eye spy feature

122
ENTER A WORLD OF MIRRORS

Upload: eye-spy-magazine

Post on 31-Jan-2016

218 views

Category:

Documents


1 download

DESCRIPTION

THE FASCINATING WORLD OF INTELLIGENCE AS SEEN BY EYE SPY Free 122 page feature on intelligence, espionage and all associated elements of this fascinating subject, plus sample pages from Eye Spy

TRANSCRIPT

ENTER A WORLD OF MIRRORS

EYE SPY INTELLIGENCE MAGAZINE2

3EYE SPY INTELLIGENCE MAGAZINE

3EYE SPY INTELLIGENCE MAGAZINE

EYE SPY INTELLIGENCE MAGAZINE4

○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○

F E A T U R E S

The World of Intelligence and Espionage as seen by Eye Spy Intelligence Magazine

○○○○○○○○○○Operation Ghost Stories - SVR Spy Ring30○○○○○○○○○○US Navy SEALs Kill Osama bin-Laden32○○○○○○○○○○CIA - Pretty Woman Trap35○○○○○○○○○○WWII Spy Pigeon Controversy39○○○○○○○○○○Cyber Warfare Going Underground42○○○○○○○○○○World of Intel and Counter Terrorism46○○○○○○○○○○The Language of Spies48○○○○○○○○○○Spy Wars: CIA Spycatcher Interview54○○○○○○○○○○Inside Tito’s Secret Tunnels57

○○○○○○○○○○Intelligence Review and Digest60

○○○○○○○○○○MI6 Spy Games in Moscow71

○○○○○○○○○○Shoot to Kill: 2012 Olympic Games76

4

○○○○○○○○○○Intelligence Collection58○○○○○○○○○○9/1159

○○○○○○○○○○MI6 Operation Ellamy78○○○○○○○○○○Surveillance and Photography80○○○○○○○○○○Origins of American Intelligence82○○○○○○○○○○Eye Spy Product Review84○○○○○○○○○○FBI and Forbidden Exports87○○○○○○○○○○Silent Service: Maritime Spies90○○○○○○○○○○The Real Codebreakers92○○○○○○○○○○MI5 Operation Seagram94○○○○○○○○○○MI6 Headquarters 191996○○○○○○○○○○Spies Holy Grail - Invisibility98

○○○○○○○○○○Inside the CIA’s Dream Factory62

○○○○○○○○○○Couriers and Counter-Terrorism103

○○○○○○○○○○Perfect Platform: Attack in Benghazi64

○○○○○○○○○○Assassins, Coffee & Poison Powder105

○○○○○○○○○○Unseen Images of 9/1167

○○○○○○○○○○NSA Field Station Teufelsburg106○○○○○○○○○○UnderCover Books109○○○○○○○○○○Echoes of Oklahoma114

5EYE SPY INTELLIGENCE MAGAZINE

THE WORLD OF

INTELLIGENCE AND

ESPIONAGE AS SEEN BY

EYE SPY INTELLIGENCE

MAGAZINE

E

ye Spy collects, dissects, publishes and provides commentary on all aspects of intelligence,including espionage, tradecraft, technology, operations etc. All the world’s major happeningsare reported upon. That’s not to say we don’t take a step back in time to look at famous case

Reporting and Commentary

E

YE SPY INTELLIGENCE MAGAZINE is the world’s only independent publicationdedicated to espionage and intelligence. First published in May 2001, the title isavailable in print and electronic format and has a worldwide readership of over100,000 people. Often described as the bridge between officialdom and the public,Eye Spy is extremely popular with those who work in and with intelligence. Indeed,it is subscribed to by hundreds of official intelligence agencies, government

training academies, military forces, leading technology firms, police services, defence contractors,cyber organisations, security colleges and major international political ‘think tanks’ throughoutthe world. However, its non-political - visual editorial and easy-reading style ‘demystifies’ theintelligence subject, making it equally as popular with people from all walks of life.

It is a constant provider of a certain type and quality of information that is not found in any otherpublication. Readers are assured they will always find something of interest within its 84+ full colourpages; whether it’s the inside story of a lengthy government surveillance operation, an interviewwith a CIA polygraph examiner, MI6’s role behind the assassination of Rasputin, or the tradecraftused by those who ply their trade in the world’s second oldest profession, Eye Spy has becomesomewhat of a ‘must have’ publication for people interested in intelligence.

files, examine the real tradecraft, important and defining moments, the history of the services, fromtheir directors to buildings, crests and the figures synonymous with the ‘espionage wheel’.

E

6 EYE SPY INTELLIGENCE MAGAZINE

Mark Birdsall, Editor

Aldrich Ames

If it’s necessary to draw parallels with events from the past, special featuresand intelligence sidebars accompany articles.

There is a certain ‘timelessness’ about espionage events: from America’sAldrich Ames and Robert Hanssen, to the gentry and shadowy Cambridgespy ring in the UK which damaged British Intelligence. Counter-espionageagencies like Britain’s MI5 or America’s FBI still use such classic case files toteach today’s students the secrets of espionage, dirty tricks and more impor-tantly, the signs which can identify people betraying their country, or whoare on the precipice of joining an enemy or adversary. It’s one reason whyEye Spy insists on retaining and improving its links with men and womenwho have spent decades in the industry, from photographic interpreters totraining officers at some of the most secretive spy schools in the world. Ithelps us understand the often elaborate nature of a case file or event.

he public may learn of a breaking story via the television, radio, print press or Internet, butEye Spy readers are content in the knowledge that they can view certain information that issimply not reported upon, or not fully understood by the media. Having an awareness of how

FBI headquarters, Washington DC

Understanding How Intelligence Works

Tthe intelligence world works is a powerful tool for any individual. It’s not all ‘silver screen’, and‘gadgetry’, though many real-life happenings could be drawn from the imagination of some of theworld’s best scriptwriters.

7EYE SPY INTELLIGENCE MAGAZINE

Georgi Markov

n recent times, the public has been intimatewith major news stories that are typical of anindustry that rarely hangs its dirty washing out

Strange Days

Iin public. Take for example the bizarre death offormer KGB officer Alexsander Litvinenko inLondon. Poisoned by Polonium-210 - a radio-active isotope used to help detonate nuclearbombs, Litvinenko’s death was part of a widerconspiracy involving front companies, clandestinedeath lists, political and military manoeuvring etc.His assassination is most certainly connected tointelligence factions, industrial giants, the Russianmafia, and the settling of old Kremlin scores. Butall are ultimately connected to the intelligenceworld, proof if ever needed of the enormity,diversity and darker side of the subject.

As for the manner of Litvinenko’s death, the KGBare past masters at this kind of skulduggery. Whocan forget the demise of Georgi Markov - theBulgarian dissident killed by a poison dart filledwith ricin and fired from an umbrella in Londonin 1978? And in 2004, someone in the Russiansecurity services posted a letter to a known

Thames House, headquarters of MI5

Fidel Castro in theformer East Germany- the CIA created over100 schemes to killthe Cuban leader

8 EYE SPY INTELLIGENCE MAGAZINE

Chechen terrorist. Inside the envelope flap the glue was painted with a substance lethal on skincontact. The recipient duly opened the package and died shortly after. But it’s not just the Russianswho use such deadly tradecraft. The CIA schemed for years to create all manner of plots to assassi-nate Cuban leader Fidel Castro - including lacing his shoes with deadly Thallium. And a few yearsago, Richard Tomlinson, a renegade MI6 officer revealed he was aware of an MI6 operation to killYugoslavian leader Slobodan Milosevic. In this case the alleged plot involved blinding Milosevic’sdriver causing the vehicle to spin out of control. As one former MI6 agent and Eye Spy consultantconstantly reminds us - “intelligence can be a dirty business.”

What may seem like a simple murder, a case of spying, the loss of a secret component or the demiseof a regime or government minister, is often just the leading edge of a much wider event.

The media may learn of an anti-terrorist operation - Eye Spy reveals

how it was planned, achieved orhopefully dismantled

Behind Closed Doors

It’s never easy trying to peak behind the doorsof the world’s leading intelligence services, butthe magazine’s editorial staff, consultants,

contacts, analysts and sources do have access toplaces that are often beyond the reach of journal-ists. Indeed, a quick glance at our consultancyboard and authors who write for the magazine,gives you some indication of the calibre and

9EYE SPY INTELLIGENCE MAGAZINE

profession of the people who regularly provide material and qualifiedguidance. There are others whom we can’t name. Eye Spy consultants alsofeature on television, radio and in the world’s press. They are often calledupon by documentary and film makers for comment and advice on a scene ornews clip. Having first-hand knowledge of the role of an air marshal or ananti-terrorist officer in New York, for example, helps our writers create a fact-based feature, or understand the mechanism of an intelligence operation.Some of our consultants still perform government analysis and have decadesof experience dealing with intelligence agencies, committees and officialbodies. Other consultants and editors have participated directly in specialoperations, from gathering intelligence in Afghanistan, to training operativesin espionage and surveillance tradecraft.

Elements of the World of Intelligence

Some people believe the word ‘intelligence’ is simply a generic term forinformation. This is not strictly true for it has evolved into somethingthat is considered far more important. The subject of intelligence is

multifaceted and enormous, it can be complex or simple. And because of thisEye Spy is different, in that each issue is singularly unique. Unlike many topicsand subjects, intelligence and the stories it generates are never the same.Espionage is but one element of intelligence, though many esteemedcommentators consider it an integral part of the subject and they are correct.

10 EYE SPY INTELLIGENCE MAGAZINE

In truth, there are hundreds of elements, and allare deemed highly important by the hundreds ofthousands of men and women who work in thebusiness. However, espionage is one subject thatis particularly popular with readers, a fact notoverlooked by our editorial board and themagazine regularly features the latest spy stories.

nformation collection comes from a multitudeof sources: HUMINT for example. HumanIntelligence is considered vital in that it is

Spy - an Emotive Word

IHeadquarters of Britain’s SIS (MI6)

often gleaned from first-hand sources, or as aresult of direct espionage. The word ‘spy’ is anemotive term that the media often uses to callanyone working in the intelligence industry: an analyst, case officer, photographic interpreter,secretary and even a telephonist etc. In reality, the word should only be used for those employed atthe ‘leading edge’ of information collection, and even then, it depends on your point of view. An MI6officer collecting intelligence in Russia is most certainly not referred to as a spy by his superiors atBritain’s Foreign Office, but his actions and role are not welcomed in Moscow. To Russia’s counter-espionage or counter-intelligence officers, he is a threat. But it’s easy to understand how everyonedirectly associated with an intelligence agency ends up being called a spy. To be called a ‘spy’, onemust really be convicted in a court of law.

Intelligence Collection

Foreign-based intelligence officers oftenwork within the confines of a diplomaticmission - are attached to a foreign embassy

or legitimate company and have carefullymanaged lifestyles and prepared backgroundsknown as Legends. Diplomatic immunity assured,such officers rarely conduct espionage directly.The role of a case or field officer is coveredextensively in Eye Spy (tradecraft). So too is therecruitment of people, whether they are on theofficial payroll or not. Case officers will have atour of duty and rarely outstay their welcome.Selection is important as in some cases they willneed to speak and understand the foreign tongue,be familiar with local customs and traditions etc.Case officers will use other people to gather

EYE SPY INTELLIGENCE MAGAZINE 11

intelligence - these are known in the trade asagents. Within many of their respected embassies,organisations such as MI6, CIA, FSB and theMossad, for example, have operational FieldStations. Often manned by a handful of officers,these important offices cement relations betweenvarious ‘gogs’ in the espionage wheel and arecharged solely with gathering intelligence, liaisonand other duties. They are also opportunists.

British Embassy, Moscow.Note the radome at the top of the building

his takes us into a rather murky area of theintelligence world. Using agents, couriers,proxies, assets and informants, a case

The ‘Product’

Tofficer will use all his or her prowess to performa particular task. Eventually information issourced, secured, sent for processing, distributedaccordingly, disseminated, analysed, ‘boxed’ andultimately used or stored for reference. What’sproduced is known as the ‘product’. Dependingon the type of case officer, some operatives will

12 EYE SPY INTELLIGENCE MAGAZINE

simply monitor foreign press (in all its forms),attend trade fairs and military exhibitions, liaiseor contribute to missions. This intelligence isusually described as ‘open source’, in that it isfreely available. Others work in far more danger-ous areas that inevitably means tradecraft mustbe used. Sometimes case or field officers areattached to legitimate businesses or workelsewhere in an effort to obtain intelligence, butoperate without the protection of an embassy.These people are known as NOCs (non-officialcover) and often dubbed ‘persons of interest’ bycounter-intelligence officers and will be monitoredand surveilled. Performing espionage at this levelrequires a steely resolve and it’s not for thefaint-hearted. This type of tradecraft is regularlyfeatured in Eye Spy.

Intelligence gathering is often complicated,thrilling, manpower-intensive and very expensive.

The ‘product’ is the lifeblood of diplomatic andmilitary machines. If it’s wrong, the results canprove disastrous. An example of poor product isthe US and UK intelligence assessments on Iraq’s‘weapons of mass destruction’ (those working in

the intelligence services connected to this topic believe they were poorly treated and manipulated bytheir political masters). Politics, foreign and domestic affairs, industry, the armed forces and intelli-gence must collide at some point, and in the UK and USA, for example, special advisory or “oversightcommittees” exist to make sure the product is not used incorrectly - at least that’s the theory.

FBI counter-espionage photographs of SVR spies Richard Murphy (left) and agent controller ChristopherMetsos in Queens, New York City. In 2010 around a dozen Russian spies were identified and ordered out of

the United States after Moscow agreed to exchange them for four US intelligence contact men

EYE SPY INTELLIGENCE MAGAZINE 13

However, intelligence work is also driven byevents occurring worldwide. Within a year or soIran, for example, could have the capability toproduce a nuclear bomb. That has implicationsnot just for Middle East nations, but foreveryone. How so? Many intelligence agencies,including MI6, CIA and NSA, have been chargedwith trying to obtain valid intelligence on Tehran’snuclear programme. It’s a dreadfully difficult taskin that closed borders exist and Westerners arenot welcome. Even the world’s atomic bodieshave found the Iranian government loathe toprovide information.

With this in mind, MI6 and others are feverishlyworking to gather intelligence, trying todetermine the day when Iran announces to theworld it has a bomb. Ultimately many analysts fearit could be used against Israel, or that certain partsof the programme may be delivered to knownterrorists - and that affects the safety and securityof everyone.

Assessing the implications of such a situation canonly be achieved by obtaining accurateintelligence - this is called Intelligence Estimateor Appreciation. It is the appraisal of all availableintelligence relating to a specific requirement ora potential hostile action or development.Diplomatic measures to stop the project havebeen put in place, but a secondary plan involvinga tactical military strike has also been enabled.Analysts, (both political and intelligence)

AMERICA 9/11 ANDLONDON 7/7

The ‘Product’ was undoubtedly

there, it was simply misread

and not nearly enough of the

jigsaw was pieced together to

see the bigger picture

14 EYE SPY INTELLIGENCE MAGAZINE

Eye Spy’s tradecraft features reveal thesecrets of the recruiters, informants and

case officers

A caseofficer may

be monitoredeven beforethey have

started theirmissionhe Cold War saw two powerful sides pull

away from total world destruction at thevery last moment. The USSR and NATO

military strategistsand key advisorsmust also assess theglobal implicationsfor these twoscenarios. This typeof intelligenceoperation is bothtime consuming andmenacingly dark.

The wider publicseem oblivious tothe precariousnature of this single

issue. But there are hundreds, if not thousandsof events taking place at this moment in timewhich need to be monitored. All of these areassigned levels of sensitivity. If deemed important,they will be raised higher on the ‘intelligencechart’ and more resources assigned to the case.Others may fall off the graph, then radar, and oneday may come back to haunt those personsmaking crucial decisions - as was the case whenal-Qaida hijackers attacked the USA on 9/11 orLondon in 2005. The ‘product’ was undoubtedlythere, it was simply misread and not nearlyenough of the jigsaw was pieced together to seethe bigger picture. Since then, there has been ahuge recruitment drive by dozens of services;agencies have been overhauled, budgetsincreased and laws changed to accommodate avery fluid situation. It’s one area Eye Spyexamines constantly.

Technology

Tplayed a dangerous game of ‘cat and mouse’. For years - the Soviet Union and NATO opted to matcheach others nuclear warheads, warplanes, ships and manpower. Mutual assured destruction (MAD)was the doctrine often cited by analysts. Both sides had the ability to destroy each other, the onlyproblem was they would destroy themselves in trying. MAD is based on the theory of deterrence -weaponry essential to threaten yet to invoke a stalemate.

Mohammad Atta -9/11 terror leader

EYE SPY INTELLIGENCE MAGAZINE 15

Intelligence officers can’t just boardairliners and request information -

occasionally they must resort toother methods - including espionage

- 7 -

Lockheed U-2

16 EYE SPY INTELLIGENCE MAGAZINE

Because the USSR was shielded behind a lengthy closed border dubbed the ‘Iron Curtain’, electronicintelligence involving reconnaissance aeroplanes, ships, submarines, and later satellites, came to thefore. A whole new industry grew from the Cold War that still exists today, one that is both helping andhindering today’s intelligence gatherers. Aircraft such as the U-2 spy plane and SR-71 were engagedin aerial games over the skies of Russia, and on a number of occasions shoot downs did occur leadingto global tension.

The Cold War also prompted the development ofa new range of tools for spies to gather intelli-gence. But anyone caught plying their trade inforeign lands were jailed and occasionallyexecuted. Sometimes they were lucky - andexchanged at pre-arranged locations for otherspies. The city of Berlin, divided both militarilyand politically, was often the point of contact andretains its rightful place in spylore.

Andrew Parker head ofBritain’s Security

Service - better knownas MI5

- 8 -

Today’s spy satellites, unlike their predecessors,have longer operational lifespans and are packedwith even more high-end technology. Easilycapable of reading the print off a newspaper, somesystems track vehicles hundreds of miles,monitor terrorist training camps and follow roguevessels across oceans.

It’s no longer essential, nor necessary to send spyplanes like the U-2 into near space across enemyterritory to gather intelligence on a weaponsconvoy or take photos of a new military site;satellites can be manoeuvred and controlled atwill - and even the public has the ability to viewonce top secret sites on the Internet with certainsoftware. What has not changed is the analysis of

the information, and the way in which theproduct is used. Gathering electronic informationmay have become easier, but it has also led tobetter counter-measures. Counter-intelligencedirectorates work overtime to stop anadversary obtaining such data. It is still a game

A whole new industry grewfrom the Cold War that still

exists today, one that is bothhelping and hindering today’s

intelligence gatherers...

While old spy tradecraft is still used, a greatdeal of data is being gathered electronically

by agencies such of Britain’s GCHQ (left)

EYE SPY INTELLIGENCE MAGAZINE 17

of cat and mouse - but played out with far moreplayers on a much bigger field that now includesthe Internet.

The massive technical revolution in informationgathering methods has brought about a drasticchange in the way intelligence is collected. Hugeradomes ‘talking’ to advanced satellites act like‘giant nets’ catching signals, pictures andtelephone calls from across the globe. Diplomaticand military information may be scrambled, buteventually it will be deciphered. With today’s 21stcentury computers such tasks can be performedincredibly quickly and from anywhere on theplanet.

Two decades ago the Internet and cell phonesemerged as ‘must have’ products. They are greatproviders of information. For the intelligencecommunity they pose a problem. So rapid hasbeen the advance of this type of technology, thatit has become increasingly difficult for any

NSA - ‘the Agency that never sleeps’ -headquarters of the world’s biggest collectorof electronic intelligence (ELINT) - America’s

National Security Agency

General KeithAlexander has led

the NSA since 2005

18 EYE SPY INTELLIGENCE MAGAZINE

government to keep a secret for long. Anothermajor problem surrounding these instruments isthat they can be used by anyone - includingforeign spy rings, terrorists, organised crime gangsetc. With this in mind, some countries havededicated agencies to intercept communicationsand monitor e-mails. One major programme runjointly by the UK’s GCHQ (Government Commu-nications Headquarters) and America’s NSA(National Security Agency), is ECHELON. It’s aglobal network of special facilities and satelliteswith the capability of intercepting e-mails, phonecalls, faxes etc. One intelligence analyst said - “ifit’s spoken or written - we know.”

