854:(MSS). Her first reports were independently confirmed by the CIA. Later, however, she was found to be passing FBI documents to the MSS, while still reporting to the FBI. While she was allowed, at first, to continue, on the belief that the information she provided to the United States was more important than that which she was giving to the PRC, she was eventually arrested and charged with a relatively low-level crime. Eventually, that was dismissed for reasons of prosecutorial misconduct, although a subsequent U.S. government appeal resulted in a plea bargain. Her true loyalty was never made public, but, at various times, she appears to have been a dangled mole and a doubled agent, as well as possibly a PRC access agent to FBI personnel.
998:, which reported to Directorate T of the KGB First Chief Directorate. The GRU ran recruitments at industry trade shows. Suvorov explains that recruitment was extremely effective with small firms: "The owner of a small firm, even a very successful one, is always at great risk, always keen to strengthen his situation...In any case, if he sells his product he can hide the fact from the authorities. It is equally easy for him to hide the money he has received". The businessman, however, may forget that while he might not report the cash transaction to his own government, the GRU certainly has recorded the act of payment, and can use it for subsequent blackmail.
465:: by observation of intelligence activities operated from embassies of country X, a counterintelligence service can deduce characteristic recruiting and agent handling practices for country X. Because these officers and techniques affect many hostile targets in the country of operations, once this information is known, the foreign intelligence service (FIS) agents can be neutralized in a variety of ways, including police action, convincing the asset in the country of operations to stop cooperating with the FIS, or, ideally, "recruiting the hostile intelligence officer in place".
891:
intelligence officer may then, through friendly persuasion, ask for a very innocent and insignificant favor from the candidate and pay him generously for it, thus placing the candidate in a position of obligation. During this stage the future agent becomes accustomed to being asked favors and fulfilling them accurately. The future agent's ambitions, financial and work problems, hobbies, etc., are continuously assessed by an intelligence team to exacerbate weaknesses. The future agent's professional, social, and private personalities are soon stripped away.
280:, recruited in the target country, or recruited in a third country. One of the supplementary functions is communications, which includes clandestine radio transmission, dead drops, couriers, and finding places for secure radio transmissions. Other supplementary functions include people who can "legalise" agents with cover jobs, and specialists that can forge documents or get illicit copies from the actual source. Safe houses, safe mail drops, and safe telephones are other supplementary functions.
882:"The crash approach, or 'love at first sight' in GRU jargon, has a number of irrefutable advantages. Contact with the future agent takes place only once, instead of at meetings over many months, as is the case with the gradual approach. After the first contact the newly recruited agent will himself take action on his own security. He will never talk to his wife, or tell her that he has a charming friend in the Soviet military attaché who is also very interested in stamp collecting."
970:, during which additional officers may be watching the meeting, and the travel to it, for evidence of "country A" counterintelligence interest. Without the developmental fully realizing it, he is being drawn into increasingly treasonous activity, which would be harder and harder to explain were he caught. It is considered important for the case officer to offer money, perhaps dismissed as covering expenses, but really as a means of compromising the developmental.
477:
developable for recruitment during his current tour, but six months from now it might be a different story. Political turmoil being what it is within the
Satellites, the "ins" can rapidly become the "outs". If we can identify a man as a former "in" who is now "out" we may be able to recruit him. But this kind of identification requires orderly and current biographic indexes of Satellite personnel who travel abroad".
76:
35:
458:, continuing to report. "The Satellite diplomat, foreign trade official, journalist, or intelligence officer who has been useful to us abroad will be even more valuable when he goes back home at the end of his tour, not just because he is then inside the target country, but because the intelligence to which he has access in a ministry headquarters has greater scope and depth.
289:
Alternatively, the potential agent may approach the agency; many intelligence assets were not recruited but were "walk-ins" or "write-ins" who offered information to foreign intelligence services. Background research is conducted on the potential agent to identify any ties to a foreign intelligence agency, select the most promising candidates and approach method.
1043:
legalizers are subjected to especially thorough vetting, because the fate of illegals is entrusted to them. When a Soviet illegal arrives in a country the task of the legalizing agent is to ensure the issue of documents by making the necessary entries in the registration books and to ensure that the illegal is in possession of the necessary documentation.
