Knowledge (XXG)

Black bag operation

Source 📝

33: 146:, 407 U.S. 297. The FBI still carries out numerous "black bag" entry-and-search missions, in which the search is covert and the target of the investigation is not informed that the search took place. If the investigation involves a criminal matter, a judicial warrant is required; in national security cases the operation must be approved by the 157:
had defected from the Soviet underground and had started talking to the FBI, the FBI broke into her Brooklyn hotel to do a "black bag job" to verify her own background – and to look for anything that would invoke suspicion. "They found nothing out of the ordinary." Bentley had learned how to dodge
105:
Prior to it being discontinued, there had been over two hundred instances of black bag jobs organized by the FBI, for purposes other than installing microphones (as well as over 500 warrant-less microphone installations). These were approved in writing by Hoover as well as by Hoover's deputy
110:, with most records being destroyed after the job was complete. Agents that performed the jobs were trained in lock studies or electronic surveillance. In many cases, lock-picking was not required and a key could be accessed from a landlord, hotel manager, or a neighbor. 162:
She learned how to determine if enemy agents had discovered secret documents in her possession. "If I had to leave the apartment, I was careful to put them in my black trunk and tie a thin black thread around it so that I would know if they had been tampered with in my
167:
The CIA has used black bag operations to steal cryptography and other secrets from foreign government offices outside the United States. The practice (by preceding U.S. intelligence organizations) dates back at least as far as 1916.
32: 90:(FBI) agents entered offices of targeted individuals and organizations, and photographed information found in their records. This practice was used by the FBI from 1942 through the 1960s. In July 1966, FBI Director 415: 78:(including audio and video surveillance), mail manipulation (flaps and seals), and forgery. The term "black bag" refers to the small bags in which burglars stereotypically carry their tools. 1279: 1492: 1043: 363: 1289: 1518: 550: 399: 1422: 1086: 1069: 1036: 941: 1485: 1126: 1523: 147: 1314: 1284: 1029: 924: 880: 1467: 304: 1116: 875: 142: 630: 1060: 511: 776: 519: 481: 245: 1417: 1409: 811: 736: 1427: 300: 87: 1513: 1358: 1183: 1098: 678: 1052: 542: 36:
Collection of burglar's tools, with objects such as lockpicks, drills, skeleton keys such as are used in black bag jobs.
1475: 133: 274: 233: 177: 102:
to reintroduce black bag jobs, but Hoover opposed this, and approval was revoked five days after it was approved.
1390: 1121: 442: 137: 1442: 1432: 1380: 1111: 761: 731: 623: 1457: 1395: 1375: 1324: 1081: 1344: 1010: 216: 52: 1447: 1385: 1271: 1227: 1212: 1161: 1106: 936: 919: 892: 655: 1480: 1354: 998: 368: 126: 122: 114: 438: 1452: 1437: 1329: 1304: 1242: 1193: 1178: 887: 854: 828: 806: 801: 771: 756: 616: 296: 182: 1294: 1003: 672: 598: 515: 477: 407: 373: 241: 211: 188: 154: 1349: 1299: 968: 700: 578:
Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans
1237: 1166: 988: 963: 897: 859: 796: 201: 95: 91: 62:
Some of the tactics, techniques, and procedures associated with black bag operations are
1334: 1154: 666: 463: 1507: 1252: 1232: 1217: 946: 914: 816: 791: 710: 602: 473: 67: 17: 1339: 1257: 1247: 1188: 993: 781: 766: 705: 690: 683: 118: 107: 75: 63: 505: 467: 1149: 983: 849: 695: 584: 99: 71: 1222: 978: 958: 951: 931: 838: 206: 411: 377: 1203: 1198: 1144: 1136: 973: 786: 715: 650: 639: 577: 132:
The use of "black bag jobs" by the FBI was declared unconstitutional by the
1021: 1207: 821: 266: 907: 469:
Clever Girl: Elizabeth Bentley, the Spy Who Ushered in the McCarthy Era
238:
Spy Catcher: The Candid Autobiography of a Senior Intelligence Officer
56: 48: 267:"Tallinn government surveillance cameras reveal black bag operation" 576:
Select Committee to Study Governmental Operations (23 April 1976).
