29.12.2014 Views

From the editor - Eye Spy Intelligence Magazine

From the editor - Eye Spy Intelligence Magazine

From the editor - Eye Spy Intelligence Magazine

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

EYE SPY INTELLIGENCE MAGAZINE<br />

ISSUE 48 MAY/JUNE 2007<br />

READ BY THE WORLDWIDE<br />

INTELLIGENCE COMMUNITY<br />

The world’s only newsstand magazine devoted to<br />

espionage, intelligence and related issues<br />

<strong>Eye</strong> <strong>Spy</strong> <strong>Intelligence</strong> <strong>Magazine</strong> issue 48 is now available<br />

EACH ISSUE 84 FULL COLOUR PAGES<br />

• contains features, reviews, special reports, tradecraft<br />

tips and much, much more<br />

• invaluable reference and research tool<br />

• high quality photographs - printed on luxury paper<br />

• extremely collectable<br />

Images contained in this pdf are very low resolution<br />

<strong>From</strong> <strong>the</strong> <strong>editor</strong><br />

Some people have criticised MI5 for allowing two of <strong>the</strong> 7/7 bombers to “slip under its<br />

radar”. This follows a Security Service disclosure that ano<strong>the</strong>r gang had meetings with<br />

lead 7/7 terrorist Mohammed Khan at least 12 months prior to <strong>the</strong> London bombing. In its<br />

defence, MI5 said that <strong>the</strong>y believed that Khan and his colleague Tanweer, were “outside”<br />

<strong>the</strong> plot <strong>the</strong>y were investigating. That “plot”, of course, involved bombing targets in London<br />

and bringing down an airliner on top of <strong>the</strong> capital. It’s easy to criticise, and with<br />

hindsight, MI5 probably should have informed local police officers after <strong>the</strong>y followed<br />

Khan back to Leeds. Never<strong>the</strong>less, a decision was made to focus on <strong>the</strong> ‘fertiliser plot’<br />

and a fur<strong>the</strong>r 55 suspects in sou<strong>the</strong>rn England. <strong>Eye</strong> <strong>Spy</strong> has two exclusive reports from<br />

Beeston, Leeds, <strong>the</strong> home of <strong>the</strong> 7/7 sleeper cell, and <strong>the</strong> 33,000 hour surveillance operation<br />

that netted members of <strong>the</strong> gang dubbed - <strong>the</strong> ‘Crawley Mob’.<br />

Ano<strong>the</strong>r fascinating feature - ‘Art of Distraction’, has been carefully prepared by our own<br />

consultants - many of whom have first-hand experience in <strong>the</strong> espionage industry. Besides<br />

obvious forms of distraction, this tradecraft can be delivered in a subtle or powerful<br />

manner; it can involve individuals, or many people, be used indoors or outdoors. Nearly<br />

always it is devious, deflective and carefully crafted. There is usually an ulterior motive for<br />

its use. A distraction technique was almost certainly used to deflect UK and USA attention<br />

away from some strange goings-on in <strong>the</strong> waters off Iran. However, <strong>the</strong>y are not always on<br />

such a grand scale, and can be much simpler in delivery. This is a first-class examination<br />

of this multi-faceted tradecraft and is a must for enthusiasts and specialists alike.<br />

There’s just enough space to mention our DIY feature. You won’t want to miss <strong>the</strong>se<br />

tricks... first we reveal how to make a relatively secure tape recording only you can hear;<br />

<strong>the</strong> second project will enable you to make a through-wall listening device, and finally <strong>the</strong><br />

same piece of equipment can be used in <strong>the</strong> construction of a parabolic microphone.<br />

An brief overview of <strong>Eye</strong> <strong>Spy</strong> 48 follows....


LEAKING INTELLIGENCE<br />

ANTI-TERROR CHIEF LAMBASTS INFORMANTS<br />

It’s not often one of <strong>the</strong> UK’s most seasoned<br />

and experienced anti-terrorist<br />

leaders speaks publicly about intelligenceled<br />

raids. It’s even more unusual when he<br />

accuses unnamed persons of deliberately<br />

leaking operational details to <strong>the</strong> media -<br />

just hours before MI5, Scotland Yard and<br />

regional anti-terrorist officers conducted a<br />

most important raid.<br />

Obviously deputy assistant commissioner<br />

Peter Clarke, head of Scotland Yard’s<br />

Counter-Terrorism Command is not willing,<br />

nor really could he, name and shame <strong>the</strong><br />

individuals involved. However, it’s clear that before police arrested nine suspects in Birmingham on 1<br />

February, at least two phone calls were made to a media contact and details given about <strong>the</strong> circumstances<br />

of <strong>the</strong> operation. Sources say that a journalist even travelled to <strong>the</strong> city on <strong>the</strong> eve of <strong>the</strong><br />

operation (31 January) to make sure he was “first on <strong>the</strong> scene”. It’s also likely that a government<br />

official briefed ano<strong>the</strong>r journalist before <strong>the</strong> raids occurred.<br />

