Knowledge (XXG)

Recruitment of spies

Source đź“ť

854:(MSS). Her first reports were independently confirmed by the CIA. Later, however, she was found to be passing FBI documents to the MSS, while still reporting to the FBI. While she was allowed, at first, to continue, on the belief that the information she provided to the United States was more important than that which she was giving to the PRC, she was eventually arrested and charged with a relatively low-level crime. Eventually, that was dismissed for reasons of prosecutorial misconduct, although a subsequent U.S. government appeal resulted in a plea bargain. Her true loyalty was never made public, but, at various times, she appears to have been a dangled mole and a doubled agent, as well as possibly a PRC access agent to FBI personnel. 998:, which reported to Directorate T of the KGB First Chief Directorate. The GRU ran recruitments at industry trade shows. Suvorov explains that recruitment was extremely effective with small firms: "The owner of a small firm, even a very successful one, is always at great risk, always keen to strengthen his situation...In any case, if he sells his product he can hide the fact from the authorities. It is equally easy for him to hide the money he has received". The businessman, however, may forget that while he might not report the cash transaction to his own government, the GRU certainly has recorded the act of payment, and can use it for subsequent blackmail. 465:: by observation of intelligence activities operated from embassies of country X, a counterintelligence service can deduce characteristic recruiting and agent handling practices for country X. Because these officers and techniques affect many hostile targets in the country of operations, once this information is known, the foreign intelligence service (FIS) agents can be neutralized in a variety of ways, including police action, convincing the asset in the country of operations to stop cooperating with the FIS, or, ideally, "recruiting the hostile intelligence officer in place". 891:
intelligence officer may then, through friendly persuasion, ask for a very innocent and insignificant favor from the candidate and pay him generously for it, thus placing the candidate in a position of obligation. During this stage the future agent becomes accustomed to being asked favors and fulfilling them accurately. The future agent's ambitions, financial and work problems, hobbies, etc., are continuously assessed by an intelligence team to exacerbate weaknesses. The future agent's professional, social, and private personalities are soon stripped away.
280:, recruited in the target country, or recruited in a third country. One of the supplementary functions is communications, which includes clandestine radio transmission, dead drops, couriers, and finding places for secure radio transmissions. Other supplementary functions include people who can "legalise" agents with cover jobs, and specialists that can forge documents or get illicit copies from the actual source. Safe houses, safe mail drops, and safe telephones are other supplementary functions. 882:"The crash approach, or 'love at first sight' in GRU jargon, has a number of irrefutable advantages. Contact with the future agent takes place only once, instead of at meetings over many months, as is the case with the gradual approach. After the first contact the newly recruited agent will himself take action on his own security. He will never talk to his wife, or tell her that he has a charming friend in the Soviet military attaché who is also very interested in stamp collecting." 970:, during which additional officers may be watching the meeting, and the travel to it, for evidence of "country A" counterintelligence interest. Without the developmental fully realizing it, he is being drawn into increasingly treasonous activity, which would be harder and harder to explain were he caught. It is considered important for the case officer to offer money, perhaps dismissed as covering expenses, but really as a means of compromising the developmental. 477:
developable for recruitment during his current tour, but six months from now it might be a different story. Political turmoil being what it is within the Satellites, the "ins" can rapidly become the "outs". If we can identify a man as a former "in" who is now "out" we may be able to recruit him. But this kind of identification requires orderly and current biographic indexes of Satellite personnel who travel abroad".
76: 35: 458:, continuing to report. "The Satellite diplomat, foreign trade official, journalist, or intelligence officer who has been useful to us abroad will be even more valuable when he goes back home at the end of his tour, not just because he is then inside the target country, but because the intelligence to which he has access in a ministry headquarters has greater scope and depth. 289:
Alternatively, the potential agent may approach the agency; many intelligence assets were not recruited but were "walk-ins" or "write-ins" who offered information to foreign intelligence services. Background research is conducted on the potential agent to identify any ties to a foreign intelligence agency, select the most promising candidates and approach method.
1043:
legalizers are subjected to especially thorough vetting, because the fate of illegals is entrusted to them. When a Soviet illegal arrives in a country the task of the legalizing agent is to ensure the issue of documents by making the necessary entries in the registration books and to ensure that the illegal is in possession of the necessary documentation.
135: 348:
are perfectly reasonable in non-espionage contexts, such as looking for jobs or people to fill them. The process of personnel recruiting for industry is not completely dissimilar from recruiting spies. Both may use personal networks, and, in industrialized countries, computer-assisted personal "networking" (for example, through websites such as
633:
government), who can deal on a regular basis with both hostile and friendly government personnel with such access to sensitive material that it may warrant for their individual or joint recruitment, upon the recommendation from the access agent, by the intelligence apparatus for which the access agent is actually working for.
903:
some cases, it may be possible to get useful information without ever asking the developmental to betray his country. These cases may mean the role of the recruit is not to be as a direct agent, but perhaps as an access or a support agent. The recruit may not even be witting of his relationship to a FIS.
