Escolar Documentos
Profissional Documentos
Cultura Documentos
DELETED PAGE(S)
NO DIJPLICATIONFEE
FOR THIS PAGE.
Page(s) 1
IAGPA-CSF Forrn 6-R
1 Sep 93
Federal
i Accesslon For
cfit&r
I nttsTAB
w
n
i ilTrc
'0tst i
-.yt
|.
5-c"c1
^tll ,
rt.- |
i_lr__l.-l
I
I
sI
:r:::l',:::
f'leth.P
i{haiis espioirage?
rT
LL
ffii
The seq-qpnge
ffi$$
1.
?.
3.
4.
5.
5. 1
5.2
5.3
5.4
6.
6.1
6.2
6.3
6.4
7,
8.
8. 1
8.2
9:
i0.
FT
[Fr1
lf$
of
Assessment
Forgeries.
Infiltration
Legalization
anC
Secret lllriting
Cut-outs
Di rect Contact (lvleeti ng)
Dead Drop (DD)'
Live Drop (LD)
Safeguards
'
Transmission Scheduie'
A-], A-2, A-3 Radio Traffic.
Two-way Radio Communication
l-.istening Devices (Interception Operations)
lntelligence
.,
'
PhotograPhY'
"Photographi ng".
crof i 1m"ing
Concealmenti and Means
.
Mi
of Transmission (Containers)
(0ther) Clandestine Intelf igence Transmissjons."
i5*
I
tii
n{
::.-
ra !-x
1F_r<-M|lr^
rlra*a\^EaLiir*tu{-1r-rtEliltdtM***Iatan&atlM
As one part of the two Ger,ta:3,s, it'l ies as a buffer between East and West,
between the communist an: free worlds - different from South Korea and
I the former ] South V'i etn an,
agent rings spans --re Feiel^al Republlc of Germany. fastertt intelligence services (insofar as --^..
-,E , J:g to the EaSt Bl oc ) Support one another.
-ir=-v -^''!^
A net
of
l'los
J.
GDR:
?.
USSR:
CSSR:
Pol and:
D3en Lnccvered
14i
ni
Mai
Germany
ACmi n'i
s-
lt'ii n i
q,
Espionage
an-
other state.
operatives
is
thi s area.
Thus '"he fi3nt aEainst i-is (:.3as3''-cus) cllense against, state securitY is
ci :v'i ded intc 'r ccJnt,er,nt=,Iiger. ce" t.b-t ti''e Cftlce f or the Protect'i on of the
Const,i tu:i on e rii tne llAD) aic "cr:t''-'al pr3sEc:-t,i 3:r" (b-u police and state
prosecutcrt s U I;1 C3 ,' .
aF-
Spot:
Assess:
Develop:
Recruit:
s-pg!!ri!_
Rernarks:
C
I ande
sti
ne
SOUTCES:
J.
?.
Recru,
fl
e i nte.I I i gence servi ces, parti cu i ar1 y ;hcs= c' the GDR, placed more
emphasis on quant,itative saturaticn (many agenis 'i :, nany pl aces ) unti I about
the beginning of the 1960's, far fewer bu-' ilc l^3 Q,3lii'i eC agents are used
today.
!.Jhi I
As a
ru i
ter
s.vs--96.
fi
-J{:.
;:
-.}-Ti
L.'t.\
t }'.t'
* } \'\
R_esearchi nq
The headquar'-ers receives the reports of the spotter and evaluates t'hem.
tJhi'le the spotter essentially only performs "informantt' services, the researcher m;s-, accomplish real invest'igative work" He receives the evalualed
(anc siftec) reports of the spotter to support his research-
means determ'ining
a1'l personal,
p'.,.
itical,
and
ilG;I;l
to
F-t
(
I
Recruitinq
ting for clandestine 'i ntell i gence servi ce rneans to commi I a person
"i ntel I igence-neutral" to 'i nte I I 'i gence work. Headquarters h as
g'i ven '"he eval uated rePorts of the researcher to the recruiter So that he can
Bgqnu-i
ffi
The recruj-uer Eust always be able to adapt himself to the indiv"idual potent'ia1
agent, 'i.e. he must use a different basjs for recruiting different persons.
f.
?.
Fi nanci
ai
I nducement
3.
J,
residing
Cpportr.in-,
Th
orally or in writing.
Cornnri '"me
t,
can be
made
A person who has commi tted hinrself for work in a c I andesti ne 'i ntel I i gence
servicef can generallY not avoid perforr'ri ng such wcrk. He wcrks as 1 ong as
the headquarters desi res but not a bit lonqel^ e'i ther !
The relationship can only be terminated
J.
Z.
fcr
the
follorving reasons:
death
deacti vati
on
reasons
means such as telegram'
permanentl y
because
because
of
of
ac'.:r-e
danger:c::'
unlrcduc--'i venesq
a3ent
source
cf ihe
ri^Tt"'"
Comir
i tne
nt
Dec
'
ara:i
on
service rvitho',t reservaI commit myself io work for --he Scviet intel'l igenceextent
it'i s in ty power to
the
tc
ssuec:re
tion and to carry out ihe orCers'i
Should I ever
service.
tigence
in'"el
Scviet
ilie
cf
do so to the satisfac--ion
--o
work
with
me Or
who
me
persons
knowr.
other
or
erdanEer
commit treason
the
expect
am
to
I
activj:y,
oi
espionage
the
cJurse
in
me
known
to
become
'i'he Sov'iet
harshest punishmeni from the Scviei'inte'lligence service.
intelligence serv'ice has the rea:s to ajso reach me in the t'Jest.