FALLING DOWN<br />

THE 7/7 HOUSE OF CARDS<br />

Main picture:<br />

Beeston, Leeds<br />

Lengthy undercover operation aided by MI5<br />

agents results in arrest of three men... all<br />

charged with 7 July conspiracy - Iraqi-based<br />

‘planner’ detained by CIA<br />

It was an inevitable happening - more arrests in<br />

connection with <strong>the</strong> July 2005 London terrorist<br />

attacks. However, for many senior ‘journalists’<br />

and media analysts who believed <strong>the</strong> four men<br />

acted independently, <strong>the</strong> raids in Leeds came as a<br />

“shock.” To residents, it was ano<strong>the</strong>r reminder<br />

that <strong>the</strong>ir streets are still under surveillance. To<br />

seasoned police investigators and <strong>the</strong> Security<br />

Service, <strong>the</strong> operation was expected.<br />

EXTRACT: While <strong>the</strong> suspects must be regarded<br />

as innocent until proven guilty, <strong>Eye</strong> <strong>Spy</strong> has<br />

learned that several more persons, and not


necessarily resident in <strong>the</strong> UK, are under<br />

surveillance. More arrests will follow as<br />

<strong>the</strong> complex and meticulous planning<br />

behind <strong>the</strong> attacks unfold. Three key<br />

questions have been answered - was a<br />

senior al-Qaida commander controlling <strong>the</strong><br />

operation, and did <strong>the</strong> 7/7 bombers have<br />

liaisons with <strong>the</strong> 21/7 suspects and <strong>the</strong><br />

group - recently found guilty of plotting<br />

numerous attacks in <strong>the</strong> south of England<br />

(see Operation Crevice) The answer is a<br />

resounding yes to all three questions. If <strong>the</strong><br />

intelligence is correct in relation to <strong>the</strong><br />

recent police operation, <strong>the</strong>n <strong>the</strong> 7/7 gang<br />

were far from being <strong>the</strong> “isolated individuals”<br />

or “clean skins” described by Britain’s major news company<br />

based in London.<br />

22 MARCH 2007<br />

A 20-month MI5 operation ended prematurely as three prime suspects<br />

allegedly involved in <strong>the</strong> 7/7 London terrorist attacks were<br />

arrested in Leeds and Manchester. On 22 March, police officers at<br />

Manchester Airport arrived unannounced and surprised <strong>the</strong>ir airport<br />

colleagues. As <strong>the</strong> airport’s huge CCTV system was trained on<br />

International Departures, undercover officers waited at <strong>the</strong> check-in<br />

desk of Pakistan Air flight PK702 - Manchester to Islamabad. At<br />

exactly 1.00pm, as two men checked-in <strong>the</strong>ir luggage and went<br />

airside, officers from Scotland Yard’s anti-terrorist division quietly led<br />

<strong>the</strong>m away via a side door. It was <strong>the</strong> culmination of a huge surveillance<br />

operation, that had to be ended prematurely.<br />

A full report in <strong>Eye</strong> <strong>Spy</strong>, plus details of <strong>the</strong> arrest of 7/7 planner Nashwan abd al-Razzaq.<br />

WHILE THE CAT’S AWAY<br />

RUSSIAN ESPIONAGE AND DISTRACTION<br />

As MI5 focus on intelligence battles with terrorists,<br />

Russian espionage reaches Cold<br />

War proportions...<br />

According to British counterintelligence officers, at least 30 ‘diplomats’<br />

based at <strong>the</strong> Russian Embassy and trade mission in London<br />

are actively engaged in ga<strong>the</strong>ring intelligence. However, o<strong>the</strong>r<br />

sources believe this is a very conservative estimate.<br />

Russian Embassy London<br />

While many officers are engaged in trying to acquire UK technological<br />

and military secrets, some FSB officers are reportedly operating agents to


monitor a number of Russian dissidents who are actively opposed to President Putin, including billionaire<br />

Boris Berezovsky. With demonstrations against President Putin happening more regularly in Red Square,<br />

<strong>the</strong> Russian intelligence services are increasingly ‘edgy’...<br />

