320:
purpose are video players such as VHS, CD, DVD and Blu-ray players, computer accessories such as DVD-ROM drives and hard disk drives, battery packs or even a laptop computer itself. More often than not, the majority of the components will be removed to allow more space to conceal an item, but that will render the device inoperable and may arouse suspicion, and it may be of more benefit to preserve the operation of the device at the sacrifice of space. Additionally, the electronic device itself may be subject to theft, thereby defeating the purpose of such a concealment device. In other cases, items may be stored in parts of the machine without having to render it unusable - free space in the form of caddies that would normally be occupied by secondary and tertiary hard drives or disk drives can be large enough to store small items such as money and other valuables.
164:
193:, started to appear – often in door panels, dashboards, seats and roofs. By the early 1990s, however, police had learned to detect such traps by looking for suspicious buttons and switches. More recent traps have no visible controls, are electronically controlled and may require complicated procedures for access. For example, one trap found in the airbag compartment of a U.S. car in 2012 would only open if a driver was in the seat, all doors were closed (to prevent the trap from opening during a roadside police search), the defroster was turned on and a magnetic card was swiped over a sensor hidden in an air-conditioning vent.
226:, is still used today to hide and send messages or film without being detected. Because it resembles ordinary pocket change, it is virtually undetectable as a concealment device. If a hollow coin is suspected, it sometimes can be easily confirmed by weighing against a normal coin on a simple balance. However, more sophisticated hollow coins have had their weight adjusted to match an unaltered coin by including a ring of a dense metal such as lead inside the coin. Typically coins that have no gold or silver content are used so as to further avoid suspicion.
31:
215:
196:
The legality of traps is dependent on the jurisdiction in which they are used. In 2012, Alfred Anaya, famous among rich clients in
California for his skill in installing sophisticated traps, was sentenced to more than 24 years in prison under U.S. federal law as a co-conspirator in a drug-trafficking
154:
but is mostly hollow. The bottom comes off and rolled papers or small objects can be placed and hidden inside. Some of the most clever of these contraptions looked like large, ordinary black candles with a felt base concealing the opening. To open them, two metal needles are poked through the felt at
233:
out one face and the interior of both coins (to create a cavity), and the edges of one (so it could slide into the other). The half coin with intact edges would also have a pin-prick size hole drilled through its face, so the device could be opened by inserting a pin. A scratch may be added to help
205:
Also a new form of concealment device, mock cans of various household chemicals or food and drinks can be purchased. A wide variety of commonly used personal care, household products and food containers with removable tops and bottoms are available. Valuables can be discreetly stored inside these
123:
and the propellant powder poured away. A small piece of paper with writing on it can be stored inside. Given that ammunition can be found everywhere in a combat zone, it is very easy to hide or discard such items because they blend in easily. Similarly, if a soldier is captured, the enemy expects
319:
can easily be used for concealing goods and information. Usually the only tool required is a screwdriver, the device can be opened up, have the majority of the electronic and mechanical components removed and replaced with the goods to be concealed. Some of the more common devices used for this
266:(e.g., in the door) where small valuable articles can be hidden. As an alternative variant, a safe may be "stocked" with some lesser valuables, with the expectation that it will be burgled, but that the real safe or hiding place for the important valuables will be missed.
282:
Concealment furniture is furniture that has been specially designed to hide guns and other weapons. The furniture can be made of different materials, but the most popular ones are wood, plastic, and metal. The first concealment furniture was invented in 1939 by
197:
operation. The conviction relied on testimony that Anaya had seen one of his clients stash some $ 800,000 in cash in a trap. The prosecution successfully argued that Anaya must have deduced from this that the trap was to be used for drug trafficking.
141:
are possibly the most common concealment devices in usage. They are easily made and can contain quite large objects. They are also very difficult for outsiders to spot but easy to recognize for those that are looking for a specific book on a shelf.
188:
Until the 1980s, drugs trafficked in cars in the U.S. tended to be hidden in obvious places such as wheel wells or spare tires. In the early 1980s, the first magnetically or hydraulically actuated secret compartments, dubbed "urban traps" by the
287:
Jr., who was a well-known gun designer. He invented a gun cabinet that could be used as a desk or armoire. It was made with an upper section that could be easily removed to access the hidden compartment for guns and ammunition.
53:. They are made from an ordinary household object such as a book, a soda can, a candle, a can, or something as small as a coin. The idea is that such an inconspicuous object would not be expected to contain anything of worth.
