33:
146:, 407 U.S. 297. The FBI still carries out numerous "black bag" entry-and-search missions, in which the search is covert and the target of the investigation is not informed that the search took place. If the investigation involves a criminal matter, a judicial warrant is required; in national security cases the operation must be approved by the
157:
had defected from the Soviet underground and had started talking to the FBI, the FBI broke into her
Brooklyn hotel to do a "black bag job" to verify her own background – and to look for anything that would invoke suspicion. "They found nothing out of the ordinary." Bentley had learned how to dodge
105:
Prior to it being discontinued, there had been over two hundred instances of black bag jobs organized by the FBI, for purposes other than installing microphones (as well as over 500 warrant-less microphone installations). These were approved in writing by Hoover as well as by Hoover's deputy
110:, with most records being destroyed after the job was complete. Agents that performed the jobs were trained in lock studies or electronic surveillance. In many cases, lock-picking was not required and a key could be accessed from a landlord, hotel manager, or a neighbor.
162:
She learned how to determine if enemy agents had discovered secret documents in her possession. "If I had to leave the apartment, I was careful to put them in my black trunk and tie a thin black thread around it so that I would know if they had been tampered with in my
167:
The CIA has used black bag operations to steal cryptography and other secrets from foreign government offices outside the United States. The practice (by preceding U.S. intelligence organizations) dates back at least as far as 1916.
32:
90:(FBI) agents entered offices of targeted individuals and organizations, and photographed information found in their records. This practice was used by the FBI from 1942 through the 1960s. In July 1966, FBI Director
415:
78:(including audio and video surveillance), mail manipulation (flaps and seals), and forgery. The term "black bag" refers to the small bags in which burglars stereotypically carry their tools.
1279:
1492:
1043:
363:
1289:
1518:
550:
399:
1422:
1086:
1069:
1036:
941:
1485:
1126:
1523:
147:
1314:
1284:
1029:
924:
880:
1467:
304:
1116:
875:
142:
630:
1060:
511:
776:
519:
481:
245:
1417:
1409:
811:
736:
1427:
300:
87:
1513:
1358:
1183:
1098:
678:
1052:
542:
36:
Collection of burglar's tools, with objects such as lockpicks, drills, skeleton keys such as are used in black bag jobs.
1475:
133:
274:
233:
177:
102:
to reintroduce black bag jobs, but Hoover opposed this, and approval was revoked five days after it was approved.
1390:
1121:
442:
137:
1442:
1432:
1380:
1111:
761:
731:
623:
1457:
1395:
1375:
1324:
1081:
1344:
1010:
216:
52:
1447:
1385:
1271:
1227:
1212:
1161:
1106:
936:
919:
892:
655:
1480:
1354:
998:
368:
126:
122:
114:
438:
1452:
1437:
1329:
1304:
1242:
1193:
1178:
887:
854:
828:
806:
801:
771:
756:
616:
296:
182:
1294:
1003:
672:
598:
515:
477:
407:
373:
241:
211:
188:
154:
1349:
1299:
968:
700:
578:
Supplementary
Detailed Staff Reports on Intelligence Activities and the Rights of Americans
1237:
1166:
988:
963:
897:
859:
796:
201:
95:
91:
62:
Some of the tactics, techniques, and procedures associated with black bag operations are
1334:
1154:
666:
463:
1507:
1252:
1232:
1217:
946:
914:
816:
791:
710:
602:
473:
67:
17:
1339:
1257:
1247:
1188:
993:
781:
766:
705:
690:
683:
118:
107:
75:
63:
505:
467:
1149:
983:
849:
695:
584:
99:
71:
1222:
978:
958:
951:
931:
838:
206:
411:
377:
1203:
1198:
1144:
1136:
973:
786:
715:
650:
639:
577:
132:
The use of "black bag jobs" by the FBI was declared unconstitutional by the
1021:
1207:
821:
266:
907:
469:
Clever Girl: Elizabeth
Bentley, the Spy Who Ushered in the McCarthy Era
238:
Spy
Catcher: The Candid Autobiography of a Senior Intelligence Officer
56:
48:
267:"Tallinn government surveillance cameras reveal black bag operation"
576:
Select
Committee to Study Governmental Operations (23 April 1976).
