Knowledge (XXG)

Concealment device

Source 📝

320:
purpose are video players such as VHS, CD, DVD and Blu-ray players, computer accessories such as DVD-ROM drives and hard disk drives, battery packs or even a laptop computer itself. More often than not, the majority of the components will be removed to allow more space to conceal an item, but that will render the device inoperable and may arouse suspicion, and it may be of more benefit to preserve the operation of the device at the sacrifice of space. Additionally, the electronic device itself may be subject to theft, thereby defeating the purpose of such a concealment device. In other cases, items may be stored in parts of the machine without having to render it unusable - free space in the form of caddies that would normally be occupied by secondary and tertiary hard drives or disk drives can be large enough to store small items such as money and other valuables.
164: 193:, started to appear – often in door panels, dashboards, seats and roofs. By the early 1990s, however, police had learned to detect such traps by looking for suspicious buttons and switches. More recent traps have no visible controls, are electronically controlled and may require complicated procedures for access. For example, one trap found in the airbag compartment of a U.S. car in 2012 would only open if a driver was in the seat, all doors were closed (to prevent the trap from opening during a roadside police search), the defroster was turned on and a magnetic card was swiped over a sensor hidden in an air-conditioning vent. 226:, is still used today to hide and send messages or film without being detected. Because it resembles ordinary pocket change, it is virtually undetectable as a concealment device. If a hollow coin is suspected, it sometimes can be easily confirmed by weighing against a normal coin on a simple balance. However, more sophisticated hollow coins have had their weight adjusted to match an unaltered coin by including a ring of a dense metal such as lead inside the coin. Typically coins that have no gold or silver content are used so as to further avoid suspicion. 31: 215: 196:
The legality of traps is dependent on the jurisdiction in which they are used. In 2012, Alfred Anaya, famous among rich clients in California for his skill in installing sophisticated traps, was sentenced to more than 24 years in prison under U.S. federal law as a co-conspirator in a drug-trafficking
154:
but is mostly hollow. The bottom comes off and rolled papers or small objects can be placed and hidden inside. Some of the most clever of these contraptions looked like large, ordinary black candles with a felt base concealing the opening. To open them, two metal needles are poked through the felt at
233:
out one face and the interior of both coins (to create a cavity), and the edges of one (so it could slide into the other). The half coin with intact edges would also have a pin-prick size hole drilled through its face, so the device could be opened by inserting a pin. A scratch may be added to help
205:
Also a new form of concealment device, mock cans of various household chemicals or food and drinks can be purchased. A wide variety of commonly used personal care, household products and food containers with removable tops and bottoms are available. Valuables can be discreetly stored inside these
123:
and the propellant powder poured away. A small piece of paper with writing on it can be stored inside. Given that ammunition can be found everywhere in a combat zone, it is very easy to hide or discard such items because they blend in easily. Similarly, if a soldier is captured, the enemy expects
319:
can easily be used for concealing goods and information. Usually the only tool required is a screwdriver, the device can be opened up, have the majority of the electronic and mechanical components removed and replaced with the goods to be concealed. Some of the more common devices used for this
