Intelligence Magazine - Number 44: Eye Spy
Intelligence Magazine - Number 44: Eye Spy
Intelligence Magazine - Number 44: Eye Spy
BRIEF NOTES FROM THE EDITOR Its one of the most powerful and fascinating editions of Eye Spy we have ever published. Readers will find three specially commissioned features on tradecraft and the intelligence services, besides several major reports on the work of the security services relating to espionage and counter-intelligence. We receive dozens of enquiries each month from readers wanting to learn more about the training that potential operatives undertake as they endeavour to carve out a career in the security services. So whats it really like? Training techniques are carefully guarded secrets, but we can relate basic scenarios and reveal a few tips from the real spooks who ply their trade in countries across the world. For those interested in real tradecraft this edition is a must. Readers will also find the first feature of a new series - DIY SPYCRAFT. In coming issues readers can learn from our experts who have spent years adapting ordinary devices and turning them into more powerful tools. Other features will actually show you how to build spy equipment - including room bugs, spy cameras, audio devices and much more. Dozens of tips and specialist advice will help you save a small fortune. Use the material responsibly! Our feature on intelligence crests (featured in Eye Spy 43) proved hugely popular. But in this edition we finally solve the mystery of Britains Secret Intelligence Service (SIS/MI6) crest! You dont want to miss this! A reminder also that all new subscribers receive a free high-quality full-colour giant poster of the worlds intelligence crests. Some are well known, but others very rare. Its a unique free gift. Theres just time for me to mention our new subscription card. All new and existing subscribers can use the card to save money on selected items. Wherever the card appears alongside a product, the item is discounted for subscribers. Its just one more reason why taking out a subscription to Eye Spy is fantastic value. A brief overview of Eye Spy Intelligence Magazine now follows.... Mark Birdsall Editor
In the Dark Arts feature trainees are eventually tasked with securing intelligence about a suspected terrorist who frequents a bar. They must also determine areas in the bar most suitable for placing covert cameras and listening devices. Eye Spy readers are invited to examine this photo and submit their own answers. Three readers will win a covert camera detector. Test your skills!
Mail Surprise
Eye Spy looks at what should and should not be done when a suspicious package or letter arrives on your door step
Its the easiest, though hardly the most effective way to deliver a bomb or deadly substance to a location, office or individual. During its journey a multitude of things can happen to a package that results in it not reaching its destination, yet despite spectacular advances in mail security and screening, the odd item will get through. However, the sender will always be uncertain, and furthermore, once the item is discovered, tests can take place on its content, outer-packaging and from whence it came and was posted. Eye Spy has learned that terrorists are again examining the route one method to deliver their deadly message. Sadly, its likely those working in the delivery system are more vulnerable than the intended receiver. But there are actions and procedures than can lessen the risk.
INFILTRATION
The complex and dangerous world of undercover agents, the forwarding of intelligence, and some of the methods used to communicate, infiltrate, observe and conceal...
Depending on the environment, circumstances, and often country of operation, working undercover and acquiring and communicating intelligence poses major problems. Infiltrating a suspected terrorist cell, crime gang or any illegal operation with an embedded operative is both difficult and dangerous, but not impossible. In recent times at least six suspected terrorist cells in Canada, Britain and America, have been successfully infiltrated by actual operatives. In each case the members of the cells had associations with al-Qaida. To breach any terror cells security the authorities must first try and establish who its core members are, the lead players and their association with each other. Beyond this, the group may use assurance and insurance peripheral personnel who have some knowledge of the groups are areas deemed off limits to intent, though not necessarily be aware of operational plans, or those not working in the intelli- indeed, the identity of all the core members. Many terrorist gence business, but there are a groups in the 1970s and 80s were small in number and confined to a specific area of operation. The Bologna (Italy) based group few trade secrets in the public Red Brigades - formed by student protesters who dedicated domain already, and these do themselves to an armed struggle against the capitalist state were notorious for attacking government targets in the country. provide a glimpse of how a However, once an operative was caught, this often led to the sting operation is enabled... capture of other terrorists. Todays terrorists are more cautious. Creating layers of reality,
Operation Crevis
Details emerge of the plot to blow-up the Houses of Parliament
Exactly 401 years ago, Guy Fawkes, a Yorkshireman, conspired with a group of Roman Catholic conspirators to blow up the Houses of Parliament. He was caught and subsequently executed. His death is remembered every year by millions of Britons on 5 November - Bonfire night. Its ironic therefore that a trial is taking place just a few miles away from the UK seat of power that also involves another alleged plot to demolish Londons most famous buildings. On the morning of 30 March 2004, anti-terrorist police arrested Omar Khyam and six other men after police discovered more than half a ton of ammonium nitrate fertilizer in a storage facility near Heathrow Airport in west London. The police operation was codenamed Crevice and owed its genesis to an alleged interception of an instruction sent by al-Qaida commanders to operatives in the UK.