THE SCIENCE OF SPYING<br />

MISSING THE VITAL INGREDIENT<br />

London’s prestigious Science Museum is currently<br />

hosting an exhibition about spying, but have<br />

organisers missed a golden opportunity to impress<br />

upon youngsters <strong>the</strong> importance of intelligence<br />

One commentator described it as <strong>the</strong> “world’s<br />

largest interactive spy exhibition,” with budding<br />

visitors entering <strong>the</strong> world of espionage through a<br />

secret door. “Experience <strong>the</strong> latest spy gadgets and<br />

techniques in <strong>the</strong> <strong>Spy</strong>maker Technology Centre as<br />

you begin to find out about <strong>the</strong> plans of <strong>the</strong> shadowy<br />

organisation OSTECK.” Interactive games allow<br />

visitors to test a few gadgets and solve a few puzzles,<br />

but in reality, <strong>the</strong> exhibition may have missed a<br />

trick or two.<br />

Dame Eliza Manningham-Buller, recently retired MI5<br />

Director-General, visited <strong>the</strong> museum to formally<br />

open <strong>the</strong> exhibition on 8 February. Dame Eliza said:<br />

“I was delighted to be invited to open <strong>the</strong> ‘Science of<br />

<strong>Spy</strong>ing’ exhibition. The entertaining programme of<br />

exhibits and activities introduces children and parents<br />

to some important issues facing our society in<br />

<strong>the</strong> 21st century. Some of <strong>the</strong> <strong>the</strong>mes of <strong>the</strong> exhibition<br />

are at <strong>the</strong> forefront of <strong>the</strong> current work of <strong>the</strong><br />

Security Service (MI5)...<br />

MI5 Director-General Dame Eliza Manningham-Buller<br />

FRAGMENTED INTEL<br />

FRANCE DGSE WARNED OF<br />

AIRLINE PLOT IN JANUARY 2001<br />

Analysing lots of bits of information is a difficult task. It’s like flying over a landscape full of<br />

fields - all sectionalised and with different boundaries. You know exactly what <strong>the</strong>y are, but you<br />

can’t make out exactly where it is. A newly acquired set of French DGSE reports leading up to<br />

9/11, and packed with valuable intelligence, reveals just how frustrated analysts must have felt


on <strong>the</strong> morning of 11 September 2001 -<br />

<strong>the</strong> clues were plenty, but it was impossible<br />

to see <strong>the</strong> bigger picture<br />

EXTRACT: Journalists from France’s Le<br />

Monde newspaper have acquired over 300<br />

classified documents prepared by <strong>the</strong><br />

intelligence service DGSE, referencing an<br />

“airliner hijack plot” against <strong>the</strong> United<br />

States. Interestingly, <strong>the</strong> files, dated January<br />

2001, allegedly show <strong>the</strong> DGSE notified <strong>the</strong><br />

CIA that it believed Osama bin-Laden’s terror<br />

group was working on an operation to hijack<br />

US airliners.<br />

13 September 2001 - smoke still billows from Lower Manhattan<br />

The documents, dating predominantly from<br />

July 2000 to October 2001, includes a<br />

report, dated 5 January 2001, that notes al-Qaida has been working on an airline hijacking plot for<br />

months. The title page read: ‘Plan to hijack an aircraft by Islamic radicals’. It fur<strong>the</strong>r references a terrorist<br />

ga<strong>the</strong>ring attended by <strong>the</strong> al-Qaida leader, Taliban and Chechen militants in Kabul, Afghanistan in October<br />

2000. It is believed <strong>the</strong> 9/11 operation was ‘green-lighted’ at this meeting. The terrorists discussed <strong>the</strong><br />

possibility of hijacking a plane after takeoff in Frankfurt, Germany, one document said, citing Uzbek<br />

intelligence. A note listed potential targets: American, Delta, Continental, and United Airlines, Air France<br />

and Lufthansa. The list also mentioned “US Aero”. To-date, analysts are still unsure what this phrase<br />

meant. As it transpired on 11 September 2001, two US aeroplane companies - United and American, saw<br />

airliners hijacked.<br />

Uzbek intelligence apparently gleaned <strong>the</strong> information from Abdul Rashid Dostum, an Afghan warlord from<br />

<strong>the</strong> Uzbek society battling <strong>the</strong> Taliban in Afghanistan. He had sent his spies to infiltrate al-Qaida training<br />

camps. Dostum is <strong>the</strong> current chief of staff of Afghanistan’s army....<br />

OPERATION CREVIS<br />

33,000 HOURS OF SURVEILLANCE NETS THE ‘CRAWLEY MOB’<br />

Five members of an al-Qaida sleeper cell dubbed <strong>the</strong><br />

‘Crawley Mob’, have been convicted for <strong>the</strong>ir part in a<br />

huge UK terror plot. All <strong>the</strong> men have been jailed for<br />

life. Omar Khyam, Anthony Garcia and Waheed<br />

Mahmood will all serve a minimum of 20 years’ before<br />

<strong>the</strong>y are considered for parole (if <strong>the</strong>y were given<br />

determinate sentences this would amount to 40 years).<br />

Jawad Akbar and Salahuddin Amin both will serve a<br />

minimum of 17-and-a-half years’ before <strong>the</strong>y are considered<br />

for parole (if <strong>the</strong>y were given determinate sentences<br />

this would amount to 35 years’). If <strong>the</strong>y are ever released, <strong>the</strong>y will be on life licences. The judge at <strong>the</strong> trial of<br />

<strong>the</strong> men described <strong>the</strong>m as “cruel and ruthless.”


