Knowledge (XXG)

Agent handling

Source 📝

33: 74: 259:. Case officers emphasize the elements of tradecraft that enable the agent to acquire needed information, and enable the case officer to communicate with and supervise the agent. Most importantly, case officers train agents in methods of avoiding detection by host nation counter-intelligence organizations. 331:, meaning how to establish credible pretexts for their presence and behavior while engaged in collection activities. A well-trained and competent agent can conduct his or her clandestine tasks while under close surveillance, and still evade detection. More advanced agent training can include resistance to 267:
By definition, an "agent" acts on behalf of another, whether another individual, an organization, or a foreign government. Agents can be considered either witting or unwitting, and in some cases, willing or unwilling. Agents typically work under the direction of a principal agent or a case officer.
242:
If principles of intelligence tradecraft have not been strictly observed, it is also possible that compromised agents can reveal information that exposes other members of the network. In the real world of espionage, human lapses are very much the norm, and violations of the principles of tradecraft
202:
A primary purpose of intelligence organizations is to penetrate a target with a human agent, or a network of human agents. Such agents can either infiltrate the target, or be recruited "in place". Case officers are professionally trained employees of intelligence organizations that manage human
222:
Using a principal agent as a cut-out, and ensuring that the human agent network is organized in a cellular fashion, can provide some protection for other agents in the network, as well as for the principal agent, and for the case officer if an agent in the network is compromised. Assuming that
323:, photography and the emplacement of audio devices, sensors, or other transmitters. Case officers generally train agents one at a time, in isolation, including only those elements of tradecraft needed to penetrate the target at hand. Case officers will also teach agents how to develop 210:
Sometimes, agent handling is done indirectly, through "principal agents" that serve as proxies for case officers. It is not uncommon, for example, for a case officer to manage a number of principal agents, who in turn handle agent networks, which are preferably organized in a
254:
A case officer is an intelligence officer who is a trained specialist in the management of agents and agent networks. Case officers manage human agents and human intelligence networks. Case officers spot potential agents, recruit prospective agents and train agents in
227:
have been strictly observed by the principal agent and the agents in the network, compromised agents will not be able to identify the case officer, nor the other members of the network. Ideally, agents may work side by side in the same office, and conduct their
271:
The identification of potential agents is termed "agent spotting" (also termed "talent spotting"). Identifying potential agents, and investigating the details of their personal and professional lives, involves the granular verification of their
1056: 1269: 287:
Approaches to potential agents can be multitudinous and considerable time can pass before the potential agent is maneuvered into a position where a recruitment "pitch" can be hazarded.
820: 1066: 382:, Thomas Patrick Carroll, Syllabus, 5 September 2006 – 24 October 2006—many good definitions with historic examples and timely discussion of problems; in outline form. 246:
If an agent is able to resist interrogation for a defined period of time, the odds improve that other members of the network can be alerted to the compromise.
1199: 863: 377: 846: 813: 718: 204: 232:
collection activities with such discipline, that they will not realize that they are both engaged in espionage, much less members of the same network.
1262: 903: 1091: 1061: 806: 701: 657: 1244: 893: 652: 239:
that can lead to the identification of a principal agent, the protection provided by cellular network organization can be time-sensitive.
407: 837: 553: 157: 1194: 1186: 588: 513: 1204: 91: 1135: 960: 875: 455: 138: 95: 110: 829: 243:
are common. It is for this reason that agents are ideally trained to resist interrogation for a defined period of time.
1252: 117: 84: 203:
agents and human agent networks. Intelligence that derives from such human sources is known by the abbreviation
124: 1167: 898: 1219: 1209: 1157: 888: 538: 508: 400: 212: 106: 1295: 1234: 1172: 1152: 1101: 858: 1121: 787: 229: 235:
Since an agent can sometimes identify his or her principal agent, however, or reveal information under
1224: 1162: 1048: 1004: 989: 938: 883: 713: 696: 669: 432: 187: 183: 276:. Such activities can include uncovering personal details that leave potential agents vulnerable to 1257: 1131: 948: 775: 679: 320: 216: 171: 182:(called secret agents or spies in common parlance), principal agents, and agent networks (called " 1290: 1229: 1214: 1106: 1081: 1019: 970: 955: 664: 631: 605: 583: 578: 548: 533: 393: 308: 268:
When agents work alone, and are not members of an agent network, they are termed "singletons".
1071: 780: 449: 1126: 1076: 745: 477: 131: 1014: 943: 765: 740: 674: 636: 573: 46:
Please help update this article to reflect recent events or newly available information.
1111: 219:
for the case officer, buffering him or her from direct contact with the agent network.
1284: 1029: 1009: 994: 723: 691: 593: 568: 487: 332: 296: 236: 1116: 1034: 1024: 965: 770: 558: 543: 482: 467: 460: 316: 304: 300: 926: 760: 626: 472: 362: 73: 999: 755: 735: 728: 708: 615: 273: 256: 224: 17: 980: 975: 921: 913: 750: 563: 492: 427: 416: 312: 281: 179: 295:
Agent training often includes techniques of tradecraft such as clandestine
798: 984: 598: 277: 684: 344: 802: 389: 67: 26: 385: 1270:
Counterintelligence and counter-terrorism organizations
215:. In such a case, the principal agent can serve as a 315:. Other elements of tradecraft include elicitation, 1243: 1185: 1145: 1090: 1047: 912: 874: 845: 836: 645: 614: 524: 501: 423: 284:, or other inducements, such as sexual approaches. 98:. Unsourced material may be challenged and removed. 365:, thefreedictionary.com, retrieved 4 March 2009 814: 401: 379:Human Intelligence: From Sleepers to Walk-ins 8: 851: 842: 821: 807: 799: 408: 394: 386: 158:Learn how and when to remove this message 1235:Scientific & Technical intelligence 355: 658:Chinese espionage in the United States 7: 1057:By alliances, nations and industries 653:Chinese intelligence activity abroad 223:standard principles of intelligence 96:adding citations to reliable sources 719:Interpersonal (HUMINT) intelligence 25: 554:Computer and network surveillance 263:Agents, spotting, and recruitment 589:Short-range agent communications 72: 31: 1205:Words of estimative probability 1067:Operational platforms by nation 178:is the management of so-called 83:needs additional citations for 1: 1253:Intelligence cycle security 1312: 172:intelligence organizations 854: 40:This article needs to be 311:, and the employment of 1220:Intelligence assessment 1210:All-source intelligence 830:Intelligence management 539:Covert listening device 509:Intelligence assessment 904:Operational techniques 859:Special reconnaissance 307:, the construction of 788:Targeted surveillance 188:intelligence officers 1225:Medical intelligence 1195:Competing hypotheses 1005:Industrial espionage 990:Denial and deception 714:Industrial espionage 514:competing hypotheses 92:improve this article 1258:Counterintelligence 1173:Technical (TECHINT) 1168:Open-source (OSINT) 1158:Geospatial (GEOINT) 1132:Casualty estimation 321:countersurveillance 309:concealment devices 190:typically known as 1230:Military geography 1215:Basic intelligence 1153:Financial (FININT) 1094:signature (MASINT) 1020:One-way voice link 956:Concealment device 665:Cold War espionage 632:Front organization 606:Surveillance tools 584:Phone surveillance 579:One-way voice link 534:Concealment device 198:Human intelligence 1278: 1277: 1181: 1180: 1072:Direction finding 1062:In modern history 1043: 1042: 796: 795: 450:Agent provocateur 168: 167: 160: 142: 61: 60: 16:(Redirected from 1303: 1077:Traffic analysis 1049:Signals (SIGINT) 884:Asset recruiting 852: 843: 823: 816: 809: 800: 410: 403: 396: 387: 366: 360: 329:cover for action 325:cover for status 213:cellular fashion 163: 156: 152: 149: 143: 141: 107:"Agent handling" 100: 76: 68: 56: 53: 47: 35: 34: 27: 21: 1311: 1310: 1306: 1305: 1304: 1302: 1301: 1300: 1281: 1280: 1279: 1274: 1239: 1177: 1163:Imagery (IMINT) 1141: 1102:Electro-optical 1093: 1092:Measurement and 1086: 1039: 1015:Numbers station 944:Black operation 908: 870: 832: 827: 797: 792: 766:Sting operation 675:Black operation 641: 637:Limited hangout 619: 610: 574:Numbers station 526: 520: 497: 437: 419: 414: 374: 369: 361: 357: 353: 341: 293: 265: 252: 200: 164: 153: 147: 144: 101: 99: 89: 77: 64: 57: 51: 48: 45: 36: 32: 23: 22: 15: 12: 11: 5: 1309: 1307: 1299: 1298: 1293: 1283: 1282: 1276: 1275: 1273: 1272: 1267: 1266: 1265: 1255: 1249: 1247: 1241: 1240: 1238: 1237: 1232: 1227: 1222: 1217: 1212: 1207: 1202: 1200:Target-centric 1197: 1191: 1189: 1183: 1182: 1179: 1178: 1176: 1175: 1170: 1165: 1160: 1155: 1149: 1147: 1143: 1142: 1140: 1139: 1129: 1124: 1122:Radiofrequency 1119: 1114: 1109: 1104: 1098: 1096: 1088: 1087: 1085: 1084: 1079: 1074: 1069: 1064: 1059: 1053: 1051: 1045: 1044: 1041: 1040: 1038: 1037: 1032: 1027: 1022: 1017: 1012: 1007: 1002: 997: 992: 987: 978: 973: 968: 963: 958: 953: 952: 951: 941: 936: 935: 934: 929: 918: 916: 910: 909: 907: 906: 901: 896: 891: 886: 880: 878: 872: 871: 869: 868: 867: 866: 855: 849: 847:Human (HUMINT) 840: 834: 833: 828: 826: 825: 818: 811: 803: 794: 793: 791: 790: 785: 784: 783: 778: 768: 763: 758: 753: 748: 743: 738: 733: 732: 731: 726: 716: 711: 706: 705: 704: 699: 689: 688: 687: 682: 672: 667: 662: 661: 660: 649: 647: 643: 642: 640: 639: 634: 629: 623: 621: 612: 611: 609: 608: 603: 602: 601: 591: 586: 581: 576: 571: 566: 561: 556: 551: 546: 541: 536: 530: 528: 527:communications 522: 521: 519: 518: 517: 516: 505: 503: 499: 498: 496: 495: 490: 485: 480: 475: 470: 465: 464: 463: 453: 446: 444:Agent handling 440: 438: 436: 435: 430: 424: 421: 420: 415: 413: 412: 405: 398: 390: 384: 383: 373: 372:External links 370: 368: 367: 354: 352: 349: 348: 347: 340: 337: 292: 289: 264: 261: 251: 248: 199: 196: 176:agent handling 166: 165: 80: 78: 71: 63:Spy management 62: 59: 58: 39: 37: 30: 24: 14: 13: 10: 9: 6: 4: 3: 2: 1308: 1297: 1296:Spies by role 1294: 1292: 1289: 1288: 1286: 1271: 1268: 1264: 1263:organizations 1261: 1260: 1259: 1256: 1254: 1251: 1250: 1248: 1246: 1245:Dissemination 1242: 1236: 1233: 1231: 1228: 1226: 1223: 1221: 1218: 1216: 1213: 1211: 1208: 1206: 1203: 1201: 1198: 1196: 1193: 1192: 1190: 1188: 1184: 1174: 1171: 1169: 1166: 1164: 1161: 1159: 1156: 1154: 1151: 1150: 1148: 1144: 1137: 1133: 1130: 1128: 1125: 1123: 1120: 1118: 1115: 1113: 1110: 1108: 1105: 1103: 1100: 1099: 1097: 1095: 1089: 1083: 1080: 1078: 1075: 1073: 1070: 1068: 1065: 1063: 1060: 1058: 1055: 1054: 1052: 1050: 1046: 1036: 1033: 1031: 1030:Steganography 1028: 1026: 1023: 1021: 1018: 1016: 1013: 1011: 1010:Interrogation 1008: 1006: 1003: 1001: 998: 996: 995:Eavesdropping 993: 991: 988: 986: 982: 979: 977: 974: 972: 969: 967: 964: 962: 959: 957: 954: 950: 947: 946: 945: 942: 940: 937: 933: 930: 928: 925: 924: 