206:
lookalike containers and kept in their seemingly rightful places. Each of these diversion safes are indistinguishable from the genuine product, and can thus avoid detection, and they may even be weighted to feel full.
119:
casings to hide small amounts of critical information e.g. encryption/recognition codes or navigational grid references etc. The hiding place is very easy to prepare: the bullet is removed from the
234:
line up the faces while closing it—although it is very difficult to detect a slight misalignment by casual inspection. A device of this nature was famously discovered by a paper boy in the "
181:
is a colloquial term for a secret compartment in an automobile. It can be intended to hide legal items, such as handguns or valuables, from thieves. But it can also be used to hide
1189:
1402:
953:
1199:
443:
64:
spikes for transferring items to other people, and hollowed-out coins or hollowed out teeth for concealing something - such as microfilm or a
1332:
996:
979:
946:
851:
422:
1395:
1036:
1224:
1194:
939:
834:
790:
1377:
1026:
785:
540:
124:
that soldiers will have ammunition in their pockets, so little attention is paid, beyond confiscating and discarding it.
970:
686:
274:
A fake electrical outlet, which can be pulled out from the wall and which contains a hidden compartment for storage.
1327:
1319:
721:
646:
1337:
190:
163:
457:
1268:
1093:
1008:
588:
1443:
962:
291:
Some concealment furniture pieces are designed for handguns, while others hold shotguns and rifles as well.
133:
397:
1385:
34:
Radio hidden in a book. This was commonly done in World War II to hide radios from the German occupiers.
1438:
1300:
1031:
466:
Reports. Vol. 1. The
Assassination Archives and Research Center (AARC). 1975–1976. p. 7.
1352:
1342:
1290:
1021:
671:
641:
533:
17:
1367:
1305:
1285:
1234:
991:
369:
1254:
920:
1357:
1295:
1181:
1137:
1122:
1071:
1016:
846:
829:
802:
565:
498:
316:
120:
8:
1433:
1390:
1264:
1081:
1054:
908:
812:
560:
478:"Hidden Gun Storage Ideas: Different Ideas That You Should Consider - Hidden Gun Storage"
477:
243:
1362:
1347:
1239:
1214:
1152:
1103:
797:
764:
738:
716:
711:
681:
526:
329:
263:
235:
171:"Trap (car)" redirects here. For a modified vehicle designed to trap car thieves, see
1428:
1204:
913:
582:
437:
401:
223:
353:
101 Secret Hiding Places by George
Shepherd, CDI Publications Inc., ASIN: B00RPMS96S
1423:
1259:
1209:
878:
610:
463:
94:
was responsible for creating many concealment devices for "escape aids" to assist
1147:
1076:
898:
873:
807:
769:
706:
230:
112:
95:
1244:
1064:
576:
374:
155:
certain points and an electric current passed through, causing them to open.
1417:
1162:
1142:
1127:
856:
824:
726:
701:
620:
300:
284:
1249:
1167:
1157:
1098:
903:
691:
676:
615:
600:
593:
251:
239:
88:
77:
931:
1059:
893:
759:
605:
334:
30:
499:"John Moses Browning | Biography, Facts, & Gun Designs | Britannica"
1132:
888:
868:
861:
841:
748:
182:
116:
81:
1113:
1108:
1046:
883:
696:
625:
549:
247:
69:
61:
57:
299:
Thin objects such as papers/money can be concealed in or behind the
1117:
731:
304:
172:
73:
50:
817:
65:
46:
214:
151:
518:
262:
A device whereby a safe-looking safe is left open but has a
229:
Such hollow coins were created from two ordinary coins, by
138:
246:
was issued with a hollow silver dollar containing a tiny,
150:
A new type, the hollow candle looks like a large scented
91:
398:"The 'Crime' of Having a Hidden Compartment in Your Car"
1403:
Counterintelligence and counter-terrorism organizations
185:, such as illegal drugs, from searches by authorities.
363:
361:
359:
310:
115:and still continuing today, military personnel use
356:
425:. Archived from the original on February 21, 2009
1415:
442:: CS1 maint: bot: original URL status unknown (
222:A hollow container, fashioned to look like an
947:
534:
961:
45:are used to hide things for the purpose of
954:
940:
541:
527:
218:American dollar coin used for concealment
213:
162:
29:
1368:Scientific & Technical intelligence
370:"See No Evil: The Case of Alfred Anaya"
367:
14:
1416:
791:Chinese espionage in the United States
935:
522:
368:Koerner, Brendan I. (19 March 2013).