N
ame
Forqgri es
al
Par:i
es )
ialsifications
-ctal Forgeri es
fu11y back-stopped
I
ha
carti
nct
il i
ped
iy
back-stopped
back-stopped
a1
133resentations provid'ini personai or materia'l information) that are "interes:ing" for a clandestine intelligence service or are othervtise needed and
;t which the originals cannot be used by the opposing intelligence service,
- .. io"ged.
rce these ;orgeri es do not 'i nvolve "criminal s" but ratheri nvol ve a
"tcrge.y workshop operated by the state so-to-speak. forgeri es by an i ntel 1 i :31ce servi ce are di ff i cul | (for the non-spec'i al i st impossible) to detect,
S:
Fcrgeries -,n categories A and B are practically no longer used by intell'i;erie servlces today; they are mentioned here in the interest of completeness:
'1-
al
?ar''.i
Foroeri es:
lal
fi
s:
cat ions
{,r-rhen:i: (ctf i cl al'l y i ssued) docul,ients are a'! tered. 0n docurilents wi thlrt ^,hn-- 1craJ.ls, erasures or razor del eti ons are made to the original
Lex:; on Das S pcrts ar,d :hot,c i denti ty dccurnents, photos are swi tched and
acci ii cna i al'"erati cns nay al sc i:e rnadeVJUr'llVvVL
nce t,he f orgel i. categori es A ar:d B are detected rel ati vely easily, they are
nrar-ticaliy unsuitable for intell-i gence purposes.
S'i
Fr,
c.
-.u
I vu
Total
Fcr-geri es
are fal s i fi cati cns i n wh i ch nothi ng i s authenii c i ncl udi ng the materi al
of rvh'i ch t,hey are r,lade (paper, bark cl oth, etc. ) . Thi s type of forgery
'i s preferred alrnost exclusive'ly by intelf igence serv'i ces. The samples
are "acquired" itt that an orig'inal i denti ty document ( or passport, dri ver ' s
licenser etc.) are photographed or reproduced duri ng the ownerrs border
crossitlg without the owner tak'ing not'ice of what 'Lranspired,
10
f the total forgery and the ori gi nal correspond i n every deta'i I
for the photograph), the forgery is referred to as being
f_u l].v b,ac ls-stopped or as a d"oub l,e i denti ty doculnent, passpoFt, etc
I
(except
y the "of f i ci al partt' are the same i n forgery and ori gi na1
(nunber, offi ci al seal , i ssu'i ng agency, i ssue date, etc, ), the forgery
'i s considered
belf back-st,opPell.
3. ]f a Lcta'l forgery contains entries from severa'l orig'i nals, it is
referreci to as partial'ly back-stopped.
?.
If
onl
10
T'F
.L.L
f*.
n:e l l i gence l i fe hi story" of an agent.
, - i UU s or authentic (authentic to the extent
that r't contains
a of the agent but another name or even the life h-i storv
f..hS_Co
-l-'^.,
.l-l
|UUU
'-l
' i nn
'tv v I tllf
pers on
2f
agent. must be
jn better
comrnand
own
If he is
with tlrjs
rife history.
i1
L2
*.f,
H
ffi
The Infiltration
fr
H
.c
{L
x.
ii
iJ
"J
'J
id
H
;1
.J
T
.J
'j
u
A border crossing'is also secret, if, it occurs openly but is not recognized
as a secret crossing bv thilSppropriate authcrii.iesi (ivitn-tui."'ili".. o.
the rike).
crossing points was relatively simple; --lday they are inposs.i b'l e or nearly
impossible in nany areas.
H
F'
4,
It
ifr
It
llts
lfi
li
It
of or at the d.irection
infiltration.
l};::ll;"i,.|;ri::i::.who
-cou
'i
are
tc
becc;re co=r-a:icnar
'
ri ers
nstruc+r,ors (theoreti
cal
instructor"s (teciinical
knciv e:ce
kricv/l edce'i
cffi:e:s.
1r)
t/
L3
on
means
I or,r.
Remarks: Agenci es control 1i ng agent,s i r :he ccuniry of operati ons are cal I eo
%sidencesf'; their agent. handlers are cai'l ec "Res'i dentst'. There are "legal"
and "illegal" residences. Legal resiCe:ice : enbassyr trade mi ssion, consul ate,
etc,(i.. a 1egal representative of a c3'irl-t'-v' i n rhe tar get country).
I I lega1 residence = "resident," cl andes*'i vel',' carri es out agent handl er functi on
but officially pursues a cover occupat,ic:,
An example
of
BAUDE:
Heinz and lngeborg Baude, married to one anc-'her in the GDR' are'infiltrated
into the FRG-as the unma.ried refugees !ie:rich Schroeder and Helga Eimert in
order to be later activated as resicie:.-"s. The-v are both sent to the same
refugee camp. There they "meet one arc--h3:", They provid"-g considerable
umornt of false docurnents to legitimize --^.e'r personalia. A'l I are made out
in the'ir cover names. Problen! Total fcrgeries? Officially'issued identity
documents consist'ing cf aufhentic 3lF. iCe:.:::y document paper-with false
(driver's
namesl They narry tnd then apply 'or -e* iCer,t',ty documents
'in
the
names
of D. Schroeder
Cer
nany
licenses, .i.. ) in the Federal ielu: irc:
Thus
are legalized'
they
dcc;:ients!
and Helqa Schrceder nee ii:e-: - au;her:ic
r3
L,*
Secret l,lri ti
nc
Secret wri ti nq i s rvri tten commun'i cati on wli'i ch are not readi 1y readabl e
mu;t-Tirst be translated cr made readable. There are two calegories:
and
Writi
nq
l.
2.
who
letters of the alphabet are "mixed up";. an. ccr.,sonants are separated in such a way that pronouncable
bu-- seise ess;v:rCs are formed.
4. "Br:i.le' = coes not have to be identical to "authentic" Braille.
3.
oflen
y,3!;e-.s
5.
6,
"Incr-yp--=c ivr::irig" (-rhe ncst used visible secret vrriting in inte]lig"n".)'= l--,uers tr^e substi:rte,i wi.L digits or numbers. Used in c'l an-
".Jse
"l.rlater Wri
ti ng"
15
b!
:l
t.
,,{a
d,
_t
a,ta
-t'
II
I
t
.'
however, the rvater has nade the coated surface dull vrhere it has come
contact vrith the paper. It can be read with illumination from a
"poi nt I .ight" sou rce appl i ed at an ang'l e.
in
?.
t'C-paperf
The prcces s ;,rst f reqientl;v used tcday i s the use of
sheet cf paper is p ref,ar ed or thi n I y coated wi th a "whi tet' chemi cal
(simi lar^ tc carbc:, parer jei ng ccated wit,h a bl ack or bl ue substance).
paper ((t'c-paper"
carbon Paper
rike a conrnerclal
connerc'ia'l caroon
Th" ".-paper".s'..:seC
s ,Jse3 exac!iy
exact'iy tlKe
prccess
was
known
as the
I969, ihi s
car'con paper ) . i.Jr,ti I abc:'t
t'
l
"contact pap'er
h)
rr
'r"Oa
vveJJ
t5
L6
i?
