Size | Seeds | Peers | Completed |
833.06 MiB | 0 | 0 | 266 |
This torrent has no flags.
Spycraft - Lockpicking Forensics Tracking Espionage [pack]
Tradecraft, within the intelligence community, refers to the techniques, methods and technologies
used in modern espionage (spying) and generally, as part of the activity of intelligence.
In the intelligence community, "tradecraft" refers to agents' advanced espionage tactics. That meant
creating clever disguises, conducting surveillance, using concealments, procuring secret information
and exchanging secure messages with other agents. "Spies can be ingenious in the way that they
communicate," said Peter Earnest, executive director of the International Spy Museum in Washington,
DC. He cites miniature dots containing text that came to prominence during World War II. "Somebody
can still use that kind of technique." From Biblical times until the 20th Century, spy operations
were pretty much person-to-person, said former director of the CIA’s Office of Technical Service
Robert Wallace. He and historian H. Keith Melton detail such tactics in their books "Spycraft" and
"The Official CIA Manual of Trickery and Deception." Earnest and Wallace share these 10 classic spy
tactics gleaned from declassified information.
Clandestine surveillance remains a hallmark of covert operations. In "Spycraft," Wallace and Melton
describe cameras hidden in unusual places, audio equipment for listening to conversations through
walls, and even a pipe with a receiver so the officer could bite the stem and detect hostile radio
communications nearby. In the 1970s, the CIA worked on a mini unmanned aerial vehicle shaped like a
dragonfly called the "Insectothopter." When the CIA's Directorate of Science and Technology
celebrated its 40-year anniversary in 2003, it revealed a realistic looking robotic catfish dubbed
"Charlie." Built in 2000, the device's true mission has never been revealed, but experts think its
aim was to sample and test water around nuclear plants and facilities. “You build in it the
necessary filters to take samples," Wallace suggested. "Then you recover the fish downstream and
evaluate those samples." When the fish was revealed, the Associated Press consulted with a scientist
who said the fish was so realistic that predators might target it. Robotic fish have caught on in
the academic arena, though. Many institutions now use robo-fish for environmental monitoring.
During the 1960s, integrated circuits represented a major breakthrough. Before that, transmitters
were unreliable and required huge batteries. “Integrated circuits reduced power consumption, made
reliability almost 100 percent, and allowed a reduction in size," Wallace said. New devices were a
tenth the size of previous ones. “That means you could put bugging devices about anywhere you
wanted to." When U.S. supplies were dropped by parachute into remote jungle areas during the Vietnam
War, tiny beacons were attached so that U.S. soldiers could follow the signal, Wallace said. He
added that, conversely, spies could carry beacons disguised as a branch or a cane, leave it at a
specific location, and then moments later an attack fleet would hone in to hit the target.
One well-known spy technique called the dead drop involved placing an item or message in a device.
An agent then signals to a handler that the drop has been made -- in the past that meant marking a
signpost or building corner with chalk, Peter Earnest said. Hollow coins could carry messages.
Although the space inside was extremely small, agents could put in a microdot. This micro writing
system developed by the CIA in the 1960s and 70s required a high-powered magnifier to read concealed
messages. The most famous espionage case involving a hollow coin occurred in 1953 when a Russian
agent inadvertently gave his hollow nickel to a newspaper boy. When the boy dropped the coin, a
microphotograph fell out. It would take the F.B.I. four years to decipher the instructions encoded
in the tiny photo. Micro writing was effective, Wallace said. "It was just very difficult. It had a
lot of potential for human error."
Spies must be ghosts, not poltergeists. To avoid detection, they used maps like this one printed on
silk that don't rustle. The British Directorate of Military Intelligence MI9 issued cufflinks
containing tiny compasses during the late 1930s through the mid-1940s. One tactic Wallace and Melton
detail in Spycraft involves using equipment dubbed a “Jack-in-the-Box." This simple device was a
suitcase containing a dummy designed to look just like an agent from the shoulders up. An agent in a
car who wants to escape surveillance could wait for a sharp turn, roll out the passenger side, and
open the Jack-in-the-Box. “Even though you are only out of surveillance for five seconds, that was
long enough for the officer to roll out of the car quickly into the shadows," Wallace said.