31: 1025: 612: 608: 158:
such intrusions from her earliest days in the underground:
121:
subsequently testified that Hoover and acting FBI director
1493:
Counterintelligence and counter-terrorism organizations
1466: 1408: 1368: 1313: 1270: 1135: 1097: 1068: 1059: 868: 837: 747: 724: 646: 364:"Testimony Cites Hoover Approval of Black-Bag Jobs" 55:entries into structures to obtain information for 507:Red Spy Queen: A Biography of Elizabeth Bentley 543:"The CIA Code Thief Who Came in from the Cold" 1037: 624: 94:allegedly ordered the practice discontinued. 8: 1519:Federal Bureau of Investigation operations 1074: 1065: 1044: 1030: 1022: 631: 617: 609: 125:authorized "black bag" jobs against the 1458:Scientific & Technical intelligence 504:Olmsted, Kathryn J. (3 November 2003). 258: 172:Black bag operations in popular culture 148:Foreign Intelligence Surveillance Court 881:Chinese espionage in the United States 400:"FBI 'Bag Jobs' Allowable, Court Told" 349: 337: 325: 307:from the original on 12 September 2022 439:"FBI to Boost 'Black Bag' Search Ops" 398:Kiernan, Laura A. (16 October 1980). 362:Robinson, Timothy S. (13 July 1978). 27:Covert entries to gather intelligence 7: 1280:By alliances, nations and industries 876:Chinese intelligence activity abroad 418:from the original on 24 January 2020 297:"Freedom of Information/Privacy Act" 143:United States v. U.S. District Court 942:Interpersonal (HUMINT) intelligence 553:from the original on 27 April 2013 512:University of North Carolina Press 25: 777:Computer and network surveillance 277:from the original on 1 April 2013 812:Short-range agent communications 1524:Intelligence operations by type 1428:Words of estimative probability 1290:Operational platforms by nation 301:Federal Bureau of Investigation 88:Federal Bureau of Investigation 1: 437:Rood, Justin (15 June 2007). 153:In 1947, after American spy 1476:Intelligence cycle security 134:United States Supreme Court 1540: 178:Sam Fisher (Splinter Cell) 74:, photography, electronic 1077: 86:In black bag operations, 599:"11 Terms Used by Spies" 1443:Intelligence assessment 1433:All-source intelligence 1053:Intelligence management 762:Covert listening device 732:Intelligence assessment 136:on 19 June 1972 in the 1127:Operational techniques 1082:Special reconnaissance 165: 37: 1514:Cryptographic attacks 1011:Targeted surveillance 240:. Penguin USA, 1987. 217:Parallel construction 160: 98:in 1970 proposed the 35: 1448:Medical intelligence 1418:Competing hypotheses 1228:Industrial espionage 1213:Denial and deception 937:Industrial espionage 737:competing hypotheses 273:. 16 December 2008. 41:Black bag operations 18:Black Bag Operations 1481:Counterintelligence 1396:Technical (TECHINT) 1391:Open-source (OSINT) 1381:Geospatial (GEOINT) 1355:Casualty estimation 466:(13 October 2009). 404:The Washington Post 369:The Washington Post 129:from 1970 to 1973. 