636:
Within private and public organizations that handle sensitive material, human resource workers, receptionists, and other seemingly low-level personnel know a great deal about the people with sensitive access. Certain employees, such as guards and janitors, who have no formal access, still may be able
608:
If there are inconsistencies in the agent's life story, which the case officer can query periodically through social conversation, the truth is usually in the consistent aspects. It is easier to make a mistake in keeping up a lie, than in telling the truth, which is the reason criminal investigators
472:
of senior diplomatic, trade, or intelligence personnel. Defection can obviously yield only those golden eggs already in the nest; it cuts off the continuing intelligence that could be provided by an in-place asset. It may be worthwhile, however, simply to deny a target country the services of an able
326:
After the selection of a candidate for recruitment, the first stage, tracing and cultivating, commences. Details are collected about the candidate, details which may be obtained through reference, books, telephone directories, the press, and other recruited agents. Further definition of motives which
317:
That continued meetings both provide substantive intelligence, as well as knowledge about the asset, are not incompatible with security. Agent handlers still observe all the rules of clandestinity while developing the agent relationship. Knowledge of meetings, and indeed knowledge of the existence of
906:
Finally, the relationship will move from clandestine to overt, when the foreign service has significant compromising information on the asset. If the asset had been motivated by money, he will find the tasks given him may become more challenging, but the payments reduce, because he is no longer in a
584:
There are both local and headquarters-based means of validation. The case officer should compare information, provided by the agent, with locally known facts, both from overt and covert sources. Some services, especially the Russian/Soviet, may not have formal or extensive OSINT, and either the case
347:
Indeed, an access agent may arrange introductions without being completely witting that the purpose of meeting the target is to find people who will participate in espionage. A well-respected technical professional, or a professor, often will make introductions within their field. Such introductions
299:
Surveillance of targets (e.g., military or other establishments, open source or compromised reference documents) sometimes reveals people with potential access to information, but no clear means of approaching them. With this group, a secondary survey is in order. Headquarters may be able to suggest
902:
The interaction becomes more sensitive, especially when the case officer asks for something technically classified, but with an explanation that lets the potential recruit rationalize that he is not really betraying any trust. During this time, the case officer is building psychological control. In
862:
Development, the preparation for actual recruiting, involves a direct approach by a case officer who has some existing access to the potential recruit, an indirect approach through an access agent or proprietary, or has reason to risk a "cold" approach. Before the direct recruitment, there may be a
449:
The most valuable recruit had regular access to "current political and economic intelligence from the installation in question". Ideally, the asset would be in the highest-priority country and have access to "the minutes of Politburo meetings" or equally critical military, scientific, or other data
245:
Acquiring information may not involve collecting secret documents, but something as simple as observing the number and types of ships in a port. Even though such information might be readily visible, the laws of many countries would consider reporting it to a foreign power as espionage. Other asset
973:
Eventually, especially if the recruit is ideologically sympathetic to Country B, the case officer makes the direct recruitment pitch. This may not work, and, in fact, may induce rage. The case officer has to be prepared for physical defense and escape if this becomes necessary. If the case officer
866:
The case officer, possibly through an access agent, works on establishing a relationship. This phase, in which the potential agent is called a developmental, has not yet reached the recruiting pitch. After the cultivation stage, overt contact is established with the candidate under the guise of an
698:
of an American officer. The CIA itself made limited use of sexual recruitment against foreign intelligence services. "Coercive recruitment generally didn't work. We found that offers of money and freedom worked better". If the Agency found a Soviet intelligence officer had a girlfriend, they would
632:
An access agent does not have significant access to material of intelligence value, but has contact with those who do. Such a person could be as simple as the barber outside a military base, or as complex as a mid or high level staff officer of any organization, or think tank (i.e., outside the
580:
Headquarters may have access to information that a field office does not, such as being able to access credit records to identify financial stress, through a cutout that hides the request as having come from country B's service. Another area where a central office can help is to correlate possible
540:
While the interviewers will actually be from MI, the walk-in will never be told the identities of intelligence personnel. If they ask to see an intelligence representative, they will be told none is available. Both these measures are intended to prevent hostile intelligence services learning about
288:
Recruiting process typically begins with "spotting". Spotting is the identification of targets—people—who appear to have access to information, or are attractive for some support role. This individual may be "developed" over a period of time before the approach is made or it could be made "cold".
898:
Information requests begin innocently, usually asking for public information, but to get the development on the path to betrayal. At first, any requests for documents are for open ones, which the case officer gives some pretext for not himself obtaining. A creative task officer may then ask for a
453:
Nearly as important is an agent who will continue the relationship once he returns to his home country, be that the Soviet Union or a satellite. Recruitment is harder to detect with the less intense counterintelligence surveillance of an independent or satellite country. "Installation penetration
916:
particular fields of science available in one's own country for consultation. The phenomena of nature are independent of political boundaries, and the experts are in the position of agents spying on these phenomena insofar as they throw light on the feasibility of a suspected enemy development".
335:
Especially when the case officer is of a different culture than the one whose people he is targeting, the recruitment process begins not necessarily with a person that has the desired information. Instead, the first recruit may be someone well-connected in the local culture. Such a person may be
268:
Basic agents can be formed into groups with leaders, or report directly to the controller. Basic agents include information providers, perhaps through espionage or expertise about some local subject. Also in the basic group are "executive agents", who will kill or commit sabotage, and recruiting
520:
Walk-ins: who seek to provide information to the United States; or a disaffected person (one who is discontent and resentful, especially against authority) who presents him- or herself to a U.S. installation in a foreign country and who appears willing to accept recruitment in place or requests
1042:
Obtaining the documentation and other resources is the role of legalizing agents and documentalists. Candidate for this category of agents are sought among officials of the police and passport departments, consular clerks, customs and immigration officials, and small employers of labor. Agent
486:
In deciding whether to recruit a prospect, there needs to be a process to make sure that the person is not actively working for the adversary's counterintelligence, is under surveillance by them, or presents other risks that may not make recruitment wise. The assessment process applies both to
476:
Last in priority is not direct recruitment, but the collection of information to support future recruitment. This begins with obtaining biographical information on "officials abroad who are likely in the future to have other tours of foreign duty somewhere in the world. An official may not be
525:
A Soviet response, to someone visiting the embassy, was "This is a diplomatic representation and not an espionage centre. Be so kind as to leave the building or we will call the police". According to Suvorov, the police are usually not called but the embassy staff chase the would-be agent out
919:
A 1998 document describes typical foreign intelligence recruitment against citizens with access to sensitive technology. "Hostile intelligence services begin the agent recruitment process by scrupulously collecting information on persons who are connected to industry, RDT&E laboratories,
915:
The traditional openness of the scientific community can be exploited to obtain information from an individual with access to commercially, scientifically, or militarily valuable material. "There is another important source, peculiar to scientific intelligence. This is the body of experts in
450:
In the case of countries that either dominate countries (e.g., the satellites of the former Soviet Union) or client states of another power, officials of the client country, or of the patron country's representatives in the client, may be easier to recruit than officials in the home country.
313:
According to Suvorov, the Soviet GRU was not always able to collect enough material, principally from open sources, to understand the candidate's motivations and vulnerabilities. It was GRU doctrine, therefore, to use every meeting to continue to elicit this information. Other intelligence
890:
Telling one's wife or colleagues about a charming Soviet friend can compromise the entire development. The United States is also aware that the Soviet developmental process is, preferably, gradual. "The developmental stage cements the relationship and encourages loyalty to it. The hostile
529:
Cautious handling of walk-ins was not exclusively a Soviet concern. U.S. Army procedure is to have military intelligence (MI) or military police (MP) personnel handle all aspects of walk-ins. Under U.S. Army Regulations, military police are not intended to do interrogations, which are the
360:
A professional intelligence officer may very well obtain contacts through counterparts in the intelligence services of allied countries. The other service may arrange direct contact and then drop out of the process, or may jointly operate an asset such as the joint U.S.–UK operation with
564:
It has been the general experience of intelligence agencies that potential recruits, recruits early in the development process, and those currently reporting to a local case officer, still need to be checked against master biographical and other files, which will help spot foreign
1019:
While usual practice is to recruit residents of the country being targeted, there have been instances where the FIS brought illegal agents into that country. Common practice was to have them enter via a third country, and perhaps claim to be immigrants from a fourth.
409:, in that it is not focused on the recruit himself or herself, the probability of recruitment, etc., but, when there is more than one possible recruit, and a finite amount of case officer time, the discussion here gives criteria to select the most important targets. 894:
It is the goal of the case officer, with appropriate support from his organization, to learn vulnerabilities, build trust, and solve problems for the developmental. These are all preparatory steps to asking, perhaps subtly, the developmental to betray his own side.
