Скачать книгу

id="u2fe03da9-4f94-5914-ade8-79b389fb62ed"> image
image

       Copyright

      William Collins

      An imprint of HarperCollinsPublishers 77–85 Fulham Palace Road, Hammersmith, London W6 8JB

       WilliamCollinsBooks.com

      First published in Great Britain by William Collins in 2014

      Copyright © Crown Copyright reproduced by permission of The National Archives, London, England, 2014

      The National Archives asserts the moral right to be identified as the author of this work.

      A catalogue record for this book is available from the British Library.

      All rights reserved under International and Pan-American Copyright Conventions. By payment of the required fees, you have been granted the non-exclusive, non-transferable right to access and read the text of this e-book on-screen. No part of this text may be reproduced, transmitted, down-loaded, decompiled, reverse engineered, or stored in or introduced into any information storage and retrieval system, in any form or by any means, whether electronic or mechanical, now known or hereinafter invented, without the express written permission of HarperCollins

      This book is published as a source of historical reference only and no warranty is given as to the accuracy of any information given. Some of the procedures and processes contained in this book could be hazardous to you or other people and you should not perform any of these activities. The publishers and the editor do not accept any responsibility for any harm that may occur from your decision to follow the instructions contained in this book and you do so at your own risk.

      Source ISBN: 9780008103613

      EBook Edition © 2014 ISBN: 9780008103620 Version: 2014-10-04

      CONTENTS

       Cover

       Title Page

       Copyright

      Security Talk

      Opening Address

      Individual Security

      Cover (A. 4/5)

      Interrogations (A. 6)

       Know Your Enemy (A. 8, 9 & 10)

       Surveillance (A. 11)

       Use of Premises (A. 15)

       External Communications (A. 17)

       The Cell System (A. 19)

       Security of Organisation (A. 20)

       Selection of Dropping Points and Arrangements for the Reception of Agents and Stores by Air (B. 3)

       Enemy Forces

       German Counter-Espionage (C. 1 & 2)

       Intelligence Reports (C. 9(A))

       Sabotage of Enemy Road Signs (C. 9(B))

       Recognition of Enemy Forces’ Uniforms (C. 12)

       Morale Warfare (D. 1)

       Methods of Morale Warfare (D. 2/3)

       Passive Resistance in Occupied Countries (D. 7)

       Codes and Ciphers

       Letter-Opening

       Disposal of Parachute

       Subversive Organisation Exercise (X. 4)

       Treasure Hunt (X. 7)

       Reconnaissance and Selection of Dropping Points for Parachute Operations (X. 8)

       Fieldcraft (X. 9)

       About the Publisher

       SECURITY TALK.

      (To be given by House Commandants to all students on arrival).

      INTRODUCTION.

      This is the most important part of your training. You will, therefore, in your own interest be subject to strict security rules.

      GENERAL SECURITY PRECAUTIONS.

      a. You will not be allowed to leave these grounds during the course unless accompanied or specially instructed to do so.

      (N.B:- i. This does not apply to British Officers undergoing non-operational training.

      ii. House Commandants may use their discretion about recreational walks; if in doubt they should refer to the Security Officer.)

      b. You must never disclose at any time to anyone that you have been at this School or at Beaulieu.

      c. You must never recognise anyone whom you have met here if you happen to meet them later on elsewhere, except on official business.

      LOCAL SECURITY RULES.

      a. You will hand to me all identity documents now in your possession for inspection. (Paybooks will be retained by me during the course.)

      b. You will hand to me any firearms, other weapons, cameras or notebooks in your possession for retention during the course.

      c. You will hand to me any money in excess of £5 and any valuables for safekeeping until your departure. If you wish to retain more than this sum you must obtain permission through me from the Area Commandant. Failure to comply with this rule will be regarded as contributory negligence in the event of any loss. Any loss of kit or personal property must be reported to me immediately.

      d. Mail.

      i. Outgoing. All letters will be handed to me in a stamped, unsealed envelope for censoring. You must not make any reference in your letters to the fact that they are censored.

      You will use the Postal Box address already given to you or the special arrangements for writing overseas.

      Your letters will be posted in London.

      ii. Incoming. All letters sent to you will be censored by the Administrative Officer.

      e. Telegrams. Telegrams, which may only be sent in cases of urgency, will be handed to me for censorship and despatch.

      f. Telephone. You will not use the telephone here or in the locality. (This rule is only relaxed in special cases where H.Q. desires to communicate urgently with a student.)

       OPENING ADDRESS.

      First of all let me bid you welcome. I hope that you will enjoy your Course here and will find it helpful to you.

      Now let’s get to work. The purpose of the Organisation to which you and I belong is Subversion. Subversion, properly applied, is one of the most potent weapons one can use. It is the fourth arm in modern warfare. What are its objects?

Скачать книгу