127:Weather Underground 123:L. Patrick Gray III 115:William C. Sullivan 70:, key impressions, 1453:Military geography 1438:Basic intelligence 1376:Financial (FININT) 1317:signature (MASINT) 1243:One-way voice link 1179:Concealment device 888:Cold War espionage 855:Front organization 829:Surveillance tools 807:Phone surveillance 802:One-way voice link 757:Concealment device 514:. pp. 26–27. 228:General references 183:Sombra (Overwatch) 57:human intelligence 38: 1501: 1500: 1404: 1403: 1295:Direction finding 1285:In modern history 1266: 1265: 1019: 1018: 673:Agent provocateur 212:Elizabeth Bentley 189:The Doorbell Rang 155:Elizabeth Bentley 16:(Redirected from 1531: 1300:Traffic analysis 1272:Signals (SIGINT) 1107:Asset recruiting 1075: 1066: 1046: 1039: 1032: 1023: 633: 626: 619: 610: 588: 582: 563: 562: 560: 558: 539: 533: 532: 530: 528: 501: 495: 494: 492: 490: 460: 454: 453: 451: 449: 434: 428: 427: 425: 423: 395: 389: 388: 386: 384: 359: 353: 347: 341: 335: 329: 323: 317: 316: 314: 312: 293: 287: 286: 284: 282: 263: 253:Inline citations 21: 1539: 1538: 1534: 1533: 1532: 1530: 1529: 1528: 1504: 1503: 1502: 1497: 1462: 1400: 1386:Imagery (IMINT) 1364: 1325:Electro-optical 1316: 1315:Measurement and 1309: 1262: 1238:Numbers station 1167:Black operation 1131: 1093: 1055: 1050: 1020: 1015: 989:Sting operation 898:Black operation 864: 860:Limited hangout 842: 833: 797:Numbers station 749: 743: 720: 660: 642: 637: 595: 580: 575: 572: 567: 566: 556: 554: 541: 540: 536: 526: 524: 522: 503: 502: 498: 488: 486: 484: 476:. p. 130. 464:Kessler, Lauren 462: 461: 457: 447: 445: 436: 435: 431: 421: 419: 397: 396: 392: 382: 380: 361: 360: 356: 348: 344: 336: 332: 324: 320: 310: 308: 295: 294: 290: 280: 278: 265: 264: 260: 255: 230: 225: 202:Black operation 198: 174: 96:President Nixon 92:J. Edgar Hoover 84: 28: 23: 22: 15: 12: 11: 5: 1537: 1535: 1527: 1526: 1521: 1516: 1506: 1505: 1499: 1498: 1496: 1495: 1490: 1489: 1488: 1478: 1472: 1470: 1464: 1463: 1461: 1460: 1455: 1450: 1445: 1440: 1435: 1430: 1425: 1423:Target-centric 1420: 1414: 1412: 1406: 1405: 1402: 1401: 1399: 1398: 1393: 1388: 1383: 1378: 1372: 1370: 1366: 1365: 1363: 1362: 1352: 1347: 1345:Radiofrequency 1342: 1337: 1332: 1327: 1321: 1319: 1311: 1310: 1308: 1307: 1302: 1297: 1292: 1287: 1282: 1276: 1274: 1268: 1267: 1264: 1263: 1261: 1260: 1255: 1250: 1245: 1240: 1235: 1230: 1225: 1220: 1215: 1210: 1201: 1196: 1191: 1186: 1181: 1176: 1175: 1174: 1164: 1159: 1158: 1157: 1152: 1141: 1139: 1133: 1132: 1130: 1129: 1124: 1119: 1114: 1109: 1103: 1101: 1095: 1094: 1092: 1091: 1090: 1089: 1078: 1072: 1070:Human (HUMINT) 1063: 1057: 1056: 1051: 1049: 1048: 1041: 1034: 1026: 1017: 1016: 1014: 1013: 1008: 1007: 1006: 1001: 991: 986: 981: 976: 971: 966: 961: 956: 955: 954: 949: 939: 934: 929: 928: 927: 922: 912: 911: 910: 905: 895: 890: 885: 884: 883: 872: 870: 866: 865: 863: 862: 857: 852: 846: 844: 835: 834: 832: 831: 826: 825: 824: 814: 809: 804: 799: 794: 789: 784: 779: 774: 769: 764: 759: 753: 751: 750:communications 745: 744: 742: 741: 740: 739: 728: 726: 722: 721: 719: 718: 713: 708: 703: 698: 693: 688: 687: 686: 676: 669: 667:Agent handling 663: 661: 659: 658: 653: 647: 