That may be rather simplistic and perhaps anexaggeration, but without ECHELON, terroristorganisations and rogue nations intent on

supporting the activity of groups like al-Qaida, could act with impunity. In the UK, MI5 is finding itdifficult to track ‘terrorist chatter’ because new forms of Internet communications are available, thusit supports a new programme what’s known in the intelligence world as ‘Black Box’. This willrequire providers to store messages for up to ayear and allow access to the address of both senderand recipient, though not necessarily the e-mailcontent. Of course there are those who object tosuch a systems, but there are numerous safeguardsin place to monitor only suspicious ‘traffic’. It’sjust one of hundreds of topics covered in Eye Spy.

ithout question the biggest challenge tothe intelligence world, both in respectof espionage and security, can be found

Cyber Warfare

W

RAF Menwith Hill - NSA’s biggest spy base issituated in North Yorkshire, UK

in the world of cyber.

Because computers operate systems used formanaging anything from air traffic control tonuclear power stations and submarines, the needto protect cyberspace is crucial. Similarly,computers are used to store huge amounts ofdata. On a government level, much of this isclassified secret or at the very least private andsensitive.

EYE SPY INTELLIGENCE MAGAZINE 19

In recent years the number of cyber attacks againstgovernment organisations or hi-end defence andtechnology firms have increased substantially. Nolonger do spy agencies or crime organisationshave to despatch personnel to the ends of theEarth to steal data, much of it can be sourced atthe touch of a button.

Of equal importance is the trustworthiness of staff.One only has to look at the case of US Army ana-lyst Bradley Manning to recognise the importanceof keeping data secure. Whilst in Iraq, Manninguploaded the equivalent of 500,000 pages ofinformation, thousands of US Government cablesand much more. He then gave the material to athird party that duly uploaded the informationon to the Internet for all to examine.

Control of vital infrastructure is another majorconcern, this as terrorist hackers try anddestabilise systems which control water, commu-nication, transport and other vital systems. And ifone believes this is impossible, events in 2011 inIran are evidence enough this can be achieved. Ajoint US-Israeli intelligence effort to slow downIran’s nuclear programme was enabled in theform of the Stuxnet virus.

Cyber hackers backed by China’s intelligenceservices are now actively ‘attacking’ computersystems across the world in an effort to obtaininformation. Other countries too are engaged inthis activity. Little wonder then that the US hasestablished a powerful near stand-aloneintelligence service known as Cyber Command.And interestingly, America has also threatened torespond militarily to cyber attacks.

Worldwide it is virtually impossible to count thenumber of cyber attacks that occur daily, but oneestimate suggests 100,000.

Many countries now have intelligence cyber units dedicated to counter-measures and protection,but they too have the ability to source data. It is another form of espionage. Eye Spy has anexperienced cyber editorial team that produces first class features on all the major events associatedwith cyber and its various elements.

20 EYE SPY INTELLIGENCE MAGAZINE

ESPIONAGE

It is still a game of cat and mouse- but played out with far more

players on a bigger field.

ith so many people having access to cellphones and the Internet, it’s notunreasonable to think that the old

Reasons for Intelligence

Wtraits of a spy would soon be a thing of the past.Not so, but a new type of electronic spy andtradecraft has emerged. Because signals are sentelectronically, they can be intercepted and withmany new forms of communication, it’s not sur-prising that this area of intelligence has rapidlydeveloped. SIGINT (signal intelligence) andCOMINT (communications intelligence) are asvital to an intelligence service as HUMINT. Byacquiring intelligence on an adversary, at the veryleast, it gives military and political planners anedge or insight into what is taking placethousands of miles away.

Understanding the intelligence machine and therole it plays is indispensable for all who want toknow how the 21st century will unfold.

For any intelligence officer charged with thecollection and evaluation of information aboutforeign army strengths, terrorist activity, motivesand plans, having good intelligence, and notnecessarily huge amounts of it, is useful. These

officers are the first line of defence in manyarenas, often supported by a network ofcolleagues. Examination of the ‘product’ allowsanalysts to make decisions, in turn providingguidance to policy makers. The features in EyeSpy are often created by assessing what transpiredbefore an operation occurred, or the mechanismemployed to achieve a specific result, be it theculmination of an anti-terrorist operation, or thediscovery of an MI6 communications device

An MI6 communications device containedwithin a rock-like object was discovered by

Russian Intelligence in a Moscow Park

EYE SPY INTELLIGENCE MAGAZINE 21

Sir John Sawers -Chief of MI6 -

perhaps the world’smost famous

intelligence service

MI6 headquarters Vauxhall Cross isaffectionately called ‘Legoland’

22 EYE SPY INTELLIGENCE MAGAZINE

LIAISONS

Britain’s MI6 has aclose relationship

with America’s CIA

CIA headquarters, Langley, Virginia

buried inside a rock in a Moscow park. Our writers, all experienced in the field of intelligence, lift theimportant climatic information from reports. And while it is not always possible to predict happen-ings or military conflict, Eye Spy did report on al-Qaida’s plans to carry out a huge destructive attackon the West - a full 16 weeks prior to 9/11.

hroughout its publication journey, Eye Spyhas endeavoured to provide its readers withthe most important and interesting news

Spy Tradecraft

Trelated to intelligence and espionage. And thisbrings us to the often hazardous work of the men and women working at the ‘leading edge’ ofintelligence collection - often described as ‘Spy Tradecraft’ - the ‘tricks of the trade’. A number of ourwriters have worked in this fascinating area - and it’s a subject that interests so many people. In itself,tradecraft contains hundreds of special elements from disguises to identity theft.

Tradecraft is used by agencies to gather information, often associated with espionage, deception anddisinformation. It is truly cloak and dagger. Whether it is using a dead letter drop, performing abrush pass, creating codes, surveillance, the bugging of a suspected terrorist safehouse, or the pass-ing of highly secret components from an aviation project, Eye Spy typically provides a deep insight

into how this is carried out. Government agenciessuch as MI6, or to give it its proper title - SecretIntelligence Service (SIS), have dedicated trainingschools that teach employees the tradecraftnecessary to carry out covert operations, or ‘turn’adversaries into informants and assets. MI6 - andits US counterpart - the Central Intelligence Agency,are masters of the art, though officials areobviously reluctant to discuss such matters inpublic. Eye Spy consistently runs dedicated serieson such tradecraft, including a number of DIYprojects. Fascinating stuff, indeed, the magazine’s

EYE SPY INTELLIGENCE MAGAZINE 23

tradecraft series has become very popular in thatreaders can discover some of the interestingmethods used by the world’s leading operatives,though our respect for national security is alwaysa top priority. From discovering techniques toinstall covert cameras in a target building, to theskills necessary to communicate using facial orbody signs, performing surveillance, masterdisguise techniques, infiltrating a spy ring,remaining safe overseas, avoiding the loss of youridentity, to operating in hostile environments etc.- readers will soon learn the trade secrets used bythe world’s greatest spies and agencies.

By digesting the contents of our hugely populartradecraft features, you will soon learn many ofthe real tricks of the trade.

Eye Spy providesa deep insight

into the world ofsurveillance

f course even experienced operatives can make mistakes. Counter-intelligence and foreignspies conspire to make things difficult for those attempting to gather intelligence. Counter-measures are an integral part of the work of domestic national agencies such as MI5 (Security

Counter Intelligence

OService) and the FBI (Federal Bureau of Investigation). In recent times, a greater emphasis has beenplaced on disabling the very real threat of terrorism, rather than attempting to catch spies, thoughthis is still of paramount importance. Indeed, 85% of MI5’s operational budget is now spent onmonitoring and investigating terrorism - a huge menace for everyone. Eye Spy regularly features thework of MI5 and its partners - all determined to tackle terrorism. It’s a fascinating area becauseoperatives are still required to use tradecraft in all its forms to uncover plots, infiltrate groups, thwartoperations and monitor evolving threats. Since its inception, Eye Spy has produced an array ofdetailed features covering a multitude of terrorist attacks and failed operations. However, muchattention is given to the tradecraft and the extraordinary manner in which intelligence analysts,anti-terrorist detectives and security services combine to piece together the data. Using our first-classsources, Eye Spy has gained a reputation for accurate reporting and analysis.

24 EYE SPY INTELLIGENCE MAGAZINE

Special Operations and Intelligence

Eye Spy has unique access to informationfrom many participants of special opera-tions. Contrary to popular belief, many

officers who work in the intelligence services, donot carry firearms and in Britain, have no powerof arrest either. MI5 may secure intelligence on aterrorist plot or a person committing espionage,but the Security Service work with organisationssuch as New Scotland Yard’s Counter TerrorismCommand (CTC), to conduct raids or makearrests. In the United States and some othercountries, agency personnel, for example thoseworking for the FBI, are often seen at the ‘endgame’ of an operation, and are permitted to carryweapons.

The world of intelligence, by necessity, doesliaise and cooperate with specialist police andmilitary units, often in counter-terrorist work.Occasionally intelligence officers will be assignedto a specially created task force for a specificpurpose. In 2011, the US created a multi-facetedunit that combined Special Forces troops with CIA

Right: SAS soldier Rusty Firmin outside theIranian Embassy, London

A US Navy SEAL. Though a navalcommand, SEALs often partici-

pate in land/airborne operationssuch as that which resulted inthe death of Osama bin-Laden

EYE SPY INTELLIGENCE MAGAZINE 25

SAS soldiers storm the Iranian EmbassyLondon - all the hostages were freed

Their task was to capture the world’s mostprolific terrorist in the person of Osama bin-Laden. In a most complex raid on his safehousein Abbottabad, Pakistan, the task force identifiedthe al-Qaida leader and shot him dead.

All major countries have special dedicatedmilitary units which often find themselvesperforming intelligence-led operations. InBritain, and besides CTC, MI5 and MI6 can callupon the Special Air Service (SAS). An exampleof such cooperation was the ending of the

Iranian Embassy siege in 1980. It is not unusual to see US Navy Seals or Delta Forces working closelywith the CIA, or Germany’s GSG-9 with its intelligence service. Eye Spy regularly covers the activitiesand operations of the greatest Special Forces and their liaisons with the world of intelligence.

Emblem of Germany’s GSG-9

26 EYE SPY INTELLIGENCE MAGAZINE

Creating codes as a means of forwardinginformation secretly and securely datesback thousands of years. Codebreaking is

Codebreaking

vital in respect of decoding ciphers - secret codes.During times of conflict this form of communica-tion is much more prevalent and utilised by theintelligence world. Understanding a message, beit written, electronic or even verbal sent by anadversary is extremely useful, if not vital.

An example of its importance can be found inWorld War Two. Millions of lives were saved asAllied codebreakers managed to capture, breakand understand Germany’s Enigma code, thusshortening the conflict by many months.

Britain’s wartime centre for codebreaking wasestablished at Bletchley in Buckinghamshire.Bletchley Park, also known as Station X becauseit was MI6’s tenth communication facility, washome to some of the world’s greatestcodebreakers, and today the site thrives as asplendid museum and learning centre. Its

The mansion house tower at Bletchley Parkcontained an MI6 communication room used

to contact and receive intelligence fromBritish agents operating in occupied Europe

Inside the MI6 communication room -Bletchley Park

Bletchley Park

EYE SPY INTELLIGENCE MAGAZINE 27

thousands of staff were recently honoured by HMQueen Elizabeth and an impressive memorialunveiled.

France’s Emperor Napoleon Bonaparte wasan avid user of codes. And it was one of hiscommanders who created ‘night writing’ - usingembossed dots so troops could read messageswithout light - this evolved into Braille.

In the world of espionage communication iscrucial. However, a code may take many forms.For example, a chalk mark on a bench mayindicate a package is ready to collect; a lightshining through a certain window a warning notto call etc. The complexity of a code is limitedonly by the imagination of an agency or individual.

Eye Spy regularly features reports, articles andnews items surrounding the fascinating world ofcodes and covert communication. Indeed, themagazine has a regularly column ‘Letter From FortMeade’ which reports upon topics relevant andconnected to codes.

Creating codes is an international pursuit, and isseen as an integral element of espionage andintelligence.

Memorial to the codebreakers of BletchleyPark dedicated by HM Queen Elizabeth

f codes are one of the oldest elements ofintelligence, then one of the most recentadditions to a spy’s ‘armoury’ are UAVs -

Enigma machine

ISpies in the Sky

unmanned aerial vehicles. Used extensively todayby armed forces in various roles, includingcounter-terrorism, UAVs or RPVs (remotely pilotedvehicles) as they were first designated, also oper-ate to secure intelligence. UAVs come in varioussizes and utilise different types of technology.Some have the ability to operate at night, whilstothers have the potential to remain airborne formany hours.

Some UAVs are controlled by operators thousandsof miles away using satellites to communicate.

Phantom Ray UAV

28 EYE SPY INTELLIGENCE MAGAZINE

Many perform surveillance and reconnaissance missions over terrain deemed too dangerous toinfiltrate. The CIA is a notable user of armed Predator UAVs. In the last few years the Agency hasperformed many secret missions resulting in the deaths of senior terrorists; identifying their safehousesand the pipelines used for transporting weaponry and explosives. Other types are used to monitorpirates off the Horn of Africa, track drug convoys in Mexico, surveil illegal people trafficking etc.

Ultimately UAVs are an asset to those whose task it is to collect intelligence. Eye Spy presents regularfeatures on these remarkable ‘sky spies’.

Predator UAV

EYE SPY INTELLIGENCE MAGAZINE 29

ecause of its wide appeal to readers from across the world, Eye Spy is a recipient of hundreds ofstories, case files, and rare intelligence snippets, many from esteemed authors, writers andjournalists. From authentic secret intelligence-led UK-USA Special Forces operations inB

Reports, Features, Case Files, Assassins and IntrigueTHE WORLD OF INTERNATIONAL INTELLIGENCE

Afghanistan, to new information on the Rudolf Hess mystery, MI6’s role in the building of the secretspy tunnel in communist controlled East Berlin, to female spies in the war of independence, thefeatures are both educational and fascinating. This ‘mix’ has been described by former MI5 and MI6legal director David Bickford as “thoroughly informative” making Eye Spy “excellent reading.”

In over twelve years of continuous publication, Eye Spy has covered every major intelligence event,published many world exclusive news stories, revealed some of the secret tradecraft used byoperatives, discovered hundreds of buildings associated with the greatest spy stories and services ofthe world, published fascinating case histories, photographic essays, special espionage cases,infiltration, surveillance, bugging, service histories, interviews etc. We also have a dedicated bookrelease section - UnderCover where readers can review the latest releases, and a tradecraft areawhere new equipment is tested and reviewed.

Is it is magazine for “spies”? - No - but it is a firm favourite with those who work in the intelligenceworld. Eye Spy is a magazine totally devoted to and about the lives of the people who ply their tradein intelligence and security services, Special Forces units, anti-terrorism, police forensic and cyberagencies etc. For those who work in the industry it is essential reading, but Eye Spy is for everyoneand anybody remotely interested in this fascinating and secretive subject. Do join us for a revealinginsight into the world of intelligence and espionage - it may just change your opinion of world events- and what takes place behind closed doors...

30 EYE SPY INTELLIGENCE MAGAZINE

EYE SPY INTELLIGENCE MAGAZINE 31

32

Bureau officials release dozens of photographs,documents and several covert film clips showingundercover surveillance of SVR spies in America

OPERATION

C O U N T E RESPIONAGEF O O T A G ER E V E A L SEXTENTOFEVIDENCE

Anna Chapman Cynthia Murphy Donald Heathfield Juan Lazaro Michael Zottoli

Richard Murphy - SVR spy“under surveillance”

THE SPY NETWORK PLAYERS

GHOST STORIESFBI RELEASE SVR SURVEILLANCE FOOTAGE

EYE SPY INTELLIGENCE MAGAZINE

33

Regarded as thenetwork’s ‘spymaster’,Christopher Metsos isphotographed enroute

to a meeting

Mikhail Semenko Patricia Mills Richard Murphy Tracey Foley Vicky Pelaez

Freedom of Information Act request has resulted in the FBIreleasing dramatic film footage showing many of the exposed2010 SVR sleeper agents, or ‘illegals’ in action. The material,which includes numerous redacted intelligence documentswould have been released anyway, but with so much interestA

Greetings comrade... Anna Chapman is courted by an undercover FBI man. In the third frame she removes her SVR programmed laptop

Richard Murphy (facing)and Metsos meet inQueens, New York

‘OBJECTIVE WAS HILLARY CLINTON’‘OBJECTIVE WAS HILLARY CLINTON’

from journalists and the public alike, Bureau chiefs decided to hasten theprocess. And the reason why officials decided to strike when they did arebeginning to emerge. Eye Spy sources say at least one of the spies hadstarted a process whereby they intended to befriend a most significantpolitician - US Secretary of State - Hillary Clinton.

From operatives performing brush-passes to the use of dead letterdrops, the evidence secured by theFBI is utterly convincing, and reasonno doubt why the suspects didn’tobject more forcefully when ejectedfrom the United States in thesummer of 2010. And this is despitesome of the spies having lived in thecountry for the best part of adecade.

Working under the code-name of Operation Ghost Stories, the FBI surveillanceoperatives were far more imaginative than their Russian counterparts, andseemingly fully aware that they had problems with communication. With this

PHOT

OGRA

PHS/

FILM

CLI

PS C

OURT

ESY:

FBI

EYE SPY INTELLIGENCE MAGAZINE

34

CIA’S OBL DESK OUTFLANK TERROR CHIEF

The scene that greeted special US NavySEAL teams as they sought to capture the

world’s most wanted man - the city ofAbbottabad at night

© B

K200

6

about 40 miles north-east of Islamabad,Pakistan. Their target was America’s mostwanted - Osama bin-Laden.

The operation was the end game of a near 10-year hunt for the man held responsible for thekilling of 3,000 civilians on 11 September2001. It was one that began at exactly 8.46amon that fateful day as al-Qaida terrorists led byMohammed Atta crashed American AirlinesFlight 11 into the north tower of the iconicWorld Trade Center.

For the CIA, and especially those members ofthe OBL Desk who were charged with bringingbin-Laden to book, it was a special moment -a major success - a time to reflect on somany near misses or flawed intelligence. Itwas also a time to remember all those whoperished in a nightmare scenario that stillconsumes and haunts so many Americans.

This was not the first occasion the OBL Deskhad the opportunity to capture or kill bin-Laden. And prior to 9/11, in Afghanistan, theAgency requested permission to strike - thisafter the al-Qaida leader was monitoredescorting associates in Afghanistan. PresidentClinton dithered as Langley chiefs warned thewindow of opportunity to attack was narrow-ing. In the end the White House asked theAgency to step down as those bin-Laden

accompanied were believed attached to a‘friendly nation’. A US Navy cruise missileeven had the ground coordinates inserted andwas ready to go. So it was somewhat ironicthat in the summer of 2010, the US Navy,albeit a ‘ground’ element, was instructed totrain for a very special mission. And this timethe CIA was defiant - OBL had been found andthe CIA was not going to miss another chanceto capture him.

Eye Spy understands a meeting took place inWashington last August between White Houseofficials and D/CIA Leon Panetta. Mr Panettadescribed how for years the SEALs have beenactive across the region in their pursuit of bin-Laden. Indeed, many SEAL operatives havedied trying to do so. In 2005, for example,Operation Red Wing (a SEAL search and

HIDING IN PLAIN US Navy SEALs KillOsama Bin-Laden

n the early hours of 1 May 2011, fourBlack Hawk helicopters carrying US-NavySEALs (Naval Special Warfare Develop-ment Group [Navy SEAL Team Six]) andspecialist officers from the CIA landed in ahigh-walled compound just yards from amajor military barracks in AbbottabadI

COUR

TESY

: CIA

D/CIA Leon Panetta -a “huge success”

EYE SPY INTELLIGENCE MAGAZINE

35

Osama bin-Laden’s hideaway inAbbottabad - just yards from a military

academy

tic, but most were spurious and had beenprovided for by persons simply seeking cashrewards. This time it was different.

