Most of the exercises took place in Portsmouth and we took turns playing the roles of officer or agent. The `officer' found a suitable brush-contact site and then, back at the Fort, wrote instructions for the `agent' on its location. We were usually under surveillance from teams from MI5, the Portsmouth SB, Customs and Excise, or the army Intelligence Corps, so we would have to `dry-clean' before attempting the brush - sometimes identifying the surveillance, sometimes not. On one exercise, it was Spencer's turn to play the agent and I carefully planned a brush contact with him on the back stairs coming down from the public library in Portsmouth town hall. I spotted surveillance on my way to the library, but calculating that they would not follow me closely enough on the deserted stairs to see the brush contact, I did not abort. However, instead of the usual film canister or brown envelope, Spencer handed me an extravagant ice-cream, complete with chocolate flake, just before I emerged from the stairs into the street below, on a cold December's day. The surveillance team noted my bizarre acquisition and reported it to the DS.
Every evening after a day of lectures or foot-slogging around Portsmouth practising our anti-surveillance skills, we listened to a lecture from a guest speaker, usually a member of the service, who would describe a real-life operation in which they had taken part so that we could see how our new skills could be applied. One evening, Ball announced that we had a special guest who should be treated with the utmost respect. Oleg Gordievsky, the so-called `jewel in the crown' of MI6's Russian defectors, told us the story of his defection to Britain, as he does to every IONEC, providing a dramatic account of tradecraft in action.
Gordievsky first made contact with MI6 in 1974 while working as a KGB officer in Copenhagen under cover as the press attach‚ in the Russian embassy. He was cultivated over a series of badminton games and was eventually recruited by Colin Figures, who later became Chief. For the next 11 years Gordievsky provided MI6 with a treasure trove of information from the heart of the KGB. Gordievsky was run with such secrecy that only a handful of officers knew of his existence and, rather than risk widening the indoctrination circle, many non-indoctrinated officers were allowed to pursue futile operations which were known from Gordievsky to be compromised. But despite the care taken to keep his existence secret, it was inevitable that Gordievsky would eventually fall under suspicion from his masters in Moscow. During a period of home leave, he was arrested and interrogated. He was eventually released, but was suspended from work and his passport confiscated while the KGB conducted further enquiries. He managed to get word of his plight to the station in Moscow, where a mid-career officer, the Honourable Raymond Horner, was the number two. Every station has on its standing orders at least one plan for exfiltration of defectors in such emergencies. The exfiltration plan in Moscow was to smuggle the agent over the Russian border into neutral Finland. A route from Moscow had already been reconnoitred, and Horner had a Saab 90 as his official car, which in 1985 was the only car with a large enough boot to comfortably hold a grown man. This upmarket foreign car had caused some resentment amongst Horner's FCO colleagues, as they were forced to drive inferior British models and assumed that the Honourable Horner had been exempted from this rule because he held a title. Every evening Gordievsky took a stroll in Gorky Park, followed closely by his round-the-clock surveillance team. Horner identified a patch of dead ground where Gordievsky would be momentarily out of sight of his followers, meaning the pickup had to be made with split second precision, and spent the day driving around Moscow ostensibly on `errands', in reality doing thorough anti-surveillance. With military precision, he arrived at the designated spot at exactly the same time as Gordievsky, who leaped into the Saab's capacious boot, under the soon-to-be-disjointed noses of his surveillance. Horner drove out of Moscow and started the long and nerve-jangling ride to the Finnish border. Horner could not be sure that his car was not bugged, so dared not communicate with his hidden passenger. Even when over the border, it was too risky to speak out, though he must have been stifling a shout of jubilation. To let his passenger know he was safe, he played Gordievsky's favourite piece of music over the car stereo. To this day, Gordievsky is referred to in MI6 by the code name OVATION, a reference to this piece of music.