425:
They were involved in an embassy, legation, consulate, trade mission, and news bureau that constituted the "instrumentalities for that economic penetration, political subversion, and espionage that threatened U.S. interests". That focus could be considered one of
385:
HUMINT collectors often have analysts in their own organizations with a sophisticated understanding of the people, with specialized knowledge in targeted countries, industries, or other groups. The analyst may or may not know details of the target's personality.
651:
U.S. intelligence services, for example, are concerned when their own personnel could be subject to sexual blackmail. This applied to any homosexual relationship until the mid-1990s, and also applied to heterosexual relationships with most foreign nationals. See
732:, the British Ambassador to the Soviet Union, was recalled to London in 1968 after he admitted to the Foreign Office that he had been having an affair with a Russian chambermaid at the embassy, of which he had been shown compromising photographs by the 344:, who may simply arrange introductions, or actually run the operations of subagents. Some agents of this type may be able to help in the pre-recruitment stages of assessment and development, or may only be involved in finding possible assets. 544:
The Soviets showed caution equivalent to the United States. Soviet GRU doctrine was that on general, a walk-in is considered only when they can show some evidence of access to valuable material. The best way of doing this is actually
879:, or chief of the GRU unit, convinces GRU headquarters that the risk is worthwhile. "Quite a few examples are known of recruitment at the first meeting, of course following the secret cultivation which has gone on for many months". 412:
One analysis by a U.S. clandestine service officer with knowledge of European practices has five descending priorities in the period between 1957 and 1962. He developed these in the context of being stationed in Europe during the
568:
Once an individual is seen to have potential access to information, the recruiting officer or staff considers why a presumably loyal and trusted individual might be willing to betray his own side. A basic set of reasons are the
637:
to gain access to secured rooms and containers; there is a blurry area between an access agent that might let your collector into an area, and a support employee who can collect information that he may or may not understand.
656:
for fictional examples. In some cases, especially when the national was a citizen of a friendly nation, the relationship needed to be reported. Failure to do so, even with a friendly nation, could result in dismissal.
924:
They must be in a position to provide information of real use to the hostile intelligence service, either to steal or copy S&T information, to communicate secret information by word of mouth, or to recruit new
679:) frequently sought to entrap CIA officers. The KGB believed that Americans were sex-obsessed materialists, and that U.S. spies could easily be entrapped by sexual lures. The best-known incident, however, was of 955:
Ideology (which is no longer the motivation it was during the Cold War; the Soviet service changed its emphasis to concentrate on sympathy for "persecuted" elements of American, or other targeted, society)
851: 966:
If the decision is made to make a formal recruitment, the case officer gets the developmental accustomed to meeting in more obscure places and at more unusual times. These can have the function of
623:, interviews by psychologists and psychiatrists, and perhaps more in the future, brain imaging, make use of these within the agency policy. Be aware that penetrators may be trained to resist them. 798:
woman, who was an intelligence agent. While the British Government deny that secrets were lost, other sources say that several Western operatives and operations within Pakistan were compromised.
1001:
Suvorov explained that while the most strategic information appears to be associated with major firms, there are several reasons why an approach to a smaller company is the place to begin.
2195: 660:
One former CIA officer said that while sexual entrapment was not generally a good tool to recruit a foreign official, it was sometimes employed successfully to solve short-term problems.
2408: 454:
thus becomes a means of establishing long-range assets in the Satellites by recruiting, testing, and training them while they are abroad". In other words, the priority is to recruit a
1959: 1489: 1328: 1251: 310:
The deliberate spotting process complements more obvious candidates, but candidates who are also more likely to be compromised by counterintelligence, such as walk-ins and write-ins.
307:
composed of relatives and people who have known one another for years. Access agents may be especially important here, and it may be worth the effort to spot potential access agents.
537:
specialists, information about the walk-in must be restricted to people with a "need-to-know." "The information the walk-in provides must be guarded and classified appropriately".
726:
into having sex with multiple male partners while drunk in 1954. The KGB then used photographs of this incident to blackmail Vassall into providing them with secret information.
2205: 556:, was willing to explore potential agents who gave plausible information about themselves and their access, or a "write-in" whose potential could be verified before a meeting. 303:
Recruiting people that may have access to the activities of non-state groups will be much harder, since these groups tend to be much more clandestine, and often operate on a
1423: 581:
penetration attempts by an individual who approaches one's own, or allied, intelligence services in different locations, as, for example, embassies in different cities.
365:. The allied officer may not actually provide access to his assets, but will convey information requests and responses. There is the example of a CIA learned from the 716:'s network. Osman provided war plans. He was arrested, represented by socialist lawyer Louis Waldman (later lawyer for Walter Krivitsky), and imprisoned for 25 years 487:
walk-ins and targeted recruits, but additional assessment needs to apply to the walk-in, who is most likely to be someone sent by a counterintelligence service.
1047:
A common technique was to find birth records of someone known later to have died. The "documentation agent" who did this would not have contact with illegals.
819:, who was arrested by South Korea in 2008 and charged with spying for North Korea, was accused of using this method to obtain information from an army officer. 276:
Both operation leaders and the supplementary group must be clandestine in support roles to basic agents. They may be clandestine officers of the FIS, such as
2338: 2002: 213: 1103: 1985: 1952: 1857: 1038:
specialists who would emplace technical sensors, ranging from telephone taps to specialized devices for measuring weapons tests, into the target country.
441:
for extended periods of time, two to five years", so recruitment could involve a wide range of United States, and possibly allied, intelligence resources.
473:
and experienced officer, and it may produce, in addition to his store of positive intelligence, leads to his former colleagues who are still in place".
389:
Even when no personal details are available, the recruiter, in an intelligence service, may have additional resources to use before the first contact.
2401: 2042: 292:
Obvious candidates are staff officers under diplomatic cover, or officers under nonofficial contact, have routine contact. Also possible contacts of
712:
Robert Osman, an American soldier stationed in Panama Canal Zone in 1933, was involved in a "honey trap" - Frema Karry, a young Russian girl in
2230: 2200: 1945: 1840: 1796: 920:
government institution staffs, military bases, and design organizations". A candidate for recruitment usually fulfills the following criteria:
684: 664:
is a classic technique; "swallow" was the KGB tradecraft term for women, and "raven" the term for men, trained to seduce intelligence targets.
867:
official meeting. After the acquaintanceship has ripened and official meetings evolve into personal meetings, the developmental stage begins.
