Îò Îôô-Òîïèê Îòâåòèòü íà ñîîáùåíèå
Ê All Îòâåòèòü ïî ïî÷òå
Äàòà 04.06.2002 01:00:01 Íàéòè â äåðåâå
Ðóáðèêè Ïðî÷åå; Ñîâðåìåííîñòü; Ñïåöñëóæáû; Âåðñèÿ äëÿ ïå÷àòè

Âîåííûå è øïèîíñêèå ñëîâàðè

ÊÒî òóò ìå÷òàë î õîðîøåì ñëîâàðå øïèîíñêîãî ñëýíãà ?????




Àâòîð: Haski, 04:39:25 01/06/2002:


A
Accommodation Address
An address, such as a post office box, used by cut-outs or go-betweens to pick up and receive messages.
Acoustic intelligence
Information taken from audio sources which can be electronically enhanced.
Agent
A person, usually foreign, obtaining information for and under the supervision of an intelligence Organization.
Agent, notional
An agent who does not exist, a fiction created by an intelligence agency to deceive and misdirect the enemy, such as the corpse employed in Operation Mincemeat by British intelligence during World War II.
Agent, secret
An undercover agent or any person acting as a clandestine spy or saboteur and under the direction of an intelligence organization.
Agent of influence
An agent who attempts to wield opinion rather than to spy as a clandestine agent; such agents are usually politicians, academics, journalists, social leaders, scientists, editors.
Agent provocateur
An agent who provokes illegal acts such as riots, rebellion, mutiny, or acts of espionage or sabotage by those under suspicion.
Al Mukharabat
Iraq secret service, established in 1968.
Alliance International Service
One of the most effective French underground espionage networks in World War II, headed and generally peopled by female French spies.
Approach
The method employed in recruiting a new foreign agent to an intelligence service, or luring an in-place agent from the other side to become a double agent.
Archives
Central files or central index, used by the KGB
Artichoke
Jargon for using drugs, hypnotism or brainwashing techniques in testing the loyalty of in-place agents or defecting agents.
Assessment
Evaluating the worth of a potential spy.
Asset
Agents, sympathizers or supporters positioned in target countries or areas.
B
Background Investigation
Investigation of those who require a security clearance in working with classified documents. The FBI conducts such investigations in the U.S.
Bagman
An agent who acts as a paymaster to spies or makes bribes to those in authority.
Black bag job
Act of bribery or burglary by an agent or agents, such as the Watergate burglary.
Black Cabinet
Postal censorship offices in any country.
Black Chamber
Postal censorship offices, or secret cryptology/code~breaking Operations in any country.
Black Dragon Society
Japanese nationalist society and espionage organization, 1901-1945, established by Nlitsuru Toyama.
Black Hand Society
Serbian nationalist society and espionage organization, 1903-1917, established by Dragutin Dimitrijevic.
Blackmail
The act of blackmailing someone into imparting secrets after having caught that person in an illegal or immoral act which invariably has been staged by the blackmailing agents. The most often used ploy in such entrapments is providing a male or female prostitute to compromise the blackmail victim.
Blackoperator
Soviet jargon for foreign agents working for the KGB or GRU.
Black Orchestra
The German underground working to overthrow the Nazis and Hitler's Third Reich, 1933-1944.
Blown
The discovery of an agent's true identity or the penetration of an agent's cover story or cover operation.
Bona fides
An agent's credentials.
Boxed
An agent being examined by a polygraph (lie detector). Few agents are able to deceive lie detectors, although a few, such as Aldridge Ames, have claimed that certain tactics can overcome the average nervousness produced by such tests.
Brainwashing
Psychological techniques employed in altering the thought processes of persons from whom information or services are sought. The term suggests a «scrubbing of the mind,» wherein all ideas deemed «dirty» by the brainwasher are given up (secrets) and «clean» ideas substituted. Brainwashing is achieved through logical arguments, or incessant arguments which is the Chinese method, one where a prisoner is kept isolated in a small cell and is addressed ceaselessly by interrogators who point out the virtues of Marxism and the evils of democracies, denying, if necessary, basic comforts of food, sleep and warmth to inmates until their will to resist is demolished and they embrace communism wholeheartedly as their only salvation, physically and spiritually. Constant indoctrination follows to maintain the «brainwashed» state of mind.
Brandenburgers
An elite corps of Abwehr commandos created by German spymaster Admiral Wilhelm Canaris and employed in World War II for special operations, particularly the sham attack on a Gleiwitz radio station in 1939 which was used to give cause to Hitler's invasion of Poland and the beginning of World War II.
Bugging
The use of electronic devices to eavesdrop or monitor audible or phone conversations.
Bureau Ha
Private Swiss intelligence organization. 1039—1945, established to spy on Nazi Germany
Burned
Compromised or caught in the act red-handed.
Bury
To conceal information by inserting such information into innocuous-appearing documents.
C
Case officer
Spymaster in charge of an espionage network or networks, or an agent in charge of several separate field agents and one who is required to recruit new agents.
Cell
Basic and most expendable unit of an espionage network.
Central External Liaison Department
China's intelligence and counterintelligence services, established circa 1950.
Central Intelligence Bureau
Germany's intelligence service, established by spymaster Wilhelm Stieber in the 18960s.
Chekist
A member or former member of the Cheka, the first Soviet secret police which replaced the czarist Okhrana.
Cipher
Secret message writing that manipulates symbols representing various letters of the alphabet. Ciphers and codes are sometimes combined for top secret messages to further assure security, codes containing symbols which can signify entire words, phrases or even sentences. Cryptology is the science of ciphers. Master cryptologists in the past have designed elaborate ciphers. Blaise de Vigenere, of sixteenth century France, created the Vigenere table, one in which the alphabet is written out on each line of a square, with each new line beginning one letter behind the one above it, the first beginning A, B, C, the second beginning B, C, D, and so on. The square is deciphered by the recipient only if he possesses a key which tells him in which line a letter is in and how far across the line to proceed to locate that letter. The German Enigma cipher was created through a mechanical device consisting of rotors that involved concentric circles, each bearing the letters of the alphabet, and, when the interior circle was spun in such a fashion as to bring its letters into alignment with those circles on the outside, the true message was revealed. Today's ciphers are much advanced via computers such as those created by NSA (National Security Agency) which has established a «data encryption standard» involving keys that are dozens of numbers long, providing myriad complexities that offer so-called «unbreakable» codes, albeit sophisticated computers can be devised to read such complex ciphers.
