Short-range agent communications

Short range agent communications (SRAC) are one-way or two-way short-range wireless communications used for intelligence purposes. This communications technology became possible with the arrival of the transistor and small scale integrated circuits. In the late 2000s computer WiFi technology and USB Flash Drives had evolved into technologies that ordinary people can buy – yet can be used in a similar way to SRAC systems.[1]

SRAC devices were adopted by Western intelligence agencies during the Cold War in the 1960s, but Eastern Bloc nations possessed and used similar technologies.[1] The devices are miniature to ease concealment, and are capable of transmitting encrypted data.

Historical context

Examples of a US-made set, the CDS-501, were captured in Cuba and are thought to have seen use in Central and Eastern Europe. The device operated in the upper part of the VHF band and sent high speed bursts of encrypted data from an agent to a receiving station located within a Western diplomatic facility in a hostile country to avoid interception by the adversary signals intelligence service.[2]

A high-grade US intelligence source in Cold War Poland, Colonel Ryszard Kukliński, is believed to have been using a SRAC device shortly before his defection to the West in late 1981.[3] Another SRAC device's nomenclature was RT-519, which operated in the VHF spectrum.

Former British intelligence officer Richard Tomlinson mentioned SRAC devices of a cigarette pack size in his book The Big Breach: From Top Secret To Maximum Security. The text of a message was first typed on a computer and then uploaded into the SRAC device. When an agent came within the range of the interrogating signals from the receiving station, usually mounted within British diplomatic posts, the device instantly transmitted its message.[4]

Since 2000

In 2006 Russian authorities accused Britain of conducting spy operations in Moscow and exposed an artificial rock, which housed an electronic dead drop allegedly used by British assets in Russia.[5] The device likely exchanged short bursts of data with PDA computers in the possession of the assets.[6]

References

  1. ^ R. Wallace and K. H. Melton (2008). Spycraft: The Secret History of the CIA's Spytechs. Dutton.
  2. ^ Jan Bury (2012). "Project Kalina: The Lotos Operation Conundrum". Cryptologia. 36 (2): 119–128. doi:10.1080/01611194.2012.660854. S2CID 31498210.
  3. ^ Benjamin Weiser (2004). A Secret Life. Public Affairs.
  4. ^ "THE COMPLEAT SPY: TRADECRAFT". Archived from the original on 2013-02-22. Retrieved 2013-01-06.
  5. ^ "Spy scandal rocks Russia". BBC News. 26 January 2006.
  6. ^ "Q&A: 'British spy rock'". BBC News. 23 January 2006.