33:
74:
259:. Case officers emphasize the elements of tradecraft that enable the agent to acquire needed information, and enable the case officer to communicate with and supervise the agent. Most importantly, case officers train agents in methods of avoiding detection by host nation counter-intelligence organizations.
331:, meaning how to establish credible pretexts for their presence and behavior while engaged in collection activities. A well-trained and competent agent can conduct his or her clandestine tasks while under close surveillance, and still evade detection. More advanced agent training can include resistance to
267:
By definition, an "agent" acts on behalf of another, whether another individual, an organization, or a foreign government. Agents can be considered either witting or unwitting, and in some cases, willing or unwilling. Agents typically work under the direction of a principal agent or a case officer.
242:
If principles of intelligence tradecraft have not been strictly observed, it is also possible that compromised agents can reveal information that exposes other members of the network. In the real world of espionage, human lapses are very much the norm, and violations of the principles of tradecraft
202:
A primary purpose of intelligence organizations is to penetrate a target with a human agent, or a network of human agents. Such agents can either infiltrate the target, or be recruited "in place". Case officers are professionally trained employees of intelligence organizations that manage human
222:
Using a principal agent as a cut-out, and ensuring that the human agent network is organized in a cellular fashion, can provide some protection for other agents in the network, as well as for the principal agent, and for the case officer if an agent in the network is compromised. Assuming that
323:, photography and the emplacement of audio devices, sensors, or other transmitters. Case officers generally train agents one at a time, in isolation, including only those elements of tradecraft needed to penetrate the target at hand. Case officers will also teach agents how to develop
210:
Sometimes, agent handling is done indirectly, through "principal agents" that serve as proxies for case officers. It is not uncommon, for example, for a case officer to manage a number of principal agents, who in turn handle agent networks, which are preferably organized in a
254:
A case officer is an intelligence officer who is a trained specialist in the management of agents and agent networks. Case officers manage human agents and human intelligence networks. Case officers spot potential agents, recruit prospective agents and train agents in
227:
have been strictly observed by the principal agent and the agents in the network, compromised agents will not be able to identify the case officer, nor the other members of the network. Ideally, agents may work side by side in the same office, and conduct their
271:
The identification of potential agents is termed "agent spotting" (also termed "talent spotting"). Identifying potential agents, and investigating the details of their personal and professional lives, involves the granular verification of their
1056:
1269:
287:
Approaches to potential agents can be multitudinous and considerable time can pass before the potential agent is maneuvered into a position where a recruitment "pitch" can be hazarded.
820:
1066:
382:, Thomas Patrick Carroll, Syllabus, 5 September 2006 – 24 October 2006—many good definitions with historic examples and timely discussion of problems; in outline form.
246:
If an agent is able to resist interrogation for a defined period of time, the odds improve that other members of the network can be alerted to the compromise.
1199:
863:
377:
846:
813:
718:
204:
232:
collection activities with such discipline, that they will not realize that they are both engaged in espionage, much less members of the same network.
1262:
903:
1091:
1061:
806:
701:
657:
1244:
893:
652:
239:
that can lead to the identification of a principal agent, the protection provided by cellular network organization can be time-sensitive.
407:
837:
553:
157:
1194:
1186:
588:
513:
1204:
91:
1135:
960:
875:
455:
138:
95:
110:
829:
243:
are common. It is for this reason that agents are ideally trained to resist interrogation for a defined period of time.
1252:
117:
84:
203:
agents and human agent networks. Intelligence that derives from such human sources is known by the abbreviation
124:
1167:
898:
1219:
1209:
1157:
888:
538:
508:
400:
212:
106:
1295:
1234:
1172:
1152:
1101:
858:
1121:
787:
229:
235:
Since an agent can sometimes identify his or her principal agent, however, or reveal information under
1224:
1162:
1048:
1004:
989:
938:
883:
713:
696:
669:
432:
187:
183:
276:. Such activities can include uncovering personal details that leave potential agents vulnerable to
1257:
1131:
948:
775:
679:
320:
216:
171:
182:(called secret agents or spies in common parlance), principal agents, and agent networks (called "
1290:
1229:
1214:
1106:
1081:
1019:
970:
955:
664:
631:
605:
583:
578:
548:
533:
393:
308:
268:
When agents work alone, and are not members of an agent network, they are termed "singletons".
