-
l
Freedom of Information ActiPrivacy Act Deleted Page(s) Information Sheet Indicated below are one or more statements which provide a brief rationale for the deletion of this page.
X
Information has been withheld in its entirety in accordance with the following exemption(s) : 5 IJSC 552 (b)(2)
It is not reasonable to segregate meaningful portions of the record for release.
Information pertains solely to another individual with no reference to you andlor the subject of your request. Information originated with another government agency. It has been referred to them for review and direct response to you. Information originated with one or more government agencies. We are coordinating to determine the releasability of the information under their purview. Upon completion of our coordination, we will advise you of their decision.
DELETED PAGE(S) NO DIJPLICATIONFEE FOR THIS PAGE.
Page(s) 1 IAGPA-CSF Forrn 6-R 1 Sep 93
P
ract i ces and lvlethod s of
[ast-Bloc (Secret) Intel 1 tgence Serv i c es by
Federal
0ffice of Crirninal Investigations
Counteri ntel I igence Di vi sion
i Accesslon For cfit&r I nttsTAB
w n
i ilTrc
I t;i:.-.t: t'r o t:l: c o d I J,r;itllLcnIlo : n:.sl.rtbutiu1il / '' t'-
'0tst i -.yt
|.
5-c"c1
^tll ,
rt.- |
i_lr__l.-l
I I
|
sI
:r:::l',:::
Ii-3g-f ,j.q"-nce SerY:Se f
f'leth.P
;
r;ery cl andesti ne i ntel I i gence serv i ces Hovr can it be combatted?
i{haiis espioirage? rT
LL
The activities of foreign Republic of Germany - or:
ffii
The seq-qpnge
ffi$$
1. ?. 3. 4. 5. 5. 1 5.2 5.3 5.4 6. 6.1 6.2 6.3 6.4 7, 8. 8. 1 8.2 9: i0.
FT [Fr1
lf$
of
intelligence services against (or in) the Federal
an i nte-l.l i qence operati on:
Assessment
Forgeries.
Infiltration
Legalization
anC
Secret lllriting
Cut-outs Di rect Contact (lvleeti ng) Dead Drop (DD)' Live Drop (LD) Safeguards
'
Clandestine CommunicationCode Key
Transmission Scheduie' A-], A-2, A-3 Radio Traffic. Two-way Radio Communication l-.istening Devices (Interception Operations)
lntelligence
.,
'
PhotograPhY'
"Photographi ng". crof i 1m"ing Concealmenti and Means .
Mi
of Transmission (Containers) (0ther) Clandestine Intelf igence Transmissjons."
t
i5* I
tii
n{ ::.-
ra !-x
1F_r<-M|lr^
rlra*a\^EaLiir*tu{-1r-rtEliltdtM***Iatan&atlM
tspionage Against lhe Federal Repub;ic of Gerrnany The Federal Republic ci Gerrany occupies a special place among all sta+-es parti cu'1 arl y as the targe: anci site of foreign clandestine'intelligence operafi ons.
-
As one part of the two Ger,ta:3,s, it'l ies as a buffer between East and West, between the communist an: free worlds - different from South Korea and I the former ] South V'i etn an,
agent rings spans --re Feiel^al Republlc of Germany. fastertt intelligence services (insofar as --^.. -,E , J:g to the EaSt Bl oc ) Support one another. -ir=-v -^''!^
A net
of
t of the agents who hav'e to date were n]embers cf in3
l'los
J.
GDR:
?.
USSR:
CSSR:
Pol and:
E
in the Federal Republic of fc- lcw:ng I nte'll jgence services:
D3en Lnccvered
st,-y for^ S:ate SecLr^ i -r.j (MfS) and i ts trat,iori icr Ir,:elIi errcs ColIecbion.
14i
ni
Mai
n
Germany
ACmi n'i
s-
Ko;ri--et 3:su:a-Strer,:oy Bezopasnosti = Ccmrn'i ttee for State Se.urii,),' (ilcB) and :ts First Main Adrninistration, Seciict ?. urc --he ir,dependent l"lain Administrat'i on for Iniel l-i ger-r C€ lcllec-uion, Glavnoye Razvedovateltnoye Upravle: ;ra i3a.U).
Federalr,i i,iir,isiel'stvo Vnitra (FMV) Federal l4inistry of I r",teri ci wi --n i --s l'1ai n ACnri ni strati on for Intel I i gence Col I ect:o:,, rrl a"'ni Sprd\,/d Rozvedky. siers--wc Sr raw 1,,,je'y'recznych ( t"1SbJ) ' Mi ni stry of the intei-io!^, Sluzba Bezpieczersfwa (SB), Secur-i ty Service.
lt'ii n i
Savezni Sekretariiat za Un;trasnije, Federal Secretariate Yugoslavia: ' for Internal Matters and i,he Department "Federal Service for state Secur.ity" (0celjerje Savezne Sluzbe Drzavne Bezbednosti (SDB)).
In addit,ion to these, a whole row of other states conducts espionage against the Federal Repubf ic of Germany and 'its f aci I 'iti es. Thei r mai n targets are: the economy, the German Army, and the polirical part'ies.
q,
Esp'ionage and Ccunter-Esp'i onage
Espionage
is the activfty of ferneting ou+- secrets for the benefit of
an-
other state.
state conducts "esp'ionage" (ma'intairs inielIigence agents or clandestine of an operational intelligence service) and each state has pun'itive measures - in some cases of considerable severity - against espionagePersons who engage i n espi onage are cal led "fra'i tors". In 1ega1 terms, they cornmi t "treasont' even i f they tr'ere i nf i I ira:,.qC i i-,to the Federal R*publ i c of Ge rma ny by a foreign power' e,g. as an cf f i cef ' on speci al assi gnment and fhus are on an ttofficial nrission". Each
operatives
in the u:derE.o:rd' CounterintelIigence in the Federaj'Republic of Germany is the respcns'i:ii'ity of the 0ffice for the Protection of the Constitution (Federal ci:ice or state offices) and the Serv'ice (MAD) tcgether with the Office for Security Mi'l.itary Counterintelligence 'fhe service respol,sible for operational,intelliof the Federal Army (ASBtl). gence or information col'lection is the Federal In:elligence Service (BND). Ti,e intelligence and counterintelligerce services cf the Federal Republic of Gernany are not crirninal prosecut'icn ager'cies a:C are not compelled to pursue of Criminal Proceedings. crininii p.or".ution per Article 163 of -ure lcCe The prosecution of punishable acts anc --:=:r -'n';es:iEation is the responsibility of -,1,e pciice which for rts part r:y nct, ccnCuci countermeasures in Espionage
is
"permanent co'ld war"
thi s area.
Thus '"he fi3nt aEainst i-is (:.3as3''-cus) cllense against, state securitY is ci :v'i ded intc 'r ccJnt,er,nt=,Iiger. ce" t.b-t ti''e Cftlce f or the Protect'i on of the Const,i tu:i on e rii tne llAD) aic "cr:t''-'al pr3sEc:-t,i 3:r" (b-u police and state prosecutcrt s U I;1 C3 ,' . aF-
\
P
3
Spot: Assess: Develop: Recruit:
s-pg!!ri!_
Rernarks: C
I ande
sti
ne
intelligence services obtain
D-orsonnel replacements from two
SOUTCES:
J.
Recrujtment frorn state offjces (voluntary servjce ass i gnments and transfe rs ) .
?.
ti ng i n one's own country or i n ihe "targe: arear' 'i n which the dgent" is to operate 1ater, but alsc ir ar,y "ron-parti ci pati nS" forei gn cou n try.
but also temporary
Recru, fl
e i nte.I I i gence servi ces, parti cu i ar1 y ;hcs= c' the GDR, placed more emphasis on quant,itative saturaticn (many agenis 'i :, nany pl aces ) unti I about the beginning of the 1960's, far fewer bu-' ilc l^3 Q,3lii'i eC agents are used today. !.Jhi I
As a
ruie, recruiting occurs according to ire spotter-researcirer-rec
ru i
ter
s.vs--96.
Spottinq means f]agging those persons wno.cu'l: be cf poiential interest, to the intelligence headquarters. The spct:er tesis the person for poss'ibi'lities, abilities and experience which would apoear to rake:his person suitable for work in clandestine'intelligence - withou:, hc'*e'.'er, rielving into the personal sphere of the individual. The spotter reports weaknesses of the.f,ers'ln cr ot:.er avenues pertaining to the person himse'lf (debts, relat',ves in rh: GDR, ccncealeC criminal record, etc. ). Further. the spotter aiso reports circ;mstances and the 'like having a bearing on the personai sphere of the person (security c'learance).
fi -J{:.
;:
i
-.}-Ti
L.'t.\
t }'.t'
* } \'\
L
R_esearchi nq
The headquar'-ers receives the reports of the spotter and evaluates t'hem. tJhi'le the spotter essentially only performs "informantt' services, the researcher m;s-, accomplish real invest'igative work" He receives the evalualed (anc siftec) reports of the spotter to support his research-
Researcirn: (irvestigat'i ng)
means determ'ining
a1'l personal,
p'.,.
itical,
and
c.;..rrrr:.n."s, with all the positive or negative characteristics of the ":arget person", in order to obta'in a comprehensive picture of him. In or"der:c be able lo confirm or also d'iscredit the spotter's reports turned over --o hin for "investigation". he must perform administrative tasks or take opera:icnal neasures (interviews of persons in the l'ife of the person concerned cr even intercept operations such as mail intercepts and wire-tapping).
ilG;I;l
The r^esearc:er then reports the results evaluar.es (and s'.fts) these reports.
to
headquarters which again carefully
F-t
( I
Recruitinq
ting for clandestine 'i ntell i gence servi ce rneans to commi I a person "i ntel I igence-neutral" to 'i nte I I 'i gence work. Headquarters h as g'i ven '"he eval uated rePorts of the researcher to the recruiter So that he can Bgqnu-i
ffi
ionduct, the " recrui t'i ng pi tch".
The recruj-uer Eust always be able to adapt himself to the indiv"idual potent'ia1 agent, 'i.e. he must use a different basjs for recruiting different persons.
f.
ideology should be at the forefront but actua'lly assumes the srnallest position; it is practically never successful with i'ecru'ited "citizens of the Federal Republic".
?.
Fi nanci
ai
I nducement
a) Bribery (greed or neerl of the person to be recruited). b) Extortion (intimidation to compe'l the person to act followed by a "generous payment").