Another common tradecraft technique we learned was the `dead letter box' or DLB. This technique involves clandestinely hiding a message where it can later be picked up by the other party. Usually the message is put in a small container such as a film canister and the hiding spot is chosen so that it can be posted or cleared even when under surveillance. DLB sites are much easier to find than brush contact sites - and we were expected to find one in less than an hour in an unfamiliar environment - behind a loose brick in a wall, in an old tree stump, tucked into a crevice of a prominent rock. The disadvantage of DLBs is that they are occasionally discovered accidentally by the public - usually by small children - who may inform the local police. It is thus risky clearing a DLB, as the opposition may be lying in wait.
I got my revenge on Spencer a few days later on a DLB exercise. In Winchester Cathedral there is a small statue of St Jude next to the fourth pew from the back on the west wall. Sitting in the pew, on the pretence of praying or meditating, it is possible for one to grope round the back of the legs of the statue without being observed. I chose it as a DLB site, but instead of a film canister I left a loaded mouse-trap for him. Poor Hare fared even worse. Against Ball's advice, Barking loaded a DLB for him in the toilet cistern of the gents in the Mr Pickwick pub in Portsmouth. The cistern was set high on the wall and Hare had to climb up on the toilet seat to reach it. Unfortunately, the gentleman in the next door cubicle took exception to Hare's activities and, in a rage, called the police. Hare was interviewed and, unable to explain the truth, he was forced to admit to cottaging and was fortunate to be let off with only a caution.
The requirement for these old-fashioned tradecraft skills is not as great for the modern spy as in the days of the Cold War. These days, electronics and computers have simplified agent communications and it is often easier to communicate with encrypted e-mail. Traditional tradecraft was emphasised on our course partly because Ball was an enthusiast and deeply inured with the techniques, but partly because the discipline and nerve required to plan and execute such operations was greater than simply clicking the `send' button on a computer, instilling better tradecraft discipline. Practising these old-fashioned techniques was also better for morale and team-bonding than sitting in front of a computer screen, and we thoroughly enjoyed the exercises. One exception, however, was Martin Richards, the eldest student on the course. A quiet, academic man, he found the exercises rather silly. One afternoon, he failed to return to the Fort and eventually rang the DS to say that he could go on no longer. He was forced to resign from MI6 and they resettled him with Shell Oil, his old company.
Secret Writing (SW), the grown-ups' term for schoolboys' `invisible ink', still plays a role in spying, but modern techniques are more sophisticated than the lemon-juice-in-a-fountain-pen familiar from Boys' Own magazine. There is a three-man joint MI5/MI6 section known as TS/SW which is responsible for research and training in the latest SW techniques. TS/SW has several different SW techniques, but the method we were taught on the IONEC and which is used ubiquitously by MI6 oficers in the field is the miraculously simple `offset' method. Like many great inventions, it was discovered by accident.
The problem with early invisible inks was that the writer could not see what he had just written. A visible ink which faded shortly after it dried was developed but that was not perfect because the indentation made by the pen could be detected and the possession of the peculiar ink itself could be compromising.
The solution came one day in the mid-1980s, when a TS/SW technician was developing a conventional SW message sent by an agent in Russia. The secret message had been written on the back of an envelope with an innocuous `cover' letter inside and posted from Moscow. As the technician swabbed the back of the envelope with developing fluid, as expected t
he secret message began to emerge. But to his surprise, other writing - in a different hand and mirror-written - also started to develop. Close inspection of the writing showed that it was an address in Kiev. But who was the addressee and how had it appeared over the top of the message?
There was only one logical explanation for the mysterious writing. When the agent posted his letter, the back of the envelope must have fallen to rest in the postbox on top of another envelope. That envelope must have been addressed with an ink which possessed the property of transferring an invisible chemical to paper in contact with it. The technician realised that the Kiev address must have been written with a commercially available pen. If that pen could be identified, it would be a superbly elegant, simple and deniable SW implement. MI6 mounted a systematic worldwide search for the magic pen and every MI6 station was asked to send a secretary to the local stationery store to buy every make available. TS/SW were soon at work testing them. Each was used to write a few characters, a piece of paper was pressed over the top, then swabbed with developer. It took many weeks to identify the magic pen - the Pentel rollerball. The `offset' technique has the dual advantages that the agent or officer can see what he is writing before taking the offset copy and because the pen is commercially available it is deniable and uncompromising. Offset is now used routinely by MI6 officers in the field for writing up intelligence notes after debriefing agents. It is also issued to a few highly trusted agents, but is considered too secret to be shared even with liaison services such as the CIA.