EXTRACT: One surveillance operation<br />

led Crevis officers to an Access storage<br />

facility in Hanwell, near Heathrow<br />

Airport, west London. In November<br />

2003, a van arrived at <strong>the</strong> storage<br />

facility containing over half a ton of<br />

ammonium nitrate fertiliser. One of <strong>the</strong><br />

gang also purchased an aluminium<br />

compound that would help ignite <strong>the</strong><br />

fertiliser. This was tucked away in a<br />

biscuit tin in a garden shed. MI5 placed<br />

three surveillance cameras in <strong>the</strong><br />

facility, including one in lock-up<br />

number 1118. Meanwhile Scotland<br />

Yard inserted an undercover officer<br />

codenamed ‘Amanda’ at <strong>the</strong> front desk<br />

in <strong>the</strong> reception area.<br />

Breakthrough - Omar Khyam examines<br />

<strong>the</strong> fertiliser inside unit 1118 at <strong>the</strong><br />

Access storage unit unaware he is being<br />

secretly taped by MI5<br />

Crevis officers still had to tie in some<br />

of <strong>the</strong> leading Crawley Mob suspects<br />

with <strong>the</strong> ammonium nitrate fertiliser in<br />

Hanwell. Then came a breakthrough,<br />

Omar Khyam visited Access and asked<br />

for key 1118 - an MI5 surveillance<br />

camera taped him as he inspected <strong>the</strong><br />

sack. It was a clear link and a defining<br />

moment.<br />

With mounting speculation that <strong>the</strong><br />

gang was about to strike, undercover<br />

officers visited <strong>the</strong> storage facility and switched <strong>the</strong> fertiliser with ano<strong>the</strong>r “harmless substance”. Meanwhile<br />

MI5 officers liaised with NYPD, Pakistan’s ISI and Canadian police over suspected gang members....<br />

“Since <strong>the</strong> 7 July London bombings, a<br />

number of rumours and misunderstandings<br />

have emerged concerning<br />

investigations into <strong>the</strong> bombers and<br />

<strong>the</strong>ir links to o<strong>the</strong>r extremists, particularly<br />

<strong>the</strong> fertiliser bomb plotters. The<br />

Security Service addresses a number of<br />

<strong>the</strong>se rumours and provides <strong>the</strong> facts<br />

behind <strong>the</strong> myths.” - MI5 STATEMENT


THE WAITING GAME<br />

AL-QAIDA PLANS TO “SHAKE THE ROMAN THRONE”<br />

Back-to-back British <strong>Intelligence</strong> assessments warn of a massive terrorist operation currently being<br />

devised by al-Qaida commanders in Iran and Afghanistan. References to Hiroshima and Nagasaki appear<br />

in <strong>the</strong> reports...<br />

EXTRACT: ....Al-Qaida’s “self-appointed” commanders are under pressure to pull-off ano<strong>the</strong>r significant<br />

attack in <strong>the</strong> West.<br />

EVOLVING PLANS<br />

In recent months security officials<br />

on both sides of <strong>the</strong> Atlantic have<br />

tried to predict where <strong>the</strong>se attacks<br />

might occur, how <strong>the</strong>y will be<br />

actioned, and what <strong>the</strong>y will entail<br />

in terms of explosives or o<strong>the</strong>r<br />

kinds of devices. <strong>Eye</strong> <strong>Spy</strong> learned<br />

of a secret UK anti-terrorist exercise<br />

involving <strong>the</strong> “hijacking of a<br />

ferry”. The event took place last<br />

year but details of <strong>the</strong> operation<br />

were kept away from <strong>the</strong> media.<br />

Nei<strong>the</strong>r <strong>the</strong> ferry operator or <strong>the</strong> Special Forces involved desired publicity. US security officials have<br />

performed identical counter-terrorism operations. ‘Smart’ units have been established in various coastal<br />

facilities ready to react to any kind of maritime hostage or hijack situation. Similarly, some security<br />

specialists have warned that al-Qaida has discussed embarking on a hostile mission - basically overpowering<br />

<strong>the</strong> crew and taking hundreds of passengers hostage. A 2002 terrorist operation involving a<br />

passenger ferry travelling from Spain to England was thwarted by Spanish intelligence. In this case<br />

explosives were to be detonated while <strong>the</strong> ship was far out at sea.<br />

That “proof” appears fairly weighty, but some would argue much of it is circumstantial. Scotland Yard<br />

found traces of Polonium-210 - used to kill Litvinenko - in several locations visited by Lugovoi in London,<br />

and on three British Airways aeroplanes using <strong>the</strong> Moscow to Heathrow<br />

route. They even found radiation on a seat at <strong>the</strong> Arsenal Football Club<br />

ground. It just so happened that <strong>the</strong> seat was <strong>the</strong> one used by Lugovoi.<br />