923: 920: 919: 917: 915: 911: 905: 902: 900: 899:Direct action 897: 895: 894:Covert action 892: 890: 887: 885: 882: 881: 879: 877: 873: 865: 864:organizations 862: 861: 860: 857: 856: 853: 850: 848: 844: 841: 839: 835: 831: 824: 819: 817: 812: 810: 805: 804: 801: 789: 786: 782: 779: 777: 774: 773: 772: 769: 767: 764: 762: 759: 757: 754: 752: 749: 747: 744: 742: 739: 737: 734: 730: 727: 725: 724:interrogation 722: 721: 720: 717: 715: 712: 710: 707: 703: 700: 698: 695: 694: 693: 692:Eavesdropping 690: 686: 683: 681: 678: 677: 676: 673: 671: 668: 666: 663: 659: 656: 655: 654: 651: 650: 648: 644: 638: 635: 633: 630: 628: 625: 624: 622: 617: 613: 607: 604: 600: 597: 596: 595: 594:Steganography 592: 590: 587: 585: 582: 580: 577: 575: 572: 570: 569:Invisible ink 567: 565: 562: 560: 557: 555: 552: 550: 547: 545: 542: 540: 537: 535: 532: 531: 529: 523: 515: 512: 511: 510: 507: 506: 504: 500: 494: 491: 489: 488:Sleeper agent 486: 484: 481: 479: 476: 474: 471: 469: 466: 462: 459: 458: 457: 454: 452: 451: 447: 445: 442: 441: 439: 434: 431: 429: 426: 425: 422: 418: 411: 406: 404: 399: 397: 392: 391: 388: 381: 380: 376: 375: 371: 364: 359: 356: 350: 346: 343: 342: 338: 336: 334: 333:interrogation 330: 326: 322: 318: 314: 310: 306: 305:one-time pads 303:, the use of 302: 298: 297:communication 290: 288: 285: 283: 279: 275: 269: 262: 260: 258: 249: 247: 244: 240: 238: 237:interrogation 233: 231: 226: 220: 218: 214: 208: 206: 197: 195: 193: 192:case officers 189: 185: 181: 177: 173: 162: 159: 151: 140: 137: 133: 130: 126: 123: 119: 116: 112: 109: –  108: 104: 103:Find sources: 97: 93: 87: 86: 81:This article 79: 75: 70: 69: 66: 55: 43: 38: 29: 28: 19: 18:Agent handler 1035:Surveillance 1025:Resident spy 966:Cryptography 931: 771:Surveillance 559:Cyber spying 544:Cryptography 483:Resident spy 468:Double agent 448: 443: 378: 363:case officer 358: 328: 324: 317:surveillance 301:cryptography 299:, including 294: 286: 270: 266: 253: 250:Case officer 245: 241: 234: 221: 209: 201: 191: 175: 169: 154: 145: 135: 128: 121: 114: 102: 90:Please help 85:verification 82: 65: 52:October 2023 49: 41: 1107:Geophysical 889:Cell system 876:Clandestine 761:Stay-behind 670:Recruitment 627:Canary trap 525:Devices and 473:Field agent 230:clandestine 1285:Categories 1136:earthquake 1000:False flag 838:Collection 756:Sexpionage 736:COINTELPRO 729:safe house 709:False flag 646:Operations 620:techniques 616:Tradecraft 351:References 313:dead drops 274:bona fides 257:tradecraft 225:tradecraft 148:March 2012 118:newspapers 1291:Espionage 1127:Materials 981:Defection 976:Dead drop 949:black bag 914:Espionage 680:black bag 564:Dead drop 493:Spymaster 417:Espionage 282:blackmail 217:"cut-out" 1187:Analysis 985:Turncoat 932:handling 746:SHAMROCK 599:microdot 502:Analysis 339:See also 291:Training 278:coercion 1134: ( 1112:Nuclear 1082:TEMPEST 741:MINARET 685:wetwork 186:") by 132:scholar 42:updated 971:Cutout 922:Agents 776:Global 702:MASINT 697:SIGINT 549:Cutout 433:Assets 428:Agents 345:Minder 327:, and 205:HUMINT 184:assets 180:agents 134:  127:  120:  113:  105:  1146:Other 1117:Radar 961:Cover 939:Asset 927:field 461:Agent 456:Cover 139:JSTOR 125:books 781:Mass 751:FVEY 478:Mole 319:and 111:news 618:and 170:In 94:by 1287:: 983:/ 335:. 280:, 207:. 194:. 174:, 1138:) 822:e 815:t 808:v 409:e 402:t 395:v 161:) 155:( 150:) 146:( 136:· 129:· 122:· 115:· 88:. 54:) 50:( 44:. 20:)

Index

Agent handler

verification
improve this article
adding citations to reliable sources
"Agent handling"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
intelligence organizations
agents
assets
intelligence officers
HUMINT
cellular fashion
"cut-out"
tradecraft
clandestine
interrogation
tradecraft
bona fides
coercion
blackmail
communication
cryptography
one-time pads
concealment devices

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.