31:
1025:
612:
608:
158:
such intrusions from her earliest days in the underground:
121:
subsequently testified that Hoover and acting FBI director
1493:
Counterintelligence and counter-terrorism organizations
1466:
1408:
1368:
1313:
1270:
1135:
1097:
1068:
1059:
868:
837:
747:
724:
646:
364:"Testimony Cites Hoover Approval of Black-Bag Jobs"
55:entries into structures to obtain information for
507:Red Spy Queen: A Biography of Elizabeth Bentley
543:"The CIA Code Thief Who Came in from the Cold"
1037:
624:
94:allegedly ordered the practice discontinued.
8:
1519:Federal Bureau of Investigation operations
1074:
1065:
1044:
1030:
1022:
631:
617:
609:
125:authorized "black bag" jobs against the
1458:Scientific & Technical intelligence
504:Olmsted, Kathryn J. (3 November 2003).
258:
172:Black bag operations in popular culture
148:Foreign Intelligence Surveillance Court
881:Chinese espionage in the United States
400:"FBI 'Bag Jobs' Allowable, Court Told"
349:
337:
325:
307:from the original on 12 September 2022
439:"FBI to Boost 'Black Bag' Search Ops"
398:Kiernan, Laura A. (16 October 1980).
362:Robinson, Timothy S. (13 July 1978).
27:Covert entries to gather intelligence
7:
1280:By alliances, nations and industries
876:Chinese intelligence activity abroad
418:from the original on 24 January 2020
297:"Freedom of Information/Privacy Act"
143:United States v. U.S. District Court
942:Interpersonal (HUMINT) intelligence
553:from the original on 27 April 2013
512:University of North Carolina Press
25:
777:Computer and network surveillance
277:from the original on 1 April 2013
812:Short-range agent communications
1524:Intelligence operations by type
1428:Words of estimative probability
1290:Operational platforms by nation
301:Federal Bureau of Investigation
88:Federal Bureau of Investigation
1:
437:Rood, Justin (15 June 2007).
153:In 1947, after American spy
1476:Intelligence cycle security
134:United States Supreme Court
1540:
178:Sam Fisher (Splinter Cell)
74:, photography, electronic
1077:
86:In black bag operations,
599:"11 Terms Used by Spies"
1443:Intelligence assessment
1433:All-source intelligence
1053:Intelligence management
762:Covert listening device
732:Intelligence assessment
136:on 19 June 1972 in the
1127:Operational techniques
1082:Special reconnaissance
165:
37:
1514:Cryptographic attacks
1011:Targeted surveillance
240:. Penguin USA, 1987.
217:Parallel construction
160:
98:in 1970 proposed the
35:
1448:Medical intelligence
1418:Competing hypotheses
1228:Industrial espionage
1213:Denial and deception
937:Industrial espionage
737:competing hypotheses
273:. 16 December 2008.
41:Black bag operations
18:Black Bag Operations
1481:Counterintelligence
1396:Technical (TECHINT)
1391:Open-source (OSINT)
1381:Geospatial (GEOINT)
1355:Casualty estimation
466:(13 October 2009).
404:The Washington Post
369:The Washington Post
129:from 1970 to 1973.
127:Weather Underground
123:L. Patrick Gray III
115:William C. Sullivan
70:, key impressions,
1453:Military geography
1438:Basic intelligence
1376:Financial (FININT)
1317:signature (MASINT)
1243:One-way voice link
1179:Concealment device
888:Cold War espionage
855:Front organization
829:Surveillance tools
807:Phone surveillance
802:One-way voice link
757:Concealment device
514:. pp. 26–27.
