eye spy feature
DESCRIPTION
THE FASCINATING WORLD OF INTELLIGENCE AS SEEN BY EYE SPY Free 122 page feature on intelligence, espionage and all associated elements of this fascinating subject, plus sample pages from Eye SpyTRANSCRIPT
○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○
F E A T U R E S
The World of Intelligence and Espionage as seen by Eye Spy Intelligence Magazine
○○○○○○○○○○Operation Ghost Stories - SVR Spy Ring30○○○○○○○○○○US Navy SEALs Kill Osama bin-Laden32○○○○○○○○○○CIA - Pretty Woman Trap35○○○○○○○○○○WWII Spy Pigeon Controversy39○○○○○○○○○○Cyber Warfare Going Underground42○○○○○○○○○○World of Intel and Counter Terrorism46○○○○○○○○○○The Language of Spies48○○○○○○○○○○Spy Wars: CIA Spycatcher Interview54○○○○○○○○○○Inside Tito’s Secret Tunnels57
○○○○○○○○○○Intelligence Review and Digest60
○○○○○○○○○○MI6 Spy Games in Moscow71
○○○○○○○○○○Shoot to Kill: 2012 Olympic Games76
4
○○○○○○○○○○Intelligence Collection58○○○○○○○○○○9/1159
○○○○○○○○○○MI6 Operation Ellamy78○○○○○○○○○○Surveillance and Photography80○○○○○○○○○○Origins of American Intelligence82○○○○○○○○○○Eye Spy Product Review84○○○○○○○○○○FBI and Forbidden Exports87○○○○○○○○○○Silent Service: Maritime Spies90○○○○○○○○○○The Real Codebreakers92○○○○○○○○○○MI5 Operation Seagram94○○○○○○○○○○MI6 Headquarters 191996○○○○○○○○○○Spies Holy Grail - Invisibility98
○○○○○○○○○○Inside the CIA’s Dream Factory62
○○○○○○○○○○Couriers and Counter-Terrorism103
○○○○○○○○○○Perfect Platform: Attack in Benghazi64
○○○○○○○○○○Assassins, Coffee & Poison Powder105
○○○○○○○○○○Unseen Images of 9/1167
○○○○○○○○○○NSA Field Station Teufelsburg106○○○○○○○○○○UnderCover Books109○○○○○○○○○○Echoes of Oklahoma114
5EYE SPY INTELLIGENCE MAGAZINE
THE WORLD OF
INTELLIGENCE AND
ESPIONAGE AS SEEN BY
EYE SPY INTELLIGENCE
MAGAZINE
E
ye Spy collects, dissects, publishes and provides commentary on all aspects of intelligence,including espionage, tradecraft, technology, operations etc. All the world’s major happeningsare reported upon. That’s not to say we don’t take a step back in time to look at famous case
Reporting and Commentary
E
YE SPY INTELLIGENCE MAGAZINE is the world’s only independent publicationdedicated to espionage and intelligence. First published in May 2001, the title isavailable in print and electronic format and has a worldwide readership of over100,000 people. Often described as the bridge between officialdom and the public,Eye Spy is extremely popular with those who work in and with intelligence. Indeed,it is subscribed to by hundreds of official intelligence agencies, government
training academies, military forces, leading technology firms, police services, defence contractors,cyber organisations, security colleges and major international political ‘think tanks’ throughoutthe world. However, its non-political - visual editorial and easy-reading style ‘demystifies’ theintelligence subject, making it equally as popular with people from all walks of life.
It is a constant provider of a certain type and quality of information that is not found in any otherpublication. Readers are assured they will always find something of interest within its 84+ full colourpages; whether it’s the inside story of a lengthy government surveillance operation, an interviewwith a CIA polygraph examiner, MI6’s role behind the assassination of Rasputin, or the tradecraftused by those who ply their trade in the world’s second oldest profession, Eye Spy has becomesomewhat of a ‘must have’ publication for people interested in intelligence.
files, examine the real tradecraft, important and defining moments, the history of the services, fromtheir directors to buildings, crests and the figures synonymous with the ‘espionage wheel’.
E
6 EYE SPY INTELLIGENCE MAGAZINE
Mark Birdsall, Editor
Aldrich Ames
If it’s necessary to draw parallels with events from the past, special featuresand intelligence sidebars accompany articles.
There is a certain ‘timelessness’ about espionage events: from America’sAldrich Ames and Robert Hanssen, to the gentry and shadowy Cambridgespy ring in the UK which damaged British Intelligence. Counter-espionageagencies like Britain’s MI5 or America’s FBI still use such classic case files toteach today’s students the secrets of espionage, dirty tricks and more impor-tantly, the signs which can identify people betraying their country, or whoare on the precipice of joining an enemy or adversary. It’s one reason whyEye Spy insists on retaining and improving its links with men and womenwho have spent decades in the industry, from photographic interpreters totraining officers at some of the most secretive spy schools in the world. Ithelps us understand the often elaborate nature of a case file or event.
he public may learn of a breaking story via the television, radio, print press or Internet, butEye Spy readers are content in the knowledge that they can view certain information that issimply not reported upon, or not fully understood by the media. Having an awareness of how
FBI headquarters, Washington DC
Understanding How Intelligence Works
Tthe intelligence world works is a powerful tool for any individual. It’s not all ‘silver screen’, and‘gadgetry’, though many real-life happenings could be drawn from the imagination of some of theworld’s best scriptwriters.
7EYE SPY INTELLIGENCE MAGAZINE
Georgi Markov
n recent times, the public has been intimatewith major news stories that are typical of anindustry that rarely hangs its dirty washing out
Strange Days
Iin public. Take for example the bizarre death offormer KGB officer Alexsander Litvinenko inLondon. Poisoned by Polonium-210 - a radio-active isotope used to help detonate nuclearbombs, Litvinenko’s death was part of a widerconspiracy involving front companies, clandestinedeath lists, political and military manoeuvring etc.His assassination is most certainly connected tointelligence factions, industrial giants, the Russianmafia, and the settling of old Kremlin scores. Butall are ultimately connected to the intelligenceworld, proof if ever needed of the enormity,diversity and darker side of the subject.
As for the manner of Litvinenko’s death, the KGBare past masters at this kind of skulduggery. Whocan forget the demise of Georgi Markov - theBulgarian dissident killed by a poison dart filledwith ricin and fired from an umbrella in Londonin 1978? And in 2004, someone in the Russiansecurity services posted a letter to a known
Thames House, headquarters of MI5
Fidel Castro in theformer East Germany- the CIA created over100 schemes to killthe Cuban leader
8 EYE SPY INTELLIGENCE MAGAZINE
Chechen terrorist. Inside the envelope flap the glue was painted with a substance lethal on skincontact. The recipient duly opened the package and died shortly after. But it’s not just the Russianswho use such deadly tradecraft. The CIA schemed for years to create all manner of plots to assassi-nate Cuban leader Fidel Castro - including lacing his shoes with deadly Thallium. And a few yearsago, Richard Tomlinson, a renegade MI6 officer revealed he was aware of an MI6 operation to killYugoslavian leader Slobodan Milosevic. In this case the alleged plot involved blinding Milosevic’sdriver causing the vehicle to spin out of control. As one former MI6 agent and Eye Spy consultantconstantly reminds us - “intelligence can be a dirty business.”
What may seem like a simple murder, a case of spying, the loss of a secret component or the demiseof a regime or government minister, is often just the leading edge of a much wider event.
The media may learn of an anti-terrorist operation - Eye Spy reveals
how it was planned, achieved orhopefully dismantled
Behind Closed Doors
It’s never easy trying to peak behind the doorsof the world’s leading intelligence services, butthe magazine’s editorial staff, consultants,
contacts, analysts and sources do have access toplaces that are often beyond the reach of journal-ists. Indeed, a quick glance at our consultancyboard and authors who write for the magazine,gives you some indication of the calibre and
9EYE SPY INTELLIGENCE MAGAZINE
profession of the people who regularly provide material and qualifiedguidance. There are others whom we can’t name. Eye Spy consultants alsofeature on television, radio and in the world’s press. They are often calledupon by documentary and film makers for comment and advice on a scene ornews clip. Having first-hand knowledge of the role of an air marshal or ananti-terrorist officer in New York, for example, helps our writers create a fact-based feature, or understand the mechanism of an intelligence operation.Some of our consultants still perform government analysis and have decadesof experience dealing with intelligence agencies, committees and officialbodies. Other consultants and editors have participated directly in specialoperations, from gathering intelligence in Afghanistan, to training operativesin espionage and surveillance tradecraft.
Elements of the World of Intelligence
Some people believe the word ‘intelligence’ is simply a generic term forinformation. This is not strictly true for it has evolved into somethingthat is considered far more important. The subject of intelligence is
multifaceted and enormous, it can be complex or simple. And because of thisEye Spy is different, in that each issue is singularly unique. Unlike many topicsand subjects, intelligence and the stories it generates are never the same.Espionage is but one element of intelligence, though many esteemedcommentators consider it an integral part of the subject and they are correct.
10 EYE SPY INTELLIGENCE MAGAZINE
In truth, there are hundreds of elements, and allare deemed highly important by the hundreds ofthousands of men and women who work in thebusiness. However, espionage is one subject thatis particularly popular with readers, a fact notoverlooked by our editorial board and themagazine regularly features the latest spy stories.
nformation collection comes from a multitudeof sources: HUMINT for example. HumanIntelligence is considered vital in that it is
Spy - an Emotive Word
IHeadquarters of Britain’s SIS (MI6)
often gleaned from first-hand sources, or as aresult of direct espionage. The word ‘spy’ is anemotive term that the media often uses to callanyone working in the intelligence industry: an analyst, case officer, photographic interpreter,secretary and even a telephonist etc. In reality, the word should only be used for those employed atthe ‘leading edge’ of information collection, and even then, it depends on your point of view. An MI6officer collecting intelligence in Russia is most certainly not referred to as a spy by his superiors atBritain’s Foreign Office, but his actions and role are not welcomed in Moscow. To Russia’s counter-espionage or counter-intelligence officers, he is a threat. But it’s easy to understand how everyonedirectly associated with an intelligence agency ends up being called a spy. To be called a ‘spy’, onemust really be convicted in a court of law.
Intelligence Collection
Foreign-based intelligence officers oftenwork within the confines of a diplomaticmission - are attached to a foreign embassy
or legitimate company and have carefullymanaged lifestyles and prepared backgroundsknown as Legends. Diplomatic immunity assured,such officers rarely conduct espionage directly.The role of a case or field officer is coveredextensively in Eye Spy (tradecraft). So too is therecruitment of people, whether they are on theofficial payroll or not. Case officers will have atour of duty and rarely outstay their welcome.Selection is important as in some cases they willneed to speak and understand the foreign tongue,be familiar with local customs and traditions etc.Case officers will use other people to gather
EYE SPY INTELLIGENCE MAGAZINE 11
intelligence - these are known in the trade asagents. Within many of their respected embassies,organisations such as MI6, CIA, FSB and theMossad, for example, have operational FieldStations. Often manned by a handful of officers,these important offices cement relations betweenvarious ‘gogs’ in the espionage wheel and arecharged solely with gathering intelligence, liaisonand other duties. They are also opportunists.
British Embassy, Moscow.Note the radome at the top of the building
his takes us into a rather murky area of theintelligence world. Using agents, couriers,proxies, assets and informants, a case
The ‘Product’
Tofficer will use all his or her prowess to performa particular task. Eventually information issourced, secured, sent for processing, distributedaccordingly, disseminated, analysed, ‘boxed’ andultimately used or stored for reference. What’sproduced is known as the ‘product’. Dependingon the type of case officer, some operatives will
12 EYE SPY INTELLIGENCE MAGAZINE
simply monitor foreign press (in all its forms),attend trade fairs and military exhibitions, liaiseor contribute to missions. This intelligence isusually described as ‘open source’, in that it isfreely available. Others work in far more danger-ous areas that inevitably means tradecraft mustbe used. Sometimes case or field officers areattached to legitimate businesses or workelsewhere in an effort to obtain intelligence, butoperate without the protection of an embassy.These people are known as NOCs (non-officialcover) and often dubbed ‘persons of interest’ bycounter-intelligence officers and will be monitoredand surveilled. Performing espionage at this levelrequires a steely resolve and it’s not for thefaint-hearted. This type of tradecraft is regularlyfeatured in Eye Spy.
Intelligence gathering is often complicated,thrilling, manpower-intensive and very expensive.
The ‘product’ is the lifeblood of diplomatic andmilitary machines. If it’s wrong, the results canprove disastrous. An example of poor product isthe US and UK intelligence assessments on Iraq’s‘weapons of mass destruction’ (those working in
the intelligence services connected to this topic believe they were poorly treated and manipulated bytheir political masters). Politics, foreign and domestic affairs, industry, the armed forces and intelli-gence must collide at some point, and in the UK and USA, for example, special advisory or “oversightcommittees” exist to make sure the product is not used incorrectly - at least that’s the theory.
FBI counter-espionage photographs of SVR spies Richard Murphy (left) and agent controller ChristopherMetsos in Queens, New York City. In 2010 around a dozen Russian spies were identified and ordered out of
the United States after Moscow agreed to exchange them for four US intelligence contact men
EYE SPY INTELLIGENCE MAGAZINE 13
However, intelligence work is also driven byevents occurring worldwide. Within a year or soIran, for example, could have the capability toproduce a nuclear bomb. That has implicationsnot just for Middle East nations, but foreveryone. How so? Many intelligence agencies,including MI6, CIA and NSA, have been chargedwith trying to obtain valid intelligence on Tehran’snuclear programme. It’s a dreadfully difficult taskin that closed borders exist and Westerners arenot welcome. Even the world’s atomic bodieshave found the Iranian government loathe toprovide information.
With this in mind, MI6 and others are feverishlyworking to gather intelligence, trying todetermine the day when Iran announces to theworld it has a bomb. Ultimately many analysts fearit could be used against Israel, or that certain partsof the programme may be delivered to knownterrorists - and that affects the safety and securityof everyone.
Assessing the implications of such a situation canonly be achieved by obtaining accurateintelligence - this is called Intelligence Estimateor Appreciation. It is the appraisal of all availableintelligence relating to a specific requirement ora potential hostile action or development.Diplomatic measures to stop the project havebeen put in place, but a secondary plan involvinga tactical military strike has also been enabled.Analysts, (both political and intelligence)
AMERICA 9/11 ANDLONDON 7/7
The ‘Product’ was undoubtedly
there, it was simply misread
and not nearly enough of the
jigsaw was pieced together to
see the bigger picture
14 EYE SPY INTELLIGENCE MAGAZINE
Eye Spy’s tradecraft features reveal thesecrets of the recruiters, informants and
case officers
A caseofficer may
be monitoredeven beforethey have
started theirmissionhe Cold War saw two powerful sides pull
away from total world destruction at thevery last moment. The USSR and NATO
military strategistsand key advisorsmust also assess theglobal implicationsfor these twoscenarios. This typeof intelligenceoperation is bothtime consuming andmenacingly dark.
The wider publicseem oblivious tothe precariousnature of this single
issue. But there are hundreds, if not thousandsof events taking place at this moment in timewhich need to be monitored. All of these areassigned levels of sensitivity. If deemed important,they will be raised higher on the ‘intelligencechart’ and more resources assigned to the case.Others may fall off the graph, then radar, and oneday may come back to haunt those personsmaking crucial decisions - as was the case whenal-Qaida hijackers attacked the USA on 9/11 orLondon in 2005. The ‘product’ was undoubtedlythere, it was simply misread and not nearlyenough of the jigsaw was pieced together to seethe bigger picture. Since then, there has been ahuge recruitment drive by dozens of services;agencies have been overhauled, budgetsincreased and laws changed to accommodate avery fluid situation. It’s one area Eye Spyexamines constantly.
Technology
Tplayed a dangerous game of ‘cat and mouse’. For years - the Soviet Union and NATO opted to matcheach others nuclear warheads, warplanes, ships and manpower. Mutual assured destruction (MAD)was the doctrine often cited by analysts. Both sides had the ability to destroy each other, the onlyproblem was they would destroy themselves in trying. MAD is based on the theory of deterrence -weaponry essential to threaten yet to invoke a stalemate.
Mohammad Atta -9/11 terror leader
EYE SPY INTELLIGENCE MAGAZINE 15
Intelligence officers can’t just boardairliners and request information -
occasionally they must resort toother methods - including espionage
- 7 -
Lockheed U-2
16 EYE SPY INTELLIGENCE MAGAZINE
Because the USSR was shielded behind a lengthy closed border dubbed the ‘Iron Curtain’, electronicintelligence involving reconnaissance aeroplanes, ships, submarines, and later satellites, came to thefore. A whole new industry grew from the Cold War that still exists today, one that is both helping andhindering today’s intelligence gatherers. Aircraft such as the U-2 spy plane and SR-71 were engagedin aerial games over the skies of Russia, and on a number of occasions shoot downs did occur leadingto global tension.
The Cold War also prompted the development ofa new range of tools for spies to gather intelli-gence. But anyone caught plying their trade inforeign lands were jailed and occasionallyexecuted. Sometimes they were lucky - andexchanged at pre-arranged locations for otherspies. The city of Berlin, divided both militarilyand politically, was often the point of contact andretains its rightful place in spylore.
Andrew Parker head ofBritain’s Security
Service - better knownas MI5
- 8 -
Today’s spy satellites, unlike their predecessors,have longer operational lifespans and are packedwith even more high-end technology. Easilycapable of reading the print off a newspaper, somesystems track vehicles hundreds of miles,monitor terrorist training camps and follow roguevessels across oceans.
It’s no longer essential, nor necessary to send spyplanes like the U-2 into near space across enemyterritory to gather intelligence on a weaponsconvoy or take photos of a new military site;satellites can be manoeuvred and controlled atwill - and even the public has the ability to viewonce top secret sites on the Internet with certainsoftware. What has not changed is the analysis of
the information, and the way in which theproduct is used. Gathering electronic informationmay have become easier, but it has also led tobetter counter-measures. Counter-intelligencedirectorates work overtime to stop anadversary obtaining such data. It is still a game
A whole new industry grewfrom the Cold War that still
exists today, one that is bothhelping and hindering today’s
intelligence gatherers...
While old spy tradecraft is still used, a greatdeal of data is being gathered electronically
by agencies such of Britain’s GCHQ (left)
EYE SPY INTELLIGENCE MAGAZINE 17
of cat and mouse - but played out with far moreplayers on a much bigger field that now includesthe Internet.
The massive technical revolution in informationgathering methods has brought about a drasticchange in the way intelligence is collected. Hugeradomes ‘talking’ to advanced satellites act like‘giant nets’ catching signals, pictures andtelephone calls from across the globe. Diplomaticand military information may be scrambled, buteventually it will be deciphered. With today’s 21stcentury computers such tasks can be performedincredibly quickly and from anywhere on theplanet.
Two decades ago the Internet and cell phonesemerged as ‘must have’ products. They are greatproviders of information. For the intelligencecommunity they pose a problem. So rapid hasbeen the advance of this type of technology, thatit has become increasingly difficult for any
NSA - ‘the Agency that never sleeps’ -headquarters of the world’s biggest collectorof electronic intelligence (ELINT) - America’s
National Security Agency
General KeithAlexander has led
the NSA since 2005
18 EYE SPY INTELLIGENCE MAGAZINE
government to keep a secret for long. Anothermajor problem surrounding these instruments isthat they can be used by anyone - includingforeign spy rings, terrorists, organised crime gangsetc. With this in mind, some countries havededicated agencies to intercept communicationsand monitor e-mails. One major programme runjointly by the UK’s GCHQ (Government Commu-nications Headquarters) and America’s NSA(National Security Agency), is ECHELON. It’s aglobal network of special facilities and satelliteswith the capability of intercepting e-mails, phonecalls, faxes etc. One intelligence analyst said - “ifit’s spoken or written - we know.”