135:
348:
are perfectly reasonable in non-espionage contexts, such as looking for jobs or people to fill them. The process of personnel recruiting for industry is not completely dissimilar from recruiting spies. Both may use personal networks, and, in industrialized countries, computer-assisted personal "networking" (for example, through websites such as
633:
government), who can deal on a regular basis with both hostile and friendly government personnel with such access to sensitive material that it may warrant for their individual or joint recruitment, upon the recommendation from the access agent, by the intelligence apparatus for which the access agent is actually working for.
903:
some cases, it may be possible to get useful information without ever asking the developmental to betray his country. These cases may mean the role of the recruit is not to be as a direct agent, but perhaps as an access or a support agent. The recruit may not even be witting of his relationship to a FIS.
636:
Within private and public organizations that handle sensitive material, human resource workers, receptionists, and other seemingly low-level personnel know a great deal about the people with sensitive access. Certain employees, such as guards and janitors, who have no formal access, still may be able
608:
If there are inconsistencies in the agent's life story, which the case officer can query periodically through social conversation, the truth is usually in the consistent aspects. It is easier to make a mistake in keeping up a lie, than in telling the truth, which is the reason criminal investigators
472:
of senior diplomatic, trade, or intelligence personnel. Defection can obviously yield only those golden eggs already in the nest; it cuts off the continuing intelligence that could be provided by an in-place asset. It may be worthwhile, however, simply to deny a target country the services of an able
326:
After the selection of a candidate for recruitment, the first stage, tracing and cultivating, commences. Details are collected about the candidate, details which may be obtained through reference, books, telephone directories, the press, and other recruited agents. Further definition of motives which
317:
That continued meetings both provide substantive intelligence, as well as knowledge about the asset, are not incompatible with security. Agent handlers still observe all the rules of clandestinity while developing the agent relationship. Knowledge of meetings, and indeed knowledge of the existence of
906:
Finally, the relationship will move from clandestine to overt, when the foreign service has significant compromising information on the asset. If the asset had been motivated by money, he will find the tasks given him may become more challenging, but the payments reduce, because he is no longer in a
584:
There are both local and headquarters-based means of validation. The case officer should compare information, provided by the agent, with locally known facts, both from overt and covert sources. Some services, especially the
Russian/Soviet, may not have formal or extensive OSINT, and either the case
347:
Indeed, an access agent may arrange introductions without being completely witting that the purpose of meeting the target is to find people who will participate in espionage. A well-respected technical professional, or a professor, often will make introductions within their field. Such introductions
299:
Surveillance of targets (e.g., military or other establishments, open source or compromised reference documents) sometimes reveals people with potential access to information, but no clear means of approaching them. With this group, a secondary survey is in order. Headquarters may be able to suggest
902:
The interaction becomes more sensitive, especially when the case officer asks for something technically classified, but with an explanation that lets the potential recruit rationalize that he is not really betraying any trust. During this time, the case officer is building psychological control. In
862:
Development, the preparation for actual recruiting, involves a direct approach by a case officer who has some existing access to the potential recruit, an indirect approach through an access agent or proprietary, or has reason to risk a "cold" approach. Before the direct recruitment, there may be a
449:
The most valuable recruit had regular access to "current political and economic intelligence from the installation in question". Ideally, the asset would be in the highest-priority country and have access to "the minutes of
Politburo meetings" or equally critical military, scientific, or other data
245:
Acquiring information may not involve collecting secret documents, but something as simple as observing the number and types of ships in a port. Even though such information might be readily visible, the laws of many countries would consider reporting it to a foreign power as espionage. Other asset
973:
Eventually, especially if the recruit is ideologically sympathetic to
Country B, the case officer makes the direct recruitment pitch. This may not work, and, in fact, may induce rage. The case officer has to be prepared for physical defense and escape if this becomes necessary. If the case officer
866:
The case officer, possibly through an access agent, works on establishing a relationship. This phase, in which the potential agent is called a developmental, has not yet reached the recruiting pitch. After the cultivation stage, overt contact is established with the candidate under the guise of an
698:
of an
American officer. The CIA itself made limited use of sexual recruitment against foreign intelligence services. "Coercive recruitment generally didn't work. We found that offers of money and freedom worked better". If the Agency found a Soviet intelligence officer had a girlfriend, they would
632:
An access agent does not have significant access to material of intelligence value, but has contact with those who do. Such a person could be as simple as the barber outside a military base, or as complex as a mid or high level staff officer of any organization, or think tank (i.e., outside the
580:
Headquarters may have access to information that a field office does not, such as being able to access credit records to identify financial stress, through a cutout that hides the request as having come from country B's service. Another area where a central office can help is to correlate possible
540:
While the interviewers will actually be from MI, the walk-in will never be told the identities of intelligence personnel. If they ask to see an intelligence representative, they will be told none is available. Both these measures are intended to prevent hostile intelligence services learning about
288:
Recruiting process typically begins with "spotting". Spotting is the identification of targets—people—who appear to have access to information, or are attractive for some support role. This individual may be "developed" over a period of time before the approach is made or it could be made "cold".
