THIS PAGE INTENTIONALLY LEFT BLANK undercover operations

a Adam Lerner Publications Company Sutherland Minneapolis cover stories

First American edition published in 2012 by Lerner Publishing Group, Inc. Published by 10 arrangement with Wayland, a division of Hachette Children’s Books REAL-LIFE STORY Copyright © 2012 by Wayland Find out what it’s really like All U.S. rights reserved. No part of this to be a secret agent. book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means—electronic, mechanical, photocopying, recording, or otherwise—without the prior written permission of Lerner Publishing Group, Inc., except for the inclusion of brief quotations in an acknowledged review. Lerner Publications Company A division of Lerner Publishing Group, Inc. 241 First Avenue North 18 Minneapolis, MN U.S.A. ZONE IN Website address: www.lernerbooks.com Find out who’s watching you—and discover how they are doing it! Library of Congress Cataloging-in-Publication Data

Sutherland, Adam. Undercover operations / by Adam Sutherland. p. cm. — (On the radar: Defend and protect) Includes index. ISBN 978–0–7613–7773–3 (lib. bdg. : alk. paper) 22, 28 1. Intelligence service—Juvenile literature. 2. Undercover operations—Juvenile literature. 3. —Juvenile literature. I. Title. SHOW ME JF1525.I6S89 2012 Send secret messages and 327.12—dc23 2011031684 create cryptic codes with our Manufactured in the United States of America fantastic photo guides! 1 – CG – 12/31/11

Acknowledgments: Alamy: Photos 20, 25; Dreamstime: Basphoto 2tl, 10–11, Hypestock 3br, 19b, Nicemonkey 24–25; Getty Images: cover, 9; iStock: Andrew J Shearer 21, Vika Valter 16–17; Shutterstock: Ryan Rodrick Beiler 4–5, Anthony Correia 15l, Fred Goldstein 12–13, Kheng Guan Toh 30–31, K2 Images 12br, Peter Kim 6br, Martin Muránsky 2tr, 18tr, P Cruciatti 18br, Rorem 7tr, Martin Spurny 1, Testing 15r, Jurgen Ziewe 19tr; Wikimedia: 2br, 8, 13c, 14l, 14r, 26, 26–27, 28c.

Main body text set in Helvetica Neue LT Std 13/15.5. Typeface provided by Adobe Systems. TOP FIVE 26 Discover the most famous spies and double agents of modern times. CONTENTS cover stories

thepeople 8 THE BACK STORY The story of espionage 10 REAL-LIFE STORY Keeping my country safe 12 WHO’S WHO The CIA 20 STAR STORY 24 THE BIG SCREEN Spies on lm 26 TOP FIVE Spies and double agents! theskills

22 SHOW ME Invisible ink 28 SHOW ME Cipher wheel thetalk 4 ALL ABOUT Top secret agencies 6 THE LINGO Spy chatter 14 WORLD VIEW Global intelligence 16 FEEL IT Under surveillance 18 ZONE IN You are not alone! 30 PULL A NUMBER Spy stats 32 FAN CLUB Get more info!

32 INDEX Protect and serve The U.S. Secret Service’s main mission is to protect the country against financial and computer fraud. (Money laundering, for example, is an important source of funds for many terrorist organizations.) The Secret Service also protects the U.S. president both at home and on foreign visits.

Members of the Secret Service were on duty during ’s swearing in as president in 2009.

4 ALL ABOUT TOP SECRET AGENCIES Surveillance and intelligence gathering are both types of undercover operations carried out by specialized government agencies. The agencies are often referred to as secret services, because their duties are not well known. Acting on intelligence In the United States, the Central Intelligence Agency (CIA) collects information about foreign governments, companies, or individuals and passes that information to the U.S. government. The CIA also conducts undercover operations and military missions. Defending the United States The main goal of the Federal Bureau of Investigation (FBI) is to protect and defend the United States against terrorist and foreign intelligence threats and to uphold and enforce criminal laws. The FBI is increasingly involved in protecting important computer systems against cyber attacks. British Security Sections The British Security Service, also known as Military Intelligence, Section 5 (MI5), is responsible for protecting its country against threats to national security. MI5 guards Britain against espionage attempts from other countries, terrorism, and sabotage. The Secret Intelligence Service (SIS), or Military Intelligence, Section 6 (MI6), collects Britain’s foreign intelligence. It nds information on the plans of foreign governments or terrorist groups and disrupts their activities.

