Short-range agent communications

Short range agent communications (SRAC) are one-way or two-way short-range wireless communications used for intelligence purposes. This communications technology became possible with the arrival of the transistor and small scale integrated circuits. In the late 2000s computer WiFi technology and USB Flash Drives had evolved into technologies that ordinary people can buy -- yet can be used in a similar way to SRAC systems.

SRAC devices were adopted by Western intelligence agencies during the Cold War in the 1960s, but Eastern Bloc nations possessed and used similar technologies.[1] The devices are miniature to ease concealment, and are capable of transmitting encrypted data.

Historical context

Examples of a US-made set, the CDS-501, were captured in Cuba and are thought to have seen use in Central and Eastern Europe. The device operated in the upper part of the VHF band and sent high speed bursts of encrypted data from an agent to a receiving station located within a Western diplomatic facility in a hostile country to avoid interception by the adversary signals intelligence service.[2]

A high-grade US intelligence source in Cold War Poland, Colonel Ryszard Kukliński, is believed to have been using a SRAC device shortly before his defection to the West in late 1981.[3] Another SRAC device's nomenclature was RT-519, which operated in the VHF spectrum.

Former British intelligence officer Richard Tomlinson mentioned SRAC devices of a cigarette pack size in his book The Big Breach: From Top Secret To Maximum Security. The text of a message was first typed on a computer and then uploaded into the SRAC device. When an agent came within the range of the interrogating signals from the receiving station, usually mounted within British diplomatic posts, the device instantly transmitted its message.[4]

Since 2000

In 2006 Russian authorities accused Britain of conducting spy operations in Moscow and exposed an artificial rock, which housed an electronic dead drop allegedly used by British assets in Russia.[5] The device likely exchanged short bursts of data with PDA computers in the possession of the assets.[6]

gollark: It seems like one of those things which can't possibly *entirely* work, since you can't just give someone some data (an image) and then prevent them doing stuff you don't like with it, but can work a bit and at least frustrate people without specific domain knowledge.
gollark: Hmm, if you use it in a browser somehow it might not even be able to detect being screenshotted since those have better sandboxing.
gollark: Anyway, the whole "blocking screenshots" thing (or at least notifying people when they get their stuff screenshotted) seems doomed to failure like DRM. Why do Android and iOS even *tell* the app it's being screenshotted? That seems bound to be abused.
gollark: That doesn't sound inconvenient at all!
gollark: Probably not.

References

  1. R. Wallace and K. H. Melton (2008). Spycraft: The Secret History of the CIA’s Spytechs. Dutton.
  2. Jan Bury (2012). "Project Kalina: The Lotos Operation Conundrum". Cryptologia. 36: 119–128. doi:10.1080/01611194.2012.660854.
  3. Benjamin Weiser (2004). A Secret Life. Public Affairs.
  4. "THE COMPLEAT SPY: TRADECRAFT".
  5. "Spy scandal rocks Russia". BBC News. 26 January 2006.
  6. "Q&A: 'British spy rock'". BBC News. 23 January 2006.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.