3.
Materiai Inducement (promise of lucrative deals)-
4. Int'imidation (threats aga'inst the person himself or relatives in the area of jnfluence of the headquarters),, 5. 6,
J,
residing
Extor--icn (compromising material which can be real or forged and whose purlicat:or or release can be threatened). "utdei^ the\a'rcr! :1ag" (a pel'son relieves ne 'i s bei ng recrui ted for a pri ,/ate firn cr a "cwn or friend'l y intelligence serv'i ce". ) False flag operations -- used by Israelis ly RecI^uiting (wit,hcut pr-i or "=p3r,:i-g" cr "researching"),
Cpportr.in-,
O
C
Th
The commitrnent for work
orally or in writing.
e
Cornnri '"me
n
t,
in a clandestine intelligence servjce
can be
made
The wording of the declaration is not prescribed and is usually'indiv'idua11y tailored Uy ttre recruiter to the person being recruited (see the example bel ow)
.
A person who has commi tted hinrself for work in a c I andesti ne 'i ntel I i gence servicef can generallY not avoid perforr'ri ng such wcrk. He wcrks as 1 ong as the headquarters desi res but not a bit lonqel^ e'i ther ! The relationship can only be terminated
J. Z.
fcr
the
follorving reasons:
death
deacti vati
on
a) for a specified period (conservaiicn) rcstly for security (by warning signa'l via rad'ic bu: arsc by other tel ephone, couri er).
b
)
reasons means such as telegram'
permanentl y
because because
of of
ac'.:r-e
danger:c::'€
unlrcduc--'i venesq
a3ent source
cf ihe
source (9..s. douule asent); in this ;;;;;;; o; ffiliau,llTF-i:e case. ocstl!T-pp ri eC_'*,?-,.. "pl ay na:eri al " or orherwise played into t.he hands cf -,:,e o:pcsirg ccu:terinielligence.
ri^Tt"'" Comir
i tne
nt
Dec
'
ara:i
on
service rvitho',t reservaI commit myself io work for --he Scviet intel'l igenceextent it'i s in ty power to the tc ssuec:re tion and to carry out ihe orCers'i Should I ever service. tigence in'"el Scviet ilie cf do so to the satisfac--ion --o work with me Or who me persons knowr. other or erdanEer commit treason the expect am to I activj:y, oi espionage the cJurse in me known to become 'i'he Sov'iet harshest punishmeni from the Scviei'inte'lligence service. intelligence serv'ice has the rea:s to ajso reach me in the t'Jest. N
ame
g
Forqgri es
al
Par:i
Forgeri es (simp1 e or general forg eri
es )
ialsifications -ctal Forgeri es fu11y back-stopped I
ha
f-bac k-s top
carti
nct
il i
ped
iy
back-stopped back-stopped a1
locunents (passports, identity documents, and other written or photographic
133resentations provid'ini personai or materia'l information) that are "interes:ing" for a clandestine intelligence service or are othervtise needed and ;t which the originals cannot be used by the opposing intelligence service, - .. io"ged.
rce these ;orgeri es do not 'i nvolve "criminal s" but ratheri nvol ve a "tcrge.y workshop operated by the state so-to-speak. forgeri es by an i ntel 1 i :31ce servi ce are di ff i cul | (for the non-spec'i al i st impossible) to detect, S:
Fcrgeries -,n categories A and B are practically no longer used by intell'i;erie servlces today; they are mentioned here in the interest of completeness:
'1-
al
?ar''.i
Foroeri es:
Th:y primarily involve passports, identity documents, _or other official of whicir someone i11ega11y acquired "blank forms" (during a :jc:'rre:,ts o: ine r, i-^6lnef: at a Registry Office or the like)' fills them in w'i th a false name personally or prov'ides i anc possi bi y affi xes a photograph), and uses them then --o cihers for use, In this connection' it is of no consequence xhet.rier s:cl en cr f abri cated stamps were used.
lal
fi
s:
cat ions
{,r-rhen:i: (ctf i cl al'l y i ssued) docul,ients are a'! tered. 0n docurilents wi thlrt ^,hn-- 1craJ.ls, erasures or razor del eti ons are made to the original Lex:; on Das S pcrts ar,d :hot,c i denti ty dccurnents, photos are swi tched and acci ii cna i al'"erati cns nay al sc i:e rnadeVJUr'llVvVL
nce t,he f orgel i. categori es A ar:d B are detected rel ati vely easily, they are nrar-ticaliy unsuitable for intell-i gence purposes. S'i Fr,
c.
-.u
v
I vu
I
Total
t
Fcr-geri es
are fal s i fi cati cns i n wh i ch nothi ng i s authenii c i ncl udi ng the materi al of rvh'i ch t,hey are r,lade (paper, bark cl oth, etc. ) . Thi s type of forgery 'i s preferred alrnost exclusive'ly by intelf igence serv'i ces. The samples are "acquired" itt that an orig'inal i denti ty document ( or passport, dri ver ' s licenser etc.) are photographed or reproduced duri ng the ownerrs border crossitlg without the owner tak'ing not'ice of what 'Lranspired,
10
f the total forgery and the ori gi nal correspond i n every deta'i I for the photograph), the forgery is referred to as being f_u l].v b,ac ls-stopped or as a d"oub l,e i denti ty doculnent, passpoFt, etc I
(except
.
y the "of f i ci al partt' are the same i n forgery and ori gi na1 (nunber, offi ci al seal , i ssu'i ng agency, i ssue date, etc, ), the forgery 'i s considered belf back-st,opPell. 3. ]f a Lcta'l forgery contains entries from severa'l orig'i nals, it is referreci to as partial'ly back-stopped.
?.
If
onl
+. If the forgery only bears the same number as an authentic identity document anA ut 1 rlmai ni ng entri es are at vari ance w'i th the ori g'i na1 ' it is not back-stopped.
10
T'F
.L.L
f*. n:e l l i gence l i fe hi story" of an agent. , - i UU s or authentic (authentic to the extent that r't contains a of the agent but another name or even the life h-i storv f..hS_Co
-l-'^.,
:
.l-l |UUU '-l
' i nn 'tv v I tllf
I
pers on
.
t :r3 ccver , the agent so-tc-speak receives another "self". j:E trcn ou iside the area of operations, he is "infiltrated"
2f
agent. must be
jn better
comrnand
of his cover than h'i s
own
If he is with tlrjs rife history.
i1
L2
*.f,
H ffi
The Infiltration
fr H .c {L x.
ii
iJ
t
"J
'J
id H ;1 .J
T .J
'j u
The secret border crossing of an agent vrith the knowledge of his headquarters or hii case ofiicer js referreJ to u,
A border crossing'is also secret, if, it occurs openly but is not recognized as a secret crossing bv thilSppropriate authcrii.iesi (ivitn-tui."'ili".. o. the rike).
infiilration point for East Bloc ageits'is the Friedrichstrasse in the eastern sector of Berlin. Until construction of the Berlin rvall :n 1951, 'infiltrations at other border The-main
rai'lway station located
crossing points was relatively simple; --lday they are inposs.i b'l e or nearly impossible in nany areas.
H F' 4,
It
ifr
It
llts lfi
li It
of or at the d.irection infiltration.
l};::ll;"i,.|;ri::i::.who -cou 'i
are
tc
becc;re co=r-a:icnar
'
the rorlowins are
ri ers
nstruc+r,ors (theoreti
cal
instructor"s (teciinical
knciv e:ce
)
kricv/l edce'i
recru i iers and oiher case
J
cffi:e:s.
I
1r)
t/
L3
The Leqal i zat'j
on
living in the target sfate (country of operations) like a false personalia (and papers). The cover forms the lEilcitizen despite baiis for lega'l -ization: the agent receives strict instruct'i ons for h'i s conLega]ization
means
duct wh'ich he must fol
I or,r.
Remarks: Agenci es control 1i ng agent,s i r :he ccuniry of operati ons are cal I eo %sidencesf'; their agent. handlers are cai'l ec "Res'i dentst'. There are "legal" and "illegal" residences. Legal resiCe:ice : enbassyr trade mi ssion, consul ate, etc,(i.€. a 1egal representative of a c3'irl-t'-v' i n rhe tar get country). I I lega1 residence = "resident," cl andes*'i vel',' carri es out agent handl er functi on but officially pursues a cover occupat,ic:, An example
of
legaf ization the resrden" :cup:e
BAUDE:
Heinz and lngeborg Baude, married to one anc-'her in the GDR' are'infiltrated into the FRG-as the unma.ried refugees !ie:rich Schroeder and Helga Eimert in order to be later activated as resicie:.-"s. The-v are both sent to the same refugee camp. There they "meet one arc--h3:", They provid"-g considerable umornt of false docurnents to legitimize --^.e'r personalia. A'l I are made out in the'ir cover names. Problen! Total fcrgeries? Officially'issued identity documents consist'ing cf aufhentic 3lF. iCe:.:::y document paper-with false (driver's namesl They narry tnd then apply 'or -e* iCer,t',ty documents 'in the names of D. Schroeder Cer nany licenses, .i.. ) in the Federal ielu: irc: Thus are legalized' they dcc;:ients! and Helqa Schrceder nee ii:e-: - au;her:ic
r3
L,*
Secret l,lri ti
nc
Secret wri ti nq i s rvri tten commun'i cati on wli'i ch are not readi 1y readabl e mu;t-Tirst be translated cr made readable. There are two calegories:
and
A) visible secret writ'in9 (a1so called "crypi,cSraphy") B) invisible secret writing A.
ca1led latenr rvriting. Vi s i b-lg._Secret
Writi
nq
l.
writing" (also referred to as "Robber ABC" in the vernacu"Hierogiyr:-c lar). -r"--.-..= u.. ,ibttituted with symbols (circles, angles, stars, etc.)'
2.
"ForeiE;r i*r'i--i:,g symbols" =
e.9. cyrillic alphabet (if a Gernan text is
vrritren'*-::.- "1,]ssian" letters, it can only be deciphered by persons a; leasi '".ncw i:e cyrillic a'lphabet. ).
who
letters of the alphabet are "mixed up";. an. ccr.,sonants are separated in such a way that pronouncable bu-- seise ess;v:rCs are formed. 4. "Br:i.le' = coes not have to be identical to "authentic" Braille.
3.