1071:
780:
449:
1126:
1076:
745:
477:
131:
1014:
943:
765:
740:
674:
636:
573:
46:
Please help update this article to reflect recent events or newly available information.
1111:
219:
for the case officer, buffering him or her from direct contact with the agent network.
1284:
1029:
1009:
994:
723:
691:
593:
568:
487:
332:
296:
236:
1116:
1034:
1024:
965:
770:
558:
543:
482:
467:
460:
316:
304:
300:
926:
760:
626:
472:
362:
73:
999:
755:
735:
728:
708:
615:
273:
256:
224:
17:
980:
975:
921:
913:
750:
563:
492:
427:
416:
312:
281:
179:
295:
Agent training often includes techniques of tradecraft such as clandestine
798:
984:
598:
277:
684:
344:
802:
389:
67:
26:
385:
1270:
Counterintelligence and counter-terrorism organizations
215:. In such a case, the principal agent can serve as a
315:. Other elements of tradecraft include elicitation,
1243:
1185:
1145:
1090:
1047:
912:
874:
845:
836:
645:
614:
524:
501:
423:
284:, or other inducements, such as sexual approaches.
98:. Unsourced material may be challenged and removed.
365:, thefreedictionary.com, retrieved 4 March 2009
814:
401:
379:Human Intelligence: From Sleepers to Walk-ins
8:
851:
842:
821:
807:
799:
408:
394:
386:
158:Learn how and when to remove this message
1235:Scientific & Technical intelligence
355:
658:Chinese espionage in the United States
7:
1057:By alliances, nations and industries
653:Chinese intelligence activity abroad
223:standard principles of intelligence
96:adding citations to reliable sources
719:Interpersonal (HUMINT) intelligence
25:
554:Computer and network surveillance
263:Agents, spotting, and recruitment
589:Short-range agent communications
72:
31:
1205:Words of estimative probability
1067:Operational platforms by nation
178:is the management of so-called
83:needs additional citations for
1:
1253:Intelligence cycle security
1312:
172:intelligence organizations
854:
40:This article needs to be
311:, and the employment of
1220:Intelligence assessment
1210:All-source intelligence
830:Intelligence management
539:Covert listening device
509:Intelligence assessment
904:Operational techniques
859:Special reconnaissance
307:, the construction of
788:Targeted surveillance
188:intelligence officers
1225:Medical intelligence
1195:Competing hypotheses
1005:Industrial espionage
990:Denial and deception
714:Industrial espionage
514:competing hypotheses
92:improve this article
1258:Counterintelligence
1173:Technical (TECHINT)
1168:Open-source (OSINT)
1158:Geospatial (GEOINT)
1132:Casualty estimation
321:countersurveillance
309:concealment devices
190:typically known as
1230:Military geography
1215:Basic intelligence
1153:Financial (FININT)
1094:signature (MASINT)
1020:One-way voice link
956:Concealment device
665:Cold War espionage
632:Front organization
606:Surveillance tools
584:Phone surveillance
579:One-way voice link
534:Concealment device
198:Human intelligence
1278:
1277:
1181:
1180:
1072:Direction finding
1062:In modern history
1043:
1042:
796:
795:
450:Agent provocateur
168:
167:
160:
142:
61:
60:
16:(Redirected from
1303:
1077:Traffic analysis
1049:Signals (SIGINT)
884:Asset recruiting
852:
843:
823:
816:
809:
800:
410:
403:
396:
387:
366:
360:
329:cover for action
325:cover for status
213:cellular fashion