495:
Major intelligence services are very cautious about walk-ins or write-ins, but some of the most important known assets were walk-ins, such as
2383: 48: 1497: 1336: 1259: 2032: 1791: 1030:
Specialists of the FIS might also need legalization to carry out clandestine intelligence collection. The United States has had a group of
145: 86: 156: 212:, who work for a foreign government, or within a host country's government or other target of intelligence interest for the gathering of 1546: 1023:
The introduction of an "illegal" might be due to the need to bring a specialist in to carry out some part of the operation. The Soviet
1976: 850:. She seduced her FBI case officer, and eventually was recruited by the FBI as a "dangle" to PRC targets, specifically in the Chinese 393:
research can find the publications of a professional, but also social interests. With due regard to the risks and resources required,
974:
can produce compromising photographs, receipts, etc., even an originally ideological subject now moves into the realm of compromise.
1692: 1300:
AR 190–8/OPNAVINST 3461.6/AFJI 31–304/MCO 3461.1: Enemy Prisoners of War, Retained Personnel, Civilian Internees and Other Detainees
1196: 776: 192: 174: 62: 1421: 2333: 2325: 1727: 1652: 1298: 421:
recruits in the Soviet Union and its satellite nations. His operations were focused on people with the general characteristics:
2454: 2343: 2449: 2444: 2274: 2099: 2014: 1594: 1406: 653: 1968: 2439: 875:
Suvorov describes the "crash approach" as the most demanding form of recruitment, which is to be done only if the local
687:. Once the seduction took place, she put him in touch with a KGB handler. The espionage continued after his transfer to 2434: 2391: 397:
can tap phone lines or intercept other communications that will give the recruiter more information about the target.
1398:
Against the Cold War : the history and political traditions of pro-Sovietism in the British Labour Party 1945-89
1371: 749: 1154: 828:
Yet other factors may apply. True friendship or romance may draw others to become involved with a current agent.
54: 2306: 2037: 787:. She later gave him information on CIA operations in Ghana, which was later shared with Soviet-bloc countries. 676: 468:
The fourth and fifth priorities are considerably less urgent than the first three. The fourth priority is the "
683:, a Marine guard supervisor at the Moscow embassy, who was seduced by a "swallow" who was a translator at the 598:
The information is true, but is too old to be of operational value. This was one of the key techniques of the
2358: 2348: 2296: 2027: 1677: 1647: 1539: 549:. Suvorov observes that "this is perhaps the only way to convince the GRU that they can trust the person". 2373: 2311: 2291: 2240: 1997: 995: 983: 806: 220:" spies who betray their oaths to work on behalf of a foreign intelligence agency is an important part of 899:
technically restricted, but still fairly innocent document, such as an unclassified telephone directory.
694:
The Soviets used sex not only for direct recruitment, but as a contingency for a possible future need of
2260: 1926: 1485: 620: 149:
that states a Knowledge (XXG) editor's personal feelings or presents an original argument about a topic.
1228: 773:
officer in 1961 and photographed in a compromising position. He was blackmailed into providing secrets.
1461: 615:
In the event that the recruiting officer's service uses technical means of detecting evasion, such as
2363: 2301: 2187: 2143: 2128: 2077: 1852: 1835: 1571: 546: 534: 469: 462: 455: 427: 394: 1005:
In many products, the true breakthroughs are not the entire aircraft or tank, but some subcomponent.
327:
will be used in the actual recruitment of the person are cultivated and weaknesses are exacerbated.
2396: 2270: 2087: 1914: 1818: 967: 829: 745: 713: 603: 585:
officer may need to check such things (or set up checkable requests) within the station/residency.
574: 570: 565:
counterintelligence. This counterintelligence interest could be from their own or third countries.
221: 17: 701: 300:
an approach, perhaps through a third country or through resources not known to the field station.
2368: 2353: 2245: 2220: 2158: 2109: 2094: 1803: 1770: 1744: 1722: 1717: 1687: 1672: 1532: 991: 784: 254: 1105:
Government 139 (Class Notes) Syllabus Section 1 — Human Intelligence: From Sleepers to Walk-ins
2210: 1919: 1588: 1402: 766: 759:
officer in 1987. He was then blackmailed into handing over documents when he was assigned to
729: 262: 1010:
People recruited in small firms may become access agents for recruitments in large companies.
705:. Once the CIA personnel had access to the Soviet officer, they might attempt to double him. 2265: 2215: 1884: 1616: 1396: 1354: 739: 680: 258: 986:
gathering, key business personnel, or even a business itself, might be recruited. Both the
2153: 2082: 1904: 1879: 1813: 1775: 1712: 1427: 846:
passport, became involved with a PRC activist, on whom she was recruited to report to the
1205: 763:. Lonetree was the first U.S. Marine to be convicted of spying against the United States. 2429: 2250: 2070: 1582: 500: 496: 362: 250: 1307: 1027:
had a Department V, staffed with officers qualified to kill or to carry out sabotage.
588:
Some definite warnings, which may come from local or headquarters reporting, include:
97: 2423: 2168: 2148: 2133: 1862: 1830: 1732: 1707: 1626: 1297:
Deputy Chief of Staff for Plans and Operations, United States Army (1 October 1997),
839: 816: 794:
was recalled home when it emerged that he had been involved in a relationship with a
779:, a CIA employee described as a "shy, naive, country girl", was allegedly seduced by 515: 377:, something that would have been impossible for a lone CIA case officer to discover. 2255: 2173: 2163: 2104: 1909: 1697: 1682: 1621: 1606: 1599: 1136: 1081: 1056: 833: 756: 719: 599: 438: 374: 234: 217: 937:
Blackmail/hostage Situations (used in USSR but very infrequently in United States)
296:, existing agents, or through information that suggests they may be compromised. 2065: 1899: 1765: 1611: 1279: 672: 277: 246:
roles include support functions such as communications, forgery, disguise, etc.
1156:
Educing Information--Interrogation: Science and Art, Foundations for the Future
2138: 1894: 1874: 1867: 1847: 1754: 1324: 832:, who spied for money, recruited friends and relatives. Rosario Ames, wife of 646: 553: 667:
During the Cold War, the KGB (and allied services, including the East German
541:
the structure or procedure of US intelligence/counterintelligence personnel.
2119: 2114: 2060: 2052: 1889: 1702: 1631: 1566: 1555: 1162:, National Defense Intelligence College Press, December 2006, archived from 791: 695: 661: 616: 431: 928:
There must exist motives by means of which an individual can be recruited:
521:
asylum or assistance in escaping from the control of his or her government.
1937: 506:
The U.S. Army defines three classes of people who may present themselves:
2123: 1737: 795: 752: 592:
The agent's information contradicts other information believed to be true
510: 414: 370: 366: 349: 1823: 612:
If the agent makes predictions, be very sure to see if they become true
1462:"Model defector Won Jeong Hwa faces trial over spying for North Korea" 1163: 843: 842:
is one of the more complex cases, who came to the United States on a
810: 802: 770: 760: 688: 418: 314:
authorities also see eliciting information as a continuing process.