\T
tt
Jl{
'.i{.r
*g
#
FI
-1
,!
Dead Drops
Li ve Drops
i+
H
*1
hl
.\
l!
a
li
.1
$
T
il
A
H
*
il
H
q
j
I
i-r
lr
llIt
l1
t,
DD
is to
3.
4.
The DD
5.
6.
7.
l^
la
i 'i
lr
I i:
Cu.t.-Outs
Ir
of a DD io his
DD
headquarters by
that
means
The deposit
I
It.
t.
-t
f1
tlr
c
H
tr
Mobile LD are often trave'lers between East Germany and tJest Germany who take
along "gift packages". Stationary LD can be persons who are asked by.-"friends"
to hold-packages or the l'ike so that these can be picked up by other ''friends".
F.
E
F-.
E;
ts
ff
The one
of the operation of a DD or
Er
F
F.
Ft
fr,
b
E:
alr-
;t
*:
3rr
f.:.
LD.
_t,
,
't
D{l
t'r
1?
Hiij
F""
w
F.:
{.
fr
to
of
another person
a)
b)
17
1S
:J
cJ
!l
RJ
vr
si
d
f,
.1
-4,
..,
t-t
A
Safeou ards
',f
3
is
q
t
t
I
I
i
a,
Approach Safeguards
.j::r-:ach safeguards are required for each dead drop and ai'l'live drops. They
::-s'st of both a pre*sign and a post-sign. As a rrle, these are small .itemi
:'s::e kird which are deposited at certain s'ites (thumb tacks, bott'le corks,
::--.r :cxes, or the like) or signa'ls that are marked some\rhere with nencil
cr cial<. These sites are usually located relatively far from the depositories.
-:e:r purpose is to inform a partner agent rrrhether, for example. the dead
.-cf, |:as h;en serviced or picked up, or whether there.is the suspicion that
--r-e ceac drop has been discovered by counterintelligence
and is under surt'danger safeguard"
is effected). Example: an agent
"eillance (in i.his case a
se:'t:cec his dead drop then affixed a thumb tack to the frame of a shop ninc:r and ihen stuck a bottle cork behind a downspout of a house. If the agent
rl: Cetecied a danger, he uas to have used a white thumb tack instead of a
;:':-colored one. The warning signal of the courier. 'in case he had detected
:1--:er, ccnsisted of substituting the bottle cork of one firm for that of
'
2F^-10r
b'
v!r.br
-= :'clli
:g
-2eo
\rUJL?
e--3r,
Ii
dlt i
ve d rop
ntel
res i ded
:' i:fcmaticn signals are affixed by agents for agents, I ney serve
-- i:s:I uc-- an agent (tc do something pre-arranged or not to do some-,--i:-:
'":e :irect ccniact between intelligence per"sonnel.
-l't
Ii
rO*;3
of
t3
1e
ll
R
-d,
"'1.-,-,-.
.ja j or {gI!
9?4, intelligence services have used radio communication
--o a'l'l oiher means) for relaying messages. Since then, the
beco:re considerably more detection-proof but the systems
l:-.:---e.: A ccnver^ter is used as a "main keyttwith whose help 1et::r''s ca- )e converted to numbers, and vice versa. This type of key
ant
years old and is traced to Julius Caesar" The converted
> ::l-:2-1C0
:
- LJ
s s:- ; :cCay called "Caesarrr in intelligence iargon.
i.
JV
:ive
g
rc,
ps
[dhen
vary
"'i :Ci v: dual
,gr,3uDS
for
wormrt because
Bror: \i:': -r-3 3;g-t, 3-c :-e ^caJ';uarterS must use the same issue of
;he bcc.:, ;h: :31.'i ke, :,3s:i:'' set'^'Jes as a converter. The nevJ numbers
cbtainei v'ia 3 lu-:,e:^s rr3rrn .:o:lired v,''i th tho se conta i ned i n the
t,ranSm'i ssicn) r'^epr:se-: pa;e -; u ji:'S, line nuFlbers, and number of I etters.
d)
f$gl,qp.ry. Sentence Ke v:
e)
f)
[4emory Sentence
?0
3/
be shortenecj considerabiy.
h)
under
ij.
C.
Chart: In order to enable the agent to adhere to the exact transmjssion and receptfon times, he has a "time chart,'from which weekday,
date, and time can be read or computed. various intelligence services do not provide any documentat'ion to their agents for this purpose; in such casesr the agent is g'iven fixed reception times which
he must adhere to,
b)
Call Gloup Chgrt: Each agent has a different ca1) group or identity
group for each transmission. This group must be delermined from the
''call group chart". Such a chart 16oks'like a part, of an " -i -worlntf
(one._or two columns) but is usually not on "soft,'film but o n t'norma I
f i lrn" and not posit'ive but rather iregative (black numbers on clear
background in soft filnr; 1ight numbeis on black background on t,he
cal 1 group chart). Some intel iigence services combine the cal'l group
chart ard'uime charts.
Time
2a-a^
'->++r^
i^i
.ut,v
--
-:
between the
headquarters anc -,ne ager--; --hi s means t,hat, I i ke the headquarters, the
ageit tcc m;Si' iave:ra:tS:iSSjon:-d
receivinc p:r..i
todav usuarlv o,reraies in the "ro,.'1,::::'lllirll;,!lill;r.li:1";;'lln':n'
high speed. Such transntssicns car, *,nerefcre, not be broadcast directly
(1ive) but rather are prepared befo:^eranc anc are run on "tra":miision
machin":l'. The pick-ups operate with perfcrated iape or n:agnetic audio
!up*. They have a speed of up to 2400 nunibers per minute; iheir audio
frequency is approximately 20,000 tc ?Z,c-ic Hsrtz. These comnuni.iiton
devices are small and easy to handle but with tricxs and manipulation can
have a worldwide ranee.
