Spies

Shoes with ears

In 60-70-s Western diplomats in Eastern Europe is not recommended to buy shoes in local stores. Going into any Torgsin could not buy ordinary shoes and shoes with the real ears. The heel is often hidden listening devices. Therefore, diplomats discharged their shoes in the mail from their native countries. This, in general, not particularly special services to prevent the Warsaw Pact. Here is the shoes, delivered diplomats from Britain, the Romanian specialists retrofitted file listening directly to the mail.

All these things are the exhibits of the International Museum of spyware.





Shooting lipstick

Classic spy gadget - a one-time gun at 4, 5-mm cartridge, disguised as a woman's lipstick. The shell is most often stuffed with cyanide. In the 60s such weapons were very common among the agents of different countries. This model once belonged to spies working for the KGB.



Camera-button

Today, in any store you can buy Chinese "spy" camera as a ballpoint pen, a flashlight, or a pack of cigarettes. Scouts 40 years ago it was more difficult. Lens Mask button under the mechanism sewn into clothes, and controls were in his pocket and represented something like Expander wrist.



Microfilm

These are the cameras used for copying documents even during the Second World War. By their nature, they differed little from the large cameras, but were much slimmer.



Enigma

The first "processor" for hardware-based encryption - the famous Enigma machine, designed by German engineers. By the way, it had a hand and a developer of the first computer in the world of Konrad Zuse.
Cryptographer did not need to work with tables. He just typed text that is automatically coded with the key changes every day. The Germans rightly believed that the code to crack the Enigma impossible. But at the very beginning of the war the Allies were able to capture a couple of these machines, allowing them to freely read the messages of the Wehrmacht.
Perhaps that is why in the American Soviet troops often to transmit encrypted messages use the language of small nations: Indians and some of the inhabitants of the Caucasus.



Disk encryption

Encryption devices used since Roman times. They were fairly primitive, but their main task was to ensure the randomness of the code. For example, rotating the disk encryption Civil War in the United States can generate a couple of dozen options.



Bulgarian umbrella

In 1978, the Bulgarian agent used such a device to kill in London dissident Georgi Markov. Umbrella modified so that it can be used for lethal injection in the street.
The popularity of the gadget from the security services said at least the fact that around one of them turns the action of the French comedy "Prick umbrella", filmed just in those years.



Pigeon espionage

Photo or movie camera attached to the carrier pigeons, was extremely effective means of operational intelligence during the fighting. Until the 50s the mission winged spies in 95% of cases were successful. Then is not that pigeons become worse flying, or they started to shoot, just appeared satellites and other more efficient, though costly methods.



Stump-bug

Such a stump on solar power lay in the woods outside Moscow, and intercepted radio transmissions, which were conducted by the nearest airbase. Data was transmitted to the satellite, and then - CIA.



Transmitter dog turd

What could be more disgusting espionage? Only excrement! Containers in the form of sausages, cakes and piles of still input. In such a thing is possible to hide the note, place the transmitter, leave the parcel. It is unlikely that someone will climb it to dig. Of course, there is always a risk that the janitor or a bystander decides to restore order, but in most cases, "shitty" mail triggered.
By the way, the containers in the form of tiger excrement transmitters used by the Americans in Vietnam aiming for aviation purpose.

via bezcommentariev



Source:

Tags

See also

New and interesting