898:
Information requests begin innocently, usually asking for public information, but to get the development on the path to betrayal. At first, any requests for documents are for open ones, which the case officer gives some pretext for not himself obtaining. A creative task officer may then ask for a
453:
Nearly as important is an agent who will continue the relationship once he returns to his home country, be that the Soviet Union or a satellite. Recruitment is harder to detect with the less intense counterintelligence surveillance of an independent or satellite country. "Installation penetration
916:
particular fields of science available in one's own country for consultation. The phenomena of nature are independent of political boundaries, and the experts are in the position of agents spying on these phenomena insofar as they throw light on the feasibility of a suspected enemy development".
335:
Especially when the case officer is of a different culture than the one whose people he is targeting, the recruitment process begins not necessarily with a person that has the desired information. Instead, the first recruit may be someone well-connected in the local culture. Such a person may be
268:
Basic agents can be formed into groups with leaders, or report directly to the controller. Basic agents include information providers, perhaps through espionage or expertise about some local subject. Also in the basic group are "executive agents", who will kill or commit sabotage, and recruiting
520:
Walk-ins: who seek to provide information to the United States; or a disaffected person (one who is discontent and resentful, especially against authority) who presents him- or herself to a U.S. installation in a foreign country and who appears willing to accept recruitment in place or requests
1042:
Obtaining the documentation and other resources is the role of legalizing agents and documentalists. Candidate for this category of agents are sought among officials of the police and passport departments, consular clerks, customs and immigration officials, and small employers of labor. Agent
486:
In deciding whether to recruit a prospect, there needs to be a process to make sure that the person is not actively working for the adversary's counterintelligence, is under surveillance by them, or presents other risks that may not make recruitment wise. The assessment process applies both to
476:
Last in priority is not direct recruitment, but the collection of information to support future recruitment. This begins with obtaining biographical information on "officials abroad who are likely in the future to have other tours of foreign duty somewhere in the world. An official may not be
525:
A Soviet response, to someone visiting the embassy, was "This is a diplomatic representation and not an espionage centre. Be so kind as to leave the building or we will call the police". According to
Suvorov, the police are usually not called but the embassy staff chase the would-be agent out
919:
A 1998 document describes typical foreign intelligence recruitment against citizens with access to sensitive technology. "Hostile intelligence services begin the agent recruitment process by scrupulously collecting information on persons who are connected to industry, RDT&E laboratories,
915:
The traditional openness of the scientific community can be exploited to obtain information from an individual with access to commercially, scientifically, or militarily valuable material. "There is another important source, peculiar to scientific intelligence. This is the body of experts in
450:
In the case of countries that either dominate countries (e.g., the satellites of the former Soviet Union) or client states of another power, officials of the client country, or of the patron country's representatives in the client, may be easier to recruit than officials in the home country.