Ciphony
The scrambling through technology of the spoken word via telephone. Phone conversations are altered to mere squeaks and shrill noises by simply altering of the conversations with special equipment attached to secure phone lines. Descramblers restore the current to normal receivership so that the conversations are intelligible. The phone conversations between British Prime Minister Winston Churchill and U.S. President Franklin D. Roosevelt during World War II were supposedly scrambled through sophisticated ciphony equipment. These two world leaders conversed freely about top secret matters, thinking their every word was being distorted to total unintelligibility via transatlantic telephone. This was not the case. German engineer Kurt Vetterlein had devised a descrambler in 1942 which allowed the Abwehr to listen to these conversations and learn, for instance, of plans to take Italy out of the war in 1943. The ciphony or scrambling systems was drastically updated in 1944 and was thereafter unbreakable.
Clandestine mentality
Paranoid behavior, usually displayed by spymasters such as the CIA's deputy director, James Jesus Angleton
Clandestine operation
A covert or secret operation conducted by an intelligence organization against an enemy or even friendly government.
Cobbler
An espionage craftsman whose expertise is forging false documents such as passports, visas, birth certificates, diplomas, government documents and even currency.
Code
Secret messages made up of symbols representing words, phrases or sentences, unlike ciphers which represent letters of the alphabet. Codes can be encrypted or put into cipher to provide additional security. Codes can be combined with ciphony that makes use of sound only, as in the transmission of Morse code via transmitters and receivers. Codes can also be transmitted visually, such as the use of flags or light signals. Codes, like ciphers, are based upon transposition or substitution. Transposition is usually no more than distortion of word patterns where substitution is invariably the option employed for the most secure codes. Keys to the substitution of words are usually contained in codebooks possessed by the sender and recipient. The code book, in case an agent is seized, may be any kind of book, including a novel, a dictionary or the Bible, so as not to be recognized as the code book. Code references for each word of a message will relate to a page, a line on that page and a numbered position of the line on that page. To add more security, the key is shifted routinely so that page six may later mean page eight. Military or diplomatic code books offer a secret glossary of terms and definitions which are used in decoding secret coded messages. Cryptanalysts discovering the meaning of sets of symbols might be able to break a cipher but such discoveries only reveal a portion of a code. Once a code book is acquired by the enemy, however, the entire code is readable, as was the case when the British Admiralty's Room 40 obtained the German diplomatic code book in 1915 and were thus able to decode the notorious Zimmermann Telegram which subsequently brought America into the war on the side of the Allies in 1917.
Code name
A proper name alias or a nickname or even a combination of letters or numbers which have been assigned to an agent by a spymaster for a network or a national intelligence agency by which he is carried on a secret roster, which, if obtained by the enemy, will not supposedly yield the true identity of the agent. Code names are traditionally used by radio Operators of clandestine transmitters. The code name for the infamous German spy, Mata Hari, was H.21.
Code word
Word or term given to a secret operation or project to conceal meaning, intention or objective. The code name «Overlord» was the term used for the intended Allied invasion of France in 1944.
Collection
Obtaining, assembling and organizing information for further intelligence use.
Colossus
British communications intelligence computer developed toward the end of World War II that superbly decoded and deciphered Axis communications.
Communications security
Protecting intelligence information transmitted by any kind of electronic methods.
Company, The
The CIA (U.S.) Central Intelligence Agency.
Compartmentation
Establishing separate procedures in the handling of intelligence data; restricting on a «need-to-know» basis those involved in the same procedures or operations so that each person works in a «compartment» where other areas and personnel of an operation remain unknown to him or her.
Concealment devices
Secret tools of spycraft such as invisible ink, film, microdots, ciphers, codes, poisons.
Confidential
The lowest U.S. security classification regarding national security information held by someone working in the intelligence community.
Contact
An agent who serves as a liaison person or cut-out between field spies and the spymaster or control who supervises the activities of field agents.
Control
The supervising agent or spymaster who directs, usually in an administrative capacity and often without revealing his true identity to his agents, the activities of one or more spies working in the field.
Co-option
The taking over and controlling of a spy from one intelligence service by an agent or agents of an opposing intelligence organization.
Counterespionage
The science of spying in spies, or a national agency practicing counter-intelligence. Most countries have counter espionage organizations that must not only combat foreign agents in their lands but also saboteurs and their own nationals who may be working for enemy nations. Such agencies usually compete for budgets and inner agency recognition with their own country's espionage organization. The FBI, for instance, is not only one of the U.S. federal law enforcement agencies, but it is also responsible for counterespionage thus becoming involved in a field where it competes with the CIA. In England MI5 and MI6 are on similar footing and in West Germany it is the BfV and the BND.
Counterintelligence
The science of spying on spies, or a national organization practicing counterespionage, and the methods and safeguards taken in such activities.
Counterspy
Where the spy is the sword, the counterspy is the shield; counterspies are those agents working with counterespionage or counterintelligence agencies. Their job is to quickly expose the spy or forestall their ability to obtain vital information, usually through disinformation. Counterspies at headquarters may simply clip newspapers, censor mail or analyze reports from informers in order to determine the plans of the enemy. Other counterspies may install listening devices or bugs in offices maintained by hostile countries, or act as agent provocateurs by infiltrating espionage networks and urging those enemy agents to commit illegal acts for which they can be arrested and imprisoned as was the case of the notorious Yevno Azev, the spectacular Okhrana masterspy, counterspy and agent provocateur. The most successful counterspies are double agents, those who become agents for a espionage organization while already being an agent for another; these spies are called «moles,» a word coined by spy writer John Le Carré. (Such counterspies were typified by the British traitor-agents Anthony Blunt, Guy Burgess, David Maclean, Kim Philby, and, perhaps, Roger Hollis, who was himself head of MI6.) Other counterspies are sometimes recruited from enemy espionage agencies where they are already in-place such as GRU spymaster Oleg Penkovsky. Some counterspies are «turned» so that they appear to be conducting espionage for their nation but, in fact, are working on behalf of the enemy, sending disinformation to their headquarters. This was the case with almost all of the Abwehr spies sent to England during World War II.