A-Z Traffic
}{
g
EJ
ii.
f'.F
F#'
r {:'
E-"
A-J I raftlc
a;
9-;:
E"Fq+
!'=
F=
t=
tr
tr
20
'fr?
a;i.1rhi
21
>r -L
5l
fl;1
Eta
ri"r*{
-.t
I..-
i}.:;
ft
t{
+rJ
f,
case too the agent is tflghle to transmit. He
which
are spoKen i n groups of f i ve; he rnust wri t,e thern
receives numbers
down, "comb'i ne" them rvith a "corirrT'runi cati ons k*ytt, and f i na'l 1y, deci pher
H
fi
ij,1
i&
rad i
cati
on s .
,
-f\l.
??.
att'l I
tal
l\ri
IH
21
22
LA
t)t
rti
tr
tJ
()
()
,.
r-
1!
rl
r|,
lr
ur
*;
f"
lfr.
at
b'l
(t
fJ
5
LA
rO
Or
r)
rr.|
()
f-l
(v
ft;)
u\
<l
\-
C)
\'r{
a'
(\
r\
g.I
ti-
C'\
cr'l
L-'\
(v
Lfi
\g
f)
l5
ci
rI
\o
;o
o1
Cf.
r-11
tJ
o
(.^
c-
\r
f.1
CT
'/.
\,,
t\
lJ\
O
.T
C)
,tf
d-
ilJ
tJ\
c)
rl
rr
|-'
r.n
(;1
,l-
rn
OJ
ol
LN
l'r{
iE
.Jl\a'.t
CI
;r'r
ci\-
r.t
{G4
I
,
FA"
rlo
o,
o
t-t
\t
(J
-o
LA
.O
F.
Ft
tO
l(t
rli
ro
tA
+J
rO
(f,
a,
rh
(u
vl
a'J
v\
LN
rva
0')
?l
\{
*\'
<ra
c)
4
=c
LO
r<
IJ\
+)
rC
o
\-
r\
rt
cr\
r<
r<
V,
tr
tJ1
rAl-r-,
AJ
o
f,
h
r-t
.-i^a+
-ct
-(f,
uf
a'1
lf
vr
Ut
o
.r
C
c{'
OL
I
I
.(l,
n
rg
+l
U
+J
v1
l---+t
\)
qi
6)
Fr
cv
r{
'n
t"
(!
t
f-l
C-
ralFl|r.f
co
r{
n
OJ
(r
\a
f-l
rl'
tl
rft
$r
if
-.)
\|
CJ
u1
fl.r
q
s'r:.
lJJo
rirle
(7r
'a
.?
(\;
r.l
rr
c,'r
.qr
Fl
ar)
Til
t'l
.t
ro
a
tn
(n
IF
if
FI
@.
'3\
v
(}
\.3
\f,
(U
Fl
(f,
l-
L1
q'l
L'r
x|
r)
E{
A
u\
LA
LA
r-l.ttr,
f?l
s-^\
(\l
.g
d
rf
f-
c\
l-
tj
l*
lB
o
o
q ls
I
rn
(\'
\f
.'-l
(r\
trJ
L}
c!
-f
r{
f-
I l$
IF
ln
o\
|--
r-1
fn
t*1
o\
LI
lr\
r"l
rl
o
L
d
c
It
(rT
rl
LN
r{
NI
CT
*.,
fri
\t
rj\
sl
-1
lf\
9t
s-'
r'l
r{
.n
il
(,
]?
o
Cr
f,
Cr
rn
(Jr
-a
o
rr{
Ir-
rU
?l
fn
u"r
a?
(\l
q
(r
LN
(tt
GI
f')
r3
l-
()
n,
v)
at'
c)
q{'
lir
Fr
$t
()t
r-l
, -,
li
f,'l
fl
(-)
.n
Hl'e
Cr I
);l5i
("r I
t.-
<r
(,1
l:\
()
.9
ii | fi
Jr
tjr
il'
rO
-a:
la
| tl
C, I O
tJlr!
(ti
;t
'o
i- rr)
v1
F
(1
c
'5O
L
+J
q,)
r.{r
{,+-
+J
.C
c
.E
.O
VI
o,
qJ1
->
1A
qJ
c
-g
o
-.>
=o, ooo
EL
cJc,
E. E.
FFI
??
23
are
nurnbe
'
1!,
red )
- -
53?.{
1 t:'tgt
620?5
. -?-
rl---
?1681
10?658tr973
N
(D
1t
o
-t
*tr{)
tu'
7
3
H
=
o
(n
.*Q
-1 3
3l
..rd
:JC
lof
d'o o.
o
-1 o(D
l
i<* l
e'
rt')
so
z5
|_
cll
In
g''
Nr
Ei
3? W
a
3 n-r
s(o.!
-.-J.l
.<
o
Ei-@
ty Group" wi th
+', ''tO*tl
the number of g roup s
Groups recei ved '
Groups determi ned
tt
f rom the I -Llorm"
Result
(deduce
wi fhout
ttcarrytngt'
the ten
- -
then
messageJ
23
24
Examp r e
for
Deciphering
1.
Cal I
of
the
an A-3 Transm'ission
t"o::at
" 08309
(Identity
2, Call:
(at
"Attenti
i on
0 5rt
Transmi ss i on
Group
on
11
05 hours
08309"
Separati
11 (one, one)"
on
number
of 5
nurnber
groups to fo I 1 ow )
are written
( ! I identjty Group
(
Beg i
down
repeated once)
'l s
(a total of 11 groups).
t'i-worm" are
The e eve- 5-ci,:',t g:o,.rps that follow the identity group in an
wri'uien :el i'*' :re nJ-Jer grcu,ts that are transmitted. The individual numbers
are then su:ira::ei froi-, cr.e a:ciher, number by number (Chinese subtraction:
'if t:e bot--::r nJi-:3r is :ar^Eer thar the top number, 10-is added to the top
nUmf,er a rC ::? S-:--arC:i
c:i cri -i s l:.f crn'ec wi r.,hcut cal ryi ng the one( Exarnpl e:
"6 minus I = E"),
The resulting n-:lerS a:C
the "Caesart'.