The Russian insists he had been contaminated by his presence near<br />

Litvinenko.<br />

THE ART OF DISTRACTION<br />

Distraction - it’s one of <strong>the</strong> most subtle, yet important weapons in <strong>the</strong><br />

armoury of a spy, but increasingly some of <strong>the</strong> tradecraft used for hundreds<br />

of years is being adopted by terrorists, organised gangs and simple<br />

crooks. <strong>Eye</strong> <strong>Spy</strong> looks at <strong>the</strong> multifaceted tradecraft known as ‘distraction’


EXTRACT: Moving such a consignment of drugs, let’s<br />

say from <strong>the</strong> Caribbean to Amsterdam, requires a great<br />

deal of planning. Transport, personnel, storage, documentation,<br />

and counterploys are a high priority. Both<br />

<strong>the</strong> sender and receiver will have connections,<br />

thus believe it or not, trust plays a major part in a<br />

criminal operation. When <strong>the</strong> stakes are so high,<br />

criminals will often seek out a weak link in <strong>the</strong><br />

administration of both ports. Clearing cargo,<br />

documentation and customs is difficult, and<br />

tough new regulations can present problems.<br />

Criminals will select <strong>the</strong> best day to sail, perhaps<br />

when security is overwhelmed by <strong>the</strong> sheer<br />

volume of sea traffic incoming or out-going, or if<br />

officials can be ‘turned’, <strong>the</strong>n it doesn’t really<br />

matter. If <strong>the</strong> paperwork is ‘good’, <strong>the</strong>n clearance is<br />

authorised. Sometimes <strong>the</strong> ship is ‘clean’, but once at<br />

sea, it will be met by a ‘go fast’ carrying vessel. The<br />

drugs are moved aboard at sea.<br />

C<br />

B<br />

A<br />

GONE IN SIXTY SECONDS<br />

A<br />

B<br />

In many cases, <strong>the</strong> vessel will not sail directly to<br />

Amsterdam, it will call at various ports ‘picking up’<br />

non-consequential goods, or even legitimate cargo.<br />

The merchandise may even be switched to ano<strong>the</strong>r<br />

A typical purse snatch captured by <strong>Eye</strong> <strong>Spy</strong>. Subjects A stop a<br />

couple (Subjects B) and ask for directions or assistance. While<br />

engaged in <strong>the</strong> conversation, ano<strong>the</strong>r member of <strong>the</strong> gang<br />

(Subject C) runs past and removes an item from <strong>the</strong> woman’s<br />

bag - giving <strong>the</strong> impression she is hurrying to catch a bus<br />

vessel at sea. But on <strong>the</strong> final approach to<br />

Holland - <strong>the</strong> most dangerous part of <strong>the</strong> journey<br />

- <strong>the</strong> drugs cartel will deploy a distraction<br />

tactic. Information is passed on to <strong>the</strong> authorities<br />

(using legitimate sources), that a ship<br />

carrying $1 million of cocaine will try and dock<br />

at ano<strong>the</strong>r Dutch port. The ship may or may not<br />

be carrying <strong>the</strong> drugs. But attention is focused<br />

away from <strong>the</strong> primary vessel - it’s a maritime<br />

distraction method that is used time and time<br />

again.<br />

2007 ESTIMATE OF THE SITUATION<br />

GLOBAL MAP SHOWS AL-QAIDA’S REACH<br />

15 YEARS AFTER FIRST WTC ATTACK - INTEL DATA MAKES UNCOMFORTABLE READING<br />

A UK minister recently told an audience that using <strong>the</strong> phrase ‘war on terror’ results only in a “coming<br />

toge<strong>the</strong>r” of groups. Her remarks were discounted by security officials. A quick look <strong>the</strong>refore at <strong>the</strong><br />

number of countries battling <strong>the</strong> terror group and a startling reminder that al-Qaida poses a danger to all<br />

people - irrespective of colour, race, religion or creed....


IRAN SPY GAMES<br />

PROPAGANDA WAR ERUPTS AS IRANIAN INTELLIGENCE OUTMANOEUVRES<br />

UK TO DISTRACT ATTENTION AWAY FROM VITAL WATERWAY<br />

Iran’s hostage taking in <strong>the</strong> Shatt al-Arab waterway on 23 March provoked a furious<br />

backlash in Whitehall. Behind closed doors senior officials blamed each o<strong>the</strong>r for<br />

not predicting, or acting upon an illegal act of military aggression. According to<br />