Countersurveillance
The detection of surveillance by an opposing counterespionage organization.
Country team
The chiefs of all intelligence agencies of a single government operating in a foreign country.
Courier
An agent belonging to a spy network who retrieves and delivers messages, documents, film, microdots or any other form of secret information. Most often, couriers have no idea what information either are carrying, nor the true identities of those spies they may contact in their normal routine. Often such couriers never make contact but simply conduct pickups and deliveries to «letter drops.» The role of the courier, which requires no special skill, is nevertheless one of the most difficult of jobs in that total security must be practiced at all times. Couriers are the main targets for counterespionage organizations and their alertness and safeguarding tactics may spell success or failure for an entire spy network.
Cousins
The name for the CIA used by British intelligence, MI6/SIS.
Cover
A business/trade front which covers actual espionage operations and activities.
Cover name
An alias used by an agent which conceals his or her true name. Many intelligence agencies, especially those of the U.S.S.R., draw their aliases from the names of dead children whose birth certificates are easily obtained and verified by «ghouls,» agents haunting graveyards to verify obituary notices.
Cover story
A false story, background or biography that covers the espionage activities of a spy and explains the reasons for his presence in enemy country. The best cover stories are those that appear to be true when the real reason is to achieve a covert mission. Those traveling on vacation present plausible cover stories. In fact, the founder of a famous publishing firm that deals with vacations and travels served in the OSS during World War II. Traveling salesmen and writers who travel from country to country have built-in cover stories wherein their occupations normally take them into areas where they will also involve themselves in espionage which was the case of Somerset Maugham who worked for British intelligence in Switzerland during World War I while ostensibly working on a play.
Covert operation
A clandestine mission. In wartime this invariably means a mission of sabotage but in peacetime such an operation may mean anything from dirty tricks, propaganda campaigns in foreign countries or illegal acts such as counterfeiting or kidnapping, even assassination.
Cryptology
The science of ciphers involving cryptography, the enciphering of messages; cryptograms, the enciphered messages themselves; and cryptanalysis, the deciphering of messages. Cryptographers employ transposition and substitution when enciphering.. Transposition uses all the letters of the alphabet, which are shifted to different positions. Substitution employs the use of letters to represent other letters or symbols.
Cut-out (or Cutout)
An agent who serves as a liaison or go-between person or contact person between field spies and the spymaster or control who supervises the activities of field agents; cut-outs often impart instructions and make low-level decisions.
D
Damage report
The assessment and evaluation of damage to an agent, station, network, espionage operation or organization brought about by exposure and identification.
Dead drop
A place where messages and other items such as cash or equipment are left for other agents to retrieve. Also known as a dead letter box or drop. (A «live drop» is where people meet to pass information and material.)
Dead letter box
A secret site where field agents leave information and retrieve money, equipment, and instructions from spymasters, handlers or caseworkers.
Debriefing
The process of obtaining all the information available from an agent or a group of agents following a specific mission or a period of service; imparted information from organization chiefs of a cautionary nature invariably accompanies such debriefings.
D-Department
Department of British Secret Intelligence Service.
Deep cover
A sleeper spy who operates under many layers of legends or false backgrounds, waiting to be activated; also applies to long-range operations planned far in advance of wars.
Defector
A spy who voluntarily changes sides, deserting to the camp of the enemy, especially during the Cold War.
Defector-in-place
Any agent who defects to the opposing side but who remains in his position to act as a double agent for that opposing side.
Desk man
Control (controller) at headquarters or one who directs espionage or counterespionage operations against a certain country. The CIA traitor Aidridge Ames was for some time head of the Soviet desk in Italy, and later held the same position at CIA headquarters in Langley, Va.
Deuxiéme Bureau
French intelligence service for the High Command.
Diplomatic cover
Any agent who has diplomatic immunity from arrest and prosecution in a foreign country, particularly those who are official representatives of their countries such as embassy personnel.
Directorate of Security
British counterintelligence
Disinformation
Secret information cleverly and convincingly doctored in such a way as to make that information appear to be genuine. For instance, a double agent wishing to convince the recipient of his report as to its veracity might stipulate that a certain act of sabotage had been accomplished by merely reciting the details of some destruction which is later reported in the press as a fire or explosion of undetermined origin. Though the mishap, in truth, is one of an accidental nature, the double agent claims it as his own work of sabotage.
D Notice Committee
British censorship committee, established 1912.
Double agent
A spy who works for both sides but whose loyalty is to only one and whose real service to the other is betrayal.
Double-Cross System
Using captured agents who have been turned to work as double agents by sending disinformation to their former spymasters. Also known as the Playback System.
Doubling
Turning an enemy agent so that he works as a double agent for the organization he originally opposed.
Drop
A place where messages and other items such as cash or equipment are left for other agents to retrieve. Also known as a dead letter box or dead drop. (A «live drop» is where people meet to pass information and material.)
E
Enciphered telephony
The scrambling of telephone conversations which makes such conversations unintelligible to anyone except those employing the technique when assisted with deciphering telephone equipment which instantly unscrambles the conversations as they occur between and for the participating parties.
Encryption
Converting clear text into cipher or code or both.