313:
According to
Suvorov, the Soviet GRU was not always able to collect enough material, principally from open sources, to understand the candidate's motivations and vulnerabilities. It was GRU doctrine, therefore, to use every meeting to continue to elicit this information. Other intelligence
890:
Telling one's wife or colleagues about a charming Soviet friend can compromise the entire development. The United States is also aware that the Soviet developmental process is, preferably, gradual. "The developmental stage cements the relationship and encourages loyalty to it. The hostile
529:
Cautious handling of walk-ins was not exclusively a Soviet concern. U.S. Army procedure is to have military intelligence (MI) or military police (MP) personnel handle all aspects of walk-ins. Under U.S. Army
Regulations, military police are not intended to do interrogations, which are the
360:
A professional intelligence officer may very well obtain contacts through counterparts in the intelligence services of allied countries. The other service may arrange direct contact and then drop out of the process, or may jointly operate an asset such as the joint U.S.–UK operation with
564:
It has been the general experience of intelligence agencies that potential recruits, recruits early in the development process, and those currently reporting to a local case officer, still need to be checked against master biographical and other files, which will help spot foreign
1019:
While usual practice is to recruit residents of the country being targeted, there have been instances where the FIS brought illegal agents into that country. Common practice was to have them enter via a third country, and perhaps claim to be immigrants from a fourth.
409:, in that it is not focused on the recruit himself or herself, the probability of recruitment, etc., but, when there is more than one possible recruit, and a finite amount of case officer time, the discussion here gives criteria to select the most important targets.
894:
It is the goal of the case officer, with appropriate support from his organization, to learn vulnerabilities, build trust, and solve problems for the developmental. These are all preparatory steps to asking, perhaps subtly, the developmental to betray his own side.
425:
They were involved in an embassy, legation, consulate, trade mission, and news bureau that constituted the "instrumentalities for that economic penetration, political subversion, and espionage that threatened U.S. interests". That focus could be considered one of
385:
HUMINT collectors often have analysts in their own organizations with a sophisticated understanding of the people, with specialized knowledge in targeted countries, industries, or other groups. The analyst may or may not know details of the target's personality.
651:
U.S. intelligence services, for example, are concerned when their own personnel could be subject to sexual blackmail. This applied to any homosexual relationship until the mid-1990s, and also applied to heterosexual relationships with most foreign nationals. See
732:, the British Ambassador to the Soviet Union, was recalled to London in 1968 after he admitted to the Foreign Office that he had been having an affair with a Russian chambermaid at the embassy, of which he had been shown compromising photographs by the
344:, who may simply arrange introductions, or actually run the operations of subagents. Some agents of this type may be able to help in the pre-recruitment stages of assessment and development, or may only be involved in finding possible assets.
544:
The
Soviets showed caution equivalent to the United States. Soviet GRU doctrine was that on general, a walk-in is considered only when they can show some evidence of access to valuable material. The best way of doing this is actually
879:, or chief of the GRU unit, convinces GRU headquarters that the risk is worthwhile. "Quite a few examples are known of recruitment at the first meeting, of course following the secret cultivation which has gone on for many months".
412:
One analysis by a U.S. clandestine service officer with knowledge of
European practices has five descending priorities in the period between 1957 and 1962. He developed these in the context of being stationed in Europe during the
568:
Once an individual is seen to have potential access to information, the recruiting officer or staff considers why a presumably loyal and trusted individual might be willing to betray his own side. A basic set of reasons are the
637:
to gain access to secured rooms and containers; there is a blurry area between an access agent that might let your collector into an area, and a support employee who can collect information that he may or may not understand.
656:
for fictional examples. In some cases, especially when the national was a citizen of a friendly nation, the relationship needed to be reported. Failure to do so, even with a friendly nation, could result in dismissal.
924:
They must be in a position to provide information of real use to the hostile intelligence service, either to steal or copy S&T information, to communicate secret information by word of mouth, or to recruit new
679:) frequently sought to entrap CIA officers. The KGB believed that Americans were sex-obsessed materialists, and that U.S. spies could easily be entrapped by sexual lures. The best-known incident, however, was of
955:
Ideology (which is no longer the motivation it was during the Cold War; the Soviet service changed its emphasis to concentrate on sympathy for "persecuted" elements of American, or other targeted, society)
851:
966:
If the decision is made to make a formal recruitment, the case officer gets the developmental accustomed to meeting in more obscure places and at more unusual times. These can have the function of
623:, interviews by psychologists and psychiatrists, and perhaps more in the future, brain imaging, make use of these within the agency policy. Be aware that penetrators may be trained to resist them.
798:
woman, who was an intelligence agent. While the British Government deny that secrets were lost, other sources say that several Western operatives and operations within Pakistan were compromised.
1001:
Suvorov explained that while the most strategic information appears to be associated with major firms, there are several reasons why an approach to a smaller company is the place to begin.