228:General references
183:Sombra (Overwatch)
57:human intelligence
38:
1501:
1500:
1404:
1403:
1295:Direction finding
1285:In modern history
1266:
1265:
1019:
1018:
673:Agent provocateur
212:Elizabeth Bentley
189:The Doorbell Rang
155:Elizabeth Bentley
16:(Redirected from
1531:
1300:Traffic analysis
1272:Signals (SIGINT)
1107:Asset recruiting
1075:
1066:
1046:
1039:
1032:
1023:
633:
626:
619:
610:
588:
582:
563:
562:
560:
558:
539:
533:
532:
530:
528:
501:
495:
494:
492:
490:
460:
454:
453:
451:
449:
434:
428:
427:
425:
423:
395:
389:
388:
386:
384:
359:
353:
347:
341:
335:
329:
323:
317:
316:
314:
312:
293:
287:
286:
284:
282:
263:
253:Inline citations
21:
1539:
1538:
1534:
1533:
1532:
1530:
1529:
1528:
1504:
1503:
1502:
1497:
1462:
1400:
1386:Imagery (IMINT)
1364:
1325:Electro-optical
1316:
1315:Measurement and
1309:
1262:
1238:Numbers station
1167:Black operation
1131:
1093:
1055:
1050:
1020:
1015:
989:Sting operation
898:Black operation
864:
860:Limited hangout
842:
833:
797:Numbers station
749:
743:
720:
660:
642:
637:
595:
580:
575:
572:
567:
566:
556:
554:
541:
540:
536:
526:
524:
522:
503:
502:
498:
488:
486:
484:
476:. p. 130.
464:Kessler, Lauren
462:
461:
457:
447:
445:
436:
435:
431:
421:
419:
397:
396:
392:
382:
380:
361:
360:
356:
348:
344:
336:
332:
324:
320:
310:
308:
295:
294:
290:
280:
278:
265:
264:
260:
255:
230:
225:
202:Black operation
198:
174:
96:President Nixon
92:J. Edgar Hoover
84:
28:
23:
22:
15:
12:
11:
5:
1537:
1535:
1527:
1526:
1521:
1516:
1506:
1505:
1499:
1498:
1496:
1495:
1490:
1489:
1488:
1478:
1472:
1470:
1464:
1463:
1461:
1460:
1455:
1450:
1445:
1440:
1435:
1430:
1425:
1423:Target-centric
1420:
1414:
1412:
1406:
1405:
1402:
1401:
1399:
1398:
1393:
1388:
1383:
1378:
1372:
1370:
1366:
1365:
1363:
1362:
1352:
1347:
1345:Radiofrequency
1342:
1337:
1332:
1327:
1321:
1319:
1311:
1310:
1308:
1307:
1302:
1297:
1292:
1287:
1282:
1276:
1274:
1268:
1267:
1264:
1263:
1261:
1260:
1255:
1250:
1245:
1240:
1235:
1230:
1225:
1220:
1215:
1210:
1201:
1196:
1191:
1186:
1181:
1176:
1175:
1174:
1164:
1159:
1158:
1157:
1152:
1141:
1139:
1133:
1132:
1130:
1129:
1124:
1119:
1114:
1109:
1103:
1101:
1095:
1094:
1092:
1091:
1090:
1089:
1078:
1072:
1070:Human (HUMINT)
1063:
1057:
1056:
1051:
1049:
1048:
1041:
1034:
1026:
1017:
1016:
1014:
1013:
1008:
1007:
1006:
1001:
991:
986:
981:
976:
971:
966:
961:
956:
955:
954:
949:
939:
934:
929:
928:
927:
922:
912:
911:
910:
905:
895:
890:
885:
884:
883:
872:
870:
866:
865:
863:
862:
857:
852:
846:
844:
835:
834:
832:
831:
826:
825:
824:
814:
809:
804:
799:
794:
789:
784:
779:
774:
769:
764:
759:
753:
751:
750:communications
745:
744:
742:
741:
740:
739:
728:
726:
722:
721:
719:
718:
713:
708:
703:
698:
693:
688:
687:
686:
676:
669:
667:Agent handling
663:
661:
659:
658:
653:
647:
644:
643:
638:
636:
635:
628:
621:
613:
607:
606:
594:
593:External links
591:
590:
589:
571:
568:
565:
564:
547:matthewaid.com
534:
520:
496:
482:
455:
429:
390:
354:
342:
330:
318:
288:
257:
256:
254:
251:
250:
249:
229:
226:
224:
221:
220:
219:
214:
209:
204:
197:
194:
193:
192:
185:
180:
173:
170:
83:
80:
72:fingerprinting
45:black bag jobs
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
1536:
1525:
1522:
1520:
1517:
1515:
1512:
1511:
1509:
1494:
1491:
1487:
1486:organizations
1484:
1483:
1482:
1479:
1477:
1474:
1473:
1471:
1469:
1468:Dissemination
1465:
1459:
1456:
1454:
1451:
1449:
1446:
1444:
1441:
1439:
1436:
1434:
1431:
1429:
1426:
1424:
1421:
1419:
1416:
1415:
1413:
1411:
1407:
1397:
1394:
1392:
1389:
1387:
1384:
1382:
1379:
1377:
1374:
1373:
1371:
1367:
1360:
1356:
1353:
1351:
1348:
1346:
1343:
1341:
1338:
1336:
1333:
1331:
1328:
1326:
1323:
1322:
1320:
1318:
1312:
1306:
1303:
1301:
1298:
1296:
1293:
1291:
1288:
1286:
1283:
1281:
1278:
1277:
1275:
1273:
1269:
1259:
1256:
1254:
1253:Steganography
1251:
1249:
1246:
1244:
1241:
1239:
1236:
1234:
1233:Interrogation
1231:
1229:
1226:
1224:
1221:
1219:
1218:Eavesdropping
1216:
1214:
1211:
1209:
1205:
1202:
1200:
1197:
1195:
1192:
1190:
1187:
1185:
1182:
1180:
1177:
1173:
1170:
1169:
1168:
1165:
1163:
1160:
1156:
1153:
1151:
1148:
1147:
1146:
1143:
1142:
1140:
1138:
1134:
1128:
1125:
1123:
1122:Direct action
1120:
1118:
1117:Covert action
1115:
1113:
1110:
1108:
1105:
1104:
1102:
1100:
1096:
1088:
1087:organizations
1085:
1084:
1083:
1080:
1079:
1076:
1073:
1071:
1067:
1064:
1062:
1058:
1054:
1047:
1042:
1040:
1035:
1033:
1028:
1027:
1024:
1012:
1009:
1005:
1002:
1000:
997:
996:
995:
992:
990:
987:
985:
982:
980:
977:
975:
972:
970:
967:
965:
962:
960:
957:
953:
950:
948:
947:interrogation
945:
944:
943:
940:
938:
935:
933:
930:
926:
923:
921:
918:
917:
916:
915:Eavesdropping
913:
909:
906:
904:
901:
900:
899:
896:
894:
891:
889:
886:
882:
879:
878:
877:
874:
873:
871:
867:
861:
858:
856:
853:
851:
848:
847:
845:
840:
836:
830:
827:
823:
820:
819:
818:
817:Steganography
815:
813:
810:
808:
805:
803:
800:
798:
795:
793:
792:Invisible ink
790:
788:
785:
783:
780:
778:
775:
773:
770:
768:
765:
763:
760:
758:
755:
754:
752:
746:
738:
735:
734:
733:
730:
729:
727:
723:
717:
714:
712:
711:Sleeper agent
709:
707:
704:
702:
699:
697:
694:
692:
689:
685:
682:
681:
680:
677:
675:
674:
670:
668:
665:
664:
662:
657:
654:
652:
649:
648:
645:
641:
634:
629:
627:
622:
620:
615:
614:
611:
604:
603:HowStuffWorks
600:
597:
596:
592:
586:
579:
574:
573:
569:
552:
548:
544:
538:
535:
523:
521:9780807862179
517:
513:
509:
508:
500:
497:
485:
483:9780061740473
479:
475:
474:HarperCollins
471:
470:
465:
459:
456:
444:
440:
433:
430:
417:
413:
409:
405:
401:
394:
391:
379:
375:
371:
370:
365:
358:
355:
351:
346:
343:
339:
334:
331:
327:
322:
319:
306:
302:
298:
292:
289:
276:
272:
268:
262:
259:
252:
247:
246:0-670-82055-5
243:
239:
235:
234:Wright, Peter
232:
231:
227:
222:
218:
215:
213:
210:
208:
205:
203:
200:
199:
195:
191:
190:
186:
184:
181:
179:
176:
175:
171:
169:
164:
159:
156:
151:
149:
145:
144:
139:
135:
130:
128:
124:
120:
116:
111:
109:
103:
101:
97:
93:
89:
81:
79:
77:
73:
69:
68:safe cracking
65:
60:
58:
54:
50:
46:
42:
34:
30:
19:
1258:Surveillance
1248:Resident spy
1189:Cryptography
1171:
994:Surveillance
902:
782:Cyber spying
767:Cryptography
706:Resident spy
691:Double agent
671:
570:Bibliography
555:. Retrieved
546:
537:
525:. Retrieved
506:
499:
487:. Retrieved
468:
458:
446:. Retrieved
432:
422:12 September
420:. Retrieved
403:
393:
383:12 September
381:. Retrieved
367:
357:
352:, p. 4.
345:
340:, p. 1.
333:
328:, p. 9.
321:
311:12 September
309:. Retrieved
291:
279:. Retrieved
270:
261:
237:
187:
166:
161:
152:
141:
131:
119:W. Mark Felt
112:
108:Clyde Tolson
104:
85:
76:surveillance
64:lock picking
61:
59:operations.
44:
40:
39:
29:
1330:Geophysical
1112:Cell system
1099:Clandestine
984:Stay-behind
893:Recruitment
850:Canary trap
748:Devices and
696:Field agent
585:U.S. Senate
527:4 September
489:4 September
350:Select 1976
338:Select 1976
326:Select 1976
100:Huston Plan
53:clandestine
1508:Categories
1359:earthquake
1223:False flag
1061:Collection
979:Sexpionage
959:COINTELPRO
952:safe house
932:False flag
869:Operations
843:techniques
839:Tradecraft
583:(Report).
557:3 December
448:3 December
281:3 December
223:References
207:COINTELPRO
1350:Materials
1204:Defection
1199:Dead drop
1172:black bag
1137:Espionage
903:black bag
787:Dead drop
716:Spymaster
640:Espionage
412:0190-8286
378:0190-8286
271:Intelnews
163:absence."
138:Plamondon
113:However,
1410:Analysis
1208:Turncoat
1155:handling
969:SHAMROCK
822:microdot
725:Analysis
551:Archived
443:ABC News
416:Archived
305:Archived
275:Archived
196:See also
1357: (
1335:Nuclear
1305:TEMPEST
964:MINARET
908:wetwork
82:History
1194:Cutout
1145:Agents
999:Global
925:MASINT
920:SIGINT
772:Cutout
656:Assets
651:Agents
518:
480:
410:
376:
244:
140:case,
49:covert
1369:Other
1340:Radar
1184:Cover
1162:Asset
1150:field
684:Agent
679:Cover
581:(pdf)
1004:Mass
974:FVEY
701:Mole
559:2012
529:2017
516:ISBN
491:2017
478:ISBN
450:2012
424:2022
408:ISSN
385:2022
374:ISSN
313:2022
283:2012
242:ISBN
117:and
47:are
841:and
51:or
43:or
1510::
1206:/
601:.
549:.
545:.
510:.
472:.
441:.
414:.
406:.
402:.
372:.
366:.
303:.
299:.
269:.
236:,
150:.
66:,
1361:)
1045:e
1038:t
1031:v
632:e
625:t
618:v
605:.
587:.
561:.
531:.
493:.
452:.
426:.
387:.
315:.
285:.
248:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.