Enigma
German cipher equipment in World War II, 1937-1945: The Enigma Machine created by German cryptologists before World War II transmitted the bulk of all top secret diplomatic and most military messages throughout the war. The plaintext was enciphered by a rotor system, one for the plaintext, a twin rotor system automatically translating to an encoded/enciphered message. As the plaintext was entered on a typewriter keyboard, the rotors would advance each letter, each position representing a letter of the alphabet and encoding each letter by routing through a wiring system of contacts on the wheels an electrical current which illuminated a small bulb indicating the encoded letter. The twin rotors advanced in relation to each other. The Enigma Key was the initial position of the rotors set with a plug board. The British obtained Enigma Machines from the Polish and French underground at the beginning of the war and British cryptologists at Bletchley, known as Ultra, were able to reconstruct an identical machine and a primitive computer machine (called Bombe) developed by Allen Turing accelerated the decrypting process by automatically sifting through the hundreds of thousands of mathematical combinations to define which rotor setting determined the Enigma Key for each day's messages. When the settings of the plugboard and rotors could be established, the German messages were automatically decrypted into plaintext. The Germans never knew that the British had broken their «unbreakable» code/cipher system.
Espionage
The craft of spying or, when used as a noun, an organization or agency that practices spying.
Espionage Abteilung
Swiss counterintelligence, established in World War II.
Exchange
The act of exchanging one or more captured or imprisoned spies for one or more spies from the other side. This practice really began in the American revolution but it came into full use during the Cold War with the exchange of Soviet agent Rudolf Abel and U-2 pilot Gary Francis Powers in 1962.
Executive action
Assassination or murder performed with the approval and direction of an intelligence organization.
F
Farm, The
The training school for CIA recruits in Virginia.
Field agent
An agent who works literally in the field of operations, securing by one means or another, the secrets desired by his case officer or spymaster.
Field man
The same as field agent.
Fifth Man
The man who warned the fourth man, Anthony Blunt, to warn Burgess, Maclean, and Philby that they were suspected of being Soviet double agents. Some reports have it that this man was Roger Hollis, head of MI6.
Fourth Man
Soviet agent and British art historian Anthony Blunt, the man who warned the three Soviet double agents Burgess, Maclean and Philby of their impending arrests.
Friends
MI5 term for MI6, often a misnomer since there was a considerable reluctance on the part of British counterintelligence to fully trust MI6 after the many double agents found in MI6 ranks such as Guy Burgess, David Maclean, and Kim Philby.
G
Gestapo
(Geheime Staats Polizei) German secret state police within RSHA for Hitler's Third Reich, 1933-1944.
Ghoul
An agent whose job it is to haunt grave yards, verifying the obituaries of dead children by checking grave registration and tombstone inscriptions, the names for which will be used as cover names by field agents. This was the lonely job of Victor Spencer a Soviet agent in Canada.
Go-between
A cut-out or liaison agent who works with field agents and represents the spymaster of a network or ring; this agent is not merely a courier but imparts instructions and makes low-level decisions.
Gold
Code name for the Berlin Tunnel that was secretly dug by the CIA and SIS as a listening post inside East Berlin in 1955.
H
Handler
One or more (handlers) agents who convey to spies their missions and assignments as ordered by control. Handlers usually work in the field, rather than in administrative capacities.
Hard target
An enemy country which spies find difficult to penetrate or in which to successfully operate or obtain information. In World War II, Japan was a «hard target.»
Honey trap
An operation wherein someone is sexually compromised by a raven or swallow, and then forced into committing espionage; also called honey pot.
I
Illegal
Any spy who is not covered by diplomatic immunity, and, who therefore cannot escape being tried for espionage.
Illegal operation
An espionage operation which is illegal in the country where it is conducted.
Illness
The exposure or arrest of an agent; KGB use.
Indicator
A cryptonym indicating the sensitive nature of a message's contents.
Industrial espionage
The collection of secret information in business to increase the share of a given market. Spies in this field operate with the same procedures and equipment as in international espionage except that they rarely face criminal charges, their greatest risk being the loss of a job. Most governments routinely practice industrial espionage in fields involving international business and industry, particularly in highly competitive fields. In the mid-19605, a KGB industrial spy network in France, headed by Herbert Steinbrecher stole the plans for the Concorde.
In place
A field agent who is already established and working in a given area.
Intelligence
Information of a secret nature from a foreign power; an organization that gathers information of a secret nature from a foreign power.
Intercepts
Intelligence gathered through electronic eavesdropping of radio messages which, in the U.S., is almost the exclusive province of the NSA (National Security Agency) The NSA employs spy satellites and other means of intercepting classified messages .
Interrogation
The craft of compelling someone to reveal information that they are trying desperately to conceal. In the crudest form, this involves violence and torture. Historically, the Inquisition employed the rack, the Chinese their water torture, and, in modern times, the fixing of electrodes to sensitive body areas. The KGB and Chinese intelligence for years adopted an interrogation which simply wore out the subject, keeping a person without sleep for days until his will was worn down and exhaustion forced the desired answers, a system termed «brainwashing.» As in police work, interrogation teams often use the «good man»-"bad man" technique where one interrogator is brutal and offensive, the other sympathetic and kind, until the subject turns in gratitude to the latter to tell all. When IRA terrorism was at its height in northern Ireland the British Army placed hoods over suspects and made them lean against walls with only their fingertips while dinning into their ears a «white noise,» a piercing high-pitch screech. After several hours of this torture, subjects invariably told all. When released, the subjects bore no telltale signs of torture. (This kind of interrogation was discarded after the press described its use and a public outcry ensued.) Drugs and truth serums are also employed by interrogators, as well as hypnosis. The most sophisticated and effective interrogators are those who assemble an overwhelming amount of evidence and then patiently, systematically presents this to the subject, probing until a weakness is found and then exploiting that weakness until the subject breaks and confesses. One of the most skillful MI5 interrogators was William Skardon who induced Soviet agents Klaus Fuchs and Anthony Blunt to admit their espionage.
Invisible ink
Writing fluids used to conceal messages inside of other typed or hand-written messages. The use of invisible inks by spies is ancient. Milk, sugar-water, lemon and limejuice have all been used for such writings, which, when heated, become visible. In more modern times lead nitrate, cobalt chloride and copper sulfate (blue vitriol) have been used. While some chemicals react to heat, others require a reagent before invisible inks become apparent. Invisible inks are almost never used anymore since they are so easily detected.
J
Jib, The
A CIA inflatable dummy issued to agents and used from the early 1980s onward to replace an escaping agent inside of a car after the escapee rolls from the passenger side of the car as it is traveling at slow speeds.
