Alexander Foote - Handbook for Spies

Здесь есть возможность читать онлайн «Alexander Foote - Handbook for Spies» весь текст электронной книги совершенно бесплатно (целиком полную версию без сокращений). В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Город: N. Y., Год выпуска: 1949, ISBN: 1949, Издательство: DOUBLEDAY & COMPANY, INC., Жанр: military_history, История, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Handbook for Spies: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Handbook for Spies»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

Allan Alexander Foote (b. 13. April 1905, d. 1. August 1957) was a radio operator for a Soviet espionage ring in Switzerland during World War II. Foote was originally from Yorkshire in England, and had spent some time in Spain working for the Republican side during the Civil War in the 1930s. He decided to continue his efforts against Fascism (and, perhaps, for Communism) and volunteered for clandestine work with Red Orchestra. He was put into contact with Ursula Kuczynski in Switzerland. He became a radio operator for the Soviet espionage operation run by Alexander Radó and was one of those who passed information to Moscow from the Lucy spy ring run by Rudolf Roessler. Foote was one of those arrested when the Swiss police shut down most of the operation and was detained for a time.
After the War, he spent some time in the Eastern Bloc and then returned to the West and published his book, A Handbook for Spies. He died in the 1950s.
 Because of the implausible veracity of the intelligence (fast, plentiful, and accurate) and never explained source of the Lucy Ring's information, suspicion attaches to all those associated with it. Since Foote, as the Lucy Ring's radio operator was a central cog in the chain of supply and therefore in a position to know much, his subsequent account has been thought to be rather dubious in places. This and the fact that he seemingly managed to return to the West rather easily, has led some to suggest Foote was a British Secret Service double agent and one conduit (perhaps even the main one) of intelligence from Britain to Roessler and thence to Moscow.
 According to various sources, Foote was indeed a MI6 (SIS) double agent unbeknownst to Rado. After the destruction of Rado's network and his escape from Switzerland, Rado met Foote in Paris and both were ordered to return to Moscow immediately. They took off aboard a Russian military aeroplane on January 6, 1945, taking a circuitous route (due to the war being still in progress) via Egypt. Their plane landed to refuel in Cairo, where upon Rado defected. Continuing alone to Moscow, Foote was subjected to intensive interrogation in an attempt to determine his loyalty and the possibility of his being a penetration agent. Foote was confronted with an instance of disinformation sent from his transmitter in May 1942 and told "That message cost us 100 000 men at Kharkov and resulted in the Germans reaching Stalingrad." Foote said that he merely passed on what he received from Radó. Satisfied with Foote's explanation, the Soviets gave Foote a false identity under the alias of Major Granatov. Posing as a German, Albert Müller, he inserted himself into post war Berlin to establish this alias with the aim of being sent by Moscow Centre to Argentina, to attempt to identify and infiltrate groups of escaped high ranking Nazis.
 Journalist, broadcaster and author Malcolm Muggeridge, himself a wartime MI6 officer, "got to know Foote after the war" (pp 207-08) when Foote paid Muggeridge "regular visits" at his flat near Regents Park, London. Foote at this time was working as a clerk in the Ministry of Agriculture and Fisheries, work he found, according to Muggeridge, "very tedious". Muggeridge is firmly of the opinion that the information Foote sent "could only, in fact, have come from Bletchley"
 In March 1947, following the defection of a Soviet agent who had been involved with British Intelligence, Foote's allegiance to the British may have been confirmed. Foote himself defected from his Russian control in Berlin, escaping to the British sector.

Handbook for Spies — читать онлайн бесплатно полную книгу (весь текст) целиком

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Handbook for Spies», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Secondly, though the organisation may break down on occasion, the system on which the various networks are run and the security regulations that are enforced on all members make the Russian network as safe as any from penetration by agents or action by counterespionage authorities. The failure of the Swiss network was due to lack of security precautions in Switzerland and the insistence of Moscow that it should keep running against their own security rules. A network in peacetime, carefully built up, is likely to continue to work efficiently and undiscovered. The Canadian organisation, hurriedly and badly organised as it was, was uncovered only by accident, and defectors like Gouzenko are few and far between.

The obvious and important question is whether there is a Russian spy net at work in England and America at the present moment. On that point I have no factual evidence and if I had I obviously could not give it here. On the other hand it would be safe to say that the odds are definitely in favour of networks existing both in England and the United States. I should imagine that the director has managed by now to rebuild his organisation in the States, which had gone underground at the time of the Canadian affair, and also has set up several new networks, though perhaps my defection has reduced their number by one. As regards England there was obviously some sort of organisation in existence there before the war, because I was recruited by it. I should imagine that it had now been revived and working again. If the Soviet espionage rules are being observed one would imagine that it was being directed from abroad and that the resident director for the English network was probably in France or Belgium. That there is a network busily engaged in Europe is obvious. If anyone disbelieves me all he has to do is tune his wireless in to the short-wave band. He may not be able to recognise, but I can, the characteristics of a Russian secret transmitter and the characteristics of their control stations. I often tune in and listen to the meaningless dots and dashes and wonder which network is on the air and whether it perhaps contains some of my old colleagues.

