出典(authority):フリー百科事典『ウィキペディア(Wikipedia)』「2018/05/16 11:40:48」(JST)
This article possibly contains original research. Please improve it by verifying the claims made and adding inline citations. Statements consisting only of original research should be removed. (April 2008) (Learn how and when to remove this template message)
|
This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. (August 2009) (Learn how and when to remove this template message)
|
It has been suggested that Trap (car) be merged into this article. (Discuss) Proposed since May 2017.
|
Concealment devices or diversion safes are used to hide things for the purpose of secrecy or security. They are made from an ordinary household object such as a book, a soda can, a candle, a can, or something as small as a coin. The idea is that such an inconspicuous object would not be expected to contain anything of worth.
Examples in espionage include dead drop spikes for transferring items to other people, and hollowed-out coins or hollowed out teeth for concealing something - such as microfilm or a suicide pill. Examples in smuggling include suitcases with false bottoms for hiding contraband.
During World War II MI9 was responsible for creating many concealment devices for "escape aids" to assist prisoners of war to escape.
Starting in the First World War and still continuing today, military personnel use ammunition casings to hide small amounts of critical information e.g. encryption/recognition codes or navigational grid references etc. The hiding place is very easy to prepare: the bullet is removed from the cartridge and the propellant powder poured away. A small piece of paper with writing on it can be stored inside. Given that ammunition can be found everywhere in a combat zone, it is very easy to hide or discard such items because they blend in easily. Similarly, if a soldier is captured, the enemy expects that soldiers will have ammunition in their pockets, so little attention is paid, beyond confiscating and discarding it.
Books are possibly the most common concealment devices in usage. They are easily made and can contain quite large objects. They are also very difficult for outsiders to spot but easy to recognize for those that are looking for a specific book on a shelf.
A new type, the hollow candle looks like a large scented candle but is mostly hollow. The bottom comes off and rolled papers or small objects can be placed and hidden inside. Some of the most clever of these contraptions looked like large, ordinary black candles with a felt base concealing the opening. To open them, two metal needles are poked through the felt at certain points and an electric current passed through, causing them to open.[citation needed]
Also a new form of concealment device, mock cans of various household chemicals or food and drinks can be purchased. A wide variety of commonly used personal care, household products and food containers with removable tops and bottoms are available. Valuables can be discreetly stored inside these lookalike containers and kept in their seemingly rightful places. Each of these diversion safes are indistinguishable from the genuine product, and can thus avoid detection, and they may even be weighted to feel full.[1]
A hollow container, fashioned to look like an Eisenhower dollar, is still used today to hide and send messages or film without being detected. Because it resembles ordinary pocket change, it is virtually undetectable as a concealment device. If a hollow coin is suspected, it sometimes can be easily confirmed by weighing against a normal coin on a simple balance. However, more sophisticated hollow coins have had their weight adjusted to match an unaltered coin by including a ring of a dense metal such as lead inside the coin. Typically coins that have no gold or silver content are used so as to further avoid suspicion.
Such hollow coins were created from two ordinary coins, by milling out one face and the interior of both coins (to create a cavity), and the edges of one (so it could slide into the other). The half coin with intact edges would also have a pin-prick size hole drilled through its face, so the device could be opened by inserting a pin. A scratch may be added to help line up the faces while closing it—although it is very difficult to detect a slight misalignment by casual inspection. A device of this nature was famously discovered by a paper boy in the "Hollow Nickel Case". U-2 pilot Francis Gary Powers was issued with a hollow silver dollar containing a tiny, saxitoxin-impregnated needle,[2] to be used to commit suicide in case of capture by enemy forces.
A device whereby a safe-looking safe is left open but has a hidden compartment (e.g., in the door) where small valuable articles can be hidden. As an alternative variant, a safe may be "stocked" with some lesser valuables, with the expectation that it will be burgled, but that the real safe or hiding place for the important valuables will be missed.
A fake electrical outlet, which can be pulled out from the wall and which contains a hidden compartment for storage.
Thin objects such as papers/money can be concealed in or behind the frame of a painting.
Computer equipment and consumer electronics can easily be used for concealing goods and information. Usually the only tool required is a screwdriver, the device can be opened up, have the majority of the electronic and mechanical components removed and replaced with the goods to be concealed. Some of the more common devices used for this purpose are video players such as VHS, CD, DVD and Blu-ray players, computer accessories such as DVD-ROM drives and hard disk drives, battery packs or even a laptop computer itself. More often than not, the majority of the components will be removed to allow more space to conceal an item, but that will render the device inoperable and may arouse suspicion, and it may be of more benefit to preserve the operation of the device at the sacrifice of space. Additionally, the electronic device itself may be subject to theft, thereby defeating the purpose of such a concealment device.
Espionage
|
|
---|---|
|
|
Analysis |
|
Devices and communications |
|
Operations |
|
Intelligence management
|
|||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Collection |
|
||||||||||||||
Analysis |
|
||||||||||||||
Dissemination |
|
全文を閲覧するには購読必要です。 To read the full text you will need to subscribe.
拡張検索 | 「allocation concealment」 |
.