780: 668: 390: 1941: 1528: 1501:(Excerpted from Research, Vol. 9 (September 1956), pp. 347-352) 1439: 1198:
DoD 5200.1 -PH-2 Hostile Intelligence Threat -- U.S. Technology
552:
Suvorov describes an ideal; the one-time head of the GRU, Gen.
1035: 1031: 1024: 987: 847: 733: 723: 722:, a British embassy official in Moscow, who was guided by the 229: 209: 128: 69: 28: 1281:
Regulation 381-22. Military Intelligence. Processing Walk-Ins
931:
Financial considerations/greed (transcends all other motives)
208:
refers to the recruitment of human agents, commonly known as
1524: 146:
personal reflection, personal essay, or argumentative essay
109: 595:
The agent's information has appeared in local open sources
533:
While serious discussion with the contact will be done by
101: 293: 270: 265:, handling two kinds of agent: basic and supplementary. 105: 2409:
Counterintelligence and counter-terrorism organizations
1229:"Espionage: Does It Have a Future in the 21st Century?" 152: 93: 1195:
United States Department of Defense (November 1998),
499:
or write-ins (using intelligence tradecraft) such as
269:
agents. In US practice, recruiting agents are called
708:
Examples of people trapped by sexual means include:
2382: 2324: 2284: 2229: 2186: 2051: 2013: 1984: 1975: 1784: 1753: 1663: 1640: 1562: 1348: 1346: 755:embassy guard in Moscow, was entrapped by a female 530:responsibility of military intelligence personnel. 318:the asset, must be on a strict need-to-know basis. 801:In May 2007 a female officer serving in Sweden's 406: 1130: 1128: 1126: 1124: 1122: 1120: 1118: 1075: 1073: 1071: 994:used this route. The KGB service for this was 1190: 1188: 1186: 1184: 1182: 1097: 1095: 463:offensive counterintelligence/counterespionage 1953: 1540: 1222: 1220: 1218: 836:, was brought into her husband's activities. 769:, a U.S. diplomat, was entrapped by a female 233:refers to human agents that are recruited by 8: 1516:KGB: the secret work of Soviet secret agents 1441:Swedish soldier fed secrets to Serbian lover 691:, although he eventually turned himself in. 1273: 1271: 1269: 381:Targeting based on intelligence information 331:Persons with access to knowledgeable people 63:Learn how and when to remove these messages 1990: 1981: 1960: 1946: 1938: 1547: 1533: 1525: 911:Recruitment through professional interests 1227:Hulnick, Arthur S. (Winter–Spring 2004), 978:Recruiting through business relationships 609:ask a suspect to repeat their statements. 193:Learn how and when to remove this message 175:Learn how and when to remove this message 1111:, California State University Sacramento 943:Exploitation of an emotional involvement 790:In 2006, the British Defence AttachĂ© in 2374:Scientific & Technical intelligence 1067: 445:Among this group, the priorities were: 356:Persons in allied intelligence agencies 87:instructions, advice, or how-to content 1797:Chinese espionage in the United States 685:Embassy of the United States in Moscow 949:Exploitation of an American's naivetĂ© 824:Spotting through emotional attachment 805:force was suspected of having leaked 575:attitudes predisposing to cooperation 503:. Most walk-ins though are rejected. 405:This step differs from the next one, 7: 2196:By alliances, nations and industries 1792:Chinese intelligence activity abroad 699:try to recruit the girlfriend as an 255:Soviet military intelligence officer 1858:Interpersonal (HUMINT) intelligence 1353:Silverstein, Ken (April 17, 2007), 1141:Inside Soviet Military Intelligence 1086:Inside Soviet Military Intelligence 742:, an Israeli nuclear whistleblower. 628:Access agents and access techniques 206:Clandestine HUMINT asset recruiting 96:so that it is more encyclopedic or 18:Clandestine HUMINT asset recruiting 401:Prioritizing potential recruitment 237:of a foreign intelligence agency. 25: 1693:Computer and network surveillance 1278:US Army in Europe (22 May 2003), 940:Appeal to emigre's national pride 886:Compromisation during development 813:lover who turned out to be a spy. 322:Persons with access to technology 44:This article has multiple issues. 1728:Short-range agent communications 863:delicate period of development. 641:Love, honeypots, and recruitment 547:bringing a sample of information 407:assessment of potential recruits 304: 257:, a Soviet officer may be under 133: 74: 33: 2344:Words of estimative probability 2206:Operational platforms by nation 52:or discuss these issues on the 1490:"The Scientific Intelligencer" 1233:Brown Journal of World Affairs 1143:, MacMillan Publishing Company 1088:, MacMillan Publishing Company 654:honeypots in espionage fiction 1: 1401:. London: Tauris. p. 9. 1137:"Chapter 4, Agent Recruiting" 216:. The work of detecting and " 1395:Lilleker, Darren G. (2004). 