266:(e.g., in the door) where small valuable articles can be hidden. As an alternative variant, a safe may be "stocked" with some lesser valuables, with the expectation that it will be burgled, but that the real safe or hiding place for the important valuables will be missed. 282:
Concealment furniture is furniture that has been specially designed to hide guns and other weapons. The furniture can be made of different materials, but the most popular ones are wood, plastic, and metal. The first concealment furniture was invented in 1939 by
197:
operation. The conviction relied on testimony that Anaya had seen one of his clients stash some $ 800,000 in cash in a trap. The prosecution successfully argued that Anaya must have deduced from this that the trap was to be used for drug trafficking.
141:
are possibly the most common concealment devices in usage. They are easily made and can contain quite large objects. They are also very difficult for outsiders to spot but easy to recognize for those that are looking for a specific book on a shelf.
188:
Until the 1980s, drugs trafficked in cars in the U.S. tended to be hidden in obvious places such as wheel wells or spare tires. In the early 1980s, the first magnetically or hydraulically actuated secret compartments, dubbed "urban traps" by the
287:
Jr., who was a well-known gun designer. He invented a gun cabinet that could be used as a desk or armoire. It was made with an upper section that could be easily removed to access the hidden compartment for guns and ammunition.
53:. They are made from an ordinary household object such as a book, a soda can, a candle, a can, or something as small as a coin. The idea is that such an inconspicuous object would not be expected to contain anything of worth. 206:
lookalike containers and kept in their seemingly rightful places. Each of these diversion safes are indistinguishable from the genuine product, and can thus avoid detection, and they may even be weighted to feel full.
119:
casings to hide small amounts of critical information e.g. encryption/recognition codes or navigational grid references etc. The hiding place is very easy to prepare: the bullet is removed from the
234:
line up the faces while closing it—although it is very difficult to detect a slight misalignment by casual inspection. A device of this nature was famously discovered by a paper boy in the "
1189: 1402: 953: 181:
is a colloquial term for a secret compartment in an automobile. It can be intended to hide legal items, such as handguns or valuables, from thieves. But it can also be used to hide
1199: 443: 1332: 996: 979: 946: 851: 1395: 1036: 1224: 1194: 939: 834: 790: 64:
spikes for transferring items to other people, and hollowed-out coins or hollowed out teeth for concealing something - such as microfilm or a
1377: 163: 1026: 785: 540: 422: 970: 686: 1327: 1319: 721: 646: 1337: 190: 1268: 1093: 1008: 588: 1443: 962: 124:
that soldiers will have ammunition in their pockets, so little attention is paid, beyond confiscating and discarding it.
133: 1385: 274:
A fake electrical outlet, which can be pulled out from the wall and which contains a hidden compartment for storage.
1438: 457: 1300: 1031: 1352: 1342: 1290: 1021: 671: 641: 533: 291:
Some concealment furniture pieces are designed for handguns, while others hold shotguns and rifles as well.
1367: 1305: 1285: 1234: 991: 397: 1254: 920: 34:
Radio hidden in a book. This was commonly done in World War II to hide radios from the German occupiers.
1357: 1295: 1181: 1137: 1122: 1071: 1016: 846: 829: 802: 565: 316: 120: 1433: 1390: 1264: 1081: 908: 812: 243: 466:
Reports. Vol. 1. The Assassination Archives and Research Center (AARC). 1975–1976. p. 7.
