Intended AudienceTrade
Table Of ContentChapter 1 - Search Techniques – A Surreptitious EntryChapter 2 - Simple Methods of Entrances & Openings Without Keys – Doors; Filing Cabinets; Desks; WindowsChapter 3 - Forced EntrancesChapter 4 - Lock Picking – Making Your Own Tools; Skeleton Keys; Professional Lock Picking Tools; Ward Lock; Disc Tumbler Desk Lock; Instructions for Picking Bit Key (lever Tumble) Locks; Instructions for Picking Pin Tumbler Locks; Instructions for Picking Mushroom Tumbler Locks; Sesame LocksChapter 5 - Safes – Burglar Methods; Combination Locks; How a Combination Lock Operates; Opening Improperly Locked Safes By Manipulation; Opening Securely Locked Safes By Manipulation
SynopsisUsed by OSS operatives behind enemy lines during World War II, this manual was expanded and is still used to train CIA Technical Services Division personnel--with which Watergate conspirators were associated. A revelation of CIA activities, this unusual manual will be of tremendous interest to historians, collectors and spy buffs.