5 SPYCHATTER Break the spy speak code with On the Radar’s stealthy guide!

code name homeland sabotage a secret name that is designed security the deliberate destruction to protect a person’s identity efforts to prevent a terrorist or damage of something attack on home soil

counter- surveillance intelligence informer closely watching a person activities designed to stop or someone who provides or a group of people attempt to stop enemy spying information, usually top secret

undercover counter- intelligence acting in secret narcotics information gathered operations to prevent the by undercover agents growing, transportation, and selling of drugs wiretapping secretly connecting to a national telephone line to listen security to conversations counter- the safety of a country terrorism the methods that governments use to prevent terrorist threats and attacks Undercover agents maintain national security by protecting electronic key government of cials. surveillance using hidden microphones to secretly monitor conversations

espionage spying

6 THE LINGO

GLOSSARY assassination fictional the organized killing made up, not real of someone hieroglyphs cipher an ancient Egyptian form a secret or disguised way of writing with pictures of writing; a code identity computer a person’s name, address, fraud and personal history political using computers to obtain tensions information and using it to money arguments between groups commit a crime laundering with different political views a way of disguising where cyber attacks money from criminal activities, recruited the use of computer viruses such as drug dealing, has persuaded to join to disrupt or crash a come from an organization computer system overthrow regain disloyal the removal or downfall to take or win back something not faithful or loyal, not of a country’s leader trustworthy satellite political a device in space that orbits enslaved assassinations Earth, taking photographs or made to work as a slave killings done for sending information as radio political purposes signals

7 THE STORY OF ESPIONAGE

Espionage, or spying, has been going on for thousands of years. As far back as 500 B.C., ancient Chinese military leaders wrote detailed studies on how to trick their enemies. Hieroglyphs show spies operating in the ancient Egyptian court. Spies were used to uncover disloyal subjects and to locate groups that could be taken over and enslaved.

Sir Francis Walsingham (1532–1590) was one of Queen Elizabeth I’s most trusted advisers—and a legendary English spy.

Spying through the ages Roman In the sixteenth century, the English royal intelligence court developed the world’s leading spy The Roman Empire’s intelligence network. King Henry VIII created a large forces provided reports on the secret police force. He used it to locate military strength of its enemies. The groups loyal to the Roman Catholic Church, Roman military hired spies to become which he was trying to eliminate in England. members of rebel tribes and convince His daughter, Elizabeth I, employed at least leaders to join forces with Rome. 50 secret agents in England and across In 44 B.C., Roman spies told Julius Europe to discover plots to overthrow her. Caesar of the plot to kill him, but he chose to ignore the information and was killed by his enemies. 8 THE BACK STORY

Revolutionary acts George Washington and Benjamin Franklin both spied against the British during the Revolutionary War (1775–1783). Washington was an expert in military trickery. He once tricked the British East versus West Army into believing he was about to After World War II (1939–1945), political attack New York City when his troops tensions arose between the United States were actually in Yorktown, Virginia, and its allies and the Soviet Union and nearly 400 miles (640 kilometers) away! China. These tensions provoked an intense period of spying known as the (1945–1991). This con ict saw a massive expansion in nuclear weapons building. Both sides hired spies to uncover the enemy’s secrets. CIA director Leon Panetta (front right) and his key aides informed Congress in person that Osama bin Laden had been killed.

Spying on terrorists In the last 20 years, agencies have been more likely to target the illegal drug trade and the threat of terrorism than spy on age-old enemies. The discovery of Osama bin Laden’s hideout and information leading to the SEAL Team Six raid is believed to have been supplied by CIA informers. 9 CIPHER WHEEL Exchange secret messages with your friends using this A L Z R amazing wheel to F create spy codes. P P G W V D T Z E You will need: L X C H • pencil • pair of scissors K H • tracing paper • card D W

S

• glue • cotter pin or brad T

A M

N

V

R

I

G

U

I

1 Y X

S U

M

O F C B

N

Trace the outer wheel (shown O

K

right), including the text. On a B Y separate sheet, trace the inner E wheel. Glue the two tracings onto cards. Cut out both wheels. Make sure you do not Cotter pin or brad cut off the black triangle on the smaller wheel.