:igits
ar^e
If the resul'"'is'l ower than "6", 'i -' i':e-ls a s-:;'e-iigit nunber (from 0 to
5); if it'is higher, it -"'ields a Z-cji3:: -rn::- i;'c:r 73 lo 99). The number
6 in the result means tha: the next :hree 'i;::a!^s r,3; --3 )e ca:rli nec 'i nto a
3-digit number (even if rt, again inc'l uces a "i')' "ir--: 'iie a:d :f t' s
3-digit number, a word or phrase 'i s then 'cur': 3' ::: :3:e a^:r-- an j : s 'nserted in the text. If the number t9 is -rhe res-:. -, rea:-'s --hai a number
follows or ends. Th'i s number is compu+"eC as: clear it.-- --:'r:e';:res per
dlgit (as a check); for this purpose symbcls sucr as '':e':c:" iir.:n:s caset
be incjuded. This neans '-:a: ''.r,e Cesigra-''.cn "n;mber"
the number 90) mpvt'open
parenthesis" or "s'i ose oar^eniresi s".
can be equated to
separateC
?5
.ffi
n lry'p3!Tr?q.!.aq=!1-s
ffi*Q+F}'
ffi
ffi5P?s
.0
5408r
070
77 aTs 07
454
7 66 95 0 ,67 763
t-i-@
&B
t gcr
ogso?
g+
*wo rm"
?0
7J
Tl
,
iTl
'-l
lT6fnlrr
?rl
0l
0l
et
f.J
I
I
i1
92
9l
q{
95
f
9r
rtlulu
l-l+
f{
e]
n
1..,
cofufu li
Hlllr:
---+--
mlrfxj
25
26
i"
:03
505 continucusly
514 cover sfor"y
523 readabl e
532 meas ure
541 materi al
550 mi crofi I
569 n1 litary, militarilY
578 b ri ng a'l ong
587 i mpart
596 rnessage
604 nearest
61 3
negatj ve
6?2 normal
631 neces sary
640 instal'l ation, site
659 operati onal y
665 small package
617 pol ti cS, pol i ti ca1 1y
685 mai l
ma'i I not yet recei ved
69 5
703 reaction (to)
712 send, -'i ng
721 security
730 imnredi ately
+9 statement,
758 tuning
767 dead drop
77 6
appo'i ntment
785 rneeti ng
794 rneeti ng as agreed
802 meeti ng pl ace
rneet'i ng ti me
81 1
820 about
839 transfBF, i ng
848 check, -ing
85i wi thout fai I
866 supportr -i ng
co;lnect, -i on
87 5
BB4 ag ree, -ment
893 destructi oFr , destroy
901 tcntatively
310 preparationr prepare
929 prel imi nary
938 s uggest, -i on
941 !^lest, Berl i n
955 West, Germany
955 repea'f, -ing
eccnomyr econorni ca1 1y
37 4
i83 signal
992 h eada uarters
s:1,-,-')'f
:23
::.
:-:
'- l:
^-:f
V
U!
J\
---
= >rt
t-s*-
^-:
|.r-(.
:::
S:s:'
.t 3,t
--:
. ?:
-:'-:_
:/
1.
-AA
.v:
i nf orn'rati on ]
-(E
j
r-
--,
-=
-r:.
_.
-:
t->-1a-t
el
-..;
!
,
a V-r
lr
^Il>
.i
.Jr
F:.
. Y-J
lr
,^
2'
-.r nhqprvation
lS
.'yl
vl/r)rvl
vt
a1:
L-4.
?23
- Fl
-1 I | 'v
lL4
26?
ar],,'aa 3::-ess
::C-,],i^--
?71
'rf
ur
280
ass'i ;:
25i
299
30i
316
325
334
343
352
361
370
389
395
406
41 5
4?4
433
442
451
460
479
'a dttL
!! vr'
'-'
-1
| -:eif -,
eslirra-u3. es--t;3
agreeable ,::.,.
receive, recei ri l;'l
pick-up
p'i c ked -u p
result
received, recs': P-i nvest,i gati cn, 'i nv'e s: i ga*-:
expectr ati cn
deterrni ne' deteFriii r-.3;'i 'lr,
frequency
cati on
secret wri t'i ng mater' a I
border crossi ng
i nfoFfil, -ati on
i n stru cto r
i nterest
communi
map
4BB
n tact
contrcl
497
couri er
co
Coce Chart?6
.c---
3r-:
;rr
{d:
/l
r-l
!X\ar.v,\r'.liu.1-\1,ri'jr,]-\1.xn\4[jL1,t+fVlJdsF'Lr;-LtrainnnN^'-tL-"t1]"k'1-lf'l'ti1,i1d1]i'
r{{
x a m p l_e
:-:c:
vtave
MHz).
L'i
re l: *rarsr:ss:c:
L'i
ne 2:
AEINRS and
code
as ncted
6.45 or 5.95
ne
mes s ase )
(f
r^l
v\l
Transmission:
?z
A./
rl\\
L/eJ
l-
+)
l.
n
.?U
g_?
655
-L^Jo
rm :
Result:
1 B e 31
1 6I+ ?,
ffi
+gjgig-g*5
IT
Code
:urt^, I i ne in Block 01 )
9-z-2-g-f
),c
7-7-9.9-?
I 523l*
I 5? 4 3
t-O
-?-2-"
e
ce
Code
7 2I3
? 3 8. ^g_t
2-2-J:9-9
9:2-9-2-2
rt 5. BERICHT
"
["6th
I,I
27
I TH
B'-
o9
50,9
g4l+zG
o 5 4 4'l
99089
5069
529c
---------
3-9-Q-:1
oCs
Code
1259
z 8l+ 18
o855,
17 1g
3EL= t )
g895o 25
? 1,, 2,-L:, 9 ? .C 8
3 o 11 g 2
? ? 4 ?.-3
g-I-g
I'les s age :
'
ERH
ALT!]}{.
IIINVERSTANDEN
}1T
"
9/30
APP0INTI4ENT. " l
.I5I]}..II
"-t-*r--*
h5',
l-rr.
i.r)
:'lir
r/. !'2.n'
d$
ffi
l:)
f-tJ
ExpJ
rl,
i'i
anati on:
a*-x
L?j
$r{
ffi
>.!:1
li':#
a
r'14
-tll. .
;
fi1
ii
number
groups.
,1.
2 = Code key
!!
g!
$E
JlE
ec rypt i on no s pace.