Many other technical means are used for clandestine communication between agents, officers and Head Office. Development and issue of these systems was the responsibility of the section known as TOS/AC (Technical and Operations Support, Agent Comms). One morning they brought along their latest gadgets to demonstrate to us.
The essential feature of these gadgets is that they are non-compromising, that is, they are identical or virtually indistinguishable from commercially available equipment. PETTLE recorders were particularly ingenious. Any normal audio cassette has two tracks running parallel to each other, one for each `side' of the cassette. PETTLE recorders exploited the unused part of the magnetic tape which lies between the two strips. TOS/AC demonstrated an ordinary personal stereo which played and recorded on both sides of the tape like a standard machine. But turning it upside down tripped a microswitch so that pressing the `stop' and `record' buttons together made the machine record over the central track. Pressing `stop' and `play' together played back the recording. They also demonstrated modified laptop computers. The removable floppy discs used in ordinary computers have a hidden space which is just big enough to hide a simple word processing system and file retrieval system. Typing in a simple command at the DOS prompt started up the special word processor system, allowing notes to be secretly recorded. Exiting the software, the computer reverted to normal mode, leaving the secret files invisible even to an accomplished computer specialist.
We also learned how to use SRAC (Short Range Agent Communication). This system is only issued to long-established and highly trusted agents in countries such as Russia and South Africa. The agent writes a message on a laptop computer, then downloads it into the SRAC transmitter, a small box the size of a cigarette packet. The receiver is usually mounted in the British embassy and continually sends out a low-power interrogation signal. When the agent is close enough, in his car or on foot, his transmitter is triggered and transmits the message in a high-speed burst of VHF. The transmitter is disguised as an innocuous object and for many years `Garfield Cat' stuffed animals were popular as their sucker feet allowed the agent to stick the transmitter on the side window of his car, giving an extra clear signal as he drove past the embassy.
Photography is another important skill for an intelligence officer, whether to snap a surveillance shot of a target or to photograph secret documents. We were taught photography by an instructor from the service's technical support division, TOS/PH. He showed us how to take long-range snaps of targets using huge telephoto lenses and how to take clear close-ups of documents. MI6 uses commercially available photographic equipment where possible because anything specially made could be compromising. We did, however, practise with gadgets such as midget cameras and specially made collapsible document-copying cameras. Best fun, though, were the lessons on covert photography during which we secretly photographed members of the public with a variety of still and video cameras mounted in briefcases or shoulder bags. Back in an underground cellar below the Fort we were taught how to develop our shots as every overseas MI6 station has a darkroom which we were expected to know how to use.
Twice a week, we were given instruction in self-defence in the Fort's small gymnasium. Our instructor, Bill, was a former sergeant in the Royal Marines Special Boat Service who had also worked for a few years for the Las Vegas police force. Although only a little over five feet tall and dwarfed by all of us, he could put any of us on the floor or in an agonising thumb-lock within seconds. Over the weeks, we were taught how to judo-throw would-be attackers, fend off knife attacks, escape from headlocks and armlocks, and disarm a gunman. Self-defence is taught more for fun and morale building than for any real purpose - a traffic warden has more need of it than an MI6 officer and physical violence is never deliberately used. Bill could only recall one incident when a former student put the teaching into practice. A female officer was receiving unwanted attention from a drunken lout on a train during her evening commute. While the yob pestered her, the other male passengers buried their noses deeper into their newspapers. Eventually she could take no more and, just as Bill had taught her, she tightly rolled up her copy of The Economist and jabbed it into her assailant's eye, quickly silencing him.