Make a small hole in the middle 2 of both wheels. Place the small wheel on top of the big wheel. Put the cotter pin through the holes. Bend up the ends of the pin so the two wheels stay together and turn. 28 SHOW ME

Write down the message you 3 want to send. For example, WE MEET AT MIDNIGHT. Make sure you destroy the message once you have made your code!

Choose a letter to be your 4 key. In these instructions, we’ll use the letter H. Turn the smaller wheel until the black triangle points to the key letter.

For each letter of your message, nd that 5 character on the outer wheel. Write down the letter that is below it on the smaller wheel. When you have nished, you’ll have your coded message! This is the cipher:

WE MEET AT MIDNIGHT. SP NPPR MR NLICLTAR. Got it? Your friend will need to make a cipher wheel too to decode your cipher. All your friend needs to know is the key, in this case the letter H. 29 SPY STATS

20,000

The estimated number of CIA 1776 employees around the world

The year that Nathan Hale, who is considered the rst U.S. spy, was captured and killed by the British for espionage 2,000

17 The number of female special agents The age of Belle employed by the FBI Boyd when she began spying for the Confederate army during the Civil War (1861–1865) 30 PULL A NUMBER $7.9 BILLION

The FBI’s annual budget 39 MILLION

The estimated number of spies in China—that’s three percent of its population!

1953

The year Julius and Ethel Rosenberg were 1,271 2,000 executed for passing U.S. secrets to the Soviet Union The estimated number of U.S. government organizations working on counterterrorism, homeland security, and intelligence

31 FAN CLUB GET MORE INFO! Further Reading Websites Earnest, Peter, and Suzanne Harper. The CIA Real Spy’s Guide to Becoming a Spy. New http://www.cia.gov York: Abrams Books for Young Readers, Visit the Interactive Museum or Kids’ Page to 2009. Use this handbook to develop skills learn more about the functions of the CIA. necessary to be a successful spy. International Spy Museum Fridell, Ron. Spy Technology. Minneapolis: http://www.spymuseum.org/kidspy Lerner Publications Company, 2007. This Visit this website for games and information book describes the technology (both about the life of a spy. failed and successful) that spies have National Security Agency used throughout history to complete their http://www.nsa.gov/kids/index.cfm missions. The NSA runs this site and tests kids on Platt, Richard. Spy. New York: Dorling their ability to crack codes and puzzles. Kindersley, 2009. This illustrated resource Spy Secrets gives an overview of the history, technology, http://www.topspysecrets.com and tools of espionage throughout history. You are the spy, and at this website, Shapiro, Stephen, and Tina Forrester. Ultra you learn the techniques necessary for Hush-Hush: Espionage and Special Missions. becoming a good one. Buffalo: Annick Press, 2003. Read this book for a collection of true tales of World War II espionage from both sides of the war.

index Central Intelligence Agency homeland security, 31 national security, 5, 13, 15 (CIA), 5, 9, 12–13, intelligence, 5, 8, 11, 12–13, sabotage, 5 14–15, 24–25, 27, 30 14–15, 17, 20–21, 31 spies, 8–9, 20–21, 24–25, Cold War, 9, 27 Military Intelligence 5 26–27, 30–31 drug trade, 9 (MI5), 5, 11, 30 surveillance, 5, 13, 14, Federal Bureau of Military Intelligence 6 16–17, 18–19 Investigation (FBI), 5, (MI6), 5, 11, 20–21, 24 terrorism, 4–5, 9, 11, 12, 15, 18, 31 money laundering, 4 14–15, 17, 27, 31 32 THIS PAGE INTENTIONALLY LEFT BLANK The world’s security and safety depends on the top-secret agents who carry out undercover operations. Make sure this force is on your radar! Inside you’ll fi nd these features: REAL-LIFE STORY Read the thrilling story of an MI6 agent. SHOW ME Create your own top-secret messages with our step-by-step guides! TOP FIVE Discover the most famous double agents in history.

Are you On the Radar?

DANCE SPORTS Capoeira: Fusing Dance Board Sports and Martial Arts Free Running Ice Dancing Freestyle BMX Latin Dance Street Soccer Street Dance STREET STYLE DEFEND AND PROTECT Body Decoration Armed Services Cool Brands Police Forensics Graf ti Culture Special Forces Street Art Undercover Operations