On learning of the CIA intelligence, PresidentObama green-lighted a most dangerousmission. From that day forth, there followedtop secret meetings between US intel peopleand a few of the Agency’s associates in otherUS intel services. And though it seemsinconceivable that such an operation couldhave been conducted without the cooperationof Pakistan officials and ISI elements, thisappears to have been the case. We under-stand the ISI was told only as the US SEALswere arriving at the compound. Designated aBeyond Top Secret operation any leak ofintelligence would have found its way to someelements in the ISI that are Taliban friendly.Even the faintest hint that OBL had beenlocated, would have seen him tipped-off.

The target house within a 12-18ft-walledcompound had been under NSA and NROsatellite surveillance for the best part of eightmonths. Of that there is absolutely no doubt.Valued at around $1 million the house withinwas a relatively new build and strangely hadno telephone lines - an indication the occu-pants were using cell or satellite phones. Itdidn’t take the NSA and GCHQ in the UK thatlong to discover it also had no Internetconnection - at least not from a land-line.However, as DOD sources state, the buildinghad been under observation since last July,and there are methods available to the NSA to

Admiral GaryRoughead

Chief of NavalOperations

WTC issues smoke after Osama bin-Laden’sterror group attacks America

US NAVYSEALS -

A near faultlessoperation andculmination of

eight months totalsurveillance

COUR

TESY

US

NAVY

© U

PSTA

TENY

ER

SIGHTCO

URTE

SY: U

S NA

VY

capture mission) saw many commandos diein Kunar Province as their helicopters weredowned by heavy AQ and Taliban fire. Theywere very close to capturing Taliban chiefMullah Omar - who could have provideddetails of the whereabouts of OBL.

GHOSTS AND FLAWED INTEL

The Agency had for years followed phantomreports of OBL. Some were probably authen-

EYE SPY INTELLIGENCE MAGAZINE

COUNTER TERRORISM

EYE SPY INTELLIGENCE MAGAZINE36

37

CHINA ARREST AIDE TO SENIOR STATE SECURITY OFFICIAL SUSPECTED OF SPYING FOR THE CIA...

‘Pretty Woman Trap’CIA ©

VM

ENKO

V

Ministry of State Securitybuilding in Xiongchu - the

MSS control most of China’sspying activities and

counter-intelligence work

China’s Politburo and the death of Briton Neil Heywood. It isfurther complicated because US-Sino relations are at a verylow ebb, thus Beijing and Washington kept quiet about thespy affair.

If the man, said to be aged 38, was indeed an agent forthe CIA, his exposure is a bitter blow for Langley.Initial reports stated the alleged spy, who at time ofpublication has not been named, worked in the officeof Qiu Jin, deputy minister of the country’s powerfulMinistry of State Security. The MSS controlsChina’s spy agencies and a report stated that the

© P

ETE

SOUZ

A W

HTE

HOUS

E M

EDIA

official was a desk clerk involved withinformation flow from various intelligenceelements, including foreign intelligencecollection. However, one source said theaide, who also worked with economic,political and strategic intelligence, was

attached to the office of vice ministerLu Zhongwell, 59, who was

reportedly arrested. Just howdamaging the espionage has

been can be calculated byone official who said, “thedestruction has beenmassive.” Indeed,intelligence watchers arealready describing the

case as China’s “worst security breach in decades.”

suspected CIA spy and secretary to one of the mostpowerful and influential figures in China has beenarrested on espionage charges. Though details ofthe case are patchy, it is believed the man wasdetained between January and March 2012. Theincident seems connected to recent turmoil withinA

Langley’s Far EastSection turn tableson Chinese spies

○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○

MI6 contact man NeilHeywood

President Obama’s inner circle greet Chinesepremier Hu Jintao at the White House in 2011.

There are now rumours circulating in Beijing thatJintao’s phone was bugged

EYE SPY INTELLIGENCE MAGAZINE

38

Another question raised by journalistsconcerns just how long the agent had been inplace. This could be partly answered by thefact he had reportedly been paid over half amillion dollars - suggestive of a lengthy period.However, if the intelligence was of such highquality, the agent could in theory havereceived significant sums in a relatively shortperiod of time. Eye Spy understands the agentmay have been operational since early 2011.

Speculation abounds how he was firstrecruited. One official noted he may have beenapproached whilst in the USA as a student,another suggested he was lured into a CIA‘honey-trap’. A journalist for Hong Kong’sOriental Daily believes he was “coerced” by aCIA female agent in a Hong Kong flat. Here hewas photographed by other agents in acompromising position. The newspaperfeature described this action as - ‘the pretty

woman trap’.

Police chief Wang Lijun sought US protection -

he was being investigated by staff in the office

of the suspected CIA agent

Telephone lines in President HuJintao’s office were tapped

© T

HOM

AS F

ANGH

AENE

L

The magnificent ‘Great Hall of the People’ in TiananmenSquare in the country’s capital Beijing. The building hosts

Parliament and the Communist Party of China

© D

ILM

A RO

USSE

FF

Despite this, a number of reports haveemerged in the Chinese press that the agenthad been fully trained by the CIA - this after hereceived a blackmail threat from a third party -presumably those involved in the honey-trap.

In recent years the FBI and Pentagon hasengaged its counter-espionage forces toconfront several Chinese spy networks, boguscontract companies and individuals operatingin the United States. One report emanatingfrom Hong Kong says the agent may well havecompromised a number of Chinese spies.

WIRETAPS AND ASSASSINATION

Beijing has been rocked by recent politicalscandals, including assassinations that havecaptivated the imagination of the Chinesepublic, and this latest affair has resulted in thesuspension of a vice minister who has beenquestioned by counter-espionage officers.

Eye Spy has been told the incident could beconnected to events surrounding the strangemurder of MI6 intelligence contact man NeilHeywood in Chongqing in November 2011

EYE SPY INTELLIGENCE MAGAZINE

39

Senior Politburo man Bo Xilai authorised wiretaps.

His wife, Gu KaiLai, is implicated in murder of

UK intelligence contact man Neil Heywood

Premier Wen Jiabao

© R

EMY

STEI

NEGG

ER W

ORLD

ECO

NOM

IC F

ORUM

200

9

A former chief of the Ministry of PublicSecurity, he headed the ultra secretive andmenacing outfit known as the 610 Office - aposition he was stripped of in May. Describedas China’s most “powerful security official,”Yongkang was under pressure after it waslearned he had strong connections to Bo Xilai.610 Office was established in 1999 to monitorthe Falun Gong spiritual movement which isbanned in China but has a global Chinesenational following both inside and outside thecountry. The 610 Office has intelligence andsecurity threads and many FG members havebeen arrested and imprisoned.

Another recent event that could be connectedto the spy case is the departure of MSSofficial Gao Yichen, 61. As a deputy directorhe had responsibility for maintaining stabilityin the 610 Office. Yichen suddenly left inMarch 2012 as news of the Bo Xilai affair andthe death of Heywood started to emerge. UK

(see Eye Spy 79). Police official Wang Lijuninvestigated the Briton’s death (poison wasforced into his mouth) and it soon transpiredthat the affair also involved other very seniorChinese officials, including Politburo man BoXilai. Lijun sought asylum in the US Consulateafter leaks emerged stating Xilai’s wife, GuKaiLai had allegedly ordered Heywood killed.The affair was further complicated because ofWang Lijun’s involvement in the bugging ofpolitical rivals on behalf of Bo Xilai himself.Some of the wiretaps are said to have beenused on telephones in party leader andPresident Hu Jintao’s office and possiblythose of Prime Minister Wen Jiabao. Eye Spyunderstands that the man who led theinvestigation into these extraordinary happen-ings was Qiu Jin.

Qiu convinced Wang to leave the US Consu-late on his own accord, and flew back withhim to Beijing in February this year.

610 OFFICE

Another senior official who has appeared inrecent Hong Kong reports is Zhou Yongkang.

EYE SPY INTELLIGENCE MAGAZINE

INTELLIGENCE ANALYSIS

EYE SPY INTELLIGENCE MAGAZINE40

41

Secret message seems inextricablylinked to D-Day and Montgomery

A mystery codefound on a

wartime pigeoncontinues tobaffle and

confusecodebreakers

WWII CODECONTROVERSY

secret message discovered ina canister on the detached legof a pigeon dating back toWWII, continues to puzzlecodebreakers around theworld. Discovered by Anne andDavid Martin 30 years ago -A

behind a fireplace at their home in Surrey - thecouple decided to send it to Colin Hill, curatorof the ‘Pigeons at War’ exhibition at BletchleyPark - the UK’s codebreaking museum.

Trustees here invited people to try and solvethe mystery and even today’s codebreakers atGCHQ got involved.

GCHQ responded to Mr Martin saying itsanalysts had thus far been unable to crack thecode.

Mr Hill said the centre has more than 30messages delivered by pigeon carriers, butnone match the code in which this one was

written. “The message must be highly topsecret,” he said.

However, despite the attention of some of theworld’s greatest codebreakers, the messageremained secure... that is until now.

The paper shows a series of 27 word andnumber messages. It is believed to have beendespatched by operatives from Normandyaround the time of the D-Day landings in

US troops move towards thebeaches at Normandy

EYE SPY INTELLIGENCE MAGAZINE

42

Anne and David Martin pose with the remains of the pigeon. The discovery of a mystery code has caused muchdebate and speculation within the professional and amateur codebreaking community

1944. Now a Canadian team claim to havecracked the code, though their findings havebeen disputed. A researcher at the LakefieldHeritage Research said the message is onewritten in short form code and was intendedfor Bomber Command which is identified asXO2. It was sent by 27-year-old Sergeant W.Stot, a paratrooper from the LancashireFusiliers who was part of a reconnaissanceteam measuring German military strength in

the region. Stot was killed a few weeks afterthe message was sent.

Gord Young, 70, a member of the Canadianteam said they had been able to “unravelmost, but not all of the code.” He felt annoyedafter reading reports the message wasimpossible to read, but insists it was “break-able.” According to Canadian media, Gord,who lives in Ontario, took just 17 minutes to

The pigeon lofts at Bletchley Park

and part of the museum’s brilliant

‘spy pigeon display’

© E

YE S

PY IN

TELL

IGEN

CE M

AGAZ

INE

© SWNS/SWNS.com

break most of the code. The secret communi-cation essentially warned that the Germanswere preparing a large scale counter attackusing tanks in Normandy.

THE MESSAGE PURPORTEDLY READS:

‘Artillery observer at ‘K’ sector, Normandy.Requested headquarters supplement report.Panzar attack - blitz. West Artillery ObserverTracking Attack.

© E

YE S

PY IN

TELL

IGEN

CE M

AGAZ

INE

EYE SPY INTELLIGENCE MAGAZINE

A O A K N H V P K D F N F J W Y I D D C

R Q X S R D J H F P G O V F N M I A P X

P A B U Z W Y Y N P C M P N W H J R Z H

N L X K G M E M K K O N O I B A K E E Q

W A O T A R B Q R H D J O F M T P Z E H

L K X G H R G G H T J R Z C Q F N K T Q

K L D T S F Q I R W AOAKN 27 1 5 2 5 / 6

ome experts believe thepigeon’s destinationwas General Sir

© SWNS/SWNS.com

Code Destination REIGATE -General Montgomery’s HQ?

SBernard Montgomery’sheadquarters in Reigate Hill,Surrey, hence its discovery inthe county. The Martins liveclose to the site, which isabout 20 miles from Londonand from where militarycourier pigeons were flown.

Analysts believe the bird - onits return from France - was

exhausted, rested and simplydropped into the chimney.Here it became trapped anddied.

Also of interest, WinstonChurchill was a frequentvisitor to Reigate Priory and issaid to have written some ofhis most famous speechesfrom this location.

As for some of the militarypersonnel stationed here, anumber were involved withmaintaining equipment usedby the codebreaking centre atBletchley Park.

During WWII, Britain used anastonishing 250,000 pigeonsin the war effort.

For more information on thisimportant location:

LINKS:www.reigatehistory.co.uk/churchill

The skeletal foot of

the spy pigeon and

plastic canister

which contained

the code

Panzer IV was the only German tank to remain in production throughout WWII

‘Lt Knows extra guns are here. Know wherelocal dispatch station is. Determined whereJerry’s headquarters front posts. Right batteryheadquarters right here.

‘Found headquarters infantry right here. Finalnote, confirming, found Jerry’s whereabouts.Go over field notes. Counter measures againstPanzers not working.

43

Pigeonfitted with

spy camera

The coded message

© ROBERT DOUGLAS

COUR

TESY

: CIA

EYE SPY INTELLIGENCE MAGAZINE

44

By Kevin Coleman

QUICK SALEGOING UNDERGROUND

he cyber underground hasrisen to a level that nowconcerns the world’sintelligence community. Weare witnessing what couldbe described as the build-up

US DEPARTMENT OF DEFENSE CYBER CRIME CENTER

COUR

TESY

: USA

F

Tof an underground ‘arms trade’. Cyberprofessionals have expressed genuine fear ofthe creation of advanced cyber weapons.These weapons are for sale everywhere in theworld by cyber arms dealers in an onlineblack-market. Most are within the price rangeof even the smallest country or organisationas well as the average individual. One cybersecurity intelligence CTO said: “We see a trendtowards commercialisation of malicious code.Motivated by financial gain, hackers arehoning their skills and becoming moreambitious, targeting the growing numbers of

Cyber Weapons of every description - and on thehorizon... a few of the home-made variety

Alexander. “Some of these weapons couldpotentially destroy hardware as well as dataand software.”

So, perhaps the most lucrative businessopportunity with minimal risk in the 21stcentury is that of a cyber arms dealer! Whatan opportunity.

General KeithAlexander

Internet users and stealing personal detailsand financial information, as well as compro-mising intellectual property.”

A recent investigation found malicioussoftware with a threat rating of 3.8* wasfound for sale online at a cost of just $9.95(£6-7.00).

Information technology trend analysis firmGartner predicts that by 2015 at least one ofthe G20 nations will become the victim ofdramatic online sabotage that will disrupt anddamage critical infrastructure components.This view is supported by General KeithAlexander, head of US Cyber Command. “Webelieve that state actors have developed cyberweapons to cripple infrastructure targets inways tantamount to kinetic assaults,” said

Student teaching atthe Defense Cyber

InvestigationsTraining Academy

EYE SPY INTELLIGENCE MAGAZINE

45

Personnel monitor, analyse, detect and respond to unauthorised activity withinUS Navy information systems and computer networks. NCDOC is responsible for

around the clock protection of the Navy’s computer networks, with more than700,000 users worldwide

NAVY CYBER DEFENSE OPERATIONS COMMAND

COUR

TESY

: US

NAVY

USAF Chief Information Officer Lt.General William T. Lord addresses

modern cyberspace threats and theimpact of social networking at the Air

Force Association Cyber FuturesSymposium and Convention in April CO

URTE

SY: U

SAF

The graphic (below left) shows an equallymenacing advertisement from another website. One could be forgiven thinking it readslike a highly targeted shopping list.

The capabilities of cyber weapons in generalcontinue to increase and DDoS attack capacityis now different. Over the past few years DDoSattacks with a malicious traffic capacity in the100 giga-byte per second (Gbps) up fromapproximately 40 Gbps in 2009 has been seenmultiple times.

For some time now Russia has been trying topersuade various United Nations institutions topush for the adoption of cyber arms controltreaties. The old saying - ‘It does no good to

close the barn door after the horses have

bolted’ comes to mind. Given the number oforganisations, nations and terrorist groupsinvolved in cyber weapons developmentadded to the number of cyber weaponsalready available at a click of a mouse, it isimpossible to establish cyber arms controls.Even if it was possible, it would be unenforce-able due to the difficulty detecting cyberweapons development.

Technologically sophisticated nations have adistinct disadvantage over others due to theirheavy reliance on the Internet within their

critical infrastructures. Cyber intelligenceanalysts believe rogue nation states, terroristsand others may use cyber weapons wheneverthey see fit due to the difficulty of attributionand the measure of plausible deniability thisnew class of weapon provides. Stuxnet shouldhave been a wake-up call for governmentsand militaries around the world. Someanswered but many did not. Those that didn’tare playing with fire.

SIZE OF THE CYBER THREAT AND MARKET

It is impossible to know the true size of thecurrent cyber weapons market, but given therewere over 21 million new strains of malwarereleased in 2010, the number has to be fairlylarge. There are literally dozens of peoplealready operating in the shadows of theInternet. The cyber arms dealers range fromindividuals to moderately sized organisations.They operate internationally and regularly sellmalware and botnet services as well ascontrol programmes through web sites, onlineauctions sites and blogs. Bots that can beused to steal passwords, spyware, distributeddenial of service (DDoS) attacks are nowavailable for sale. One cyber arms dealer evenhad a sale on DDoS attacks. They offered tolaunch a 24-hour DDoS attack against a website of your choosing for as little as $599. Atthe same time the site’s competitor sent outthe message:

‘We offer DDoS service! - removal of sites,

your competitors and enemies -

outcommissioning sites by the overload of

server! Prices from $100 24 hours and

higher.’ You must admit this sounds like agreat deal!

EYE SPY INTELLIGENCE MAGAZINE

46

Cyber arms dealers and underground cyberweapons developers care little about who buystheir products and even less about how they areused. Many believe another wake-up call is justover the horizon and is arguably the scariestscenario. Military and commercial cyberweapons’ programmes are all well and good, butwhat about the home-made ones? I would bewilling to bet that US black ops cyber teams havecontracted with programmers who are at thismoment cooking up home brewed new andinnovative cyber weapons with capabilities we

INTEL: The Technolytics Institute has repeatedlywarned that the rapid and global proliferation ofcyber weapons cannot be controlled.

INTEL: In a recently issued cyber intelligenceadvisory, Spy-Ops stated that government andprivate sector funding is not keeping up with thegrowing threat from acts of cyber terrorism.

INTEL: Recent research/survey found that chancesare high that even though cyber attacks on webapplications have increased over the last fewyears and are have become a big concern -organisations are still not spending much on webapplication security.

INTEL: Open Source Cyber Intelligence ReportHYPERLINKS

“http://iscsp.org/wp-content/uploads/2010/08/cyber-weapons-proliferation-and-deterrence.pdf”

http://iscsp.org/wp-content/uploads/2010/08/cyber-weapons-proliferation-and-deterrence.pdf

he FBI has disrupted aninternational cyber fraudoperation by seizing theservers that had infected

have not even thought of yet. One point raised atconferences and intel briefings is whether or nota home-brew cyber weapon can be built withoutthe developer really understanding its truecapabilities and spread uncontrollably across theInternet? I believe it is a real possibility that weall must plan for.

Earlier this year US Army Lt. General RonaldBurgess, the Director of the Defense IntelligenceAgency (DIA), and James R. Clapper, Director ofNational Intelligence (ODNI) in their testimonybefore the Senate Armed Services Committeeacknowledged dangers ranging from terrorism,

cyber threats, weapons of mass destruction, andthe release of sensitive data by sources such asWikiLeaks. There are few who doubt the strategicimplications of cyber weapons given their abilityto deceive, deny, and disrupt the computerisedequipment and systems adversary. It is beyondthe point in time when we should have stoppedtreating the proliferation of cyber weapons - andthe all too common attacks on electronicequipment and systems as ‘business-as-usual’.

FBI DISMANTLE CYBER CELL

as many as two million computerswith malicious software. The gangdeployed Botnets - networks ofvirus-infected computerscontrolled remotely byan attacker. They can beused to steal funds,hijack identities, andcommit other crimes.The botnet in this caseinvolved the potentCoreflood virus, a key-logging programme thatallows cyber thieves tosteal personal and financialinformation by recording unsuspect-ing users’ every keystroke.

The FBI began its Corefloodinvestigation in April 2009 when aConnecticut-based companyrealised that hundreds of comput-ers on its networks had beeninfected. Before the Bureau hadtime to shut down the Corefloodoperation, cyber thieves made

numerous fraudulent wire transfers,costing companies hundreds ofthousands of dollars.

