and drainpipe. The mark was to be made waist high using black crayon or red lipstick so that it could be easily read from a pa.s.sing vehicle. The CIA would acknowledge receipt of Vasilyev's signal by parking a car with the license plate number D-004 opposite the Lenin Central Museum. 259-260. The message continued to describe each signal site and dead drop to be used in Moscow. Signal site ZVONOK was accessed by boarding a number 10 trolley bus traveling toward Krymsky Most. The agent was to get off at the fifth stop and locate a specific phone booth where he would make his mark, a 10 cm Cyrillic "R" on the building wall to the left of the phone booth and drainpipe. The mark was to be made waist high using black crayon or red lipstick so that it could be easily read from a pa.s.sing vehicle. The CIA would acknowledge receipt of Vasilyev's signal by parking a car with the license plate number D-004 opposite the Lenin Central Museum.

36 Ibid. Ibid.

37 Cellulose base film, both cellulose nitrate and cellulose acetate, was the primary choice for creating "soft films." Cellulose base film, both cellulose nitrate and cellulose acetate, was the primary choice for creating "soft films."

38 Xidex Corporation acquired Kalvar Corporation in March of 1979 and three months later closed the New Orleans plant and fired the production personnel. See: Xidex Corporation acquired Kalvar Corporation in March of 1979 and three months later closed the New Orleans plant and fired the production personnel. See: www.keypointconsulting.com/downloads/pub_Event_Studies.pdf . .

39 To produce "soft film" a frame of Kalvar was placed between two pieces of gla.s.s together with a developed negative containing the message for the agent (emulsions sides together). The gla.s.s plate was exposed to a 500 watt lamp for 40 to 50 seconds and then held with tweezers and dipped into boiling water for two seconds. As it cooled, the emulsion was carefully peeled away from the backing and allowed to dry. The resulting image on "soft film" was ready to be camouflaged and pa.s.sed to the agent. To produce "soft film" a frame of Kalvar was placed between two pieces of gla.s.s together with a developed negative containing the message for the agent (emulsions sides together). The gla.s.s plate was exposed to a 500 watt lamp for 40 to 50 seconds and then held with tweezers and dipped into boiling water for two seconds. As it cooled, the emulsion was carefully peeled away from the backing and allowed to dry. The resulting image on "soft film" was ready to be camouflaged and pa.s.sed to the agent.

40 Weiser, Weiser, A Secret Life, A Secret Life, 66. 66.

41 Tomlinson, Tomlinson, The Big Breach, The Big Breach, 66. 66.

Please click Like and leave more comments to support and keep us alive.

RECENTLY UPDATED MANGA

All My Disciples Suck!

All My Disciples Suck!

All My Disciples Suck! Chapter 744 Author(s) : Rotating Hot Pot, 回转火锅 View : 472,660
Keyboard Immortal

Keyboard Immortal

Keyboard Immortal Chapter 2772: Peak Acting Author(s) : 六如和尚, Monk Of The Six Illusions View : 1,802,522

Spycraft. Part 28 summary

You're reading Spycraft.. This manga has been translated by Updating. Author(s): Robert Wallace and H. Keith Melton. Already has 731 views.

It's great if you read and follow any novel on our website. We promise you that we'll bring you the latest, hottest novel everyday and FREE.

NovelOnlineFull.com is a most smartest website for reading manga online, it can automatic resize images to fit your pc screen, even on your mobile. Experience now by using your smartphone and access to NovelOnlineFull.com