Guy Fawkes
The trial of Khyam is currently taking place at the Old Bailey and is not expected to end until well into 2007. Eye Spy examines some of the disturbing testimony that reveals al-Qaidas growing menace and means to communicate is flourishing...
BARNHAM
The defunct Cold War base with a chilling history
Tucked away in the glorious English countryside is a former military facility that hides a plethora of Cold War secrets... Watch towers, crumbling concrete huts, barbed-wire fences, seemingly oddly designed pathways and roads and a number of strange buildings indicate this was no ordinary facility. Eye Spy takes a look at what remains of RAF BARNHAM - a former top secret base once used to house Britains first nuclear deterrent... the Blue Danube
Watchtower at Barnhan
Blood Money
European Court rewards British traitor
George Blake, one of Britains most notorious traitors responsible for the deaths of dozens of British agents has been awarded 3,000 ($5,750) and 1,340 costs by judges sitting in the European Court of Human Rights. The money relates to profits over his 1989, autobiography, No Other Choice. A large section of the book focused on his work as an
MI6 officer. Blake had already received about 60,000 in royalties before the UK Government started legal action to stop him profiting from the book. A further 90,000 was frozen. In May 2003 his lawyers started another action and argued that his human rights were being breached - he was awarded 5,000 in compensation. In 1960, Blake was outed as a KGB spy, but not before he had caused immense damage to British intelligence. Blake served in MI6 from 1944 to 1961, but unbeknown to his superiors, in 1951, started spying for the Soviets. At his trial (behind camera) in 1961, the UK Government initiated a clever plan to try and limit the damage he had caused from the media. They even suggested Blake, born in Holland, had never been involved in intelligence work.
George Blake
Blake was handed down a 42-year prison term, but only served five years after his dramatic escape from Wormwood Scrubs prison in London. Besides being responsible for the deaths of dozens of British agents, it was Blake who also revealed the secret CIA Berlin spy tunnel to the Soviets. The joint MI6-CIA tunnel had been built directly under the Soviet Embassy in Berlin. Eye Spy also has a special feature on the tunnel, including a rare photo showing engineers and MI6 officers at work inside the structure.
The Enigmas
And other recovered artefacts of U-85
Enigmas World War II history is inextricably linked with that of the Unterseeboote (U-Boat). The wreckage of U-85 commanded by Oberleutnant zur See Eberhard Greger, a Type VIIB that sank on 14 April 1942 under gunfire and depth charges from the USS Roper with the loss of all 46 hands, lies in approximately one hundred feet of water off Cape Hatteras, North Carolina. U-85 was participating in the attacks on merchant shipping along the eastern seaboard of the United States that began in earnest with Operation Paukenschlag on 13 January 1942. U-85 was the first boat lost during these operations and was in fact the first U-boat sunk by a US Navy warship in WWII. At the time of the sinking US Navy divers were unable to recover anything of cryptologic significance, despite attempts to do so. Citing contemporary reports, the U-85 was ...lying nearly flat on her starboard side... and suggests this as the reason for the failure of navy divers to gain entry to the boat despite ...about one hundred descents to the wreck. Any consideration of raising U-85 to the surface by pneumatic means was soon abandoned owing to the considerable damage to the boats ballast tanks caused by Ropers depth charges. In August of 1997, amateur diver Roy E. Parker, during his first exploration of U-85, recovered two oak boxes containing the spare wheels for two different Enigmas. A study of these wheels determined that U85 had been carrying two Enigmas whose inventory numbers were M2946 and M3131. The boxes were recovered from a cabinet on the bulkhead adjacent to the captains quarters. David Hamer provides a fascinating insight into the Enigmas recovery, their restoration and importance to the world of codebreaking.