“Botnets and the cyber criminalswho deploy them jeopardize theeconomic security of the United

States and the depend-ability of the nation’sinformation infrastruc-ture,” said Shawn Henry(left), executive assistantdirector of the FBI’sCriminal, Cyber,Response, and ServicesBranch. “These actionsto mitigate the threatposed by the Coreflood

botnet are the first of their kind inthe United States,” Henry noted.“They also reflect our commitmentto being creative and proactive inmaking the Internet more secure.”

Thirteen people have been chargedwith various offences including wirefraud, bank fraud, and illegalinterception of electronic communi-cations.

T

The COREFLOOD VIRUS infects only MicrosoftWindows-based computers. Generally, most users willnot be able to tell if their computers are infected. It istherefore important to take the following steps:

1 Make sure your Microsoft Windows Automatic Updates are turned on;

2 Run anti-virus programs and ensure that they are up to date;

3 Run a security firewall on your computer; and

4 Check your online banking and credit history to make sure you have not beencompromised. If you have been compromised, contact your financial institution.

Arrests in international cyber operation

THE COREFLOOD VIRUS

James R. ClapperODNI

Ronald BurgessDIA Director

‘HOME BREW’ CYBER WEAPONS

○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○

EYE SPY INTELLIGENCE MAGAZINE

THE WORLD OF CYBER

EYE SPY INTELLIGENCE MAGAZINE 47

The World of Counter-Terrorism

C O N T A C TC R E A T I O NI N S U R G E N C Y

Most terror groups publicly announce they are fighting for a cause andtherefore acts of bloody violence, hijacking, kidnapping, robbery orcriminality can be justified. From anarchists, to militias, right and leftwing groups, resistance movements, revolutionaries and even singleperson or issue terrorists, the catch all “umbrella of terrorism” is fullof quests, explanations and reasons for motivation. This “catch all”phrase remains as relevant today as ever. And just as important, whatactions really constitute terrorism and how does onedifferentiate an insurgency from a terrorist quest?

Prepared by theEditorial Board of

Eye Spy IntelligenceMagazine

48 EYE SPY INTELLIGENCE MAGAZINE

49

m and IntelligencePART

2

any Americans will besurprised at the followingstatistics sourced from 1January 1968 to 9 July1970 - an eighteen monthperiod of student unrestM

and political upheaval in relation to theVietnam War. Between these dates 4,568domestic bombings occurred on US soil; afurther 1,506 bomb attempts and incidentswere also made/reported. More incredibly,more than 35,000 bomb threats wererecorded by the security services. Analysisshowed over 50% could be attributed tostudent campuses. Hardly surprising thereforethat to counter this danger the CIA launchedOperation MHCHAOS, described as a secretdomestic spying programme intended toexamine possible foreign influences on thestudent anti-war movement. Today, of course,even making a bomb threat would generate amajor investigation and lead to a stiff jailsentence for anyone convicted, and it is likelyall this data would fall into the domesticterrorism category.

One nation that has recently adopted toughnew laws on all forms of terrorism, is

Argentina. This now includes a wide range ofmonetary and political issues. On 22 Decem-ber 2011, the country passed counter-terrorism legislation that human rightsactivists believe is a “catch all” for anyoneopposed to government policy. Officials alsosaid the penalties for those falling foul of thenew laws will be “twice as severe” with thedoubling of the minimum and maximum jailsentences permitted. Intelligence commenta-tors acknowledge Argentina is still coming toterms with its shadowy past, especially thatperiod in time when a dictatorship ruled thecountry. Between 1976 and 1983, govern-ment-sponsored units were created to torture,kidnap and assassinate over 13,000 politicalopponents. Many more people simplydisappeared.

And whilst focusing on statistics, it is worthreproducing the data collected by the Associ-ated Press (AP) to coincide with last year’s10th anniversary of 9/11. In a massiveinternational project, AP researchers foundthat between 11 September 2001 to 11September 2011, a staggering 120,000people were arrested and 35,000 convicted ofterrorism offences.

SURPRISING STATISTICSbetween Jan 1968 and July 1970... 4,568 bombattacks occurred on US soil, a further35,000 bomb threats were made.

In the ten years following 9/11 120,000people have been arrested for terroristoffences and 35,000 have been convicted

The Vietnam War spawned a staggeringnumber of domestic US terrorist attacks, andled to the creation of a secret CIA operation

code-named MH/CHAOSINSIDE INTEL

errorist groups come in all forms andsizes. Their sophistication variesimmensely from individuals making

FORMATIONS AND OBJECTIVES

Tmenacing phone calls like the antiwar USstudents of the Nixon period, to the sending ofletter bombs or performing complex plotssuch as 9/11.

There are a number of high profile intelligenceand security services which monitor, study,analyse and categorise such outfits. Surveil-lance data secured from HUMINT (humanintelligence) and ELINT (electronic intelli-gence) gathering never ends. Other globalconcerns such as Interpol, NATO and theRussian Federation all have dedicated counter-terrorist analysis wings. Groups designated“terrorist” are given what essentially adds upto a threat number - a classification thatdefines their menace, objectives, capabilitiesand probable longevity. The intelligencesystem used to create this classification alsocovers senior figures, finance, weapons andexplosive procurement and the group’s pastand future capabilities:

EYE SPY INTELLIGENCE MAGAZINE

50

The LangWhen terrorists bombed London in 2005,some intelligence commentators used thewords ‘Clean Skins’ to describe the menwho had avoided the ‘Police Radar’ and

were basically ‘Unknowns’. Eye Spypresents words and expressions used inthe intelligence world... some well known

and others forgotten or rarely spoken today

AZto

n 1899, the wordSpy was defined bythe Hague Conven-tion as: “One who,acting clandestinely,or on false pre-tences, obtains, or

seeks to obtain, information in the zone ofoperations of a belligerent, with the intentionof communicating it to the hostile party.”And probably from that date forth those whoworked in this shadowy industry started touse terminology that had an association witha specific task, though not always.

The language of spies and the intelligenceservices constantly evolves and new wordsare always added. Most people are familiarwith common phrases such as Mole - ahostile spy who burrows into an intelligenceagency to report to his handler. Slightly moreclandestine, but equally as well known, theHoneytrap - an operation performed tocompromise a person sexually.

Other phrases are less well known and someeven refer to equipment. For example Tiger in

the Tank is spy talk for a linear amplifier, andStroller is an agent working with a communi-cation set.

Walk-in

WI

EYE SPY INTELLIGENCE MAGAZINE

SPIESA: AGENT OF INFLUENCE -An agent or officer who rather than performespionage, will try and affect opinion to opendiscussion or insert disinformation.

51

uage ofOfficers and agents working for differentagencies and in foreign countries, all use thelanguage of spies to basically conceal andcodename tasks. And though the objectivemay be the same, occasionally the wording isdifferent, and this even applies to friendlycountries such as Britain and America whoseintelligence services operate closely.

Not surprisingly, there is even a word that MI6and the CIA use to describe each other -cousins. However, while MI5 and MI6 use theword Target to identity a person undersurveillance, the CIA and FBI often use Rabbit.

Eye Spy has accumulated hundreds ofphrases and words from the intelligence worldand intends to publish the entire ‘dictionary’ ata later date, but here is a quick A-Z of a fewinteresting terms and their meaning.

HHunting Pack

U UAV - ‘Little Friend’

A

PLUMBING - American intelligence term for the preparationof major operations including reconnaissance of a building

P

PART 1

Library of Intrigue

EYE SPY INTELLIGENCE MAGAZINE

52 EYE SPY INTELLIGENCE MAGAZINE

53

THE WORLD OF INTELLIGENCE AND GOVERNMENT

EYE SPY INTELLIGENCE MAGAZINE

EXCLUSIVE INSIGHTS AND INTERVIEWS

EYE SPY INTELLIGENCE MAGAZINE54

The former D-Notice Secretary talks exclusively to Eye Spyabout his forthcoming book ‘Secrecy and the Media: TheOfficial History of the United Kingdom’s D-Notice System’

EYE SPY INTELLIGENCE MAGAZINE 55

EXCLUSIVE INTERVIEW

56

SPY WARSThe Nosenko Case - one of the greatunsolved mysteries of the Cold War

ecember 1961 was a timeof great tension; the ColdWar raging andKhrushchev rattlingsabres over Berlin. It wasalso when a KGB officernamed Anatoly Golitsyn

A year and a half later Nosenko came out again,this time having changed his mind and defectingoutright. This was just weeks after the assassi-nation of President John F. Kennedy by LeeHarvey Oswald, who had earlier defected to andspent three years in the Soviet Union. Nosenkoclaimed astonishing direct knowledge ofOswald’s sojourn there, and could report withauthority that the KGB had taken no interest inOswald, much less had it had any hand in hislater act.*

I was Nosenko’s initial contact in Geneva andlater, in Langley as head of CIA’s worldwideoperations against Soviet intelligence, super-vised all contact with him until early 1967. Wedetected strange circumstances aroundNosenko, and his reports seemed to beintentionally hiding the existence of KGB molesin CIA and among American code clerks, so Itook a position against my own apparentlyimportant agent. In a long interrogation myviews gained confirmation - though no confes-sion. But after my departure on assignmentabroad, CIA found it expedient to whitewashNosenko of all doubts, take him into its fold as acounsellor on counterintelligence matters, and todiscredit me and others who had distrusted him.Nosenko continues to live in the United States tothis day, enjoying the trust of the Americanintelligence community.

Tennent Bagley, former head of the CIA’s Soviet Counterintelligence Desk, and author of thecontroversial book - Spy Wars - talks exclusively to Eye Spy about his work in Langley and why

he believes the KGB ‘planted’ an agent inside the CIA who broke American secret codes

Yuri Nosenko - the KGBdefector who Bagley

maintains was a plant todeflect CIA attention away

from other more impor-tant matters - including

the assassination ofUnited States President

John F. Kennedy

© C

ENTR

E FO

R SE

CURI

TY S

TUDI

ES

A BRIEF OVERVIEW BYTENNENT BAGLEY

Ddefected to the CIA and gave startling indicationsof KGB successes in recruiting Western officials.Only a few months afterwards, there arrived ontemporary mission in the West yet another KGBofficer, Yuri Nosenko, volunteering his services toCIA in Geneva.

Coming from inside the KGB’s directorate thatworked against foreign intelligence inside theUSSR, Nosenko brought quite different, and

more comfortingversions of certainoperations thatGolitsyn hadpartially exposed.Nosenko wasunwilling to defector to meet CIAinside the USSR,but agreed to makecontact wheneverhe travelled to theWest.Anatoly Golitsyn

COUR

TESY

: CIA

* While the KGB doubtless had more contact with

Oswald than Nosenko reported, there is no reason to

suspect the truth of his basic message - that the KGB

had nothing to do with the assassination. The Soviet

leadership is known to have been anxious to convey

this message to the United States because a direr

conclusion might even be a cause for war.

EYE SPY INTELLIGENCE MAGAZINE

57

EYE SPY: The extensive detail you provide onthe Yuri Nosenko defection case shows thatthe CIA leadership and some officers in theSoviet Branch were likely wrong in clearinghim, yet your book, Spy Wars, was cleared forpublication. Do you think this is an indicationthat opinions have changed at CIA regardingNosenko?

THB: It’s not criticism that CIA tries to avoid

when clearing its veterans’ writings for

publication. They’re looking - and rightly - for

any inadvertent disclosure of their sources or

methods or personnel. When the Agency

cleared my manuscript they did find a few, so

of course I deleted them. But that didn’t

significantly reduce or dilute what I had to say.

But to answer the other part of your question,

no, there’s no sign that opinions have

changed there. Nosenko evidently continues

to enjoy CIA’s full confidence.

EYE SPY: You make clear there were twofactions at CIA: those who believed Nosenkowas a bona-fide asset, and others, likeyourself, who strongly believed he and otherKGB personnel who “defected” during thissame period were plants and part of a largedeception plan.

THB: Those who believed Nosenko was

genuine were those who knew least about

how the case unfolded on the scene, and that

includes people who had studied the files. It

still astonishes me to see them defending

Nosenko’s good faith while entirely ignoring -

or distorting - the truly significant facts. I’ve

listed some of those facts in the form of

“Twenty Questions” - matters like Nosenko’s

false claim to have held the KGB job where

he got the most important information he

gave CIA about Soviet spies. Or why he failed

to tell us that his closest associates happened

to be KGB specialists in deception. My

publisher, Yale University Press, put those

twenty questions onto its web site: http://

yalepress.yale.edu;yupbooks.) Not one of

these questions has ever been addressed,

much less answered, by any defender of

Nosenko.

EYE SPY: What role did senior executives atCIA play in deciding who was bona-fide andwhom was not? Why would upper levelmanagers ignore so many strong indicationsof false defections? You stated that some ofthem wanted Nosenko cleared. What weretheir reasons?

THB: Upper level managers had little time or

inclination to delve into the details of the

cases - and they wanted Nosenko cleared.

That’s easy to understand. If they were to

conclude that the KGB had planted Nosenko

on them, they’d have had to ask why. They’d

have to deal with what Nosenko was hiding -

that the KGB had broken American ciphers

and had moles inside CIA. That would bring

troubles down on their heads. Remember

when they discovered a later mole, Aldrich

Ames, in their midst; that didn’t win them any

praise but instead waves of public outrage

and ridicule. That sort of unpleasantness

could be avoided if Nosenko were judged to

be bona-fide. So upper level managers were

understandably receptive to any explanations

- even faulty and distorted ones - that might

clear Nosenko and rid them of what CIA

Director Richard Helms called this “incubus,”

this “bone in the throat.”

After the collapse of the Soviet Union, during thebrief window of opportunity that opened in the1990s (and has since closed), I establishedcontact with former KGB adversaries (who werefully aware of my long work against them) and infriendly conversations got confirmation thatNosenko had been planted by the KGB to hidethe facts 1) that moles in CIA had permitted theKGB to detect great CIA’s spies like Popov andPenkovsky, and 2) that the KGB had recruitedAmerican code clerks who had permitted theSoviet Union to break American ciphers - gaininga war-winning capability.

So I decided to write Spy Wars, in the hope of 1)persuading American authorities to look intothese findings, 2) correcting history, and 3),exposing the dangerous treason of still-undiscovered moles.

Hired assassin? Lee Harvey Oswald

President John F. Kennedy

I N S I D ELANGLEY

Tennent Bagley andEye Spy editorMark Birdsall

“...Nosenko failed to tell us[CIA] that his closest

associates happened to beKGB specialists in deception”

COUR

TESY

: WHI

TE H

OUSE

MED

IA

© E

YE S

PY IN

TELL

IGEN

CE M

AGAZ

INE

© TALISMAN INTELLIGENCE LIBRARY

EYE SPY INTELLIGENCE MAGAZINE

COUNTER SURVEILLANCE

EYE SPY INTELLIGENCE MAGAZINE58

59

Pljesevica Mountain looks like any other in the Balkans, but within its very core asubterranean military complex that once provided Tito’s Yugoslavia with a key defensecapability. It now serves as a NATO communications base.

Photographer and author Simon Belcher journeys inside and provides Eye Spy with anexclusive insight into one of the great secrets of the Cold War �

INSIDE TITO’S

SECRET TUNNELSEYE SPY WORLD EXCLUSIVE

OF PLJESEVICA MOUNTAIN

EYE SPY INTELLIGENCE MAGAZINE

HOW INTELLIGENCEIS COLLECTED

Defectors

Allies

Open Source

Media Liaisons

Electronic Intercepts

Maritime

Agents

HUMINT

Underwater Censors

NAVY

Aircraft

ARMY

Space

Cyber

CUSTOMERINTELLIGENCE MODEL

RAW DATA/INFORMATION

RAW DATA/INFORMATION

UK MI6 USA CIA

COUNTERINTELLIGENCE

INTANGIBLEFACTORS

� � ��TR

AIN

ING

PER

SON

NEL

EXPE

RIE

NC

E

PAST

PER

FOR

MAN

CE

� �

ACTIVEMEASURES

PASSIVEMEASURES

AIR FORCE

INTE

LLIG

ENC

EIN

FOR

MATIO

N

DATA BASE

�� ��

DEC

EPTI

ON

PHYS

ICAL

SEC

UR

ITY

PER

SON

AL S

ECU

RIT

Y

DIS

INFO

RM

ATIO

N

FACTOR

X

Intelligence model shown is used by MI6 and CIA. Foreignpolicy, military and political decisions are often made on the

premise of intelligence. Factor ‘X’ cannot be qualified. Often it isa question of being in the right or wrong place at a given time.

EYE SPY INTELLIGENCE MAGAZINE60

61EYE SPY INTELLIGENCE MAGAZINE

The US intelligence community (USIC) had a great deal of intelligence aboutthe 9/11 attackers. However, the vast and complex structure of the USICmeant that information held by agencies, directorates and even individualswas fragmented. Following the attack, measures were introduced to ensureintelligence could be streamed, pooled, accessed, shared and examined viaa new organ - the Office of the Director National of National Intelligence- ODNI

62

INTELLIGENCEREVIEW•NEWS•DIGEST

MI6 and FSB May Appear at Litvinenko Inquestext year the official inquestinto the strange death offormer KGB officerAlexsander LitvinenkoN

opens. Litvinenko, 43, died afterdrinking green tea during a meetingwith two Russian associates at theMillennium Hotel in London in

November 2006. New Scotland Yardforensic specialists discovered hisbeverage had been laced withPolonium-210. The affair caused amajor rift between Russia andBritain, and to this day, intelligencerelations are poor.

A pre-inquest review was recentlyheld in the city in which HughDavies, counsel to the inquest,referenced the “possible culpabilityof the Russian state.” However, he

also mentioned British Intelligence inthe same context. “One - thepossible culpability of the Britishstate, in carrying out by itself or itsagents the poisoning, or two, failingto take reasonable steps to protectMr Litvinenko from a real andimmediate risk to his life.”

Most intelligence watchersacknowledge Litvinenko wasdeliberately targeted. Police havenamed one man at that meeting -Andrei Lugovoi - as a “person ofinterest.” He denies any involve-ment.

Another interesting possibility is thatboth MI6 and the FSB may become‘interested parties’, in that informa-tion held by both organisations onthe affair might be examined. TheFSB, at time of publication, has yetto respond to the offer. This wouldalmost certainly involve thequestioning of witnesses andanalysis of recorded documentationand conclusions held by theintelligence community.

Alexsander Litvinenko

© L

ITVI

NENK

O JU

STIC

E FO

UNDA

TION

Police at the Millennium Hotelwhere Litvinenko met with two

Russian intel associates

MI5 officers and NSY detectives searchthe Litvinenkos house in London

© AT MEDIA/SNAPPERJACK OF LONDON

INTERESTED PARTIES

he al-Qaida terrorist whoplotted to fly a modelaeroplane packed withexplosives into the Capitol

CAPITOLBUILDINGBOMBER17-year sentence for model

aeroplane bomb plotter

TBuilding and attack the Pentagon,has been jailed for 17 years - thisafter a plea bargain resulted infour other charges being dropped.

US national Rezwan Ferdaus, 27,was caught after an undercoverFBI sting operation in whichagents posed as al-Qaidaoperatives.

In early 2011, US Intelligencediscovered his support of theterror group and desire to killAmerican troopers in Iraq andAfghanistan. During one conver-sation with an agent, Ferdaus saidhe wanted to build cell phonesthat could be modified and usedto detonate explosives.

His use of model aircraft followedmonths of planning and visits to

EYE SPY INTELLIGENCE MAGAZINE

63

Davies acknowledged the varioustheories which abound regardingLitvinenko’s death. Therefore thescope of the inquest could involvenumerous parties, includingLitvinenko’s friend, London-basedbillionaire Boris Berezovsky;Chechen groups and even thecriminal community.

Litvinenko’s widow, Marina, isoptimistic, but says that even if theRussian state is not included, theFSB could be. As for BritishIntelligence Marina said: “What

should also be considered iswhether MI6 should be invited toeither apply or be designated.”