That may be rather simplistic and perhaps anexaggeration, but without ECHELON, terroristorganisations and rogue nations intent on
supporting the activity of groups like al-Qaida, could act with impunity. In the UK, MI5 is finding itdifficult to track ‘terrorist chatter’ because new forms of Internet communications are available, thusit supports a new programme what’s known in the intelligence world as ‘Black Box’. This willrequire providers to store messages for up to ayear and allow access to the address of both senderand recipient, though not necessarily the e-mailcontent. Of course there are those who object tosuch a systems, but there are numerous safeguardsin place to monitor only suspicious ‘traffic’. It’sjust one of hundreds of topics covered in Eye Spy.
ithout question the biggest challenge tothe intelligence world, both in respectof espionage and security, can be found
Cyber Warfare
W
RAF Menwith Hill - NSA’s biggest spy base issituated in North Yorkshire, UK
in the world of cyber.
Because computers operate systems used formanaging anything from air traffic control tonuclear power stations and submarines, the needto protect cyberspace is crucial. Similarly,computers are used to store huge amounts ofdata. On a government level, much of this isclassified secret or at the very least private andsensitive.
EYE SPY INTELLIGENCE MAGAZINE 19
In recent years the number of cyber attacks againstgovernment organisations or hi-end defence andtechnology firms have increased substantially. Nolonger do spy agencies or crime organisationshave to despatch personnel to the ends of theEarth to steal data, much of it can be sourced atthe touch of a button.
Of equal importance is the trustworthiness of staff.One only has to look at the case of US Army ana-lyst Bradley Manning to recognise the importanceof keeping data secure. Whilst in Iraq, Manninguploaded the equivalent of 500,000 pages ofinformation, thousands of US Government cablesand much more. He then gave the material to athird party that duly uploaded the informationon to the Internet for all to examine.
Control of vital infrastructure is another majorconcern, this as terrorist hackers try anddestabilise systems which control water, commu-nication, transport and other vital systems. And ifone believes this is impossible, events in 2011 inIran are evidence enough this can be achieved. Ajoint US-Israeli intelligence effort to slow downIran’s nuclear programme was enabled in theform of the Stuxnet virus.
Cyber hackers backed by China’s intelligenceservices are now actively ‘attacking’ computersystems across the world in an effort to obtaininformation. Other countries too are engaged inthis activity. Little wonder then that the US hasestablished a powerful near stand-aloneintelligence service known as Cyber Command.And interestingly, America has also threatened torespond militarily to cyber attacks.
Worldwide it is virtually impossible to count thenumber of cyber attacks that occur daily, but oneestimate suggests 100,000.
Many countries now have intelligence cyber units dedicated to counter-measures and protection,but they too have the ability to source data. It is another form of espionage. Eye Spy has anexperienced cyber editorial team that produces first class features on all the major events associatedwith cyber and its various elements.
20 EYE SPY INTELLIGENCE MAGAZINE
ESPIONAGE
It is still a game of cat and mouse- but played out with far more
players on a bigger field.
ith so many people having access to cellphones and the Internet, it’s notunreasonable to think that the old
Reasons for Intelligence
Wtraits of a spy would soon be a thing of the past.Not so, but a new type of electronic spy andtradecraft has emerged. Because signals are sentelectronically, they can be intercepted and withmany new forms of communication, it’s not sur-prising that this area of intelligence has rapidlydeveloped. SIGINT (signal intelligence) andCOMINT (communications intelligence) are asvital to an intelligence service as HUMINT. Byacquiring intelligence on an adversary, at the veryleast, it gives military and political planners anedge or insight into what is taking placethousands of miles away.
Understanding the intelligence machine and therole it plays is indispensable for all who want toknow how the 21st century will unfold.
For any intelligence officer charged with thecollection and evaluation of information aboutforeign army strengths, terrorist activity, motivesand plans, having good intelligence, and notnecessarily huge amounts of it, is useful. These
officers are the first line of defence in manyarenas, often supported by a network ofcolleagues. Examination of the ‘product’ allowsanalysts to make decisions, in turn providingguidance to policy makers. The features in EyeSpy are often created by assessing what transpiredbefore an operation occurred, or the mechanismemployed to achieve a specific result, be it theculmination of an anti-terrorist operation, or thediscovery of an MI6 communications device
An MI6 communications device containedwithin a rock-like object was discovered by
Russian Intelligence in a Moscow Park
EYE SPY INTELLIGENCE MAGAZINE 21
Sir John Sawers -Chief of MI6 -
perhaps the world’smost famous
intelligence service
MI6 headquarters Vauxhall Cross isaffectionately called ‘Legoland’
22 EYE SPY INTELLIGENCE MAGAZINE
LIAISONS
Britain’s MI6 has aclose relationship
with America’s CIA
CIA headquarters, Langley, Virginia
buried inside a rock in a Moscow park. Our writers, all experienced in the field of intelligence, lift theimportant climatic information from reports. And while it is not always possible to predict happen-ings or military conflict, Eye Spy did report on al-Qaida’s plans to carry out a huge destructive attackon the West - a full 16 weeks prior to 9/11.
hroughout its publication journey, Eye Spyhas endeavoured to provide its readers withthe most important and interesting news
Spy Tradecraft
Trelated to intelligence and espionage. And thisbrings us to the often hazardous work of the men and women working at the ‘leading edge’ ofintelligence collection - often described as ‘Spy Tradecraft’ - the ‘tricks of the trade’. A number of ourwriters have worked in this fascinating area - and it’s a subject that interests so many people. In itself,tradecraft contains hundreds of special elements from disguises to identity theft.
Tradecraft is used by agencies to gather information, often associated with espionage, deception anddisinformation. It is truly cloak and dagger. Whether it is using a dead letter drop, performing abrush pass, creating codes, surveillance, the bugging of a suspected terrorist safehouse, or the pass-ing of highly secret components from an aviation project, Eye Spy typically provides a deep insight
into how this is carried out. Government agenciessuch as MI6, or to give it its proper title - SecretIntelligence Service (SIS), have dedicated trainingschools that teach employees the tradecraftnecessary to carry out covert operations, or ‘turn’adversaries into informants and assets. MI6 - andits US counterpart - the Central Intelligence Agency,are masters of the art, though officials areobviously reluctant to discuss such matters inpublic. Eye Spy consistently runs dedicated serieson such tradecraft, including a number of DIYprojects. Fascinating stuff, indeed, the magazine’s
EYE SPY INTELLIGENCE MAGAZINE 23
tradecraft series has become very popular in thatreaders can discover some of the interestingmethods used by the world’s leading operatives,though our respect for national security is alwaysa top priority. From discovering techniques toinstall covert cameras in a target building, to theskills necessary to communicate using facial orbody signs, performing surveillance, masterdisguise techniques, infiltrating a spy ring,remaining safe overseas, avoiding the loss of youridentity, to operating in hostile environments etc.- readers will soon learn the trade secrets used bythe world’s greatest spies and agencies.
By digesting the contents of our hugely populartradecraft features, you will soon learn many ofthe real tricks of the trade.
Eye Spy providesa deep insight
into the world ofsurveillance
f course even experienced operatives can make mistakes. Counter-intelligence and foreignspies conspire to make things difficult for those attempting to gather intelligence. Counter-measures are an integral part of the work of domestic national agencies such as MI5 (Security
Counter Intelligence
OService) and the FBI (Federal Bureau of Investigation). In recent times, a greater emphasis has beenplaced on disabling the very real threat of terrorism, rather than attempting to catch spies, thoughthis is still of paramount importance. Indeed, 85% of MI5’s operational budget is now spent onmonitoring and investigating terrorism - a huge menace for everyone. Eye Spy regularly features thework of MI5 and its partners - all determined to tackle terrorism. It’s a fascinating area becauseoperatives are still required to use tradecraft in all its forms to uncover plots, infiltrate groups, thwartoperations and monitor evolving threats. Since its inception, Eye Spy has produced an array ofdetailed features covering a multitude of terrorist attacks and failed operations. However, muchattention is given to the tradecraft and the extraordinary manner in which intelligence analysts,anti-terrorist detectives and security services combine to piece together the data. Using our first-classsources, Eye Spy has gained a reputation for accurate reporting and analysis.
24 EYE SPY INTELLIGENCE MAGAZINE
Special Operations and Intelligence
Eye Spy has unique access to informationfrom many participants of special opera-tions. Contrary to popular belief, many
officers who work in the intelligence services, donot carry firearms and in Britain, have no powerof arrest either. MI5 may secure intelligence on aterrorist plot or a person committing espionage,but the Security Service work with organisationssuch as New Scotland Yard’s Counter TerrorismCommand (CTC), to conduct raids or makearrests. In the United States and some othercountries, agency personnel, for example thoseworking for the FBI, are often seen at the ‘endgame’ of an operation, and are permitted to carryweapons.
The world of intelligence, by necessity, doesliaise and cooperate with specialist police andmilitary units, often in counter-terrorist work.Occasionally intelligence officers will be assignedto a specially created task force for a specificpurpose. In 2011, the US created a multi-facetedunit that combined Special Forces troops with CIA
Right: SAS soldier Rusty Firmin outside theIranian Embassy, London
A US Navy SEAL. Though a navalcommand, SEALs often partici-
pate in land/airborne operationssuch as that which resulted inthe death of Osama bin-Laden
EYE SPY INTELLIGENCE MAGAZINE 25
SAS soldiers storm the Iranian EmbassyLondon - all the hostages were freed
Their task was to capture the world’s mostprolific terrorist in the person of Osama bin-Laden. In a most complex raid on his safehousein Abbottabad, Pakistan, the task force identifiedthe al-Qaida leader and shot him dead.
All major countries have special dedicatedmilitary units which often find themselvesperforming intelligence-led operations. InBritain, and besides CTC, MI5 and MI6 can callupon the Special Air Service (SAS). An exampleof such cooperation was the ending of the
Iranian Embassy siege in 1980. It is not unusual to see US Navy Seals or Delta Forces working closelywith the CIA, or Germany’s GSG-9 with its intelligence service. Eye Spy regularly covers the activitiesand operations of the greatest Special Forces and their liaisons with the world of intelligence.
Emblem of Germany’s GSG-9
26 EYE SPY INTELLIGENCE MAGAZINE
Creating codes as a means of forwardinginformation secretly and securely datesback thousands of years. Codebreaking is
Codebreaking
vital in respect of decoding ciphers - secret codes.During times of conflict this form of communica-tion is much more prevalent and utilised by theintelligence world. Understanding a message, beit written, electronic or even verbal sent by anadversary is extremely useful, if not vital.
An example of its importance can be found inWorld War Two. Millions of lives were saved asAllied codebreakers managed to capture, breakand understand Germany’s Enigma code, thusshortening the conflict by many months.
Britain’s wartime centre for codebreaking wasestablished at Bletchley in Buckinghamshire.Bletchley Park, also known as Station X becauseit was MI6’s tenth communication facility, washome to some of the world’s greatestcodebreakers, and today the site thrives as asplendid museum and learning centre. Its
The mansion house tower at Bletchley Parkcontained an MI6 communication room used
to contact and receive intelligence fromBritish agents operating in occupied Europe
Inside the MI6 communication room -Bletchley Park
Bletchley Park
EYE SPY INTELLIGENCE MAGAZINE 27
thousands of staff were recently honoured by HMQueen Elizabeth and an impressive memorialunveiled.
France’s Emperor Napoleon Bonaparte wasan avid user of codes. And it was one of hiscommanders who created ‘night writing’ - usingembossed dots so troops could read messageswithout light - this evolved into Braille.
In the world of espionage communication iscrucial. However, a code may take many forms.For example, a chalk mark on a bench mayindicate a package is ready to collect; a lightshining through a certain window a warning notto call etc. The complexity of a code is limitedonly by the imagination of an agency or individual.
Eye Spy regularly features reports, articles andnews items surrounding the fascinating world ofcodes and covert communication. Indeed, themagazine has a regularly column ‘Letter From FortMeade’ which reports upon topics relevant andconnected to codes.
Creating codes is an international pursuit, and isseen as an integral element of espionage andintelligence.
Memorial to the codebreakers of BletchleyPark dedicated by HM Queen Elizabeth
f codes are one of the oldest elements ofintelligence, then one of the most recentadditions to a spy’s ‘armoury’ are UAVs -
Enigma machine
ISpies in the Sky
unmanned aerial vehicles. Used extensively todayby armed forces in various roles, includingcounter-terrorism, UAVs or RPVs (remotely pilotedvehicles) as they were first designated, also oper-ate to secure intelligence. UAVs come in varioussizes and utilise different types of technology.Some have the ability to operate at night, whilstothers have the potential to remain airborne formany hours.
Some UAVs are controlled by operators thousandsof miles away using satellites to communicate.
Phantom Ray UAV
28 EYE SPY INTELLIGENCE MAGAZINE
Many perform surveillance and reconnaissance missions over terrain deemed too dangerous toinfiltrate. The CIA is a notable user of armed Predator UAVs. In the last few years the Agency hasperformed many secret missions resulting in the deaths of senior terrorists; identifying their safehousesand the pipelines used for transporting weaponry and explosives. Other types are used to monitorpirates off the Horn of Africa, track drug convoys in Mexico, surveil illegal people trafficking etc.
Ultimately UAVs are an asset to those whose task it is to collect intelligence. Eye Spy presents regularfeatures on these remarkable ‘sky spies’.
Predator UAV
EYE SPY INTELLIGENCE MAGAZINE 29
ecause of its wide appeal to readers from across the world, Eye Spy is a recipient of hundreds ofstories, case files, and rare intelligence snippets, many from esteemed authors, writers andjournalists. From authentic secret intelligence-led UK-USA Special Forces operations inB
Reports, Features, Case Files, Assassins and IntrigueTHE WORLD OF INTERNATIONAL INTELLIGENCE
Afghanistan, to new information on the Rudolf Hess mystery, MI6’s role in the building of the secretspy tunnel in communist controlled East Berlin, to female spies in the war of independence, thefeatures are both educational and fascinating. This ‘mix’ has been described by former MI5 and MI6legal director David Bickford as “thoroughly informative” making Eye Spy “excellent reading.”
In over twelve years of continuous publication, Eye Spy has covered every major intelligence event,published many world exclusive news stories, revealed some of the secret tradecraft used byoperatives, discovered hundreds of buildings associated with the greatest spy stories and services ofthe world, published fascinating case histories, photographic essays, special espionage cases,infiltration, surveillance, bugging, service histories, interviews etc. We also have a dedicated bookrelease section - UnderCover where readers can review the latest releases, and a tradecraft areawhere new equipment is tested and reviewed.
Is it is magazine for “spies”? - No - but it is a firm favourite with those who work in the intelligenceworld. Eye Spy is a magazine totally devoted to and about the lives of the people who ply their tradein intelligence and security services, Special Forces units, anti-terrorism, police forensic and cyberagencies etc. For those who work in the industry it is essential reading, but Eye Spy is for everyoneand anybody remotely interested in this fascinating and secretive subject. Do join us for a revealinginsight into the world of intelligence and espionage - it may just change your opinion of world events- and what takes place behind closed doors...
30 EYE SPY INTELLIGENCE MAGAZINE
32
Bureau officials release dozens of photographs,documents and several covert film clips showingundercover surveillance of SVR spies in America
OPERATION
C O U N T E RESPIONAGEF O O T A G ER E V E A L SEXTENTOFEVIDENCE
Anna Chapman Cynthia Murphy Donald Heathfield Juan Lazaro Michael Zottoli
Richard Murphy - SVR spy“under surveillance”
THE SPY NETWORK PLAYERS
GHOST STORIESFBI RELEASE SVR SURVEILLANCE FOOTAGE
EYE SPY INTELLIGENCE MAGAZINE
33
Regarded as thenetwork’s ‘spymaster’,Christopher Metsos isphotographed enroute
to a meeting
Mikhail Semenko Patricia Mills Richard Murphy Tracey Foley Vicky Pelaez
Freedom of Information Act request has resulted in the FBIreleasing dramatic film footage showing many of the exposed2010 SVR sleeper agents, or ‘illegals’ in action. The material,which includes numerous redacted intelligence documentswould have been released anyway, but with so much interestA
Greetings comrade... Anna Chapman is courted by an undercover FBI man. In the third frame she removes her SVR programmed laptop
Richard Murphy (facing)and Metsos meet inQueens, New York
‘OBJECTIVE WAS HILLARY CLINTON’‘OBJECTIVE WAS HILLARY CLINTON’
from journalists and the public alike, Bureau chiefs decided to hasten theprocess. And the reason why officials decided to strike when they did arebeginning to emerge. Eye Spy sources say at least one of the spies hadstarted a process whereby they intended to befriend a most significantpolitician - US Secretary of State - Hillary Clinton.
From operatives performing brush-passes to the use of dead letterdrops, the evidence secured by theFBI is utterly convincing, and reasonno doubt why the suspects didn’tobject more forcefully when ejectedfrom the United States in thesummer of 2010. And this is despitesome of the spies having lived in thecountry for the best part of adecade.
Working under the code-name of Operation Ghost Stories, the FBI surveillanceoperatives were far more imaginative than their Russian counterparts, andseemingly fully aware that they had problems with communication. With this
PHOT
OGRA
PHS/
FILM
CLI
PS C
OURT
ESY:
FBI
EYE SPY INTELLIGENCE MAGAZINE
34
CIA’S OBL DESK OUTFLANK TERROR CHIEF
The scene that greeted special US NavySEAL teams as they sought to capture the
world’s most wanted man - the city ofAbbottabad at night
© B
K200
6
about 40 miles north-east of Islamabad,Pakistan. Their target was America’s mostwanted - Osama bin-Laden.
The operation was the end game of a near 10-year hunt for the man held responsible for thekilling of 3,000 civilians on 11 September2001. It was one that began at exactly 8.46amon that fateful day as al-Qaida terrorists led byMohammed Atta crashed American AirlinesFlight 11 into the north tower of the iconicWorld Trade Center.
For the CIA, and especially those members ofthe OBL Desk who were charged with bringingbin-Laden to book, it was a special moment -a major success - a time to reflect on somany near misses or flawed intelligence. Itwas also a time to remember all those whoperished in a nightmare scenario that stillconsumes and haunts so many Americans.
This was not the first occasion the OBL Deskhad the opportunity to capture or kill bin-Laden. And prior to 9/11, in Afghanistan, theAgency requested permission to strike - thisafter the al-Qaida leader was monitoredescorting associates in Afghanistan. PresidentClinton dithered as Langley chiefs warned thewindow of opportunity to attack was narrow-ing. In the end the White House asked theAgency to step down as those bin-Laden
accompanied were believed attached to a‘friendly nation’. A US Navy cruise missileeven had the ground coordinates inserted andwas ready to go. So it was somewhat ironicthat in the summer of 2010, the US Navy,albeit a ‘ground’ element, was instructed totrain for a very special mission. And this timethe CIA was defiant - OBL had been found andthe CIA was not going to miss another chanceto capture him.
Eye Spy understands a meeting took place inWashington last August between White Houseofficials and D/CIA Leon Panetta. Mr Panettadescribed how for years the SEALs have beenactive across the region in their pursuit of bin-Laden. Indeed, many SEAL operatives havedied trying to do so. In 2005, for example,Operation Red Wing (a SEAL search and
HIDING IN PLAIN US Navy SEALs KillOsama Bin-Laden
n the early hours of 1 May 2011, fourBlack Hawk helicopters carrying US-NavySEALs (Naval Special Warfare Develop-ment Group [Navy SEAL Team Six]) andspecialist officers from the CIA landed in ahigh-walled compound just yards from amajor military barracks in AbbottabadI
COUR
TESY
: CIA
D/CIA Leon Panetta -a “huge success”
EYE SPY INTELLIGENCE MAGAZINE
35
Osama bin-Laden’s hideaway inAbbottabad - just yards from a military
academy
tic, but most were spurious and had beenprovided for by persons simply seeking cashrewards. This time it was different.