1362: 1347: 1239: 1214: 1152: 1103: 797: 764: 738: 716: 711: 681: 526: 329: 263: 235: 1428: 1204: 913: 582: 437: 401: 369: 223: 1423: 1259: 1209: 878: 610: 463: 498: 1147: 1076: 898: 873: 807: 769: 706: 230: 112: 95: 478:"Hidden Gun Storage Ideas: Different Ideas That You Should Consider - Hidden Gun Storage" 477: 1244: 1064: 576: 374: 30: 171:"Trap (car)" redirects here. For a modified vehicle designed to trap car thieves, see 1417: 1162: 1142: 1127: 856: 824: 726: 701: 620: 300: 284: 353:
101 Secret Hiding Places by George Shepherd, CDI Publications Inc., ASIN: B00RPMS96S
1249: 1167: 1157: 1098: 903: 691: 676: 615: 600: 593: 251: 239: 88: 77: 94:
was responsible for creating many concealment devices for "escape aids" to assist
1059: 893: 759: 605: 334: 1132: 888: 868: 861: 841: 748: 182: 155:
certain points and an electric current passed through, causing them to open.
116: 81: 1113: 1108: 1054: 1046: 883: 696: 625: 560: 549: 247: 69: 61: 57: 214: 17: 931: 1117: 731: 304: 172: 73: 50: 499:"John Moses Browning | Biography, Facts, & Gun Designs | Britannica" 817: 65: 46: 151: 299:
Thin objects such as papers/money can be concealed in or behind the
213: 162: 29: 138: 935: 522: 91: 518: 262:
A device whereby a safe-looking safe is left open but has a
229:
Such hollow coins were created from two ordinary coins, by
246:
was issued with a hollow silver dollar containing a tiny,
150:
A new type, the hollow candle looks like a large scented
398:"The 'Crime' of Having a Hidden Compartment in Your Car" 1403:
Counterintelligence and counter-terrorism organizations
185:, such as illegal drugs, from searches by authorities. 363: 361: 359: 1376: 1318: 1278: 1223: 1180: 1045: 1007: 978: 969: 778: 747: 657: 634: 556: 115:and still continuing today, military personnel use 425:. Archived from the original on February 21, 2009 442:: CS1 maint: bot: original URL status unknown ( 222:A hollow container, fashioned to look like an 947: 534: 8: 45:are used to hide things for the purpose of 984: 975: 954: 940: 932: 541: 527: 519: 218:American dollar coin used for concealment 1368:Scientific & Technical intelligence 370:"See No Evil: The Case of Alfred Anaya" 346: 791:Chinese espionage in the United States 435: 368:Koerner, Brendan I. (19 March 2013). 7: 1190:By alliances, nations and industries 786:Chinese intelligence activity abroad 459:Unauthorized Storage of Toxic Agents 254:in case of capture by enemy forces. 852:Interpersonal (HUMINT) intelligence 250:-impregnated needle, to be used to 311:Computers and consumer electronics 25: 687:Computer and network surveillance 722:Short-range agent communications 1338:Words of estimative probability 1200:Operational platforms by nation 396:Ross, John (16 February 2014). 191:Drug Enforcement Administration 1: 27:Device used to hide something 167:A trap compartment in a car. 134:Concealing objects in a book 1386:Intelligence cycle security 1460: 170: 131: 987: 1353:Intelligence assessment 1343:All-source intelligence 963:Intelligence management 672:Covert listening device 642:Intelligence assessment 315:Computer equipment and 1037:Operational techniques 992:Special reconnaissance 219: 168: 35: 921:Targeted surveillance 217: 166: 33: 1444:Espionage techniques 1358:Medical intelligence 1328:Competing hypotheses 1138:Industrial espionage 1123:Denial and deception 847:Industrial espionage 647:competing hypotheses 317:consumer electronics 1391:Counterintelligence 1306:Technical (TECHINT) 1301:Open-source (OSINT) 1291:Geospatial (GEOINT) 1265:Casualty estimation 244:Francis Gary Powers 39:Concealment devices 1363:Military geography 1348:Basic intelligence 1286:Financial (FININT) 1227:signature (MASINT) 1153:One-way voice link 1089:Concealment device 798:Cold War espionage 765:Front organization 739:Surveillance tools 717:Phone surveillance 712:One-way voice link 667:Concealment device 503:www.britannica.com 330:Hidden compartment 264:hidden compartment 236:Hollow Nickel Case 220: 169: 68:pill. Examples in 36: 1439:Espionage devices 1411: 1410: 1314: 1313: 1205:Direction finding 1195:In modern history 1176: 1175: 929: 928: 583:Agent provocateur 