Online Book Reader

Home Category

Spycraft - Melton [234]

By Root 969 0
the CIA might covertly insert satellite-tracked beacons inside shipping containers of shoulder-fired missiles being transported by terrorists from Afghanistan to other locations in the Middle East and place a tactical beacon on a pickup that is hauling a few of the missiles to a terrorist safehouse.

During the Vietnam war, TSD disguised a small beacon inside imitation animal dung. Left in the foliage adjacent to a North Vietnamese Army or Vietcong campsite, the active beacon would not be noticed or disturbed because of its appearance. Attack aircraft could home in on the signal that pinpointed the site for destruction.6 In the Middle East, beacons were deployed inside briefcases and belts to protect individuals at high risk against kidnapping. When activated by nonalerting movements of the wearer, the beacon transmitted a signal for help and provided the location of the kidnapped individual.

Software beacons were created for operations against cell phones and portable computers. With brief access to a target’s laptop or cell phone, the beaconing software could be installed and, thereafter, anytime the target used his cell phone or logged onto the Internet with his laptop, his position was logged and his e-mails and conversations intercepted.

Taggants represent another means for tracking movements by identifying a targeted individual as he passes through choke points within the operational area. Similar to the plastic security tags attached to clothing that must be removed before departing a store, taggants made of chemicals, pheromones, or electronics can be remotely detected and the tagged individual identified.7 One of the best-known taggants used by the KGB was “spydust,” the chemical compound 5-(4-Nitrophenyl)-2,4-pentadien-1-al (NPPD). The Soviets’ use of spydust was of such concern to CIA operatives that OTS established a special program to analyze and counter the material.

The CIA employed audio, visual, physical, forensic, and electronic technical aids to enhance the organized study and observation of targets. Throughout most of the Cold War, audio operations and satellite photography dominated technical collection successes. Audio operations were an original function of the Technical Services Staff, but initially were no more important than printing, concealments, and disguise. However, by 1960, audio technical surveillance had become TSS’s top priority. Audio operations, designed to obtain positive or operational intelligence, targeted communications systems or facilities where conversations of interest might occur. Government telephone lines, official foreign missions and facilities, an office, residence, or hotel room—all were exploited by the audio techs.

Traditional landline telephones were particularly vulnerable to clandestine tapping. Almost every target individual anywhere in the world had and used a phone. The handset contained a high-quality microphone built into the mouthpiece and was connected to wires leading out of the building. TSS developed three basic systems for bugging phones in the early 1950s that remained viable for decades.

By tapping the line, both parties talking could be heard and the full conversation captured. The tap might require direct contact with the wires, or an “inductive” tap could be fitted as a collar around a line without making physical contact with the internal wires. An alternative was to modify the phone.

Normally when a telephone receiver is placed on its cradle the depressed hook switch ends the call. TSS developed a technique in the 1950s to bypass remotely the hook switch in order to use the sensitive mouthpiece microphone to listen in on all room sounds and conversation. Usually a tech required access to the telephone to make the modification but if the make and model of the targeted telephone could be obtained, a hook-switch bypass modification to an identical instrument could be made. Then, similar to a quick-plant operation, a cleaning person or service personnel could covertly exchange phones. The third basic system exploited

Return Main Page Previous Page Next Page

®Online Book Reader