Mike Agliolo / Corbis
In the intelligence community, "tradecraft" refers to agents' advanced espionage tactics. That meant creating clever disguises, conducting surveillance, using concealments, procuring secret information and exchanging secure messages with other agents. "Spies can be ingenious in the way that they communicate," said Peter Earnest, executive director of the International Spy Museum in Washington, DC. He cites miniature dots containing text that came to prominence during World War II. "Somebody can still use that kind of technique." From Biblical times until the 20th Century, spy operations were pretty much person-to-person, said former director of the CIA’s Office of Technical Service Robert Wallace. He and historian H. Keith Melton detail such tactics in their books "Spycraft" and "The Official CIA Manual of Trickery and Deception." Earnest and Wallace share these 10 classic spy tactics gleaned from declassified information.
Courtesy of CIA
The Combustible Notebook What’s an agent to do when caught with compromising notes? During World War II, spies could keep sensitive information in a special Pyrofilm Combustible Notebook, Wallace said. This notebook contained film that would ignite when triggered by a particular pencil. Working like a grenade, the paper would burn and the whole thing would disappear within seconds. The CIA’s one-time pads of paper were used between agents for secure communication using encryption that’s virtually unbreakable. Once they were used, the pages could be torn off and destroyed. “After that, we developed water-soluble paper,” Wallace said. “You could take notes on this paper but if you were about to be compromised you could immediately just dump the paper in the toilet or run water over it.”
Bugs, Tried and True During the 1960s, integrated circuits represented a major breakthrough. Before that, transmitters were unreliable and required huge batteries. “Integrated circuits reduced power consumption, made reliability almost 100 percent, and allowed a reduction in size,” Wallace said. New devices were a tenth the size of previous ones. “That means you could put bugging devices about anywhere you wanted to.” When U.S. supplies were dropped by parachute into remote jungle areas during the Vietnam War, tiny beacons were attached so that U.S. soldiers could follow the signal, Wallace said. He added that, conversely, spies could carry beacons disguised as a branch or a cane, leave it at a specific location, and then moments later an attack fleet would hone in to hit the target.
Courtesy of CIA
The 'Dead Drop' One well-known spy technique called the dead drop involved placing an item or message in a device. An agent then signals to a handler that the drop has been made -- in the past that meant marking a signpost or building corner with chalk, Peter Earnest said. Hollow coins could carry messages. Although the space inside was extremely small, agents could put in a microdot. This micro writing system developed by the CIA in the 1960s and 70s required a high-powered magnifier to read concealed messages. The most famous espionage case involving a hollow coin occurred in 1953 when a Russian agent inadvertently gave his hollow nickel to a newspaper boy. When the boy dropped the coin, a microphotograph fell out. It would take the F.B.I. four years to decipher the instructions encoded in the tiny photo. Micro writing was effective, Wallace said. "It was just very difficult. It had a lot of potential for human error."
Courtesy of CIA
'Jack-in-the-Box' Spies must be ghosts, not poltergeists. To avoid detection, they used maps like this one printed on silk that don’t rustle. The British Directorate of Military Intelligence MI9 issued cufflinks containing tiny compasses during the late 1930s through the mid-1940s. One tactic Wallace and Melton detail in Spycraft involves using equipment dubbed a “Jack-in-the-Box.” This simple device was a suitcase containing a dummy designed to look just like an agent from the shoulders up. An agent in a car who wants to escape surveillance could wait for a sharp turn, roll out the passenger side, and open the Jack-in-the-Box. “Even though you are only out of surveillance for five seconds, that was long enough for the officer to roll out of the car quickly into the shadows,” Wallace said. “Surveillance, looking at the car ahead of them, would still see two people in the car.” In 1982, CIA officers used the device to evade KGB surveillance reestablish contact with an informant.
Courtesy of CIA
Hidden Surveillance Clandestine surveillance remains a hallmark of covert operations. In "Spycraft," Wallace and Melton describe cameras hidden in unusual places, audio equipment for listening to conversations through walls, and even a pipe with a receiver so the officer could bite the stem and detect hostile radio communications nearby. In the 1970s, the CIA worked on a mini unmanned aerial vehicle shaped like a dragonfly called the "Insectothopter." When the CIA’s Directorate of Science and Technology celebrated its 40-year anniversary in 2003, it revealed a realistic looking robotic catfish dubbed "Charlie." Built in 2000, the device's true mission has never been revealed, but experts think its aim was to sample and test water around nuclear plants and facilities. “You build in it the necessary filters to take samples,” Wallace suggested. "Then you recover the fish downstream and evaluate those samples." When the fish was revealed, the Associated Press consulted with a scientist who said the fish was so realistic that predators might target it. Robotic fish have caught on in the academic arena, though. Many institutions now use robo-fish for environmental monitoring.
Deliver a Knockout In the mid-1950s, spies had to be ready to spike a drink in a pinch. Wallace and Melton’s book “The Official CIA Manual of Trickery and Deception” outlines several strategies for dispensing liquids, powders and pills without the recipient noticing. Glove-wearing lady-spies of the era had a particular advantage with their handkerchiefs, and could sew small containers into them. While lighting someone else’s cigarette, the matchbook could be used to dispense a small tablet into their cup. All in the flick of a wrist. Wallace said he particularly liked the trick where a standard Number 2 pencil became a tool for delivering a pill or powder -- up to 2.5 CCs -- simply by manipulating the eraser and the metal band around it. “It can be a knockout pill, it can be a hallucinogenic,” he said. “I suppose it could be lethal, if you wanted it to be.”