On learning of the CIA intelligence, PresidentObama green-lighted a most dangerousmission. From that day forth, there followedtop secret meetings between US intel peopleand a few of the Agency’s associates in otherUS intel services. And though it seemsinconceivable that such an operation couldhave been conducted without the cooperationof Pakistan officials and ISI elements, thisappears to have been the case. We under-stand the ISI was told only as the US SEALswere arriving at the compound. Designated aBeyond Top Secret operation any leak ofintelligence would have found its way to someelements in the ISI that are Taliban friendly.Even the faintest hint that OBL had beenlocated, would have seen him tipped-off.
The target house within a 12-18ft-walledcompound had been under NSA and NROsatellite surveillance for the best part of eightmonths. Of that there is absolutely no doubt.Valued at around $1 million the house withinwas a relatively new build and strangely hadno telephone lines - an indication the occu-pants were using cell or satellite phones. Itdidn’t take the NSA and GCHQ in the UK thatlong to discover it also had no Internetconnection - at least not from a land-line.However, as DOD sources state, the buildinghad been under observation since last July,and there are methods available to the NSA to
Admiral GaryRoughead
Chief of NavalOperations
WTC issues smoke after Osama bin-Laden’sterror group attacks America
US NAVYSEALS -
A near faultlessoperation andculmination of
eight months totalsurveillance
COUR
TESY
US
NAVY
© U
PSTA
TENY
ER
SIGHTCO
URTE
SY: U
S NA
VY
capture mission) saw many commandos diein Kunar Province as their helicopters weredowned by heavy AQ and Taliban fire. Theywere very close to capturing Taliban chiefMullah Omar - who could have provideddetails of the whereabouts of OBL.
GHOSTS AND FLAWED INTEL
The Agency had for years followed phantomreports of OBL. Some were probably authen-
EYE SPY INTELLIGENCE MAGAZINE
37
CHINA ARREST AIDE TO SENIOR STATE SECURITY OFFICIAL SUSPECTED OF SPYING FOR THE CIA...
‘Pretty Woman Trap’CIA ©
VM
ENKO
V
Ministry of State Securitybuilding in Xiongchu - the
MSS control most of China’sspying activities and
counter-intelligence work
China’s Politburo and the death of Briton Neil Heywood. It isfurther complicated because US-Sino relations are at a verylow ebb, thus Beijing and Washington kept quiet about thespy affair.
If the man, said to be aged 38, was indeed an agent forthe CIA, his exposure is a bitter blow for Langley.Initial reports stated the alleged spy, who at time ofpublication has not been named, worked in the officeof Qiu Jin, deputy minister of the country’s powerfulMinistry of State Security. The MSS controlsChina’s spy agencies and a report stated that the
© P
ETE
SOUZ
A W
HTE
HOUS
E M
EDIA
official was a desk clerk involved withinformation flow from various intelligenceelements, including foreign intelligencecollection. However, one source said theaide, who also worked with economic,political and strategic intelligence, was
attached to the office of vice ministerLu Zhongwell, 59, who was
reportedly arrested. Just howdamaging the espionage has
been can be calculated byone official who said, “thedestruction has beenmassive.” Indeed,intelligence watchers arealready describing the
case as China’s “worst security breach in decades.”
suspected CIA spy and secretary to one of the mostpowerful and influential figures in China has beenarrested on espionage charges. Though details ofthe case are patchy, it is believed the man wasdetained between January and March 2012. Theincident seems connected to recent turmoil withinA
Langley’s Far EastSection turn tableson Chinese spies
○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○
MI6 contact man NeilHeywood
President Obama’s inner circle greet Chinesepremier Hu Jintao at the White House in 2011.
There are now rumours circulating in Beijing thatJintao’s phone was bugged
EYE SPY INTELLIGENCE MAGAZINE
38
Another question raised by journalistsconcerns just how long the agent had been inplace. This could be partly answered by thefact he had reportedly been paid over half amillion dollars - suggestive of a lengthy period.However, if the intelligence was of such highquality, the agent could in theory havereceived significant sums in a relatively shortperiod of time. Eye Spy understands the agentmay have been operational since early 2011.
Speculation abounds how he was firstrecruited. One official noted he may have beenapproached whilst in the USA as a student,another suggested he was lured into a CIA‘honey-trap’. A journalist for Hong Kong’sOriental Daily believes he was “coerced” by aCIA female agent in a Hong Kong flat. Here hewas photographed by other agents in acompromising position. The newspaperfeature described this action as - ‘the pretty
woman trap’.
Police chief Wang Lijun sought US protection -
he was being investigated by staff in the office
of the suspected CIA agent
Telephone lines in President HuJintao’s office were tapped
© T
HOM
AS F
ANGH
AENE
L
The magnificent ‘Great Hall of the People’ in TiananmenSquare in the country’s capital Beijing. The building hosts
Parliament and the Communist Party of China
© D
ILM
A RO
USSE
FF
Despite this, a number of reports haveemerged in the Chinese press that the agenthad been fully trained by the CIA - this after hereceived a blackmail threat from a third party -presumably those involved in the honey-trap.
In recent years the FBI and Pentagon hasengaged its counter-espionage forces toconfront several Chinese spy networks, boguscontract companies and individuals operatingin the United States. One report emanatingfrom Hong Kong says the agent may well havecompromised a number of Chinese spies.
WIRETAPS AND ASSASSINATION
Beijing has been rocked by recent politicalscandals, including assassinations that havecaptivated the imagination of the Chinesepublic, and this latest affair has resulted in thesuspension of a vice minister who has beenquestioned by counter-espionage officers.
Eye Spy has been told the incident could beconnected to events surrounding the strangemurder of MI6 intelligence contact man NeilHeywood in Chongqing in November 2011
EYE SPY INTELLIGENCE MAGAZINE
39
Senior Politburo man Bo Xilai authorised wiretaps.
His wife, Gu KaiLai, is implicated in murder of
UK intelligence contact man Neil Heywood
Premier Wen Jiabao
© R
EMY
STEI
NEGG
ER W
ORLD
ECO
NOM
IC F
ORUM
200
9
A former chief of the Ministry of PublicSecurity, he headed the ultra secretive andmenacing outfit known as the 610 Office - aposition he was stripped of in May. Describedas China’s most “powerful security official,”Yongkang was under pressure after it waslearned he had strong connections to Bo Xilai.610 Office was established in 1999 to monitorthe Falun Gong spiritual movement which isbanned in China but has a global Chinesenational following both inside and outside thecountry. The 610 Office has intelligence andsecurity threads and many FG members havebeen arrested and imprisoned.
Another recent event that could be connectedto the spy case is the departure of MSSofficial Gao Yichen, 61. As a deputy directorhe had responsibility for maintaining stabilityin the 610 Office. Yichen suddenly left inMarch 2012 as news of the Bo Xilai affair andthe death of Heywood started to emerge. UK
(see Eye Spy 79). Police official Wang Lijuninvestigated the Briton’s death (poison wasforced into his mouth) and it soon transpiredthat the affair also involved other very seniorChinese officials, including Politburo man BoXilai. Lijun sought asylum in the US Consulateafter leaks emerged stating Xilai’s wife, GuKaiLai had allegedly ordered Heywood killed.The affair was further complicated because ofWang Lijun’s involvement in the bugging ofpolitical rivals on behalf of Bo Xilai himself.Some of the wiretaps are said to have beenused on telephones in party leader andPresident Hu Jintao’s office and possiblythose of Prime Minister Wen Jiabao. Eye Spyunderstands that the man who led theinvestigation into these extraordinary happen-ings was Qiu Jin.
Qiu convinced Wang to leave the US Consu-late on his own accord, and flew back withhim to Beijing in February this year.
610 OFFICE
Another senior official who has appeared inrecent Hong Kong reports is Zhou Yongkang.
EYE SPY INTELLIGENCE MAGAZINE
41
Secret message seems inextricablylinked to D-Day and Montgomery
A mystery codefound on a
wartime pigeoncontinues tobaffle and
confusecodebreakers
WWII CODECONTROVERSY
secret message discovered ina canister on the detached legof a pigeon dating back toWWII, continues to puzzlecodebreakers around theworld. Discovered by Anne andDavid Martin 30 years ago -A
behind a fireplace at their home in Surrey - thecouple decided to send it to Colin Hill, curatorof the ‘Pigeons at War’ exhibition at BletchleyPark - the UK’s codebreaking museum.
Trustees here invited people to try and solvethe mystery and even today’s codebreakers atGCHQ got involved.
GCHQ responded to Mr Martin saying itsanalysts had thus far been unable to crack thecode.
Mr Hill said the centre has more than 30messages delivered by pigeon carriers, butnone match the code in which this one was
written. “The message must be highly topsecret,” he said.
However, despite the attention of some of theworld’s greatest codebreakers, the messageremained secure... that is until now.
The paper shows a series of 27 word andnumber messages. It is believed to have beendespatched by operatives from Normandyaround the time of the D-Day landings in
US troops move towards thebeaches at Normandy
EYE SPY INTELLIGENCE MAGAZINE
42
Anne and David Martin pose with the remains of the pigeon. The discovery of a mystery code has caused muchdebate and speculation within the professional and amateur codebreaking community
1944. Now a Canadian team claim to havecracked the code, though their findings havebeen disputed. A researcher at the LakefieldHeritage Research said the message is onewritten in short form code and was intendedfor Bomber Command which is identified asXO2. It was sent by 27-year-old Sergeant W.Stot, a paratrooper from the LancashireFusiliers who was part of a reconnaissanceteam measuring German military strength in
the region. Stot was killed a few weeks afterthe message was sent.
Gord Young, 70, a member of the Canadianteam said they had been able to “unravelmost, but not all of the code.” He felt annoyedafter reading reports the message wasimpossible to read, but insists it was “break-able.” According to Canadian media, Gord,who lives in Ontario, took just 17 minutes to
The pigeon lofts at Bletchley Park
and part of the museum’s brilliant
‘spy pigeon display’
© E
YE S
PY IN
TELL
IGEN
CE M
AGAZ
INE
© SWNS/SWNS.com
break most of the code. The secret communi-cation essentially warned that the Germanswere preparing a large scale counter attackusing tanks in Normandy.
THE MESSAGE PURPORTEDLY READS:
‘Artillery observer at ‘K’ sector, Normandy.Requested headquarters supplement report.Panzar attack - blitz. West Artillery ObserverTracking Attack.
© E
YE S
PY IN
TELL
IGEN
CE M
AGAZ
INE
EYE SPY INTELLIGENCE MAGAZINE
A O A K N H V P K D F N F J W Y I D D C
R Q X S R D J H F P G O V F N M I A P X
P A B U Z W Y Y N P C M P N W H J R Z H
N L X K G M E M K K O N O I B A K E E Q
W A O T A R B Q R H D J O F M T P Z E H
L K X G H R G G H T J R Z C Q F N K T Q
K L D T S F Q I R W AOAKN 27 1 5 2 5 / 6
ome experts believe thepigeon’s destinationwas General Sir
© SWNS/SWNS.com
Code Destination REIGATE -General Montgomery’s HQ?
SBernard Montgomery’sheadquarters in Reigate Hill,Surrey, hence its discovery inthe county. The Martins liveclose to the site, which isabout 20 miles from Londonand from where militarycourier pigeons were flown.
Analysts believe the bird - onits return from France - was
exhausted, rested and simplydropped into the chimney.Here it became trapped anddied.
Also of interest, WinstonChurchill was a frequentvisitor to Reigate Priory and issaid to have written some ofhis most famous speechesfrom this location.
As for some of the militarypersonnel stationed here, anumber were involved withmaintaining equipment usedby the codebreaking centre atBletchley Park.
During WWII, Britain used anastonishing 250,000 pigeonsin the war effort.
For more information on thisimportant location:
LINKS:www.reigatehistory.co.uk/churchill
The skeletal foot of
the spy pigeon and
plastic canister
which contained
the code
Panzer IV was the only German tank to remain in production throughout WWII
‘Lt Knows extra guns are here. Know wherelocal dispatch station is. Determined whereJerry’s headquarters front posts. Right batteryheadquarters right here.
‘Found headquarters infantry right here. Finalnote, confirming, found Jerry’s whereabouts.Go over field notes. Counter measures againstPanzers not working.
43
Pigeonfitted with
spy camera
The coded message
© ROBERT DOUGLAS
COUR
TESY
: CIA
EYE SPY INTELLIGENCE MAGAZINE
44
By Kevin Coleman
QUICK SALEGOING UNDERGROUND
he cyber underground hasrisen to a level that nowconcerns the world’sintelligence community. Weare witnessing what couldbe described as the build-up
US DEPARTMENT OF DEFENSE CYBER CRIME CENTER
COUR
TESY
: USA
F
Tof an underground ‘arms trade’. Cyberprofessionals have expressed genuine fear ofthe creation of advanced cyber weapons.These weapons are for sale everywhere in theworld by cyber arms dealers in an onlineblack-market. Most are within the price rangeof even the smallest country or organisationas well as the average individual. One cybersecurity intelligence CTO said: “We see a trendtowards commercialisation of malicious code.Motivated by financial gain, hackers arehoning their skills and becoming moreambitious, targeting the growing numbers of
Cyber Weapons of every description - and on thehorizon... a few of the home-made variety
Alexander. “Some of these weapons couldpotentially destroy hardware as well as dataand software.”
So, perhaps the most lucrative businessopportunity with minimal risk in the 21stcentury is that of a cyber arms dealer! Whatan opportunity.
General KeithAlexander
Internet users and stealing personal detailsand financial information, as well as compro-mising intellectual property.”
A recent investigation found malicioussoftware with a threat rating of 3.8* wasfound for sale online at a cost of just $9.95(£6-7.00).
Information technology trend analysis firmGartner predicts that by 2015 at least one ofthe G20 nations will become the victim ofdramatic online sabotage that will disrupt anddamage critical infrastructure components.This view is supported by General KeithAlexander, head of US Cyber Command. “Webelieve that state actors have developed cyberweapons to cripple infrastructure targets inways tantamount to kinetic assaults,” said
Student teaching atthe Defense Cyber
InvestigationsTraining Academy
EYE SPY INTELLIGENCE MAGAZINE
45
Personnel monitor, analyse, detect and respond to unauthorised activity withinUS Navy information systems and computer networks. NCDOC is responsible for
around the clock protection of the Navy’s computer networks, with more than700,000 users worldwide
NAVY CYBER DEFENSE OPERATIONS COMMAND
COUR
TESY
: US
NAVY
USAF Chief Information Officer Lt.General William T. Lord addresses
modern cyberspace threats and theimpact of social networking at the Air
Force Association Cyber FuturesSymposium and Convention in April CO
URTE
SY: U
SAF
The graphic (below left) shows an equallymenacing advertisement from another website. One could be forgiven thinking it readslike a highly targeted shopping list.
The capabilities of cyber weapons in generalcontinue to increase and DDoS attack capacityis now different. Over the past few years DDoSattacks with a malicious traffic capacity in the100 giga-byte per second (Gbps) up fromapproximately 40 Gbps in 2009 has been seenmultiple times.
For some time now Russia has been trying topersuade various United Nations institutions topush for the adoption of cyber arms controltreaties. The old saying - ‘It does no good to
close the barn door after the horses have
bolted’ comes to mind. Given the number oforganisations, nations and terrorist groupsinvolved in cyber weapons developmentadded to the number of cyber weaponsalready available at a click of a mouse, it isimpossible to establish cyber arms controls.Even if it was possible, it would be unenforce-able due to the difficulty detecting cyberweapons development.
Technologically sophisticated nations have adistinct disadvantage over others due to theirheavy reliance on the Internet within their
critical infrastructures. Cyber intelligenceanalysts believe rogue nation states, terroristsand others may use cyber weapons wheneverthey see fit due to the difficulty of attributionand the measure of plausible deniability thisnew class of weapon provides. Stuxnet shouldhave been a wake-up call for governmentsand militaries around the world. Someanswered but many did not. Those that didn’tare playing with fire.
SIZE OF THE CYBER THREAT AND MARKET
It is impossible to know the true size of thecurrent cyber weapons market, but given therewere over 21 million new strains of malwarereleased in 2010, the number has to be fairlylarge. There are literally dozens of peoplealready operating in the shadows of theInternet. The cyber arms dealers range fromindividuals to moderately sized organisations.They operate internationally and regularly sellmalware and botnet services as well ascontrol programmes through web sites, onlineauctions sites and blogs. Bots that can beused to steal passwords, spyware, distributeddenial of service (DDoS) attacks are nowavailable for sale. One cyber arms dealer evenhad a sale on DDoS attacks. They offered tolaunch a 24-hour DDoS attack against a website of your choosing for as little as $599. Atthe same time the site’s competitor sent outthe message:
‘We offer DDoS service! - removal of sites,
your competitors and enemies -
outcommissioning sites by the overload of
server! Prices from $100 24 hours and
higher.’ You must admit this sounds like agreat deal!
EYE SPY INTELLIGENCE MAGAZINE
46
Cyber arms dealers and underground cyberweapons developers care little about who buystheir products and even less about how they areused. Many believe another wake-up call is justover the horizon and is arguably the scariestscenario. Military and commercial cyberweapons’ programmes are all well and good, butwhat about the home-made ones? I would bewilling to bet that US black ops cyber teams havecontracted with programmers who are at thismoment cooking up home brewed new andinnovative cyber weapons with capabilities we
INTEL: The Technolytics Institute has repeatedlywarned that the rapid and global proliferation ofcyber weapons cannot be controlled.
INTEL: In a recently issued cyber intelligenceadvisory, Spy-Ops stated that government andprivate sector funding is not keeping up with thegrowing threat from acts of cyber terrorism.
INTEL: Recent research/survey found that chancesare high that even though cyber attacks on webapplications have increased over the last fewyears and are have become a big concern -organisations are still not spending much on webapplication security.
INTEL: Open Source Cyber Intelligence ReportHYPERLINKS
“http://iscsp.org/wp-content/uploads/2010/08/cyber-weapons-proliferation-and-deterrence.pdf”
http://iscsp.org/wp-content/uploads/2010/08/cyber-weapons-proliferation-and-deterrence.pdf
he FBI has disrupted aninternational cyber fraudoperation by seizing theservers that had infected
have not even thought of yet. One point raised atconferences and intel briefings is whether or nota home-brew cyber weapon can be built withoutthe developer really understanding its truecapabilities and spread uncontrollably across theInternet? I believe it is a real possibility that weall must plan for.
Earlier this year US Army Lt. General RonaldBurgess, the Director of the Defense IntelligenceAgency (DIA), and James R. Clapper, Director ofNational Intelligence (ODNI) in their testimonybefore the Senate Armed Services Committeeacknowledged dangers ranging from terrorism,
cyber threats, weapons of mass destruction, andthe release of sensitive data by sources such asWikiLeaks. There are few who doubt the strategicimplications of cyber weapons given their abilityto deceive, deny, and disrupt the computerisedequipment and systems adversary. It is beyondthe point in time when we should have stoppedtreating the proliferation of cyber weapons - andthe all too common attacks on electronicequipment and systems as ‘business-as-usual’.
FBI DISMANTLE CYBER CELL
as many as two million computerswith malicious software. The gangdeployed Botnets - networks ofvirus-infected computerscontrolled remotely byan attacker. They can beused to steal funds,hijack identities, andcommit other crimes.The botnet in this caseinvolved the potentCoreflood virus, a key-logging programme thatallows cyber thieves tosteal personal and financialinformation by recording unsuspect-ing users’ every keystroke.