“Surveillance, looking at the car ahead of them, would still see two people in the car." In 1982,
CIA officers used the device to evade KGB surveillance reestablish contact with an informant.
What's an agent to do when caught with compromising notes? During World War II, spies could keep
sensitive information in a special Pyrofilm Combustible Notebook, Wallace said. This notebook
contained film that would ignite when triggered by a particular pencil. Working like a grenade, the
paper would burn and the whole thing would disappear within seconds. The CIA's one-time pads of
paper were used between agents for secure communication using encryption that's virtually
unbreakable. Once they were used, the pages could be torn off and destroyed. “After that, we
developed water-soluble paper," Wallace said. “You could take notes on this paper but if you were
about to be compromised you could immediately just dump the paper in the toilet or run water over
it."
In the mid-1950s, spies had to be ready to spike a drink in a pinch. Wallace and Melton's book
“The Official CIA Manual of Trickery and Deception" outlines several strategies for dispensing
liquids, powders and pills without the recipient noticing. Glove-wearing lady-spies of the era had a
particular advantage with their handkerchiefs, and could sew small containers into them. While
lighting someone else's cigarette, the matchbook could be used to dispense a small tablet into their
cup. All in the flick of a wrist. Wallace said he particularly liked the trick where a standard
Number 2 pencil became a tool for delivering a pill or powder -- up to 2.5 CCs -- simply by
manipulating the eraser and the metal band around it. “It can be a knockout pill, it can be a
hallucinogenic," he said. “I suppose it could be lethal, if you wanted it to be."
Steganography is the practice of leaving a concealed message out in the open. Wallace credited
magician John Mulholland for introducing new tactics for this kind of communication to the CIA when
he became their consultant in 1953. “He wrote about how you can communicate," Wallace said. “He
talked about how magicians could communicate when they were doing tricks." One method for
communication was how shoelaces were tied. Connecting them between the holes on both sides of a shoe
in different ways signalled certain things such as “follow me" or “I have brought another
person." Hiding messages in plain sight continues to be an effective tactic. Just look at Al Qaeda.
“We have seen that used by the terrorists," Earnest said. In a case that was just reported, Al
Qaeda embedded secret documents in a porn video.
Get that document and get out. Pulling out a small scanner would help today, but spies had to use
different techniques decades ago. The CIA Museum now displays this letter removal device from World
War II. When inserted into the unsealed gap in an envelope flap, the device grasped the paper and
wound it around pincers so it could be extracted without anyone the wiser. Another way to retrieve
documents involved magician's wax, the kind that temporarily attaches to objects. To use this
technique, described in Wallace and Melton's book “The Official CIA Manual of Trickery and
Deception," first wax was placed on a book cover. In the blink of an eye, the book is used to grab a
paper. All the agent had to do is remember to hold the book so that the paper side faces the body or
the floor.
Long before cell phones, the CIA's Office of Technical Service was developing what it called a
short-range agent communications systems or SRAC. When two officers communicated securely with each
other using a SRAC device, they didn't need to risk being spotted in the same location, Melton and
Wallace explain in "Spycraft." An early SRAC device from the 1970s had code names like “DISCUS"
and “BUSTER," and resembled a large calculator and contained a keyboard with a stylus for punching
in 256 characters, Wallace said. Using “burst transmissions," these systems allowed agents to
transmit messages across about a quarter-mile range, communicating in bursts through coded messages
that were automatically deciphered and displayed. Although the signal could potentially be
intercepted, this communication technique represented a significant advancement in tradecraft.
“This meant that you didn't have to meet an agent to get information," Wallace said. “You could
actually transmit it in real time."