We were also taught weapons-handling but, like self-defence, it was more for fun and fostering of team spirit than for any practical purpose. It was virtually unknown for MI6 officers to carry a weapon and no officer has ever used one in anger. Our instructor, Tom Nixon, a former sergeant in the Special Air Service, participated in the May 1980 Iranian Embassy siege at Prince's Gate. Under his expert supervision, we practised twice weekly at the outdoor range at the western edge of the Fort and in the small indoor range, modelled on the famous `killing house' range at the SAS barracks in Hereford. We mostly used the Browning 9mm pistol, standard issue to the British armed forces, but also trained on foreign weapons like the Israeli Uzi and German Heckler & Koch sub-machine guns.
The DS and lecturers taught us how to plan and mount bugging operations, even though this is not the job of the IB. TOS has about a hundred officers trained in the specialist skills to carry out these tasks: locksmiths, clandestine entry specialists, sound engineers, electricians. We just required an understanding of their skills and abilities. Ball gave us an exercise, PERFECT NEIGHBOUR, in which we had to plan such an operation. Briefing us on the scenario, Ball said to imagine that the IRA had acquired a `safe house' in Gosport, near the Fort, and that intelligence showed that the house was to be used to plan a bombing campaign. Over the next two weeks, we had to draw up a detailed portfolio of the house, its layout, its occupants and their movements, then make recommendations on how and when the house should be entered to place covert listening devices. All of us were given a different house to recce. These belonged to innocent members of the public. `Are there any restrictions on what we can do?' asked Hare at the end of the briefing.
`No - you can do whatever you want,' replied Ball. `Just don't get caught.'
That evening I borrowed a covert shoulder-bag mounted camera from the photographic laboratories and strolled round to my target, a medium-sized family home set in a small garden and fronting on Gomer Lane. To the rear was a small garden, backing on to the grounds of Stanley Park and Bay House School. Squeezing the bag to activate the Pentax SLR inside, I covertly photographed the house, shooting a roll of film which I developed that evening. The following morning, a visit to Gosport Town Hall on Walpole Road yielded a copy of the electoral roll, giving the n
ames and occupations of the occupants. Posing as an architectural student, I borrowed the plans of their house from the building regulations department on the fourth floor on the pretext that it was for a design project at the polytechnic. The clerk would not release photocopies but allowed me to study them in the waiting-room. As soon as he was out of sight, an SLR with close-up lenses was used to photographed them. Just as I finished, Castle walked in. He too had thought of the same ruse. He got away with it but Spencer, who turned up an hour or so later, was not so lucky. The clerk was by now wary of the rush of odd requests for plans of Fareham town houses. He called his superior, who refused to believe Spencer's protests that he was a builder's jobber.
Thereafter every spare half-hour from the classroom was spent observing the house to build up a detailed picture of the daily movements of the occupants. The best place for the listening device would be in the kitchen, where the family socialised. But more detailed information was needed. One evening I jogged round to the house and found that it was empty. This was my chance. After checking that nobody was watching, I climbed the fence bordering Stanley Park, scrambled through the shrubbery and up to the hedge at the back of the house. Nobody was at home next door either, so I scuttled the few metres of open ground into the cover of the lean-to at the back of the house, sending a startled cat shooting through my feet and under the windsurfer lying nearby. Crouching in the shadows for a few minutes, I listened for any sign of compromise. There was silence, so I stood up and peered through the kitchen window. After my eyes adjusted to the gloom, I sketched the kitchen layout in a notebook. Just as I turned to make my exit I noticed that the key had been left in the door. Recalling Ball's words - `just don't get caught' - I turned it and pushed the door open. My intrusion into a stranger's house was amoral and illegal but in the euphoria of the IONEC it seemed totally justified. Ball rewarded my efforts with full marks on the exercise.
The Big Breach Page 8