Cyber Terrorism
Intelligence analyst Kevin Coleman examines the growing threat of cyber terrorism and the dangers that lurk just around the corner
Cyber-terrorism or attacks on telecommunications and computer networks have been called the invisible threat to national economies and security. Day after day, digital warriors defend our information systems and infrastructure against thousands of unseen attacks by criminals and terrorists. This intelligence brief will help you fully appreciate the growing threat of cyber terrorism, the offensive capabilities of cyber terrorists, and the defensive measures that can be taken in response to such dangers. Included in this brief will be actual intelligence and scenarios that
Terrorism and information technology are related in two ways. First, the Internet has become a forum for both terrorist groups and individual terrorists to spread their messages of hate and violence. The internet allows terrorists to communicate with one another and with sympathisers. Secondly, individuals and groups use the Internet to attack computer networks and systems via cyber-terrorism or cyber-warfare activities. The term cyber-terrorism conjures up many different images. The truth is, cyber terrorism has been around longer than most people think. Cyber terrorism did not evolve after the terror attacks on 11 September 2001. According to the Federal Bureau of Investigation, cyber terrorism is any premeditated, politically motivated attack against information, computer systems, computer programmes, networks and data, which results in violence, disruption or damage against non-combatant targets by sub-national groups or clandestine agents.... This fascinating article also includes a virus threat timeline
Winter Cometh
Vehicle Surveillance Tips
During any vehicle surveillance in winter operatives may have to deal with adverse weather conditions. Eye Spys surveillance advisors have listed a few points of interest - some are obvious, some are not so obvious, but all should be mandatory.... including a potato.
POWER MONEY
EYE SPY PRODUCT REVIEW
The PowerMonkey
Weve all been there. Away from home, nowhere near the car, on a train or coach and you havent got the mains powered charger with you (which is fine because you dont have access to a wall socket anyway) and your cell phone or laptop computer has just run out of battery power. Or maybe your surveillance camera battery has just died and the target is getting away or your radio is out of range and you find it necessary to revert to a cell phone... but the battery has just failed. Well, there is a new product on the market which will help you avoid such situations - its called The PowerMonkey.
Small size, light weight and cleverly crafted design, plus its highly competitive cost means the device is likely to become an essential piece of kit in future months. Our experts take the PowerMonkey for a test drive.
Adam Gadahn
Other Features
A brief round-up of additional reports and features
A-BOMB. North Korea detonates underground nuclear bomb. Analysts believe missile delivery system is now inevitable SPY WARS. Georgian security services detain several Russian Army officers in spy row. Georgia insists it has broken up a major spy ring VODAFONE. Vodafone faces an enormous fine after Greek Government says it did not do enough to stop over 100 cell phones being intercepted in run-up to 2004 Olympic Games INTELLIGENCE SUMMIT. A date has been set for the popular International Summit in the USA BIN-LADEN 2000. A video showing terrorist leader Osama bin-Laden and a number of the 9/11 hijackers, including Atta, has aired on satellite television. Analysts are calling the tape an intelligence gem SPY MOSCOW. Russia continues to arrest academics in huge espionage purge.
UNDERCOVER TRADE BOOK RELEASES. The latest intelligence, tradecraft and espionage books
EYE SPY
24 HOURS A DAY
INTELLIGENCE MAGAZINE
www.eyespymag.com
Interest package: MI6 word search Games Enigma Code breaking Intel quiz Learn the mind of a spy Intel files on John Lennon Cold War FBI mysteries
FREE INTELLIGENCE CD
Virtual tour of a nuclear submarine Special feature on the history of intel crests and seals 13 famous detailed espionage cases 13 spy photos that changed the world
This offer is ONLY AVAILABLE to EYE SPY SUBSCRIBERS. Subscriptions prices are identical. All recipients will receive their first magazine plus gifts a week prior to Christmas with your name as sender. To purchase a gift subscription simply add Christmas to the subscription form in this magazine or on-line or contact Eye Spy. Remember, to take adventage of this offer you must be a current subscriber. Dont forget to include the name and address of whom the gift is intended. Please order early as Eye Spy cannot be held responsible for delays in mailing. Current Eye Spy subscribers can obtain their new Subscription Card by sending a SAE to Eye Spy. The card can be used to claim discounts on certain purchases
SUBSCRIBE TODAY
Eight information-packed editions per annum for just:25.00 UK $48.00 USA/Canada 30.00 Rest of World This also includes special air mail delivery! Subscribe on-line or telephone 01756 770199 (UK), 877 309 9243 (North America - Toll Free!) + 44 1756 770199 Worldwide - or print the form in our subscription section and send to our UK or USA office
UK Editorial Address: Eye Spy Publishing Ltd, P O. Box 10, Skipton, North Yorkshire, . BD23 5US, England Telephone: 01756 770199 e-mail: editor@eyespymag.com Web Site: www.eyespymag.com Office hours: 12.00pm - 7.00pm Monday to Friday USA ADDRESS: Eye Spy Magazine, Empire State Building, 350 Fifth Ave, Suite 3304-22H, New York, NY 10118-0069, United States of America TOLL FREE: 877 309 9243 SUBSCRIPTION & ORDER LINE ONLY Office hours: 7.00am - 4.00pm EST Monday to Friday