CLANDESTINE COMMUNICATIONS METHODS,
HOW IT WAS DONE
Well, some of it at least....
I have put this page on first for you Byron! The mention of Acetate of Lead would surely stir the blood!
On a serious note, it was common for cornered spies to dispose of any incriminating evidence by swallowing it, so with that in mind, in this post we will examine 3 documents each of which describe in good detail the hows, wheres and whys of hidden messages.
On a serious note, it was common for cornered spies to dispose of any incriminating evidence by swallowing it, so with that in mind, in this post we will examine 3 documents each of which describe in good detail the hows, wheres and whys of hidden messages.
These documents date back to 1911 at their earliest and they were formally released back in 2011, you will note that some of these techniques were in use through the 1970s. By default that means these tools were in use at the time of the Somerton Man.
Byron, this next image is much more your street than mine, it deals with German secret ink formulas.
And the image that follows talks of how secret messages could be recovered using photography. Those familiar with this blog will know that I have successfully used very similar techniques to uncover micro written code on the code page. Essentially, it requires that you use a combination of powerful lighting and numerous photographs taken at various angles.
In fact, that was the same technique used by the US Library of Congress to recover an altered word found in the Declaration of Independence. In that instance, they used a 33-megapixel digital camera with an array of LED lighting.
In fact, that was the same technique used by the US Library of Congress to recover an altered word found in the Declaration of Independence. In that instance, they used a 33-megapixel digital camera with an array of LED lighting.
LAST BUT NOT LEAST:
Some very old documents describe some actual cases, I'll post those next time.