Spycraft. - BestLightNovel.com
You’re reading novel Spycraft. Part 29 online at BestLightNovel.com. Please use the follow button to get notification about the latest chapter next time when you visit BestLightNovel.com. Use F11 button to read novel in full-screen(PC only). Drop by anytime you want to read free – fast – latest novel. It’s great if you could leave a comment, share your opinion about the new chapters, new novel with others on the internet. We’ll do our best to bring you the finest, latest novel everyday. Enjoy
42 Messages were created by adding the random series of numbers (the "keys") on the designated page of the OTP to the plaintext message. The person receiving the ciphered message subtracts the random numbers (found on his matching copy of the OTP) to recover the original message. Messages were created by adding the random series of numbers (the "keys") on the designated page of the OTP to the plaintext message. The person receiving the ciphered message subtracts the random numbers (found on his matching copy of the OTP) to recover the original message.
43 It needed to be a good-quality shortwave receiver capable of single sideband reception. It needed to be a good-quality shortwave receiver capable of single sideband reception.
44 These are often referred to outside the CIA as "numbers stations" or "counting stations." For more information on "spy numbers stations" and an opportunity to listen-in on sample transmissions, go to: These are often referred to outside the CIA as "numbers stations" or "counting stations." For more information on "spy numbers stations" and an opportunity to listen-in on sample transmissions, go to: www.spynumbers.com/enigma.html 45 A 150 five-number message would contain 750 numbers. It was possible, but less common, for transmissions to also be sent using phonetic language where letters were "spoken" (alpha, bravo, charlie, delta, foxtrot, etc.). Most messages were usually fixed at a length of 150 five-number groups, but could be longer. If the message was shorter than 150 groups, additional numbers would be added as "pads or "filler" at the end. A 150 five-number message would contain 750 numbers. It was possible, but less common, for transmissions to also be sent using phonetic language where letters were "spoken" (alpha, bravo, charlie, delta, foxtrot, etc.). Most messages were usually fixed at a length of 150 five-number groups, but could be longer. If the message was shorter than 150 groups, additional numbers would be added as "pads or "filler" at the end.
46 "Time-sensitive" information reported events or circ.u.mstances of immediate significance. If not received by the intelligence service quickly, the reporting rapidly lost its value. "Time-sensitive" information reported events or circ.u.mstances of immediate significance. If not received by the intelligence service quickly, the reporting rapidly lost its value.
47 Weiser, Weiser, A Secret Life, A Secret Life, 215, 229. 215, 229.
48 Ibid., 229-230. Ibid., 229-230.
49 "Bent-pipe" refers to the satellite's limited role in receiving and relaying the signal without any processing. In essence, the signal from the agent bounced off the satellite to the ground receiving station. "Bent-pipe" refers to the satellite's limited role in receiving and relaying the signal without any processing. In essence, the signal from the agent bounced off the satellite to the ground receiving station.
50 The Russian Federal Service (FSB) museum in Moscow displays an attache case, labeled as the BIRDBOOK system, which is filled with electronics and has a transmitting antenna built into the lid. The Russian Federal Service (FSB) museum in Moscow displays an attache case, labeled as the BIRDBOOK system, which is filled with electronics and has a transmitting antenna built into the lid.
CHAPTER TWENTY-FIVE.
1 Bearden and Risen, Bearden and Risen, The Main Enemy, The Main Enemy, 522-523. 522-523.
2 Ibid. Ibid.
3 R. James Woolsey, in testimony before the Senate Select Committee on Intelligence, February 2, 1993, just before his installation as DCI. The colorful metaphor provided a "sound-bite" justification for his view that substantial intelligence resources were still needed in the post-Cold War era. R. James Woolsey, in testimony before the Senate Select Committee on Intelligence, February 2, 1993, just before his installation as DCI. The colorful metaphor provided a "sound-bite" justification for his view that substantial intelligence resources were still needed in the post-Cold War era.