The FBI began its Corefloodinvestigation in April 2009 when aConnecticut-based companyrealised that hundreds of comput-ers on its networks had beeninfected. Before the Bureau hadtime to shut down the Corefloodoperation, cyber thieves made
numerous fraudulent wire transfers,costing companies hundreds ofthousands of dollars.
“Botnets and the cyber criminalswho deploy them jeopardize theeconomic security of the United
States and the depend-ability of the nation’sinformation infrastruc-ture,” said Shawn Henry(left), executive assistantdirector of the FBI’sCriminal, Cyber,Response, and ServicesBranch. “These actionsto mitigate the threatposed by the Coreflood
botnet are the first of their kind inthe United States,” Henry noted.“They also reflect our commitmentto being creative and proactive inmaking the Internet more secure.”
Thirteen people have been chargedwith various offences including wirefraud, bank fraud, and illegalinterception of electronic communi-cations.
T
The COREFLOOD VIRUS infects only MicrosoftWindows-based computers. Generally, most users willnot be able to tell if their computers are infected. It istherefore important to take the following steps:
1 Make sure your Microsoft Windows Automatic Updates are turned on;
2 Run anti-virus programs and ensure that they are up to date;
3 Run a security firewall on your computer; and
4 Check your online banking and credit history to make sure you have not beencompromised. If you have been compromised, contact your financial institution.
Arrests in international cyber operation
THE COREFLOOD VIRUS
James R. ClapperODNI
Ronald BurgessDIA Director
‘HOME BREW’ CYBER WEAPONS
○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○
EYE SPY INTELLIGENCE MAGAZINE
The World of Counter-Terrorism
C O N T A C TC R E A T I O NI N S U R G E N C Y
Most terror groups publicly announce they are fighting for a cause andtherefore acts of bloody violence, hijacking, kidnapping, robbery orcriminality can be justified. From anarchists, to militias, right and leftwing groups, resistance movements, revolutionaries and even singleperson or issue terrorists, the catch all “umbrella of terrorism” is fullof quests, explanations and reasons for motivation. This “catch all”phrase remains as relevant today as ever. And just as important, whatactions really constitute terrorism and how does onedifferentiate an insurgency from a terrorist quest?
Prepared by theEditorial Board of
Eye Spy IntelligenceMagazine
48 EYE SPY INTELLIGENCE MAGAZINE
49
m and IntelligencePART
2
any Americans will besurprised at the followingstatistics sourced from 1January 1968 to 9 July1970 - an eighteen monthperiod of student unrestM
and political upheaval in relation to theVietnam War. Between these dates 4,568domestic bombings occurred on US soil; afurther 1,506 bomb attempts and incidentswere also made/reported. More incredibly,more than 35,000 bomb threats wererecorded by the security services. Analysisshowed over 50% could be attributed tostudent campuses. Hardly surprising thereforethat to counter this danger the CIA launchedOperation MHCHAOS, described as a secretdomestic spying programme intended toexamine possible foreign influences on thestudent anti-war movement. Today, of course,even making a bomb threat would generate amajor investigation and lead to a stiff jailsentence for anyone convicted, and it is likelyall this data would fall into the domesticterrorism category.
One nation that has recently adopted toughnew laws on all forms of terrorism, is
Argentina. This now includes a wide range ofmonetary and political issues. On 22 Decem-ber 2011, the country passed counter-terrorism legislation that human rightsactivists believe is a “catch all” for anyoneopposed to government policy. Officials alsosaid the penalties for those falling foul of thenew laws will be “twice as severe” with thedoubling of the minimum and maximum jailsentences permitted. Intelligence commenta-tors acknowledge Argentina is still coming toterms with its shadowy past, especially thatperiod in time when a dictatorship ruled thecountry. Between 1976 and 1983, govern-ment-sponsored units were created to torture,kidnap and assassinate over 13,000 politicalopponents. Many more people simplydisappeared.
And whilst focusing on statistics, it is worthreproducing the data collected by the Associ-ated Press (AP) to coincide with last year’s10th anniversary of 9/11. In a massiveinternational project, AP researchers foundthat between 11 September 2001 to 11September 2011, a staggering 120,000people were arrested and 35,000 convicted ofterrorism offences.
SURPRISING STATISTICSbetween Jan 1968 and July 1970... 4,568 bombattacks occurred on US soil, a further35,000 bomb threats were made.
In the ten years following 9/11 120,000people have been arrested for terroristoffences and 35,000 have been convicted
The Vietnam War spawned a staggeringnumber of domestic US terrorist attacks, andled to the creation of a secret CIA operation
code-named MH/CHAOSINSIDE INTEL
errorist groups come in all forms andsizes. Their sophistication variesimmensely from individuals making
FORMATIONS AND OBJECTIVES
Tmenacing phone calls like the antiwar USstudents of the Nixon period, to the sending ofletter bombs or performing complex plotssuch as 9/11.
There are a number of high profile intelligenceand security services which monitor, study,analyse and categorise such outfits. Surveil-lance data secured from HUMINT (humanintelligence) and ELINT (electronic intelli-gence) gathering never ends. Other globalconcerns such as Interpol, NATO and theRussian Federation all have dedicated counter-terrorist analysis wings. Groups designated“terrorist” are given what essentially adds upto a threat number - a classification thatdefines their menace, objectives, capabilitiesand probable longevity. The intelligencesystem used to create this classification alsocovers senior figures, finance, weapons andexplosive procurement and the group’s pastand future capabilities:
EYE SPY INTELLIGENCE MAGAZINE
50
The LangWhen terrorists bombed London in 2005,some intelligence commentators used thewords ‘Clean Skins’ to describe the menwho had avoided the ‘Police Radar’ and
were basically ‘Unknowns’. Eye Spypresents words and expressions used inthe intelligence world... some well known
and others forgotten or rarely spoken today
AZto
n 1899, the wordSpy was defined bythe Hague Conven-tion as: “One who,acting clandestinely,or on false pre-tences, obtains, or
seeks to obtain, information in the zone ofoperations of a belligerent, with the intentionof communicating it to the hostile party.”And probably from that date forth those whoworked in this shadowy industry started touse terminology that had an association witha specific task, though not always.
The language of spies and the intelligenceservices constantly evolves and new wordsare always added. Most people are familiarwith common phrases such as Mole - ahostile spy who burrows into an intelligenceagency to report to his handler. Slightly moreclandestine, but equally as well known, theHoneytrap - an operation performed tocompromise a person sexually.
Other phrases are less well known and someeven refer to equipment. For example Tiger in
the Tank is spy talk for a linear amplifier, andStroller is an agent working with a communi-cation set.
Walk-in
WI
EYE SPY INTELLIGENCE MAGAZINE
SPIESA: AGENT OF INFLUENCE -An agent or officer who rather than performespionage, will try and affect opinion to opendiscussion or insert disinformation.
51
uage ofOfficers and agents working for differentagencies and in foreign countries, all use thelanguage of spies to basically conceal andcodename tasks. And though the objectivemay be the same, occasionally the wording isdifferent, and this even applies to friendlycountries such as Britain and America whoseintelligence services operate closely.
Not surprisingly, there is even a word that MI6and the CIA use to describe each other -cousins. However, while MI5 and MI6 use theword Target to identity a person undersurveillance, the CIA and FBI often use Rabbit.
Eye Spy has accumulated hundreds ofphrases and words from the intelligence worldand intends to publish the entire ‘dictionary’ ata later date, but here is a quick A-Z of a fewinteresting terms and their meaning.
HHunting Pack
U UAV - ‘Little Friend’
A
PLUMBING - American intelligence term for the preparationof major operations including reconnaissance of a building
P
PART 1
Library of Intrigue
EYE SPY INTELLIGENCE MAGAZINE
The former D-Notice Secretary talks exclusively to Eye Spyabout his forthcoming book ‘Secrecy and the Media: TheOfficial History of the United Kingdom’s D-Notice System’
EYE SPY INTELLIGENCE MAGAZINE 55
EXCLUSIVE INTERVIEW
56
SPY WARSThe Nosenko Case - one of the greatunsolved mysteries of the Cold War
ecember 1961 was a timeof great tension; the ColdWar raging andKhrushchev rattlingsabres over Berlin. It wasalso when a KGB officernamed Anatoly Golitsyn
A year and a half later Nosenko came out again,this time having changed his mind and defectingoutright. This was just weeks after the assassi-nation of President John F. Kennedy by LeeHarvey Oswald, who had earlier defected to andspent three years in the Soviet Union. Nosenkoclaimed astonishing direct knowledge ofOswald’s sojourn there, and could report withauthority that the KGB had taken no interest inOswald, much less had it had any hand in hislater act.*
I was Nosenko’s initial contact in Geneva andlater, in Langley as head of CIA’s worldwideoperations against Soviet intelligence, super-vised all contact with him until early 1967. Wedetected strange circumstances aroundNosenko, and his reports seemed to beintentionally hiding the existence of KGB molesin CIA and among American code clerks, so Itook a position against my own apparentlyimportant agent. In a long interrogation myviews gained confirmation - though no confes-sion. But after my departure on assignmentabroad, CIA found it expedient to whitewashNosenko of all doubts, take him into its fold as acounsellor on counterintelligence matters, and todiscredit me and others who had distrusted him.Nosenko continues to live in the United States tothis day, enjoying the trust of the Americanintelligence community.
Tennent Bagley, former head of the CIA’s Soviet Counterintelligence Desk, and author of thecontroversial book - Spy Wars - talks exclusively to Eye Spy about his work in Langley and why
he believes the KGB ‘planted’ an agent inside the CIA who broke American secret codes
Yuri Nosenko - the KGBdefector who Bagley
maintains was a plant todeflect CIA attention away
from other more impor-tant matters - including
the assassination ofUnited States President
John F. Kennedy
© C
ENTR
E FO
R SE
CURI
TY S
TUDI
ES
A BRIEF OVERVIEW BYTENNENT BAGLEY
Ddefected to the CIA and gave startling indicationsof KGB successes in recruiting Western officials.Only a few months afterwards, there arrived ontemporary mission in the West yet another KGBofficer, Yuri Nosenko, volunteering his services toCIA in Geneva.
Coming from inside the KGB’s directorate thatworked against foreign intelligence inside theUSSR, Nosenko brought quite different, and
more comfortingversions of certainoperations thatGolitsyn hadpartially exposed.Nosenko wasunwilling to defector to meet CIAinside the USSR,but agreed to makecontact wheneverhe travelled to theWest.Anatoly Golitsyn
COUR
TESY
: CIA
* While the KGB doubtless had more contact with
Oswald than Nosenko reported, there is no reason to
suspect the truth of his basic message - that the KGB
had nothing to do with the assassination. The Soviet
leadership is known to have been anxious to convey
this message to the United States because a direr
conclusion might even be a cause for war.
EYE SPY INTELLIGENCE MAGAZINE
57
EYE SPY: The extensive detail you provide onthe Yuri Nosenko defection case shows thatthe CIA leadership and some officers in theSoviet Branch were likely wrong in clearinghim, yet your book, Spy Wars, was cleared forpublication. Do you think this is an indicationthat opinions have changed at CIA regardingNosenko?
THB: It’s not criticism that CIA tries to avoid
when clearing its veterans’ writings for
publication. They’re looking - and rightly - for
any inadvertent disclosure of their sources or
methods or personnel. When the Agency
cleared my manuscript they did find a few, so
of course I deleted them. But that didn’t
significantly reduce or dilute what I had to say.
But to answer the other part of your question,
no, there’s no sign that opinions have
changed there. Nosenko evidently continues
to enjoy CIA’s full confidence.
EYE SPY: You make clear there were twofactions at CIA: those who believed Nosenkowas a bona-fide asset, and others, likeyourself, who strongly believed he and otherKGB personnel who “defected” during thissame period were plants and part of a largedeception plan.
THB: Those who believed Nosenko was
genuine were those who knew least about
how the case unfolded on the scene, and that
includes people who had studied the files. It
still astonishes me to see them defending
Nosenko’s good faith while entirely ignoring -
or distorting - the truly significant facts. I’ve
listed some of those facts in the form of
“Twenty Questions” - matters like Nosenko’s
false claim to have held the KGB job where
he got the most important information he
gave CIA about Soviet spies. Or why he failed
to tell us that his closest associates happened
to be KGB specialists in deception. My
publisher, Yale University Press, put those
twenty questions onto its web site: http://
yalepress.yale.edu;yupbooks.) Not one of
these questions has ever been addressed,
much less answered, by any defender of
Nosenko.
EYE SPY: What role did senior executives atCIA play in deciding who was bona-fide andwhom was not? Why would upper levelmanagers ignore so many strong indicationsof false defections? You stated that some ofthem wanted Nosenko cleared. What weretheir reasons?
THB: Upper level managers had little time or
inclination to delve into the details of the
cases - and they wanted Nosenko cleared.
That’s easy to understand. If they were to
conclude that the KGB had planted Nosenko
on them, they’d have had to ask why. They’d
have to deal with what Nosenko was hiding -
that the KGB had broken American ciphers
and had moles inside CIA. That would bring
troubles down on their heads. Remember
when they discovered a later mole, Aldrich
Ames, in their midst; that didn’t win them any
praise but instead waves of public outrage
and ridicule. That sort of unpleasantness
could be avoided if Nosenko were judged to
be bona-fide. So upper level managers were
understandably receptive to any explanations
- even faulty and distorted ones - that might
clear Nosenko and rid them of what CIA
Director Richard Helms called this “incubus,”
this “bone in the throat.”
After the collapse of the Soviet Union, during thebrief window of opportunity that opened in the1990s (and has since closed), I establishedcontact with former KGB adversaries (who werefully aware of my long work against them) and infriendly conversations got confirmation thatNosenko had been planted by the KGB to hidethe facts 1) that moles in CIA had permitted theKGB to detect great CIA’s spies like Popov andPenkovsky, and 2) that the KGB had recruitedAmerican code clerks who had permitted theSoviet Union to break American ciphers - gaininga war-winning capability.
So I decided to write Spy Wars, in the hope of 1)persuading American authorities to look intothese findings, 2) correcting history, and 3),exposing the dangerous treason of still-undiscovered moles.
Hired assassin? Lee Harvey Oswald
President John F. Kennedy
I N S I D ELANGLEY
Tennent Bagley andEye Spy editorMark Birdsall
“...Nosenko failed to tell us[CIA] that his closest
associates happened to beKGB specialists in deception”
COUR
TESY
: WHI
TE H
OUSE
MED
IA
© E
YE S
PY IN
TELL
IGEN
CE M
AGAZ
INE
© TALISMAN INTELLIGENCE LIBRARY
EYE SPY INTELLIGENCE MAGAZINE
59
Pljesevica Mountain looks like any other in the Balkans, but within its very core asubterranean military complex that once provided Tito’s Yugoslavia with a key defensecapability. It now serves as a NATO communications base.
Photographer and author Simon Belcher journeys inside and provides Eye Spy with anexclusive insight into one of the great secrets of the Cold War �
INSIDE TITO’S
SECRET TUNNELSEYE SPY WORLD EXCLUSIVE
OF PLJESEVICA MOUNTAIN
EYE SPY INTELLIGENCE MAGAZINE
HOW INTELLIGENCEIS COLLECTED
Defectors
Allies
Open Source
Media Liaisons
Electronic Intercepts
Maritime
Agents
HUMINT
Underwater Censors
NAVY
Aircraft
ARMY
Space
Cyber
CUSTOMERINTELLIGENCE MODEL
RAW DATA/INFORMATION
RAW DATA/INFORMATION
UK MI6 USA CIA
COUNTERINTELLIGENCE
INTANGIBLEFACTORS
� � ��TR
AIN
ING
PER
SON
NEL
EXPE
RIE
NC
E
PAST
PER
FOR
MAN
CE
� �
ACTIVEMEASURES
PASSIVEMEASURES
AIR FORCE
INTE
LLIG
ENC
EIN
FOR
MATIO
N
DATA BASE
�� ��
DEC
EPTI
ON
PHYS
ICAL
SEC
UR
ITY
PER
SON
AL S
ECU
RIT
Y
DIS
INFO
RM
ATIO
N
FACTOR
X
Intelligence model shown is used by MI6 and CIA. Foreignpolicy, military and political decisions are often made on the
premise of intelligence. Factor ‘X’ cannot be qualified. Often it isa question of being in the right or wrong place at a given time.
EYE SPY INTELLIGENCE MAGAZINE60
61EYE SPY INTELLIGENCE MAGAZINE
The US intelligence community (USIC) had a great deal of intelligence aboutthe 9/11 attackers. However, the vast and complex structure of the USICmeant that information held by agencies, directorates and even individualswas fragmented. Following the attack, measures were introduced to ensureintelligence could be streamed, pooled, accessed, shared and examined viaa new organ - the Office of the Director National of National Intelligence- ODNI
62
INTELLIGENCEREVIEW•NEWS•DIGEST
MI6 and FSB May Appear at Litvinenko Inquestext year the official inquestinto the strange death offormer KGB officerAlexsander LitvinenkoN
opens. Litvinenko, 43, died afterdrinking green tea during a meetingwith two Russian associates at theMillennium Hotel in London in
November 2006. New Scotland Yardforensic specialists discovered hisbeverage had been laced withPolonium-210. The affair caused amajor rift between Russia andBritain, and to this day, intelligencerelations are poor.
A pre-inquest review was recentlyheld in the city in which HughDavies, counsel to the inquest,referenced the “possible culpabilityof the Russian state.” However, he
also mentioned British Intelligence inthe same context. “One - thepossible culpability of the Britishstate, in carrying out by itself or itsagents the poisoning, or two, failingto take reasonable steps to protectMr Litvinenko from a real andimmediate risk to his life.”
Most intelligence watchersacknowledge Litvinenko wasdeliberately targeted. Police havenamed one man at that meeting -Andrei Lugovoi - as a “person ofinterest.” He denies any involve-ment.
Another interesting possibility is thatboth MI6 and the FSB may become‘interested parties’, in that informa-tion held by both organisations onthe affair might be examined. TheFSB, at time of publication, has yetto respond to the offer. This wouldalmost certainly involve thequestioning of witnesses andanalysis of recorded documentationand conclusions held by theintelligence community.
Alexsander Litvinenko
© L
ITVI
NENK
O JU
STIC
E FO
UNDA
TION
Police at the Millennium Hotelwhere Litvinenko met with two
Russian intel associates
MI5 officers and NSY detectives searchthe Litvinenkos house in London
© AT MEDIA/SNAPPERJACK OF LONDON
INTERESTED PARTIES
he al-Qaida terrorist whoplotted to fly a modelaeroplane packed withexplosives into the Capitol
CAPITOLBUILDINGBOMBER17-year sentence for model
aeroplane bomb plotter
TBuilding and attack the Pentagon,has been jailed for 17 years - thisafter a plea bargain resulted infour other charges being dropped.
US national Rezwan Ferdaus, 27,was caught after an undercoverFBI sting operation in whichagents posed as al-Qaidaoperatives.
In early 2011, US Intelligencediscovered his support of theterror group and desire to killAmerican troopers in Iraq andAfghanistan. During one conver-sation with an agent, Ferdaus saidhe wanted to build cell phonesthat could be modified and usedto detonate explosives.
His use of model aircraft followedmonths of planning and visits to
EYE SPY INTELLIGENCE MAGAZINE
63
Davies acknowledged the varioustheories which abound regardingLitvinenko’s death. Therefore thescope of the inquest could involvenumerous parties, includingLitvinenko’s friend, London-basedbillionaire Boris Berezovsky;Chechen groups and even thecriminal community.