)r:
Xb
g'i nal s
ft
,_-^F,
3 = Convert,er (ttCuesartt)
TH
l-r{
code
charts
and
I ami nated
together i n pl asti c.
flt
Ltl
t1
11
ts
Concern i 4g_J_.juLd 2:
r-?
'.t
ti\.
iI >l
'-I
I
Ft
| 1r
I i:
l;i
IH
IF
Ii:
IT
li:
IH
IH
?B
?q
Ft 1)
.-,_..{l-11d1,^-fr..Tr+-(L(
^-{ti.rlF:|FE
lL { - fJ x!x'-
F-L r-rr
: a't itr.,-r'F
-.2: i
: ]:-:-ni
:a--t
c's
Devi ce
T-e:-a:S-li!:erl,:eceiverisslungovertheshoulder;theperipheralequipment
belt. Further there are a
ilC cc:,,,=:--er a:.C bat--ery case) are worn oninathe
hand and worn on the head'
carpied
ire
*nich
r:cr::rcn:.ra
r^espe:ti ve l1r.
3=ceJSe
e: q' I
ver
'.,i
r-'
=urphon"
shape. the radio adapfs well to t'he body contours and can
ccvered (camouflaged) with outer garments'
cf its
be
i+- can pract.ically not be"intercepted since this would require positioning
receiver.
between the two communicators and the avaiiability of a gigahertz
29
30
'-r,t ra-l.ei
of I i
fr
s o'orfi a m'i crophone and earPhone' A ray
aPerture a-it' er +th at exiis the device through 3n
i n thi s openi ng so
o
n rarei g-i ass i s i nserted
n 'i nf
n
1 i ght compol gnts
e,
i nvi s'i bl
n(9't f or human
'y'rel
lyv) 1 oong
"y.r
rf- f requencyof-thedecimcterwaveradioliesin
caar'r'i eer
.h e c
wave is used in
+ he
olu corllrsid
er'ab1y shorteri nfrared 119ht
S 1 de
the microvia
t
ray of iisht
;hiris
:d oInr th
a t'9;ed
rti:i on
o r)
rl aL
ghi
<1(
1S'
IS
c1 NS
rni'it +,e
SN
alNS:
5'
e
e
a
-iii"Jtiur"l
to
,a
same
--er=:e.ive!^isanopticaldevjcewhichcanspecifical.ly'.capture'.thelight
this purpose'
utu particuiarly''.r:ll"l:Td^for
Uito"'iu"'
-1.s. lareras
-l-.'..*-,lr-....ru"" ;;;;;;; i,-'o'nt"a
una
"*,:1",:*llildli*.:f:ii"r::1il",
o.yi::-ti':
t,;::n;'.1:'!o{;i'l?'"li
iF'"t"i"".
on the-qualitv of the rece'iver:
defendent
ulYl{:
i:
range
The
';i.;:=,::
'i::he earphone.
lino"'lurt.oiteiephoto lens)'
i.r can be up to Z km with-good opt'ics tp"."iiiii
j::qr;, i::"lii1}ft
ll:"i::;::, ::.?: "?:':
,j f lLirultk]ru#:liffiiiwhi c
--ra-"i w'i t:'. an apprcpri ate . recei ver
pre:k'i :9 c:f '-:e transnr ss icn'
J*J
31
il
F
i
I
t
\
I
t1
on
3-=S Cf theSe rni n i atu re transrni tters cr I i sten i ng dev i ces are
t3*'erf:l and in some cases no larger than a smalJ pea. They can be
'"'3rywhere and are al most never detected.
^
4!.i
l--
\F
'-v9tgv
l::i :-,:es
;:e iii::-Spv:
is
instajlation is
unpr
ofitable.
Room s
4.
ceiling, walls, and floor foi poss'i ble changes such as srnall drjll
holes, needl e pri cks, and the I i ke " l4ove al I f urni ture away from the
walls for this purpose.
Check
Check
Tilt
6.
Carefu 1 1 y
for wires
or
heavy
connected
furniture
to or
to s I i ts
a'i d of a thin rod.
attent i on
31
B3
't
dll
,1
^.^rc
tl <c \ni
\;
a-F^3a
r/v
VV
l.i
-'l
ds
- ulil
metdl
, or
pl asfi
c for
I oos e
rvv9l
s'i
LJt
:r.
r('^
.
rV
lr^
!:
and
c:.--.
t
il . el=,ttl^-.cal cc-:ec::cns, c.,itlets, iamps i rad i os and TV s, s peakerS,
an3 c--'i3- 3 e:!-: : a , i' Eechal,: cal dev'i ces tl:at can not be removed f rom
the :c3rii t:.' ::-t-.:Ei^.--i al i:;eeti n3s are t'o be checked for recogn i zabl e
cha-ce<. cr ac:i--i:, -s. :f the ievices are opened, fhe power suPPl Y cord
ir,usf firs-- :e r^e:3,' C t*o: lhe receptacle.
\r,
J5,
rt-.
Telephci^,e
expc
'l
6.
17.
:V-
ec
l:nes are :J
De ches(ed
lor
changes
ils
Check
F
r
pur^pose, and
a-,d
Cocrs
trace itS
for
wires
nllnF^!<A
;'Zlf l vV-)bl
Check
pes
18.
19.
Check decorat'i ve
20.
of
Ispp:,!an_!j.
presence
If concealed objects, installations, or any incj'ications of the'inspection
have
technical
a
immediateiy
found,
are
devices
of listen'ing
performed.
32
33
lreParqlt
oq
Pbotoqraph v
Photographi
nhairrrati
s: yilv
In order tc be abl e to
explciiec b5' agerts I
photograph cl andesti
acllv.
ne'l
y,
es
with u c11et"u.,Y:ilg
.lltl'l1arv
lens; the "MINoX" has a
X;i:lj:_i;f#ii.u',"..t,-il
'"i"J-=c-mount ir i-i6t"bnoto
the camera, o"!l ^9
;:;";;.i *li.i I '
-tl:-:t:l:: :l.IT: th"
ti'"ougf .tn:.bi1o911iit.:h::^l:]::ll?.
;Ji;;l,t,l-.';."'.;'."= "-piiir"..roi.
opti"l]]Y i:::
Dista^,t
P:c--cgr
ur
wPe
L-Li-l
:;::.i'."'i.