4 A term applied to the period where movement of information became faster than physical movement, more narrowly applying to the 1980s onward. The Information Age also heralded the era when information was a scarce resource and its capture and distribution generated compet.i.tive advantage. Microsoft became one of the largest companies in the world based on its influence in creating the underlying mechanics to facilitate information distribution. A term applied to the period where movement of information became faster than physical movement, more narrowly applying to the 1980s onward. The Information Age also heralded the era when information was a scarce resource and its capture and distribution generated compet.i.tive advantage. Microsoft became one of the largest companies in the world based on its influence in creating the underlying mechanics to facilitate information distribution.
5 James Gosler, "The Digital Dimension," from James Gosler, "The Digital Dimension," from Transforming U.S. Intelligence Transforming U.S. Intelligence, Jennifer Sims and Burton Gerber (editors) (Was.h.i.+ngton, D.C.: Georgetown University Press, 2005), 96.
6 Ibid. Ibid.
7 Ibid. Ibid.
8 Weiser, Weiser, A Secret Life, A Secret Life, 158. 158.
9 Gosler, "The Digital Dimension," 100. Gosler, "The Digital Dimension," 100.
10 Ibid. Ibid.
11 Ibid., 101. Ibid., 101.
12 Ibid. Ibid.
13 Construction of the Internet began in 1969 with the Advanced Research Projects Agency Network (ARPANET) by academic researchers under the sponsors.h.i.+p of the Advanced Research Projects Agency (ARPA). Two decades later, the Internet became publicly accessible with a worldwide system of interconnected computer networks. The "Net" connected thousands of smaller commercial, academic, domestic, and government networks, creating an interlinked "World Wide Web" that provided varied information and services including online chat, electronic mail, and instant messaging. Construction of the Internet began in 1969 with the Advanced Research Projects Agency Network (ARPANET) by academic researchers under the sponsors.h.i.+p of the Advanced Research Projects Agency (ARPA). Two decades later, the Internet became publicly accessible with a worldwide system of interconnected computer networks. The "Net" connected thousands of smaller commercial, academic, domestic, and government networks, creating an interlinked "World Wide Web" that provided varied information and services including online chat, electronic mail, and instant messaging.
14 Walker was arrested on May 20, 1985, shortly after leaving secret doc.u.ments for the KGB at a dead drop location in rural Montgomery County, Maryland. The warrant authorizing the search of the Ames residence was made possible by the discovery in their household trash of a yellow Post-it note referencing a covert meeting with the Russian Intelligence Service to be held in Bogota, Columbia. Walker was arrested on May 20, 1985, shortly after leaving secret doc.u.ments for the KGB at a dead drop location in rural Montgomery County, Maryland. The warrant authorizing the search of the Ames residence was made possible by the discovery in their household trash of a yellow Post-it note referencing a covert meeting with the Russian Intelligence Service to be held in Bogota, Columbia.
15 Decision Support Systems, Inc., Decision Support Systems, Inc., Secure Communications Operational Tradecraft; "How Not To Be Seen," Secure Communications Operational Tradecraft; "How Not To Be Seen," January 11, 2002, website: January 11, 2002, website: www.metatempo.com/SecureCommo.PDF.
16 For even greater protection, the agent may choose to superencipher the message using an OTP first, and then enciphering it again using a "strong and proven" encryption program such as PGP (Pretty Good Privacy). See: For even greater protection, the agent may choose to superencipher the message using an OTP first, and then enciphering it again using a "strong and proven" encryption program such as PGP (Pretty Good Privacy). See: web.mit.edu/network/pgp.html. Such protection, properly employed, would be slow and c.u.mbersome to use, but would result in an "unbreakable message." Such protection, properly employed, would be slow and c.u.mbersome to use, but would result in an "unbreakable message."
17 "Malware" (malicious software) includes programs for data encryption, digital steganography, pa.s.sword "cracking," and "hacking." Possession of such software, while not illegal, may become a basis for suspicion if detected during an examination of the agent's computer and hard drive. "Malware" (malicious software) includes programs for data encryption, digital steganography, pa.s.sword "cracking," and "hacking." Possession of such software, while not illegal, may become a basis for suspicion if detected during an examination of the agent's computer and hard drive.