644: 643: 638: 636: 635: 628: 621: 613: 607: 606: 594: 593:External links 591: 590: 589: 571: 568: 565: 564: 547:matthewaid.com 534: 520: 496: 482: 455: 429: 390: 354: 342: 330: 318: 288: 257: 256: 254: 251: 250: 249: 229: 226: 224: 221: 220: 219: 214: 209: 204: 197: 194: 193: 192: 185: 180: 173: 170: 83: 80: 72:fingerprinting 45:black bag jobs 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 1536: 1525: 1522: 1520: 1517: 1515: 1512: 1511: 1509: 1494: 1491: 1487: 1486:organizations 1484: 1483: 1482: 1479: 1477: 1474: 1473: 1471: 1469: 1468:Dissemination 1465: 1459: 1456: 1454: 1451: 1449: 1446: 1444: 1441: 1439: 1436: 1434: 1431: 1429: 1426: 1424: 1421: 1419: 1416: 1415: 1413: 1411: 1407: 1397: 1394: 1392: 1389: 1387: 1384: 1382: 1379: 1377: 1374: 1373: 1371: 1367: 1360: 1356: 1353: 1351: 1348: 1346: 1343: 1341: 1338: 1336: 1333: 1331: 1328: 1326: 1323: 1322: 1320: 1318: 1312: 1306: 1303: 1301: 1298: 1296: 1293: 1291: 1288: 1286: 1283: 1281: 1278: 1277: 1275: 1273: 1269: 1259: 1256: 1254: 1253:Steganography 1251: 1249: 1246: 1244: 1241: 1239: 1236: 1234: 1233:Interrogation 1231: 1229: 1226: 1224: 1221: 1219: 1218:Eavesdropping 1216: 1214: 1211: 1209: 1205: 1202: 1200: 1197: 1195: 1192: 1190: 1187: 1185: 1182: 1180: 1177: 1173: 1170: 1169: 1168: 1165: 1163: 1160: 1156: 1153: 1151: 1148: 1147: 1146: 1143: 1142: 1140: 1138: 1134: 1128: 1125: 1123: 1122:Direct action 1120: 1118: 1117:Covert action 1115: 1113: 1110: 1108: 1105: 1104: 1102: 1100: 1096: 1088: 1087:organizations 1085: 1084: 1083: 1080: 1079: 1076: 1073: 1071: 1067: 1064: 1062: 1058: 1054: 1047: 1042: 1040: 1035: 1033: 1028: 1027: 1024: 1012: 1009: 1005: 1002: 1000: 997: 996: 995: 992: 990: 987: 985: 982: 980: 977: 975: 972: 970: 967: 965: 962: 960: 957: 953: 950: 948: 947:interrogation 945: 944: 943: 940: 938: 935: 933: 930: 926: 923: 921: 918: 917: 916: 915:Eavesdropping 913: 909: 906: 904: 901: 900: 899: 896: 894: 891: 889: 886: 882: 879: 878: 877: 874: 873: 871: 867: 861: 858: 856: 853: 851: 848: 847: 845: 840: 836: 830: 827: 823: 820: 819: 818: 817:Steganography 815: 813: 810: 808: 805: 803: 800: 798: 795: 793: 792:Invisible ink 790: 788: 785: 783: 780: 778: 775: 773: 770: 768: 765: 763: 760: 758: 755: 754: 752: 746: 738: 735: 734: 733: 730: 729: 727: 723: 717: 714: 712: 711:Sleeper agent 709: 707: 704: 702: 699: 697: 694: 692: 689: 685: 682: 681: 680: 677: 675: 674: 670: 668: 665: 664: 662: 657: 654: 652: 649: 648: 645: 641: 634: 629: 627: 622: 620: 615: 614: 611: 604: 603:HowStuffWorks 600: 597: 596: 592: 586: 579: 574: 573: 569: 552: 548: 544: 538: 535: 523: 521:9780807862179 517: 513: 509: 508: 500: 497: 485: 483:9780061740473 479: 475: 474:HarperCollins 471: 470: 465: 459: 456: 444: 440: 433: 430: 417: 413: 409: 405: 401: 394: 391: 379: 375: 371: 370: 365: 358: 355: 351: 346: 343: 339: 334: 331: 327: 322: 319: 306: 302: 298: 292: 289: 276: 272: 268: 262: 259: 252: 247: 246:0-670-82055-5 243: 239: 235: 234:Wright, Peter 232: 231: 227: 222: 218: 215: 213: 210: 208: 205: 203: 200: 199: 195: 191: 190: 186: 