many <strong>Eye</strong> <strong>Spy</strong> sources,<br />

Iranian intelligence outmanoeuvred<br />

its British<br />

counterparts and lured <strong>the</strong><br />

UK sailors and Marines<br />

into a spider’s web. Heavily<br />

outnumbered, and<br />

looking down <strong>the</strong> barrel of<br />

RPGs and o<strong>the</strong>r weaponry,<br />

<strong>the</strong> servicemen were taken<br />

hostage after completing a<br />

routine search of a cargo<br />

ship. Fur<strong>the</strong>rmore, and not<br />

fully reported upon, HMS<br />

Cornwall, a superior Royal<br />

Navy vessel and <strong>the</strong><br />

sailors’ home ship, was


an astonishing 11 miles away. Many<br />

commentators were puzzled why<br />

Cornwall did not respond, <strong>the</strong> truth is,<br />

<strong>the</strong> ship was simply too far away. In<br />

London, military analysts asked how a<br />

“bunch of Iranian thugs” could capture<br />

sailors from a highly professional navy<br />

that prides itself on planning.<br />

Iran simply flexing her muscles... upset<br />

at losing a number of high-ranking<br />

officials to <strong>the</strong> CIA These are two<br />

reasons put forward by officials, but<br />

<strong>the</strong>re is a third... <strong>the</strong> operation was a<br />

distraction to allow “materials” into <strong>the</strong><br />

country, after all, Britain suspended all search missions for several weeks <strong>the</strong>reafter.<br />

<strong>Eye</strong> <strong>Spy</strong> investigates....<br />

BUGS<br />

WHEN YOU NEED TO KNOW<br />

NOTES ON COVERT RECORDING, BUGS<br />

AND COUNTERMEASURES<br />

An <strong>Eye</strong> <strong>Spy</strong> Tradecraft feature on <strong>the</strong> use of<br />

transmitters, countermeasures and solutions -<br />

plus a few trade secrets<br />

EXTRACT: For those working in <strong>the</strong> intelligence<br />

or security business acquiring good quality<br />

audible data is an art: preparation is everything,<br />

though when <strong>the</strong> time comes to ‘click’ <strong>the</strong><br />

record button, any one of a number of factors may conspire to dent your objective. Good fortune often<br />

plays a part, but an operative tasked with securing audio data will never rely totally on equipment. Machines<br />

are always liable to ‘play up’, but <strong>the</strong>re are steps that can be taken to lessen <strong>the</strong> chance of failure.<br />

It’s worth remembering also that in <strong>the</strong> intelligence game - <strong>the</strong>re are occasions when an operation can be<br />

played out but once, and failure is not an option.<br />

When an operative or agency seeks to glean ‘audio intelligence’, much research must be done beforehand.<br />

There are a number of important factors that are assessed before a team leader decides upon <strong>the</strong><br />

type of equipment that can or will be used. And <strong>the</strong>re are numerous devices available to government<br />

agencies. Both MI5 and MI6 have specialised branches where scientists continuously seek to create<br />

REPLACING ITEMS IN THE HOME<br />

TRADE<br />

SECRETS<br />

One ploy used to conceal a bug<br />

is to actually replace a<br />

favourite light or picture frame,<br />

ornament etc. with an exact<br />

replica. The listening device or<br />

transmitter is inserted in <strong>the</strong><br />

new item. Operatives will<br />

deliberately monitor a room<br />

and take covert photographs of<br />

recognisable items.<br />

transmitters and ultra-powerful recorders. These technical units<br />

are often called upon to manufacture devices for a specific task.<br />

“Unconventional” is a word that is often used in London.<br />

TAPPING AND TAPING<br />

Successfully acquiring a warrant for a telephone intercept means<br />

that <strong>the</strong> security services can “listen and record” conversations


on that line from a central station.<br />

In a growing investigation, it’s likely<br />

that <strong>the</strong> authorities will need to<br />

monitor more lines. This is because<br />

o<strong>the</strong>r ‘callers’ or ‘receivers’ may<br />

become ‘persons of interest’. All<br />

numbers are automatically identified<br />

and, if <strong>the</strong> data demands, a<br />

fur<strong>the</strong>r electronic intercept warrant<br />

may be requested.<br />

Faced with <strong>the</strong> task of tapping a<br />

telephone or intercepting an e-mail,<br />

<strong>the</strong> security services must endeavour<br />

to show good cause to apply<br />

for a warrant. And for those in<br />

America who believe its spy agencies are too active in this area look away now... <strong>the</strong> UK data may be<br />

simply too much to consume...<br />

Nearly 440,000 official requests for communications’ data were<br />

made by various UK agencies in a fifteen month period spanning<br />

2005 - 2006. The requests’ related to telephone calls, faxes, e-<br />

mails and ordinary letter post. The data, contained in <strong>the</strong> first<br />

report ever by <strong>the</strong> Interceptions of Communications Commissioner,<br />

also listed about 4,000 errors. The report’s author - Sir<br />

Swinton Thomas, ended by saying <strong>the</strong> figure was “unacceptably<br />

high”....<br />

BEWARE ALL ELECTRONIC GIFTS<br />

TRADE<br />

SECRETS<br />

Politicians, high-profile<br />

business people, military and<br />

intelligence figures etc. are<br />

warned not to accept corporate<br />

gifts - especially electronic<br />

devices such as calculators,<br />

watches etc. A bug can easily<br />

be hidden inside. Placed on an<br />

office desk or in <strong>the</strong> home, it<br />

will provide important data.<br />

EXTRACT TWO: The loft is a favourite location to place advanced and ‘long-situ’ bugs. The area is usually<br />

powered and various cables can be run between rooms. Loft insulation and domestic clutter are good<br />