"Transccsi:;cr-, Aiphabet" = the
oflen
y,3!;e-.s
which:s a rule are not identi-
5.
"l,'orse Signs" = 3gries of Cots and dashes cal tc -,'e !..:'se alp:abe'"'
6,
"Incr-yp--=c ivr::irig" (-rhe ncst used visible secret vrriting in inte]lig"n".)'= l€--,uers tr^e substi:rte,i wi.L digits or numbers. Used in c'l an-
des:ir',e radic corr.un'i :a-'icns (se= radio rey).
of Code" = cer--aifl pf€Co';erninec phrases are used for commun'ication: (".S. "Uncle Fritz has:aken'iIl" cc-ld mean: "the'last film was unusable: or something sin:ilar). B. Invisible Secrei hr^'i-u-'nq secret writing is also knorvn as "laten: writing" of "'latency This type of -ft-inuoiues wriiing that is present tut'is "absolutely invisible" "riii;;ll. and muit f-irst be made visibie (developed) in crCer to be read. 7,-
1
.
".Jse
"l.rlater Wri
ti ng"
a) "tlater immersion writing" - an innocuous text is first vlrjtten on the paper (with a water-resistant mediun such as a ballpoint pen, penc'i1, Lti:.); then the paper is placed in water and subsequently onto a glass p1ate. A message is then rvritten "between the lines" vrith a hardwood, agate, or glass penc"i1. After dry'ing, noih'ing can be seen of the secret text. After the paper is again piaced jn vrater, the writing can be seen as "yrater marks" when a light is placed behind the paper or is used to'i'l'luminate it from an angle. b) "hater writing" = paper with a smooth (coated surface) is vrritten on rvith rvater instead of ink. After drying, the vriting is invisible; t4
15
b!
:l
t.
,,{a d,
_t
a,ta
-t' II I t
I
.'
however, the rvater has nade the coated surface dull vrhere it has come contact vrith the paper. It can be read with illumination from a "poi nt I .ight" sou rce appl i ed at an ang'l e.
\
a
\
in
Both these processes are no longer used by intelligence services because of
the danger of detection.
?.
"Chemical writing" = any chemical (regardless of whether from organic or 'inorganic cher.ristry) is suitable for crealion of jatent writing. The on'ly requ'irement is that the rvriting be done on a surface (carrier) on which the writing-is cornpletely inv'isible and remains so after drying. Latent vrriting can be accomplished either by a) b)
use of a llquid (a liquid secret wri ti ng materi al ) or through transfer vrith dry chemi ca I s. Both method s are used by i nt.el I i gence servi ces,
a) "'liquid secre! writing substances" are those chemical so'lutions which are used like ink but, are not visible on the carrier. Pract'icai'ly all headache medicat'ions or other medications that are soluble in rrater or alcohol are suitable for thejr producl'ion. The only prerequis'ites are complete invisfbility after dry'ing and the capabiiity to later initiate a "color conversion" by chemical reaction. (Example: !'irit,ing w'ith dissolved starch - invis'ible on white surface. If the entire paper is treated with an iodine solution, the paper turns a brownisr color but the wrjting furns a violet color. (0r: citric acic and high heat; quinine so'lution and ferric chloride). b
)
t'C-paperf The prcces s ;,rst f reqientl;v used tcday i s the use of sheet cf paper is p ref,ar ed or thi n I y coated wi th a "whi tet' chemi cal (simi lar^ tc carbc:, parer jei ng ccated wit,h a bl ack or bl ue substance). paper ((t'c-paper" carbon Paper rike a conrnerclal connerc'ia'l caroon Th" ".-paper".s'..:seC s ,Jse3 exac!iy exact'iy tlKe prccess was known as the I969, ihi s car'con paper ) . i.Jr,ti I abc:'t t' l
"contact pap'er
h) rr
'r"Oa vveJJ
a
=
.
is placed on the back siCe cf an innocuous-leller and another sheei of paper is p'laceC on i:p cf tie c-paper. The message is written on the top sheet wiih a soft, renctl. At the points of contacf with the paperr ihe cheriical :ari'.cles are transferred from the D-paper onto the underlying siee:. S-.nce they are rvhite on a white surface, they remain invisible. They :an De made visible by means of a chenrical react'ion (through a s:ec'ific deve'loper). The c-paper
Practically any sheet of paper is su'itable as a c-paper. Depend'ing on writing pressure and the amount of writing, it can be used 30 to 50 times before 'it is "useci up".
t5
L6
i?
\T
tt
Jl{ '.i{.r *g
# FI -1
I
,!
ntel I i qen-c,e. Servi ce
t
Dead Drops Li ve Drops
i+
H *1
hl .\ l! a
li .1
H
$ T
a
il
In order to maintain the clandestiness and its associated separation of agents from one another to the greatest extent possib'le ("compartmenta'lization"), many intell'igence services use cut-outs whereby the agents do not meet directly or exchange information directiy, A "dead drop" (DD) is a depository used by intelligence personnel (usually the agent and a cour"ier). The size of the DD'is dependent on the amount or size of the material.
is "estab'lished" according to several firm rules: 1. A DD must be easily accessible by public means of transportation. 2. It is to be eslablished in areas not consp'icuous to third persons, i.e. it should not be discovered by playing children or alert passers-by.
A H
H
x
* il H
q j I
i-r lr llIt l1 t,
DD
is to
3. 4.
The DD
5.
Each DD receives a name. This is particularly important if several of such Cepositories have been eslab1ished by one agent. This should preclude errors in referring to specific dead drops.
6.
The agent reports the estarl'isrnent of a sketch.
7.
Each DD has approach safeguards.
l^ la
i 'i lr I i:
Cu.t.-Outs
Ir
be kept as small as possible.
0n1y those locales are to be selected for the estab'lishment of a can be accessed inconspicuously at any time of day or night.
of a DD io his
DD
headquarters by
that
means
of intelligence materia'l at such a cut-out location is called the dead drop". "servicing A "'live drop" (LD) is aiways a human being, a person who relays intelligence material without being conscious of that fact. An LD is arranged. Bot,h DD and LD can be either "mcbile" or "staiionary". lt'lobile DD are also referred to as "rolIing DD": depositories iir Iavatories of trains or in other transportation means between [ast Germany and f'lest Germany.
The deposit
H
A
I It.
t. -t
f1
i
tlr
c H
I
:
l
tr
Mobile LD are often trave'lers between East Germany and tJest Germany who take along "gift packages". Stationary LD can be persons who are asked by.-"friends" to hold-packages or the l'ike so that these can be picked up by other ''friends".
F.
E F-.
F
E;
E
ts ff
F
(DD and LD) is that they are "cut-outs", i.e. they are serviced by one person and pick-up'is made by another. If one and the same person "services" anci p'icks up the materiaj from a DD or LD, the main characterist-ic of a "drop" is missing. In such a case, it is merei;' an "intelligence cache". The path taken by Lhe inteli'igence material (i.e. from headquarters to the agent or vice versa) is of no consequence in fer:rs
The one
criterion common to all drops
of the operation of a DD or
Er
F F. Ft
fr, b
E: alr-
;t
*:
3rr
f.:.
LD.
_t, ,
't
D{l
6
6
t'r
1?
Hiij F""
w F.:
{. fr
l ntel I'iqence Cut:0uts
The Aqenl Contact
A "contact" is a clandesline mee'u'ing cf intelligence persons. If two agents (e.g. an agent and a courier agerri) who do not lnow one another are to meet,
a) recogniiion signai s and b) recognition safeguards are arranged which are
to
preciude cc:fus:ng the'identity
with that of the "contact parlner".
of
another person
a)
Recognit'ion signals must be rnristakable; this is a basic rule for clandestine meetings. 0ne co.tact partner must be at a predetermined location at the prescrjbed iine and must have a certain item with him that fs visjble (e.g. a white carnat'ion in a buttonhole) or he must perform a specific action (f igh*" a cigarette, drop 'it, step on it to extinguish it), The other pe)'son steps up to him in such a way that Lhe first person can recognize :is recognition signal.
b)
The recognit-ion safeguard then follcws. It can consist of 'tcontact signals", for examp'l e: eacn of -.he'uwo agents receives one ha'l f of an item that must be ioined to form a whole (a button broken apartr a postcard torn in two, etc.). -.0r, passwords are agreed upon ("coffee prices in Braz'i1 are dropping" - answer: "But, I prefer tea"). 0ften recognition with the aid of an i:en and verbal recognition are mixed; the same applies to safeguards, of course.
17
1S
:J cJ !l
*
RJ vr
i
j
si
d f,
Intel'l i gence Cut-0uts
.1 -4, ..,
t-t A
Safeou ards
',f
3 is q t
-
t I I
i a,
F
a
-
Approach Safeguards
l.{arning S"ignals and 0ther Signals
.j::r-:ach safeguards are required for each dead drop and ai'l'live drops. They ::-s'st of both a pre*sign and a post-sign. As a rrle, these are small .itemi :'s::e kird which are deposited at certain s'ites (thumb tacks, bott'le corks, ::--.r :cxes, or the like) or signa'ls that are marked some\rhere with nencil cr cial<. These sites are usually located relatively far from the depositories.
-:e:r purpose is to inform a partner agent rrrhether, for example. the dead .-cf, |:as h;en serviced or picked up, or whether there.is the suspicion that --r-e ceac drop has been discovered by counterintelligence and is under surt'danger safeguard" is effected). Example: an agent "eillance (in i.his case a se:'t:cec his dead drop then affixed a thumb tack to the frame of a shop ninc:r and ihen stuck a bottle cork behind a downspout of a house. If the agent rl: Cetecied a danger, he uas to have used a white thumb tack instead of a ;:':-colored one. The warning signal of the courier. 'in case he had detected :1--:er, ccnsisted of substituting the bottle cork of one firm for that of '
2F^-10r b' v!r.br
-= :'clli
:g
-2eo \rUJL?
e--3r,
Ii
dlt i
ve d rop
ntel
1
i
res i ded
across the street from a clock store.
gence agent, had the
drop. A kitchen clock in the se: 3t 5 c'clcck. In case of danger, fhe store : ::r --t '2 o'clock.
sole responsibility of sur-
disp'l ay window was constantly owner would have set the
:' i:fcmaticn signals are affixed by agents for agents, I ney serve -- i:s:I uc-- an agent (tc do something pre-arranged or not to do some-,--i:-: '":e :irect ccniact between intelligence per"sonnel. -l't
e
,
se.' ca:, -,aie
Ii rO*;3
es 'i n the fact that the target person them wi thout attracti ng attenti on
of
t3
1e
ll R
-d,
"'1.-,-,-.
r
andest'i ne Radio Comrnunication
.ja j or {gI! 9?4, intelligence services have used radio communication --o a'l'l oiher means) for relaying messages. Since then, the beco:re considerably more detection-proof but the systems
same. For encryption or decreption (enessentially the agent commun'icator requires encryption Je:"iphering)."he
l:-.:---e.: A ccnver^ter is used as a "main keyttwith whose help 1et::r''s ca- )e converted to numbers, and vice versa. This type of key ant years old and is traced to Julius Caesar" The converted > ::l-:2-1C0 : - LJ s s:- ; :cCay called "Caesarrr in intelligence iargon. i.