184: 181: 179: 176: 175: 171: 169: 164: 159: 156: 151: 149: 145: 144: 139: 135: 130: 128: 124: 120: 116: 111: 109: 103: 101: 97: 93: 89: 81: 79: 77: 73: 69: 68:safe cracking 65: 60: 58: 54: 50: 46: 42: 34: 30: 19: 1258:Surveillance 1248:Resident spy 1189:Cryptography 1171: 994:Surveillance 902: 782:Cyber spying 767:Cryptography 706:Resident spy 691:Double agent 671: 570:Bibliography 555:. Retrieved 546: 537: 525:. Retrieved 506: 499: 487:. Retrieved 468: 458: 446:. Retrieved 432: 422:12 September 420:. Retrieved 403: 393: 383:12 September 381:. Retrieved 367: 357: 352:, p. 4. 345: 340:, p. 1. 333: 328:, p. 9. 321: 311:12 September 309:. Retrieved 291: 279:. Retrieved 270: 261: 237: 187: 166: 161: 152: 141: 131: 119:W. Mark Felt 112: 108:Clyde Tolson 104: 85: 76:surveillance 64:lock picking 61: 59:operations. 44: 40: 39: 29: 1330:Geophysical 1112:Cell system 1099:Clandestine 984:Stay-behind 893:Recruitment 850:Canary trap 748:Devices and 696:Field agent 585:U.S. Senate 527:4 September 489:4 September 350:Select 1976 338:Select 1976 326:Select 1976 100:Huston Plan 53:clandestine 1508:Categories 1359:earthquake 1223:False flag 1061:Collection 979:Sexpionage 959:COINTELPRO 952:safe house 932:False flag 869:Operations 843:techniques 839:Tradecraft 583:(Report). 557:3 December 448:3 December 281:3 December 223:References 207:COINTELPRO 1350:Materials 1204:Defection 1199:Dead drop 1172:black bag 1137:Espionage 903:black bag 787:Dead drop 716:Spymaster 640:Espionage 412:0190-8286 378:0190-8286 271:Intelnews 163:absence." 138:Plamondon 113:However, 1410:Analysis 1208:Turncoat 1155:handling 969:SHAMROCK 822:microdot 725:Analysis 551:Archived 443:ABC News 416:Archived 305:Archived 275:Archived 196:See also 1357: ( 1335:Nuclear 1305:TEMPEST 964:MINARET 908:wetwork 82:History 1194:Cutout 1145:Agents 999:Global 925:MASINT 920:SIGINT 772:Cutout 656:Assets 651:Agents 518:  480:  410:  376:  244:  140:case, 49:covert 1369:Other 1340:Radar 1184:Cover 1162:Asset 1150:field 684:Agent 679:Cover 581:(pdf) 1004:Mass 974:FVEY 701:Mole 559:2012 529:2017 516:ISBN 491:2017 478:ISBN 450:2012 424:2022 408:ISSN 385:2022 374:ISSN 313:2022 283:2012 242:ISBN 117:and 47:are 841:and 51:or 43:or 1510:: 1206:/ 601:. 549:. 545:. 510:. 472:. 441:. 414:. 406:. 402:. 372:. 366:. 303:. 299:. 269:. 236:, 150:. 66:, 1361:) 1045:e 1038:t 1031:v 632:e 625:t 618:v 605:. 587:. 561:. 531:. 493:. 452:. 426:. 387:. 315:. 285:. 248:. 20:)

Index

Black Bag Operations

covert
clandestine
human intelligence
lock picking
safe cracking
fingerprinting
surveillance
Federal Bureau of Investigation
J. Edgar Hoover
President Nixon
Huston Plan
Clyde Tolson
William C. Sullivan
W. Mark Felt
L. Patrick Gray III
Weather Underground
United States Supreme Court
Plamondon
United States v. U.S. District Court
Foreign Intelligence Surveillance Court
Elizabeth Bentley
Sam Fisher (Splinter Cell)
Sombra (Overwatch)
The Doorbell Rang
Black operation
COINTELPRO
Elizabeth Bentley
Parallel construction

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.