‘concealers’.<br />

Devices are sometimes dropped down wall cavities - but powered from <strong>the</strong> loft area. Telephones can also<br />

be physically tapped from here by unscrupulous buggists...<br />

EXTRACT THREE: Bugging doesn’t just take place in <strong>the</strong> home or office - vehicles are targeted everyday.<br />

Technology has afforded <strong>the</strong> buggist numerous opportunities - including monitoring your vehicle as it<br />

makes a journey. Eavesdropping on conversations<br />

anywhere in <strong>the</strong> world costs as<br />

little as £200 ($400). A cell phone positioned<br />

behind <strong>the</strong> dashboard means it can<br />

be called silently and <strong>the</strong> microphone<br />

opens.<br />

There are a few countermeasures available<br />

that can help thwart such actions. Knowing<br />

what to look for helps - if <strong>the</strong> cell phone<br />

(car Enigma) is attached to <strong>the</strong> battery - a<br />

powerline can be identified by a garage<br />

technician. You yourself can peek behind<br />

<strong>the</strong> dashboard....


EYE SPY DIY 4<br />

FOR YOUR EARS ONLY<br />

<strong>Eye</strong> <strong>Spy</strong> presents three DIY projects using a tape recorder that will allow you to make recordings only<br />

you can hear; devise a cheap through-wall listening device and make a parabolic microphone for hearing<br />

long distance sounds<br />

PROJECT ONE: Making recordings only you can<br />

hear. This project is an absolute must for producing<br />

recordings made by a slight adjustment to recorders<br />

- works every time.<br />

PROJECT TWO: Purchasing a through-wall listening<br />

device can be expensive. With <strong>the</strong> help of a couple<br />

of cheap products from any DIY shop - you can turn<br />

a recorder or MP3/4 player into a useful listening<br />

device.<br />

PROJECT THREE: Build a parabolic microphone.<br />

This project is outstanding in that it requires only a<br />

few basic components - namely a microphone,<br />

garden plant or cooking bowl and a metal coat<br />

hanger. Simple but very effective.<br />

CODES AND CIPHERS<br />

NEW SERIES<br />

Signals <strong>Intelligence</strong>, SIGINT, and Information Assurance, INFOSEC, are<br />

modern terms for what used to be called COMINT and COMSEC and, in<br />

<strong>the</strong> same way that we of <strong>the</strong> old school of thought use ‘MI-5’ and ‘MI-6’<br />

for, respectively, <strong>the</strong> UK Security Service and <strong>the</strong> Secret <strong>Intelligence</strong><br />

Service, we will in this series of articles about clandestine communications<br />

use <strong>the</strong> popular but archaic terms.


EXTRACT: Spies need to communicate in secret,<br />

whe<strong>the</strong>r that communication is between an agent<br />

and his or her control or between control and <strong>the</strong><br />

‘head office’. It is obviously of vital importance<br />

that such communication, be it written, verbal or<br />

electronic, is done in a secure fashion and since<br />

time immemorial codemakers and codebreakers<br />

have vied for supremacy in <strong>the</strong>se arts. It is <strong>the</strong> job<br />

of <strong>the</strong> first group, <strong>the</strong> COMSEC specialists, to<br />

create a communications system that is both<br />

secure and facile: for <strong>the</strong> second, <strong>the</strong> COMINT<br />

teams, to read such communications without<br />

access to <strong>the</strong> secret keys or even knowledge of<br />

<strong>the</strong> methodology being used.<br />

COMSEC at its most basic level comes in two flavours: codes and ciphers. Though <strong>the</strong> two are quite<br />

different in principle and use, each is often confused with <strong>the</strong> o<strong>the</strong>r in <strong>the</strong> minds of <strong>the</strong> general public, by<br />

<strong>the</strong> popular media and by many o<strong>the</strong>rs who should know <strong>the</strong> difference.....<br />

JTAC<br />

JOINT TERRORISM ANALYSIS CENTRE<br />

A look at Britain’s Joint Terrorism Analysis Centre (JTAC) based at MI5 headquarters.<br />

SECURING TRANSIT HUBS<br />

MAKING WAVES<br />

A British-built security system is being used to detect explosive<br />

devices on passengers boarding <strong>the</strong> Staten Island Ferry at <strong>the</strong> St.<br />

George Terminal in New York. Defence contract company QinetiQ -<br />

has installed its SPO-20 security screening system designed to<br />

detect explosive devices concealed under people’s clothing without asking passengers to slow <strong>the</strong>ir pace.<br />

LONDON POISON GAS TEST<br />

Security officials released harmless gases at St John’s Wood station on <strong>the</strong> London Underground, to see<br />

how toxic gas would spread if a chemical or biological weapon was detonated. The media was kept away<br />

from <strong>the</strong> station.<br />

Officials released sulphur hexafluoride, a non-toxic odourless gas in <strong>the</strong> building as specialist equipment<br />

measured its drift and flow. The gas is regularly used in similar studies to monitor <strong>the</strong> flow of air around<br />

stations.