K
Kempei Tai
Japanese secret police, sometimes called the «Thought Police,» 1936-1945, which served as Japanese counterintelligence in World War II.
King's Secret
French intelligence service under Louis XV, 1740s-1760s.
L
Legal
Any spy or organization having diplomatic immunity from prosecution for crimes and espionage.
Legend
A false background or biography for a spy.
Letter box
The address of an agent who acts as a secret postal clerk, receiving information and handing this over to other agents. The most infamous letter box in pre-World War I England was a barbershop operated by German agent Karl Ernst,
Letter drop
An address or hiding place where information in the form of letters (in code or written in invisible ink), documents, microfilm, microdots or other materials are hidden and which are visited by field agents who leave the information, and their handlers or cut-outs who leave instructions, cash and sometimes equipment and supplies.
Liaison
A cut-out or go-between who acts as a contact agent between a spymaster and field agents.
Live drop
A site for a secret rendezvous between spies who meet and exchange information and materials.
M
Magic
U.S. cryptological system which broke the principal Japanese cipher (produced by Japan's Purple Machine) of World War II.
Maquis
French resistance organization during World War II.
Microdot
A photograph of a secret message reduced to microscopic size for easy concealment. So small are microdots that they can appear to be a period at the end of a sentence in a typed letter and are only visible under powerful microscopes. Though espionage agents employed miniature photography as early as the Franco-Prussian War of 1870-1871, the microdot did not come into widespread espionage use until the Cold War.
Mixed Bureau
Allied counterintelligence in World War I, 1914-1918.
Mole
A counterspy who joins an enemy espionage agency to report on that organization's operations. Deputy director of the CIA James Jesus Angleton was obsessed with the idea that the agency had been infiltrated with one or more moles and searched vainly for years to uncover these traitors. A mole may also be an in-place agent who is «turned» by a rival espionage agency so that he secretly acts on behalf of the enemy. This term was invented by spy novelist John Le Carré and has since been used by members of the intelligence community.
Monitors
A technique of intercepting radio or telephone conversations when they are scrambled. The sophisticated Abwehr monitoring station at Brest, France, was able to intercept and unscramble almost all of the Roosevelt-Churchill conversations during World War II.
Mossad
Israeli intelligence, established 1951.
Muldiabarat
Libyan intelligence service.
Muldiabarat El-Aam
Egyptian intelligence, established in 1951. Also known as GIA.
Music box
A radio transmitter.
Musician
A radio operator.
N
Naked
A spy operating without cover or back-up.
National Center
White Russian émigré society which secretly funded anti-Bolshevik forces during the Russian Civil War and to which British intelligence was closely associated.
Neighbor
Another branch of an intelligence service or another friendly intelligence service.
Network
A group of spies (not necessarily known to each other) who have been organized under the direction of a single control or spymaster. Usually each network has a number of cells, each cell consisting of three or more agents with each agent ideally knowing no more than one other agent. Each cell has a chief who issues orders from the network spymaster, those orders delivered by cut-outs and couriers. Agents who serve as specialists in photography, documents, bugging devices operate inside a single cell with only one or two agents known to them and visa versa. Since these specialists are most vulnerable to detection they are purposely limited as to knowing the identities of other agents and other cells and seldom, if ever, the identity of the network spymaster.
No-beef
Code name for CIA payments to King Hussein of Jordan, payments that amounted to untold millions of dollars over a 20-year period which were delivered to the monarch by the CIA station chief in Amman. In return, Hussein reportedly allowed the CIA to freely operate in Jordan. When these governmental bribes were made known in the American press, all payments were ostensibly stopped. Hussein admitted to receiving the payments, claiming they were not personal payoffs but funds used to advance Jordanian security and intelligence.
O
Okhrana (or Ochrana)
Czarist secret police and intelligence organization, 1881-1917.
Onetime pad
Simple encoding system using five letter groups and employed only once.
Open code
Communicating by telephone or written messages in which arcane or esoteric references are made and known to have another, significant meaning to the recipient.
Operation Barbarossa
The German invasion of Soviet Russia in 1941.
Operation Bernhard
A fantastic scheme developed by Alfred Naujocks of SD intelligence to print billions of forged British banknotes and drop these by plane over England in 1940 in an attempt to ruin the British economy, a plan which was not adopted bv Hitler.
Operation Big Ben
An SOE operation in 1944 involving Polish underground fighters who had recovered an errant V-2 rocket which was dismantled and parts of the rocket, along with blueprints of the overall rocket drawn by a Polish engineer, were picked up by a British bomber and flown to England for examination.
Operation Bodyguard
An MI5 operation wherein German intelligence was hoodwinked into believing that the Allied invasion of Europe would take place at Pas de Calais, instead of the actual landing site, Normandy.
Operation Bride
The initial operations launched just after World War II by the combined communications intelligence agencies of the U.S., Britain, Canada and Australia to collect and decode and decipher all Soviet traffic.
Operation Chaos
A CIA operation enacted in July 1968 which was aimed at disrupting U.S. student protests against the Vietnam War. This was a legal operation insofar as the CIA's investigation outside of the U.S. of such movements in conformance to its charter that prohibited CIA involvement in the Western Hemisphere which is exclusively the chartered domain of the FBI. The CIA, however, monitored anti-war demonstrators and demonstrations within the U.S., even though such illegal activities caused bitter feuds within the agency at the time. CIA chief Richard Helms continued these illegal operation at the insistence of President Lyndon B. Johnson, the architect of America's involvement in the Vietnam War, and, later, President Richard M. Nixon, all of which was later revealed in the aftermath of Watergate.
Operation Damocles
An Israeli covert operation in 1962 mounted by the Mossad in Egypt, the purpose being to intimidate even kidnap German scientists (some being former Nazis) working with Nasser's Egyptian government.
Operation Felix
The planned and later abandoned German invasion of Gibraltar in World War II which was masterminded by Abwehr chief Admiral Wilhelm Canaris.