163:
156:
152:
149:
143:
141:
107:"Agent handling"
100:
76:
68:
56:
53:
47:
35:
34:
27:
21:
1311:
1310:
1306:
1305:
1304:
1302:
1301:
1300:
1281:
1280:
1279:
1274:
1239:
1177:
1163:Imagery (IMINT)
1141:
1102:Electro-optical
1093:
1092:Measurement and
1086:
1039:
1015:Numbers station
944:Black operation
908:
870:
832:
827:
797:
792:
766:Sting operation
675:Black operation
641:
637:Limited hangout
619:
610:
574:Numbers station
526:
520:
497:
437:
419:
414:
374:
369:
361:
357:
353:
341:
293:
265:
252:
200:
164:
153:
147:
144:
101:
99:
89:
77:
64:
57:
51:
48:
45:
36:
32:
23:
22:
15:
12:
11:
5:
1309:
1307:
1299:
1298:
1293:
1283:
1282:
1276:
1275:
1273:
1272:
1267:
1266:
1265:
1255:
1249:
1247:
1241:
1240:
1238:
1237:
1232:
1227:
1222:
1217:
1212:
1207:
1202:
1200:Target-centric
1197:
1191:
1189:
1183:
1182:
1179:
1178:
1176:
1175:
1170:
1165:
1160:
1155:
1149:
1147:
1143:
1142:
1140:
1139:
1129:
1124:
1122:Radiofrequency
1119:
1114:
1109:
1104:
1098:
1096:
1088:
1087:
1085:
1084:
1079:
1074:
1069:
1064:
1059:
1053:
1051:
1045:
1044:
1041:
1040:
1038:
1037:
1032:
1027:
1022:
1017:
1012:
1007:
1002:
997:
992:
987:
978:
973:
968:
963:
958:
953:
952:
951:
941:
936:
935:
934:
929:
918:
916:
910:
909:
907:
906:
901:
896:
891:
886:
880:
878:
872:
871:
869:
868:
867:
866:
855:
849:
847:Human (HUMINT)
840:
834:
833:
828:
826:
825:
818:
811:
803:
794:
793:
791:
790:
785:
784:
783:
778:
768:
763:
758:
753:
748:
743:
738:
733:
732:
731:
726:
716:
711:
706:
705:
704:
699:
689:
688:
687:
682:
672:
667:
662:
661:
660:
649:
647:
643:
642:
640:
639:
634:
629:
623:
621:
612:
611:
609:
608:
603:
602:
601:
591:
586:
581:
576:
571:
566:
561:
556:
551:
546:
541:
536:
530:
528:
527:communications
522:
521:
519:
518:
517:
516:
505:
503:
499:
498:
496:
495:
490:
485:
480:
475:
470:
465:
464:
463:
453:
446:
444:Agent handling
440:
438:
436:
435:
430:
424:
421:
420:
415:
413:
412:
405:
398:
390:
384:
383:
373:
372:External links
370:
368:
367:
354:
352:
349:
348:
347:
340:
337:
292:
289:
264:
261:
251:
248:
199:
196:
176:agent handling
166:
165:
80:
78:
71:
63:Spy management
62:
59:
58:
39:
37:
30:
24:
14:
13:
10:
9:
6:
4:
3:
2:
1308:
1297:
1296:Spies by role
1294:
1292:
1289:
1288:
1286:
1271:
1268:
1264:
1263:organizations
1261:
1260:
1259:
1256:
1254:
1251:
1250:
1248:
1246:
1245:Dissemination
1242:
1236:
1233:
1231:
1228:
1226:
1223:
1221:
1218:
1216:
1213:
1211:
1208:
1206:
1203:
1201:
1198:
1196:
1193:
1192:
1190:
1188:
1184:
1174:
1171:
1169:
1166:
1164:
1161:
1159:
1156:
1154:
1151:
1150:
1148:
1144:
1137:
1133:
1130:
1128:
1125:
1123:
1120:
1118:
1115:
1113:
1110:
1108:
1105:
1103:
1100:
1099:
1097:
1095:
1089:
1083:
1080:
1078:
1075:
1073:
1070:
1068:
1065:
1063:
1060:
1058:
1055:
1054:
1052:
1050:
1046:
1036:
1033:
1031:
1030:Steganography
1028:
1026:
1023:
1021:
1018:
1016:
1013:
1011:
1010:Interrogation
1008:
1006:
1003:
1001:
998:
996:
995:Eavesdropping
993:
991:
988:
986:
982:
979:
977:
974:
972:
969:
967:
964:
962:
959:
957:
954:
950:
947:
946:
945:
942:
940:
937:
933:
930:
928:
925:
924:
923:
920:
919:
917:
915:
911:
905:
902:
900:
899:Direct action
897:
895:
894:Covert action
892:
890:
887:
885:
882:
881:
879:
877:
873:
865:
864:organizations
862:
861:
860:
857:
856:
853:
850:
848:
844:
841:
839:
835:
831:
824:
819:
817:
812:
810:
805:
804:
801:
789:
786:
782:
779:
777:
774:
773:
772:
769:
767:
764:
762:
759:
757:
754:
752:
749:
747:
744:
742:
739:
737:
734:
730:
727:
725:
724:interrogation
722:
721:
720:
717:
715:
712:
710:
707:
703:
700:
698:
695:
694:
693:
692:Eavesdropping
690:
686:
683:
681:
678:
677:
676:
673:
671:
668:
666:
663:
659:
656:
655:
654:
651:
650:
648:
644:
638:
635:
633:
630:
628:
625:
624:
622:
617:
613:
607:
604:
600:
597:
596:
595:
594:Steganography
592:
590:
587:
585:
582:
580:
577:
575:
572:
570:
569:Invisible ink
567:
565:
562:
560:
557:
555:
552:
550:
547:
545:
542:
540:
537:
535:
532:
531:
529:
523:
515:
512:
511:
510:
507:
506:
504:
500:
494:
491:
489:
488:Sleeper agent
486:
484:
481:
479:
476:
474:
471:
469:
466:
462:
459:
458:
457:
454:
452:
451:
447:
445:
442:
441:
439:
434:
431:
429:
426:
425:
422:
418:
411:
406:
404:
399:
397:
392:
391:
388:
381:
380:
376:
375:
371:
364:
359:
356:
350:
346:
343:
342:
338:
336:
334:
333:interrogation
330:
326:
322:
318:
314:
310:
306:
305:one-time pads
303:, the use of
302:
298:
297:communication
290:
288:
285:
283:
279:
275:
269:
262:
260:
258:
249:
247:
244:
240:
238:
237:interrogation
233:
231:
226:
220:
218:
214:
208:
206:
197:
195:
193:
192:case officers
189:
185:
181:
177:
173:
162:
159:
151:
140:
137:
133:
130:
126:
123:
119:
116:
112:
109: –
108:
104:
103:Find sources:
97:
93:
87:
86:
81:This article
79:
75:
70:
69:
66:
55:
43:
38:
29:
28:
19:
18:Agent handler
1035:Surveillance
1025:Resident spy
966:Cryptography
931:
771:Surveillance
559:Cyber spying
544:Cryptography
483:Resident spy
468:Double agent
448:
443:
378:
363:case officer
358:
328:
324:
317:surveillance
301:cryptography
299:, including
294:
286:
270:
266:
253:
250:Case officer
245:
241:
234:
221:
209:
201:
191:
175:
169:
154:
145:
135:
128:
121:
114:
102:
90:Please help
85:verification
82:
65:
52:October 2023
49:
41:
1107:Geophysical
889:Cell system
876:Clandestine
761:Stay-behind
670:Recruitment
627:Canary trap
525:Devices and
473:Field agent
230:clandestine
1285:Categories
1136:earthquake
1000:False flag
838:Collection
756:Sexpionage
736:COINTELPRO
729:safe house
709:False flag
646:Operations
620:techniques
616:Tradecraft
351:References
313:dead drops
274:bona fides
257:tradecraft
225:tradecraft
148:March 2012
118:newspapers
1291:Espionage
1127:Materials
981:Defection
976:Dead drop
949:black bag
914:Espionage
680:black bag
564:Dead drop
493:Spymaster
417:Espionage
282:blackmail
217:"cut-out"
1187:Analysis
985:Turncoat
932:handling
746:SHAMROCK
599:microdot
502:Analysis
339:See also
291:Training
278:coercion
1134: (
1112:Nuclear
1082:TEMPEST
741:MINARET
685:wetwork
186:") by
132:scholar
42:updated
971:Cutout
922:Agents
776:Global
702:MASINT
697:SIGINT
549:Cutout
433:Assets
428:Agents
345:Minder
327:, and
205:HUMINT
184:assets
180:agents
134:
127:
120:
113:
105:
1146:Other
1117:Radar
961:Cover
939:Asset
927:field
461:Agent
456:Cover
139:JSTOR
125:books
781:Mass
751:FVEY
478:Mole
319:and
111:news
618:and
170:In
94:by
1287::
983:/
335:.
280:,
207:.
194:.
174:,
1138:)
822:e
815:t
808:v
409:e
402:t
395:v
161:)
155:(
150:)
146:(
136:·
129:·
122:·
115:·
88:.
54:)
50:(
44:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.