482:Assessing potential recruits 461:The third priority involves 2392:Intelligence cycle security 871:"Crash" vs gradual approach 573:, with further insights in 417:, with a goal of acquiring 2471: 1426:November 19, 2007, at the 1252:"Installation Penetration" 852:Ministry of State Security 644: 1993: 1496:, CIA.gov, archived from 1335:, CIA.gov, archived from 1258:, CIA.gov, archived from 1015:Legalizing illegal agents 437:They were outside "their 1376:International Spy Museum 1135:Suvorov, Victor (1984), 1102:Thomas Patrick Carroll, 1080:Suvorov, Victor (1984), 677:Intelligence Directorate 571:classic MICE motivations 2359:Intelligence assessment 2349:All-source intelligence 1969:Intelligence management 1678:Covert listening device 1648:Intelligence assessment 1518:, Reader's Digest Press 1494:Studies in Intelligence 1444:, The Local, 2007-05-14 1372:"Language of Espionage" 1333:Studies in Intelligence 1256:Studies in Intelligence 907:position to negotiate. 2455:Government recruitment 2043:Operational techniques 1998:Special reconnaissance 1045: 984:Technical intelligence 807:classified information 155:by rewriting it in an 2450:Military intelligence 2445:Intelligence analysis 1927:Targeted surveillance 1355:"love and the C.I.A." 1040: 946:False flag approaches 730:Sir Geoffrey Harrison 645:Further information: 621:voice stress analysis 2364:Medical intelligence 2334:Competing hypotheses 2144:Industrial espionage 2129:Denial and deception 1853:Industrial espionage 1653:competing hypotheses 1514:John Barron (1974), 1468:, London, 2008-08-28 1329:"Work with Walk-Ins" 1250:Steinmeyer, Walter, 934:Revenge/disaffection 535:counter-intelligence 428:counter-intelligence 2440:Counterintelligence 2397:Counterintelligence 2312:Technical (TECHINT) 2307:Open-source (OSINT) 2297:Geospatial (GEOINT) 2271:Casualty estimation 1082:"Chapter 3, Agents" 968:countersurveillance 830:John Anthony Walker 783:intelligence agent 746:Clayton J. Lonetree 714:Robert Gordon Switz 604:Double Cross System 222:counterintelligence 94:rewrite the content 2435:Types of espionage 2369:Military geography 2354:Basic intelligence 2292:Financial (FININT) 2233:signature (MASINT) 2159:One-way voice link 2095:Concealment device 1804:Cold War espionage 1771:Front organization 1745:Surveillance tools 1723:Phone surveillance 1718:One-way voice link 1673:Concealment device 785:Michael Soussoudis 560:General assessment 491:Assessing walk-ins 214:human intelligence 157:encyclopedic style 144:is written like a 2417: 2416: 2320: 2319: 2211:Direction finding 2201:In modern history 2182: 2181: 1935: 1934: 1589:Agent provocateur 1503:on March 12, 2008 1339:on March 12, 2008 1262:on March 12, 2008 767:Irvin C. Scarbeck 456:defector in place 369:service about an 263:nonofficial cover 203: 202: 195: 185: 184: 177: 127: 126: 67: 16:(Redirected from 2462: 2216:Traffic analysis 2188:Signals (SIGINT) 2023:Asset recruiting 1991: 1982: 1962: 1955: 1948: 1939: 1549: 1542: 1535: 1526: 1520: 1519: 1511: 1505: 1504: 1502: 1482: 1476: 1475: 1474: 1473: 1458: 1452: 1451: 1450: 1449: 1436: 1430: 1419: 1413: 1412: 1392: 1386: 1385: 1383: 1382: 1368: 1362: 1361: 1359:Harpers Magazine 1350: 1341: 1340: 1321: 1315: 1314: 1312: 1306:, archived from 1305: 1294: 1288: 1287: 1286: 1275: 1264: 1263: 1247: 1241: 1240: 1224: 1213: 1212: 1210: 1204:, archived from 1203: 1192: 1177: 1176: 1175: 1174: 1168: 1161: 1151: 1145: 1144: 1132: 1113: 1112: 1110: 1099: 1090: 1089: 1077: 740:Mordechai Vanunu 681:Clayton Lonetree 675:, and the Cuban 198: 191: 180: 173: 169: 166: 160: 137: 136: 129: 122: 119: 113: 78: 77: 70: 59: 37: 36: 29: 21: 2470: 2469: 2465: 2464: 2463: 2461: 2460: 2459: 2420: 2419: 2418: 2413: 2378: 2316: 2302:Imagery (IMINT) 2280: 2241:Electro-optical 2232: 2231:Measurement and 2225: 2178: 2154:Numbers station 2083:Black operation 2047: 2009: 1971: 1966: 1936: 1931: 1905:Sting operation 1814:Black operation 1780: 1776:Limited hangout 1758: 1749: 1713:Numbers station 1665: 1659: 1636: 1576: 1558: 1553: 1523: 1513: 1512: 1508: 1500: 1484: 1483: 1479: 1471: 1469: 1460: 1459: 1455: 1447: 1445: 1438: 1437: 1433: 1428:Wayback Machine 1420: 1416: 1409: 1394: 1393: 1389: 1380: 1378: 1370: 1369: 1365: 1352: 1351: 1344: 1323: 1322: 1318: 1313:on May 21, 2003 1310: 1303: 1296: 1295: 1291: 1284: 1277: 1276: 1267: 1249: 1248: 1244: 1226: 1225: 1216: 1208: 1201: 1194: 1193: 1180: 1172: 1170: 1166: 1159: 1153: 1152: 1148: 1134: 1133: 1116: 1108: 1101: 1100: 1093: 1079: 1078: 1069: 1065: 1053: 1017: 980: 964: 913: 888: 873: 860: 826: 777:Sharon Scranage 649: 643: 630: 562: 493: 484: 403: 383: 358: 338:principal agent 333: 324: 286: 243: 241:Types of agents 199: 188: 187: 186: 181: 170: 164: 161: 153:help improve it 150: 138: 134: 123: 117: 114: 91: 79: 75: 38: 34: 23: 22: 15: 12: 11: 5: 2468: 2466: 2458: 2457: 2452: 2447: 2442: 2437: 2432: 2422: 2421: 2415: 2414: 2412: 2411: 2406: 2405: 2404: 2394: 2388: 2386: 2380: 2379: 2377: 2376: 2371: 2366: 2361: 2356: 2351: 2346: 2341: 2339:Target-centric 2336: 2330: 2328: 2322: 2321: 2318: 2317: 2315: 2314: 2309: 2304: 2299: 2294: 2288: 2286: 2282: 2281: 2279: 2278: 2268: 2263: 2261:Radiofrequency 2258: 2253: 2248: 2243: 2237: 2235: 2227: 2226: 2224: 2223: 2218: 2213: 2208: 2203: 2198: 2192: 2190: 2184: 2183: 2180: 2179: 2177: 2176: 2171: 2166: 2161: 2156: 2151: 2146: 2141: 2136: 2131: 2126: 2117: 2112: 2107: 2102: 2097: 2092: 2091: 2090: 2080: 2075: 2074: 2073: 2068: 2057: 2055: 2049: 