CODEMAKING AND BREAKING<br />

THE ENCIPHERING TELEPRINTER MACHINES<br />

David Hamer looks at <strong>the</strong> real birth of electronic cipher machines.<br />

EXTRACT: Britain’s codebreaking specialists at Bletchley Park<br />

gave <strong>the</strong> codename ‘Fish’ to <strong>the</strong> overall teleprinter traffic and<br />

<strong>the</strong> codename ‘Tunny’ to <strong>the</strong> material enciphered by <strong>the</strong><br />

Lorenz SZ40/42. While BP codebreakers concentrated on<br />

Tunny, Swedish codebreakers successfully attacked T52 and<br />

its traffic, codenamed Sturgeon.<br />

THE BREAKTHROUGH<br />

The first real breakthrough into Tunny traffic occurred on 30 August<br />

1941, when a cipher clerk in Vienna sent a long message - four thousand or<br />

so characters - to his opposite number in A<strong>the</strong>ns. When he had finished this formidable typing effort, he<br />

received a reply which was <strong>the</strong> German equivalent of “I didn’t get all that. Please send it again!” So he did<br />

- using, against all established principles of cipher security, <strong>the</strong> same machine settings that he had used<br />

for <strong>the</strong> first transmission. He also used a number of abbreviations [e.g. ‘Spruchnummer’ became<br />

‘Spruchnr’, etc.]. This egregious error was <strong>the</strong> chance for which BP was waiting and a team headed by<br />

Colonel [later Brigadier] John Tiltman deciphered <strong>the</strong> message in short order.....<br />

LISTENING TO IRAN<br />

ELECTRONIC INTERCEPTS<br />

REVEAL IRAN’S ‘SHORT SHARP<br />

SHOCK’<br />

When Iran took 15 UK servicemen hostage in <strong>the</strong><br />

Shatt al-Arab waterway on 23 March, Britain’s<br />

signals intelligence ga<strong>the</strong>rers and a highly specialised<br />

military unit were called upon to assist. Utmost in <strong>the</strong>ir minds was trying to establish who kidnapped<br />

<strong>the</strong> men, why and where <strong>the</strong>y were taken and how long <strong>the</strong> men may remain captive. It became evident<br />

quite quickly that Iran was behind <strong>the</strong> operation. In London, all efforts were made to glean signals intelligence<br />

and intercept any Iranian communications referring to <strong>the</strong> incident and hostages....<br />

OTHER FEATURES<br />

IRAN AFFAIR - TURNEY’S BOGUS LETTERS<br />

A look at how Iranian intelligence created hostage Faye Turney’s letters to her family<br />

LITVINENKO POISONING<br />

Scotland Yard have reportedly ga<strong>the</strong>red sufficient evidence to formally charge a key suspect


AL-QAIDA’S RACE FOR THE BOMB<br />

George Tenet, former head of <strong>the</strong> CIA warns Osama bin-Laden will stop at nothing to obtain a nuclear<br />

bomb<br />

21/7 BOMB TRIAL<br />

Failed 21/7 bomb suspect Manfo Asiedu tells a court he defused bomb in apartment<br />

EGYPT ARRESTS “ISRAELI ATOM SPY”<br />

Egyptian security services have charged Mohammed Sayed Sabar Ali with passing atomic secrets to<br />

Mossad agent<br />

FBI’s INTELLIGENCE MOVE<br />

The Federal Bureau of Investigation makes huge move towards improving national and international<br />

intelligence ga<strong>the</strong>ring potential<br />

NUCLEAR WHISTLE-BLOWER IN TROUBLE<br />

Israeli authorities convict Mordechai Vanunu, a former nuclear scientist, of speaking to journalists<br />

THE DOMAIN PROJECT<br />

FBI warn corporate companies of increase in foreign espionage<br />

NEW NRO SATELLITE LAUNCH<br />

The NRO is set to launch a powerful new ‘dual satellite ocean surveillance’ mission to monitor terrorist<br />

ships<br />

THE 60KM SNIPER<br />

Britain acquires an advanced GPS guided missile launcher capable of striking targets upto 40 miles away.<br />

The system is being deployed in Afghanistan in <strong>the</strong> fight against Taliban and al-Qaida terrorists<br />

PLUS<br />

SPECIAL OFFERS, ESPIONAGE AND INTELLIGENCE GATHERING EQUIPMENT/NEW TRADE BOOKS AND<br />

BOOK RELEASES

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!