Your espionage headquarters for all things spy: spy games, spy equipment, cool links for spies, surveillance how-to and tools, real life spy articles, current espionage news, cryptography, cyphers, and the knowledge to use it all...! For spies of any age.

June 30, 2008

AgentKevin78 - Advanced Spy Fighting Technique "Highly Explosive"


THIS IS A PARODY - DO NOT ATTEMPT THIS AT HOME
THE STUNTS DEPICTED IN THESE VIDEOS ARE DANGEROUS!
**CHILDREN SHOULD NOT VIEW VIDEO**

AgentKevin78 is up to his usual not-so-bright antics.
This video episode covers Advanced Spy Fighting Technique "Highly Explosive"
Click on the title link to access the video.

June 29, 2008

Secret Meetings

A spy needs to sometimes meet with a contact to pass on information... but how can it be done without being caught?

A security service like the KGB can only achieve its objectives by intercepting communication between people. This means you can beat the security service if you can deny them the ability to overhear your meetings with your contacts.

What you'll learn here... (TRADECRAFT)
This article teaches you how to check for surveillance* before you meet with a clandestine* contact. You'll learn a protocol* that will beat security services like the FBI, BATF, DEA, and others. The method is particularly effective against standard police surveillance. It also works against the so-called inspection teams of the IRS.

*DEFINITIONS:
clandestine - marked by, held in, or conducted with secrecy
protocol - a detailed plan or procedure
surveillance - close watch kept over someone or something (as by a detective)

*********************
SPY TALK:
Spies in North America call this seven-step protocol (below) for counter surveillance "drycleaning". In Europe, it is called parcours de sécurité – a French phrase which can be translated as security run or security circuit.
***********************

7 Step-by-step instructions for holding a secret meeting...

Here's a hypothetical situation. Assume that you and I wish to meet clandestinely. We wish to ensure that our meeting is not observed by a surveillance team. You and I have previously agreed upon a place, date, and time. In addition, we are familiar with each other's appearance – we can recognize each other on sight.

Step 1

You and I independently arrive at the previously agreed-upon general location. Rather than fixing a specific location, we agree to be only in the general vicinity. This is an important principle. This might be a large park, a residential district, etc. The location must be outdoors and free of video surveillance cameras. It should also be selected with the intention of thwarting telephoto lenses. You and I should each know the area well. The location should provide reasonable cover for each of us being there – strolling in the park, walking through a residential area to a bus stop, convenience store, etc.

Step 2

You and I will eventually make eye contact at some distance from each other. We do this discretely, so others are unaware. I use a pre-arranged signal to alert you that I have spotted you. Perhaps I'll throw my jacket over my shoulder, or remove and clean my sunglasses, etc. The signal must be a natural movement that does not attract unwanted attention. Safety first. Even though you and I have seen each other, we do NOT approach each other. This is an important safety valve. If either of us has grown a tail we do not want to compromise the other person.
*********************
SPYTALK: The phrase grown a tail is spy-talk for being under surveillance. The phrase is somewhat inaccurate, because they don't just follow you, they often surround you.
*********************

Step 3

When you see my signal you simply walk off. Then I follow you in order to ensure that you're not being watched. I carefully check for the presence of a floating-box foot surveillance team. I check for agents at fixed observation posts. I also watch for drive-by support from a floating-box vehicle surveillance team.
NOTE – In particular, I may follow you, I may walk parallel to you, I may occasionally walk ahead of you. The goal is simply to be nearby so I'm in a position to detect surveillance around you. I always remain at a distance from you, of course, never approaching too closely.

Step 4

When I have satisfied myself that you are clean, I again signal you. Perhaps I re-tie my shoe laces.

Step 5

Now we reverse roles and this time it is I who simply walks off. You begin to follow me in order to ensure that I'm not being watched. You check for floating-box foot surveillance, fixed observation post foot surveillance, and drive-by support by a vehicle surveillance team.

What to look for: You carefully watch for persons who are pacing me or moving parallel with me. You check for persons loitering at positions with a good line-of-sight to my location. You watch for an ongoing pattern of people coming and going that results in someone always being in a position to monitor me. You watch for vehicles dropping someone off ahead of me.