2048: 2046: 2045: 2040: 2035: 2030: 2025: 2019: 2017: 2011: 2010: 2008: 2007: 2006: 2005: 1994: 1988: 1986:Human (HUMINT) 1979: 1973: 1972: 1967: 1965: 1964: 1957: 1950: 1942: 1933: 1932: 1930: 1929: 1924: 1923: 1922: 1917: 1907: 1902: 1897: 1892: 1887: 1882: 1877: 1872: 1871: 1870: 1865: 1855: 1850: 1845: 1844: 1843: 1838: 1828: 1827: 1826: 1821: 1811: 1806: 1801: 1800: 1799: 1788: 1786: 1782: 1781: 1779: 1778: 1773: 1768: 1762: 1760: 1751: 1750: 1748: 1747: 1742: 1741: 1740: 1730: 1725: 1720: 1715: 1710: 1705: 1700: 1695: 1690: 1685: 1680: 1675: 1669: 1667: 1666:communications 1661: 1660: 1658: 1657: 1656: 1655: 1644: 1642: 1638: 1637: 1635: 1634: 1629: 1624: 1619: 1614: 1609: 1604: 1603: 1602: 1592: 1585: 1583:Agent handling 1579: 1577: 1575: 1574: 1569: 1563: 1560: 1559: 1554: 1552: 1551: 1544: 1537: 1529: 1522: 1521: 1506: 1488:(1993-09-22), 1477: 1453: 1431: 1414: 1407: 1387: 1363: 1342: 1325:Serov, Ivan A. 1316: 1289: 1265: 1242: 1214: 1178: 1146: 1114: 1091: 1066: 1064: 1061: 1060: 1059: 1052: 1049: 1016: 1013: 1012: 1011: 1007: 1006: 979: 976: 963: 960: 959: 958: 957: 956: 953: 950: 947: 944: 941: 938: 935: 932: 926: 912: 909: 887: 884: 872: 869: 859: 856: 825: 822: 821: 820: 814: 799: 788: 774: 764: 743: 737: 727: 717: 642: 639: 629: 626: 625: 624: 613: 610: 606: 596: 593: 561: 558: 523: 522: 518: 516:Asylum seekers 513: 501:Robert Hanssen 497:Oleg Penkovsky 492: 489: 483: 480: 479: 478: 474: 466: 459: 451: 443: 442: 435: 402: 399: 382: 379: 363:Oleg Penkovsky 357: 354: 332: 329: 323: 320: 285: 282: 251:Victor Suvorov 242: 239: 201: 200: 183: 182: 141: 139: 132: 125: 124: 82: 80: 73: 68: 42: 41: 39: 32: 24: 14: 13: 10: 9: 6: 4: 3: 2: 2467: 2456: 2453: 2451: 2448: 2446: 2443: 2441: 2438: 2436: 2433: 2431: 2428: 2427: 2425: 2410: 2407: 2403: 2402:organizations 2400: 2399: 2398: 2395: 2393: 2390: 2389: 2387: 2385: 2384:Dissemination 2381: 2375: 2372: 2370: 2367: 2365: 2362: 2360: 2357: 2355: 2352: 2350: 2347: 2345: 2342: 2340: 2337: 2335: 2332: 2331: 2329: 2327: 2323: 2313: 2310: 2308: 2305: 2303: 2300: 2298: 2295: 2293: 2290: 2289: 2287: 2283: 2276: 2272: 2269: 2267: 2264: 2262: 2259: 2257: 2254: 2252: 2249: 2247: 2244: 2242: 2239: 2238: 2236: 2234: 2228: 2222: 2219: 2217: 2214: 2212: 2209: 2207: 2204: 2202: 2199: 2197: 2194: 2193: 2191: 2189: 2185: 2175: 2172: 2170: 2169:Steganography 2167: 2165: 2162: 2160: 2157: 2155: 2152: 2150: 2149:Interrogation 2147: 2145: 2142: 2140: 2137: 2135: 2134:Eavesdropping 2132: 2130: 2127: 2125: 2121: 2118: 2116: 2113: 2111: 2108: 2106: 2103: 2101: 2098: 2096: 2093: 2089: 2086: 2085: 2084: 2081: 2079: 2076: 2072: 2069: 2067: 2064: 2063: 2062: 2059: 2058: 2056: 2054: 2050: 2044: 2041: 2039: 2038:Direct action 2036: 2034: 2033:Covert action 2031: 2029: 2026: 2024: 2021: 2020: 2018: 2016: 2012: 2004: 2003:organizations 2001: 2000: 1999: 1996: 1995: 1992: 1989: 1987: 1983: 1980: 1978: 1974: 1970: 1963: 1958: 1956: 1951: 1949: 1944: 1943: 1940: 1928: 1925: 1921: 1918: 1916: 1913: 1912: 1911: 1908: 1906: 1903: 1901: 1898: 1896: 1893: 1891: 1888: 1886: 1883: 1881: 1878: 1876: 1873: 1869: 1866: 1864: 1863:interrogation 1861: 1860: 1859: 1856: 1854: 1851: 1849: 1846: 1842: 1839: 1837: 1834: 1833: 1832: 1831:Eavesdropping 1829: 1825: 1822: 1820: 1817: 1816: 1815: 1812: 1810: 1807: 1805: 1802: 1798: 1795: 1794: 1793: 1790: 1789: 1787: 1783: 1777: 1774: 1772: 1769: 1767: 1764: 1763: 1761: 1756: 1752: 1746: 1743: 1739: 1736: 1735: 1734: 1733:Steganography 1731: 1729: 1726: 1724: 1721: 1719: 1716: 1714: 1711: 1709: 1708:Invisible ink 1706: 1704: 1701: 1699: 1696: 1694: 1691: 1689: 1686: 1684: 1681: 1679: 1676: 1674: 1671: 1670: 1668: 1662: 1654: 1651: 1650: 1649: 1646: 1645: 1643: 1639: 1633: 1630: 1628: 1627:Sleeper agent 1625: 1623: 1620: 1618: 1615: 1613: 1610: 1608: 1605: 1601: 1598: 1597: 1596: 1593: 1591: 1590: 1586: 1584: 1581: 1580: 1578: 1573: 1570: 1568: 1565: 1564: 1561: 1557: 1550: 1545: 1543: 1538: 1536: 1531: 1530: 1527: 1517: 1510: 1507: 1499: 1495: 1491: 1487: 1481: 1478: 1467: 1463: 1457: 1454: 1443: 1442: 1435: 1432: 1429: 1425: 1422: 1418: 1415: 1410: 1404: 1400: 1399: 1391: 1388: 1377: 1373: 1367: 1364: 1360: 1356: 1349: 1347: 1343: 1338: 1334: 1330: 1326: 1320: 1317: 1309: 1302: 1301: 1293: 1290: 1283: 1282: 1274: 1272: 1270: 1266: 1261: 1257: 1253: 1246: 1243: 1238: 1234: 1230: 1223: 1221: 1219: 1215: 1211:on 2008-02-28 1207: 1200: 1199: 1191: 1189: 1187: 1185: 1183: 1179: 1169:on 2007-08-22 1165: 1158: 1157: 1150: 1147: 1142: 1138: 1131: 1129: 1127: 1125: 1123: 1121: 1119: 1115: 1107: 1106: 1098: 1096: 1092: 1087: 1083: 1076: 1074: 1072: 1068: 1062: 1058: 1055: 1054: 1050: 1048: 1044: 1039: 1037: 1033: 1028: 1026: 1021: 1014: 1009: 1008: 1004: 1003: 1002: 999: 997: 993: 989: 985: 977: 975: 971: 969: 961: 954: 951: 948: 945: 942: 939: 936: 933: 930: 929: 927: 923: 922: 921: 917: 910: 908: 904: 900: 896: 892: 885: 883: 880: 878: 870: 868: 864: 857: 855: 853: 849: 845: 841: 840:Katrina Leung 837: 835: 831: 823: 818: 817:Won Jeong-hwa 815: 812: 808: 804: 800: 797: 793: 789: 786: 782: 778: 775: 772: 768: 765: 762: 758: 754: 751: 747: 744: 741: 738: 735: 