JV
:':-.,.'--he agent has one ''::---: r,arion key":
:ive g
rc,
(or more) encryption keys also referred
in an endless chain of sothey are on f i lm or paper stri ps, they t'nunrbers
nunbe,'s are combined
ps
.
[dhen
of thei r i nf ini te f ormaf . each agent and for each transmjssion, nurnbers worrnrr, or i n i ntel I i gence i argoil, lr,e agent recei ves numbers vi a radi o communi cati on ,:3-:'r,:'' w'i r,-h those in thetti-worrnrr and deciphers the -s :,: :*e "iaesar'r converter. 0r he takes nurnbers from :ic: i;:s ihenr by rneans of the tti-worfittt and 'i s now able : 3n- f^31:C ngSSagS, as the
vary "'i :Ci v: dual
,gr,3uDS
for
wormrt because
Bror: \i:': -r-3 3;g-t, 3-c :-e ^caJ';uarterS must use the same issue of ;he bcc.:, ;h: :31.'i ke, :,3s:i:'' set'^'Jes as a converter. The nevJ numbers cbtainei v'ia 3 lu-:,e:^s rr3rrn .:o:lired v,''i th tho se conta i ned i n the t,ranSm'i ssicn) r'^epr:se-: pa;e -; u ji:'S, line nuFlbers, and number of I etters.
c: a t'Cagsarrt , the I etters of ( not :ie:c r i zed by the agent, are contoo long) a ser,tence verted to numbe:^s wh i ch are use'j tcr encrt'pi'i on. ,.,-.--1, t,he al: '*h : cn n'u s i, )=
d)
f$gl,qp.ry. Sentence Ke v:
e)
l'lemory 1'Jo_f4: The I et"ters of a prece--3riri:.ec i.,'"crc are extracted from the al phabet and are assigr-,ei :irle's; lt: reriain'i ng I etters are sequenti al I y nurnbereC wi;h twc-ci:;it n'i1be,^s and are used for encrypLion.
f)
[4emory Sentence
Cqrnbination: lhe 1e:te:s cf a nenory.,sentence are numberillnE are sorted al phabe"'i cai i 5': i.:e f : rst "a" = I , the second 2, the third = 3, etc. lihen al l ''a's'' are numbered, the fir st "a" rrbrr = is assigned the next number and sc on:.:nt-'il lhe ent'ire text of the sentence is converted tc digirs and numbers. The advantage of this procedure is that, no number is used twice; the disadvantage is that the lowest number a'lways represents the letter "a". This method is used in place of a "Caesar". By constanily changing the starting number for "a", new converters can be crea;ed again and again. 19
?0
3/
code chilts: some intel'ligence services use code charts, r.cgether with a "Caesar". on which frequently used phrases are represent,eC by (mostly 3-digit) numbers, In this wayr a radio transmission can
be shortenecj considerabiy.
h)
Key: This usually invoives one of the codes described c) through f) which are on'ly used in case the agent had to destroy all his codes. Emeroengv
under
ij.
C.
Transni ssion Schedules a)
Chart: In order to enable the agent to adhere to the exact transmjssion and receptfon times, he has a "time chart,'from which weekday, date, and time can be read or computed. various intelligence services do not provide any documentat'ion to their agents for this purpose; in such casesr the agent is g'iven fixed reception times which he must adhere to,
b)
Call Gloup Chgrt: Each agent has a different ca1) group or identity group for each transmission. This group must be delermined from the ''call group chart". Such a chart 16oks'like a part, of an " -i -worlntf (one._or two columns) but is usually not on "soft,'film but o n t'norma I f i lrn" and not posit'ive but rather iregative (black numbers on clear background in soft filnr; 1ight numbeis on black background on t,he cal 1 group chart). Some intel iigence services combine the cal'l group chart ard'uime charts.
Time
2a-a^
'->++r^
I
i^i .ut,v
--
-:
-
^
A-l racjic traffic is a :w3-way Forse-teleErapny communication
between the headquarters anc -,ne ager--; --hi s means t,hat, I i ke the headquarters, the ageit tcc m;Si' iave:ra:tS:iSSjon:-d receivinc p:r..i todav usuarlv o,reraies in the "ro,.'1,::::'lllirll;,!lill;r.li:1";;'lln':n' high speed. Such transntssicns car, *,nerefcre, not be broadcast directly (1ive) but rather are prepared befo:^eranc anc are run on "tra":miision machin":l'. The pick-ups operate with perfcrated iape or n:agnetic audio !up*. They have a speed of up to 2400 nunibers per minute; iheir audio frequency is approximately 20,000 tc ?Z,c-ic Hsrtz. These comnuni.iiton devices are small and easy to handle but with tricxs and manipulation can have a worldwide ranee.
A-Z Traffic
traffjc'is a one-way morse transmiss.ion from headquarters to the agent. The agent has a receiver (radio); accordingiy, he can neither respond to or confirm the transmissions of the headquirters. In this case too, lransmiss'ions occur at high lpeed (400 to 600 numbers per minute) or are recorded by the agent, rec;ified and deciphered. A-2
}{ g
EJ
ii.
f'.F F#' r {:' E-"
A-J I raftlc
*
a;
9-;: E"Fq+
is (l'ikewise) a one-way (radio)
!'= F=
t=
transmissjon from headquarters
tr tr
20
'fr? a;i€.1rhi
21 >r -L
5l fl;1 Eta ri"r*{
-.t I€..-
;€
i}.:;
ft t{
+rJ
f, case too the agent is tflghle to transmit. He which are spoKen i n groups of f i ve; he rnust wri t,e thern receives numbers down, "comb'i ne" them rvith a "corirrT'runi cati ons k*ytt, and f i na'l 1y, deci pher
to the agent. In ihis thern.
H fi ij,1
i&
fraffi c takes p-i ace cn shortwave frequencies. Every a shortwave tanc is suitable tor rece.qt'i on of such commun'i-
Al I communi cati ons wi th
rad i
o
cati
on s .
Suppiemental devices are required Transmi ss'i on equ i pnrent i
for A.-2 tr affic.
s requ'i red f or^
, -f\l.
??. att'l I
tal
l\ri
a
IH
21
22
LA
t)t rti
tr tJ
() () ,.
r-
1!
rl
r|, lr
ur
*; f"
c
lfr.
at b'l (t
fJ 5
a
LA
rO
Or
r)
rr.|
O
()
f-l (v ft;)
u\
\-
C)
\'r{
a' (\
r\ g.I
ti-
C'\ cr'l
q
n
L-'\
g
(v Lfi \g f) l5
ci rI
\o
o
;o
o1
Cf.
f
r-11
tJ
o (.^ c-
\r f.1
CT
'/. \,, t\
lJ\
O .T
C)
L
,tf
d-
ilJ
tJ\
c)
rl rr
|-'
r.n
(;1
m
,l-
rn OJ ol
r
n
LN
l'r{
iE
{
o
.Jl\a'.t
F
a
$
CI ;r'r
ci\-
r.t
{G4
I
I
I ,
I
FA"
rlo
R
o,
o t-t
r
\t
(J
-o
?
I
LA
.O F. Ft
tO
l(t
o
L
rli
ro tA
+J rO
(f,
a,
5
h
rh (u
L
vl a'J
v\
R
o
LN
c
-
rva
0')
=
D
?l
\{
€
t
E
!
*\'
R
c)
4 =c LO
r<
IJ\
+) rC
o
o \-
r\ rt
cr\
r<
r<
+
V,
tr
J
tJ1
rAl-r-,
AJ
I
o f, h
r-t
.-i^a+
-ct
-(f,
uf
a'1 lf
vr Ut
o .r C c{' OL
I I
.(l,
N
n rg
3
+l U
+J
v1
l---+t
\) qi 6) Fr
6
cv
o
r{
'n
t" (! t
f-l
C-
ralFl|r.f
co
r{ n
OJ
(r
|
\a
*
f-l
6
rl' tl
rft
$r
if
-.)
N
\|
CJ
u1 fl.r
q s'r:.
lJJo rirle
I
E
(7r
'a
.? (\; r.l
rr
c,'r
.qr
Fl
C
ar)
Til t'l
.t ro a tn
(n
IF
if
FI
@.
O
'3\
E
v (}
\.3
\f,
(U
Fl
(f,
l-
L1 q'l L'r x|
r)
s
E{
A u\
LA
LA
r-l.ttr,
f?l
s-^\
(\l
.g
d rf f-
c\
l-
tj
l* lB o o q ls I
rn (\'
\f
.'-l
T.[ansmi ss ion_, Schedu ] e
(r\
trJ
L}
c!
-f
r{ f-
I l$ IF
ln o\
|--
r-1
fn
t*1
o\
LI lr\ r"l
rl
o L d c
It
(rT
rl
L
LN
d
r{
NI
CT
*.,
fri \t rj\ sl -1 lf\
9t
s-'
r'l
I
O
r{
.n
=
il
(, ]? o
Cr
f, Cr
rn (Jr
|
-a o
rr{
Ir-
rU
A
?l
fn
u"r
a?
(\l
q (r
LN
)
(tt
GI f')
r3
h
o
l-
()
n,
v)
at'
c) q{'
lir
Fr
$t
()t
r-l
, -,
L
€li
f,'l
fl
(-) .n
Hl'e Cr I );l5i ("r I t.-
(,1
I
l:\
() .9
ii | fi
Jr
tjr
il' rO
-a:
la
| tl
C, I O
tJlr!