Hidden in Plain Sight Steganography is the practice of leaving a concealed message out in the open. Wallace credited magician John Mulholland for introducing new tactics for this kind of communication to the CIA when he became their consultant in 1953. “He wrote about how you can communicate,” Wallace said. “He talked about how magicians could communicate when they were doing tricks.” One method for communication was how shoelaces were tied. Connecting them between the holes on both sides of a shoe in different ways signaled certain things such as “follow me” or “I have brought another person.” Hiding messages in plain sight continues to be an effective tactic. Just look at Al Qaeda. “We have seen that used by the terrorists,” Earnest said. In a case that was just reported, Al Qaeda embedded secret documents in a porn video.
Courtesy of CIA
The Document Grab Get that document and get out. Pulling out a small scanner would help today, but spies had to use different techniques decades ago. The CIA Museum now displays this letter removal device from World War II. When inserted into the unsealed gap in an envelope flap, the device grasped the paper and wound it around pincers so it could be extracted without anyone the wiser. Another way to retrieve documents involved magician’s wax, the kind that temporarily attaches to objects. To use this technique, described in Wallace and Melton’s book “The Official CIA Manual of Trickery and Deception,” first wax was placed on a book cover. In the blink of an eye, the book is used to grab a paper. All the agent had to do is remember to hold the book so that the paper side faces the body or the floor.
Courtesy of the Crypto Museum
Short-Range Coded Messages Long before cell phones, the CIA’s Office of Technical Service was developing what it called a short-range agent communications systems or SRAC. When two officers communicated securely with each other using a SRAC device, they didn't need to risk being spotted in the same location, Melton and Wallace explain in "Spycraft." An early SRAC device from the 1970s had code names like “DISCUS” and “BUSTER," and resembled a large calculator and contained a keyboard with a stylus for punching in 256 characters, Wallace said. Using “burst transmissions,” these systems allowed agents to transmit messages across about a quarter-mile range, communicating in bursts through coded messages that were automatically deciphered and displayed. Although the signal could potentially be intercepted, this communication technique represented a significant advancement in tradecraft. “This meant that you didn’t have to meet an agent to get information,” Wallace said. “You could actually transmit it in real time.”
The 'Brush Pass' That spy film staple, the so-called “brush pass” used to pass documents or a package between agents, can be traced back to the Cold War era. The technique was developed to be used in hostile areas where U.S. agents were under constant surveillance, Earnest said. “It’s very elaborate,” he said. “You’re staging this but you are arranging for you and the agent to pass each other surreptitiously somewhere.” Highly choreographed, the handoffs took place quickly in alleys, on corners, in subway stairwells. In late 2009, an elderly couple, Walter and Gwendolyn Myers, was convicted on charges that they’d spent several decades spying on the United States for Cuba. Among their tactics, according to the F.B.I., was a variation of the brush pass. Gwendolyn exchanged shopping carts in grocery stores with contacts to pass along information.
GET MORE ON SPIES: Top 10 Trickiest Spy Gadgets
All spies, listen up: You no longer need to hide a mic. It appears that a team of MIT researchers have managed to turn a potato chip bag into a eavesdropping listening device.
In fact, their technique, which extracts audio by visually analyzing the tiny vibrations triggered when sound strikes the surface of an object, works on just about any object in a room, from a potted plant to the surface of a glass of water.
In a series of experiments, nicely detailed in this project video, the research team was able to reconstruct music and spoken words using a high-speed camera behind a soundproof window. By applying a complex algorithm to the visual information captured by the camera, the system can “listen” to sounds generated in the room. The vibrations being recorded are tiny indeed — on the potted plant, for instance, the vibrations moved the plant surface about a tenth of micrometer on average.
The team — including researchers from MIT, Microsoft and Adobe — will present their findings in a paper at this year’s Siggraph computer graphics conference.
“When sound hits an object, it causes the object to vibrate,” says graduate student and lead author Abe Davis, on the MIT project page. “The motion of this vibration creates a very subtle visual signal that’s usually invisible to the naked eye. People didn’t realize that this information was there.”
In order to reconstruct audio from video, the frame rate of the video sample must be higher than the frequency of the audio signal. As such, the researchers used high-speed cameras able to capture 2,000 to 6,000 frames per second.
But in the process of testing the technique, the team discovered they were also able to extract limited audio information from standard smartphone cameras, which record at 60 frames per second. While the high-speed camera system reproduces sound with surprising fidelity, the standard camera system can provide more limited information — the number of people speaking in a room, say, and possibly gender or other identifying information.
The “visual microphone” technique has obvious eavesdropping applications in forensics and law enforcement. But the researchers say they’re more interested in developing a new kind of imaging in which scientists can determine structural properties of objects from their visible response to bursts of sound.
“I’m sure there will be applications that nobody will expect,” says researcher Alexei Efros. “I think the hallmark of good science is when you do something just because it’s cool and then somebody turns around and uses it for something you never imagined.”