Step 6

When you are satisfied that I am clean, you signal me that I'm not being watched. (On the other hand, if you suspect that a surveillance team is in the vicinity, you simply abort the operation and walk away.)

NOTE – You must trust your instincts, because if something seems not quite right it's better to be safe than sorry. Many people are surprised to learn that it is not difficult to detect a surveillance team watching someone else. This is the subtle elegance of Blunt's countersurveillance system. And the goons are helpless against it.

Step 7

You and I can now approach each other and meet. After our discussion we agree upon the date, time, and location of our next clandestine meeting – as well as two backup plans in case the meeting is thwarted by surveillance. If we are unable to meet at the first venue we will use our fallback position and we will meet at the same time and place one week later. If we are unable to make that meeting happen, we will shift to a previously agreed-upon failsafe plan and we will meet at a different location at an agreed-upon date and time. Neither you nor I writes down the particulars of our next meeting. We commit the details to memory.
NOTE 1 – If you have any documents to give me, I will not accept those documents until the final moments of our meeting. I will have already started making my getaway when I accept the documents. This reduces the chance of discovery and arrest by a surveillance team that has managed to elude our counter surveillance protocol. If the security service acts too quickly, they will have no evidence against me, because the documents have not yet been passed to me.
NOTE 2 – The best agents never mix discussion and documents. If a document is to be passed, no discussion occurs. The entire contact takes only a moment – the perfect brushpass. The principle is simple. It is foolhardy to stand around holding incriminating documents.
MORE INFORMATION ON TRADECRAFT:

Tradecraft origins. The method described in this article was originally devised in 1943-1944 by countersurveillance expert Anthony Blunt for Britain's MI.5. Unfortunately for the British, Blunt was a deep-cover agent for the KGB. Six years later, Blunt taught the protocol to his new KGB controller, Yuri Modin. Together they perfected the technique as it is known today. They successfully thwarted MI.5 surveillance for three years, sometimes even meeting daily to exchange information and top secret documents. In effect, Blunt was using his inside knowledge of MI.5's surveillance techniques to beat them at their own game.

Proliferation. This counter surveillance method has since been adopted by Israel's Mossad, Germany's BND, Russia's KGB (now the SVR), the American CIA, and many others. The protocol is taught by intelligence agencies to their controllers – these are the intelligence officers who manage and meet with deep cover agents in foreign countries. The method is also being used today by resistance movements and urban guerrilla groups. When this countersurveillance protocol is methodically applied, it is extremely difficult for a security service to breach your security.


June 28, 2008

AgentKevin78 - Advanced Spy Fighting Technique "Human Shield"


THIS IS A PARODY - DO NOT ATTEMPT THIS AT HOME
THE STUNTS DEPICTED IN THESE VIDEOS ARE DANGEROUS!
**CHILDREN SHOULD NOT VIEW VIDEO**

AgentKevin78 is up to his usual not-so-bright antics.
This video episode covers Advanced Spy Fighting Technique "Human Shield"
Click on the title link to access the video.

June 27, 2008

Breaking a cryptogram...

Cryptograms are simple cypher puzzles that often appear in newspapers, just like crosswords!

Cryptograms are simple substitution cyphers, like the Caesar cypher we learned about. You can always use your cryptowheel to solve cryptograms... but first you need the key to the puzzle.

For example, in this code:

TQJFT BSF DPPM!

The key is P=O.

It is a simple Caesar cipher. Using that key you can break the code to the secret message above, with your cryptowheel, or on your own! (Correct answer is below)

So again, how do you find the key if you don't know it?

Try these tools:

  • Check for one-letter words. The word is A nine times out of ten. If A doesn't work, try I.

  • A three-letter word may be THE especially if it begins the crypogram, both first and last letters are of high frequency, or the same three letter word appears more than once.

  • Memorize the first six letters of the frequency alphabet, E, T, A, O, N, and I. The complete frequency alphabet is: E T A O N I S R H D L U F C M W P G Y B V K X J Q Z

  • Try to identify vowels. One way is to examine how many different letters adjoin a high-frequency cipher letter. The four most used vowels, A, E, I, O must touch the 20 consonants more often than the consonants touch the different vowels. Also, every sequence of five or six letters most always contains a vowel.