In recent months there has been asuggestion of British involvement -perhaps inspired by the opening ofthe inquest. An even more bizarretheory also surfaced - thatLitvinenko actually poisoned himselfdeliberately or accidentally. Marinasays these are “distasteful” and“not a shred of evidence exists” tosupport these scenarios.

Intelligence-related files have beensubmitted by some UK agencies,but media speculation is rife thatcertain reports have yet to behanded over.

Marina Litvinenko

© AT MEDIA/SNAPPERJACK OF LONDON

© L

ITVI

NENK

O JU

STIC

E FO

UNDA

TION

rench investigators are toexhume the remains offormer Palestinian leaderYassar Arafat, it has beenconfirmed. This follows

POLONIUM-210•ARAFAT•MOSSADFrench and Swiss researchteams will soon discover if

Palestinian leader wasassassinated with radioactive

isotope - Polonium-210

Fmonths of negotiations with variousparties, including his widow Suha,after a Swiss research laboratory,claimed it had discovered traces ofPolonium-210 on some of Arafat’sprivate belongings and clothes.

Suha is but one of many peoplewho believes her husband, who diedin 2004, was deliberately targetedby assassins using the radioactiveisotope.

The autopsy will probably beperformed by Switzerland’s Institute

of Radiation Physics, though a datehas not been decided upon.

After falling ill Arafat was flown to amilitary hospital in Paris. A few dayslater he was pronounced dead, themost likely cause being a stroke.

There has also been speculationthat the Polonium-210 traces were

Yassar Arafat’s tomb in Ramallah

© E

FFI S

CHW

EIZE

R

introduced on the clothing morerecently. Israeli chemical expert DrEly Karmon said: “Because of thehalf-life of the substance, thepolonium is much more fresh...someone planted it later.”

Arafat’s remains are housed in amausoleum in the central West Bankcity of Ramallah.

n al-Qaida terror unit inEgypt were arrested justdays before carrying out anoperation to kill dozens of

BRITONS TARGETED

British tourists in the popular resortof Sharm el-Sheikh. The proposedattack is but one of many conceivedby the group’s supporters - thisfollowing an ‘appeal’ by its leaderAyman al-Zawahiri - to abduct andkill Westerners around the world.

Egyptian intelligence were tipped-offby members of the public who hadbecome suspicious of the comingsand goings at a house. Counter-terrorist police raided the building

MI6 WARNS OF INCREASING INSTABILITY IN EGYPT

Aand discovered a massive arsenalincluding various firearms androcket-propelled grenades.

Eye Spy learned that following theincident, an MI6 signal from itsMiddle East Desk suggested that theForeign Office raise the threat levelfor Britons intending to holiday ortravel to certain locations in theregion. This duly happened afterEgyptian police said the terroristshad planned to “replicate events inMumbai.” The Foreign Officewarned: “There is a high risk ofterrorism throughout Egypt and theSinai.”

Naama Bay, Sharmel-Sheikh

© MARC RYCKAERT MJJR

RezwanFerdaus

the Capitol Building in Washing-ton, but Ferdaus didn’t realise hewas already being surveilled.

By July 2012, he had rented astorage unit and expanded hisplans which included a groundassault with his associates onthe Pentagon. His arms ‘wishlist’ included grenades, auto-matic weapons, a silencer andaround 20lbs of explosives.

EYE SPY INTELLIGENCE MAGAZINE

64

Dragonfly InsectothopterDeveloped by CIA’s Office of Research and

Development in the 1970s, this microUnmanned Aerial Vehicle (UAV) was the first

flight of an insect-sized aerial vehicle(Insectothopter). It was an initiative to

explore the concept of intelligence collectionby miniaturised platforms.

BodywornSurveillanceEquipment

An intelligence officer’sclothing, accessories, and

behaviour must be asunremarkable as possible -

their lives (and others’) maydepend on it. This is a

responsibility that opera-tional artisans, technicians,and engineers of the Office

of Technical Readiness(OTR) take seriously.America’s intelligence

officers can safely collectintelligence in hostile

environments because theyknow that quality and

craftsmanship have been“built in” to their appear-ances, leaving no traces to

alert the enemy.

“Belly Buster”Hand-Crank Audio Drill

CIA used the “Belly Buster” drill during thelate 1950s and early 1960s. It would drill holes

into masonry for implanting audio devices.After assembly, the base of the drill was heldfirmly against the stomach while the handlewas cranked manually. This kit came with

several drill bits and accessories.

Stereoscopeand Case

The stereoscope was usedduring World War II. Thistool helped allied photo

interpreters, who analysedimages of enemy territory

taken by aeroplane-mounted cameras, to viewthe film in 3-Dimension.

Escape and Evasion MapPrinted on silk, which is durable, this map doesn’t rustle andcan be folded up very compactly to be more easily concealed.It also is printed with waterproof dyes so the colours would

not run if the map got wet.

CIA’s Dream Factorya glimpse of the

Letter RemovalDevice

Special devices were used inWorld War II to take letters

from their envelopes withoutopening the seals. The

pincer-like device was insertedinto the unsealed gap at the topof an envelope flap. One couldthen wind the letter around the

pincers and extract theletter from within.

EYE SPY INTELLIGENCE MAGAZINE

65

Robot Fish “Charlie”CIA’s Office of Advanced Technologies

and Programmes developed theUnmanned Underwater Vehicle (UUV)fish to study aquatic robot technology.The UUV fish contains a pressure hull,ballast system, and communicationssystem in the body and a propulsion

system in the tail. It is controlled by awireless line-of-sight radio handset.

Studies in IntelligenceVolume 1, Number 1

Sherman Kent created the publication Studiesin Intelligence in 1955. Kent – the most re-nowned analyst in American intelligence

history – served as a CIA officer from 1950 to1967. Kent envisioned a journal devoted to

intelligence theory, doctrine, and techniques.Studies in Intelligence was born from this

vision. The quarterly journal is still publishedtoday; unclassified issues are published on the

CIA’s Web site.

Microdot CameraThe secret transfer of documents becamevery difficult during the Cold War. Agentsrelied on the microdot camera to photo-

graph and reduce whole pages of informa-tion onto a single tiny piece of film. Thispiece of film could be embedded into thetext of a letter as small as a period at theend of this sentence. Microdots were also

hidden in other things such as rings,hollow coins, or other mailed items. Therecipient would read the microdot withthe aid of a special viewer, often cleverly

concealed as well.

Minox CameraWalter Zapp, a Latvian engineer, developed a

portable camera that would fit easily intothe palm of the hand and yet take high

quality, spontaneous pictures. The Minoxsubminiature camera, in its various models,

was the world’s most widely used spycamera. When it first became available, thecamera was considered a marvel of technol-

ogy; it was originally made from steel inRiga from 1937-1944.

Pigeon CameraCIA’s Office of Research and Development

developed a camera small and light enoughto be carried by a pigeon. It would be

released, and on its return home the birdwould fly over a target. Being a common

species, its role as an intelligence collectionplatform was concealed in the activities ofthousands of other birds. Pigeon imagerywas taken within hundreds of feet of thetarget so it was much more detailed than

other collection platforms.

“Silver Dollar” Hollow ContainerThis coin may appear to be an Eisenhower silver dollar, but it

is really a concealment device. It was used to hide messages orfilm so they could be sent secretly. Because it looks like

ordinary pocket change, it is almost undetectable.

Tobacco Pouch CameraA miniature 35mm film cameramanufactured in Switzerland is

concealed in this modified tobaccopouch. A spring-wound mechanism

advances the film between exposures.

One-Time PadsOne-time pads (OTP) are used to encode/decode agent communications. They areissued in matching sets of two: one forthe encoder and one for the decoder,

and no two pages are alike. Each sheetcontains a random key in the form of

five-digit groups. Once a sheet has beenused to encode a message, it is torn off

the pad and destroyed. If used asdesigned, encryption by OTP is virtually

unbreakable.

This device is a spikethat one could pushinto the ground. It ishollow in the middle

and could containmessages, docu-ments, or film.

“Dead” Drop Spike

EYE SPY INTELLIGENCE MAGAZINE

66

THE PERFECT PLATFORM

MI6 WARNING IGNORED?White House, State Department and CIA deflectcriticism over US Consulate attack in Benghazi,

but was vital intelligence ignored?he brutal execution of USAmbassador ChristopherStevens and deaths of threeother American staffers (formerUS Navy SEALs - Glen Dohertyand Tyrone Wood and computerspecialist Sean Smith) at theT

US Ambassador Christopher Stevens

Benghazi was the focal point of the uprising against Colonel Gaddafi

in other countries. Indeed, at 8.30pm on 11September, Stevens had just bade farewell to aTurkish diplomat. About an hour later dozensof heavily armed men started to attack thecompound. Mortars, rocket-propelledgrenades and heavy weapons were all inevidence. Buildings were set alight and thehunt for the ambassador began. About a mileaway in a building occupied by the CIA,officers there, including a security detail,reported the attack.

COUR

TESY

: DEP

TART

MEN

T OF

STA

TE

‘TRANSFER OF REMAINS CEREMONY’ - ANDREWS AFB

country’s Libyan consulate in September, hasresulted in a public war of words betweendiplomatic, government and intelligencefigures. Initial word from Washington was that

the event happened because of the release ofan amateur anti-Islam film produced in theUnited States. However, it was fairly evident tointelligence and military analysts that theattack was pre-planned, calculated and thoseparticipants had one objective - to assassinateMr Stevens and give America a ‘bloody nose’.There never was a film demonstration.

There had been little sign of trouble in the citythat day, unlike mass protests seen elsewhere

EYE SPY INTELLIGENCE MAGAZINE

67

9/11 anniversary andal-Qaida influence on

fighting factions provided‘perfect platform’ for

attack on US consulate

A Libyan Army tank destroyed in Benghazi during the uprising against Gaddafi. Sincethe dictator was deposed, numerous fighting factions remain, including many

supportive of al-Qaida. Weapons have since been handed in, but MI6 officers warnedthat heavily armed groups continue to operate with near impunity. Prior to the

removal of Gaddafi, both the CIA and MI6 notified London and Washington thatBenghazi was an al-Qaida base. Inset: US Navy SEAL Tyrone Woods

©GL

EN D

OHER

TY M

EMOR

IAL

FOUN

DATI

ON Former US NavySEAL Glen Doherty

died trying to protectAmbassador Stevens.Pictured far right is

Sean Smith - acomputer expert who

also perished

COURTESY: DEPTARTMENT OF STATE

Whilst Stevens hid, there was confusion withinthe CIA annex. The team offered to go to theconsulate, but were reportedly told to “standdown.” Nevertheless, former US Navy SEAL,Tyrone Woods and his colleagues did go toambassador Stevens assistance.

When they arrived at the consulate just before10.00pm, the men came under heavy fire. MrStevens was nowhere to be found, but theydid recover the body of Sean Smith a compu-ter expert. In addition, Woods and hiscolleagues managed to evacuate other staffersback to the CIA building.

And then the CIA building came under heavyfire. The fighting would rage for four morehours during which time the CIA security detailagain contacted their superiors and requestedimmediate support. An hour’s journey away,the US did have a crack Special Forces Deltateam which could have afforded assistance.Also less than 1,500 miles away, US war-planes were at Sigonella Naval Air Station inSicily, Italy, but other forces were much closer.

Perhaps more damning, it later emerged theUS had a specialist army counter-terroristteam at Sigonella. In the confusion, and forreasons unbeknown to anyone, they were notcalled upon.

Above: President Obama andSecretary of State HillaryClinton honour the four

Americans killed by a hostilemob infiltrated by al-Qaida

terrorists

The ‘Transfer of RemainsCeremony’ was held at

Andrews AFB.

Sadly the affair was politicisedby various politicians who

seemed unsure if the incidentwas one of terrorism...

EYE SPY INTELLIGENCE MAGAZINE

SPIES

EYE SPY INTELLIGENCE MAGAZINE68

UNSEENIMAGES OF

9/11

To mark the 5th anniversary of the devastatingterrorist attacks on New York and Washington DC,Eye Spy was provided with dozens of previously

unpublished photographs taken by New York Policedetective Jay Goldberg just hours after the incident

which left thousands of civilians dead.

We are grateful to Jay who was on duty that fatefulday in Manhattan and was one of the first police

officers at the scene. In a later edition Jay provides aunique perspective of how the emergency servicesreacted and the thoughts of those who were there

on that shocking day...

© JAY GOLDBERG

5TH ANNIVERSARY

9/11WORLD EXCLUSIVE

EYE SPY INTELLIGENCE MAGAZINE 69

EYE SPY INTELLIGENCE MAGAZINE70

EYE SPY INTELLIGENCE MAGAZINE 71

SPECIAL OPERATIONS

EYE SPY INTELLIGENCE MAGAZINE72

ESPIONAGEREVISITED

' LAW ENFORCEMENT PICTURE LIBRARY/STEVE MCMANUS

An MI6 undercoveroperation was

exposed after Russianintelligence officialsmonitored an agent

contact area. In2004, the FSB

reportedly placed aMoscow-based UK

diplomat undersurveillance after

receiving intelligencethat the official - aformer Durham

University graduatewas an agent.

The surveillance -according to FSB

officials - led them toa Moscow street anda most remarkable

discovery...

Moscow accuses Britain’s MI6 ofunder-the-counter spy games

COLD WAR

EYE SPY INTELLIGENCE MAGAZINE 73

FSB COMPROMISE MI6 INTELLIGENCithout warning, Russianstate television stationRossiya, broadcast adocumentary about thespy games whichapparently came as asurprise to British

Prime Minister Tony Blair. He said heonly became aware of the affair afterswitching on his television and flickingthrough the Teletext pages. Mr Blairsaid: “I’m afraid you are going to get theold stock-in-trade ‘we never commenton security matters’... except when wewant to, obviously. I think the less saidabout that, the better. ”

Central to theRossiya claims wasa light brownplastic ‘rock’about 15 incheslong. The objectwas hollow andinside the water-tight box, acommunicationssystem for trans-mitting and

receiving signals. The device waspowered by several long-life lithiumbatteries. Moscow claims it was placedin the park in September 2005 by an“MI6 officer already under surveillance.”

Tony Blair

The incident comes at a time when bothnations have increased intelligence-gathering levels to that once witnessedin the Cold War. The Federal SecurityBureau (FSB) learned of the operationlast summer, but decided to gather asmuch information as possible in aneffort to limit UK denials.

Television schedules gave no hint of thebroadcast and the story has captured theimagination of people throughout theworld. However, for the supposed MI6officers named by Moscow, the incidentis worrying - but not so dangerous likethat of a fourth man - a Russian nationalwho has been accused of “involvementin activities against the state.” A subtlephrase used to mean ‘spy’. He hasalready confessed to espionage. FSBsources say he was recruited by MI6while attending a British university -though that has not been confirmed.

Weeks prior to the broadcast, it isunderstood that senior British diplomatsin Moscow and London were invited tomeetings with officials from the FSB.They were questioned about theirknowledge of “certain activities” takingplace just off a city street next to a park.The UK diplomats were apparentlypuzzled and baffled by the line ofquestioning. A diplomat, described by

‘Here we see how he comes close to the rock, holding the device in hishands. You can see how he tries to retrieve information. It looks like

something goes wrong with the process because first he walks to one sideand then he changes direction and walks to another side but still the

information doesn’t come. Then he goes closer to the trees as if pretend-ing that he wants to relieve himself. By using these false movements he

comes close to the rock and kicks it.’ - Russian TV commentator

the Foreign Officeas third secretary atthe British Embassyin Moscow, wasasked that MI6“desist its opera-tion.” The FSBclaim he too is inthe employ of MI6.

The UK dismissed the allegations, butSergei Ignatchenko, chairman of theFSB’s media centre, explained whathappened next: “They [MI6] began todeny it and claimed that they weren’tworking against us at all.” That messagewas related to Moscow and a decisionwas then made to expose the affair. “It

Sergei Ignatchenko

Nikolay Patrushev - head of the FSB is saidto be “delighted” that the MI6 espionagehas been “compromised” by his service

W

EYE SPY INTELLIGENCE MAGAZINE74

CE OPERATION“According to our

experts’ assessments,this device costs

several tens of millionsof pounds [to develop].You could only create

this technologicalwonder in laboratory

conditions...”

was only then that we decided to gopublic,” said Ignatchenko. “We considerthis a breach of our agreements. Inessence we were deceived.”

Those ‘agreements’ referred to by MrIgnatchenko, supposedly centre upon a‘gentlemen’s agreement’ reached byMoscow and London in 1994 thatneither country will participate inespionage activities against each other.However, one year ago President Putinpublicly ordered his intelligence servicesto “get more active abroad.” MI5 also

warned that Russian intelligence gather-ing is on the increase in the UK and anumber of suspects are under surveil-lance. It is believed Moscow has around40 SVR officers operating in the UK.

X-ray of the alleged MI6 spyingdevice retrieved by the FSB - five

lithium batteries are visible

Russia’s media has published the names and photographs of the four alleged MI6 officers

The Russians also claim that one of theMI6 officers had been authorisingpayments to Russian non-governmentalorganisations (NGOs), including civilrights groups. During the documentary,

The devicecontained at least

five long-lifelithium batteriessuggesting the

operation was ofsome duration

EYE SPY INTELLIGENCE MAGAZINE 75

SPECIAL INTELLIGENCE FORCES

EYE SPY INTELLIGENCE MAGAZINE76

PHOTOGRAPHY TRADECRAFT

EYE SPY INTELLIGENCE MAGAZINE 77

78

SHOOT TO KILL

The extraordinary security operation toprotect the London Olympic Games isevidenced in these photographs showingArmy deployment of a surface-to-air missilebattery in the city. Already the Royal Navyhas warships on the River Thames, and theRAF has moved several powerful Typhoonfighters to RAF Northolt on the outskirts ofLondon.

Some 40,000 people will work in variousareas of security, including hundreds ofsurveillance operatives to monitor suspi-cious behaviour. Several elite snipers willoperate in the city. MI5 has advised seniorgovernment officials that there is a possibil-ity al-Qaida or Irish dissidents may strike.Analysts note the event will be watched bybillions of people around the world, afford-ing a major propaganda opportunity.

LONDON 2012OLYMPIC GAMES

SECURITY

Good morning! Residents opened theircurtains to this sight. Sadly, it is a necessityagainst the possibility of an airborne attack

© HALA/SNAPPERJACK OF LONDON

© H

ALA/

SNAP

PERJ

ACK

OF L

ONDO

N

EYE SPY INTELLIGENCE MAGAZINE

79

A somewhat surreal image at Blackheath. Against the backdrop of London’s financial district (Canary Wharf) and a passingred bus, an Army Rapier missile battery is deployed. The Ministry of Defence has confirmed it has authorised the shooting

down of any rogue aircraft that presents a danger to the Olympic Games and the city as a whole

Senior officers from all three UK armed forces, New Scotland Yard, MI5, MOD andHome Office discuss the deployment of the missile system at Blackheath.

Figs. 1 and 2. Scenes from HMS Ocean which is docked in Greenwich. The ship is carrying Lynx helicopters which will be usedto deploy Special Forces and Counter Terrorist Command officers in an emergency. Fig. 3. The RAF also have a major airborne

presence at the Games. These Typhoon fighters have been relocated to RAF Northolt. In early May, a major exercise was hosted bythe base code-named Olympic Guardian

Fig. 1 Fig. 2 Fig. 3

© H

ALA/

SNAP

PERJ

ACK

OF L

ONDO

N

© SNAPPERJACK OF LONDON

© RAF/ROYAL NAVY/CROWN COPYRIGHT

EYE SPY INTELLIGENCE MAGAZINE

80

Criticism over a failed MI6 operation to secure a secretcommunication channel to Libyan rebels is unjustified. This is

the opinion of many senior intelligence analysts whorecognise that nothing supersedes the importance of

obtaining human intelligence (HUMINT) and an avenue to talk...

n the early hours of 5 March 2011, anurgent government inspired memo wassent to the editors of a number ofnewspapers and television channels,including Eye Spy. An incident was beingwidely reported in the Middle East thatdetailed the detention of several BritishSpecial Forces (SF) soldiers and aI

‘diplomat’ in eastern Libya. The advisoryurged caution when disclosing the identity ofthe group.