(ti
;t
'o
i- rr)
€
v1 F (1 c '5O L +J
q,)
r.{r {,+-
+J .C
c .E
.O
VI
o
o, qJ1
->
1A
qJ
F
c -g o -.>
=o, ooo EL cJc, E. E.
FFI
??
23
.ETanrp.Le: 0eci pheri nq (f{ai n I nte 1 1 i gence Di rectorate of the GDR !'f i ni stry for State Security) Excerpt frorn an [-worm ( Shown ; B loc t< tl -El b I oc ks
are
nurnbe
'
.
1!,
?3364 r,t,?Bg t9723 ?1253 ?.Bt,zL 1?202 55020 830ri3 48932 7|g'.l9 50106 t,J/,?"i 5g1BO 9BlB 5 16299 03482 59741 9']?:tt-
red )
33839 64412 35439 47033 09431 151i1
??6t$ 98161 8270? 2 ?84 t 01t r, Identi ty Group (or '-!t 'cal l number) Lhe seven groups of five that fol low are needed, then cut off and destroy Lhe "used" portion!
- -
3sB0i J2{e0 00318.'.B01eL 51800 . ?5085. - J-:,."'0-s5-50
sgitf T1z 6g 98309 86198 ?{B1z
033/,8 4 0/,03 3??Bg ?1250 2g/,$4 329?5
957/,f 9553/. 5?535 1?33:t
53?.{
1 t:'tgt
864ss 21717 15849 s0263 36?{ 3 u "Cagsar" .' 'F The l etters I .R I N S T E are "sr ngle-digi t": al 'l olher l etters, s i gns and code words are read by the i ntersecticn method and are Z-Cigit , Examp'l e; 9l E Attccntactt' 35 =
620?5
. -?-
rl---
?1681
10?658tr973 N
R
I
A
A
5
(D
1t o -t
B
T
E
c
D
F
*tr{) tu'
7 3
H = o (n
J
K
L
.*Q -1 3 3l
M
..rd :JC lof
d'o o. o -1 o(D l i<* l
e'
n
U
U
V
rt') so
z5
|_
X
Y
7
cll
I
,
In g''
I
Nr
0
0
P
Ei 3? W a
-
]
3 n-r s(o.! -.-J.l
.< o
0
Ei-@
ty Group" wi th +', ''tO*tl the number of g roup s Groups recei ved ' Groups determi ned tt f rom the I -Llorm"
Result
(deduce
wi fhout ttcarrytngt' the ten
-
- -
then
Letters determi ned from the "Caesar"
Erwa rte drinoend Nadrrio\ t IUrSently a'rrait
messageJ
23
24
Examp r e
for Deciphering
1.
Cal I
of
the
of 66.6fi. 197X, ,|100 Hours
an A-3 Transm'ission
:
t"o::at
" 08309
(Identity
2, Call:
(at
"Attenti
i on
0 5rt
Transmi ss i on
Group
on
11
05 hours
08309"
Separati
11 (one, one)"
on
number
of 5
nurnber
groups to fo I 1 ow )
each 5-di gi t group
are written
n after 1i00 hrs)
)
( ! I identjty Group (
Beg i
down
repeated once)
'l s
as they are broadcast
!
(a total of 11 groups).
t'i-worm" are The e eve- 5-ci,:',t g:o,.rps that follow the identity group in an wri'uien :el i'*' :re nJ-Jer grcu,ts that are transmitted. The individual numbers are then su:ira::ei froi-, cr.e a:ciher, number by number (Chinese subtraction: 'if t:e bot--::r nJi-:3r is :ar^Eer thar the top number, 10-is added to the top nUmf,er a rC ::? S-:--arC:i c:i cri -i s l:.f crn'ec wi r.,hcut cal ryi ng the one( Exarnpl e: "6 minus I = E"), The resulting n-:lerS a:C
the "Caesart'.
:igits
ar^e
?ranS,at:C in'"c ;etl.ers with the aid of
If the resul'"'is'l ower than "6", 'i -' i':e-ls a s-:;'e-iigit nunber (from 0 to 5); if it'is higher, it -"'ields a Z-cji3:: -rn::- i;'c:r 73 lo 99). The number 6 in the result means tha: the next :hree 'i;::a!^s r,3;€ --3 )e ca:rli nec 'i nto a 3-digit number (even if rt, again inc'l uces a "i')' "ir--: 'iie a:d :f t' s 3-digit number, a word or phrase 'i s then 'cur': 3' ::: :3:e a^:r-- an j : s 'nserted in the text. If the number t9 is -rhe res-:. -, rea:-'s --hai a number follows or ends. Th'i s number is compu+"eC as: clear i€t.-- --:'r:e';:res per dlgit (as a check); for this purpose symbcls sucr as '':e':c:" iir.:n:s caset be incjuded. This neans '-:a: ''.r,e Cesigra-''.cn "n;mber" the number 90) mpvt'open parenthesis" or "s'i ose oar^eniresi s". can be equated to
Nqte: A 5-digit group is arbitrari'ly
separateC
f'on --h: preceCing anC
following Eroups. Spaces have no mean'ing.
If a number group'is incomplete (does not contain 5 cigits) at the end of a "statement"o the digits 9 and 0 = 90 = period appear untr t as oflen as required unti-l the numben group contains 5 digils. 24
?5
!
-
.ffi
€ n lry'p3!Tr?q.!.aq=!1-s
ffi*Q+€F}'
ffi
ffi5P?s
.0 5408r
t
57401 46,838 7&7A7 8$CI18
070
77 aTs 07
454
1
7 66 95 0 ,67 763
t 9CIT2 t 32,93 05 0 05 2{?9,?,
t-i-@
&B
t gcr
a--'4'l-.e g+i r B' .6 o.o tq
$64?5 2137r 92085 73893 05447 ,7.7 53-G 86 ?e5 567 39 1 e005 84 0r$ A
j?g aoiTo TzJFp, c+45gT 4572t+ 6o5f o 65t?3 t ?io8 g'rj?4
ogso?
g+
t€381 89444 06$ gg 5TT66 06T96 tt 'i
*wo rm"
I
a
I
I
H
I
5
0
I
?
l
t
5
I
I
c
D
?0
n
n
7J
Tl
, iTl '-l lT6fnlrr
?rl
0
0
I
0
0
0l
0l
et
u
f.J
I I
i1
I
92
9l
q{
95
a
w
f 9r
rtlulu l-l+
f{
e]
I
n 1..,
cofufu li
Hlllr:
---+--
mlrfxj
25
26
I
i"
:03
505 continucusly 514 cover sfor"y 523 readabl e 532 meas ure 541 materi al 550 mi crofi I 569 n1 litary, militarilY 578 b ri ng a'l ong 587 i mpart 596 rnessage 604 nearest 61 3 negatj ve 6?2 normal 631 neces sary 640 instal'l ation, site 659 operati onal y 665 small package 617 pol ti cS, pol i ti ca1 1y 685 mai l ma'i I not yet recei ved 69 5 703 reaction (to) 712 send, -'i ng 721 security 730 imnredi ately +9 statement, 758 tuning 767 dead drop 77 6 appo'i ntment 785 rneeti ng 794 rneeti ng as agreed 802 meeti ng pl ace rneet'i ng ti me 81 1 820 about 839 transfBF, i ng 848 check, -ing 85i wi thout fai I 866 supportr -i ng co;lnect, -i on 87 5 BB4 ag ree, -ment 893 destructi oFr , destroy 901 tcntatively 310 preparationr prepare 929 prel imi nary 938 s uggest, -i on 941 !^lest, Berl i n 955 West, Germany 955 repea'f, -ing eccnomyr econorni ca1 1y 37 4 i83 signal 992 h eada uarters
s:1,-,-')'f
:23
::. :-: '- l:
^-:f V
U!
J\
---
= >rt
t-s*-
^-:
|.r-(.
:::
S:s:'
m
.t 3,t
:
--: . ?:
-:'-:_ :/
1.
-AA .v:
i nf orn'rati on ]
-(E
j r-
--,
-=
-r:.
_.
r
-: t->-1a-t
el
-..;
-
t
! ,
a V-r
1
lr ^Il>
.i
.Jr
F:.
. Y-J
lr
,^
2'
-.r nhqprvation
lS
.'yl
vl/r)rvl
vt
a1: L-4. ?23
t
- Fl -1 I | 'v
7
lL4 26?
ar],,'aa 3::-ess ::C-,],i^--
?71
'rf ur
280
ass'i ;:
25i
299
30i 316
325 334 343 352 361
370 389 395 406 41 5
4?4 433 442 451
460 479
'a dttL !! vr'
'-' -1
| -:eif -, eslirra-u3. es--t;3 agreeable ,::.,. receive, recei ri l;'l pick-up p'i c ked -u p
result received, recs': P-i nvest,i gati cn, 'i nv'e s: i ga*-: expectr ati cn deterrni ne' deteFriii r-.3;'i 'lr,
frequency
cati on secret wri t'i ng mater' a I border crossi ng i nfoFfil, -ati on i n stru cto r i nterest
communi
map
4BB
n tact contrcl
497
couri er
co
Coce Chart?6 .c---
3r-:
;rr {d:
/l r-l
!X\ar.v,\r'.liu.1-\1,ri'jr,]-\1.xn\4[jL1,t+fVlJdsF'Lr;-LtrainnnN^'-tL-"t1]"k'1-lf'l'ti1,i1d1]i'
r{{
E
x a m p l_e
cf :: A-3 Tra:rsmjssion of the l'lain inteliigence Directorate of Cll !'1-,'s:r-y ::r S:ate Security: ',he Decr^;'p:-cr-,
Ra:'c -.:3i:--ss-3-. o:. the 49 meter band (short ie:.,r:
:-:c:
vtave
MHz).
l;.i .:ers Grcup - Code Key (t'i-worm") '*c. 35?79 (Block 01);
li-:':e. -eir,e: ]cr,v€t'r.er ("Caesartt) c:,3':s il: :: 19l anc 5C5 io 992.
L'i
re l: *rarsr:ss:c:
L'i
ne 2:
:
AEINRS and
the two (associated)
code
as ncted
l:p:'' fr:,r, t'i-wct-i,n"
-!: ?es-' i, af :e:' "Chi nese Subtracti on: :: ne ,i: --3- s' ai',0- - rf : I etfers (the decrypted L:
6.45 or 5.95
ne
mes s ase )
:3:-: cf the "usedt' i-worm is cut off and destroyed!