  • Look for doubled letters. The most often used doubles are L, E, S, O and T.

  • Check the final letters of the cipher’s words. Letters that appear often as final letters include E, W, T, D, N, R, G, K, and Y.
With these helpful tools you are well on your way to solving most cryptograms that are published today!

Now, wanna test your skills by breaking a cryptogram?
CLICK HERE to solve a puzzle of your own!

GOOD LUCK!

(Correct answer to cryptogram above: Spies are cool!)

June 26, 2008

AgentKevin78 - Advanced Spy Fighting Technique "Blind Fire"

THIS IS A PARODY - DO NOT ATTEMPT THIS AT HOME
THE STUNTS DEPICTED IN THESE VIDEOS ARE DANGEROUS!
**CHILDREN SHOULD NOT VIEW VIDEO**


AgentKevin78 is up to his usual not-so-bright antics.
This video episode covers Advanced Spy Fighting Technique "Blind Fire"
Click on the title link to access the video.

June 25, 2008

Make your own fingerprint powder!


Every spy needs to be able to dust for prints!

Fingers, even dry ones, leave a thin fatty substance on objects. When left on glass, or some other shiny surface, you can put some fine dark powder on it, and lift it with some clear tape.

Real-life CSI forensic experts dust fingerprints with aluminum powder. But, since you probably don't have that on you right now...

Here's how to make some fingerprint powder yourself!


Fingerprint Powder Recipe

What you need:

  • Cornstarch (or starch powder)
  • A candle
  • 2 heat proof dishes
  • A plastic knife
  • A PARENT'S HELP

Put a little starch powder on a dish. Light the candle (let an adult help you with this!), and hold the second dish in the flame.

Remember, flames are HOT! Get your parent to help!

The candle flame will deposit soot on the second dish. Scrape this soot from the dish and deposit it on the starch powder. Keep doing this, until the amount of soot matches the amount of starch powder.

Mix the two together, and hey presto!

When your ready to lift a print, dust it generously. Then, blow the excess away from the fingerprint.

To lock the fingerprint in place, cover it with clear tape, and stick it on a clear card.

RECIPE VARIATIONS:

For white finger print powder - (Used to print dark surfaces) Simply use corn starch based baby powder!

A simple finger print powder - Can be made by mixing powdered graphite (available in the key section of your hardware store) with corn starch or talc!

Big fluffy blush brushes
- like your mother would use - make great "dusting brushes". (Ask permission first!)


June 24, 2008

AgentKevin78 - Advanced Spy Fighting Technique "Alley Fighting"


THIS IS A PARODY - DO NOT ATTEMPT THIS AT HOME
THE STUNTS DEPICTED IN THESE VIDEOS ARE DANGEROUS!
**CHILDREN SHOULD NOT VIEW VIDEO**

AgentKevin78 is up to his usual not-so-bright antics.
This video episode covers Advanced Spy Fighting Technique "Alley Fighting"
Click on the title link to access the video.

June 23, 2008

Cryptography: The Caesar cipher


In cryptography, a Caesar cipher, is one of the simplest and most widely known encryption techniques.

It is a type of substitution cipher in which each letter in the plain text is replaced by a letter some fixed number of positions down the alphabet.

For example, with a shift of 1, A would be replaced by B, B would become c, and so on.

The method is named after Julius Caesar, who used it to communicate with his generals.

The Caesar cipher is AKA (also known as): Caesar's cipher, shift cipher, Caesar's code or Caesar shift.

Try it for yourself! Click here for a usable and downloadable Caesar cipher program!
or
Make your own cypher wheel, and create your own Caesar ciphers!

DEFINITIONS:
cryptography - the procedures, processes, methods, etc., of making and using secret writing, as codes or ciphers
encryption - to encipher or encode

June 22, 2008

What is "Cryptography"?

Cryptography is the practice and study of hiding information.

The use of cryptography dates back to the beginning of man's use of written language.

The word cryptography comes from the Greek meaning hidden writing.