423:"Diversion Safes" 270:Electrical outlet 224:Eisenhower dollar 16:(Redirected from 1451: 1210:Traffic analysis 1182:Signals (SIGINT) 1017:Asset recruiting 985: 976: 956: 949: 942: 933: 543: 536: 529: 520: 513: 512: 510: 509: 495: 489: 488: 486: 485: 474: 468: 467: 464:Church Committee 454: 448: 447: 441: 433: 431: 430: 419: 413: 412: 410: 408: 393: 387: 386: 384: 382: 365: 354: 351: 111:Starting in the 96:prisoners of war 21: 1459: 1458: 1454: 1453: 1452: 1450: 1449: 1448: 1414: 1413: 1412: 1407: 1372: 1310: 1296:Imagery (IMINT) 1274: 1235:Electro-optical 1226: 1225:Measurement and 1219: 1172: 1148:Numbers station 1077:Black operation 1041: 1003: 965: 960: 930: 925: 899:Sting operation 808:Black operation 774: 770:Limited hangout 752: 743: 707:Numbers station 659: 653: 630: 570: 552: 547: 517: 516: 507: 505: 497: 496: 492: 483: 481: 476: 475: 471: 456: 455: 451: 434: 428: 426: 421: 420: 416: 406: 404: 395: 394: 390: 380: 378: 367: 366: 357: 352: 348: 343: 326: 313: 297: 280: 272: 260: 212: 203: 176: 161: 148: 136: 130: 113:First World War 109: 104: 43:diversion safes 28: 23: 22: 15: 12: 11: 5: 1457: 1455: 1447: 1446: 1441: 1436: 1431: 1426: 1416: 1415: 1409: 1408: 1406: 1405: 1400: 1399: 1398: 1388: 1382: 1380: 1374: 1373: 1371: 1370: 1365: 1360: 1355: 1350: 1345: 1340: 1335: 1333:Target-centric 1330: 1324: 1322: 1316: 1315: 1312: 1311: 1309: 1308: 1303: 1298: 1293: 1288: 1282: 1280: 1276: 1275: 1273: 1272: 1262: 1257: 1255:Radiofrequency 1252: 1247: 1242: 1237: 1231: 1229: 1221: 1220: 1218: 1217: 1212: 1207: 1202: 1197: 1192: 1186: 1184: 1178: 1177: 1174: 1173: 1171: 1170: 1165: 1160: 1155: 1150: 1145: 1140: 1135: 1130: 1125: 1120: 1111: 1106: 1101: 1096: 1091: 1086: 1085: 1084: 1074: 1069: 1068: 1067: 1062: 1051: 1049: 1043: 1042: 1040: 1039: 1034: 1029: 1024: 1019: 1013: 1011: 1005: 1004: 1002: 1001: 1000: 999: 988: 982: 980:Human (HUMINT) 973: 967: 966: 961: 959: 958: 951: 944: 936: 927: 926: 924: 923: 918: 917: 916: 911: 901: 896: 891: 886: 881: 876: 871: 866: 865: 864: 859: 849: 844: 839: 838: 837: 832: 822: 821: 820: 815: 805: 800: 795: 794: 793: 782: 780: 776: 775: 773: 772: 767: 762: 756: 754: 745: 744: 742: 741: 736: 735: 734: 724: 719: 714: 709: 704: 699: 694: 689: 684: 679: 674: 669: 663: 661: 660:communications 655: 654: 652: 651: 650: 649: 638: 636: 632: 631: 629: 628: 623: 618: 613: 608: 603: 598: 597: 596: 586: 579: 577:Agent handling 573: 571: 569: 568: 563: 557: 554: 553: 548: 546: 545: 538: 531: 523: 515: 514: 490: 469: 449: 414: 388: 375:WIRED magazine 355: 345: 344: 342: 339: 338: 337: 332: 325: 322: 312: 309: 296: 293: 279: 276: 271: 268: 259: 258:Diversion safe 256: 252:commit suicide 211: 208: 202: 199: 160: 157: 147: 144: 132:Main article: 129: 126: 108: 105: 103: 100: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 1456: 1445: 1442: 1440: 1437: 1435: 1432: 1430: 1427: 1425: 1422: 1421: 1419: 1404: 1401: 1397: 1396:organizations 1394: 1393: 1392: 1389: 1387: 1384: 1383: 1381: 1379: 1378:Dissemination 1375: 1369: 1366: 1364: 1361: 1359: 1356: 1354: 1351: 1349: 1346: 1344: 1341: 1339: 1336: 1334: 1331: 1329: 1326: 1325: 1323: 1321: 1317: 1307: 1304: 1302: 1299: 1297: 1294: 1292: 1289: 1287: 1284: 1283: 1281: 1277: 1270: 1266: 1263: 1261: 1258: 1256: 1253: 1251: 1248: 1246: 1243: 1241: 1238: 1236: 1233: 1232: 1230: 1228: 1222: 1216: 1213: 1211: 1208: 1206: 1203: 1201: 1198: 1196: 1193: 1191: 1188: 1187: 1185: 1183: 1179: 1169: 1166: 1164: 1163:Steganography 1161: 1159: 1156: 1154: 1151: 1149: 1146: 1144: 1143:Interrogation 1141: 1139: 1136: 1134: 1131: 1129: 1128:Eavesdropping 1126: 1124: 1121: 1119: 1115: 1112: 1110: 1107: 1105: 1102: 1100: 1097: 1095: 1092: 1090: 1087: 1083: 1080: 1079: 1078: 1075: 1073: 1070: 1066: 1063: 1061: 1058: 1057: 1056: 1053: 1052: 1050: 1048: 1044: 1038: 1035: 1033: 1032:Direct action 1030: 1028: 1027:Covert action 1025: 1023: 1020: 1018: 1015: 1014: 1012: 1010: 1006: 998: 997:organizations 995: 994: 993: 