...A TRIPLE AGENT STORY...
...The video below is a documentary that focuses on some of the incidents that occurred during WW2 in which both the British SIS (MI6) and SOE were involved...
The video tells not only of some of the operations but some of the techniques employed by both sides. Most interestingly though is the conflict between SIS (MI6) and the newly formed SOE. These things did happen and inter Directorate rivalry was a real and very dangerous thing.
I won't spoil it by going into detail! Watch the video and what you see may just surprise you..
Great video, saw it a while back. Amazing the tricks they got up to.
ReplyDeleteYes it certainly reveals some less savoury aspects of the relationship between the two services an their shortcomings. The 1958 interview with Buckmaster was an eye opener, There’s also a discussion on confirmation and distress codes in messages ‘…in hospital’ for example.
ReplyDeleteTibor Kaldor used a duress code in his letter, ‘DANETTA’, it was in a few other docs as well from memory.
ReplyDeletePete. A gift for you. How would you train an operative in the use of a duress code if you didn’t put it in the manual? That book has a far bigger secret than that. I wish you well.
ReplyDeleteSeems that Google is having issues with gmail and drive plus ongoing challenges with blogspot blogs defaulting to anonymous. It’s a known issue sometimes but not always related to ipad, iPhones and Macs and various browsers and third party cookies. Apologies to the recent commenters but can’t be helped at the moment.
ReplyDeleteOn the privacy side, blogspot blogs are not able to track your location or IP addresses unlike Wordpress and similar sites.
One more gift for Pete. A = 1, B = 2, C = 3, D = 4. Get the picture yet? Every letter of the alphabet has a corresponding number. If this sounds too simple Leo Marks is the man that invented it, it was part of his version of the poem code. He made up the poems as well. Professor Abbott missed it, Pelling missed it as well. So, off you go and make a name for yourself. See if you can find a poem that fits the numbers. By my reckoning the first letter is an M and the last is an R. It’s not as simple as it look, there’s a lot more to it.There could be a shift in it for example.
ReplyDeleteTrue story apparently. In Leo Marks's book, he describes how he had notified his boss that the deliberate 'mistake' included in radio operators messages had been corrected in a number of transmissions from a Dutch network. Seems the alert was dismissed. Not quite sure whether that was the Prosper network? They fell over due to radio operators being tracked and arrested.
ReplyDeleteOn CM, PB has offered to edit your book.
ReplyDeleteThat's kind of him, but sadly I already have that being done by an expert, in fact there will be two of them shortly. But thanks for the offer PB.
ReplyDeleteMy main pondering is whether the TS code was, the SOE encoding method invented by George Adams or the NKVD encoding method invented as used by the Rote network? Then therefore did Hemblys-Scales misidentify it and thus subsequently events led to a number of deaths because of that?
ReplyDeleteGood point. Alexander Foote was a radio operator with Rote Drei, it's known that he used the Nihilist cipher or rather an adaptation of it. That doesn't necessarily mean that he didn't use others. It appears that he may have overlaid the Morbit cipher on the torn slip. I think it was Malcolm Muggeridge who, after the war, said that Foote was always an MI6 man undercover. Hemblys Scales was MI5 I think, not MI6 (SIS) but relations between those two organisations were reasonable so he may have been in the know but then again it was a strange game that was playing out. Do you recall which known Soviet assassins were in Australia at the time of Goreloffs death two weeks before the eCafe conference?
ReplyDeleteI can't recall his name at the moment. I am hoping that decrypting some of this will throw enough light upon what the encoded messages were being used for and thus make it a bit clearer as to which side had more to lose if the program was compromised or allowed to continue
ReplyDelete