Operation Fortitude South
A grand deception involving the mythical U.S. First Army Group (FUSAG), reportedly headed by American General George S. Patton, in which dummy landing craft were amassed at ports opposite Pas de Calais and canvas planes, trucks and tanks assembled in staging areas to support the ruse that the Allied invasion would be made at Pas de Calais, an operation that convinced Hitler to concentrate most of his armored divisions in that area, thus leaving Normandy. the real intended landing site, relatively free of heavy defenses.
Operation Gold
The join CIA-MI6 operation involving the building and maintenance of the Berlin Tunnel which clandestinely monitored Communist communications in East Berlin during the mid-1950s.
Operation Heinrich
Abwehr operation during World War II, in the 1944 Battle of the Bulge, wherein German slave laborers were allowed to escape to American lines, unwittingly carrying false intelligence in their belongings which had been planted by German agents and was designed to mislead the Allies as to the strength and positions of German forces.
Operation Mincemeat
British SIS Operation in World War II involving the planting of a body on Spanish shores which indicated an Allied attack through Greece in 1943, a bogus plan which was accepted by the Germans and caused them to move reinforcements to Greece and away from the intended invasion of Italy; also known as The Man Who Never Was.
Operation Mongoose
A failed CIA operation in the early 19608 to assassinate Cuban Communist dictator Fidel Castro.
Operation Noah's Ark (1943-1944)
A French underground espionage operation conducted by the Mliance International Service in World War II which located the manufacturing and launch sites for Germany's V-i and V-2 rockets.
Operation Noah's Ark (1969)
A Mossad operation which involved smuggling five gunboats out of Cherbourg harbor on December 25, 1969. The Israeli-designed and paid-for boats were prohibited from being delivered to Israel by an arms ban imposed by President Charles de Gaulle after the raid on Beirut Airport on December 28, 1968, by Israeli commandos. A year later, Mossad agents smuggled Israeli sailors on board the gunboats which were secretly stored with supplies and fueled for «sea trials.» Before French authorities could act, the gunboats started up their engines and sped out of the port, arriving later in Israel. Other than the Arab nations, the world applauded the daring coup. France, however, felt humiliated, President Pompidou stating:"We have been made to look complete fools."
Operation North Pole
The system employed by the Abwehr wherein captured British spies in Holland during World War II were turned to transmit disinformation to England on behalf of the Germans.
Operation Overlord
The Allied invasion of Normandy on June 6, 1944.
Operation Plumbat
A Mossad mission in 1968 wherein the German vessel, Scheerbergs, loaded with 200 tons of uranium oxide which could be used in producing nuclear weapons. sailed from Antwerp and then vanished, later reappearing under a different name and with different papers. The cargo, which was apparently used for Israel's nuclear reactor, had been purchased through a series of dummy companies which had been set up by the Mossad The operation was revealed in 1978 by Haakon Wiker, former chief prosecutor of Norway who claimed to have gotten the information from captured Mossad agent Dan Aerbel, a participant in Plumbat.
Operation Red Pepper
A joint FBI-RCMP operation which consisted of keeping Soviet agent Hugh Hambleton under surveillance in Canada, filming him with Soviet bloc agents and then raiding his home and that of his mother's in 1979 to discover a transmitter and other incriminating evidence. Hambleton confessed his guilt but was not prosecuted.
Operation Rice Bowl
The failed attempt by the CIA and the DIA to rescue the fifty-three U.S. hostages taken during the franian revolution led by Ayatollah Khomeini. Dozens of agents in disguise moved in an out of Teheran to provide information for the raid that was to rescue the hostages but the attempt collapsed when a helicopter crash left eight dead. The CIA and DIA agents fled Iran which was then in the fanatical grip of Khomeini's followers.
Operation Sea Lion
Hitler's abortive plan to invade England in 1940.
Operation Sunri
OSS operation in World War n which was headed by Allen Dulles wherein a separate surrender of German troops in Italy under the command of 55 General Karl Wolff was negotiated but did not occur.
Operation Sussex
Code name for the dropping of saboteurs behind German lines prior to the D-Day invasion of Normandy on June 6, 1944, an operation conducted by MI6 and supervised by Claude Dansey.
Operation Suzanna
Code name for the disastrous Israeli military intelligence operation in Egypt in 1954 in which American and British property was attacked in order to discredit the Nasser regime with Western Powers. Operation Torch: The Allied invasion of North Africa in 1942.
Operation Valkyrie
The abortive attempt by members of Germany's Black Orchestra to assassinate Adolf Hitler on July 20, 1944, by planting a bomb in the dictator's East Prussia military retreat. The bomb did kill a number of Nazis but Hitler received only a slight wound in the arm. The ringleaders of Operation Valkyrie were quickly rounded up and either executed immediately or tried by kangaroo courts and then murdered. more than 5.000 persons were executed as the result of this failed operation.
Operation White
Hitler's sneak invasion of Poland on September I, 1939.
Overt information
Legally gathered information from published sources.
P
Paris Agency
Monarchist espionage network during the French Revolution, 1791-1797.
Paroles
Key words between agents to establish mutual identification.
Playback System
Using captured agents who have been turned to work as double agents by sending disinformation to their former spymasters. This system came into widespread use during World War II when German intelligence employed captured British spies in Holland in what was called Operation North Pole. The Germans also used captured members of the Red Orchestra the same way. The British did the same in what they called the Double-Cross System, compelling or persuading captured German agents to send disinformation to the Abwehr almost throughout the war. In America, double agent William Sebold performed the same service for the FBI
Plumber
Anyone responsible for breaking into and burglarizing a secure area during a covert operation. The Watergate burglars were called Plumbers.
Plumbing
The structuring of participants and responsibilities involved in a convert operation.
Polygraph
A lie detector; a machine that electronically measures nervous reflexes to a series of questions. This is done by placing a pneumograph around the chest to monitor the subject's breathing and a rubber cuff around the upper arm to measure any drastic rise or fall in blood pressure and pulse rate. Electrodes are also placed on the subject's hands to record any excessive sweating. Wires from these apparatus feed to a needle which marks a continuous roll of paper. if the needle records a steady pattern in response to questions asked the subject is then deemed to be telling the truth. Any needle marks that are at wide variance with the norm indicate the subject is lying in response to certain questions. The CIA traitor Aldridge Ames was given regular polograph tests and claimed to be able to overcome anxiety by simply staying up all night and taking the test in a state of utter exhaustion and relaxation.