731: 728: 725: 721: 718: 715: 711: 710: 709: 706: 704: 703: 697: 692: 690: 686: 682: 678: 674: 670: 665: 663: 658: 655: 648: 640: 638: 634: 627: 622: 618: 614: 611: 607: 605: 601: 597: 594: 591: 590: 589: 586: 582: 578: 576: 572: 566: 559: 557: 555: 550: 548: 542: 538: 536: 531: 527: 519: 517: 514: 512: 509: 508: 507: 504: 502: 498: 490: 488: 481: 475: 471: 467: 464: 460: 457: 452: 448: 447: 446: 440: 439:iron curtains 436: 433: 429: 424: 423: 422: 420: 416: 410: 408: 400: 398: 396: 392: 387: 380: 378: 376: 372: 368: 364: 355: 353: 351: 345: 343: 339: 330: 328: 321: 319: 315: 311: 308: 306: 301: 297: 295: 294:access agents 290: 283: 281: 279: 274: 272: 271:access agents 266: 264: 260: 256: 252: 249:According to 247: 240: 238: 236: 235:case officers 232: 231: 225: 223: 219: 215: 211: 207: 197: 194: 179: 176: 168: 158: 154: 148: 147: 142:This article 140: 131: 130: 121: 111: 107: 103: 99: 95: 89: 88: 83:This article 81: 72: 71: 66: 64: 57: 56: 51: 50: 45: 40: 31: 30: 27: 19: 2174:Surveillance 2164:Resident spy 2105:Cryptography 2022: 1910:Surveillance 1808: 1698:Cyber spying 1683:Cryptography 1622:Resident spy 1607:Double agent 1587: 1515: 1509: 1498:the original 1493: 1480: 1470:, retrieved 1465: 1456: 1446:, retrieved 1440: 1434: 1417: 1397: 1390: 1379:. Retrieved 1375: 1366: 1358: 1337:the original 1332: 1319: 1308:the original 1299: 1292: 1280: 1260:the original 1255: 1245: 1236: 1232: 1206:the original 1197: 1171:, retrieved 1164:the original 1155: 1149: 1140: 1104: 1085: 1057:Useful Idiot 1046: 1041: 1029: 1022: 1018: 1000: 981: 972: 965: 918: 914: 905: 901: 897: 893: 889: 881: 876: 874: 865: 861: 838: 834:Aldrich Ames 827: 720:John Vassall 707: 702:access agent 700: 693: 666: 659: 650: 635: 631: 600:World War II 587: 583: 579: 567: 563: 551: 543: 539: 532: 528: 524: 505: 494: 485: 444: 411: 404: 388: 384: 375:Kuala Lumpur 359: 346: 342:access agent 341: 337: 334: 325: 316: 312: 309: 302: 298: 291: 287: 275: 267: 248: 244: 228: 226: 205: 204: 189: 171: 165:January 2021 162: 143: 118:January 2021 115: 92:Please help 84: 60: 53: 47: 46:Please help 43: 26: 2246:Geophysical 2028:Cell system 2015:Clandestine 1900:Stay-behind 1809:Recruitment 1766:Canary trap 1664:Devices and 1612:Field agent 1486:Jones, R.V. 982:As part of 962:Recruitment 858:Development 750:U.S. Marine 673:Markus Wolf 430:as well as 373:meeting in 305:cell system 278:Rudolf Abel 253:, a former 102:Wikiversity 2424:Categories 2275:earthquake 2139:False flag 1977:Collection 1895:Sexpionage 1875:COINTELPRO 1868:safe house 1848:False flag 1785:Operations 1759:techniques 1755:Tradecraft 1472:2008-08-31 1448:2007-05-21 1408:1850434719 1381:2021-04-15 1173:2007-10-31 1063:References 647:Sexpionage 617:polygraphy 554:Ivan Serov 259:diplomatic 110:Wikivoyage 49:improve it 2266:Materials 2120:Defection 2115:Dead drop 2088:black bag 2053:Espionage 1819:black bag 1703:Dead drop 1632:Spymaster 1556:Espionage 1466:The Times 844:Taiwanese 796:Pakistani 792:Islamabad 696:kompromat 662:Seduction 526:quickly. 511:Defectors 470:defection 432:espionage 367:Malaysian 336:called a 227:The term 106:Wikibooks 85:contains 55:talk page 2326:Analysis 2124:Turncoat 2071:handling 1885:SHAMROCK 1738:microdot 1641:Analysis 1424:Archived 1239:(1): 165 1051:See also 877:rezident 781:Ghanaian 753:Sergeant 602:British 415:Cold War 371:al-Qaeda 350:LinkedIn 284:Spotting 218:doubling 2273: ( 2251:Nuclear 2221:TEMPEST 1880:MINARET 1824:wetwork 925:agents. 811:Serbian 809:to her 151:Please 2110:Cutout 2061:Agents 1915:Global 1841:MASINT 1836:SIGINT 1688:Cutout 1572:Assets 1567:Agents 1405:  996:Line X 803:Kosovo 771:Polish 761:Vienna 757:Soviet 689:Vienna 671:under 419:HUMINT 395:SIGINT 340:or an 100:it to 2430:Spies 2285:Other 2256:Radar 2100:Cover 2078:Asset 2066:field 1600:Agent 1595:Cover 1311:(PDF) 1304:(PDF) 1285:(PDF) 1209:(PDF) 1202:(PDF) 1167:(PDF) 1160:(PDF) 1109:(PDF) 669:Stasi 391:OSINT 210:spies 108:, or 1920:Mass 1890:FVEY 1617:Mole 1403:ISBN 1034:and 990:and 748:, a 98:move 1757:and 1036:NSA 1032:CIA 1025:KGB 992:GRU 988:KGB 952:Sex 848:FBI 734:KGB 724:KGB 352:). 261:or 230:spy 2426:: 2122:/ 1492:, 1464:, 1374:. 1357:, 1345:^ 1331:, 1327:, 1268:^ 1254:, 1237:XI 1235:, 1231:, 1217:^ 1181:^ 1139:, 1117:^ 1094:^ 1084:, 1070:^ 619:, 577:. 273:. 224:. 104:, 58:. 2277:) 1961:e 1954:t 1947:v 1548:e 1541:t 1534:v 1411:. 1384:. 736:. 434:. 196:) 190:( 178:) 172:( 167:) 163:( 159:. 120:) 116:( 112:. 90:. 65:) 61:( 20:)

Index

Clandestine HUMINT asset recruiting
improve it
talk page
Learn how and when to remove these messages
instructions, advice, or how-to content
rewrite the content
move
Wikiversity
Wikibooks
Wikivoyage
personal reflection, personal essay, or argumentative essay
help improve it
encyclopedic style
Learn how and when to remove this message
Learn how and when to remove this message
spies
human intelligence
doubling
counterintelligence
spy
case officers
Victor Suvorov
Soviet military intelligence officer
diplomatic
nonofficial cover
access agents
Rudolf Abel
access agents
cell system
LinkedIn

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