Litvinenko’s widow, Marina, isoptimistic, but says that even if theRussian state is not included, theFSB could be. As for BritishIntelligence Marina said: “What
should also be considered iswhether MI6 should be invited toeither apply or be designated.”
In recent months there has been asuggestion of British involvement -perhaps inspired by the opening ofthe inquest. An even more bizarretheory also surfaced - thatLitvinenko actually poisoned himselfdeliberately or accidentally. Marinasays these are “distasteful” and“not a shred of evidence exists” tosupport these scenarios.
Intelligence-related files have beensubmitted by some UK agencies,but media speculation is rife thatcertain reports have yet to behanded over.
Marina Litvinenko
© AT MEDIA/SNAPPERJACK OF LONDON
© L
ITVI
NENK
O JU
STIC
E FO
UNDA
TION
rench investigators are toexhume the remains offormer Palestinian leaderYassar Arafat, it has beenconfirmed. This follows
POLONIUM-210•ARAFAT•MOSSADFrench and Swiss researchteams will soon discover if
Palestinian leader wasassassinated with radioactive
isotope - Polonium-210
Fmonths of negotiations with variousparties, including his widow Suha,after a Swiss research laboratory,claimed it had discovered traces ofPolonium-210 on some of Arafat’sprivate belongings and clothes.
Suha is but one of many peoplewho believes her husband, who diedin 2004, was deliberately targetedby assassins using the radioactiveisotope.
The autopsy will probably beperformed by Switzerland’s Institute
of Radiation Physics, though a datehas not been decided upon.
After falling ill Arafat was flown to amilitary hospital in Paris. A few dayslater he was pronounced dead, themost likely cause being a stroke.
There has also been speculationthat the Polonium-210 traces were
Yassar Arafat’s tomb in Ramallah
© E
FFI S
CHW
EIZE
R
introduced on the clothing morerecently. Israeli chemical expert DrEly Karmon said: “Because of thehalf-life of the substance, thepolonium is much more fresh...someone planted it later.”
Arafat’s remains are housed in amausoleum in the central West Bankcity of Ramallah.
n al-Qaida terror unit inEgypt were arrested justdays before carrying out anoperation to kill dozens of
BRITONS TARGETED
British tourists in the popular resortof Sharm el-Sheikh. The proposedattack is but one of many conceivedby the group’s supporters - thisfollowing an ‘appeal’ by its leaderAyman al-Zawahiri - to abduct andkill Westerners around the world.
Egyptian intelligence were tipped-offby members of the public who hadbecome suspicious of the comingsand goings at a house. Counter-terrorist police raided the building
MI6 WARNS OF INCREASING INSTABILITY IN EGYPT
Aand discovered a massive arsenalincluding various firearms androcket-propelled grenades.
Eye Spy learned that following theincident, an MI6 signal from itsMiddle East Desk suggested that theForeign Office raise the threat levelfor Britons intending to holiday ortravel to certain locations in theregion. This duly happened afterEgyptian police said the terroristshad planned to “replicate events inMumbai.” The Foreign Officewarned: “There is a high risk ofterrorism throughout Egypt and theSinai.”
Naama Bay, Sharmel-Sheikh
© MARC RYCKAERT MJJR
RezwanFerdaus
the Capitol Building in Washing-ton, but Ferdaus didn’t realise hewas already being surveilled.
By July 2012, he had rented astorage unit and expanded hisplans which included a groundassault with his associates onthe Pentagon. His arms ‘wishlist’ included grenades, auto-matic weapons, a silencer andaround 20lbs of explosives.
EYE SPY INTELLIGENCE MAGAZINE
64
Dragonfly InsectothopterDeveloped by CIA’s Office of Research and
Development in the 1970s, this microUnmanned Aerial Vehicle (UAV) was the first
flight of an insect-sized aerial vehicle(Insectothopter). It was an initiative to
explore the concept of intelligence collectionby miniaturised platforms.
BodywornSurveillanceEquipment
An intelligence officer’sclothing, accessories, and
behaviour must be asunremarkable as possible -
their lives (and others’) maydepend on it. This is a
responsibility that opera-tional artisans, technicians,and engineers of the Office
of Technical Readiness(OTR) take seriously.America’s intelligence
officers can safely collectintelligence in hostile
environments because theyknow that quality and
craftsmanship have been“built in” to their appear-ances, leaving no traces to
alert the enemy.
“Belly Buster”Hand-Crank Audio Drill
CIA used the “Belly Buster” drill during thelate 1950s and early 1960s. It would drill holes
into masonry for implanting audio devices.After assembly, the base of the drill was heldfirmly against the stomach while the handlewas cranked manually. This kit came with
several drill bits and accessories.
Stereoscopeand Case
The stereoscope was usedduring World War II. Thistool helped allied photo
interpreters, who analysedimages of enemy territory
taken by aeroplane-mounted cameras, to viewthe film in 3-Dimension.
Escape and Evasion MapPrinted on silk, which is durable, this map doesn’t rustle andcan be folded up very compactly to be more easily concealed.It also is printed with waterproof dyes so the colours would
not run if the map got wet.
CIA’s Dream Factorya glimpse of the
Letter RemovalDevice
Special devices were used inWorld War II to take letters
from their envelopes withoutopening the seals. The
pincer-like device was insertedinto the unsealed gap at the topof an envelope flap. One couldthen wind the letter around the
pincers and extract theletter from within.
EYE SPY INTELLIGENCE MAGAZINE
65
Robot Fish “Charlie”CIA’s Office of Advanced Technologies
and Programmes developed theUnmanned Underwater Vehicle (UUV)fish to study aquatic robot technology.The UUV fish contains a pressure hull,ballast system, and communicationssystem in the body and a propulsion
system in the tail. It is controlled by awireless line-of-sight radio handset.
Studies in IntelligenceVolume 1, Number 1
Sherman Kent created the publication Studiesin Intelligence in 1955. Kent – the most re-nowned analyst in American intelligence
history – served as a CIA officer from 1950 to1967. Kent envisioned a journal devoted to
intelligence theory, doctrine, and techniques.Studies in Intelligence was born from this
vision. The quarterly journal is still publishedtoday; unclassified issues are published on the
CIA’s Web site.
Microdot CameraThe secret transfer of documents becamevery difficult during the Cold War. Agentsrelied on the microdot camera to photo-
graph and reduce whole pages of informa-tion onto a single tiny piece of film. Thispiece of film could be embedded into thetext of a letter as small as a period at theend of this sentence. Microdots were also
hidden in other things such as rings,hollow coins, or other mailed items. Therecipient would read the microdot withthe aid of a special viewer, often cleverly
concealed as well.
Minox CameraWalter Zapp, a Latvian engineer, developed a
portable camera that would fit easily intothe palm of the hand and yet take high
quality, spontaneous pictures. The Minoxsubminiature camera, in its various models,
was the world’s most widely used spycamera. When it first became available, thecamera was considered a marvel of technol-
ogy; it was originally made from steel inRiga from 1937-1944.
Pigeon CameraCIA’s Office of Research and Development
developed a camera small and light enoughto be carried by a pigeon. It would be
released, and on its return home the birdwould fly over a target. Being a common
species, its role as an intelligence collectionplatform was concealed in the activities ofthousands of other birds. Pigeon imagerywas taken within hundreds of feet of thetarget so it was much more detailed than
other collection platforms.
“Silver Dollar” Hollow ContainerThis coin may appear to be an Eisenhower silver dollar, but it
is really a concealment device. It was used to hide messages orfilm so they could be sent secretly. Because it looks like
ordinary pocket change, it is almost undetectable.
Tobacco Pouch CameraA miniature 35mm film cameramanufactured in Switzerland is
concealed in this modified tobaccopouch. A spring-wound mechanism
advances the film between exposures.
One-Time PadsOne-time pads (OTP) are used to encode/decode agent communications. They areissued in matching sets of two: one forthe encoder and one for the decoder,
and no two pages are alike. Each sheetcontains a random key in the form of
five-digit groups. Once a sheet has beenused to encode a message, it is torn off
the pad and destroyed. If used asdesigned, encryption by OTP is virtually
unbreakable.
This device is a spikethat one could pushinto the ground. It ishollow in the middle
and could containmessages, docu-ments, or film.
“Dead” Drop Spike
EYE SPY INTELLIGENCE MAGAZINE
66
THE PERFECT PLATFORM
MI6 WARNING IGNORED?White House, State Department and CIA deflectcriticism over US Consulate attack in Benghazi,
but was vital intelligence ignored?he brutal execution of USAmbassador ChristopherStevens and deaths of threeother American staffers (formerUS Navy SEALs - Glen Dohertyand Tyrone Wood and computerspecialist Sean Smith) at theT
US Ambassador Christopher Stevens
Benghazi was the focal point of the uprising against Colonel Gaddafi
in other countries. Indeed, at 8.30pm on 11September, Stevens had just bade farewell to aTurkish diplomat. About an hour later dozensof heavily armed men started to attack thecompound. Mortars, rocket-propelledgrenades and heavy weapons were all inevidence. Buildings were set alight and thehunt for the ambassador began. About a mileaway in a building occupied by the CIA,officers there, including a security detail,reported the attack.
COUR
TESY
: DEP
TART
MEN
T OF
STA
TE
‘TRANSFER OF REMAINS CEREMONY’ - ANDREWS AFB
country’s Libyan consulate in September, hasresulted in a public war of words betweendiplomatic, government and intelligencefigures. Initial word from Washington was that
the event happened because of the release ofan amateur anti-Islam film produced in theUnited States. However, it was fairly evident tointelligence and military analysts that theattack was pre-planned, calculated and thoseparticipants had one objective - to assassinateMr Stevens and give America a ‘bloody nose’.There never was a film demonstration.
There had been little sign of trouble in the citythat day, unlike mass protests seen elsewhere
EYE SPY INTELLIGENCE MAGAZINE
67
9/11 anniversary andal-Qaida influence on
fighting factions provided‘perfect platform’ for
attack on US consulate
A Libyan Army tank destroyed in Benghazi during the uprising against Gaddafi. Sincethe dictator was deposed, numerous fighting factions remain, including many
supportive of al-Qaida. Weapons have since been handed in, but MI6 officers warnedthat heavily armed groups continue to operate with near impunity. Prior to the
removal of Gaddafi, both the CIA and MI6 notified London and Washington thatBenghazi was an al-Qaida base. Inset: US Navy SEAL Tyrone Woods
©GL
EN D
OHER
TY M
EMOR
IAL
FOUN
DATI
ON Former US NavySEAL Glen Doherty
died trying to protectAmbassador Stevens.Pictured far right is
Sean Smith - acomputer expert who
also perished
COURTESY: DEPTARTMENT OF STATE
Whilst Stevens hid, there was confusion withinthe CIA annex. The team offered to go to theconsulate, but were reportedly told to “standdown.” Nevertheless, former US Navy SEAL,Tyrone Woods and his colleagues did go toambassador Stevens assistance.
When they arrived at the consulate just before10.00pm, the men came under heavy fire. MrStevens was nowhere to be found, but theydid recover the body of Sean Smith a compu-ter expert. In addition, Woods and hiscolleagues managed to evacuate other staffersback to the CIA building.
And then the CIA building came under heavyfire. The fighting would rage for four morehours during which time the CIA security detailagain contacted their superiors and requestedimmediate support. An hour’s journey away,the US did have a crack Special Forces Deltateam which could have afforded assistance.Also less than 1,500 miles away, US war-planes were at Sigonella Naval Air Station inSicily, Italy, but other forces were much closer.
Perhaps more damning, it later emerged theUS had a specialist army counter-terroristteam at Sigonella. In the confusion, and forreasons unbeknown to anyone, they were notcalled upon.
Above: President Obama andSecretary of State HillaryClinton honour the four
Americans killed by a hostilemob infiltrated by al-Qaida
terrorists
The ‘Transfer of RemainsCeremony’ was held at
Andrews AFB.
Sadly the affair was politicisedby various politicians who
seemed unsure if the incidentwas one of terrorism...
EYE SPY INTELLIGENCE MAGAZINE
UNSEENIMAGES OF
9/11
To mark the 5th anniversary of the devastatingterrorist attacks on New York and Washington DC,Eye Spy was provided with dozens of previously
unpublished photographs taken by New York Policedetective Jay Goldberg just hours after the incident
which left thousands of civilians dead.
We are grateful to Jay who was on duty that fatefulday in Manhattan and was one of the first police
officers at the scene. In a later edition Jay provides aunique perspective of how the emergency servicesreacted and the thoughts of those who were there
on that shocking day...
© JAY GOLDBERG
5TH ANNIVERSARY
9/11WORLD EXCLUSIVE
EYE SPY INTELLIGENCE MAGAZINE 69
ESPIONAGEREVISITED
' LAW ENFORCEMENT PICTURE LIBRARY/STEVE MCMANUS
An MI6 undercoveroperation was
exposed after Russianintelligence officialsmonitored an agent
contact area. In2004, the FSB
reportedly placed aMoscow-based UK
diplomat undersurveillance after
receiving intelligencethat the official - aformer Durham
University graduatewas an agent.
The surveillance -according to FSB
officials - led them toa Moscow street anda most remarkable
discovery...
Moscow accuses Britain’s MI6 ofunder-the-counter spy games
COLD WAR
EYE SPY INTELLIGENCE MAGAZINE 73
FSB COMPROMISE MI6 INTELLIGENCithout warning, Russianstate television stationRossiya, broadcast adocumentary about thespy games whichapparently came as asurprise to British
Prime Minister Tony Blair. He said heonly became aware of the affair afterswitching on his television and flickingthrough the Teletext pages. Mr Blairsaid: “I’m afraid you are going to get theold stock-in-trade ‘we never commenton security matters’... except when wewant to, obviously. I think the less saidabout that, the better. ”
Central to theRossiya claims wasa light brownplastic ‘rock’about 15 incheslong. The objectwas hollow andinside the water-tight box, acommunicationssystem for trans-mitting and
receiving signals. The device waspowered by several long-life lithiumbatteries. Moscow claims it was placedin the park in September 2005 by an“MI6 officer already under surveillance.”
Tony Blair
The incident comes at a time when bothnations have increased intelligence-gathering levels to that once witnessedin the Cold War. The Federal SecurityBureau (FSB) learned of the operationlast summer, but decided to gather asmuch information as possible in aneffort to limit UK denials.
Television schedules gave no hint of thebroadcast and the story has captured theimagination of people throughout theworld. However, for the supposed MI6officers named by Moscow, the incidentis worrying - but not so dangerous likethat of a fourth man - a Russian nationalwho has been accused of “involvementin activities against the state.” A subtlephrase used to mean ‘spy’. He hasalready confessed to espionage. FSBsources say he was recruited by MI6while attending a British university -though that has not been confirmed.
Weeks prior to the broadcast, it isunderstood that senior British diplomatsin Moscow and London were invited tomeetings with officials from the FSB.They were questioned about theirknowledge of “certain activities” takingplace just off a city street next to a park.The UK diplomats were apparentlypuzzled and baffled by the line ofquestioning. A diplomat, described by
‘Here we see how he comes close to the rock, holding the device in hishands. You can see how he tries to retrieve information. It looks like
something goes wrong with the process because first he walks to one sideand then he changes direction and walks to another side but still the
information doesn’t come. Then he goes closer to the trees as if pretend-ing that he wants to relieve himself. By using these false movements he
comes close to the rock and kicks it.’ - Russian TV commentator
the Foreign Officeas third secretary atthe British Embassyin Moscow, wasasked that MI6“desist its opera-tion.” The FSBclaim he too is inthe employ of MI6.
The UK dismissed the allegations, butSergei Ignatchenko, chairman of theFSB’s media centre, explained whathappened next: “They [MI6] began todeny it and claimed that they weren’tworking against us at all.” That messagewas related to Moscow and a decisionwas then made to expose the affair. “It
Sergei Ignatchenko
Nikolay Patrushev - head of the FSB is saidto be “delighted” that the MI6 espionagehas been “compromised” by his service
W
EYE SPY INTELLIGENCE MAGAZINE74
CE OPERATION“According to our
experts’ assessments,this device costs
several tens of millionsof pounds [to develop].You could only create
this technologicalwonder in laboratory
conditions...”
was only then that we decided to gopublic,” said Ignatchenko. “We considerthis a breach of our agreements. Inessence we were deceived.”
Those ‘agreements’ referred to by MrIgnatchenko, supposedly centre upon a‘gentlemen’s agreement’ reached byMoscow and London in 1994 thatneither country will participate inespionage activities against each other.However, one year ago President Putinpublicly ordered his intelligence servicesto “get more active abroad.” MI5 also
warned that Russian intelligence gather-ing is on the increase in the UK and anumber of suspects are under surveil-lance. It is believed Moscow has around40 SVR officers operating in the UK.
X-ray of the alleged MI6 spyingdevice retrieved by the FSB - five
lithium batteries are visible
Russia’s media has published the names and photographs of the four alleged MI6 officers
The Russians also claim that one of theMI6 officers had been authorisingpayments to Russian non-governmentalorganisations (NGOs), including civilrights groups. During the documentary,
The devicecontained at least
five long-lifelithium batteriessuggesting the
operation was ofsome duration
EYE SPY INTELLIGENCE MAGAZINE 75
78
SHOOT TO KILL
The extraordinary security operation toprotect the London Olympic Games isevidenced in these photographs showingArmy deployment of a surface-to-air missilebattery in the city. Already the Royal Navyhas warships on the River Thames, and theRAF has moved several powerful Typhoonfighters to RAF Northolt on the outskirts ofLondon.
Some 40,000 people will work in variousareas of security, including hundreds ofsurveillance operatives to monitor suspi-cious behaviour. Several elite snipers willoperate in the city. MI5 has advised seniorgovernment officials that there is a possibil-ity al-Qaida or Irish dissidents may strike.Analysts note the event will be watched bybillions of people around the world, afford-ing a major propaganda opportunity.
LONDON 2012OLYMPIC GAMES
SECURITY
Good morning! Residents opened theircurtains to this sight. Sadly, it is a necessityagainst the possibility of an airborne attack
© HALA/SNAPPERJACK OF LONDON
© H
ALA/
SNAP
PERJ
ACK
OF L
ONDO
N
EYE SPY INTELLIGENCE MAGAZINE
79
A somewhat surreal image at Blackheath. Against the backdrop of London’s financial district (Canary Wharf) and a passingred bus, an Army Rapier missile battery is deployed. The Ministry of Defence has confirmed it has authorised the shooting
down of any rogue aircraft that presents a danger to the Olympic Games and the city as a whole
Senior officers from all three UK armed forces, New Scotland Yard, MI5, MOD andHome Office discuss the deployment of the missile system at Blackheath.
Figs. 1 and 2. Scenes from HMS Ocean which is docked in Greenwich. The ship is carrying Lynx helicopters which will be usedto deploy Special Forces and Counter Terrorist Command officers in an emergency. Fig. 3. The RAF also have a major airborne
presence at the Games. These Typhoon fighters have been relocated to RAF Northolt. In early May, a major exercise was hosted bythe base code-named Olympic Guardian
Fig. 1 Fig. 2 Fig. 3
© H
ALA/
SNAP
PERJ
ACK
OF L
ONDO
N
© SNAPPERJACK OF LONDON
© RAF/ROYAL NAVY/CROWN COPYRIGHT
EYE SPY INTELLIGENCE MAGAZINE
80
Criticism over a failed MI6 operation to secure a secretcommunication channel to Libyan rebels is unjustified. This is
the opinion of many senior intelligence analysts whorecognise that nothing supersedes the importance of
obtaining human intelligence (HUMINT) and an avenue to talk...
n the early hours of 5 March 2011, anurgent government inspired memo wassent to the editors of a number ofnewspapers and television channels,including Eye Spy. An incident was beingwidely reported in the Middle East thatdetailed the detention of several BritishSpecial Forces (SF) soldiers and aI
‘diplomat’ in eastern Libya. The advisoryurged caution when disclosing the identity ofthe group.