18 The first electromechanical encryption machine was developed and patented by Edward Hebern in 1918. The first electromechanical encryption machine was developed and patented by Edward Hebern in 1918.
19 A free version of PGP can be downloaded from A free version of PGP can be downloaded from www.pgpi.org/. Advanced commercial versions of PGP are available from www.pgp.com/.
20 FBI Affidavit for the Arrest of Ana Belen Montes; September 2001, pg. 8. The complete affidavit can be downloaded at FBI Affidavit for the Arrest of Ana Belen Montes; September 2001, pg. 8. The complete affidavit can be downloaded at www.fbi.gov/pressrel/pressre101/092101.pdf.
21 Robert Hanssen 2001 Arrest Affidavit No. 86-87. Hanssen's technique was so effective that the KGB was unable to locate the message on the diskette. A month later, on March 28, 1988, he sent a letter to them with the simple instruction "Use 40 TRACK MODE." See: Robert Hanssen 2001 Arrest Affidavit No. 86-87. Hanssen's technique was so effective that the KGB was unable to locate the message on the diskette. A month later, on March 28, 1988, he sent a letter to them with the simple instruction "Use 40 TRACK MODE." See: www.cicentre.com/Doc.u.ments/DOC_Hanssen_Affidavit.htm.
22 Cole, Cole, Hiding in Plain Sight, Hiding in Plain Sight, 5. 5.
23 Ibid. Ibid.
24 Hundreds of stego programs are commercially available over the Internet and allow data to be hidden in a variety of file formats using familiar graphic interfaces found on the Windows operating systems. Hundreds of stego programs are commercially available over the Internet and allow data to be hidden in a variety of file formats using familiar graphic interfaces found on the Windows operating systems.
25 Dead drops are still in use and difficult to detect when used only once. FBI Special Agent Robert Hanssen was arrested on February 18, 2001, after loading a dead drop with information for the SVR at Foxstone Park in Vienna, Virginia. Dead drops are still in use and difficult to detect when used only once. FBI Special Agent Robert Hanssen was arrested on February 18, 2001, after loading a dead drop with information for the SVR at Foxstone Park in Vienna, Virginia.
26 See: See: www.callingcards.com/ for pricing and coverage of international phone cards. for pricing and coverage of international phone cards.
27 The a.s.sumption is made that retail outlets that sell phone cards near foreign emba.s.sies and missions are likely to be under surveillance and stocked with special phone cards that allow all calls to be monitored and traced. The a.s.sumption is made that retail outlets that sell phone cards near foreign emba.s.sies and missions are likely to be under surveillance and stocked with special phone cards that allow all calls to be monitored and traced.
28 Robert Hanssen 2001 Arrest Affidavit, No. 131. Robert Hanssen 2001 Arrest Affidavit, No. 131.
29 Tomlinson, Tomlinson, The Big Breach, The Big Breach, 66-67. 66-67.
30 See news articles: See news articles: news.scotsman.com/international.cfm?id=115032006; www.dlmag.com/news/12/01-24-2006/418-britain-russia-and-a-spyrock.html.
31 FBI Affidavit for the Arrest of Ana Belen Montes; September 2001, pg. 11. FBI Affidavit for the Arrest of Ana Belen Montes; September 2001, pg. 11.
32 Gosler, "The Digital Dimension," 110. Gosler, "The Digital Dimension," 110.
EPILOGUE.
1 Lovell, Lovell, Of Spies and Stratagems, Of Spies and Stratagems, 40-41. 40-41.
Selected Bibliography Agee, Philip, CIA Diary: Inside the Company CIA Diary: Inside the Company (New York: Stonehill, 1975). (New York: Stonehill, 1975).