As regards my colleagues I think it unlikely that many of them are active. Rado is dead, his wife probably still in Paris unless she has been lured back; Cissie discredited; Sonia in retirement. But Lucy may have moved and be exercising his undoubted talents in some new field, and some of the other agents, known to me only by cover names, may still be engaged in the same work. The Centre is not idle and the new espionage school at Sehjodnya is unlikely to be empty. Time alone will show the effectiveness and extent of the new networks. I can only hope that the time may never come.

APPENDIX A. Notes on my W/T Code with Moscow

The process of enciphering messages for the Centre was divided into two parts. The first stage is comparatively simple and can easily be carried in the head, and, as I have stated, I frequently made notes in this First Stage Cipher for ease and convenience. The second stage involves the "closing" of the first simple encipherment against the text of a code book. (In this case, a "code book" is any ordinary published book that may be selected.)

The first stage of encipherment is based on a key word, which must have six letters and which is changed at intervals by the Centre. In the example to follow the key word is PLAYER. This is written out horizontally, and below it- in line- the remainder of the alphabet is written out (in the case of PLAYER in groups of six) together with a symbol for "signal" (@) and Full Stop. "Signal" means that the message changes over from letters to numbers.

At this stage the "pattern" looks like this:

It is now necessary to assign a number to each letter and for this purpose the - фото 5

It is now necessary to assign a number to each letter, and for this purpose the numbers 1-9, 00-09, and 40-49 are used. (In the first set of numbers the figure 4 is omitted as it would lead to confusion with the double numbers beginning with 40.)

Those letters which are changed into single figures (1-9) are ASINTOER (arranged in this order for mnemonic purposes), the numbers being assigned to the relevant letters as they occur reading vertically and starting in the top left-hand corner of the diagram. With these numbers in place, the diagram now looks as follows:

To this pattern are now added the double numbers 0009 4049 starting from - фото 6

To this pattern are now added the double numbers (00-09, 40-49), starting from the top left corner and going down the columns consecutively filling in the blanks.

With all the numbers inserted, the diagram now looks like this:

This pattern is of course changed occasionally by the Centre by allocating a - фото 7

(This pattern is, of course, changed occasionally by the Centre by allocating a different "mnemonic" or by changing the code word, or both.)

A message enciphered in the first stage would look like this. (After a change from words to numerals, indicated by the symbol "signal," the numerals are each repeated three times.)

These figures are then split up into fivefigure groups the third and - фото 8

These figures are then split up into five-figure groups, the third and antepenultimate groups being left blank to take "recognition groups." At this stage the message begins to look like a ciphered message, but is still by no means secure and would present no difficulties to a cryptographer. Here it is with the blanks left for the recognition groups and the last group made up with noughts to complete a five-figure group.

At this point the first stage of encipherment is complete It is now necessary - фото 9

At this point the first stage of encipherment is complete. It is now necessary to "close" the message by re-enciphering it against the selected portion of the "code book." In practice, I used a Swiss book of trade statistics, but not having that by me now, I think it might be appropriate to take a passage at random from the report of the Royal Commission on the Canadian spy case.

On page 77, line 14, is the following phrase: "that even if the adherent or member should refuse to engage in activities so clearly illegal and which constitute so clear a betrayal of his or her country."

The enciphering phrase can be taken from anywhere in the book, starting at any word in any line. In this case it starts at the fourth word of the line, i.e., "that."

From here on the key phrase is enciphered in exactly the same way as was the original message, and written out in five-figure groups, leaving here also the third and antepenultimate groups blank, as below:

These groups are then added to the groups of the original ciphered message the - фото 10

These groups are then added to the groups of the original ciphered message, the tens being ignored, and the final result is this:

Now the message is complete save for the two recognition groups which enable - фото 11

Now the message is complete save for the two recognition groups which enable the recipient to decipher the message. These are made up- in different ways - from the "code book group," the "fixed group," and the "message group."

The code book group is composed of the page number, line number, and word number of the key phrase. In this case, page 77, line 14, and word (from left) 4-77144.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Handbook for Spies»

Представляем Вашему вниманию похожие книги на «Handbook for Spies» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Handbook for Spies»

Обсуждение, отзывы о книге «Handbook for Spies» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x