Positive Vetting
British security checks for intelligence service recruits which involves the subject providing detailed information about his grandparents, parents, relatives, spouses, education, employment history and political affiliation, as well as two character references. This allows agents to check on someone's entire personal, educational, employment and political history. Prior to the time British intelligence was shown to be rented with traitors such as Burgess, Maclean, and Philby, its custom was to merely check on two character references and then trust to the subject's honorable word. Since recruitment in that era was restricted to uppercrust schools such as Trinity College, it was believed that old school traditions and ties bound recruits by unflagging loyalty to their country. This the British learned was naive In the extreme. The spies in the heart of British intelligence had no honor and knew no loyalty except to Moscow. American intelligence services, particularly the FBI and CIA, pressured the British into adopting a Positive Vetting system of background checks, one employed in the U.S. for anyone requiring a clearance to view or handle classified materials.
Princes
The Danish resistance organization during World War II.
Purple Machine
Japanese cipher equipment. 1937-1945, similar to that of the German Enigma encoding-enciphering machine which was duplicated by U.S. Signals Intelligence just prior to World War II, enabling U.S. intelligence agencies to read Japan's top diplomatic and military codes and ciphers throughout the war.
R
Radio
A short-wave radio transmitter used to send and receive messages in code or cipher or both.
Radio Liberty
American-controlled broadcasting system in West Germany that transmitted propaganda to the Soviet Union during the Cold War.
Radio Free Europe
American-controlled broadcasting system in western Europe that transmitted propaganda to the Warsaw Pact countries dominated by Soviet Russia during the Cold War.
Radio Operator
The operator of a short-wave transmitter used in sending and receiving coded or enciphered messages.
Raven
A male prostitute working in collusion with spies to compromise someone with secrets to impart and provide, usually through secretly taken photographs, evidence which will compel the victim into providing information.
Recognition signal
A secret sign or password used by agents to recognize each other in a first-time rendezvous. When atom spy Klaus Fuchs met Harry Gold, his Soviet contact in New York for the first time his recognition signal was to carry a tennis ball in his hand. Fuchs was told that his contact would be wearing gloves and carrying another pair of gloves and a book with a green binding.
Red Brigades
Left-wing Italian radical terrorist organization founded in 1969 at the Trento University by student Renato Curcio and suspected of being KGB-financed and armed. The Brigades specialized throughout the 1970s and mid-1980s in political kidnappings and assassinations until more than 500 of its members were finally apprehended and imprisoned.
Red Orchestra
The many Soviet spy networks operating i n Germany and Nazi-occupied Europe during World War II, 1939—1943.
Resident director
A spymaster or control whose authority covers a network in a city, district, state, province or even an entire country. This term has almost been exclusively used by the Soviets.
Ring
A group or network of spies.
Room 40
Cytology office in British Admiralty Building in London in World War I where German codes and ciphers were broken.
Rote Kapelle
Red Orchestra, the Soviet underground in World War II.
S
Sabotage
The destruction of any physical object through clandestine means which damages essential enemy targets.
Safe house
Any building where agents can safely meet or hide for a lengthy period of time with out fear of detection. Also applied to defectors.
Sanitize
Preparing a document before its release by doctoring or censoring part of its contents.
Scientific intelligence
Technical applications to espionage and counterespionage. These include a myriad of fields, biology in detecting subtle poisons; chemistry which employs sensitive acids to examine documents (to make invisible writings apparent); electronics which employs bugging devices and, for military intelligence the use of radar, sonar and direction-finding equipment; medicine where the polygraph is used or truth serums and mind-altering drugs are employed; photography which has produced microfilm and the microdot to contain infinitesimal messages; physics which might involve laser beams.
Secret
The second highest U.S. security classification regarding national security information held by someone working in the intelligence community.
Secret writing
Writing that is put into coded or enciphered form by cryptographers. Also writing that is made with invisible ink.
Security
The steps spies or spy networks take to secure themselves from penetration and exposure. During World War II, Norwegian Resistance issued a table of security instructions which have since proven to be the hallmark of espionage security
1) Don't gossip, especially in public places
2) Never commit secret information to paper unless absolutely necessary
3) Do not call on an associate agent you have not seen in some time unless first phoning to make sure he or she is not under suspicion or surveillance
4) Never use your own phone to contact a fellow agent
5) Be prepared for security police or counterintelligence to call for you at your work or home at any time, even on an innocent inquiry. If so, attempt to escape. If no escape can be made, confront police with dignified silence and indignation but do not display defiance. Take warm clothing with you. This advice was nothing more than common sense but good security is made up of common sense.
Security check
In radio transmissions of coded or enciphered messages, these checks consist of inserting secret signs-a purposely garbled or mutilated letter at set intervals-which conveys to the receiver that the message is genuine and not being sent under duress, or, conversely, meaning that the message is bogus and is being sent under duress. In regard to recruits applying for intelligence service, a thorough background check (in the U.S. always conducted by the FBI) into that recruit's family history, education, friends, relatives, employment, and political affiliation.
Shabak
The counterintelligence department of Israel's Shin Beth, officially known as Sharuth Bitakhon Klali.
Shadow
An agent following another, a tail, a form of street surveillance where one agent follows another on foot.
Shin Beth
Israel's counterintelligence service.
Shoe
A false passport or visa.
Shopping list
Types of information desired by an intelligence organization, or technological items or weapons required for a specific espionage operation.
Sleeper
An agent who is assigned to an area which may in the future be operational and one who waits to be activated. Usually such agents operate outside of established networks and are known only to spymasters at headquarters. One of the most successful sleeper agents of World War fl was German spy Simon Emil Koedel who operated in the U.S., gaining access to almost every important defense plant in America and delivering invaluable information to his Abwehr spymasters in Germany.