2195:
660:
One former CIA officer said that while sexual entrapment was not generally a good tool to recruit a foreign official, it was sometimes employed successfully to solve short-term problems.
2408:
454:
thus becomes a means of establishing long-range assets in the Satellites by recruiting, testing, and training them while they are abroad". In other words, the priority is to recruit a
1959:
1489:
1328:
1251:
310:
The deliberate spotting process complements more obvious candidates, but candidates who are also more likely to be compromised by counterintelligence, such as walk-ins and write-ins.
307:
composed of relatives and people who have known one another for years. Access agents may be especially important here, and it may be worth the effort to spot potential access agents.
537:
specialists, information about the walk-in must be restricted to people with a "need-to-know." "The information the walk-in provides must be guarded and classified appropriately".
726:
into having sex with multiple male partners while drunk in 1954. The KGB then used photographs of this incident to blackmail Vassall into providing them with secret information.
2205:
556:, was willing to explore potential agents who gave plausible information about themselves and their access, or a "write-in" whose potential could be verified before a meeting.
303:
Recruiting people that may have access to the activities of non-state groups will be much harder, since these groups tend to be much more clandestine, and often operate on a
1423:
581:
penetration attempts by an individual who approaches one's own, or allied, intelligence services in different locations, as, for example, embassies in different cities.
365:. The allied officer may not actually provide access to his assets, but will convey information requests and responses. There is the example of a CIA learned from the
716:'s network. Osman provided war plans. He was arrested, represented by socialist lawyer Louis Waldman (later lawyer for Walter Krivitsky), and imprisoned for 25 years
487:
walk-ins and targeted recruits, but additional assessment needs to apply to the walk-in, who is most likely to be someone sent by a counterintelligence service.
1047:
A common technique was to find birth records of someone known later to have died. The "documentation agent" who did this would not have contact with illegals.
819:, who was arrested by South Korea in 2008 and charged with spying for North Korea, was accused of using this method to obtain information from an army officer.
276:
Both operation leaders and the supplementary group must be clandestine in support roles to basic agents. They may be clandestine officers of the FIS, such as
2338:
2002:
213:
1103:
1985:
1952:
1857:
1038:
specialists who would emplace technical sensors, ranging from telephone taps to specialized devices for measuring weapons tests, into the target country.
441:
for extended periods of time, two to five years", so recruitment could involve a wide range of United States, and possibly allied, intelligence resources.
473:
and experienced officer, and it may produce, in addition to his store of positive intelligence, leads to his former colleagues who are still in place".
389:
Even when no personal details are available, the recruiter, in an intelligence service, may have additional resources to use before the first contact.
2401:
2042:
292:
Obvious candidates are staff officers under diplomatic cover, or officers under nonofficial contact, have routine contact. Also possible contacts of
712:
Robert Osman, an American soldier stationed in Panama Canal Zone in 1933, was involved in a "honey trap" - Frema Karry, a young Russian girl in
2230:
2200:
1945:
1840:
1796:
920:
government institution staffs, military bases, and design organizations". A candidate for recruitment usually fulfills the following criteria:
684:
664:
is a classic technique; "swallow" was the KGB tradecraft term for women, and "raven" the term for men, trained to seduce intelligence targets.
867:
official meeting. After the acquaintanceship has ripened and official meetings evolve into personal meetings, the developmental stage begins.
495:
Major intelligence services are very cautious about walk-ins or write-ins, but some of the most important known assets were walk-ins, such as
2383:
48:
1497:
1336:
1259:
2032:
1791:
1030:
Specialists of the FIS might also need legalization to carry out clandestine intelligence collection. The United States has had a group of
145:
86:
156:
212:, who work for a foreign government, or within a host country's government or other target of intelligence interest for the gathering of
1546:
1023:
The introduction of an "illegal" might be due to the need to bring a specialist in to carry out some part of the operation. The Soviet
1976:
850:. She seduced her FBI case officer, and eventually was recruited by the FBI as a "dangle" to PRC targets, specifically in the Chinese
393:
research can find the publications of a professional, but also social interests. With due regard to the risks and resources required,
974:
can produce compromising photographs, receipts, etc., even an originally ideological subject now moves into the realm of compromise.