1190:By alliances, nations and industries
786:Chinese intelligence activity abroad
459:Unauthorized Storage of Toxic Agents
395:
389:
269:
254:in case of capture by enemy forces.
852:Interpersonal (HUMINT) intelligence
250:-impregnated needle, to be used to
24:
311:Computers and consumer electronics
25:
1455:
687:Computer and network surveillance
257:
722:Short-range agent communications
200:
1338:Words of estimative probability
1200:Operational platforms by nation
396:Ross, John (16 February 2014).
191:Drug Enforcement Administration
491:
470:
450:
415:
347:
13:
1:
548:
340:
106:
27:Device used to hide something
277:
167:A trap compartment in a car.
134:Concealing objects in a book
7:
1386:Intelligence cycle security
323:
294:
101:
10:
1460:
170:
145:
131:
1376:
1318:
1278:
1223:
1180:
1045:
1007:
987:
978:
969:
778:
747:
657:
634:
556:
209:
127:
1353:Intelligence assessment
1343:All-source intelligence
963:Intelligence management
672:Covert listening device
642:Intelligence assessment
315:Computer equipment and
1037:Operational techniques
992:Special reconnaissance
219:
168:
158:
35:
921:Targeted surveillance
217:
166:
33:
1444:Espionage techniques
1358:Medical intelligence
1328:Competing hypotheses
1138:Industrial espionage
1123:Denial and deception
847:Industrial espionage
647:competing hypotheses
317:consumer electronics
1391:Counterintelligence
1306:Technical (TECHINT)
1301:Open-source (OSINT)
1291:Geospatial (GEOINT)
1265:Casualty estimation
244:Francis Gary Powers
39:Concealment devices
1363:Military geography
1348:Basic intelligence
1286:Financial (FININT)
1227:signature (MASINT)
1153:One-way voice link
1089:Concealment device
798:Cold War espionage
765:Front organization
739:Surveillance tools
717:Phone surveillance
712:One-way voice link
667:Concealment device
503:www.britannica.com
330:Hidden compartment
264:hidden compartment
236:Hollow Nickel Case
220:
169:
68:pill. Examples in
36:
1439:Espionage devices
1411:
1410:
1314:
1313:
1205:Direction finding
1195:In modern history
1176:
1175:
929:
928:
583:Agent provocateur
423:"Diversion Safes"
270:Electrical outlet
224:Eisenhower dollar
16:(Redirected from
1451:
1210:Traffic analysis
1182:Signals (SIGINT)
1017:Asset recruiting
985:
984:
976:
975:
956:
949:
942:
933:
932:
543:
536:
529:
520:
519:
513:
512:
510:
509:
495:
489:
488:
486:
485:
474:
468:
467:
464:Church Committee
454:
448:
447:
441:
433:
431:
430:
419:
413:
412:
410:
408:
393:
387:
386:
384:
382:
365:
354:
351:
111:Starting in the
96:prisoners of war
21:
1459:
1458:
1454:
1453:
1452:
1450:
1449:
1448:
1414:
1413:
1412:
1407:
1372:
1310:
1296:Imagery (IMINT)
1274:
1235:Electro-optical
1226:
1225:Measurement and
1219:
1172:
1148:Numbers station
1077:Black operation
1041:
1003:
965:
960:
930:
925:
899:Sting operation
808:Black operation
774:
770:Limited hangout
752:
743:
707:Numbers station
659:
653:
630:
570:
552:
547:
517:
516:
507:
505:
497:
496:
492:
483:
481:
476:
475:
471:
456:
455:
451:
435:
434:
428:
426:
421:
420:
416:
406:
404:
394:
390:
380:
378:
366:
357:
352:
348:
343:
326:
313:
297:
280:
272:
260:
212:
203:
176:
161:
148:
136:
130:
113:First World War
109:
104:
43:diversion safes
28:
23:
22:
15:
12:
11:
5:
1457:
1447:
1446:
1441:
1436:
1431:
1426:
1409:
1408:
1406:
1405:
1400:
1399:
1398:
1388:
1382:
1380:
1374:
1373:
1371:
1370:
1365:
1360:
1355:
1350:
1345:
1340:
1335:
1333:Target-centric
1330:
1324:
1322:
1316:
1315:
1312:
1311:
1309:
1308:
1303:
1298:
1293:
1288:
1282:
1280:
1276:
1275:
1273:
1272:
1262:
1257:
1255:Radiofrequency
1252:
1247:
1242:
1237:
1231:
1229:
1221:
1220:
1218:
1217:
1212:
1207:
1202:
1197:
1192:
1186:
1184:
1178:
1177:
1174:
1173:
1171:
1170:
1165:
1160:
1155:
1150:
1145:
1140:
1135:
1130:
1125:
1120:
1111:
1106:
1101:
1096:
1091:
1086:
1085:
1084:
1074:
1069:
1068:
1067:
1062:
1051:
1049:
1043:
1042:
1040:
1039:
1034:
1029:
1024:
1019:
1013:
1011:
1005:
1004:
1002:
1001:
1000:
999:
988:
982:
980:Human (HUMINT)
973:
967:
966:
959:
958:
951:
944:
936:
927:
926:
924:
923:
918:
917:
916:
911:
901:
896:
891:
886:
881:
876:
871:
866:
865:
864:
859:
849:
844:
839:
838:
837:
832:
822:
821:
820:
815:
805:
800:
795:
794:
793:
782:
780:
776:
775:
773:
772:
767:
762:
756:
754:
745:
744:
742:
741:
736:
735:
734:
724:
719:
714:
709:
704:
699:
694:
689:
684:
679:
674:
669:
663:
661:
660:communications
655:
654:
652:
651:
650:
649:
638:
636:
632:
631:
629:
628:
623:
618:
613:
608:
603:
598:
597:
596:
586:
579:
577:Agent handling
573:
571:
569:
568:
563:
557:
554:
553:
546:
545:
538:
531:
523:
515:
514:
490:
469:
449:
414:
388:
375:WIRED magazine
355:
345:
344:
342:
339:
338:
337:
332:
325:
322:
312:
309:
296:
293:
279:
276:
271:
268:
259:
258:Diversion safe
256:
252:commit suicide
211:
208:
202:
199:
160:
157:
147:
144:
132:Main article:
129:
126:
108:
105:
103:
100:
26:
9:
6:
4:
3:
2:
1456:
1445:
1442:
1440:
1437:
1435:
1432:
1430:
1427:
1425:
1422:
1421:
1419:
1404:
1401:
1397:
1396:organizations
1394:
1393:
1392:
1389:
1387:
1384:
1383:
1381:
1379:
1378:Dissemination
1375:
1369:
1366:
1364:
1361:
1359:
1356:
1354:
1351:
1349:
1346:
1344:
1341:
1339:
1336:
1334:
1331:
1329:
1326:
1325:
1323:
1321:
1317:
1307:
1304:
1302:
1299:
1297:
1294:
1292:
1289:
1287:
1284:
1283:
1281:
1277:
1270:
1266:
1263:
1261:
1258:
1256:
1253:
1251:
1248:
1246:
1243:
1241:
1238:
1236:
1233:
1232:
1230:
1228:
1222:
1216:
1213:
1211:
1208:
1206:
1203:
1201:
1198:
1196:
1193:
1191:
1188:
1187:
1185:
1183:
1179:
1169:
1166:
1164:
1163:Steganography
1161:
1159:
1156:
1154:
1151:
1149:
1146:
1144:
1143:Interrogation
1141:
1139:
1136:
1134:
1131:
1129:
1128:Eavesdropping
1126:
1124:
1121:
1119:
1115:
1112:
1110:
1107:
1105:
1102:
1100:
1097:
1095:
1092:
1090:
1087:
1083:
1080:
1079:
1078:
1075:
1073:
1070:
1066:
1063:
1061:
1058:
1057:
1056:
1053:
1052:
1050:
1048:
1044:
1038:
1035:
1033:
1032:Direct action
1030:
1028:
1027:Covert action
1025:
1023:
1020:
1018:
1015:
1014:
1012:
1010:
1006:
998:
997:organizations
995:
994:
993:
990:
989:
986:
983:
981:
977:
974:
972:
968:
964:
957:
952:
950:
945:
943:
938:
937:
934:
922:
919:
915:
912:
910:
907:
906:
905:
902:
900:
897:
895:
892:
890:
887:
885:
882:
880:
877:
875:
872:
870:
867:
863:
860:
858:
857:interrogation
855:
854:
853:
850:
848:
845:
843:
840:
836:
833:
831:
828:
827:
826:
825:Eavesdropping
823:
819:
816:
814:
811:
810:
809:
806:
804:
801:
799:
796:
792:
789:
788:
787:
784:
783:
781:
777:
771:
768:
766:
763:
761:
758:
757:
755:
750:
746:
740:
737:
733:
730:
729:
728:
727:Steganography
725:
723:
720:
718:
715:
713:
710:
708:
705:
703:
702:Invisible ink
700:
698:
695:
693:
690:
688:
685:
683:
680:
678:
675:
673:
670:
668:
665:
664:
662:
656:
648:
645:
644:
643:
640:
639:
637:
633:
627:
624:
622:
621:Sleeper agent
619:
617:
614:
612:
609:
607:
604:
602:
599:
595:
592:
591:
590:
587:
585:
584:
580:
578:
575:
574:
572:
567:
564:
562:
559:
558:
555:
551:
544:
539:
537:
532:
530:
525:
524:
521:
504:
500:
494:
479:
473:
465:
461:
460:
453:
445:
439:
424:
418:
403:
399:
392:
377:
376:
371:
364:
362:
360:
350:
346:
336:
333:
331:
328:
327:
321:
318:
308:
306:
302:
292:
289:
286:
285:John Browning
275:
267:
265:
255:
253:
249:
245:
241:
237:
232:
227:
225:
216:
207:
201:Cans and jars
198:
194:
192:
186:
184:
180:
174:
165:
156:
153:
143:
140:
135:
125:
122:
118:
114:
99:
97:
93:
90:
85:
83:
79:
78:false bottoms
75:
71:
67:
63:
59:
54:
52:
48:
44:
40:
32:
19:
1168:Surveillance
1158:Resident spy
1099:Cryptography
1088:
904:Surveillance
692:Cyber spying
677:Cryptography
666:
616:Resident spy
601:Double agent
581:
506:. Retrieved
502:
493:
482:. Retrieved
480:. 2021-07-12
472:
458:
452:
427:. Retrieved
417:
405:. Retrieved
391:
379:. Retrieved
373:
349:
314:
298:
290:
281:
273:
261:
228:
221:
204:
195:
187:
178:
177:
149:
137:
110:
89:World War II
86:
56:Examples in
55:
42:
38:
37:
1240:Geophysical
1022:Cell system
1009:Clandestine
894:Stay-behind
803:Recruitment
760:Canary trap
658:Devices and
606:Field agent
335:Rudolf Abel
98:to escape.
80:for hiding
1434:Containers
1418:Categories
1269:earthquake
1133:False flag
971:Collection
889:Sexpionage
869:COINTELPRO
862:safe house
842:False flag
779:Operations
753:techniques
749:Tradecraft
508:2022-03-04
484:2022-03-04
429:2008-06-15
407:15 October
341:References
183:contraband
117:ammunition
107:Ammunition
82:contraband
1260:Materials
1114:Defection
1109:Dead drop
1082:black bag
1047:Espionage
813:black bag
697:Dead drop
626:Spymaster
550:Espionage
278:Furniture
248:saxitoxin
121:cartridge
74:suitcases
70:smuggling
62:dead drop
58:espionage
1429:Security
1320:Analysis
1118:Turncoat
1065:handling
879:SHAMROCK
732:microdot
635:Analysis
438:cite web
381:23 March
324:See also
305:painting
295:Painting
173:bait car
102:Examples
72:include
60:include
51:security
1424:Secrecy
1267: (
1245:Nuclear
1215:TEMPEST
874:MINARET
818:wetwork
231:milling
146:Candles
87:During
66:suicide
47:secrecy
18:Conceal
1104:Cutout
1055:Agents
909:Global
835:MASINT
830:SIGINT
682:Cutout
566:Assets
561:Agents
402:Reason
242:pilot
179:"Trap"
152:candle
1279:Other
1250:Radar
1094:Cover
1072:Asset
1060:field
594:Agent
589:Cover
303:of a
301:frame
210:Coins
139:Books
128:Books
76:with
914:Mass
884:FVEY
611:Mole
444:link
409:2016
383:2013
751:and
240:U-2
238:".
159:Car
92:MI9
49:or
41:or
1420::
1116:/
501:.
462:.
440:}}
436:{{
400:.
372:.
358:^
307:.
84:.
1271:)
955:e
948:t
941:v
542:e
535:t
528:v
511:.
487:.
446:)
432:.
411:.
385:.
175:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.