Soft target
A country or geographical area where espionage goals are easily achieved. In World War II, Spain and Portugal were «soft targets.»
Soviet secret police
Since the Russian Revolution of 1917, Soviet Russia was ruled by a secret state police and intelligence organization operating on a global basis. This organization has had many names but remains the same organization. Names for this organization over the years have been Cheka, 1917-1922, GPU, 1922-1923; OGPU, 1923-1934; NKVD. 1934-1946; MVD, 1946-1954; KGB, 1954—.
Special Committee
A committee (established in 1955) of the U.S. National Security Council, which is made up of the President and members of the CIA, State Department and Defense Department and which approves all U.S. covert operations.
Special Service Organ
Japanese military intelligence from 1900 to 1945, headed in China during World War II by Kenjii Doihara who was later hanged as a war criminal.
Spook
American term for a spy or secret agent. Spy An agent who obtains classified information about one country or side which benefits another country or side. The Hague Convention of 1899 defined a spy as «one who, acting clandestinely, or on false pretenses, obtains, or seeks to obtain, information in the zone of operations of a belligerent, with the intention of communicating it to the hostile party.»
Spymaster
The supervising agent in charge of a network of spies, usually in an administrative capacity, or the chief of national intelligence or military intelligence.
Station
A post where espionage operations are conducted, usually an embassy.
Strategic intelligence
The collecting and analyzing of information involving the political intentions and military strengths of foreign nations.
Stringer
A freelance agent who works periodically or occasionally for an intelligence agency. This agent is a part-time spy who usually works for set rewards and takes only specific missions and is not permanently on call. Some stringers are specialists in accomplishing specific missions (such as break-ins, burglaries, photographing documents) but stringers are invariably used as decoys or cut-outs. It was said that Mata Hari was a stringer for the German Abwehr who served as an unwitting decoy and was sacrificed to a firing squad to put Allied counterintelligence off the track of more important German agents. The stringer is almost always motivated by money and is considered the least reliable of agents.
Sûreté-Nationale
French police and counterespionage organization, established in 1800s.
Swallow
A female prostitute working in collusion with spies to compromise someone with secrets to impart and provide, usually through secretly taken photographs, evidence which will compel the victim into providing information.
Swallow's nest
The residence of a swallow or female prostitute whose job it is to sexually engage a spy to compromise him; such apartments or homes are equipped with hidden cameras and recorders to film and record the sexual actions of victims in order to compromise and turn them to working for the opposing intelligence organization.
Swim
To travel.
T
Take, the
The information gathered from espionage.
Tapping
Intercepting telephone conversations and messages.
Treff
German word meaning a clandestine meeting between a handler and a field agent, usually for the purpose of determining whether or not the handler will accept the services of a new or apprentice spy.
Terminated
Murdered. Sometimes used as «Terminated with extreme prejudice.»
Throwaway
A cover story or legend which can be discarded when it does not withstand interrogation and another cover story or legend, layered beneath the original, is then offered; also an agent who is considered expendable, as was the case with Mata Hari, the German spy of World War I.
Top Secret
The highest U.S. security classification regarding national security information held by someone working in the intelligence community.
Triangulation
Used in direction finding wherein three radio receivers with revolving antennae (often on vehicles) representing the angles of a triangle take bearings on a radio signal transmitted within the triangle. The courses of the bearings are plotted on a map of the area within the triangle and, where the courses intersect the secret radio is pinpointed. The Germans first developed this effective radio direction finding technique in World War II.
Triple agent
A spy who is recruited again by his original intelligence agency after having gone over to an enemy intelligence organization; or he or she may be an agent working for three separate intelligence agencies, showing loyalty to all, even though they may be adversarial which was often the case with Isaac Trebitsch Lincoln.
Truth drugs
Anaesthetics employed in interrogation that reportedly act as truth serums, compelling the subject to make admissions he or she would not otherwise make. This is arguable by most physicians who do not recognize the drugs as causing the subject to tell the truth when he is determined not to do so. Such drugs can produce admissions only if the subject secretly wishes to confess. The most commonly used truth drug of World War fl was Scopolamine (hyoscine) which was employed by the counterintelligence division of the Abwehr. This drug is one of the Belladonna alkaloids and is considered very dangerous when not given in extremely controlled doses. The drug effects the nerve system, releasing control of essential functions such as heart. bowel and bladder. This highly toxic drug is extremely risky, even though it was at one time popularly used to ease the pain of childbirth. When used on captured agents, this drug was combined with morphine to produce a «twilight sleep.» where victims would respond to questions in a semi-conscious state. Sodium Thiopental (Pentathal), a short-acting barbituate, was also used by Soviet interrogators, another dangerous drug which is administered intravenously in strictly controlled doses. Subjects given this drug are conscious for a very short time before becoming unconscious and unresponsive to interrogation. Amobarbital, another barbituate, induces a semi-conscious state in the subject. It is believed that all interrogators in all intelligence agencies have used or still use these drugs to induce subjects into providing information.
Turn
To convert a spy by threat or persuasion into being a double agent, working for the very country he or she has been assigned to spy upon. In such instances, the «turned» spy invariably sends back disinformation which is skillfully concocted to appear genuine.
U
Ultra
British communications intelligence during World War II, 1939-1945, especially as applied to intercepted and deciphered German messages.
Uncle
Reference to any headquarters of an espionage service.
Unwitting agent
A spy who thinks he is working for one side when he is really working for another.
V
V-Man
(Vertrauens-Mann) an informer who can be trusted, usually a citizen of the country in which agents are operating.
W
Walk-in
The act of someone literally walking into a meeting or a meeting place from the street with an offer to act as a spy or with secrets to impart.
Watchers
Agents who keep persons under surveillance.
Wet Job
Any operation in which blood is shed.
Wire tapping
Intercepting telephone conversations or messages.



Îòâåòû è êîììåíòàðèè:




[Íàïèñàòü îòâåò]



--------------------------------------------------------------------------------
Îïóáëèêîâàíî íà Ôîðóìå ñàéòà Àãåíòóðà.Ðó