However, within hours it transpired that a topsecret UK intelligence operation had beenexposed; furthermore, the diplomat was in

MOST DANGEROUS:MI6 Chief Sir John Sawers was calledupon to use the Service’s worldwidenetwork to make contact with centralfigures opposed to Colonel Gaddafi

fact a senior MI6 officer with much experiencein Libyan matters, and with an apparentcontact on the ground. Indeed, Eye Spyunderstands that at least two MI6 men wereattached to the group.

THE INCREMENT

This dangerous ‘back-channel’ operation wasgreen-lighted by Downing Street in an effort tocement a proper liaison with officials in theanti-Gaddafi movement. The MI6 officer waspart of a SF unit that combined both SAS(Special Air Service) and SBS (Special BoatService) personnel. When these units are

EYE SPY INTELLIGENCE MAGAZINE

MI6 NIGHT GAMESdrawn together and either head-up or supportan MI6 operation, they usually form what isknown in British Intelligence as ‘The Incre-ment’.

MI6 Station Chiefs have access to TheIncrement only in the event of ‘extraordinarycircumstances’ or when national security isthreatened. Other elements involved in thecreation of such a unit may involve the JointSupport Group (JSG), Joint Special ForcesAviation Wing (JSFAW), and the StrategicReconnaissance Regiment (SRR).

81

CALCULATED RISK:Britain’s Foreign Secretary William Hague

assembled senior intel and military officials anddecided to launch a night-time operation that

Downing Street considered “absolutely essential”...

The team were secreted into the desert duringthe dead of night by way of at least oneChinook helicopter flying from Malta. Reportsfrom Libya state two helicopters wereinvolved. Their destination was a sprawlingilluminated desert farm complex near the rebelheld city of Benghazi. Indeed, the site called‘Farmco’ covers nearly 40,000 acres. Eye Spyunderstands that MI6 did have a contact manon the ground who had alerted a local rebelcommander about the flight. He was suppos-edly called ‘Tom Smith’, a Welsh man, thoughthere has been a great deal of speculation thisis but a pseudonym. He was listed on aForeign Office web link and reportedly playeda role in the rescue and coordination ofBritons wanting to leave Libya.

However, in the heart of the desert, otherforces notified by farm hands observed theSAS-MI6 group land and were angry abouttheir presence. Not wishing to make a tensesituation worse, the group decided to cooper-

ate with the rebels and laid down their arms.From inside the helicopter, a large quantity ofexplosives, ammunition, maps, fake identitypapers and passports were allegedly seized.Eye Spy believes tracking devices wererecovered from various objects.

TIME-LINE AND TELEPHONE INTERCEPTION

It seems clear that Tom was MI6’s groundcontact at the Farmco plant, owned by the Al-

Happier times... Colonel Muammar Gaddafi andSpain’s President Jose Luis Rodriguez Zapatero

© L

A.M

ONCL

OA.E

S

Eye Spy examines theBritish Intelligence

precursor mission to

OPERATIONELLAMY

MI6 Station Chiefs have accessto The Increment only in the

event of ‘extraordinarycircumstances’ or when national

security is threatened

EYE SPY INTELLIGENCE MAGAZINE

Khadra Farm Company, about 18 miles south-west of Benghazi. Some reports state Tom,who had worked for about five months as anadministrator at the company, intended to usea secure room to support the mission. Thoughthe operation had started well in Malta, Tom’snight-time activities had caught the eye of atleast one colleague. At 3.00am a farm guardwatched him drive out of the complex;minutes later the sound of a helicopter couldbe heard. A short while later the Special

82

SURVEILLANCEP H O T O G R A P H Y

TRADECRAFT

WITH PETER JENKINS

Part Two

SLR CAMERASDIGITAL

SELECTING CORRECT EXPOSUREBeing able to select correct exposure settingson a camera used in surveillance work can seemdaunting. However, in this feature Peter Jenkins,one of the world’s most respected surveillancetrainers demystifies the subject and provides astep-by-step guide to understanding exposureand various topics associated with this mostimportant photographic element...

Adigital camera is a light proofbox with a light sensor calleda Charge Coupled Device(CCD) at one end andinstead of film, a lens at theother, which focuses light

HOW A DIGITAL CAMERA WORKS

onto the sensor to produce a ‘correct exposure’.A correct exposure is where the camera readsthe amount of light available and selects the idealshutter speed and respective aperture size.Some areas of the picture may be in shade,another parts in bright light, thus the camera’smeter calculates an average to obtain a correctexposure. There are three factors that control theamount of light that enters the camera and hitsthe sensor:

• The diameter of the lens, wider is better butexpensive• The length of time the shutter is held open(shutter speed)

• The diameter of the aperture within the lens,which we call ‘aperture’

Different combinations of these factors createvarious effects to the image, which are veryimportant. In any mode (apart from the manualsetting) the camera will always compute what itconsiders to be a correct exposure. The correctexposure is a combination of shutter speed andaperture setting

Initial pressure on the shutter button focuses thelens and also takes a light reading; the cameracalculates what it considers to be the bestaperture and best shutter speed to use. Both arerelated because as you alter the shutter speed,the aperture is also affected. The slower theshutter speed, the smaller the aperture. Thefaster the shutter speed, the wider the aperture.

Shutter speed is the amount of time the shutter isheld open to allow sufficient light to fall on thesensor before closing again.

Shutter speed is measured in fractions of asecond, such as:

It is very important especially when filming inlow light; moving subjects and shooting withtelephoto lenses. A shutter speed of 1/125th or1/250th is a good number to use for most shotsbut we will look at this in-depth a little later.

1/15 1/30 1/60 1/125 1/250 1/500 1/1000

1/250th

1/100th

1/60th

1/20th

APERTURE

As stated, the aperture is the size of the hole thatallows light to reach the sensor and is controlledby a moving diaphragm inside the lens. The size

PHOT

OGRA

PHS

© S

URVE

ILLA

NCE

TRAD

ECRA

FT

EYE SPY INTELLIGENCE MAGAZINE

83

of the aperture can be altered and is given anumerical value which represents the size. Thesevalues are called ‘f’ numbers or ‘f stops’ andfollow in sequence:

“Photography, whether one likesit or not, is a crucial element ofsurveillance work...”

f:2 2.8 4 5.6 8 11 16 22

f16

f8

f4

f2

f2 being the widest aperture, letting in lots oflight and f22 the smallest, letting in less light.The series as a whole is arranged so that each fnumber lets in twice as much light as theprevious number.

wide aperture such as f1.4 or f2.8 willallow plenty of light in and this isneeded in a low light situation which iscommon in surveillance photography,

WHY IS APERTURESO IMPORTANT TO

THE SURVEILLANCEPHOTOGRAPHER?

Aespecially in the early morning or in the evening.In addition, a larger aperture will allow you to usefaster shutter speeds, which is extremelyimportant with a telephoto lens. Whether you usea small or large aperture also has a strangeeffect on the image which we call ‘depth of field’and is described next. Essentially, in surveillance,a wider aperture is best (or ‘fast’ lens) but theycan be expensive.

EXPOSURE MODES

Many cameras have different exposure modes.Its respective manual should explain what modesare available, such as:

• Automatic• Programme• Shutter Priority• Aperture Priority• Manual• Shortcut Modes• Automatic Exposure

Most SLR cameras have an automatic mode andit is usually identified by a green symbol on themode dial. In this mode, all that is needed to takea picture is to point the camera, which takes ameter reading and automatically sets thecameras aperture setting and shutter speed toobtain a correct exposure (the flash will pop up ifrequired). This is a good setting for the novicebut not always ideal in surveillance photographywhere more control over the camera is required.

PROGRAMME MODE: In this mode, the cameratakes an exposure reading and suggests the bestsettings to use. Turning the control dial canmanually alter the shutter speed and the cameraselects the correct aperture to match. This modeis used to give you more control over which

Exposurecontrol on atypical Nikon

camera

shutter speed or aperture to use in order toobtain certain effects. Let’s imagine you’ve justtaken a meter reading and your camera suggestsan exposure of 1/125sec at f8. To achieve thesame exposure but with a faster shutter speed(to capture movement), you turn the control dialto use any of the following aperture and shutterspeed combinations:

Camera shutter speed and aperturedata highlighted in red box

2.8 4 5.6 8 11 161/1000 1/500 1/250 1/125 1/60 1/30

The combination you choose depends on whattype of effect you are trying to achieve.

SHUTTER PRIORITY: When in this mode, youmanually set the shutter speed and the cameraautomatically sets the aperture. Your choice ofshutter speed affects how moving subjects willappear in the picture. Slow shutter speeds suchas 1/15 or 1/30 of a second, will blur movingsubjects. Fast shutter speeds such as 1/250, 1/500 or 1/1000 of a second can be used to freezethe action of a moving subject. Fast shutterspeeds are required when using telephoto lensesto prevent camera shake.

© EYE SPY

EYE SPY INTELLIGENCE MAGAZINE

84

OF AMERICAN INTELLIGENCEORIGINS

The United States Intelligence Community is recognised as the world’s biggest employer of intelligence and security personnel.With over a dozen premier agencies and numerous other ‘service organisations’, it is a complex and impressive organ thatfunctions in every corner of the world. Though some of its agencies are regarded as ‘youthful’ in terms of the date of their

creation, the actual origins of American Intelligence are hundreds of years old...

EYE SPY SECRET HISTORY

“The necessity of procuringgood intelligence is apparent

and need not be furtherurged... All that remains forme to add is, that you keep

the whole matter as secret aspossible. For upon secrecy,success depends in most

enterprises of the kind, andfor want of it, they are

generally defeated, howeverwell planned and promising a

favourable issue.”

George Washington 26 July 1777

A

Robert Morris of the SecretCommittee was nicknamed “The

Financier” because of his financialsupport of the American Revolution

tion relative to foreign affairs”was shifted to the new body,whose secretary was empow-ered to correspond “with allother persons from whom hemay expect to receive usefulinformation.”

ven before setting upthe Committee of SecretCorrespondence, theE

Second Continental Congresshad created a SECRETCOMMITTEE by a resolutionon 18 September 1775. Thiscommittee was given widepowers and large sums ofmoney to obtain militarysupplies in secret, and wascharged with distributing thesupplies and selling gunpow-der to privateers chartered bythe Continental Congress.The committee also

THE SECRET COMMITTEE

for foreign intelligence andforeign alliances, the SecondContinental Congress createdthe COMMITTEE OF CORRE-SPONDENCE by a resolutionon 29 November 1775:

RESOLVED, That a committeeof five would be appointed forthe sole purpose of corre-sponding with our friends inGreat Britain, and other partsof the world, and that they laytheir correspondence beforeCongress when directed;

RESOLVED, That this Congresswill make provision to defrayall such expenses as they mayarise by carrying on suchcorrespondence, and for thepayment of such agents as thesaid Committee may send onthis service.

he committee was soonrenamed the COMMIT-TEE OF SECRETT

SECRET CORRESPONDENCE

CORRESPONDENCE. Itsmembers were BenjaminFranklin of Pennsylvania,Benjamin Harrison of Virginia,and Thomas Johnson of

Maryland. This was effectivelyAmerica’s first foreign intelli-gence directorate.

The committee employedsecret agents abroad, con-ducted covert operations,devised codes and ciphers,funded propaganda activities,authorised the opening ofprivate mail, acquired foreignpublications for use in analysis,established a courier system,and developed a maritimecapability apart from that ofthe Navy.

On 17 April 1777, the Commit-tee of Secret Correspondencewas renamed the COMMITTEEOF FOREIGN AFFAIRS, butkept with its intelligencefunction. Matters of diplomacywere conducted by othercommittees or by the Congressas a whole.

With the creation of a Depart-ment of Foreign Affairs - theforerunner of the Departmentof State - on 10 January 1781,correspondence “for thepurpose of obtaining the mostextensive and useful informa-

merica has carriedout foreign intelli-gence activities forwell two centuries.Recognising the need

EYE SPY INTELLIGENCE MAGAZINE

85

The “Secret Corresponders” L-R Benjamin Franklin, Thomas Johnson, Benjamin Harrison

civilian espionage act, andmilitary law did not providepunishment severe enough toafford a deterrent, in thejudgment of Patriot leaders.

THE AMERICAN COMMITTEE ON SPIES 5 JUNE 1776: John Adams, James Wilson, Edward Rutledge, Robert Livingston and Thomas Jefferson

Adams, Sherman, Livingston, Jefferson, Franklin - The Committeeappointed to prepare the Declaration of Independence

of the Congress: BenjaminFranklin, Robert Morris,Robert Livingston, JohnDickinson, Thomas Willing,Thomas McKean, JohnLangdon, and Samuel Ward.

n 5 June 1776, theCongress appointedJohn Adams, Thomas

THE COMMITTEE ON SPIES

OJefferson, Edward Rutledge,James Wilson, and RobertLivingston “to consider what

took over and administered ona uniform basis the secretcontracts for arms and gun-powder previously negotiatedby certain members of theCongress without the formalsanction of that body. Thecommittee kept its transactionssecret, and destroyed many ofits records to assure theconfidentiality of its work.

The Secret Committee em-ployed agents overseas, oftenin cooperation with theCommittee of Secret Corre-spondence. It also gatheredintelligence about Tory secretammunition stores andarranged to seize them. TheSecret Committee sent mis-sions to plunder Britishsupplies in the southerncolonies. It arranged thepurchase of military storesthrough intermediaries so as toconceal the fact that theContinental Congress was thetrue purchaser. The SecretCommittee used foreign flagsto protect its vessels from theBritish fleet.

Those appointed to thecommittee included some ofthe most influential members

is proper to be done withpersons giving intelligence tothe enemy or supplying themwith provisions.” The samecommittee was charged withrevising the Articles of War inregard to espionage directedagainst the patriot forces.

The problem was an urgentone. Dr Benjamin Church,chief physician of the Conti-nental Army, had already beenseized and imprisoned as aBritish agent, but there was no

n 7 November 1775, theContinental Congressadded the death penalty

DEATH TO SPIES

Ofor espionage to the Articles ofWar, but the clause was notapplied retroactively, andChurch remained in jail.

On 21 August 1776, thecommittee’s report wasconsidered by the ContinentalCongress, which enacted thefirst espionage act:

RESOLVED, That all personsnot members of, nor owingallegiance to, any of the UnitedStates of America, as describedin a resolution to the Congressof the 29th of June last, whoshall be found lurking as spiesin or about the fortification orencampments of the armies ofthe United States, or of any ofthem, shall suffer death,according to the law and usageof nations, by sentence of acourt martial, or such etherpunishment as such courtmartial may direct.

It was resolved further that theact “be printed at the end ofthe rules and articles of war.”

On 27 February 27 1778, theContinental Congress broad-ened the law to include any“inhabitants of these states”whose intelligence activitiesaided the enemy in capturingor killing Patriots.

EYE SPY INTELLIGENCE MAGAZINE

86

EYE SPYE

no additional power source as the cameraand audio is powered directly from theMP4 device.

The camera is lightweight and low inprofile. Because it is a modular camera itcan be also be used in a purse, bag,backpack, tie, hat etc. Nevertheless, westill recommend it should be worn in thesternum area. Of added advantage, it hasjust one tough but very slender lead thatplugs directly into the recorder.

Many surveillance operatives wronglyassume that a hat or eyeglass cameraprovides the best viewpoint. While a headmount does allow the user added move-ment of the camera, we have seen resultsthat include too much sky and ceilings inthe top half of the frame. Similarly, thefootage can be jerky or blurred in replay. Itis also a little difficult to hide the wire fromthe head to the recorder.

The camera’s 80 degree field of vision isquite adequate. Correctly fastened in thebutton hole it is totally invisible.

Quality Button Camera with Digital MCOVERT BLACK

EQUIPMENT MANUFACTURERS SHOULD CONTACT EYE SPY BEFORE FORWARDING SAMPLES FOR REVIEW

PRODUCT REVIEWye Spy’s COVERT BLACKreviewed in issue 43 is ideal forthe professional, but didn’tnecessarily meet the needs ofall our readers, some who

wanted a more affordable system. Thanksto the efforts of colleagues who spent aconsiderable time sourcing cameraproducts for an ideal combination set, webelieve we have found something quitespecial. Lower costs occasionally equatesto inferior quality, but this is not the casewith COVERT BLACK ECONOMY - arecording system that still provides qualitycolour film footage and audio. As with ourmore expensive set, this button camerarecorder comes complete with a highquality display, has audio capability andimportantly, is easy to use. There ishowever, one main difference - the price.

The quality of the camera is outstanding.With 380 horizontal TV lines it performs wellin low light and works in either PAL orNTSC formats. Its small size makes it theperfect combination for body worn applica-tions. Like Covert Black, the unit requires

he DVR is small enough to fit into astandard sized cigarette packetand has a built-in screen to check

Affordable - Superb Results

MP4 DIGITAL VIDEO RECORDER (DVR)MP4 DIGITAL VIDEO RECORDER (DVR)MP4 DIGITAL VIDEO RECORDER (DVR)MP4 DIGITAL VIDEO RECORDER (DVR)MP4 DIGITAL VIDEO RECORDER (DVR)

Tthe footage as it is being collected. Theunit also comes with a set of high qualityearphones to monitor the audio duringplayback and can be used as a standardMP4 player. It has an excellent time displayallowing frames or footage to be accuratelydetailed - ideal for data used in legalcases. The unit has 512 MB internalmemory and will hold approximately fourhours of video. An optional 1GB SD cardenables you can record an additional eighthours.

To playback, simply plug the supplied USBcable into a computer. The computer

automatically finds and detects the cameraand files can be accessed. Files can beplayed on any media such as WindowsMedia Player or Real Player.

SUMMARY: The system is easy tooperate and conceal and produces high-quality imagery and audio. The camera isexcellent and matched by the DVR.Uploading the footage takes seconds, andmore importantly, programmes areavailable that compress large files allowingthe user to store hours of film on a singleCD, for example. In terms of performanceand quality, Covert Black Economy is greatvalue.

EYE SPY INTELLIGENCE MAGAZINE

87

Quality metal carry case

One set ofbuttons

Multi-functionDVR recorder

with in-builtscreen providingpower to camera

and audio

Professionalear phonesfor discreet

listening

Camera andaudio recorder

Lead to PCfor playback

editing

Lead for playbackon television orrecord to video

MP4 RecorderECONOMY

overt Black Economy comes with one set of matching buttons in dark blue. Covert Black has foursets of interchangeable buttons and screws (the screw heads allows for concealment in wallpanels). The Covert Black set has slightly better image quality - 450 horizontal lines against

Specifications:Video signal system: PAL/NTSCPhoto-image sensor: 1/3 CMOSCOLOURLow Illumination: 2.0luxHorizontal Resolution: 380TV LinesS/N ratio: Min.48dBVideo output: 1.0-/75ohmsBacklight: AutoOperating Temp: -10/+50Power Supply: DC 8VLens: 3.6 mmMP4 Player Specifications

Supports multi-language display,supports WMA/WAV/ADPCM/PCMaudio formatStandard USB2.0 interface, with built-in SD/MMC card slot, 512MBmemory flashSupport folder management functionand view functionSupports ASF format, ADPCM stereosound, or convert to ASF format bytransfer toolsJPEG formatSet up function: time / calendar,language, game, storage/checkmemory, game/auto power off2.5" TFT OLED 260K colour 16k,pixels support: TV OUT /INBuilt-in Mic / speaker; Built-in 2300lithium batteryBuilt-in MicrophoneVideo form: ASF shade is broadcast:6 hoursPicture browsing: support EXIF2.1Power Supply: 3.7V lithium batteryPlaying time: 8 hoursDimensions:60(H)*90(W)*17.5(D)mm

COVERT BLACK VERSUS THE ECONOMY SYSTEMCOVERT BLACK VERSUS THE ECONOMY SYSTEMCOVERT BLACK VERSUS THE ECONOMY SYSTEMCOVERT BLACK VERSUS THE ECONOMY SYSTEMCOVERT BLACK VERSUS THE ECONOMY SYSTEM

CCBE’s 380. You can use a 4GB SDcard with Covert Black, though it onlytakes a few seconds to insert an emptycard. Two distinct advantages of theeconomy set are its superb hard sidedcarry case and stronger primary lead.