(f
Identi f i cat'i cn:
r^l v\l
Transmission:
?z
A./ rl\\ L/eJ
i
l-
+)
l. n .?U
g_?
655
-L^Jo
rm :
Result:
1 B e 31 1 6I+ ?, ffi +gjgig-g*5 IT
Code
:urt^, I i ne in Block 01 )
9-z-2-g-f
),c
7-7-9.9-?
I 523l* I 5? 4 3 t-O
-?-2-" e
ce
j
Code
7 2I3
? 3 8. ^g_t
2-2-J:9-9
9:2-9-2-2
rt 5. BERICHT "
["6th I,I
27
I TH
B'-
o
o9
o
50,9
E
g4l+zG o 5 4 4'l 99089
2
5
6
5069 529c ---------
3-9-Q-€:1 oCs
(
Code
1259
z 8l+ 18 o855,
17 1g 3EL= t )
g895o 25 ? 1,, 2,-L:, 9 ? .C 8
3 o 11 g 2 ? ? 4 ?.-3 g-I-g
1
(
I'les s age :
'
I
ERH
ALT!]}{.
IIINVERSTANDEN
O
}1T
T
"
RTPORT RTCE I VED. AGREI
9/30
APP0INTI4ENT. " l
.I5I]}..II
N
"-t-*r--*
h5', l-rr.
i.r)
:'lir r/. !'2.n'
d$
ffi l:) f-tJ
ExpJ
rl,
i'i
anati on:
1 = Code key strip (i-*orm) for encryption, r-Bcogni zabl e by the vertical space between
a*-x
L?j $r{
ffi
>.!:1 li':# a€ r'14 -tll. . ;
the second and third
fi1
ii
number
groups.
,1.
2 = Code key
!!
g!
$E JlE
strip (i-worn) for
ec rypt i on no s pace.
Both code key stri p ori
)r: Xb
g'i nal s
are folded by blocks (al* ternately fol ded forward and
ft
tc the rear ( uccordj onrl i ke) .
,_-^F,
H
3 = Convert,er (ttCuesartt)
TH l-r{
t
code
charts
and I ami nated
together i n pl asti c.
flt
Ltl
t1 11
ts
Concern i 4g_J_.juLd 2:
r-? '.t
T
Each code key strip contains 20 numbers bl ocks (consecuti vel y numbered from 01 to 20) consi sting of five s-digit groups per
ti\. iI >l '-I I
Ft
| 1r I i:
l;i
line x 10 lines = 50 groups = 250 digits per nunrbers block : 5000 digits pen strip.
IH
IF
Ii: IT
li: IH IH
?B
?q Ft 1)
.-,_..{l-11d1,^-fr..Tr+-(L(
^-{ti.rlF:|FE
lL { - fJ x!x'-
F-L r-rr
: a't itr.,-r'F
v
-.2: i
: ]:-:-ni
:a--t
c's
Devi ce
:a?,Ci,s i:',"i :e C3ilbineS a traiismitter and reCeiver I Kir, :e:ef ii ^g Cp, ira:,STi sSion lOcatiOn and antenna Ce:-:.=ter^ n.,,e "'e:uercy; its operating frequencies ,.a:prC:
F
:res "lin3 c: Sigh:" crientation the Same or a the :eceivrn: enl. The co'i I antenna affixed to the charac:eristic :n a sector of 15 to 30 degrees.
T-e:-a:S-li!:erl,:eceiverisslungovertheshoulder;theperipheralequipment belt. Further there are a ilC cc:,,,=:--er a:.C bat--ery case) are worn oninathe hand and worn on the head' carpied ire *nich r:cr::rcn:.ra r^espe:ti ve l1r. 3=ceJSe e: q' I ver
'.,i
r-'
=urphon"
shape. the radio adapfs well to t'he body contours and can ccvered (camouflaged) with outer garments'
cf its
be
i+- can pract.ically not be"intercepted since this would require positioning receiver. between the two communicators and the avaiiability of a gigahertz
29
30
I
-i c^,t lcrn,un'i :a:i
'-r,t ra-l.ei
clt ]e','i cgs
of I i fr s o'orfi a m'i crophone and earPhone' A ray aPerture a-it' er +th at exiis the device through 3n i n thi s openi ng so o n rarei g-i ass i s i nserted n 'i nf n 1 i ght compol gnts e, i nvi s'i bl n(9't f or human 'y'rel lyv) 1 oong "y.r rf- f requencyof-thedecimcterwaveradioliesin caar'r'i eer .h e c wave is used in + he olu corllrsid er'ab1y shorteri nfrared 119ht S 1 de the microvia t ray of iisht ;hiris :d oInr th a t'9;ed rti:i on o r) rl aL ghi
<1( 1S' IS c1 NS rni'it +,e SN alNS:
5' e
e a
A
I
I
I
J
I
-iii"Jtiur"l
;
to
,a
the cornmunication has the he can Iikewise transm'it'
'e :3-'S3: rece.i vi ng t'aiaa dt
same
(or a similar) device
--er=:e.ive!^isanopticaldevjcewhichcanspecifical.ly'.capture'.thelight this purpose' utu particuiarly''.r:ll"l:Td^for
Uito"'iu"'
-1.s. lareras -l-.'..*-,lr-....ru"" ;;;;;;; i,-'o'nt"a una
"*,:1",:*llildli*.:f:ii"r::1il", o.yi::-ti': t,;::n;'.1:'!o{;i'l?'"li iF'"t"i"". on the-qualitv of the rece'iver: defendent ulYl{: i: range The ';i.;:=,:: 'i::he earphone. lino"'lurt.oiteiephoto lens)' i.r can be up to Z km with-good opt'ics tp"."iiiii j::qr;, i::"lii1}ft ll:"i::;::, ::.?: "?:': ,j f lLirultk]ru#:liffiiiwhi c --ra-"€i w'i t:'. an apprcpri ate . recei ver pre:k'i :9 c:f '-:e transnr ss icn'
J*J
31
il
F i I t
\ I t1
rr= intercept Cpel-a!'i Cev'i
f
on
ces f or speci f ic I i steni ng (the i ntercept the I i steni ng or i ntercept for the
aci I 'i tat,e
cf l.sten'ing devices: wire-based and wireless. .'::s a.e referred to as telephone transmitters (regardless of not-intelligence jargon: :-3 rcrnected to a "telephone" or t'microphone transmitterstt are led ca'l : *'i 'e-less devices --:.::s
:.t^; c nl-"ni ni -spyt')
.
3-=S Cf theSe rni n i atu re transrni tters cr I i sten i ng dev i ces are t3*'erf:l and in some cases no larger than a smalJ pea. They can be €'"'3rywhere and are al most never detected. ^
F
4!.i l--
\F '-v9tgv
l::i :-,:es
have very considerab'le advantages and disadvantages.
Si:,ce it is w'ire-based, 'it has a nearly unlimited life. It can draw from an available source (telephone, electrical net)' 0n the other :s more easily detected.
;:e iii::-Spv:
A wire-less system can be more easily camouflaged and installed. Tr€ srrpply is a critical point because these syslems almost aiways have a iisproportionately high power requirement, i,e.. energy. Even_though the pic<-up (microphone) and transmitter parts can be kept very sma'l'l today,_ the po*e" supply takes up a relatively large amount of space on its performance pc,t,et^
is
so snort-lived that stationary
instajlation is
unpr
ofitable.
ACcjitionally, there is ajso listenjng through tapping into the telephone system. No "Lransmitterst' are required for this but frequently record'ing devices are used to record the conversations beirg he1.-.i. Non-techn i cal Search
Room s
l,lith the aid of a building blueprint, de'"erl:ine the locat'ion of hoilow spaces in wa11s, ceilings, and floorsr shafts, firepiaces, false cejl'ings and floors, etc. in the vicinity of the rocm. 2. 3.
4.
Begin a systematic search of the room with tire aid of a flashlight' mirrors and the required keys.
ceiling, walls, and floor foi poss'i ble changes such as srnall drjll holes, needl e pri cks, and the I i ke " l4ove al I f urni ture away from the walls for this purpose. Check
Check
a'll furn'iture for
loose parfs and
i nstal led o', these parts. 5.
Tilt
6.
Carefu 1 1 y
wardrobes, desks, and other large underside w'ith mirrors.
for wires
or
heavy
connected
furniture
to or
and check the
pat the enti re surface of furniture cushions. Pay particular and g rooves . Narrow slits can be checked with the
to s I i ts a'i d of a thin rod.
attent i on
31
B3
't dll
lareiul li, c^ec( larfs, :har^,eest C,:en
,1 ^.^rc tl
a
\;
a-F^3a
r
I
r/v
|
J
VV
V
-
l.i
I
v
-'l
furn'i shings rnade of woodr ll hol€sr cavjties, etc,
ds - ulil
metdl
, or
pl asfi
c for
I oos e
? and covers, take out al I drawers and look for
s and hcl J ow spaces.
-:i.:-,:::- ',' check al I door frames, doors, window frames, paneling' -base:."rcri ci:ck for hollow spaces or loose parts by knocking' Careful'ly :he:.::racis. grooves. and other openings suitable for hiding wires or i':r-a:-:tes. ri^'t-rrres: check p'i cLure frames for cavities and drilling y'
rvv9l
s'i
LJt
Ces of curtains and drapes; check drawcords and opening co;'rcealed w'i res and hollow spaces. Check curtain rods
:r. r('^ .
rV
,
I r:-cs and carpets and search fori
lr^
|
!:
'a:." all shafts, fireplaces, ',
and
tems concealed 'i n the weave.
similar hollow spaces w'ith a
c:.--.
t il . el=,ttl^-.cal cc-:ec::cns, c.,itlets, iamps i rad i os and TV s, s peakerS, an3 c--'i3- 3 e:!-: : a , i' Eechal,: cal dev'i ces tl:at can not be removed f rom the :c3rii t:.' ::-t-.:Ei^.--i al i:;eeti n3s are t'o be checked for recogn i zabl e cha-ce<. cr ac:i--i:, -s. :f the ievices are opened, fhe power suPPl Y cord ir,usf firs-- :e r^e:3,' €C t*o: lhe receptacle. \r,
J5,
rt-.
Telephci^,e expc
'l
6.
17.
\
:V-
s
ec
l:nes are :J
De ches(ed
lor
changes
insofar as the lines are
.
