Books

Thursday, June 29, 2023

Yankee Doodle Spycraft

 

The past few posts involved discussions of spycraft—general methods of intelligence operations. Although often used interchangeably with tradecraft, it covers a broader range of activities. Merriam-Webster defines tradecraft as “the techniques and procedures of espionage.” We will focus on selected techniques for this discussion. None are unique to the time of the Yankee Doodle Spies. 


Washington as Spymaster

World’s Oldest Profession?

Spying has existed long into antiquity. By the mid-19th century, almost all nations employed tradecraft in their intelligence activities. Formally organized intelligence services operated in the European capitals, particularly in the major ones, such as Paris, London, and Madrid. But on the battlefields of America, most intelligence activities were ad hoc and usually managed by the commander in loco


The perfect venue for European espionage

General Washington famously took a special interest in such matters, but nearly all commanders on both sides did as well – sending out scouts, reconnaissance patrols, and spies. Some appointed officers to oversee spy networks made up of one or more agents, sometimes called assets. Benjamin Tallmadge, a major of the Second Continental Dragoons, was one such handler who led the Culper Ring in New York City and Long Island. During the Philadelphia campaign in late 1777, Washington’s agent handler was another Continental Army officer, Major John Clark.


Benjamin Tallmadge

Cover

The complexity of today’s high-tech and interconnected world makes cover activities extremely challenging. In the 18th century, when records were not well kept or even non-existent, a simple “legend” might have been enough to protect a spy. A legend refers to a person using a fake identity or credible story to infiltrate a target organization instead of recruiting an agent in place (behind enemy lines). Nathan Hale went behind British lines in New York in 1776 using a traveling schoolmaster as his cover. Both sides used very light cover, primarily by adopting pseudonyms. Records were crudely maintained and identified, apart from letters of introduction. 


Nathan Hale using schoolmaster cover


In 1778, American Captain Allan McLane volunteered to spy on the British garrison at Stony Point, a fort on the Hudson south of West Point. McLane dressed as a “country bumpkin,” claiming he was escorting a lady to visit her son at the fort. He returned safely with valuable intelligence for General Washington.


Defense plans for Stony Point

Real or Concealed?

Fans of James Bond and other modern spy thrillers are familiar with concealment devices used to hide espionage artifacts, messages, plans, or maps. These include gadgets like hollowed-out coins, books, or other objects. Revolutionary War devices could be simple, as shown by British Major John Andre hiding plans for West Point’s defense in his shoe. 


Major Andre - shoeless spy

A more elaborate plot by General Henry Clinton failed in 1777 when he sent an officer named Daniel Taylor up the North (Hudson) River to inform General John Burgoyne of his plans. The message, written on silk, was concealed inside a silver ball made to resemble a musket ball. The unlucky Taylor was captured, and he swallowed the ball during questioning. His interrogators caught him in the act, and the use of emetics quickly revealed the device.


Messages could be secreted in silver balls 

Broadcasting 

In the 20th century, spies might have used a one-way voice link, a radio-based communication system to talk with agents in the field, often (but not only) using shortwave radio frequencies. Newspapers offered a similar method in the 18th century. Classified ads were a useful way to communicate. Newspapers like New York City’s Rivington’s Gazette served this role for the British and Americans.


Rivington's Royal Gazette

Cryptography

The use of special techniques for secure communication dates back to ancient times. By the era of the Yankee Doodle Spies, various codes and ciphers were in use. Letters of the alphabet replace other letters to hide the message's content. The sender and receiver must share the same key, which can be reused, or for the highest security, a one-time pad, which changes the key with each message. Sometimes, a network might have its own template, like a book, to serve as the cipher’s key.


Code of the Culper Ring

General Washington employed a number and letter substitution system made famous by the Culper Ring operating in New York and Long Island. For example, 38 meant attack, 192 meant fort, and New York was 727. Sometimes, harmless words were included in the message because they couldn't reveal their true meaning. Another secret communication method involved using a published book or dictionary, where a specific word on a page and line was used to decode the signal. A popular book or dictionary essentially hides in plain sight and poses no threat if it falls into the wrong hands. 

Steganography 

The art or practice of hiding a message, image, or file within another message, image, or file is a high-tech activity today. But 18th-century intelligence often used hidden messages. Usually, a real message was embedded in a book, newspaper, letter, or other cover text. 


Hidden in a book

The British used a technique of hiding secret messages within text by applying a paper template called a “mask.” When the mask was overlaid, the hidden message could be read. The information was arranged in the shape of an hourglass. 