As with other systems, Covert BlackEconomy is not rainproof so care mustbe taken when operating outdoors.However, with a little imaginationprotective housings can be built.

Assembly time to operation is just twominutes.

EYE SPY INTELLIGENCE MAGAZINE

SURVEILLANCE TRADECRAFT

EYE SPY INTELLIGENCE MAGAZINE88

FBI counter-intelligence arm investigatesalleged Russian front company exporting highlysensitive electronic equipment to the FSB and

Russian armed forces...

89

FORBIDDEN EXPORTSMICROCHIPS, MISSILE GUIDANCE AND TRAFFIC LIGHTS

By Paul Beaumomt

ARC ELECTRONICS INC.rom around October 2008 to2012, employees of a com-pany based in Houston, Texas,along with others, procuredhigh-end electronics andF

exported them to customers overseas.Unfortunately the FBI said the paperwork wasnot as it should be, having been deliberatelypenned to mislead any authority that mightcare to inspect it. After all, how could onewrite the destination address of RussianIntelligence as the recipient?

Apart from tough rules regulating exportsworldwide, the United States has other

statutes it can call upon: The InternationalEmergency Economic Powers Act, The ArmsExport Control Act and so on.

Two firms at the centre of the FBI investigationshared a principal officer, Alexander Fishenkoaged 46. He was born in the former Sovietsatellite of Kazakhstan and became a UScitizen in 2003. According to court records hesaid he had no military background, but hassince admitted he did work for a Sovietintelligence unit in the 1980s. The FBI accuseFishenko of operating as an unregisteredRussian Government agent - something whichMoscow denies.

The companies have beennamed as Arc ElectronicsInc. of which Fishenkowas co-owner andpresident, and Moscow-based procurementcompany Apex System,LLC. Sergey Klinov wasits CEO and Fishenko aprincipal, having foundedthe company in 1998.Alexander Posobilov was director of procure-ment for Arc Electronics. He was arrested at

AlexanderFishenko

© IS

S TR

AINI

NG L

TD

EYE SPY INTELLIGENCE MAGAZINE

INTELLIGENCE AND SECURITY

EYE SPY INTELLIGENCE MAGAZINE90

In the last edition ofEye Spy we took a candidlook at Unmanned AerialVehicles (UAVs) and how

they are changing theSurveillance Rule Book.Now a new technologyloosely connected to

UAVs is about to changethe Spying Game...

EYE SPY INTELLIGENCE MAGAZINE 91

92

SILENT SERVICESUBMARINES, TECHNOLOGY AND ESPIONAGEPaul Beaumont provides insight into two

recent submarine spy cases, and theincredible importance of securing naval

intelligence secrets...

aintaining security aboardsubmarines is of para-mount importance to anynavy. Perhaps more vital isthat the whereabouts ofthe boat’s technology and

Mweaponry remain secret. Historically, the Westand East, especially during the Cold Warbattled to glean intelligence on submarines.Today powerful maritime nations such as the

United States, Russia and Britain have beenjoined by China - a nation with a reputation forespionage and duplicating technology.Knowing where a submarine is at any stage ofits mission is a bonus for an adversary. Thusespionage cases involving mariners andsubmariners are always big news. The RoyalNavy is not immune to espionage.

On 3 September 1971, a Ministry of Defence(MOD) signal form marked SECRET wasgenerated by the Vice Chief Naval Staff. It wasan advisory notifying a number of parties thata naval officer of Sub-Lieutenant rank hadbeen acting on behalf of the Soviets and hadalready passed on documents to Moscow. Itlater transpired that a number were of thehighest security gradings.

In the late 1990s, Chief Petty Officer StevenHayden sold Gulf War data to The Sun

MI5 AND FBI ENGAGE SIMILAR STING OPERATIONS

Edward Devenney - jalied

SECR

ET

EYE SPY INTELLIGENCE MAGAZINE

SPY CATCHING

EYE SPY INTELLIGENCE MAGAZINE 93

by David HamerFort Meade...being an irregularly occa-sional, or an occasionallyirregular, communication fromthe American cryptologicalcommunity: particularly thosethings associated with theNational Cryptologic Museum[NCM] and its parent, theNational Security Agency[NSA]

Letter from

On a somewhat irregular basisthe National Security Agencyand its companion organisa-tion, the Central SecurityService [NSA/CSS],declassifies and releasesdocuments into the publicdomain. The following list

gives an example of those releases that relateto many of the world-shaking, historicalevents that have occurred during the lastcentury. In accordance with Executive Order12958 dated 17 April 1995, which deals withclassified national security information, NSAreviews for declassification all permanentlyclassified documents that are 25 years orolder. When a document is declassified it istransferred to the US National Archives andRecords Administration [NARA] located inCollege Park, MD where it becomes availablefor study by historians of intelligence andother researchers in related fields of interest.

Recent releases include documents dealingwith the following incidents:

• Gulf of Tonkin• The attack on the USS Liberty• VENONA• Korean War• Cuban Missile Crisis• Unidentified Flying Objects (UFOs)• John F. Kennedy Assassination• Truman Memorandum 24 October 1952

Lockheed U-2 spy plane reconnaissancephotograph of soviet missile sites on Cuba

The NARA index contains nearly 5,000 entriesand lists approximately 1.3M pages ofdocuments, formerly classified and nowreleased into the public domain. Releasedmaterial covers a period beginning with WWI.However, a significant number of formerlyclassified documents are available for theasking, or at least for the downloading inelectronic format, from the NSA website athttp://www.nsa.gov/ - select Public Info/Declassification Initiatives and then choosethe particular topic of interest. Each of theabove categories contains several sub-headings that contain hyperlinks to PDF,HTML, GIF, WAV, PostScript and otherappropriate media files.

VENONATHE REAL COD

EYE SPY INTELLIGENCE MAGAZINE94

VENONA Intelligencedocuments notingJulius Rosenberg’scode name - Liberal

CO

URTE

SY F

BI

he US Army’s Signal Intelligence Service, theprecursor to the National Security Agency,began a secret programme in February 1943later codenamed VENONA. The mission of

VENONA

Twas to examine and exploit Soviet diplomatic commu-nications but after the programme began, the messagetraffic included espionage efforts as well.

Although it took almost two years before Americancryptologists were able to break the KGB encryption, theinformation gained through these transactions providedUS leadership insight into Soviet intentions and treason-ous activities of government employees until theprogramme was cancelled in 1980.

The VENONA files are most famous for exposing Julius(code named LIBERAL) and Ethel Rosenberg (below) andhelp give indisputable evidence of their involvement withthe Soviet spy ring.

TTHE CODEBREAKERS

library collection comprising a wide spec-trum of printed works on cryptology and

he National Cryptologic Museum[NCM] recently received from world-renowned author and cryptologyexpert Dr David Kahn his large

DEBREAKERS

Dr David Kahn:Expert in codes;cryptography;political militaryand communica-tions intelli-gence; author ofbooks, articlesand publicationson ciphers andAmericanintelligence

EYE SPY INTELLIGENCE MAGAZINE 95

96

OPERATION SEAGRAMAs the trial of suspected al-Qaida operatives begins, MI5

consider the theory that not everyone involved in theLondon and Glasgow bomb plots have been identified

THE TIGERTIGER & GLASGOW AIRPORT ATTACKSMI5

Police cordon-off Neuk Crescent home to the bombers in Houston

The trial of two men who worked as doctors in the United Kingdom has begunin London. Bilal Abdulla, 29, and Mohammed Asha, 28, appeared atWoolwich Crown Court on 9 October, charged with the attempted murder ofhundreds of party-goers at the TigerTiger nightclub on 29 June 2007. Thefollowing day they drove a jeep packed with gas cylinders at speed into thepassenger area of Glasgow International Airport. The driver of that vehicle,

Kafeel Ahmed, 28, died a month later after suffering extensive burns.

The suspected al-Qaida terrorist sleeper cell had driven to London in two specially preparedMercedes cars which they believe would ‘blend-in’ with other luxury vehicles in the capital. Theplotters also believed the Mercedes brand would attract little attention if left unattended in theWest End. The boots (trunk) of the vehicles were large enough to conceal large gas cylinders,petrol canisters, explosives and 900 large nails.

EYE SPY INTELLIGENCE MAGAZINE

97

© KEVIN PATTERSON PHOTOGRAPHY

© SNAPPERJACK OF LONDON

Left: Dr Asha was arrestedon the MI6 in a huge

counter-terrorist operationinvolving over a dozensurveillance vehicles.

Below: An off-duty policeofficer pours water on

Kafeel Ahmed whomoments earlier had

crashed his vehicle intothe airport terminal.

The bombers made good their escapefrom the area around TigerTiger on two

London rickshaws

Left: Kafeel Ahmeddied four weeksafter he crashedthe Jeep into thedoors of GlasgowAirport passenger

terminal

EYE SPY INTELLIGENCE MAGAZINE

98

MI6 HEADQUARTERSMELBURY ROAD 1919-1926

© AT MEDIA/HALA TABACHREVEALED

EYE SPY INTELLIGENCE MAGAZINE

99

WORLD EXCLUSIVE

EYE SPY INTELLIGENCE MAGAZINE

100

The dream of ‘invisibility’ has probably moved astep closer after US scientists announce they have

crafted a material that can bend visible lightaround objects...

esearchers at the University ofCalifornia at Berkeley, whosework is funded primarily by thePentagon, have engineeredmaterials that can control thedirection of light. The technol-ogy could lead to systems forR

AN UNNERVING ILLUSION THA

rendering anything from people to largeobjects, such as aircraft or ships, invisible tothe eye. Its application in the world ofespionage and intelligence gathering areobvious. In 2006, John Pendry of ImperialCollege London and David Smith of DukeUniversity in North Carolina used microwavesto achieve similar results, yet according toacademics, achieving this effect using light isa significant advance.

Lead scientist on the light project Xiang Zhangtold The London Times: “In the case ofinvisibility cloaks or shields, the materialwould need to curve light waves completelyaround the object like a flowing river around arock.”

HOLY GRAIL OF ILLUSION ARTISTS

The search for ‘adaptive camouflage’ as someresearchers refer to invisibility, has a longhistory. In 1897, science fiction writer andauthor of The Invisible Man, H G Wells,introduced the idea, then fictional, of ascientific route to invisibility through bleachand mysterious rays. Some would say today’smore modern experiments with visual stealthhave their roots in a 1943 US Navy projectcode-named Yehudi. The purpose of thisprogramme, which was highly secret at thetime and came to light only in the 1980s, wasto give Navy patrol aircraft a better chance of

sinking enemy submarines. During 1942,German U-boats were a constant menace offthe eastern seaboard of the United States andacross the Atlantic. Hundreds of merchantvessels were sunk. Though torpedo firingaircraft were sent to sink the U-boats, theywere often spotted long before they arrivedand the submarines simply dived to safety.

The Yehudi team needed a way to make theaircraft harder to see, and camouflage paintalone wouldn’t do the job. Regardless of whatcolour was used, the aeroplane could be seenagainst the sky. Scientists believed the onlyway to make them less visible was to actuallymake the aircraft brighter by fitting them withdozens of lights. At the time, this seemedillogical to some military commanders.

Nevertheless, engineers fitted a TBM-3DAvenger torpedo-bomber with 10 sealed-beamlights installed along the wing’s leading edgesand the rim of the engine cowling. When theintensity of the lights was adjusted to matchthe sky, the Avenger blended into the back-ground. Tests revealed that the Yehudi systemlowered the visual acquisition range from 12miles to two miles.

EYE SPY INTELLIGENCE MAGAZINE

101

AT DOES NOT REQUIRE PROPS

Lead scientist on the Pentagonsponsored project - Xiang Zhang

EYE SPY INTELLIGENCE MAGAZINE

SECRET INTELLIGENCE UNITS

103EYE SPY INTELLIGENCE MAGAZINE

ESPIONAGE CASE FILES AND REPORTS

104 EYE SPY INTELLIGENCE MAGAZINE

COURIERSTRADECRAFT

A look at howcouriers plytheir trade inthe world ofterrorism

AND COUNTER-TERRORISM

In Eye Spy 49 we examined part of the role played out byintelligence operatives described as ‘couriers’. From staticcouriers serving in a corner shop and distributing orreceiving messages, to experienced pilots delivering armsdeep behind enemy lines, the role of an ‘intelligence courier’ ismultifaceted and diverse.

rom gun-running inIreland to personsdelivering passports usedby the hijackers of Flight93 on 9/11, couriers arean integral part of aterrorist cell, albeit

The same can be said about those who ply their trade on behalf of terrorists....

Fsometimes working on the periphery. Theyoften try and mimic their counterparts in theworld of espionage, though these operativesare rarely missed when things go wrong - areeliminated immediately if suspected of asecurity breach - and easily replaced. Terroristcouriers are treated with no less disdain by thesecurity services than full-blown members of acell - they are all equally as dangerous.Couriers act and perform their ‘duty’ out of

loyalty to a friend, family member, gang, gangleader, political party, cult or religion - some-times they are blackmailed. Others run errandsfor the money or the thrill of it: are ‘employed’and treat their work as a job. From shiftinglarge loads of weapons or drugs to raisefinance, to hand-delivering a message a fewyards across a busy street, these operativesperform a multitude of tasks.

This type of courier faces enormous dangers -not just from government counter-terrorismforces, but often from the very people who‘employ’ them. And it’s not unheard of to finderroneous messages about the courier beingdelivered to members of a suspected terror cell- by the intelligence services. This induces

suspicion, doubt, and causes conflict andrethinking of pre-set plans - mistakes occurand terrorists start to take chances. Theintelligence world treat couriers as ‘links in achain’ - break a link and the chain will snap. Atleast that’s part of the theory. The British areparticularly good at this sort of deception. Ifnothing else, it can disrupt a terror cell andcause it to self-implode.

Professional couriers are rare - but far morelikely to be respected by their colleagues. Someeven enjoy notoriety - more so when they are inthe employ of a significant and wanted criminalor terrorist. Take for example Maria NydiaRomero de Tobon, an attractive 37-year-old

Carlos the Jackal

105EYE SPY INTELLIGENCE MAGAZINE

DARK ARTS OF THE INTELLIGENCE WORLD

106 EYE SPY INTELLIGENCE MAGAZINE

All Our YesterdaysA batch of intelligence files released by MI5

via Britain’s National Archives, shows just howcomplex, bizarre and dangerous the world of

intelligence can really be...

Assassins, Coffee and Poison PowdersM

onths before the Alliesfinally defeated Germany, asecret operation wasdiscussed in Berlin to causemassive disruption inEurope in the event ofHitler’s demise. Like

Britain’s Special Operations Executive (SOE)and America’s Office of Strategic Services(OSS), Germany too had created an under-ground unit that would use all manner ofdevious devices and subterfuge to carry outoperations while the country reorganised itself.

The scale of the subversion would have beenrelatively small, but the implications for somepeople could have been significant.

In March 1945, two months before the warended in Europe, MI5 interviewed a number ofcaptured German agents in France, including awoman. They had been flown to France fromStuttgart in a captured American FlyingFortress. After the unit parachuted into Ayonnear St Quentin, the group were quickly seizedand taken to an MI5 station for interrogation.British Intelligence learned the Nazi operation

was multi-faceted and involved assassinatingspecific targets using various methodsincluding poison. It also had a rather sophisti-cated sub-plot line. Many spies and agentshad been equipped with suicide drugs -usually ampoules of hydrocyanic acid. Thedisruption agents spoke of a special aspirinmade by the Bayer company. An MI5 debrief-ing document revealed death would take placeten minutes or so after swallowing. Askedhow the agent intended to get the target totake the drug, this would be done by “persua-sion” and after offering a special

© TALISMAN INTELLIGENCE LIBRARY FOR EYE SPY

107EYE SPY INTELLIGENCE MAGAZINE

NSA FIELD STATIONTEUFELSBERGThe Devil’s Mountain - campaign to keepand restore iconic Cold War monument

© P

IOTR

TYS

ARCZ

YK

Once recognised as oneof the most importantNational SecurityAgency outposts in theCold War era, FieldStation BerlinTeufelsberg (translatesto ‘Devil’s Mountain’),

Germany, is in danger of disappearingaltogether. The defunct base has long beenearmarked for redevelopment, but the GermanGovernment’s decision to dismantle it hasbeen met with furious opposition. Those whoserved at the facility are naturally against themove and efforts are underway on both sidesof the Atlantic to turn the site into a monumentthat commemorates the friendship andsteadfast support of the Western Allies who

made German reunification possible. Histori-ans and intel watchers alike believe it wouldbe appropriate to save the site simply for itssignificance.

The move to flatten what remains of the fieldstation, has been likened to the fate whichbefell another most memorable and veryimportant building (though much tinier insize). In December 2000, developers removedthe world famous Berlin watchtower known asCheckpoint Charlie. For years this simplestructure was recognised as a symbol offreedom and democracy. It truly was one ofthe original icons of the Cold War that dividedmore than the city of Berlin - it was a crossingpoint - a barrier between East and West. It wassurreptitiously removed so as to attract a

BERLINCOLD WAR G

SECRET HISTORY when in berlin visit....

108 EYE SPY INTELLIGENCE MAGAZINE

The NSA Teufelsberg Berlin Field Stationpictured around 1968. Part of the facilitywas also staffed by British intelligence

officers from GCHQ and the RAF

© M

ICHA

EL G

RUBE

- w

ww.

gesc

hich

tssp

uren

.de

minimum amount of attention. The city’sresidents tried to save the tower, but failed,because authorities deemed it was not ahistoric landmark. It was dismantled to makeway for offices and shops, but nothing of notehas ever been built at this site, and the originalproposals for development have been shelved.Historians and most Germans now recognisethat Berlin’s decision was wrong, andcampaigners in Germany and North Americaare determined that this does not happen toTeufelsberg.

NSA Field Station Berlin was an ELINT andSIGINT (Electronic and Signals intelligence)complex positioned high on an artificial hill

The former field station is now in a poor state of repair - seemingly abandonedby the City Council of Berlin who seem oblivious to its international significance.Teufelsberg played a significant role in ending the Cold War and ultimately inthe reunification of the two German nations...

© P

ARKI

N

that rises about 250ft above the Brandenburgplain. The site, contained within Berlin’sGrunewald Forest has a curious history. It wasbuilt by the Allies after the Second World Warfrom the rubble of Berlin as the city wasreborn. One estimate for the amount of debrisused to construct the hill is about 12 millioncubic metres, or put in more simplistic terms -from an astonishing 400,000 destroyed ordamaged buildings. It is higher than the tallestnatural hill (Kreuzberg) in the greater Berlinarea.

Teufelsberg’s artificial hill and origin does notin itself make it unique, as there are manysimilar man-made rubble mounds in Germany

(Schuttberg for example). You can also findsuch hills in and around other war-torn citiesof Europe. Teufelsberg’s real significance lieswith what’s actually sat atop and buriedbeneath it: below, the shell of a Nazi military-technical college designed by Adolf Hitler’schief Third Reich minister and architect AlbertSpeer. Construction started on theWehrtechnische Fakultat in 1937, but becauseof the war and lack of funding it was nevercompleted. It was simply used to storemunitions. After the war, the Allies tried usingexplosives to demolish the school, but it wasso sturdy that covering it with debris turnedout to be the easier option. And above, a

One estimate for theamount of debris usedto construct the hill isabout 12 million cubicmetres, or put in moresimplistic terms - from

an astonishing400,000 destroyed or

damaged buildings

GERMANY109EYE SPY INTELLIGENCE MAGAZINE

INTEL BOOKS •REVIEWS •RELEASES •DEBATE

110 EYE SPY INTELLIGENCE MAGAZINE

ALL PRICES INCLUDE POSTAGE (AIR) AND PACKING

BOOK RELEASES

Available from Eye Spy Ref: ES/1418UK £32.99 USA $32.95 ROW £34.99

L ong after the war’s end, officialWorld War II records listed theGerman submarine U-110 as

THE SECRET CAPTURE:U-110 and the Enigma StoryStephen W. RoskillNaval Institute Press

sunk on 9 May 1941 by a Britishconvoy: a deliberate deception that hidthe actual capture of a submarine thatcontained a working Enigma machine,codebooks, charts, and ciphers. As theofficial British historian of the naval war,Stephen Roskill did not reveal the secretin his authorised account.