Find all wiring insiCe the:^c:n, ieier^irine path 'in the area ;o be Prc:ected-
ils
the extericr surfaces o: wal ls, v;l nco\vs r leading from the room and deter;:,lne :rei
Check
F r
pur^pose, and a-,d
Cocrs
trace itS
for
wires
nllnF^!
fcr the presence
Check
all raciiatoFs, water PiPCS, microphonps, vJi res, or other suspi
pes
plants and f'l owers inc.ucIn-r interwoven wires and concealed itens.
thei' containers for
18.
19.
Check decorat'i ve
20.
0pen books and f t I es and check for i nsert,ed i t erns. all other items that can be oPened.
of
The sarne applies to
Ispp:,!an_!j.
presence If concealed objects, installations, or any incj'ications of the'inspection have technical a immediateiy found, are devices of listen'ing
performed.
32
33
-
lreParqlt
oq
Pbotoqraph v
ces to provi de the c P'i ctures are favored by al I i ntel I i gence set'vireported 'i n an items of headquarters wi th the nro st ex act representations agentts report. "The photog raph does not liel". perforned Photograph-v has the advantage of_(mostlV) bging capable of being being of possibility the in a fraction of.-t..onJ *f,i1u later piovidingexperts headquarters' the at examined at teisure-q|1!L of being evaluated by descript'ions Even ihe ncsi cc:i:p.el"'ensive rep6rt of an agent with detailed possible with made dep'iction gra6hic of an ins--alla+,ion iun n.u"r^ rnatch the
Photographi
nhairrrati s: yilv
In order tc be abl e to explciiec b5' agerts I
photograph cl andesti
acllv.
ne'l
y,
The agent photographs
there are varj ous Possj bi 1 i ti
es
with u c11et"u.,Y:ilg
.lltl'l1arv lens; the "MINoX" has a X;i:lj:_i;f#ii.u',"..t,-il '"i"J-=c-mount ir i-i6t"bnoto the camera, o"!l ^9 ;:;";;.i *li.i I ' -tl:-:t:l:: :l.IT: th" ti'"ougf .tn:.bi1o911iit.:h::^l:]::ll?. ;Ji;;l,t,l-.';."'.;'."= "-piiir"..roi. opti"l]]Y i::: Dista^,t
P:c--cgr
ur
wPe
L-Li-l
:;::.i'."'i.
!L^
-in o'.."r:"i'"g-""1v st'il1 itit-*unnut. details are ::-ll
-:?i;"1 i.r.tn;--."i;-;: at great distai'':es.
7.
^f
h.ina-
tT:::iill{ recosn'izable
on I: orCer^ to keep f rom attract'i ng attent'iphotothen and camera tlg age fj camcu wh.i je phctograPhi rg' an age:: can i f s "cinouf l aged ni di ng..P1199::' graph the i t,en wi t,'l'' i^e 3arera t r^or,'-i'ESSI.,lA" in a uruijet, the "R0B0T" in a r ihe bee' ar': Di s ccvered so f ar in the briefcase, the "i'ill.Ci: " in ar. ui:,3rella, i:r 3 cigareLte CaSe' or
;i:;;:"illit=or"a
;';=#;"[il^ii""r*li il"1;;;; .ung"-;t 3.
^^,,1--
through a perforation Fhctograpr-,-u'cal'ua
su'tt.
"s.
cetern'ine the possibilities
l'inits
""ti lech:clc;y be as small in size clandest.in. p1F6srupnr. Since the car.:e:a:s toformal is likewise prcture '.he purposa=), iao,ortiase ;.;;;bi. (ioi 'fn o"J"i-to the evaluation. optimun for 6Utain'phc'"cgraphs
oocument Photooraphy- The
of
;; "*ri-t*uff. (in th".ur" of fine-gi'a',n illn)'rery bright light or a readditional "ilit-r""Oi 1at.ive1y tons e*poiure timei hovreier, thrs usualiy requires are almost conditions or the ,se ot-u-trlpod for the camera. These frequentlv trv asents ;il!; i""iliUi"'t.i ir..'" rvirkplace) and therefore, 'it there, "in photograph to able to take the material home in'ordcr io-u"met:iod was developed which makes For this purpose, a ;;";;^;.i"iri"ii. a to etc') reports, drawings, Ooiu*"i.rts'(p1ans, it possible to reduc" lamOs
fract'ion of convential film format s'ize:
l4icrofi Between
usi ng
a
Im
Produc!-ion
two wcrl d warsi int,elligence S C TV'} CES a h'i gh-resol uti cn "normal s'i mple method:
the
tri
ed
came
rd
create to rf
"mi ni -photos" was J oaded wi th a
33
s4
i:-:. i cc:ur=n-- page was then photographed at a relatively far c:sia::e. !::a-:le: "L::cAl" format: 24 x 36 mm, size of object: approxinaie ;, 2l .1--: - ii s--:"ce: about 5 meters. Result: Size of object on f 'j lir; ::prc>.i-a*-e'-/ 2 x 3 mm - good readability when enlarged. The-aEen+oper :e:-'re: ---e --c- -.aui";: camera, tfipod, lights, document film. deve'lattracted items-which darkrgom), I (poisibly also .=,e.:ler. =.ir.n1 bath =.., a:--e---::: :;::.. = ,=l-.t u.d'had to create suspic'i on. Intel'l igence services .;-:-.e GrR) then equipped their agents with the so-ca'lled .es:e:::'-t t;;:-.-i .--i'--.=::=== which had :..*i:,9 belorv). This invoJves a simple board ng 91ass magnify'i a of i,*t -3,:s :-. , .e.: :: cer---ain intervals for the mounting Coc-:re:--
and a specia'l optical :.:,=r;.:; jens (called "sparrow-hawk" 'light source, a message fastened a b.ight Through r:..,1.r i:-",oriii). , !r +h^ -ftri -^-l +^ =r;.'.:---^.-r -.' affixed to the the car'ier onto 's: greatly ieduced 'Jas ?r^i,-i3.t<" :,,' :-:
,s::
3s a
ccatec with an emulsion prepared by the agent himself' ":.i---3.;:i' n-ic: *3s i. -1.....'.- riS 'treaJ-v," immed.i ate'l y; it required no developing.
;^tr
e:s-' :- f-':,dle :-i:-.'r l,i'l
V'
,7^
-
!v
V
ch the agent. can produce real mi croi{e r^€ c e\ e i oped by the GDR i ntel I i gence servi ces. c
aneras
rvi
th
wh'i
i,vpes have become known" 0nlY -.. 3 ccirventional "FlINOX film Spoolt'; however, only a nr i s uti j i zed per picture, (Format size of the :r3:eri al 11 DiN, *xposure tirne approximately 5 to
::;CiC
'l
6
amp.
--'1 Cne chara3-,-Eli s:j: -s :3*-: : :C ?',: nrcrof-i ln cameras: they have fixed,en-:fh) ani no depth of fccus of any kind. All focus (teFi:r3r',e-.i, ;,' se: f;:" the p'i ctures rust i:er^3fcr:, l! --.**i fri':t a i'istance of exactly 150 cm from -',' photos the --'r3 cause -r lesS C3:itrr,eters inore or itern -"o be Phofogra:f,sl. :' to be bl u rreC ' :-, cr^:f:lr',s i:' ihe size 1.4 x l.B rnm on i:to a nagazi ne in the forrn of a narrolv inse::ei is rvhich filni 6-DlN special strip. Twelve microfi ln rrages can be sv.P3se3 cn s uch a "fi lm stri p". tYP e Inumber rnissing]. It iTyp* 3_ is a considerable iniprov€t'ir€r-; iveri: carera +.oc a 6-DI N speci al fi I u ses i is sri-ialler^ )'et. is easier to handJe and r-he co'i n). Fifteen images 1-lferrig a ( i ze cf s about rounC i S whi ch however, ,ll. f s ihi cn are exposed mrn 1.5 1.? x size of the opmeni cf Ty Fe 3. Thre s ane film materiai is used l,'Jv-fr-e 4'l i s a f urther devel 'i n the f i ln i s quad:^ati c i n shape whereas it is hold center except that the
"Typ*-{'
al
ready prov'l ies "rea-.''
m
can be used 'i n Type 3 round rn Typ* 3. The films for the T),pe 4 canera-ypes --i 2 through 4 is 17 to carneras but no vi ce versa. The exposu re u e cf 15 seconds wi th a 500-watt piroto 1arnp. l4i
cro-fi-b PhqtqcopJj nq Dev'i ce
Agents were equ'i pped by the KGB (Soviet intel I i gence servi ce) with 'i c ame ra for use i n photographi ng docurnents n the microfilm forrnat.
spec j al The carnera
a
34
35
;, T
r
El r q''
J I
t
{rl ' {/ll X .ml. . ,-1" 3l .rl l
J
It i{ t F t, J
0.)
4J
dO'
k
a)&. *r-,
o L L (J
o-a L= o-&
r?-
ll
=il ull
ad
:llil
OJ
a
t
'
-If,
rr5
L
+)
'a
N r-O
(,s ()
_ .rl
'Fl
"lol (JI
\'r
H ti'! f-T
16
ol
L JL a(ll tA -o
L
cll ,rnr ll
F
.Bl
-'gl E t]-
-rl )-'l
cJ
0)
E
,{rl -y In Llo ()l t+-l
.-Fl
gg..
ll
'F -l aO g LtLI Ot 'r 'rul E Ir^l o:l ol cd o-
3S ro om u{ L:f o sl ()L .rl 3/1
tt1
co
fFJ
co
O
-C
{nlr- Lqt (ILtn Ol c0)
o
{rl 3 cl
t,.
EL
oo.o. 5 -C urs L
L
OI
&
UI
ul
=l
€l
'1* N
BG) 1(' q)
L} OF
'$ {J rO > r
o L
o
..iLr
!t-
p
E(l)
(d
(fl
zo
E
€t rt
.'54
H
El .9l rr-rl
,VI (o
.f
te E .nl Etn
c.fl E
Pl 1gi -.r n O g{ (-l
orl FP n +) ,E
z:
9l CO 'F
{,
>.S
ii'= 'r r* -l-(5
tF r'1- (9 C gl rtt'
tBi
-
EI
'3(l)
\'
ut-ao r
=,' E =l Ol i? o .nl lot-
.