Masked Letter

Invisible ink became more popular. Lemon juice was used first, but later, a special liquid called stain allowed secret writing to be seen only by the person with the stain. Sir James Jay, the brother of the Revolutionary leader John Jay and head of New York’s Committee for the Detection of Spies, invented it in London. Luckily for the Americans, Sir James secretly sent a bottle of stain to his brother, who was involved in counterintelligence activities. Washington took advantage of this new high-tech ink, often writing in the blank space between the lines of a letter or a book.


John Jay

Cutouts

Espionage services used cutouts, typically someone not under suspicion, to pass information to and from agents. Cutouts have limited knowledge of the final destination or the spy’s identity, providing added security should the cutout fall under suspicion. Colonial taverns and coffee houses offered ideal venues for this. Other establishments, such as American spy Hercules Mulligan’s tailor shop in New York, may have played such a role.


Tailor Shop or Spy Central?

Dead Drop

The dead drop exchange remains a method of espionage tradecraft used to pass items between two individuals using a secret location. Dead drops allow the exchange of information while avoiding a personal meeting. These are typically secret locations at remote sites (sometimes in plain sight) for leaving notes or items for later retrieval. The Culper Ring used a box buried on Abraham Woodhull’s farm, where Austin Roe would deliver intelligence gained at his New York tavern.


Returning from a dead drop on Long Island

The flip side is the “live drop,” where two agents meet to exchange items or information. The same ring used Long Island’s north shore coves as dead drops, where Caleb Brewster’s whaleboat could slip in, and he would retrieve the messages. 

Eavesdropping

Today this includes electronic surveillance, wiretaps, and cyber collection. During Revolutionary War times, eavesdropping involved secretly listening to others' conversations without their consent, usually just out of sight or behind closed doors. Lydia Darragh learned of a British plan for a surprise attack on General Washington’s army, which involved observing the British garrison in Philadelphia. General Howe was using her home as his headquarters, and her presence gave her the access needed to uncover this.


Lydia Darragh in action

Surveillance

Monitoring behavior, activities, or anomalies is a simple yet effective technique. Surveillance was likely the most commonly used collection activity during the American Revolution. Pro-British Loyalists and American patriots were often mixed together and kept watch on each other, looking for suspicious or threatening actions. Scouts and patrols also observed enemy forces from a distance. In 1775, Paul Revere’s spy network, known as the Mechanics, had watchers throughout Boston and the surrounding areas to report on British activities.


The Mechanics reported on the British Boston garrison

Front Organizations

These are entities created and controlled by another organization, such as intelligence agencies. The goal is to avoid attribution to the organizing entity—plausible denial. They can take the form of a business, a foundation, or another type of organization. The most famous of these during the Revolutionary War was Rodrigue & Hortalez et. cie, a front company established by Pierre Augustine de Beamarchais, a clockmaker and playwright who had access to the King and France’s Foreign Minister, comte de Vergennes. This trading company shipped surplus French military goods and other vital supplies to the colonies in exchange for American products like tobacco. The American fight likely would have collapsed without this covert help.


Beamarchais - playwright and 
covert action mastermind

Ask Me Anything

Both sides extensively used military interrogation. An interrogation is a questioning method used by police, military, and intelligence agencies to gather valuable information from uncooperative suspects. Interrogation involved various techniques, from building rapport with the subject to asking repeated questions, sleep deprivation, or, in some countries, torture. Both sides suffered from deserters who willingly provided military information during the Revolutionary War. The most ruthless interrogations happened during the internal conflict between patriots and Loyalists. This civil war within the American War for Independence was marked by aggressive and brutal interrogation of prisoners.


Interrogations could be brutal

Black Chamber Operations

Intercepting diplomatic correspondence originating in Europe in the early 18th century often involved co-opting postal services. During the American Revolution, both sides used similar covert methods by intercepting mail carried by regular postal routes, express riders, or couriers. These efforts were typically kept secret, with letters carefully resealed and stamped. Washington and the British in New York City extensively employed this tactic, co-opting couriers and messengers. Since patriots and Loyalists lived among each other, there was no shortage of people willing to participate in such risky activities. 


Courier with a message - is it true or false?

During the start of the Yorkton campaign in 1781, General Washington used intercepted messages from British General Henry Clinton’s New York garrison by planting false information that was allowed to fall into enemy hands. The report helped create a false story – an upcoming invasion of New York. This operation allowed the French and Americans to gain an advantage over Clinton as they moved south to Yorktown and victory.


Surveilling Yorktown

No comments:

Post a Comment