Andrew, Christopher and Vasili Mitrokhin, The Sword and the s.h.i.+eld: The Mitrokhin Archive and the Secret History of the KGB The Sword and the s.h.i.+eld: The Mitrokhin Archive and the Secret History of the KGB (New York: Basic Books, 1999). (New York: Basic Books, 1999).
a.s.sessment of Men: Selection of Personnel for the Office of Strategic Services (New York: Rinehart & Company, 1948). (New York: Rinehart & Company, 1948).
Barnes, Bart, "Obituary, Sidney Gottlieb," The Was.h.i.+ngton Post, The Was.h.i.+ngton Post, March 11, 1999. March 11, 1999.
Bearden, Milton and James Risen, The Main Enemy: The Inside Story of the CIA's Final Showdown with the KGB The Main Enemy: The Inside Story of the CIA's Final Showdown with the KGB (New York: Random House, 2003). (New York: Random House, 2003).
Benson, Robert Louis, and Michael Warner, VENONA: Soviet Espionage and the American Response, 1939 VENONA: Soviet Espionage and the American Response, 1939-1957 (Was.h.i.+ngton, D.C.: National Security Agency and Central Intelligence Agency, 1996). (Was.h.i.+ngton, D.C.: National Security Agency and Central Intelligence Agency, 1996).
Biederman, Danny, The Incredible World of SPY-Fi The Incredible World of SPY-Fi (San Francisco: Chronicle Books, 2004). (San Francisco: Chronicle Books, 2004).
Bosworth, Mary (editor), Encyclopedia of Prisons and Correctional Facilities, Encyclopedia of Prisons and Correctional Facilities, Volume 2 (Thousand Oaks, California: Sage Publications, 2005). Volume 2 (Thousand Oaks, California: Sage Publications, 2005).
Boyce, Fredric and Douglas Everett, SOE: The Scientific Secrets SOE: The Scientific Secrets (Phoenix Mill, England: Sutton Publis.h.i.+ng Limited, 2003). (Phoenix Mill, England: Sutton Publis.h.i.+ng Limited, 2003).
Brown, Anthony Cave (editor), The Secret War Report of the OSS The Secret War Report of the OSS (New York: Berkley, 1976). (New York: Berkley, 1976).
Brown, Anthony Cave, Wild Bill Donovan: The Last Hero Wild Bill Donovan: The Last Hero (New York: Times Books, 1982). (New York: Times Books, 1982).
Brunsnitsyn, Nikolai, Openness and Espionage Openness and Espionage (Moscow: Military Publis.h.i.+ng House, 1990). (Moscow: Military Publis.h.i.+ng House, 1990).
Cambridge Dictionary of Science and Technology (New York: Cambridge University Press, 1990). (New York: Cambridge University Press, 1990).
Cambridge World Gazetteer: A Geographical Dictionary (New York: Cambridge University Press, 1988). (New York: Cambridge University Press, 1988).
Carl, Leo D., International Dictionary of Intelligence International Dictionary of Intelligence (McLean, Virginia: International Defense Consultant Services, 1990). (McLean, Virginia: International Defense Consultant Services, 1990).
Center for the Study of Intelligence, "Intelligence in the War of Independence" (monograph) (Was.h.i.+ngton, D.C.: Central Intelligence Agency, undated).
Center for the Study of Intelligence, "An Interview with Former General Counsel John S. Warner," Studies in Intelligence, Studies in Intelligence, 22:2, Central Intelligence Agency, 1978. 22:2, Central Intelligence Agency, 1978.
Center for the Study of Intelligence, "An Interview with Richard Helms," Studies in Intelligence, Studies in Intelligence, 25:3, Central Intelligence Agency, 1981. 25:3, Central Intelligence Agency, 1981.
Center for the Study of Intelligence, Office of Strategic Services 60th Anniversary Special Edition XI Office of Strategic Services 60th Anniversary Special Edition XI (Was.h.i.+ngton, D.C. Central Intelligence Agency, June 2002). (Was.h.i.+ngton, D.C. Central Intelligence Agency, June 2002).