\-cl \01 \
EI
7i 0Jl (I D_l
4.:ll
'lJ 'r
= rFl
'a
..
Ji c{o t* +) L'r
a
ooo
lOL f. (9
!4
t, ol
(eI -
l |
o)l t) Q) 't'- t'l Vt c-o C{u (dE 'r CO g-c rF O.'t-= rF -c +J(fE 'r*J tUr- O E'lE (tr 3 -fooE .fttl (.D(J<
case, ]: has ar. elec--l^ical illuninat-i c: device -.1 :3(e l,:;Jres, t.h= a;en: piaces the cj'3ar3t:e
-e--*-e
$:r
3 ,\"
#j
Cl ::,g laagi SJi'f aCe; a --h'i fi i'Cl-i ef aC*"',','a'rgS :,a:i:i'ii^ei th= CaSe is placeC cn t:,e plper (an s r,:-* :ec.-i-e:). By 'tr,jiling o'y'er" the textu w"i t,- an --: r I g rrr-, the ccr, t,ent.s of the ciocument can be phct,o:n3 'rrage ,s a lr+---le more than a third of a paEe c: = all-, 3 a x ll in. j; t,rerefcre, the spec].al canera a h,ai, rhat ther^e i s a sl ight "oVerl appi ng" i n carrel'a :,':'S
*'r
, JgV'r
t--.:-:::--
rvas Ceve I oped duri ng ni atu r 1 zeti on of a wri :
;\{
*t r\* YJ
-,- 3-
a>7 \-\r'
I v
;\
)
:
t'tv
raF^-,,^ vv:Jv:
rI
I suLr\,\-s
lf
E>);>=
ir>
ft, T
crof i I m -i rnages have noth i ng i n
1y; then thi s reducti on i s exposeo graphical 1y; 3qe i s reduced photographical 3 *ess '"e: i s secret ) and_thereby composi evr'ryvr iaYr iIqJsr ayer" (*nose iu liolllt Ju ldnann e- "3,3 \wtrvJs ' ti on eye', ln9, tay91 1Q for the.human invis'ib1e b..o*.s it .r,"t ;l=u--ii format that it will small :=l:--in ar.d.is stamped out in such a scriPt. i:: c: an r" of typewriter t :-e 3,:vaniage ihat 'i t won t be det,ected "by chance" (or r€'.'i:es). But'it aJ so has cons iderabl e di sadvantages
-:
f.-l
mi
-AF
vv!9
: fr -.j
ro.ess arid the producti on of
the second worl d war. It repretten message.
U J
?f ='-
vl'\-rho
: -.: 'v
^z^
tg>v
:rp3'ss'.:.e --'? I
L,
nca .i -=c I
UVU
I
Vv
:: :
e
in crder --3 :
i or
.e^'^'-'
.'--1. __dt=:
vt
vi
-.n3,
' 'J
\trlvf
eUe
ri .
'vi
^rr\e/^n,no vJV\rr'/\-
Y
where
it is located; i!
(ai least a magnif-i cation of 130 -,-inres)
.^^_e Fe3:3D lg. V-V
s3:"'a'-,a:iS, the nicrodot process is no l,.gnqe-J".-used. "l sa:'.,, 1f-,:a;: oi possibly being detected, microfilni S
Because Desp'i
and. t h erefore agg nt, himsel f ; t^re :': : -ce= Dit -:c3'.',e i: :',:t nust know exactl ^'i^:l9r-
--e
tc
l-
s'_.i:3r-
-i-r'agSDSCtS.
Conta'i ner^s
The ch'ief characteris--:c ot'i:,telIiEe:jce services is clandestineness' II nlsi hide the "intelligence-materra-1 order to assure c aides::i-ie:ess' agents .intelligence hiding places (ca11ed Bas'ical1y, there are --hree i3,33s cl
"contaitrirs" in in:e'l :i::nc=
1. 2, 3.
;ar^9on):
Canrovflaoed Ccncealr:n-Ca.c,he--gr Stcraqe : ' a:e Sh-lpping Cont.?iner^s
'lagec
cc:cealrer,t: a caiTlouf l aged concealment off ers th: oppo""unity o; wcr<..n3 I'ciancjestine'l y" with a..device; to acc::: ti-,i=, the ievi:e is.:Sncealed (e.g. "m-ini-spy" in a lamp, "bt:" tel ephone, ca:r13] a i n the ci garette case).
camouf
36
f:
Type i
-
l-
Aciual
2=
Carnera housi ng Lens Sl i
l{=
I I
{
I
de shutter
Fi'l m f4'i
transport lever
nox
film
spool
__Ic
Typ.
(-i
2
I nsertabl e Fi I rn ;a= Exposed Fi lm )o= Unexposed Fi I m 5 t-
.a l.-
g-
Came 14ag
ra
4 = l,ling-nut retai ner
atr
az 'i n e
7c= Fi 1m package
Type
3
I
1 = Camera 2 = Magazitre 3 = Knurled screw knob 4 = Pressu re s pri ng 5 E Connector for tri
f a
sc rew
.6 E Shutter sl'i de -;
-l
it
ii
'n
I
tlil
ii ii
I
Special
r\
Can'rera
Brii
in Cigarette
Case
("l''licrofilrn Photocopying Device")
,.li
9'r;
T'
1 = Fi lm cassette 2 =Refai ner arm for 7 =Battery ccnrPartmenl I+ =['l ect,rical suppiy cab]e , =Pri sm mi rrcrs 5 =Sreciai LomP
!'
/1O
Rubber Roi I ers "Gl idd Rol jers) MetiaI (Touch and Switch)
7
I
1
Roller
.9b
9a 10 411
ta
Di
rection of
= Case Closure
:
Fi lm counter = Lever for Device Mov
l4ov ement
ement
I
I
'\
\\
I
\
I r."'
-- ^,.'1-t\*
*,.
l'It I
ll
.
i\ ,1.
\
1\
I L" --.itl- .)
39
s*
tr &; t:- ----
4S
H
F
bQu (t
'
Y
Type
Carnera
iE!
?E
Hag az
i ne
Retaining l,
?-I I
i
I t I
I
--
I I I
1o
t
E!
Arm
Shutter slide
t'.
Remote cab'le
5=
Reta i n i
cabl
I
(connected) '.
nq screw for
e held
'
rernoLe
? ri Lens B H Light shaft (top view) I s Fllu 1O s Tripod mounti ng threads
I
I
40
4i
{.
or Storage Place: used to descrrbe locations at which intel I imaterial and devices are placed in order to store them for i a;et use or io protect them from detection but sti11 provide ready
Cache AA I H :\'"v\'l
A
to
ACCESS
them
(false identity
documents, C-paper, communications
racjjos, microfilm cameras).
CCC3S,
If intelligence material is to be transa secret hid'ing place which has been in, c in a conlainer (suitcase. bag, case). The delineations r: 2 and 3 are not absolute. Thus, for examp'l e, a compartment a ''coniainer" located in the apartmeni of an agent can serve \ cache cr can be used as a means of transportation or shipment.
Shr 3pi ng Containers: ! c r;ec the cour^ier uses -l
t^
\atP r^,^\
-^_Cr_r^rC= r^F-t'l^ , il \
( lij
vJ'J
-,gence
i^*^-I ll,
hiding places can be protected and unprotected,
^.3 ianref I n wh i ch a conceal ment i s safeguarded often depends on i ts ccis:r*ct;on or the purpose for whi ch i t i s to be used; I i kewi se, the l1;arl1j tI-C ir rvhich the corTipartrnent consist,s that is built^i nto a ,:'it nc :l ace r Diays an essential role. ^?
tr''3^
:al (te:iLnical )
-
Safeguards:
coniai nerr res'i stance must be overcome (e, g,
lever, rolt lock).
nc : a:t c?:r -ie prc--ecteC i n a "dangerous" or ttnon-dangeroustt .wavs directed only onl.y toward the content, iancer j s a .ways :re;1. --le iar,ger^ ',ih:rel'.' :
:-te.,'ge':e ;-:--er'al. Suilt in exp'lostves and the like have her-r =: t- --:e iiG af--er the second world war. it mostly --c rir3:(B 3xposed 3u'i undevelcped filnr unusable ci^ a flnsh',n'hi:l'nrcci\'t rc d,,2' . The "r,,rn-:engerous" safeguarC consists only ov erccn-e tna:i s carrlcuf l aged j n such a way t,hat of an ofsta:-e it =reo..eilt-r'"' ce:ecr:i. i-- , s t,o Drevent the chance -ae _.-^^;r.lEi!-. opening of t.:e \
H,
I
b)
v
\-
.l
'Y
: L.r'
g
-'v
t-X-\
rr
_
Psychol og-,cal, Sa;ecLa-is:
ves prc-ue ct,-i i,; --he i ,:, 3 pl ace i'y l'reans of a t'tri ck" designed to prevent c^scc"'cri, ; --rre c3rcel'l relt. cr the manner Of opening. Bul perhaps il shcul: ass-r:e'-hat ther^e is not even any suspicion crea'ueC rn tne fir s: p.a:: (e,9. use cf a ivater-tight container in a sewage pit; a fer:ale em:lc;'ee cf a government. office carried prophy'l act'i cs anc syn:ne'i-ic bra inserts with her in her purse in order to elicit feelings cf chance among the checkpo'int personnel; or the musical clock r+i'uh the secret compartment - it plays during the entire time of the search and "causes nervousnesst'; the bottom or the top of a can are provided with left-hand threads and the more an attempt'is made to open it by rirning to the'left, the more the ljd is t'ightened). 0f course, a concealment can a'lso be safeguarded per a) and b).
Th
i s i nvcl
'i-'
I
41
A+
-(i
la
A concealrnent'is considered "unprotected" pressure of the safeguards described.
if it
can be opened without the
A container can be installed in any object! Each device into which a conta'iner has been insta]1ed, must in any case be able to be used in the same manner as an unprepared device. The item in which a secret h.id.ing place is located may never deviate from the original in terms of size, we-ight, and appearance, A prescript'ion for how to find "something" or where one has to look and "how" to 'look cannot be provided. Often the "knowledge" of the ttwhat" and "how" of opposition intell'igence services is already oF netp'in eliminating or-.lessening the avers-ion of investigat'ing officials to the investigation
of"crimes aqainst the state".
Isiened] (1^lerth) Chief Detecti ve Superi ntendent
42
rf: ilq