Spying on Terrorists in the Last 20 Years, Agencies Have Been More Likely to Target the Illegal Drug Trade and the Threat of Terrorism Than Spy on Age-Old Enemies
Total Page:16
File Type:pdf, Size:1020Kb
THIS PAGE INTENTIONALLY LEFT BLANK undercover operations a Adam Lerner Publications Company Sutherland Minneapolis cover stories First American edition published in 2012 by Lerner Publishing Group, Inc. Published by 10 arrangement with Wayland, a division of Hachette Children’s Books REAL-LIFE STORY Copyright © 2012 by Wayland Find out what it’s really like All U.S. rights reserved. No part of this to be a secret agent. book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means—electronic, mechanical, photocopying, recording, or otherwise—without the prior written permission of Lerner Publishing Group, Inc., except for the inclusion of brief quotations in an acknowledged review. Lerner Publications Company A division of Lerner Publishing Group, Inc. 241 First Avenue North 18 Minneapolis, MN U.S.A. ZONE IN Website address: www.lernerbooks.com Find out who’s watching you—and discover how they are doing it! Library of Congress Cataloging-in-Publication Data Sutherland, Adam. Undercover operations / by Adam Sutherland. p. cm. — (On the radar: Defend and protect) Includes index. ISBN 978–0–7613–7773–3 (lib. bdg. : alk. paper) 22, 28 1. Intelligence service—Juvenile literature. 2. Undercover operations—Juvenile literature. 3. Espionage—Juvenile literature. I. Title. SHOW ME JF1525.I6S89 2012 Send secret messages and 327.12—dc23 2011031684 create cryptic codes with our Manufactured in the United States of America fantastic photo guides! 1 – CG – 12/31/11 Acknowledgments: Alamy: Photos 20, 25; Dreamstime: Basphoto 2tl, 10–11, Hypestock 3br, 19b, Nicemonkey 24–25; Getty Images: cover, 9; iStock: Andrew J Shearer 21, Vika Valter 16–17; Shutterstock: Ryan Rodrick Beiler 4–5, Anthony Correia 15l, Fred Goldstein 12–13, Kheng Guan Toh 30–31, K2 Images 12br, Peter Kim 6br, Martin Muránsky 2tr, 18tr, P Cruciatti 18br, Rorem 7tr, Martin Spurny 1, Testing 15r, Jurgen Ziewe 19tr; Wikimedia: 2br, 8, 13c, 14l, 14r, 26, 26–27, 28c. Main body text set in Helvetica Neue LT Std 13/15.5. Typeface provided by Adobe Systems. TOP FIVE 26 Discover the most famous spies and double agents of modern times. CONTENTS cover stories thepeople 8 THE BACK STORY The story of espionage 10 REAL-LIFE STORY Keeping my country safe 12 WHO’S WHO The CIA 20 STAR STORY James Bond 24 THE BIG SCREEN Spies on lm 26 TOP FIVE Spies and double agents! theskills 22 SHOW ME Invisible ink 28 SHOW ME Cipher wheel thetalk 4 ALL ABOUT Top secret agencies 6 THE LINGO Spy chatter 14 WORLD VIEW Global intelligence 16 FEEL IT Under surveillance 18 ZONE IN You are not alone! 30 PULL A NUMBER Spy stats 32 FAN CLUB Get more info! 32 INDEX Protect and serve The U.S. Secret Service’s main mission is to protect the country against financial and computer fraud. (Money laundering, for example, is an important source of funds for many terrorist organizations.) The Secret Service also protects the U.S. president both at home and on foreign visits. Members of the Secret Service were on duty during Barack Obama’s swearing in as president in 2009. 4 ALL ABOUT TOP SECRET AGENCIES Surveillance and intelligence gathering are both types of undercover operations carried out by specialized government agencies. The agencies are often referred to as secret services, because their duties are not well known. Acting on intelligence In the United States, the Central Intelligence Agency (CIA) collects information about foreign governments, companies, or individuals and passes that information to the U.S. government. The CIA also conducts undercover operations and military missions. Defending the United States The main goal of the Federal Bureau of Investigation (FBI) is to protect and defend the United States against terrorist and foreign intelligence threats and to uphold and enforce criminal laws. The FBI is increasingly involved in protecting important computer systems against cyber attacks. British Security Sections The British Security Service, also known as Military Intelligence, Section 5 (MI5), is responsible for protecting its country against threats to national security. MI5 guards Britain against espionage attempts from other countries, terrorism, and sabotage. The Secret Intelligence Service (SIS), or Military Intelligence, Section 6 (MI6), collects Britain’s foreign intelligence. It nds information on the plans of foreign governments or terrorist groups and disrupts their activities. 