990: 989: 986: 983: 981: 977: 974: 972: 968: 964: 957: 952: 950: 945: 943: 938: 937: 934: 922: 919: 915: 912: 910: 907: 906: 905: 902: 900: 897: 895: 892: 890: 887: 885: 882: 880: 877: 875: 872: 870: 867: 863: 860: 858: 857:interrogation 855: 854: 853: 850: 848: 845: 843: 840: 836: 833: 831: 828: 827: 826: 825:Eavesdropping 823: 819: 816: 814: 811: 810: 809: 806: 804: 801: 799: 796: 792: 789: 788: 787: 784: 783: 781: 777: 771: 768: 766: 763: 761: 758: 757: 755: 750: 746: 740: 737: 733: 730: 729: 728: 727:Steganography 725: 723: 720: 718: 715: 713: 710: 708: 705: 703: 702:Invisible ink 700: 698: 695: 693: 690: 688: 685: 683: 680: 678: 675: 673: 670: 668: 665: 664: 662: 656: 648: 645: 644: 643: 640: 639: 637: 633: 627: 624: 622: 621:Sleeper agent 619: 617: 614: 612: 609: 607: 604: 602: 599: 595: 592: 591: 590: 587: 585: 584: 580: 578: 575: 574: 572: 567: 564: 562: 559: 558: 555: 551: 544: 539: 537: 532: 530: 525: 524: 521: 504: 500: 494: 491: 479: 473: 470: 465: 461: 460: 453: 450: 445: 439: 424: 418: 415: 403: 399: 392: 389: 377: 376: 371: 364: 362: 360: 356: 350: 347: 340: 336: 333: 331: 328: 327: 323: 321: 318: 310: 308: 306: 302: 294: 292: 289: 286: 285:John Browning 277: 275: 269: 267: 265: 257: 255: 253: 249: 245: 241: 237: 232: 227: 225: 216: 209: 207: 201:Cans and jars 200: 198: 194: 192: 186: 184: 180: 174: 165: 158: 156: 153: 145: 143: 140: 135: 127: 125: 122: 118: 114: 106: 101: 99: 97: 93: 90: 85: 83: 79: 78:false bottoms 75: 71: 67: 63: 59: 54: 52: 48: 44: 40: 32: 19: 1168:Surveillance 1158:Resident spy 1099:Cryptography 1088: 904:Surveillance 692:Cyber spying 677:Cryptography 666: 616:Resident spy 601:Double agent 581: 506:. Retrieved 502: 493: 482:. Retrieved 480:. 2021-07-12 472: 458: 452: 427:. Retrieved 417: 405:. Retrieved 391: 379:. Retrieved 373: 349: 314: 298: 290: 281: 273: 261: 228: 221: 204: 195: 187: 178: 177: 149: 137: 110: 89:World War II 86: 56:Examples in 55: 42: 38: 37: 1240:Geophysical 1022:Cell system 1009:Clandestine 894:Stay-behind 803:Recruitment 760:Canary trap 658:Devices and 606:Field agent 335:Rudolf Abel 98:to escape. 80:for hiding 18:Concealment 1434:Containers 1418:Categories 1269:earthquake 1133:False flag 971:Collection 889:Sexpionage 869:COINTELPRO 862:safe house 842:False flag 779:Operations 753:techniques 749:Tradecraft 508:2022-03-04 484:2022-03-04 429:2008-06-15 407:15 October 341:References 183:contraband 117:ammunition 107:Ammunition 82:contraband 1260:Materials 1114:Defection 1109:Dead drop 1082:black bag 1047:Espionage 813:black bag 697:Dead drop 626:Spymaster 550:Espionage 278:Furniture 248:saxitoxin 121:cartridge 74:suitcases 70:smuggling 62:dead drop 58:espionage 1429:Security 1320:Analysis 1118:Turncoat 1065:handling 879:SHAMROCK 732:microdot 635:Analysis 438:cite web 381:23 March 324:See also 305:painting 295:Painting 173:bait car 102:Examples 72:include 60:include 51:security 1424:Secrecy 1267: ( 1245:Nuclear 1215:TEMPEST 874:MINARET 818:wetwork 231:milling 146:Candles 87:During 66:suicide 47:secrecy 1104:Cutout 1055:Agents 909:Global 835:MASINT 830:SIGINT 682:Cutout 566:Assets 561:Agents 402:Reason 242:pilot 179:"Trap" 152:candle 1279:Other 1250:Radar 1094:Cover 1072:Asset 1060:field 594:Agent 589:Cover 303:of a 301:frame 210:Coins 139:Books 128:Books 76:with 914:Mass 884:FVEY 611:Mole 444:link 409:2016 383:2013 751:and 240:U-2 238:". 159:Car 92:MI9 49:or 41:or 1420:: 1116:/ 501:. 462:. 440:}} 436:{{ 400:. 372:. 358:^ 307:. 84:. 1271:) 955:e 948:t 941:v 542:e 535:t 528:v 511:. 487:. 446:) 432:. 411:. 385:. 175:. 20:)

Index

Concealment

secrecy
security
espionage
dead drop
suicide
smuggling
suitcases
false bottoms
contraband
World War II
MI9
prisoners of war
First World War
ammunition
cartridge
Concealing objects in a book
Books
candle

bait car
contraband
Drug Enforcement Administration

Eisenhower dollar
milling
Hollow Nickel Case
U-2
Francis Gary Powers

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.