However, within hours it transpired that a topsecret UK intelligence operation had beenexposed; furthermore, the diplomat was in
MOST DANGEROUS:MI6 Chief Sir John Sawers was calledupon to use the Service’s worldwidenetwork to make contact with centralfigures opposed to Colonel Gaddafi
fact a senior MI6 officer with much experiencein Libyan matters, and with an apparentcontact on the ground. Indeed, Eye Spyunderstands that at least two MI6 men wereattached to the group.
THE INCREMENT
This dangerous ‘back-channel’ operation wasgreen-lighted by Downing Street in an effort tocement a proper liaison with officials in theanti-Gaddafi movement. The MI6 officer waspart of a SF unit that combined both SAS(Special Air Service) and SBS (Special BoatService) personnel. When these units are
EYE SPY INTELLIGENCE MAGAZINE
MI6 NIGHT GAMESdrawn together and either head-up or supportan MI6 operation, they usually form what isknown in British Intelligence as ‘The Incre-ment’.
MI6 Station Chiefs have access to TheIncrement only in the event of ‘extraordinarycircumstances’ or when national security isthreatened. Other elements involved in thecreation of such a unit may involve the JointSupport Group (JSG), Joint Special ForcesAviation Wing (JSFAW), and the StrategicReconnaissance Regiment (SRR).
81
CALCULATED RISK:Britain’s Foreign Secretary William Hague
assembled senior intel and military officials anddecided to launch a night-time operation that
Downing Street considered “absolutely essential”...
The team were secreted into the desert duringthe dead of night by way of at least oneChinook helicopter flying from Malta. Reportsfrom Libya state two helicopters wereinvolved. Their destination was a sprawlingilluminated desert farm complex near the rebelheld city of Benghazi. Indeed, the site called‘Farmco’ covers nearly 40,000 acres. Eye Spyunderstands that MI6 did have a contact manon the ground who had alerted a local rebelcommander about the flight. He was suppos-edly called ‘Tom Smith’, a Welsh man, thoughthere has been a great deal of speculation thisis but a pseudonym. He was listed on aForeign Office web link and reportedly playeda role in the rescue and coordination ofBritons wanting to leave Libya.
However, in the heart of the desert, otherforces notified by farm hands observed theSAS-MI6 group land and were angry abouttheir presence. Not wishing to make a tensesituation worse, the group decided to cooper-
ate with the rebels and laid down their arms.From inside the helicopter, a large quantity ofexplosives, ammunition, maps, fake identitypapers and passports were allegedly seized.Eye Spy believes tracking devices wererecovered from various objects.
TIME-LINE AND TELEPHONE INTERCEPTION
It seems clear that Tom was MI6’s groundcontact at the Farmco plant, owned by the Al-
Happier times... Colonel Muammar Gaddafi andSpain’s President Jose Luis Rodriguez Zapatero
© L
A.M
ONCL
OA.E
S
Eye Spy examines theBritish Intelligence
precursor mission to
OPERATIONELLAMY
MI6 Station Chiefs have accessto The Increment only in the
event of ‘extraordinarycircumstances’ or when national
security is threatened
EYE SPY INTELLIGENCE MAGAZINE
Khadra Farm Company, about 18 miles south-west of Benghazi. Some reports state Tom,who had worked for about five months as anadministrator at the company, intended to usea secure room to support the mission. Thoughthe operation had started well in Malta, Tom’snight-time activities had caught the eye of atleast one colleague. At 3.00am a farm guardwatched him drive out of the complex;minutes later the sound of a helicopter couldbe heard. A short while later the Special
82
SURVEILLANCEP H O T O G R A P H Y
TRADECRAFT
WITH PETER JENKINS
Part Two
SLR CAMERASDIGITAL
SELECTING CORRECT EXPOSUREBeing able to select correct exposure settingson a camera used in surveillance work can seemdaunting. However, in this feature Peter Jenkins,one of the world’s most respected surveillancetrainers demystifies the subject and provides astep-by-step guide to understanding exposureand various topics associated with this mostimportant photographic element...
Adigital camera is a light proofbox with a light sensor calleda Charge Coupled Device(CCD) at one end andinstead of film, a lens at theother, which focuses light
HOW A DIGITAL CAMERA WORKS
onto the sensor to produce a ‘correct exposure’.A correct exposure is where the camera readsthe amount of light available and selects the idealshutter speed and respective aperture size.Some areas of the picture may be in shade,another parts in bright light, thus the camera’smeter calculates an average to obtain a correctexposure. There are three factors that control theamount of light that enters the camera and hitsthe sensor:
• The diameter of the lens, wider is better butexpensive• The length of time the shutter is held open(shutter speed)
• The diameter of the aperture within the lens,which we call ‘aperture’
Different combinations of these factors createvarious effects to the image, which are veryimportant. In any mode (apart from the manualsetting) the camera will always compute what itconsiders to be a correct exposure. The correctexposure is a combination of shutter speed andaperture setting
Initial pressure on the shutter button focuses thelens and also takes a light reading; the cameracalculates what it considers to be the bestaperture and best shutter speed to use. Both arerelated because as you alter the shutter speed,the aperture is also affected. The slower theshutter speed, the smaller the aperture. Thefaster the shutter speed, the wider the aperture.
Shutter speed is the amount of time the shutter isheld open to allow sufficient light to fall on thesensor before closing again.
Shutter speed is measured in fractions of asecond, such as:
It is very important especially when filming inlow light; moving subjects and shooting withtelephoto lenses. A shutter speed of 1/125th or1/250th is a good number to use for most shotsbut we will look at this in-depth a little later.
1/15 1/30 1/60 1/125 1/250 1/500 1/1000
1/250th
1/100th
1/60th
1/20th
APERTURE
As stated, the aperture is the size of the hole thatallows light to reach the sensor and is controlledby a moving diaphragm inside the lens. The size
PHOT
OGRA
PHS
© S
URVE
ILLA
NCE
TRAD
ECRA
FT
EYE SPY INTELLIGENCE MAGAZINE
83
of the aperture can be altered and is given anumerical value which represents the size. Thesevalues are called ‘f’ numbers or ‘f stops’ andfollow in sequence:
“Photography, whether one likesit or not, is a crucial element ofsurveillance work...”
f:2 2.8 4 5.6 8 11 16 22
f16
f8
f4
f2
f2 being the widest aperture, letting in lots oflight and f22 the smallest, letting in less light.The series as a whole is arranged so that each fnumber lets in twice as much light as theprevious number.
wide aperture such as f1.4 or f2.8 willallow plenty of light in and this isneeded in a low light situation which iscommon in surveillance photography,
WHY IS APERTURESO IMPORTANT TO
THE SURVEILLANCEPHOTOGRAPHER?
Aespecially in the early morning or in the evening.In addition, a larger aperture will allow you to usefaster shutter speeds, which is extremelyimportant with a telephoto lens. Whether you usea small or large aperture also has a strangeeffect on the image which we call ‘depth of field’and is described next. Essentially, in surveillance,a wider aperture is best (or ‘fast’ lens) but theycan be expensive.
EXPOSURE MODES
Many cameras have different exposure modes.Its respective manual should explain what modesare available, such as:
• Automatic• Programme• Shutter Priority• Aperture Priority• Manual• Shortcut Modes• Automatic Exposure
Most SLR cameras have an automatic mode andit is usually identified by a green symbol on themode dial. In this mode, all that is needed to takea picture is to point the camera, which takes ameter reading and automatically sets thecameras aperture setting and shutter speed toobtain a correct exposure (the flash will pop up ifrequired). This is a good setting for the novicebut not always ideal in surveillance photographywhere more control over the camera is required.
PROGRAMME MODE: In this mode, the cameratakes an exposure reading and suggests the bestsettings to use. Turning the control dial canmanually alter the shutter speed and the cameraselects the correct aperture to match. This modeis used to give you more control over which
Exposurecontrol on atypical Nikon
camera
shutter speed or aperture to use in order toobtain certain effects. Let’s imagine you’ve justtaken a meter reading and your camera suggestsan exposure of 1/125sec at f8. To achieve thesame exposure but with a faster shutter speed(to capture movement), you turn the control dialto use any of the following aperture and shutterspeed combinations:
Camera shutter speed and aperturedata highlighted in red box
2.8 4 5.6 8 11 161/1000 1/500 1/250 1/125 1/60 1/30
The combination you choose depends on whattype of effect you are trying to achieve.
SHUTTER PRIORITY: When in this mode, youmanually set the shutter speed and the cameraautomatically sets the aperture. Your choice ofshutter speed affects how moving subjects willappear in the picture. Slow shutter speeds suchas 1/15 or 1/30 of a second, will blur movingsubjects. Fast shutter speeds such as 1/250, 1/500 or 1/1000 of a second can be used to freezethe action of a moving subject. Fast shutterspeeds are required when using telephoto lensesto prevent camera shake.
© EYE SPY
EYE SPY INTELLIGENCE MAGAZINE
84
OF AMERICAN INTELLIGENCEORIGINS
The United States Intelligence Community is recognised as the world’s biggest employer of intelligence and security personnel.With over a dozen premier agencies and numerous other ‘service organisations’, it is a complex and impressive organ thatfunctions in every corner of the world. Though some of its agencies are regarded as ‘youthful’ in terms of the date of their
creation, the actual origins of American Intelligence are hundreds of years old...
EYE SPY SECRET HISTORY
“The necessity of procuringgood intelligence is apparent
and need not be furtherurged... All that remains forme to add is, that you keep
the whole matter as secret aspossible. For upon secrecy,success depends in most
enterprises of the kind, andfor want of it, they are
generally defeated, howeverwell planned and promising a
favourable issue.”
George Washington 26 July 1777
A
Robert Morris of the SecretCommittee was nicknamed “The
Financier” because of his financialsupport of the American Revolution
tion relative to foreign affairs”was shifted to the new body,whose secretary was empow-ered to correspond “with allother persons from whom hemay expect to receive usefulinformation.”
ven before setting upthe Committee of SecretCorrespondence, theE
Second Continental Congresshad created a SECRETCOMMITTEE by a resolutionon 18 September 1775. Thiscommittee was given widepowers and large sums ofmoney to obtain militarysupplies in secret, and wascharged with distributing thesupplies and selling gunpow-der to privateers chartered bythe Continental Congress.The committee also
THE SECRET COMMITTEE
for foreign intelligence andforeign alliances, the SecondContinental Congress createdthe COMMITTEE OF CORRE-SPONDENCE by a resolutionon 29 November 1775:
RESOLVED, That a committeeof five would be appointed forthe sole purpose of corre-sponding with our friends inGreat Britain, and other partsof the world, and that they laytheir correspondence beforeCongress when directed;
RESOLVED, That this Congresswill make provision to defrayall such expenses as they mayarise by carrying on suchcorrespondence, and for thepayment of such agents as thesaid Committee may send onthis service.
he committee was soonrenamed the COMMIT-TEE OF SECRETT
SECRET CORRESPONDENCE
CORRESPONDENCE. Itsmembers were BenjaminFranklin of Pennsylvania,Benjamin Harrison of Virginia,and Thomas Johnson of
Maryland. This was effectivelyAmerica’s first foreign intelli-gence directorate.
The committee employedsecret agents abroad, con-ducted covert operations,devised codes and ciphers,funded propaganda activities,authorised the opening ofprivate mail, acquired foreignpublications for use in analysis,established a courier system,and developed a maritimecapability apart from that ofthe Navy.
On 17 April 1777, the Commit-tee of Secret Correspondencewas renamed the COMMITTEEOF FOREIGN AFFAIRS, butkept with its intelligencefunction. Matters of diplomacywere conducted by othercommittees or by the Congressas a whole.
With the creation of a Depart-ment of Foreign Affairs - theforerunner of the Departmentof State - on 10 January 1781,correspondence “for thepurpose of obtaining the mostextensive and useful informa-
merica has carriedout foreign intelli-gence activities forwell two centuries.Recognising the need
EYE SPY INTELLIGENCE MAGAZINE
85
The “Secret Corresponders” L-R Benjamin Franklin, Thomas Johnson, Benjamin Harrison
civilian espionage act, andmilitary law did not providepunishment severe enough toafford a deterrent, in thejudgment of Patriot leaders.
THE AMERICAN COMMITTEE ON SPIES 5 JUNE 1776: John Adams, James Wilson, Edward Rutledge, Robert Livingston and Thomas Jefferson
Adams, Sherman, Livingston, Jefferson, Franklin - The Committeeappointed to prepare the Declaration of Independence
of the Congress: BenjaminFranklin, Robert Morris,Robert Livingston, JohnDickinson, Thomas Willing,Thomas McKean, JohnLangdon, and Samuel Ward.
n 5 June 1776, theCongress appointedJohn Adams, Thomas
THE COMMITTEE ON SPIES
OJefferson, Edward Rutledge,James Wilson, and RobertLivingston “to consider what
took over and administered ona uniform basis the secretcontracts for arms and gun-powder previously negotiatedby certain members of theCongress without the formalsanction of that body. Thecommittee kept its transactionssecret, and destroyed many ofits records to assure theconfidentiality of its work.
The Secret Committee em-ployed agents overseas, oftenin cooperation with theCommittee of Secret Corre-spondence. It also gatheredintelligence about Tory secretammunition stores andarranged to seize them. TheSecret Committee sent mis-sions to plunder Britishsupplies in the southerncolonies. It arranged thepurchase of military storesthrough intermediaries so as toconceal the fact that theContinental Congress was thetrue purchaser. The SecretCommittee used foreign flagsto protect its vessels from theBritish fleet.
Those appointed to thecommittee included some ofthe most influential members
is proper to be done withpersons giving intelligence tothe enemy or supplying themwith provisions.” The samecommittee was charged withrevising the Articles of War inregard to espionage directedagainst the patriot forces.
The problem was an urgentone. Dr Benjamin Church,chief physician of the Conti-nental Army, had already beenseized and imprisoned as aBritish agent, but there was no
n 7 November 1775, theContinental Congressadded the death penalty
DEATH TO SPIES
Ofor espionage to the Articles ofWar, but the clause was notapplied retroactively, andChurch remained in jail.
On 21 August 1776, thecommittee’s report wasconsidered by the ContinentalCongress, which enacted thefirst espionage act:
RESOLVED, That all personsnot members of, nor owingallegiance to, any of the UnitedStates of America, as describedin a resolution to the Congressof the 29th of June last, whoshall be found lurking as spiesin or about the fortification orencampments of the armies ofthe United States, or of any ofthem, shall suffer death,according to the law and usageof nations, by sentence of acourt martial, or such etherpunishment as such courtmartial may direct.
It was resolved further that theact “be printed at the end ofthe rules and articles of war.”
On 27 February 27 1778, theContinental Congress broad-ened the law to include any“inhabitants of these states”whose intelligence activitiesaided the enemy in capturingor killing Patriots.
EYE SPY INTELLIGENCE MAGAZINE
86
EYE SPYE
no additional power source as the cameraand audio is powered directly from theMP4 device.
The camera is lightweight and low inprofile. Because it is a modular camera itcan be also be used in a purse, bag,backpack, tie, hat etc. Nevertheless, westill recommend it should be worn in thesternum area. Of added advantage, it hasjust one tough but very slender lead thatplugs directly into the recorder.
Many surveillance operatives wronglyassume that a hat or eyeglass cameraprovides the best viewpoint. While a headmount does allow the user added move-ment of the camera, we have seen resultsthat include too much sky and ceilings inthe top half of the frame. Similarly, thefootage can be jerky or blurred in replay. Itis also a little difficult to hide the wire fromthe head to the recorder.
The camera’s 80 degree field of vision isquite adequate. Correctly fastened in thebutton hole it is totally invisible.
Quality Button Camera with Digital MCOVERT BLACK
EQUIPMENT MANUFACTURERS SHOULD CONTACT EYE SPY BEFORE FORWARDING SAMPLES FOR REVIEW
PRODUCT REVIEWye Spy’s COVERT BLACKreviewed in issue 43 is ideal forthe professional, but didn’tnecessarily meet the needs ofall our readers, some who
wanted a more affordable system. Thanksto the efforts of colleagues who spent aconsiderable time sourcing cameraproducts for an ideal combination set, webelieve we have found something quitespecial. Lower costs occasionally equatesto inferior quality, but this is not the casewith COVERT BLACK ECONOMY - arecording system that still provides qualitycolour film footage and audio. As with ourmore expensive set, this button camerarecorder comes complete with a highquality display, has audio capability andimportantly, is easy to use. There ishowever, one main difference - the price.
The quality of the camera is outstanding.With 380 horizontal TV lines it performs wellin low light and works in either PAL orNTSC formats. Its small size makes it theperfect combination for body worn applica-tions. Like Covert Black, the unit requires
he DVR is small enough to fit into astandard sized cigarette packetand has a built-in screen to check
Affordable - Superb Results
MP4 DIGITAL VIDEO RECORDER (DVR)MP4 DIGITAL VIDEO RECORDER (DVR)MP4 DIGITAL VIDEO RECORDER (DVR)MP4 DIGITAL VIDEO RECORDER (DVR)MP4 DIGITAL VIDEO RECORDER (DVR)
Tthe footage as it is being collected. Theunit also comes with a set of high qualityearphones to monitor the audio duringplayback and can be used as a standardMP4 player. It has an excellent time displayallowing frames or footage to be accuratelydetailed - ideal for data used in legalcases. The unit has 512 MB internalmemory and will hold approximately fourhours of video. An optional 1GB SD cardenables you can record an additional eighthours.
To playback, simply plug the supplied USBcable into a computer. The computer
automatically finds and detects the cameraand files can be accessed. Files can beplayed on any media such as WindowsMedia Player or Real Player.
SUMMARY: The system is easy tooperate and conceal and produces high-quality imagery and audio. The camera isexcellent and matched by the DVR.Uploading the footage takes seconds, andmore importantly, programmes areavailable that compress large files allowingthe user to store hours of film on a singleCD, for example. In terms of performanceand quality, Covert Black Economy is greatvalue.
EYE SPY INTELLIGENCE MAGAZINE
87
Quality metal carry case
One set ofbuttons
Multi-functionDVR recorder
with in-builtscreen providingpower to camera
and audio
Professionalear phonesfor discreet
listening
Camera andaudio recorder
Lead to PCfor playback
editing
Lead for playbackon television orrecord to video
MP4 RecorderECONOMY
overt Black Economy comes with one set of matching buttons in dark blue. Covert Black has foursets of interchangeable buttons and screws (the screw heads allows for concealment in wallpanels). The Covert Black set has slightly better image quality - 450 horizontal lines against
Specifications:Video signal system: PAL/NTSCPhoto-image sensor: 1/3 CMOSCOLOURLow Illumination: 2.0luxHorizontal Resolution: 380TV LinesS/N ratio: Min.48dBVideo output: 1.0-/75ohmsBacklight: AutoOperating Temp: -10/+50Power Supply: DC 8VLens: 3.6 mmMP4 Player Specifications
Supports multi-language display,supports WMA/WAV/ADPCM/PCMaudio formatStandard USB2.0 interface, with built-in SD/MMC card slot, 512MBmemory flashSupport folder management functionand view functionSupports ASF format, ADPCM stereosound, or convert to ASF format bytransfer toolsJPEG formatSet up function: time / calendar,language, game, storage/checkmemory, game/auto power off2.5" TFT OLED 260K colour 16k,pixels support: TV OUT /INBuilt-in Mic / speaker; Built-in 2300lithium batteryBuilt-in MicrophoneVideo form: ASF shade is broadcast:6 hoursPicture browsing: support EXIF2.1Power Supply: 3.7V lithium batteryPlaying time: 8 hoursDimensions:60(H)*90(W)*17.5(D)mm
COVERT BLACK VERSUS THE ECONOMY SYSTEMCOVERT BLACK VERSUS THE ECONOMY SYSTEMCOVERT BLACK VERSUS THE ECONOMY SYSTEMCOVERT BLACK VERSUS THE ECONOMY SYSTEMCOVERT BLACK VERSUS THE ECONOMY SYSTEM
CCBE’s 380. You can use a 4GB SDcard with Covert Black, though it onlytakes a few seconds to insert an emptycard. Two distinct advantages of theeconomy set are its superb hard sidedcarry case and stronger primary lead.