!L^
-in
o'.."r:"i'"g-""1v
st'il1
itit-*unnut. details are ::-ll
-:?i;"1 i.r.tn;--."i;-;:
at great distai'':es.
7.
^f
h.ina-
tT:::iill{
recosn'izable
on
I: orCer^ to keep f rom attract'i ng attent'iphotothen
and
camera
tlg
age
fj
camcu
wh.i je phctograPhi rg' an age:: can
i f s "cinouf l aged ni di ng..P1199::'
graph the i t,en wi t,'l'' i^e 3arera t r^or,'-i'ESSI.,lA" in a uruijet, the "R0B0T" in a
r
ihe
bee'
ar':
Di s ccvered so f ar
in the
briefcase, the "i'ill.Ci: " in ar. ui:,3rella, i:r 3 cigareLte CaSe' or
;i:;;:"illit=or"a
;';=#;"[il^ii""r*li
il"1;;;; .ung"-;t
3.
^^,,1--
through a perforation
Fhctograpr-,-u'cal'ua<e-clace .^-i--nl*cirla
--^
outside
ngs are
cpeni
S:
nce
'-ne
iu.i'ot""t-"p='.,,
. J ^!^^
an
f
as
-stop'
a:iiv
inp
i
i.3lv
carera.
the
su'tt.
"s.
l'inits
""ti lech:clc;y
be as small in size
clandest.in. p1F6srupnr. Since the car.:e:a:s toformal
is likewise
prcture
'.he
purposa=),
iao,ortiase
;.;;;bi. (ioi
'fn o"J"i-to
the
evaluation.
optimun
for
6Utain'phc'"cgraphs
of
;;
"*ri-t*uff. (in th".ur" of fine-gi'a',n illn)'rery bright light or a readditional
"ilit-r""Oi
1at.ive1y tons e*poiure timei hovreier, thrs usualiy requires
are almost
conditions
or the ,se ot-u-trlpod for the camera. These
frequentlv trv
asents
;il!; i""iliUi"'t.i ir..'" rvirkplace) and therefore,
'it there, "in
photograph
to
able
to take the material home in'ordcr io-u"met:iod was developed which
makes
For this purpose, a
;;";;^;.i"iri"ii.
a
to
etc')
reports,
drawings,
Ooiu*"i.rts'(p1ans,
it possible to reduc"
lamOs
l4icrofi
Between
usi ng
Im
Produc!-ion
the
tri
ed
came
rd
create
to
rf
"mi ni -photos"
was J oaded wi th a
33
s4
,s::
3s a
;^tr
e:s-' :- f-':,dle
:-i:-.'r l,i'l
V'
,7^
!v
ch the agent. can produce real mi croi{e r^ c e\ e i oped by the GDR i ntel I i gence servi ces.
c
aneras
rvi
th
wh'i
::;CiC
'l
amp.
--'1
Cne chara3-,-Eli s:j: -s :3*-: : :C ?',: nrcrof-i ln cameras: they have fixed,en-:fh) ani no depth of fccus of any kind. All
focus (teFi:r3r',e-.i, ;,' se: f;:"
the
p'i ctures rust i:er^3fcr:, l! --.**i fri':t a i'istance of exactly 150 cm from
-','
photos
the
--'r3
cause
-r
lesS
C3:itrr,eters inore or
itern -"o be Phofogra:f,sl. :'
to be bl u rreC '
:-, cr^:f:lr',s i:' ihe size 1.4 x l.B rnm on
i:to a nagazi ne in the forrn of a narrolv
inse::ei
is
rvhich
filni
6-DlN special
strip. Twelve microfi ln rrages can be sv.P3se3 cn s uch a "fi lm stri p".
tYP e Inumber rnissing]. It
iTyp* 3_ is a considerable iniprovt'irr-; iveri: carera
+.oc
a 6-DI N speci al fi I
u
ses
i
is
sri-ialler^
)'et.
is easier to handJe and
r-he
co'i n). Fifteen images
1-lferrig
a
(
i
ze
cf
s
about
rounC
i
S
whi ch however,
,ll.
f
s
ihi
cn
are
exposed
mrn
1.5
1.?
x
size
of the
opmeni cf Ty Fe 3. Thre s ane film materiai is used
l,'Jv-fr-e 4'l i s a f urther devel 'i
n the f i ln i s quad:^ati c i n shape whereas it is
hold
center
except that the
"Typ*-{'
al
Agents were equ'i pped by the KGB (Soviet intel I i gence servi ce) with
'i
c ame ra for use i n photographi ng docurnents n the microfilm forrnat.
spec j al
The carnera
34
35
;,
T
El
r
q''
J
I
{rl
' {/ll
X
.ml.
. ,-1"
3l
.rl
l
It
i{
t
F
t,
J
0.)
4J
dO'
a)&.
*r-,
o
L
L
(J
o-a
L=
o-&
r?-
ll
=il
ull
ad
:llil
OJ
'
-If,
rr5
+)
'a
N
r-O
(,s
()
_ .rl
'Fl
"lol
(JI
\'r
H ti'!
f-T
16
ol
L
JL
a(ll
tA -o
cll
,rnr ll
.Bl
-'gl E
t]-
-rl
)-'l
cJ
0)
,{rl -y
In
Llo
()l
t+-l
.-Fl
gg..
ll
'F
-l aO
g LtLI
Ot 'r 'rul E Ir^l o:l
ol cd o-
3S
ro om
u{
L:f
o
sl
()L
.rl
3/1
tt1
co
fFJ
co
-C
{rl
3
cl
t,.
EL
oo.o. 5
-C
urs L
OI
&
UI
ul
<t
=l
'1* N
BG)
1(' q)
L}
OF
'$
{J
rO
>
r
o
L
..iLr
!t-
E(l)
(d
(fl
zo
t
rt
.'54
El
.9l
rr-rl
,VI
(o
.f
te E
.nl Etn
c.fl E <ll ol
ti _Ia*i
'r o
'-i !P
r+l 7f
Pl
1gi -.r n O
g{ (-l
orl FP n
+) ,E
z:
9l
CO
'F
{,
>.S
ii'= 'r r*
-l-(5
tF r'1- (9
C
gl
rtt'
tBi
EI
'3(l)
\'
ut-ao
r
=,' E
=l
Ol i?
o
.nl
lot-
\-cl
\01
\
EI
7i
0Jl
(I
D_l
4.:ll
'lJ 'r
=
rFl
'a
..