That spy film staple, the so-called “brush pass" used to pass documents or a package between
agents, can be traced back to the Cold War era. The technique was developed to be used in hostile
areas where U.S. agents were under constant surveillance, Earnest said. “It's very elaborate," he
said. “You're staging this but you are arranging for you and the agent to pass each other
surreptitiously somewhere." Highly choreographed, the handoffs took place quickly in alleys, on
corners, in subway stairwells. In late 2009, an elderly couple, Walter and Gwendolyn Myers, was
convicted on charges that they'd spent several decades spying on the United States for Cuba. Among
their tactics, according to the F.B.I., was a variation of the brush pass. Gwendolyn exchanged
shopping carts in grocery stores with contacts to pass along information.
ebooks & manuals:
A Physicians Guide to Clinical Forensic Medicine.pdf
CIA - A Study of Assassination.pdf
Disguise Techniques by A Edmond MacInaugh - Paladin Press.pdf
Encyclopedia of Espionage
Encyclopedia of Espionage, Intelligence & Security Vol I by Lee Lerner & Brenda Lerner.pdf
Encyclopedia of Espionage, Intelligence & Security Vol II by Lee Lerner & Brenda Lerner.pdf
Encyclopedia of Espionage, Intelligence & Security Vol III by Lee Lerner & Brenda Lerner.pdf
Forensics and Investigation
Arson and Bomb Scene Investigation
A Guide For Explosion And Bombing Scene Investigation (555,416).pdf
Fire Arson Investigation Manual.pdf
Fire Investigation.pdf
Ballistics, Gunshot Residue
Current Methods In Forensic Gunshot Residue Analysis.pdf
Gunshot Wounds - Practical Aspects Of Firearms Ballistics & Forensic Techniques.pdf
US Department Of Justice-Development of NIST Standard Casings and Status Reports - NIJ Report
603-00.pdf
Biometrics
Advances in Fingerprint Technology.pdf
Artificial Fingers for Fingerprint Scanners - Matsumoto Laboratory.pdf
Fake Finger Prints.pdf
Fingerprints and Other Ridge Skin Impressions.pdf
How to Fake Fingerprints.pdf
Impact of Artificial Gummy Fingers on Fingerprint Systems.pdf
US Department Of Justice DNA Evidence.pdf
Cadaver Dog Handbook 2000 (Forensic Training & Tactics for the Recovery of Human Remains) by Andrew
Rebmann.pdf
Criminal Psychology and Forensic Technology.pdf
Death Scene Investigation
Bloodstain Pattern Analysis - An Introduction to Crime Scene Reconstruction.pdf
Dead Reckoning The Art of Forensic Detection.pdf
Forensic Interpretation of Bloodstain Evidence at Crime Scenes.pdf
Handbook For Death Scene Investigators.pdf
Homicide Investigation-A Practical Handbook-Burt Rapp.pdf
Time of Death, Decomposition and Identification.pdf
US Department Of Justice Death Scene Investigation.pdf
Description of Person Questions.pdf
Encyclopedia of Forensic Sciences.pdf
FBI - Crime Scene Investigation.pdf
FBI Handbook of Forensic Science.pdf
Forensic Evidence Science And The Criminal Law.pdf
Forensic Interpretation of Glass Evidence.pdf
Forensic Investigation of Clandestine Laboratories.pdf
Forensic Lab Manual.pdf
Forensic Pathology.pdf
Forensic Science An Illustrated Dictionary.pdf
High-Tech Crime
Investigating Computer-Related Crime.pdf
Introduction to Forensic Sciences - 2nd Edition - William G Eckert (CRC Press - 1997) 385pp.pdf
Private Investigation
How To Be Your Own Private Detective (Stein).pdf