As with other systems, Covert BlackEconomy is not rainproof so care mustbe taken when operating outdoors.However, with a little imaginationprotective housings can be built.
Assembly time to operation is just twominutes.
EYE SPY INTELLIGENCE MAGAZINE
FBI counter-intelligence arm investigatesalleged Russian front company exporting highlysensitive electronic equipment to the FSB and
Russian armed forces...
89
FORBIDDEN EXPORTSMICROCHIPS, MISSILE GUIDANCE AND TRAFFIC LIGHTS
By Paul Beaumomt
ARC ELECTRONICS INC.rom around October 2008 to2012, employees of a com-pany based in Houston, Texas,along with others, procuredhigh-end electronics andF
exported them to customers overseas.Unfortunately the FBI said the paperwork wasnot as it should be, having been deliberatelypenned to mislead any authority that mightcare to inspect it. After all, how could onewrite the destination address of RussianIntelligence as the recipient?
Apart from tough rules regulating exportsworldwide, the United States has other
statutes it can call upon: The InternationalEmergency Economic Powers Act, The ArmsExport Control Act and so on.
Two firms at the centre of the FBI investigationshared a principal officer, Alexander Fishenkoaged 46. He was born in the former Sovietsatellite of Kazakhstan and became a UScitizen in 2003. According to court records hesaid he had no military background, but hassince admitted he did work for a Sovietintelligence unit in the 1980s. The FBI accuseFishenko of operating as an unregisteredRussian Government agent - something whichMoscow denies.
The companies have beennamed as Arc ElectronicsInc. of which Fishenkowas co-owner andpresident, and Moscow-based procurementcompany Apex System,LLC. Sergey Klinov wasits CEO and Fishenko aprincipal, having foundedthe company in 1998.Alexander Posobilov was director of procure-ment for Arc Electronics. He was arrested at
AlexanderFishenko
© IS
S TR
AINI
NG L
TD
EYE SPY INTELLIGENCE MAGAZINE
In the last edition ofEye Spy we took a candidlook at Unmanned AerialVehicles (UAVs) and how
they are changing theSurveillance Rule Book.Now a new technologyloosely connected to
UAVs is about to changethe Spying Game...
EYE SPY INTELLIGENCE MAGAZINE 91
92
SILENT SERVICESUBMARINES, TECHNOLOGY AND ESPIONAGEPaul Beaumont provides insight into two
recent submarine spy cases, and theincredible importance of securing naval
intelligence secrets...
aintaining security aboardsubmarines is of para-mount importance to anynavy. Perhaps more vital isthat the whereabouts ofthe boat’s technology and
Mweaponry remain secret. Historically, the Westand East, especially during the Cold Warbattled to glean intelligence on submarines.Today powerful maritime nations such as the
United States, Russia and Britain have beenjoined by China - a nation with a reputation forespionage and duplicating technology.Knowing where a submarine is at any stage ofits mission is a bonus for an adversary. Thusespionage cases involving mariners andsubmariners are always big news. The RoyalNavy is not immune to espionage.
On 3 September 1971, a Ministry of Defence(MOD) signal form marked SECRET wasgenerated by the Vice Chief Naval Staff. It wasan advisory notifying a number of parties thata naval officer of Sub-Lieutenant rank hadbeen acting on behalf of the Soviets and hadalready passed on documents to Moscow. Itlater transpired that a number were of thehighest security gradings.
In the late 1990s, Chief Petty Officer StevenHayden sold Gulf War data to The Sun
MI5 AND FBI ENGAGE SIMILAR STING OPERATIONS
Edward Devenney - jalied
SECR
ET
EYE SPY INTELLIGENCE MAGAZINE
by David HamerFort Meade...being an irregularly occa-sional, or an occasionallyirregular, communication fromthe American cryptologicalcommunity: particularly thosethings associated with theNational Cryptologic Museum[NCM] and its parent, theNational Security Agency[NSA]
Letter from
On a somewhat irregular basisthe National Security Agencyand its companion organisa-tion, the Central SecurityService [NSA/CSS],declassifies and releasesdocuments into the publicdomain. The following list
gives an example of those releases that relateto many of the world-shaking, historicalevents that have occurred during the lastcentury. In accordance with Executive Order12958 dated 17 April 1995, which deals withclassified national security information, NSAreviews for declassification all permanentlyclassified documents that are 25 years orolder. When a document is declassified it istransferred to the US National Archives andRecords Administration [NARA] located inCollege Park, MD where it becomes availablefor study by historians of intelligence andother researchers in related fields of interest.
Recent releases include documents dealingwith the following incidents:
• Gulf of Tonkin• The attack on the USS Liberty• VENONA• Korean War• Cuban Missile Crisis• Unidentified Flying Objects (UFOs)• John F. Kennedy Assassination• Truman Memorandum 24 October 1952
Lockheed U-2 spy plane reconnaissancephotograph of soviet missile sites on Cuba
The NARA index contains nearly 5,000 entriesand lists approximately 1.3M pages ofdocuments, formerly classified and nowreleased into the public domain. Releasedmaterial covers a period beginning with WWI.However, a significant number of formerlyclassified documents are available for theasking, or at least for the downloading inelectronic format, from the NSA website athttp://www.nsa.gov/ - select Public Info/Declassification Initiatives and then choosethe particular topic of interest. Each of theabove categories contains several sub-headings that contain hyperlinks to PDF,HTML, GIF, WAV, PostScript and otherappropriate media files.
VENONATHE REAL COD
EYE SPY INTELLIGENCE MAGAZINE94
VENONA Intelligencedocuments notingJulius Rosenberg’scode name - Liberal
CO
URTE
SY F
BI
he US Army’s Signal Intelligence Service, theprecursor to the National Security Agency,began a secret programme in February 1943later codenamed VENONA. The mission of
VENONA
Twas to examine and exploit Soviet diplomatic commu-nications but after the programme began, the messagetraffic included espionage efforts as well.
Although it took almost two years before Americancryptologists were able to break the KGB encryption, theinformation gained through these transactions providedUS leadership insight into Soviet intentions and treason-ous activities of government employees until theprogramme was cancelled in 1980.
The VENONA files are most famous for exposing Julius(code named LIBERAL) and Ethel Rosenberg (below) andhelp give indisputable evidence of their involvement withthe Soviet spy ring.
TTHE CODEBREAKERS
library collection comprising a wide spec-trum of printed works on cryptology and
he National Cryptologic Museum[NCM] recently received from world-renowned author and cryptologyexpert Dr David Kahn his large
DEBREAKERS
Dr David Kahn:Expert in codes;cryptography;political militaryand communica-tions intelli-gence; author ofbooks, articlesand publicationson ciphers andAmericanintelligence
EYE SPY INTELLIGENCE MAGAZINE 95
96
OPERATION SEAGRAMAs the trial of suspected al-Qaida operatives begins, MI5
consider the theory that not everyone involved in theLondon and Glasgow bomb plots have been identified
THE TIGERTIGER & GLASGOW AIRPORT ATTACKSMI5
Police cordon-off Neuk Crescent home to the bombers in Houston
The trial of two men who worked as doctors in the United Kingdom has begunin London. Bilal Abdulla, 29, and Mohammed Asha, 28, appeared atWoolwich Crown Court on 9 October, charged with the attempted murder ofhundreds of party-goers at the TigerTiger nightclub on 29 June 2007. Thefollowing day they drove a jeep packed with gas cylinders at speed into thepassenger area of Glasgow International Airport. The driver of that vehicle,
Kafeel Ahmed, 28, died a month later after suffering extensive burns.
The suspected al-Qaida terrorist sleeper cell had driven to London in two specially preparedMercedes cars which they believe would ‘blend-in’ with other luxury vehicles in the capital. Theplotters also believed the Mercedes brand would attract little attention if left unattended in theWest End. The boots (trunk) of the vehicles were large enough to conceal large gas cylinders,petrol canisters, explosives and 900 large nails.
EYE SPY INTELLIGENCE MAGAZINE
97
© KEVIN PATTERSON PHOTOGRAPHY
© SNAPPERJACK OF LONDON
Left: Dr Asha was arrestedon the MI6 in a huge
counter-terrorist operationinvolving over a dozensurveillance vehicles.
Below: An off-duty policeofficer pours water on
Kafeel Ahmed whomoments earlier had
crashed his vehicle intothe airport terminal.
The bombers made good their escapefrom the area around TigerTiger on two
London rickshaws
Left: Kafeel Ahmeddied four weeksafter he crashedthe Jeep into thedoors of GlasgowAirport passenger
terminal
EYE SPY INTELLIGENCE MAGAZINE
98
MI6 HEADQUARTERSMELBURY ROAD 1919-1926
© AT MEDIA/HALA TABACHREVEALED
EYE SPY INTELLIGENCE MAGAZINE
100
The dream of ‘invisibility’ has probably moved astep closer after US scientists announce they have
crafted a material that can bend visible lightaround objects...
esearchers at the University ofCalifornia at Berkeley, whosework is funded primarily by thePentagon, have engineeredmaterials that can control thedirection of light. The technol-ogy could lead to systems forR
AN UNNERVING ILLUSION THA
rendering anything from people to largeobjects, such as aircraft or ships, invisible tothe eye. Its application in the world ofespionage and intelligence gathering areobvious. In 2006, John Pendry of ImperialCollege London and David Smith of DukeUniversity in North Carolina used microwavesto achieve similar results, yet according toacademics, achieving this effect using light isa significant advance.
Lead scientist on the light project Xiang Zhangtold The London Times: “In the case ofinvisibility cloaks or shields, the materialwould need to curve light waves completelyaround the object like a flowing river around arock.”
HOLY GRAIL OF ILLUSION ARTISTS
The search for ‘adaptive camouflage’ as someresearchers refer to invisibility, has a longhistory. In 1897, science fiction writer andauthor of The Invisible Man, H G Wells,introduced the idea, then fictional, of ascientific route to invisibility through bleachand mysterious rays. Some would say today’smore modern experiments with visual stealthhave their roots in a 1943 US Navy projectcode-named Yehudi. The purpose of thisprogramme, which was highly secret at thetime and came to light only in the 1980s, wasto give Navy patrol aircraft a better chance of
sinking enemy submarines. During 1942,German U-boats were a constant menace offthe eastern seaboard of the United States andacross the Atlantic. Hundreds of merchantvessels were sunk. Though torpedo firingaircraft were sent to sink the U-boats, theywere often spotted long before they arrivedand the submarines simply dived to safety.
The Yehudi team needed a way to make theaircraft harder to see, and camouflage paintalone wouldn’t do the job. Regardless of whatcolour was used, the aeroplane could be seenagainst the sky. Scientists believed the onlyway to make them less visible was to actuallymake the aircraft brighter by fitting them withdozens of lights. At the time, this seemedillogical to some military commanders.
Nevertheless, engineers fitted a TBM-3DAvenger torpedo-bomber with 10 sealed-beamlights installed along the wing’s leading edgesand the rim of the engine cowling. When theintensity of the lights was adjusted to matchthe sky, the Avenger blended into the back-ground. Tests revealed that the Yehudi systemlowered the visual acquisition range from 12miles to two miles.
EYE SPY INTELLIGENCE MAGAZINE
101
AT DOES NOT REQUIRE PROPS
Lead scientist on the Pentagonsponsored project - Xiang Zhang
EYE SPY INTELLIGENCE MAGAZINE
COURIERSTRADECRAFT
A look at howcouriers plytheir trade inthe world ofterrorism
AND COUNTER-TERRORISM
In Eye Spy 49 we examined part of the role played out byintelligence operatives described as ‘couriers’. From staticcouriers serving in a corner shop and distributing orreceiving messages, to experienced pilots delivering armsdeep behind enemy lines, the role of an ‘intelligence courier’ ismultifaceted and diverse.
rom gun-running inIreland to personsdelivering passports usedby the hijackers of Flight93 on 9/11, couriers arean integral part of aterrorist cell, albeit
The same can be said about those who ply their trade on behalf of terrorists....
Fsometimes working on the periphery. Theyoften try and mimic their counterparts in theworld of espionage, though these operativesare rarely missed when things go wrong - areeliminated immediately if suspected of asecurity breach - and easily replaced. Terroristcouriers are treated with no less disdain by thesecurity services than full-blown members of acell - they are all equally as dangerous.Couriers act and perform their ‘duty’ out of
loyalty to a friend, family member, gang, gangleader, political party, cult or religion - some-times they are blackmailed. Others run errandsfor the money or the thrill of it: are ‘employed’and treat their work as a job. From shiftinglarge loads of weapons or drugs to raisefinance, to hand-delivering a message a fewyards across a busy street, these operativesperform a multitude of tasks.
This type of courier faces enormous dangers -not just from government counter-terrorismforces, but often from the very people who‘employ’ them. And it’s not unheard of to finderroneous messages about the courier beingdelivered to members of a suspected terror cell- by the intelligence services. This induces
suspicion, doubt, and causes conflict andrethinking of pre-set plans - mistakes occurand terrorists start to take chances. Theintelligence world treat couriers as ‘links in achain’ - break a link and the chain will snap. Atleast that’s part of the theory. The British areparticularly good at this sort of deception. Ifnothing else, it can disrupt a terror cell andcause it to self-implode.
Professional couriers are rare - but far morelikely to be respected by their colleagues. Someeven enjoy notoriety - more so when they are inthe employ of a significant and wanted criminalor terrorist. Take for example Maria NydiaRomero de Tobon, an attractive 37-year-old
Carlos the Jackal
105EYE SPY INTELLIGENCE MAGAZINE
All Our YesterdaysA batch of intelligence files released by MI5
via Britain’s National Archives, shows just howcomplex, bizarre and dangerous the world of
intelligence can really be...
Assassins, Coffee and Poison PowdersM
onths before the Alliesfinally defeated Germany, asecret operation wasdiscussed in Berlin to causemassive disruption inEurope in the event ofHitler’s demise. Like
Britain’s Special Operations Executive (SOE)and America’s Office of Strategic Services(OSS), Germany too had created an under-ground unit that would use all manner ofdevious devices and subterfuge to carry outoperations while the country reorganised itself.
The scale of the subversion would have beenrelatively small, but the implications for somepeople could have been significant.
In March 1945, two months before the warended in Europe, MI5 interviewed a number ofcaptured German agents in France, including awoman. They had been flown to France fromStuttgart in a captured American FlyingFortress. After the unit parachuted into Ayonnear St Quentin, the group were quickly seizedand taken to an MI5 station for interrogation.British Intelligence learned the Nazi operation
was multi-faceted and involved assassinatingspecific targets using various methodsincluding poison. It also had a rather sophisti-cated sub-plot line. Many spies and agentshad been equipped with suicide drugs -usually ampoules of hydrocyanic acid. Thedisruption agents spoke of a special aspirinmade by the Bayer company. An MI5 debrief-ing document revealed death would take placeten minutes or so after swallowing. Askedhow the agent intended to get the target totake the drug, this would be done by “persua-sion” and after offering a special
© TALISMAN INTELLIGENCE LIBRARY FOR EYE SPY
107EYE SPY INTELLIGENCE MAGAZINE
NSA FIELD STATIONTEUFELSBERGThe Devil’s Mountain - campaign to keepand restore iconic Cold War monument
© P
IOTR
TYS
ARCZ
YK
Once recognised as oneof the most importantNational SecurityAgency outposts in theCold War era, FieldStation BerlinTeufelsberg (translatesto ‘Devil’s Mountain’),
Germany, is in danger of disappearingaltogether. The defunct base has long beenearmarked for redevelopment, but the GermanGovernment’s decision to dismantle it hasbeen met with furious opposition. Those whoserved at the facility are naturally against themove and efforts are underway on both sidesof the Atlantic to turn the site into a monumentthat commemorates the friendship andsteadfast support of the Western Allies who
made German reunification possible. Histori-ans and intel watchers alike believe it wouldbe appropriate to save the site simply for itssignificance.
The move to flatten what remains of the fieldstation, has been likened to the fate whichbefell another most memorable and veryimportant building (though much tinier insize). In December 2000, developers removedthe world famous Berlin watchtower known asCheckpoint Charlie. For years this simplestructure was recognised as a symbol offreedom and democracy. It truly was one ofthe original icons of the Cold War that dividedmore than the city of Berlin - it was a crossingpoint - a barrier between East and West. It wassurreptitiously removed so as to attract a
BERLINCOLD WAR G
SECRET HISTORY when in berlin visit....
108 EYE SPY INTELLIGENCE MAGAZINE
The NSA Teufelsberg Berlin Field Stationpictured around 1968. Part of the facilitywas also staffed by British intelligence
officers from GCHQ and the RAF
© M
ICHA
EL G
RUBE
- w
ww.
gesc
hich
tssp
uren
.de
minimum amount of attention. The city’sresidents tried to save the tower, but failed,because authorities deemed it was not ahistoric landmark. It was dismantled to makeway for offices and shops, but nothing of notehas ever been built at this site, and the originalproposals for development have been shelved.Historians and most Germans now recognisethat Berlin’s decision was wrong, andcampaigners in Germany and North Americaare determined that this does not happen toTeufelsberg.
NSA Field Station Berlin was an ELINT andSIGINT (Electronic and Signals intelligence)complex positioned high on an artificial hill
The former field station is now in a poor state of repair - seemingly abandonedby the City Council of Berlin who seem oblivious to its international significance.Teufelsberg played a significant role in ending the Cold War and ultimately inthe reunification of the two German nations...
© P
ARKI
N
that rises about 250ft above the Brandenburgplain. The site, contained within Berlin’sGrunewald Forest has a curious history. It wasbuilt by the Allies after the Second World Warfrom the rubble of Berlin as the city wasreborn. One estimate for the amount of debrisused to construct the hill is about 12 millioncubic metres, or put in more simplistic terms -from an astonishing 400,000 destroyed ordamaged buildings. It is higher than the tallestnatural hill (Kreuzberg) in the greater Berlinarea.
Teufelsberg’s artificial hill and origin does notin itself make it unique, as there are manysimilar man-made rubble mounds in Germany
(Schuttberg for example). You can also findsuch hills in and around other war-torn citiesof Europe. Teufelsberg’s real significance lieswith what’s actually sat atop and buriedbeneath it: below, the shell of a Nazi military-technical college designed by Adolf Hitler’schief Third Reich minister and architect AlbertSpeer. Construction started on theWehrtechnische Fakultat in 1937, but becauseof the war and lack of funding it was nevercompleted. It was simply used to storemunitions. After the war, the Allies tried usingexplosives to demolish the school, but it wasso sturdy that covering it with debris turnedout to be the easier option. And above, a
One estimate for theamount of debris usedto construct the hill isabout 12 million cubicmetres, or put in moresimplistic terms - from
an astonishing400,000 destroyed or
damaged buildings
GERMANY109EYE SPY INTELLIGENCE MAGAZINE
ALL PRICES INCLUDE POSTAGE (AIR) AND PACKING
BOOK RELEASES
Available from Eye Spy Ref: ES/1418UK £32.99 USA $32.95 ROW £34.99
L ong after the war’s end, officialWorld War II records listed theGerman submarine U-110 as
THE SECRET CAPTURE:U-110 and the Enigma StoryStephen W. RoskillNaval Institute Press
sunk on 9 May 1941 by a Britishconvoy: a deliberate deception that hidthe actual capture of a submarine thatcontained a working Enigma machine,codebooks, charts, and ciphers. As theofficial British historian of the naval war,Stephen Roskill did not reveal the secretin his authorised account.