The oldest physical examples we have of using written codes dates back to the Spartan government's use of scytales. These were special devices in which the sender and recipient each had a special cylinder of the same size. A ribbon was wrapped around the cylinder and the message written vertically on the ribbon. The ribbon was worn as a belt and delivered to the receiver. Once the receiver wrapped the ribbon on the appropriate cylinder the message could be deciphered by reading vertically.

A few noted cryptographers were:

  • Julius Caesar: He developed the first use of a substitution alphabet for ciphers.
  • Roger Bacon: Quoted as saying "A man is crazy who writes a secret in any other way than one which will conceal it from the vulgar."
  • Sir Francis Bacon: He developed the reputed baconian cipher using a bilateral system consisting of 5-bit binary encoding and utilizing a variation in type face as the key. There is ample evidence showing that Bacon was indeed the author of Shakespeare's work and these works are riddled with baconian ciphers.
  • Thomas Jefferson: Invented a wheel cipher.
  • Charles Babbage: Re-invented another wheel cipher.
  • Edgar Allan Poe: He was very fond of and talented at creating and deciphering key word codes.
  • Alan Turing: Very interested in cryptography and worked on government code-breaking.
In modern times, cryptography is considered to be a branch of both mathematics and computer science, and is affiliated closely with information theory, computer security, and engineering.

Cryptography has become a very important part of computer technology and an integral part of the Internet. The ability to encrypt and decrypt information is crucial to secure financial transactions and even elementary forms of on-line privacy.

Cryptography is used in present technologically in advanced societies; examples include the security of ATM cards, computer passwords, and electronic commerce, which all depend on cryptography.

June 21, 2008

AgentKevin78 - Advanced Spy Fighting Technique "Scuba Tactics"


THIS IS A PARODY - DO NOT ATTEMPT THIS AT HOME
THE STUNTS DEPICTED IN THESE VIDEOS ARE DANGEROUS!
**CHILDREN SHOULD NOT VIEW VIDEO**

AgentKevin78 is up to his usual not-so-bright antics.
This video episode covers Advanced Spy Fighting Technique "Scuba Tactics"
Click on the title link to access the video.

June 20, 2008

Spy Games...


If you want to sharpen your spy skills and have some fun while you do it, check out some of the following links for some really cool SPY GAMES (and other stuff!)

I SPY for kids by Scholastic - games, puzzles, cool downloads and more!

U-Solve-It Mystery Club by Scholastic - Crack cases, use the code machine, solve a mini mystery, or check out the crime scene photos!

Top Spy Secrets' SPY-DOKU for kids -
Much like popular Sudoku puzzles, but with letters instead of numbers! Not too difficult...

Geospy by National Geographic Kids - Test your geosmarts by identifying states, provinces, countries, and continents to earn full GeoSpy agent status!

PBS History Detective games for kids - Play detective games, learn how to crack mysterious codes and become super-sleuths!

British Council Word 2 Word Spy Game - In this game you'll see some instructions for a spy. But the words are in the wrong order! Can you help?

British Council Word Search for Spies - Solve 10 clues to find the 10 words you must discover in this word search puzzle... are you up to the challenge?


HAVE FUN!!!

What is "spying"?



Espionage or spying involves an individual obtaining information that is considered secret or confidential without the permission of the holder of the information.

Click on the title link to visit Wikipedia's page on spying!

June 19, 2008

AgentKevin78 - Advanced Spy Fighting Technique "Kitchen Night Vision"

THIS IS A PARODY - DO NOT ATTEMPT THIS AT HOME
THE STUNTS DEPICTED IN THESE VIDEOS ARE DANGEROUS!
**CHILDREN SHOULD NOT VIEW VIDEO**

AgentKevin78 is up to his usual not-so bright antics.
This video episode covers "Kitchen Night Vision"

Click on the title link to access the video.

June 18, 2008

Know your environment...

If you choose to do any recon missions, or spying, it is important to know what your weather will be like. After all you wouldn't want to get caught in the rain with nothing to protect your spy stuff - or wear black clothes in the day when it's snowing! So here's a little info tool to help you out:

Just type in your zip code!
Have fun!!!