Practical Handbook for Private Investigators.pdf
Serial Offenders
Hunting Serial Predators.pdf
Serial Offenders Current Thought Recent Findings.pdf
Techniques of Crime Scene Investigation.pdf
The Practice of Crime Scene Investigation.pdf
Without a Trace- Commonsense Guide to Forensic Science.pdf
Intelligence, Counter-Intelligence, Recon
CIA - Analytic Thinking and Presentation for Intelligence - Analysis Training Handbook.pdf
Classifying Surveillance Events From Attributes And Behaviour.pdf
Combat Commanders Handbook on Intelligence - ST 2-504.pdf
Combat Recon Manual - Tips of the Trade (1995).pdf
Counterintelligence - MCWP 2-6.pdf
Human Intelligence (HUMINT) Operations - B-GL-357-002.pdf
Intelligence - FM 2-0.pdf
Intelligence Analysis - FM 34-3.pdf
Intelligence and Electronic Warfare Operations - FM 34-1.pdf
Intelligence, Surveillance, Target Acquisition, and Reconnaissance (ISTAR) - B-GL-352-001.pdf
Reconnaissance and Surveillance and Intelligence Support to Counterreconnaissance - FM 34-2-1.pdf
Reconnaissance Reports Guide - MCRP 2-25A.pdf
Scouting & Patrolling - MCWP 3-113.pdf
SOG Combat Recon Manual (1970).pdf
Special Reconnaissance Tactics, Techniques, & Procedures For Special Forces - FM 31-20-5.pdf
Tactical Human Intelligence and Counterintelligence Operations - ST 2-227.pdf
Us Army Interrogation Course - Approaches - IT 0599.pdf
Interrogation, Psychology
Art of Deception - Controlling the Human Element of Security - Kevin Mitnick.pdf
Body Language - Allan Pease.pdf
Brainwashing Manual - Synthesis of the Russian Textbook on Psychopolitics - L Ron Hubbard.pdf
Criminal Psychology - A Manual for Judges, Practitioners, and Students - Hans Gross.pdf
Death, Gender, and Ethnicity - David Field.pdf
Interrogation
CIA Human Resource Exploitation Manual.pdf
Instant Fact- How to Get the Truth Out of Anyone - John Webster.pdf
Intelligence Interrogation - FM 34-52.pdf
Interview and Interrogation - Seeking the Truth - DOD Polygraph Institute.pdf
Kubark Counter-Intelligence Interrogation.pdf
Lie Behind the Lie Detector - Maschke, George W & Scalabrini, Gino J.pdf
Questioning Techniques - US Army Subcourse IT 0601 Edition C.pdf
The Psychology of Interrogations and Confessions - A Handbook.pdf
Williams, Doug - How to Sting the Polygraph.pdf
Psychiatric Drugs - Current Clinical Strategies.pdf
Psychiatry - Current Clinical Strategies - 2002.pdf
Psychology of Killing.pdf
Law and Law Enforcement
Anatomy of a Hostage Rescue - ADA427693.pdf
Banister, Joseph R - Investigating the Federal Income Tax (Web Version exerpt).pdf
Conklin, Bill - Why No One Is Required to File Tax Returns, and What You Can Do About It.pdf
Eagan, James M - A Speeders Guide to Avoiding Tickets.pdf
Fletcher, Connie - What Cops Know.pdf
ID Checking Guide 2002 (United States & Canada).pdf
Identifying Undercover Activity and Agents by Tobiason.pdf
If An Agent Knocks - Federal Investigators and Your Rights.pdf
Law - Enemies of the State.pdf
Legal_Forms_(doc)
Military Police Law and Order Operations - FM 19-10.pdf
Military Police Operations - FM 3-191.pdf
Mug Shots (A Police Artists Guide to Remembering Faces) by Douglas P Hinkle - Paladin Press.pdf
Pay No Fine- A User Guide to Successfully Fighting Traffic Tickets.pdf
People Who Stalk People - Bruce MacFarlane.pdf
The Serial Killer Files by Harold Schechter.pdf