When this book was first published in1959, the author set the record straightabout the sinking but continued to holdback details of Ultra. Now, a newintroduction puts the capture of U-110into context and makes clear its vitalimportance to the code-breakingprogramme of the Allies in World War II.

Roskill’s work is based on bothdocumentary and eyewitness evidence

and provides the most authoritativehistory of how the Enigma machinebecame a key instrument of the wareffort. Hardback 184pp

HMS Bulldogplayed a part in the

capture of U-110

ilitary intelligence about theenemy is a fundamental part ofany war or battle, knowledge

THE INTELLIGENCERS:British Military Intelligence from theMiddle Ages to 1929Brigadier Brian ParrittPen & Sword

Mof the enemy’s strength, dispositionsand intentions are essential forsuccess. This book claims that for 250years the British Army resolutely failedto prepare for war by refusing toestablish a nucleus of soldiers in peaceand trained to obtain intelligence in war.

Although there were ‘Scoutmasters’ andsecret spy organisations such as thatoperated by Sir Francis Walsingham inthe 15th Century, in no major conflictfrom the Civil War of 1642, includingthe Peninsula, the Crimea, Burma,Egypt and South Africa and in themultitude of small wars that gainedBritain an empire, was there any staffbranch or unit specifically pre-established to gain intelligence orfrustrate the enemy from obtainingintelligence.

The story of British military endeavourover 250 years is a remarkable one ofindividual bravery, achievement andsuccess. We read of the Scoutmasterwhose role was to gather intelligenceon the King’s enemies and ofWalsingham’s secret organisation at thetime of Elizabeth I.

During the long years of war againstFrance culminating in the NapoleonicWars, spymasters developed on an adhoc basis. In the nineteenth century,despite the power and reach of Empire,no central intelligence organisationexisted. Enterprising young officersworked wonders but failures such asthose in the Boer War cost Britaindearly. It took the reverses in the GreatWar to create an Intelligence Corps. Buteven that was disbanded post-war.Hardback 224pp

Available from Eye Spy Ref: ES/1419UK £22.99 USA $39.99 ROW £24.99

Queen Elizabeth Iand Spymaster -

Sir FrancisWalsingham

ach chapter of the How the WorldEnds deconstructs the dangerswe face. Rosenbaum begins by

How The End Begins:The Road to a Nuclear World War IIIRon RosenbaumSimon & Schuster Ltd

Eshowing all the ways the post-Cold Warorder that tried to impose a set of rulesof averting a nuclear mistake has fallenapart. He describes the journey of oneBruce Blair, once a missile launcher,whose experience inside the nuclearestablishment left him alarmed about itsvulnerabilities. He also looks at nuclearwar from the Russian side, using thearchitect of that nation’s early warningsystem as a focus. He describes all theways international incidents we haveseen - Georgia, the Israeli raid on Syria,the Iranian moves - are evidence thatsome governments have shown awillingness to move closer to the brinkof a conflict involving nuclear weapons.

The rest of the book looks at thebroader nuclear issues facing the worldin the 21st century: What is deterrence?Who can claim to have it? How manynuclear weapons can we live with? Iszero really possible? In other words:Can we undream the nightmare?Hardback 320pp

Available from Eye Spy Ref: ES/1420UK £24.99 USA $39.99 ROW £25.99

111EYE SPY INTELLIGENCE MAGAZINE

he untold story of one of themost lethal and successfulsoldiers of the Second WorldT

War - a highly decorated hero as wellas a self-confessed rogue. In the tankwar in the desert of North Africa, MajorGeoff, as he came to be known, quicklyshowed himself a soldier of superbathleticism, unwavering will to win andalmost superhuman instincts when itcame to survival and outwitting theenemy. Almost incredibly he won theMilitary Cross on his very first day inaction.

This is an honest account of winningthe war not by fair play but by beingmore ruthless than your enemy. Butmaybe what is even more extraordinarythan his soldiering - its predatoryruthlessness and amorality - is the

Available from Eye Spy Ref: ES/1423UK £22.99 USA $38.00 ROW £25.99e was one of America’s most

exciting and secretive generals -the man Franklin Roosevelt

WILD BILL DONOVAN: TheSpymaster Who Created the OSSand Modern American EspionageDouglas WallerFree Press

H

Available from Eye Spy Ref: ES/1421UK £35.00 USA $37.50 ROW £38.00

made his top spy in World War II. Amythical figure whose legacy is stillintensely debated, ‘Wild Bill’ Donovanwas director of the Office of StrategicServices (the country’s first nationalintelligence agency) and the father oftoday’s CIA.

DonovanintroducedAmerica to thedark arts ofcovert warfareon a scale ithad never seenbefore. Now,veteranjournalistDouglas Waller

has mined government and privatearchives throughout the United Statesand England, drawn on thousands ofpages of recently declassifieddocuments, and interviewed scores ofDonovan’s relatives, friends, andassociates to produce a rivetingbiography of one of the most powerfulmen in modern espionage. Hardback480pp

William Donovan

he struggle between Britishintelligence agencies and Irishrevolutionaries has lasted for

BRITISH SPIES AND IRISH REBELS:British Intelligence and Ireland,1916-1945Paul McMahonBoydell Press

Tcenturies - and still goes on. But it wasat its most intense during the first halfof the twentieth century. Irelandexperienced a bloody rebellion, bitterpartition and a stuttering march towardsindependence. Britain grappled with

imperial declineand world war,while worryingabout beingstabbed in theback by its Irishneighbour.

Using recentlyopenedarchives, thisbook revealsfor the first time how intelligence andintelligence agencies shaped Anglo-Irish relations during this formativeperiod. The book casts light oncharacters long kept in the shadows -IRA gunrunners, Bolshevik agitators,Nazi saboteurs, British double agents. Itshows what happened when Irishrevolutionaries stopped fighting, formedgovernments and started sharinginformation with London - while doingeverything possible to hide this from theIrish public. It also fills in a missingchapter in the history of the Britishintelligence community, tracing itsevolution from amateurish beginnings,through a painful adolescence, to thesophisticated apparatus that is largelystill with us today. Large Paperback540pp

now is the codename assignedto Arthur Owens, one of themost remarkable British spies of

ROGUE MALE: Death and Seductionin World War II With Mister MajorGeoffRoger Field, Geoffrey Gordon-CreedCoronet

SNOW: The Double Life of a WorldWar II SpyNigel West and Madoc RobertsBiteback

Sthe Second World War. This typicalWelsh underfed type became the first ofthe great double-cross agents whowere to play a major part in Britain’svictory over the Germans. When thestakes could not have been higher, MI5sought to build a double-cross systembased on the shifting loyalties of a

duplicitous, philandering and vain anti-hero who was boastful and brave,reckless and calculating, ruthless andmercenary... but patriotic. Or was he?Based on recently declassified files andmeticulous research, Snow reveals forthe first time the truth about anextraordinary man. Hardback 272pp

Available from Eye Spy Ref: ES/1422UK £22.50 USA $38.00 ROW £25.00

frank account of sexual adventuring thatwent with it. So, this is how the dogs ofwar behave when they are let off theleash? Hardback 384pp

n early 1970, the CommandingOfficer of 22 SAS flew into thestrategically critical Sultanate of

STORM FRONTRowland WhiteBantam Press

IOman on a covert intelligence mission.A Communist rebellion in the Souththreatened not only the stability of theArabian Peninsula but more importantlythe vital oil routes through the PersianGulf. Within six months, the Regimentarrived in theatre to lead a fierce, secretwar against the rebels.

At dawn on 19 July 1972, a force ofnearly 300 heavily armed, well-trainedguerrillas attacked the little fishing portof Mirbat without warning. Betweenthem and glory stood a team of justnine SAS men and a British air fighterforce. The scene was set for an epicencounter; a modern day Rorke’s Drift.Their heroism would become SASlegend.

The book draws from extensiveinterviews with participants from theSAS, the RAF and the Sultan’s ArmedForces, most of whom have neverspoken about their involvement before.Hardback 364pp

Available from Eye Spy Ref: ES/1424UK £22.99 USA $45.00 ROW £24.99

Available from Eye Spy Ref: ES/1425UK £22.99 USA $38.99 ROW £25.99

Michael Collins

estselling author Jennet Conantbrings us a stunning account ofJulia and Paul Child’s experi-B

A COVERT AFFAIR: Julia Child andPaul Child in the OSSJennet ConantSimon & Schuster

ences as members of the Office ofStrategic Services (OSS) in the Far Eastduring World War II and the tumultuousyears when they were caught up in theMcCarthy Red spy hunt in the 1950sand behaved with bravery and honour. Itis the fascinating portrait of a group ofidealistic men and women who wererecruited by the citizen spy service,slapped into uniform, and dispatched towage political warfare in remoteoutposts in Ceylon, India, and China.

112 EYE SPY INTELLIGENCE MAGAZINE

obert Baer was known inside theCIA as perhaps the bestoperative working the MiddleR

THE COMPANY WE KEEP: Husbandand Wife True-Life Spy StoryRobert Baer, Dayna BaerCrown Publishing Group

East. Over several decades he servedeverywhere from Iraq to New Delhi andracked up such an impressive list ofaccomplishments that he waseventually awarded the CareerIntelligence Medal.

Dayna Williamson thought of herself asjust an ordinary California girl -admittedly one born into a comfortablelifestyle. But she was always looking toget closer to the edge. When she joinedthe CIA, she was initially tasked withAgency background checks, but theattractive Berkeley graduate quicklydistinguished herself as someone whocould thrive in the field, and she waseventually assigned to ‘ProtectiveOperations’ training where she learnedto handle weapons and explosives andconduct high-speed escape andevasion.

Available from Eye Spy Ref: ES/1427UK £19.99 USA $40.00 ROW £25.00

A trip deep down the intelligence rabbithole - one that shows how the ‘game’actually works, including the compro-mises it asks of those who play by itsrules - and a portrait of two peopletrying to regain a normal life, TheCompany We Keep is a masterlydepiction of the real world of shadows.Hardback 320 pages.£16.99

peration Fortitude was theingenious web of deceptionspun by the Allies to mislead the

OPERATION FORTITUDE: The TrueStory of the Key Spy Operation ofWWII That Saved D-DayJoshua LevineCollins

ONazis as to how and where the D-Daylandings were to be mounted.Described by double agent Kim Philbyas “one of the most creative intelligenceoperations of all time.”

The story of how this web was wovenis one of intrigue, personal drama,ground-breaking techniques, internal

resistance, andgood fortune. It isa tale of doubleagents, black radiobroadcasts,phantom armies,‘Ultra’ decrypts,and dummyparachute drops.These diversetactics were intended to come togetherto create a single narrative so compel-ling that it would convince Adolf Hitler ofits authenticity.

The success of D-Day - the beginning ofthe end of WWII - was made possible bythe efforts of men and women who werenot present on the Normandy beaches.

Using first hand sources from a widerange of archives, governmentdocuments, letters and memosOperation Fortitude builds a picture ofwhat wartime Britain was like, as well asthe immense pressure these men andwomen were working under and insureD-Day succeeded. Hardback 320pp

Available from Eye Spy Ref: ES/1428UK £19.99 USA $38.00 ROW £25.00

© M

DC A

RCHI

VES

Available from Eye Spy Ref: ES/1426UK £32.99 USA $34.00 ROW £35.00

Julia Childpictured at abook signing

in 1989

The eager, inexperienced 6 foot 2 inchJulia springs to life in these pages, agangly golf-playing California girl whohad never been farther abroad thanTijuana. Single and thirty years oldwhen she joined the staff of ColonelWilliam Donovan, Julia volunteered tobe part of the OSS’s ambitious missionto develop a secret intelligence networkacross Southeast Asia. Her first posttook her to the mountaintop idyll ofKandy, the headquarters of AdmiralLord Louis Mountbatten, the supremecommander of combined operations.

A Covert Affair chronicles theirfriendship with a brilliant and eccentricarray of OSS agents, including JaneFoster, a wealthy, free-spirited artist,and Elizabeth MacDonald, an adventur-ous young reporter. Relying on recentlyunclassified OSS and FBI documents,as well as previously unpublishedletters and diaries, Conant vividlydepicts a dangerous time in Americanhistory, when those who served theircountry suddenly found themselvescalled to account for their unpopularopinions and personal relationships.Hardback 416pp

ALSO OF NOTE: NOVELS LACED WITH ESPIONAGE, INTELLIGENCE AND INTRIGUE

Carte Blanche (James Bond)Jeffery Deaver, Hodder & Stoughton

Fresh from Afghanistan, James Bondhas been recruited to a new agency.Conceived in the post-9/11 world, itoperates independent of MI5, MI6and the MOD, its very existencedeniable. Its aim: to protect theRealm, by any means necessary. Acall alerts Bond from dinner with abeautiful woman. GCHQ hasdecrypted an electronic whisper...

Double Trouble on Corned Beef RowJames W. Battee, Createspace

Three baby boys are born during asnowstorm. Two are identical twins.The twins are separated in a mix upat the hospital. Both wind up with thefirst name of Jacob and the sameinitial for their last name. One growsup with his natural parents andbecomes the owner of a deli. Theother ends up in the military andbecomes a mercenary...

Mare NostrumE. S. Hoover, Createspace

Mare Nostrum - genuine, probing,thought-provoking historical fictionthat explores the maniacal drive ofgreed and the intoxicant of powerthat motivates men to employextreme measures towards their ownideological end. Mixed with anundercurrent of current events it willleave you wondering if today’s fictionwill be tomorrow’s headlines.

The Spy BookJohn Westin, McNeil & Richards

Humorous novel about spying, theSoviet Union, and a professor andco-ed at the University of Virginia. AnAmerican professor and the beguilinggraduate student he’s having anaffair with didn’t destroy the SovietUnion. They simply put the last nail inthe coffin...

Follow Me HomePatrick Bishop, Hodder & Stoughton

Two young soldiers are on a missionto capture Osama bin-Laden. Themen soon find they are the huntedand must make it back to safetythrough hostile lands. Perilous atevery turn, the troops even have tolook after a young frightened womanas they journey home...

Agent Garbo

113EYE SPY INTELLIGENCE MAGAZINE

INTELLIGENCE ANALYSIS

EYE SPY INTELLIGENCE MAGAZINE114

CLOSE AND PERSONAL PROTECTION

EYE SPY INTELLIGENCE MAGAZINE 115

ECHOES OF OKLAWhen intelligence sees nothin

NORWAY TERRORIST ATTACK

At around 3.25pm localtime, on 22 July 2011, anunoccupied SUV explodedat the base of offices usedby Norway’s PrimeMinister Jens Stoltenbergin the government and

media district of Oslo. The resultant blastripped through windows and offices in an areacovering hundreds of yards. Within minutespress coverage started. Obviously there wasmuch suspicion placed on al-Qaida, especiallysince the country has been a prime target forthe terrorist group’s ‘Northern Project’.

The focus of media reporting and the rush tosecure terrorist experts to explain what washappening led to a myriad of inaccuratereports; but for at least two hours the blamewas firmly placed in the court of al-Qaida. Andthere are many reasons for this. Firstly Aynanal-Zawahiri, AQ’s new number ‘one’ since thedeath of Osama bin-Laden, has threatened amajor response. The use of a car bomb hadsimilarities to recent incidents in New York(Times Square) and London (TigerTiger club).The explosion was close to governmentoffices and the ‘R-4’ building which housesthe oil and energy ministry: also close-by, one

of the country’s main newspapers. The factthat some media in Norway had publishedcartoons depicting the Prophet Mohammedwas thought relevant here. And the oil ministrywas seen as a potential target because ofNorway’s strong support of NATO operationsagainst Colonel Gaddafi’s oil-rich Libya. Therewere lots of reasons to suspect al-Qaida.

Norwegian Intelligence has secured muchevidence of several European al-Qaida cellsoperating in Germany, France, Holland,Belgium and Britain. Indeed, some of thosepreviously arrested in connection with attacksand plots are known to have links to a terrorcell planted in Norway itself. And just daysbefore events in Oslo, Norway had indictedMullah Krekar, an Iraqi-born cleric and founderof the notorious al-Qaida franchise Ansar al-Islam. He had openly made threats if Norwaywent ahead and deported him back to Iraqwhere he faces serious charges of terroristinvolvement. Indeed, Eye Spy has learnedfrom its Norwegian sources, that Krekar hadbeen detained in an underground prison cellnot too far away from the bomb blast.

Anders Behring Breivik, a terrorist responsible for the murder of over77 civilians in Norway, surprisingly avoided the radar of Europe’ssecurity services; this despite him being a well-travelled operatorwith threads to a number of ultra right-wing extremist groups.

It’s also believed that Breivik’s name was placed on an intelligencewatch list back in March, after trying to secure chemicals fromPoland...

Smoke billows from the government and media quarter of Oslo, a few minutesafter Anders Behring Breivik detonated a huge car bomb© N. ANDERSON

EYE SPY INTELLIGENCE MAGAZINE116

AHOMAng

“Not even the STASIcould have prevented

this attack...”

© IN

GAR

SORE

N/PS

T

PST Director-GeneralJanne Kristiansen

At around 5.00pm, Norwegian media sourcesstarted to receive reports of another majorincident on the nearby island of Utoeya inBuskerud, about one hour’s drive from Oslo.The tiny inland isle was hosting a YouthOrganisation (AUF) gathering of around 700young people, many with politicalaspirations. It was being run byStoltenberg’s ruling Labour Party. And

of course, it would later transpire that AndersBreivik, 32, who had detonated the bomb inOslo, had made his way to Utoeya, donned apolice uniform, and then started to kill youngmen and women in cold blood. For reasonsthat will eventually become apparent, it tookthe police over 60 minutes to react to thesituation and reach the island. By then Breivikhad murdered nearly 70 people, many shotwith the particularly nasty hollow point bulletmore popularly known as the ‘dum dum’bullet.

By 6.00pm the incidents were being linked.And at the same time a number of Islamicextremist groups were announcing they wereresponsible. However, when it became clearthe shooter had been arrested, and describedas a “six foot blond Norwegian-looking man,”suddenly the word was he must by anIslamic convert and an agentrecruited by AQ.

Chillingly cold, calculated andmost dangerous - the lone wolf

terrorist all security services fear

An injured victimreceives attentionfrom city residents

and police

PLANNING AND A SHOCKING AGENDA

nders Breivik is the type of terroristthe world’s security services fearmost. Furthermore, his home base iswithin one of the most open societiesA

in the world. And these factors worked againstNorway, which today has lost much of itsinnocence, despite the prime minister sayingfreedoms will not be challenged by terrorism.In early 2009, Breivik, who was writing ‘TheManifesto’ (see sidebar), sought to introducea physical and pro-active element to his secretwar with the government. It was no longergood enough to object to Oslo’s policies on

EYE SPY INTELLIGENCE MAGAZINE 117

EYE SPY INTELLIGENCE MAGAZINE

ORDER ON-LINE www.eyespymag.com

Each highly collectable edition represents a worldwide overviewof global intel events and covers every aspect of the subject’s

astonishing SPY TRADECRAFT...

your bridge to the covert world ofESPIONAGE AND INTELLIGENCE

EYE SPY INTELLIGENCE MAGAZINE118

ORDER ON-LINE www.eyespymag.comEYE SPY INTELLIGENCE MAGAZINE 119

ORDER ON-LINE www.eyespymag.com

EYE SPY INTELLIGENCE MAGAZINE120

ORDER ON-LINE www.eyespymag.comORDER BY PHONE: UNITED KINGDOM, EUROPE/WORLDWIDE TELEPHONE:

+ (0)1756 770199 (UK) NORTH AMERICAN READERS TOLL FREE: 877 309 9243

EYE SPY INTELLIGENCE MAGAZINE 121

ENTER THE COVERT WORLD OF ESPIONAGE