When this book was first published in1959, the author set the record straightabout the sinking but continued to holdback details of Ultra. Now, a newintroduction puts the capture of U-110into context and makes clear its vitalimportance to the code-breakingprogramme of the Allies in World War II.
Roskill’s work is based on bothdocumentary and eyewitness evidence
and provides the most authoritativehistory of how the Enigma machinebecame a key instrument of the wareffort. Hardback 184pp
HMS Bulldogplayed a part in the
capture of U-110
ilitary intelligence about theenemy is a fundamental part ofany war or battle, knowledge
THE INTELLIGENCERS:British Military Intelligence from theMiddle Ages to 1929Brigadier Brian ParrittPen & Sword
Mof the enemy’s strength, dispositionsand intentions are essential forsuccess. This book claims that for 250years the British Army resolutely failedto prepare for war by refusing toestablish a nucleus of soldiers in peaceand trained to obtain intelligence in war.
Although there were ‘Scoutmasters’ andsecret spy organisations such as thatoperated by Sir Francis Walsingham inthe 15th Century, in no major conflictfrom the Civil War of 1642, includingthe Peninsula, the Crimea, Burma,Egypt and South Africa and in themultitude of small wars that gainedBritain an empire, was there any staffbranch or unit specifically pre-established to gain intelligence orfrustrate the enemy from obtainingintelligence.
The story of British military endeavourover 250 years is a remarkable one ofindividual bravery, achievement andsuccess. We read of the Scoutmasterwhose role was to gather intelligenceon the King’s enemies and ofWalsingham’s secret organisation at thetime of Elizabeth I.
During the long years of war againstFrance culminating in the NapoleonicWars, spymasters developed on an adhoc basis. In the nineteenth century,despite the power and reach of Empire,no central intelligence organisationexisted. Enterprising young officersworked wonders but failures such asthose in the Boer War cost Britaindearly. It took the reverses in the GreatWar to create an Intelligence Corps. Buteven that was disbanded post-war.Hardback 224pp
Available from Eye Spy Ref: ES/1419UK £22.99 USA $39.99 ROW £24.99
Queen Elizabeth Iand Spymaster -
Sir FrancisWalsingham
ach chapter of the How the WorldEnds deconstructs the dangerswe face. Rosenbaum begins by
How The End Begins:The Road to a Nuclear World War IIIRon RosenbaumSimon & Schuster Ltd
Eshowing all the ways the post-Cold Warorder that tried to impose a set of rulesof averting a nuclear mistake has fallenapart. He describes the journey of oneBruce Blair, once a missile launcher,whose experience inside the nuclearestablishment left him alarmed about itsvulnerabilities. He also looks at nuclearwar from the Russian side, using thearchitect of that nation’s early warningsystem as a focus. He describes all theways international incidents we haveseen - Georgia, the Israeli raid on Syria,the Iranian moves - are evidence thatsome governments have shown awillingness to move closer to the brinkof a conflict involving nuclear weapons.
The rest of the book looks at thebroader nuclear issues facing the worldin the 21st century: What is deterrence?Who can claim to have it? How manynuclear weapons can we live with? Iszero really possible? In other words:Can we undream the nightmare?Hardback 320pp
Available from Eye Spy Ref: ES/1420UK £24.99 USA $39.99 ROW £25.99
111EYE SPY INTELLIGENCE MAGAZINE
he untold story of one of themost lethal and successfulsoldiers of the Second WorldT
War - a highly decorated hero as wellas a self-confessed rogue. In the tankwar in the desert of North Africa, MajorGeoff, as he came to be known, quicklyshowed himself a soldier of superbathleticism, unwavering will to win andalmost superhuman instincts when itcame to survival and outwitting theenemy. Almost incredibly he won theMilitary Cross on his very first day inaction.
This is an honest account of winningthe war not by fair play but by beingmore ruthless than your enemy. Butmaybe what is even more extraordinarythan his soldiering - its predatoryruthlessness and amorality - is the
Available from Eye Spy Ref: ES/1423UK £22.99 USA $38.00 ROW £25.99e was one of America’s most
exciting and secretive generals -the man Franklin Roosevelt
WILD BILL DONOVAN: TheSpymaster Who Created the OSSand Modern American EspionageDouglas WallerFree Press
H
Available from Eye Spy Ref: ES/1421UK £35.00 USA $37.50 ROW £38.00
made his top spy in World War II. Amythical figure whose legacy is stillintensely debated, ‘Wild Bill’ Donovanwas director of the Office of StrategicServices (the country’s first nationalintelligence agency) and the father oftoday’s CIA.
DonovanintroducedAmerica to thedark arts ofcovert warfareon a scale ithad never seenbefore. Now,veteranjournalistDouglas Waller
has mined government and privatearchives throughout the United Statesand England, drawn on thousands ofpages of recently declassifieddocuments, and interviewed scores ofDonovan’s relatives, friends, andassociates to produce a rivetingbiography of one of the most powerfulmen in modern espionage. Hardback480pp
William Donovan
he struggle between Britishintelligence agencies and Irishrevolutionaries has lasted for
BRITISH SPIES AND IRISH REBELS:British Intelligence and Ireland,1916-1945Paul McMahonBoydell Press
Tcenturies - and still goes on. But it wasat its most intense during the first halfof the twentieth century. Irelandexperienced a bloody rebellion, bitterpartition and a stuttering march towardsindependence. Britain grappled with
imperial declineand world war,while worryingabout beingstabbed in theback by its Irishneighbour.
Using recentlyopenedarchives, thisbook revealsfor the first time how intelligence andintelligence agencies shaped Anglo-Irish relations during this formativeperiod. The book casts light oncharacters long kept in the shadows -IRA gunrunners, Bolshevik agitators,Nazi saboteurs, British double agents. Itshows what happened when Irishrevolutionaries stopped fighting, formedgovernments and started sharinginformation with London - while doingeverything possible to hide this from theIrish public. It also fills in a missingchapter in the history of the Britishintelligence community, tracing itsevolution from amateurish beginnings,through a painful adolescence, to thesophisticated apparatus that is largelystill with us today. Large Paperback540pp
now is the codename assignedto Arthur Owens, one of themost remarkable British spies of
ROGUE MALE: Death and Seductionin World War II With Mister MajorGeoffRoger Field, Geoffrey Gordon-CreedCoronet
SNOW: The Double Life of a WorldWar II SpyNigel West and Madoc RobertsBiteback
Sthe Second World War. This typicalWelsh underfed type became the first ofthe great double-cross agents whowere to play a major part in Britain’svictory over the Germans. When thestakes could not have been higher, MI5sought to build a double-cross systembased on the shifting loyalties of a
duplicitous, philandering and vain anti-hero who was boastful and brave,reckless and calculating, ruthless andmercenary... but patriotic. Or was he?Based on recently declassified files andmeticulous research, Snow reveals forthe first time the truth about anextraordinary man. Hardback 272pp
Available from Eye Spy Ref: ES/1422UK £22.50 USA $38.00 ROW £25.00
frank account of sexual adventuring thatwent with it. So, this is how the dogs ofwar behave when they are let off theleash? Hardback 384pp
n early 1970, the CommandingOfficer of 22 SAS flew into thestrategically critical Sultanate of
STORM FRONTRowland WhiteBantam Press
IOman on a covert intelligence mission.A Communist rebellion in the Souththreatened not only the stability of theArabian Peninsula but more importantlythe vital oil routes through the PersianGulf. Within six months, the Regimentarrived in theatre to lead a fierce, secretwar against the rebels.
At dawn on 19 July 1972, a force ofnearly 300 heavily armed, well-trainedguerrillas attacked the little fishing portof Mirbat without warning. Betweenthem and glory stood a team of justnine SAS men and a British air fighterforce. The scene was set for an epicencounter; a modern day Rorke’s Drift.Their heroism would become SASlegend.
The book draws from extensiveinterviews with participants from theSAS, the RAF and the Sultan’s ArmedForces, most of whom have neverspoken about their involvement before.Hardback 364pp
Available from Eye Spy Ref: ES/1424UK £22.99 USA $45.00 ROW £24.99
Available from Eye Spy Ref: ES/1425UK £22.99 USA $38.99 ROW £25.99
Michael Collins
estselling author Jennet Conantbrings us a stunning account ofJulia and Paul Child’s experi-B
A COVERT AFFAIR: Julia Child andPaul Child in the OSSJennet ConantSimon & Schuster
ences as members of the Office ofStrategic Services (OSS) in the Far Eastduring World War II and the tumultuousyears when they were caught up in theMcCarthy Red spy hunt in the 1950sand behaved with bravery and honour. Itis the fascinating portrait of a group ofidealistic men and women who wererecruited by the citizen spy service,slapped into uniform, and dispatched towage political warfare in remoteoutposts in Ceylon, India, and China.
112 EYE SPY INTELLIGENCE MAGAZINE
obert Baer was known inside theCIA as perhaps the bestoperative working the MiddleR
THE COMPANY WE KEEP: Husbandand Wife True-Life Spy StoryRobert Baer, Dayna BaerCrown Publishing Group
East. Over several decades he servedeverywhere from Iraq to New Delhi andracked up such an impressive list ofaccomplishments that he waseventually awarded the CareerIntelligence Medal.
Dayna Williamson thought of herself asjust an ordinary California girl -admittedly one born into a comfortablelifestyle. But she was always looking toget closer to the edge. When she joinedthe CIA, she was initially tasked withAgency background checks, but theattractive Berkeley graduate quicklydistinguished herself as someone whocould thrive in the field, and she waseventually assigned to ‘ProtectiveOperations’ training where she learnedto handle weapons and explosives andconduct high-speed escape andevasion.
Available from Eye Spy Ref: ES/1427UK £19.99 USA $40.00 ROW £25.00
A trip deep down the intelligence rabbithole - one that shows how the ‘game’actually works, including the compro-mises it asks of those who play by itsrules - and a portrait of two peopletrying to regain a normal life, TheCompany We Keep is a masterlydepiction of the real world of shadows.Hardback 320 pages.£16.99
peration Fortitude was theingenious web of deceptionspun by the Allies to mislead the
OPERATION FORTITUDE: The TrueStory of the Key Spy Operation ofWWII That Saved D-DayJoshua LevineCollins
ONazis as to how and where the D-Daylandings were to be mounted.Described by double agent Kim Philbyas “one of the most creative intelligenceoperations of all time.”
The story of how this web was wovenis one of intrigue, personal drama,ground-breaking techniques, internal
resistance, andgood fortune. It isa tale of doubleagents, black radiobroadcasts,phantom armies,‘Ultra’ decrypts,and dummyparachute drops.These diversetactics were intended to come togetherto create a single narrative so compel-ling that it would convince Adolf Hitler ofits authenticity.
The success of D-Day - the beginning ofthe end of WWII - was made possible bythe efforts of men and women who werenot present on the Normandy beaches.
Using first hand sources from a widerange of archives, governmentdocuments, letters and memosOperation Fortitude builds a picture ofwhat wartime Britain was like, as well asthe immense pressure these men andwomen were working under and insureD-Day succeeded. Hardback 320pp
Available from Eye Spy Ref: ES/1428UK £19.99 USA $38.00 ROW £25.00
© M
DC A
RCHI
VES
Available from Eye Spy Ref: ES/1426UK £32.99 USA $34.00 ROW £35.00
Julia Childpictured at abook signing
in 1989
The eager, inexperienced 6 foot 2 inchJulia springs to life in these pages, agangly golf-playing California girl whohad never been farther abroad thanTijuana. Single and thirty years oldwhen she joined the staff of ColonelWilliam Donovan, Julia volunteered tobe part of the OSS’s ambitious missionto develop a secret intelligence networkacross Southeast Asia. Her first posttook her to the mountaintop idyll ofKandy, the headquarters of AdmiralLord Louis Mountbatten, the supremecommander of combined operations.
A Covert Affair chronicles theirfriendship with a brilliant and eccentricarray of OSS agents, including JaneFoster, a wealthy, free-spirited artist,and Elizabeth MacDonald, an adventur-ous young reporter. Relying on recentlyunclassified OSS and FBI documents,as well as previously unpublishedletters and diaries, Conant vividlydepicts a dangerous time in Americanhistory, when those who served theircountry suddenly found themselvescalled to account for their unpopularopinions and personal relationships.Hardback 416pp
ALSO OF NOTE: NOVELS LACED WITH ESPIONAGE, INTELLIGENCE AND INTRIGUE
Carte Blanche (James Bond)Jeffery Deaver, Hodder & Stoughton
Fresh from Afghanistan, James Bondhas been recruited to a new agency.Conceived in the post-9/11 world, itoperates independent of MI5, MI6and the MOD, its very existencedeniable. Its aim: to protect theRealm, by any means necessary. Acall alerts Bond from dinner with abeautiful woman. GCHQ hasdecrypted an electronic whisper...
Double Trouble on Corned Beef RowJames W. Battee, Createspace
Three baby boys are born during asnowstorm. Two are identical twins.The twins are separated in a mix upat the hospital. Both wind up with thefirst name of Jacob and the sameinitial for their last name. One growsup with his natural parents andbecomes the owner of a deli. Theother ends up in the military andbecomes a mercenary...
Mare NostrumE. S. Hoover, Createspace
Mare Nostrum - genuine, probing,thought-provoking historical fictionthat explores the maniacal drive ofgreed and the intoxicant of powerthat motivates men to employextreme measures towards their ownideological end. Mixed with anundercurrent of current events it willleave you wondering if today’s fictionwill be tomorrow’s headlines.
The Spy BookJohn Westin, McNeil & Richards
Humorous novel about spying, theSoviet Union, and a professor andco-ed at the University of Virginia. AnAmerican professor and the beguilinggraduate student he’s having anaffair with didn’t destroy the SovietUnion. They simply put the last nail inthe coffin...
Follow Me HomePatrick Bishop, Hodder & Stoughton
Two young soldiers are on a missionto capture Osama bin-Laden. Themen soon find they are the huntedand must make it back to safetythrough hostile lands. Perilous atevery turn, the troops even have tolook after a young frightened womanas they journey home...
Agent Garbo
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
○
113EYE SPY INTELLIGENCE MAGAZINE
ECHOES OF OKLAWhen intelligence sees nothin
NORWAY TERRORIST ATTACK
At around 3.25pm localtime, on 22 July 2011, anunoccupied SUV explodedat the base of offices usedby Norway’s PrimeMinister Jens Stoltenbergin the government and
media district of Oslo. The resultant blastripped through windows and offices in an areacovering hundreds of yards. Within minutespress coverage started. Obviously there wasmuch suspicion placed on al-Qaida, especiallysince the country has been a prime target forthe terrorist group’s ‘Northern Project’.
The focus of media reporting and the rush tosecure terrorist experts to explain what washappening led to a myriad of inaccuratereports; but for at least two hours the blamewas firmly placed in the court of al-Qaida. Andthere are many reasons for this. Firstly Aynanal-Zawahiri, AQ’s new number ‘one’ since thedeath of Osama bin-Laden, has threatened amajor response. The use of a car bomb hadsimilarities to recent incidents in New York(Times Square) and London (TigerTiger club).The explosion was close to governmentoffices and the ‘R-4’ building which housesthe oil and energy ministry: also close-by, one
of the country’s main newspapers. The factthat some media in Norway had publishedcartoons depicting the Prophet Mohammedwas thought relevant here. And the oil ministrywas seen as a potential target because ofNorway’s strong support of NATO operationsagainst Colonel Gaddafi’s oil-rich Libya. Therewere lots of reasons to suspect al-Qaida.
Norwegian Intelligence has secured muchevidence of several European al-Qaida cellsoperating in Germany, France, Holland,Belgium and Britain. Indeed, some of thosepreviously arrested in connection with attacksand plots are known to have links to a terrorcell planted in Norway itself. And just daysbefore events in Oslo, Norway had indictedMullah Krekar, an Iraqi-born cleric and founderof the notorious al-Qaida franchise Ansar al-Islam. He had openly made threats if Norwaywent ahead and deported him back to Iraqwhere he faces serious charges of terroristinvolvement. Indeed, Eye Spy has learnedfrom its Norwegian sources, that Krekar hadbeen detained in an underground prison cellnot too far away from the bomb blast.
Anders Behring Breivik, a terrorist responsible for the murder of over77 civilians in Norway, surprisingly avoided the radar of Europe’ssecurity services; this despite him being a well-travelled operatorwith threads to a number of ultra right-wing extremist groups.
It’s also believed that Breivik’s name was placed on an intelligencewatch list back in March, after trying to secure chemicals fromPoland...
Smoke billows from the government and media quarter of Oslo, a few minutesafter Anders Behring Breivik detonated a huge car bomb© N. ANDERSON
EYE SPY INTELLIGENCE MAGAZINE116
AHOMAng
“Not even the STASIcould have prevented
this attack...”
© IN
GAR
SORE
N/PS
T
PST Director-GeneralJanne Kristiansen
At around 5.00pm, Norwegian media sourcesstarted to receive reports of another majorincident on the nearby island of Utoeya inBuskerud, about one hour’s drive from Oslo.The tiny inland isle was hosting a YouthOrganisation (AUF) gathering of around 700young people, many with politicalaspirations. It was being run byStoltenberg’s ruling Labour Party. And
of course, it would later transpire that AndersBreivik, 32, who had detonated the bomb inOslo, had made his way to Utoeya, donned apolice uniform, and then started to kill youngmen and women in cold blood. For reasonsthat will eventually become apparent, it tookthe police over 60 minutes to react to thesituation and reach the island. By then Breivikhad murdered nearly 70 people, many shotwith the particularly nasty hollow point bulletmore popularly known as the ‘dum dum’bullet.
By 6.00pm the incidents were being linked.And at the same time a number of Islamicextremist groups were announcing they wereresponsible. However, when it became clearthe shooter had been arrested, and describedas a “six foot blond Norwegian-looking man,”suddenly the word was he must by anIslamic convert and an agentrecruited by AQ.
Chillingly cold, calculated andmost dangerous - the lone wolf
terrorist all security services fear
An injured victimreceives attentionfrom city residents
and police
PLANNING AND A SHOCKING AGENDA
nders Breivik is the type of terroristthe world’s security services fearmost. Furthermore, his home base iswithin one of the most open societiesA
in the world. And these factors worked againstNorway, which today has lost much of itsinnocence, despite the prime minister sayingfreedoms will not be challenged by terrorism.In early 2009, Breivik, who was writing ‘TheManifesto’ (see sidebar), sought to introducea physical and pro-active element to his secretwar with the government. It was no longergood enough to object to Oslo’s policies on
EYE SPY INTELLIGENCE MAGAZINE 117
EYE SPY INTELLIGENCE MAGAZINE
ORDER ON-LINE www.eyespymag.com
Each highly collectable edition represents a worldwide overviewof global intel events and covers every aspect of the subject’s
astonishing SPY TRADECRAFT...
your bridge to the covert world ofESPIONAGE AND INTELLIGENCE
EYE SPY INTELLIGENCE MAGAZINE118
ORDER ON-LINE www.eyespymag.comORDER BY PHONE: UNITED KINGDOM, EUROPE/WORLDWIDE TELEPHONE:
+ (0)1756 770199 (UK) NORTH AMERICAN READERS TOLL FREE: 877 309 9243
EYE SPY INTELLIGENCE MAGAZINE 121