Central Intelligence Agency, "Directorate of Science & Technology: People and Intelligence in the Service of Freedom" (Was.h.i.+ngton, D.C.: Central Intelligence Agency, printed circa 2003, undated).
Cherkas.h.i.+n, Victor, Spy Handler: Memoir of a KGB Officer Spy Handler: Memoir of a KGB Officer (New York: Basic Books, 2005). (New York: Basic Books, 2005).
Clarridge, Duane R., A Spy for All Seasons: My Life in the CIA A Spy for All Seasons: My Life in the CIA (New York: Scribner, 1997). (New York: Scribner, 1997).
Colby, William, Honorable Men: My Life in the CIA Honorable Men: My Life in the CIA (New York: Simon & Schuster, 1978). (New York: Simon & Schuster, 1978).
Cole, Eric, Hiding in Plain Sight: Steganography and the Art of Covert Communication Hiding in Plain Sight: Steganography and the Art of Covert Communication (Indianapolis, Indiana: Wiley Publis.h.i.+ng, 2003). (Indianapolis, Indiana: Wiley Publis.h.i.+ng, 2003).
The Concise Columbia Encyclopedia (New York: Columbia University Press, 1983). (New York: Columbia University Press, 1983).
Concise Dictionary of World History (New York: Macmillan Publis.h.i.+ng Company, 1983). (New York: Macmillan Publis.h.i.+ng Company, 1983).
Corson, William R. and Robert T. Crowley, The New KGB: The Engine of Soviet Power The New KGB: The Engine of Soviet Power (New York: Quill, 1986). (New York: Quill, 1986).
Couffer, Jack, Bat Bomb: World War II's Other Secret Weapon Bat Bomb: World War II's Other Secret Weapon (Austin, Texas: University of Texas Press, 1992). (Austin, Texas: University of Texas Press, 1992).
Crawford, David, Volunteers: The Betrayal of National Defense Secrets by Air Force Traitors Volunteers: The Betrayal of National Defense Secrets by Air Force Traitors (Was.h.i.+ngton, D.C.: Air Force Office of Special Investigations, 1988). (Was.h.i.+ngton, D.C.: Air Force Office of Special Investigations, 1988).
Crown, David A., "Political Forgeries in the Middle East," Studies in Intelligence Studies in Intelligence, 22:2, Central Intelligence Agency, 1978.
Deriabin, Peter, Watchdogs of Terror Watchdogs of Terror (New Roch.e.l.le, NY: Arlington House, 1972). (New Roch.e.l.le, NY: Arlington House, 1972).
Donovan, James B., Strangers on a Bridge: The Case of Colonel Abel Strangers on a Bridge: The Case of Colonel Abel (New York: Atheneum, 1964). (New York: Atheneum, 1964).
Dulles, Allen, "Brain Warfare," speech to the National Alumni Conference of the Graduate Council of Princeton University, Hot Springs, VA, April 10, 1953.
Dulles, Allen, The Craft of Intelligence The Craft of Intelligence (New York: Harper & Row, 1963). (New York: Harper & Row, 1963).
Earley, Pete, Confessions of a Spy: The Real Story of Aldrich Ames Confessions of a Spy: The Real Story of Aldrich Ames (New York: Berkley, 1998). (New York: Berkley, 1998).
Edwards, Michael, "The Sphinx and the Spy: The Clandestine World of John Mulholland," Genii: The ConjurorsiMagazine, Genii: The ConjurorsiMagazine, April 2001. April 2001.
Fischer, Benjamin B., "The Central Intelligence Agency's Office of Technical Service, 1951-2001," (OTS 50th anniversary booklet) (Was.h.i.+ngton, D.C.: Central Intelligence Agency, 2001).
Fischer, Benjamin B., The Journal of Intelligence History The Journal of Intelligence History (Nuremburg, Germany) 2:1, Summer 2002. (Nuremburg, Germany) 2:1, Summer 2002.