Transnational Criminal Organizations, Cybercrime & Money Laundering (Law Enforcement Handbook).pdf
War Crimes Investigation - MCRP 4-118B.pdf
OSS Disguise Methods.pdf
Smuggling & Caching
Artech House Information Hiding Techniques for Steganography and Digital Watermarking.pdf
How to Hide Anything - Michael Connor - Paladin Press.pdf
Secret Hiding Places.pdf
Security Storage Containers.pdf
SF Caching Techniques.pdf
Sneak it Through - Smuggling Made Easier - Michael Connor - Paladin Press.pdf
The Construction of Secret Hiding Places(reduced).pdf
WeaponsCaching.pdf
The Mafia Encyclopedia 2nd edition.pdf
Tracking and Evasion
Basic Visual Tracking, Australian - VTE-2.pdf
Escaping the Kill Zone (Ramming).pdf
Evading Dogs and Myths.pdf
Evasion Movement and Counter-Tracking Techniques.pdf
Evasive Driving - RWT Publications.pdf
Nature Observation and Stalking.pdf
Street E&E by Marc Macyoung - Paladin Press.pdf
Tracking Techniques - Eugene Nielsen.pdf
Unauthorized Entry and Physical Security
Advanced Lock Picking Secrets - Steven Hampton - Paladin Press.pdf
Alarm, Sensor & Security Circuit Cookbook (1994) by Thomas Petruzzellis.pdf
alt.locksmithing answers to Frequently Asked Questions (FAQ).pdf
Bumping Locks.pdf
CCTV Destruction.pdf
Cheap Padlocks.pdf
CIA Lock Picking Field Operative Training Manual.pdf
Cryptology and Physical Security - Rights Amplification in Master-Keyed Mechanical Locks - Matt
Blaze.pdf
Defeating Electromagnetic Door Locks.pdf
Expedient B&E - Tactics and Techniques for bypassing Alarms and Defeating Locks (Paladin Press).pdf
History of Lockpicking - Dark Angel.pdf
How to remove pins from a pin tumbler dead-bolt.pdf
How to ZAP a Camera - Using Lasers to Temporarily Neutralize Camera Sensors-Naimark, Michael.pdf
Impressioning Manual for Amateur Locksmiths.pdf
Impressioning.pdf
Keys to Understanding Tubular Locks - Desert Publications.pdf
Light Stick, Remote Activation of Chemiluminescent - US Patent 4771724.pdf
Lock Picking Secrets - Steven Hampton - Paladin Press.pdf
Lock Picking Tools
How To Make Your Own Professional Lock Tools Eddie the Wire from HemiSync Vol 1.pdf
How To Make Your Own Professional Lock Tools Eddie the Wire from HemiSync Vol 3.pdf
How To Make Your Own Professional Lock Tools Eddie the Wire from HemiSync Vol 4.pdf
Improvised Lock Picks.pdf
Snap Pick.pdf
Locksmithing
BBS
Lock Picking 1.txt
Lock Picking 2.txt
Lock Picking 3.txt
Lock Picking 4.txt
Lock Picking 5.txt
The Complete Book of Locks and Locksmithing, 6th Ed.pdf
Master Combination Algorithm.pdf
Modern High Security Locks How To Open Them by Steven Hampton (Paladin Press).pdf
Opening Combination Locks.pdf
Perimeter Security Sensor Technology Handbook - Hb-Word.pdf
Physical Security - FM 3-1930.pdf
Physical Security (1979) - FM 19-30.pdf
Room Entry Lock Picking Techniques-Ninja Book.pdf
Safecracking for the computer scientist.pdf
Secrets of Lockpicking (with comments by ALEx604) - Steven Hampton - Paladin Press.pdf
Symplex Locks.pdf
Techniques of Safecracking - Wayne Yeager - Loompanics.pdf
The Complete Guide To Lockpicking - Eddie the Wire - Loompanics.pdf
Using a Lock Pick Gun.pdf
Wired Magazine - The Lock Busters.pdf
Zapping Cameras with Lasers.pdf
tags: spycraft, lockpicking, espionage, intelligence, forensics, caching, tracking, biometrics,
interrogation, ballistics