5 SPYCHATTER Break the spy speak code with On the Radar’s stealthy guide! code name homeland sabotage a secret name that is designed security the deliberate destruction to protect a person’s identity efforts to prevent a terrorist or damage of something attack on home soil counter- surveillance intelligence informer closely watching a person activities designed to stop or someone who provides or a group of people attempt to stop enemy spying information, usually top secret undercover counter- intelligence acting in secret narcotics information gathered operations to prevent the by undercover agents growing, transportation, and selling of drugs wiretapping secretly connecting to a national telephone line to listen security to conversations counter- the safety of a country terrorism the methods that governments use to prevent terrorist threats and attacks Undercover agents maintain national security by protecting electronic key government of cials. surveillance using hidden microphones to secretly monitor conversations espionage spying 6 THE LINGO GLOSSARY assassination fictional the organized killing made up, not real of someone hieroglyphs cipher an ancient Egyptian form a secret or disguised way of writing with pictures of writing; a code identity computer a person’s name, address, fraud and personal history political using computers to obtain tensions information and using it to money arguments between groups commit a crime laundering with different political views a way of disguising where cyber attacks money from criminal activities, recruited the use of computer viruses such as drug dealing, has persuaded to join to disrupt or crash a come from an organization computer system overthrow regain disloyal the removal or downfall to take or win back something not faithful or loyal, not of a country’s leader trustworthy satellite political a device in space that orbits enslaved assassinations Earth, taking photographs or made to work as a slave killings done for sending information as radio political purposes signals 7 THE STORY OF ESPIONAGE Espionage, or spying, has been going on for thousands of years. As far back as 500 Chinese military leadersB.C., ancientwrote detailed studies on how to trick their enemies. Hieroglyphs show spies operating in the ancient Egyptian court. Spies were used to uncover disloyal subjects and to locate groups that could be taken over and enslaved. Sir Francis Walsingham (1532–1590) was one of Queen Elizabeth I’s most trusted advisers—and a legendary English spy. Roman Spying through intelligence the ages In the sixteenth century, the English royal The Roman Empire’s intelligence court developed the world’s leading spy forces provided reports on the network. King Henry VIII created a large military strength of its enemies. The secret police force. He used it to locate Roman military hired spies to become Roman military hired spies to become groups loyal to the Roman Catholic Church, members of rebel tribes and convince which he was trying to eliminate in England. leaders to join forces with Rome. His daughter, Elizabeth I, employed at least In 44 B.C., Roman spies told Julius 50 secret agents in England and across Caesar of the plot to kill him, but he Europe to discover plots to overthrow her. chose to ignore the information and 8 was killed by his enemies. THE BACK STORY Revolutionary acts George Washington and Benjamin Franklin both spied against the British during the Revolutionary War (1775–1783). Washington was an expert in military trickery. He once tricked the British East versus West Army into believing he was about to After World War II (1939–1945), political attack New York City when his troops tensions arose between the United States were actually in Yorktown, Virginia, and its allies and the Soviet Union and nearly 400 miles (640 kilometers) away! China. These tensions provoked an intense period of spying known as the Cold War (1945–1991). This con ict saw a massive expansion in nuclear weapons building. Both sides hired spies to uncover the enemy’s secrets. CIA director Leon Panetta (front right) and his key aides informed Congress in person that Osama bin Laden had been killed. Spying on terrorists In the last 20 years, agencies have been more likely to target the illegal drug trade and the threat of terrorism than spy on age-old enemies. The discovery of Osama bin Laden’s hideout and information leading to the SEAL Team Six raid is believed to have been supplied by CIA informers. 9 CIPHER WHEEL Exchange secret messages with your friends using this A L Z R amazing wheel to F create spy codes. P P G W V D T Z E You will need: L X C H • pencil • pair of scissors K H • tracing paper • card D W S • glue • cotter pin or brad T A M N V R I G U I 1 Y X S U M O F C B N Trace the outer wheel (shown O K right), including the text. On a B Y separate sheet, trace the inner E wheel. Glue the two tracings onto cards. Cut out both wheels. Make sure you do not Cotter pin or brad cut off the black triangle on the smaller wheel. Make a small hole in the middle 2 of both wheels. Place the small wheel on top of the big wheel. Put the cotter pin through the holes. Bend up the ends of the pin so the two wheels stay together and turn.