Online Book Reader

Home Category

Spycraft - Melton [268]

By Root 882 0
development and engineering capability in the Agency’s operational disguise program. His ideas led to the design and deployment of a series of increasingly sophisticated tools that enabled operations officers to change their appearance convincingly. The application of his skills to one of the Agency’s highest-profile and most successful operations earned Mendez an Intelligence Star. His vision and artistic skill had a major impact on the Agency’s operational capabilities in hostile environments.

Appendix E

Pseudonyms of CIA Officers Used

George Saxe Operations officer specializing in covert communications in denied areas

Ron Duncan Field technical operations officer

Ken Seacrest Technical officer specializing in denied-area operations

Tom Grant An early technical operations officer specializing in audio

Tom Linn Program manager for battery development

Stan Parker Chemist specializing in power sources chemistry

Martin Lambreth Mechanical and audio specialist

Kurt Beck Senior audio engineer and program manager

Gene Nehring Engineering manager

Greg Ford Special-devices engineering manager

Jack Knight Research and development program manager

Pat Jameson Specialist in unconventional warfare and counterterrorist covert action

Bill Parr Special missions officer

Brian Lipton Secret-writing chemist

John Orkin Electronic and explosive device evaluation engineer

Mark Fairbain Special missions manager

Frank Shumway Explosive ordnance and counterterrorism specialist

Appendix F

Instructions to Decipher the Official Message from the CIA on page xxv

Step One: copy the numbers in the CIA message onto a large pad of graph paper, leaving approximately one inch betweens lines.

Step Two: Copy the numbers from the TRIGON one-time pad beneath each digit.

Step Three: Subtract the OTP from the “message” using “non-carrying” math.

Step Four: Separate the deciphered message into two digit numbers and convert into letters; A-Z are numbered 01 to 26 (A=01, B=02, C=03, D=04, etc.). An X (24) is used to separate sentences. The message begins:

Author’s Note: For operational use (but not in the example presented here) the first five-digit group at the top of the left-hand column was designated the “indicator group.” The first five-digit group received in the OWVL transmission identified the correct page of the agent’s OTP for encryption. After one-time use, the entire page would be destroyed by the agent to protect forever the security of the encrypted communication.

If you have deciphered the message successfully, it will be identical to that which appears with the Preface endnotes and you may have the skills needed for a career in the CIA. The authors invite you to learn more at: https://www.cia.gov/careers/index.html.

Glossary

Access agent— A person who facilitates contact with a target individual or entry into a facility.

Accommodation address— An address with no obvious connection to an intelligence agency, used for receiving mail containing sensitive material or information.

Active concealment— A concealment device camouflaged as an everyday item that functions in accordance to its disguise to add an additional layer of security should the device attract scrutiny. Examples of an active concealment would include a ballpoint pen capable of writing, a flashlight that lights, or a can of shaving cream that dispenses cream.

Active measures— Soviet intelligence term for highly aggressive covert action and propaganda campaigns launched against the West in an attempt to influence foreign policy or create domestic unrest. Active measures, including disinformation campaigns, were aimed at Western and Third World countries, the CIA, U.S. military, and the American public.

Agent—An individual, typically a foreign national, who works clandestinely for an intelligence service.

Agent in place— An individual employed by one government while providing secrets to another.

Alias— A false identity used to protect an intelligence officer in the field; it may be as simple as a false identification

Return Main Page Previous Page Next Page

®Online Book Reader