Ji c{o
t* +)
L'r
ooo
lOL
f.
(9
!4
t,
ol
(eI
-
l
|
o)l
t)
Q) 't'- t'l Vt
c-o C{u
(dE 'r CO
g-c
rF O.'t-= rF -c
+J(fE 'r*J
tUr- O E'lE (tr 3
-fooE .fttl
(.D(J<
-e--*-e
$:r
3 ,\"
#j
*'r
,
JgV'r
t--.:-:::--
;\{
*t
r\*
YJ
-,- 3-
a>7
\-\r'
I v
;\
t'tv
raF^-,,^
vv:Jv:
rI
I suLr\,\-s
lf
E>);>=
ir>
ft,
T
-:
f.-l
mi
-AF
vv!9
: fr -.j
U J
?f ='-
vl'\-rho
:
-.:
'v
^z^
tg>v
:rp3'ss'.:.e
--'?
I
L,
nca .i -=c
I
UVU
Vv
::
:
in crder --3 :
i or
.e^'^'-'
.'--1.
__dt=:
vt
vi
-.n3,
'
'J
\trlvf
eUe
ri
.
'vi
^rr\e/^n,no
vJV\rr'/\-
where
it is located; i!
Because
Desp'i
and. t h erefore
agg nt, himsel f ;
t^re
:': : -ce= Dit
-:c3'.',e i: :',:t nust know exactl
^'i^:l9r-
--e
tc
l-
s'_.i:3r-
-i-r'agSDSCtS.
Conta'i ner^s
1.
2,
3.
;ar^9on):
'lagec
camouf
36
f:
Type i
l-
Aciual
2=
Carnera housi ng
Lens
Sl i
l{=
I
I
de shutter
Fi'l m
f4'i
transport lever
nox
film
spool
__Ic
Typ.
(-i
I nsertabl e Fi I rn
;a= Exposed Fi lm
)o= Unexposed Fi I m
5
t-
.a
l.-
g-
Came
14ag
ra
4 = l,ling-nut
retai ner
atr
az 'i n e
7c= Fi 1m package
Type
1 = Camera
2 = Magazitre
3 = Knurled screw knob
4 = Pressu re s pri ng
5 E Connector for tri
f
a
sc rew
.6 E Shutter sl'i de
-;
-l
it
ii
'n
tlil
ii
ii
Special
r\
Can'rera
Brii
in Cigarette
Case
,.li
9'r;
T'
1 = Fi lm cassette
2 =Refai ner arm for
7 =Battery ccnrPartmenl
I+ =['l ect,rical suppiy cab]e
, =Pri sm mi rrcrs
5 =Sreciai LomP
!'
/1O
Roller
.9b
9a
10
411
ta
Di
rection of
= Case Closure
Fi lm counter
= Lever for Device
Mov
l4ov ement
ement
'\
\\
I r."'
-- ^,.'1-t\*
*,.
l'It I
ll
i\
,1.
1\
I L"
--.itl- .)
39
s*
tr
&;
t:- ----
4S
bQu
(t
'
Type
Carnera
iE!
?E
Hag az
i ne
Retaining
l,
?-I
I
I
t
I
--
I
I
I
1o
E!
Arm
Shutter slide
t'.
Remote cab'le
5=
Reta i n i
cabl
(connected) '.
nq screw for
e held
'
rernoLe
? ri Lens
B H Light shaft (top view)
I s Fllu
1O s Tripod mounti ng threads
40
4i
{.
or Storage Place: used to descrrbe locations at which intel I imaterial and devices are placed in order to store them for
i a;et use or io protect them from detection but sti11 provide ready
Cache
AA
I
H
:\'"v\'l
to
ACCESS
them
(false identity
CCC3S,
If intelligence material is to be transa secret hid'ing place which has been in,
c in a conlainer (suitcase. bag, case). The delineations
r: 2 and 3 are not absolute. Thus, for examp'l e, a compartment
a ''coniainer" located in the apartmeni of an agent can serve
\ cache cr can be used as a means of transportation or shipment.
t^
\atP
r^,^\
-^_Cr_r^rC=
r^F-t'l^
, il \
( lij
vJ'J
-,gence
i^*^-I
ll,
tr''3^
:al (te:iLnical )
Safeguards:
H,
b)
\-
.l
'Y
: L.r'
-'v
t-X-\
rr
ves prc-ue ct,-i i,; --he i ,:, 3 pl ace i'y l'reans of a t'tri ck"
designed to prevent c^scc"'cri, ; --rre c3rcel'l relt. cr the manner Of
opening. Bul perhaps il shcul: ass-r:e'-hat ther^e is not even any
suspicion crea'ueC rn tne fir s: p.a:: (e,9. use cf a ivater-tight container in a sewage pit; a fer:ale em:lc;'ee cf a government. office
carried prophy'l act'i cs anc syn:ne'i-ic bra inserts with her in her purse
in order to elicit feelings cf chance among the checkpo'int personnel;
or the musical clock r+i'uh the secret compartment - it plays during the
entire time of the search and "causes nervousnesst'; the bottom or the
top of a can are provided with left-hand threads and the more an
attempt'is made to open it by rirning to the'left, the more the ljd
is t'ightened). 0f course, a concealment can a'lso be safeguarded per
a) and b).
Th
i s i nvcl
'i-'
41
A+
-(i
la
if it
A container can be installed in any object! Each device into which a conta'iner has been insta]1ed, must in any case be able to be used in the same
manner as an unprepared device. The item in which a secret h.id.ing place
is located may never deviate from the original in terms of size, we-ight,
and appearance,
A prescript'ion for how to find "something" or where one has to look and
"how" to 'look cannot be provided. Often the "knowledge" of the ttwhat" and
"how" of opposition intell'igence services is already oF netp'in eliminating
or-.lessening the avers-ion of investigat'ing officials to the investigation
Isiened]
(1^lerth) Chief
Detecti ve Superi ntendent
42
rf:
ilq