Ford, Corey, Donovan of the OSS Donovan of the OSS (Boston: Little, Brown & Company, 1970). (Boston: Little, Brown & Company, 1970).
Gardner, George, Picks, Clicks, Flaps and Seals: A Monograph on Surrept.i.tious Entry Picks, Clicks, Flaps and Seals: A Monograph on Surrept.i.tious Entry (unpublished monograph), 1944. (unpublished monograph), 1944.
George, Willis, Surrept.i.tious Entry: The Sensational Story of a Government Agent Who Picked Locks and Cracked Safes in the Service of His Country Surrept.i.tious Entry: The Sensational Story of a Government Agent Who Picked Locks and Cracked Safes in the Service of His Country (New York: Appleton-Century, 1946). (New York: Appleton-Century, 1946).
Glinsky, Albert, Theremin: Ether Music and Espionage Theremin: Ether Music and Espionage (Urbana and Chicago: University of Illinois Press, 2000). (Urbana and Chicago: University of Illinois Press, 2000).
Gordievsky, Oleg, Next Stop Execution: The Autobiography of Oleg Gordievsky Next Stop Execution: The Autobiography of Oleg Gordievsky (London: Macmillan, 1995). (London: Macmillan, 1995).
Gosler, James, "The Digital Dimension," in Transforming U.S. Intelligence Transforming U.S. Intelligence, Jennifer Sims and Burton Gerber, editors (Was.h.i.+ngton, D.C.: Georgetown University Press, 2005).
de Gramont, Sanche, The Secret War: The Story of Espionage since World War II The Secret War: The Story of Espionage since World War II (New York: Putnam, 1962). (New York: Putnam, 1962).
Grose, Peter, Gentleman Spy: The Life of Allen Dulles Gentleman Spy: The Life of Allen Dulles (New York: Houghton Mifflin, 1994). (New York: Houghton Mifflin, 1994).
Gup, Ted, "The Coldest Warrior," The Was.h.i.+ngton Post Magazine, The Was.h.i.+ngton Post Magazine, December 16, 2001. December 16, 2001.
Helms, Richard, A Look over My Shoulder-A Life in the Central Intelligence Agency A Look over My Shoulder-A Life in the Central Intelligence Agency (New York: Random House, 2003). (New York: Random House, 2003).
Hersh, Seymour, "Huge CIA Operation Reported in U.S. Against Antiwar Forces, Other Dissidents in Nixon Years," The New York Times, The New York Times, December 22, 1974. December 22, 1974.
Hinkle, Warren and William W. Turner, The Fish Is Red: The Story of the Secret War Against Castro The Fish Is Red: The Story of the Secret War Against Castro (New York: Harper & Row, 1981). (New York: Harper & Row, 1981).
Hogg, Ivan V., The New Ill.u.s.trated Encyclopedia of Firearms The New Ill.u.s.trated Encyclopedia of Firearms (Secaucus, New Jersey: Wellfleet Press, 1992). (Secaucus, New Jersey: Wellfleet Press, 1992).
Hood, William, Mole Mole (New York: W. W. Norton & Company, 1952). (New York: W. W. Norton & Company, 1952).
Kahn, David, The Codebreakers The Codebreakers (New York: Macmillan, 1967). (New York: Macmillan, 1967).
Kalugin, Oleg, The First Directorate: My 32 Years in Intelligence and Espionage The First Directorate: My 32 Years in Intelligence and Espionage (New York: St. Martin's Press, 1994). (New York: St. Martin's Press, 1994).
Karnow, Stanley, Vietnam: A History Vietnam: A History (New York: Penguin, 1997). (New York: Penguin, 1997).
Keenan, George F., Memoirs: 1925-1950 Memoirs: 1925-1950 (New York: Pantheon, 1967). (New York: Pantheon, 1967).
Kern, Gary, "How 'Uncle Joe' Bugged FDR," Studies in Intelligence, Studies in Intelligence, 47:1, Central Intelligence Agency, 2003. 47:1, Central Intelligence Agency, 2003.