NOTICES:



A WARNING: Those site visitors of Aboriginal and Torres Straight Islander Culture should be aware that there are photographs and images of the deceased.


AFIO DISCLAIMER:
The author of this blog is a member of the Association of Former Intelligence Officers and as such the views and opinions expressed here are those of the author and do not represent the views and opinions of the Association of Former Intelligence Officers, its staff or Directors.

Learn more about the Association including membership requirements at www.afio.com.


The Somerton Man Case. The body of a man found on an Australian beach close to a major Atomic Testing ground, he was probably poisoned, a copy of the Rubaiyat of Omar Khayyam and an unbroken Code page found and associated to him. Set against a Cold War background in 1948, was this man a spy? We think so and this blog focuses on the evidence that was left behind and in some cases missed, the Code page, Dry Cleaning numbers, A Poem and a small, torn piece of paper bearing the words TAMAM SHUD.

Friday, 12 February 2016

THE DARK ART OF CONCEALMENT!


Concealment Methods

The Music Code



 As a short break to the Somerton Man posts, I thought it might be useful to share with the audience, (7500 this month! Terrific!) some of the tools and techniques used in 'tradecraft'.

For those who are aware of the term please bear with me whilst I provide a brief description. Tradecraft is an assembly of all known techniques, methods and equipment in common use by the espionage fraternity. In recent times the Director of the CIA Museum at Langley, Virginia, Toni Hiley stated that 'There is no method or technique too old not to be considered for use in today's world of espionage'.

And old it most certainly is. Since time immemorial, people have found ways to conceal messages. In fact not only messages but other items including explosives and weapons. Disguise might be a better word.

The first known examples go back to 3500 BC and the tiny Cuneiform tablets that the Mesopotamians used as a message carrier, they inscribed their messages on to the small square shaped clay pieces that would fit in the palm of your hand and pass them around. It didn't take long apparently before they realised they could melt wax over the tablet and thus hide their messages.

I digress, this post is about a particular concealment method, the one you see in the image at the top of the page. A Music Code. You have probably heard of audible music codes, the most famous of which would be Beethoven's 5th Symphony which was one of the coded messages alerting the French that the invasion was imminent. There are other examples where notes were altered or different instruments were used, this one as you see makes use of sheet music but written to conceal messages. It came from WW1 and was in use by German intelligence services who were also the first to hide messages in dress patterns. This music code is self explanatory, particular notes can be directly interpreted into letters. Consider what they did, they used an every day piece of sheet music, they found a simple way to convert musical notes to letters and passed the messages on either audibly or in sheet music. Now think about how the message would be known to the recipient, it would have no meaning unless you were aware of how to decode it especially if it had been double encoded.

Where it can become complex is when the code, when deciphered, produces a string of a jumble of letters which seem to make no sense. In fact I recall not that long ago when I shared an Alice Dubois method of hidden micro written code behind a postage stamp with young Nick Pelling. The code was a pig pen code which at the time it was written, WW1, was state of the art. Not so now of course. Well young Nick had a look at it and said that it was just a string of letters when deciphered. May be so but even in those days they would double encrypt their messages so the string of letters could well have been another layer of code. A trap for the inexperienced and a good lesson.

In this game of espionage you have to think outside the 9 dots and nothing is ever as it seems

There are many more most interesting examples of sending hidden or clandestine messages and I will post more in the coming weeks.

Amongst them will be the use of a harmless empty can of beans, the dear old lady sitting gazing out of her window across a railway marshalling yard and leaning on her walking stick, the identity card and its photograph and many more. The common thread is that all the messages and communications were hidden in plain sight and all made use of everyday items.

I hope you enjoyed this first post on this topic, your thoughts, ideas, opinions and questions are very welcome so please submit a comment!







No comments:

Post a Comment