1692:
1300:
AR 190–8/OPNAVINST 3461.6/AFJI 31–304/MCO 3461.1: Enemy Prisoners of War, Retained Personnel, Civilian Internees and Other Detainees
1196:
776:
192:
174:
62:
1421:
2333:
2325:
1727:
1652:
1298:
421:
recruits in the Soviet Union and its satellite nations. His operations were focused on people with the general characteristics:
2454:
2343:
2449:
2444:
2274:
2099:
2014:
1594:
1406:
653:
1968:
2439:
875:
Suvorov describes the "crash approach" as the most demanding form of recruitment, which is to be done only if the local
687:. Once the seduction took place, she put him in touch with a KGB handler. The espionage continued after his transfer to
2434:
2391:
397:
can tap phone lines or intercept other communications that will give the recruiter more information about the target.
1398:
Against the Cold War : the history and political traditions of pro-Sovietism in the British Labour Party 1945-89
1371:
749:
1154:
828:
Yet other factors may apply. True friendship or romance may draw others to become involved with a current agent.
54:
2306:
2037:
787:. She later gave him information on CIA operations in Ghana, which was later shared with Soviet-bloc countries.
676:
468:
The fourth and fifth priorities are considerably less urgent than the first three. The fourth priority is the "
683:, a Marine guard supervisor at the Moscow embassy, who was seduced by a "swallow" who was a translator at the
598:
The information is true, but is too old to be of operational value. This was one of the key techniques of the
2358:
2348:
2296:
2027:
1677:
1647:
1539:
549:. Suvorov observes that "this is perhaps the only way to convince the GRU that they can trust the person".
2373:
2311:
2291:
2240:
1997:
995:
983:
806:
220:" spies who betray their oaths to work on behalf of a foreign intelligence agency is an important part of
899:
technically restricted, but still fairly innocent document, such as an unclassified telephone directory.
694:
The Soviets used sex not only for direct recruitment, but as a contingency for a possible future need of
2260:
1926:
1485:
620:
149:
that states a Knowledge (XXG) editor's personal feelings or presents an original argument about a topic.
1228:
773:
officer in 1961 and photographed in a compromising position. He was blackmailed into providing secrets.
1461:
615:
In the event that the recruiting officer's service uses technical means of detecting evasion, such as
2363:
2301:
2187:
2143:
2128:
2077:
1852:
1835:
1571:
546:
534:
469:
462:
455:
427:
394:
1005:
In many products, the true breakthroughs are not the entire aircraft or tank, but some subcomponent.
327:
will be used in the actual recruitment of the person are cultivated and weaknesses are exacerbated.
2396:
2270:
2087:
1914:
1818:
967:
829:
745:
713:
603:
585:
officer may need to check such things (or set up checkable requests) within the station/residency.
574:
570:
565:
counterintelligence. This counterintelligence interest could be from their own or third countries.
221:
17:
701:
300:
an approach, perhaps through a third country or through resources not known to the field station.
2368:
2353:
2245:
2220:
2158:
2109:
2094:
1803:
1770:
1744:
1722:
1717:
1687:
1672:
1532:
991:
784:
254:
1105:
Government 139 (Class Notes) Syllabus Section 1 — Human Intelligence: From Sleepers to Walk-ins
2210:
1919:
1588:
1402:
766:
759:
officer in 1987. He was then blackmailed into handing over documents when he was assigned to
729:
262:
1010:
People recruited in small firms may become access agents for recruitments in large companies.
705:. Once the CIA personnel had access to the Soviet officer, they might attempt to double him.
2265:
2215:
1884:
1616:
1396:
1354:
739:
680:
258:
986:
gathering, key business personnel, or even a business itself, might be recruited. Both the
2153:
2082:
1904:
1879:
1813:
1775:
1712:
1427:
846:
passport, became involved with a PRC activist, on whom she was recruited to report to the
1205:
763:. Lonetree was the first U.S. Marine to be convicted of spying against the United States.
2429:
2250:
2070:
1582:
500:
496:
362:
250:
1307:
1027:
had a Department V, staffed with officers qualified to kill or to carry out sabotage.
588:
Some definite warnings, which may come from local or headquarters reporting, include:
97:
2423:
2168:
2148:
2133:
1862:
1830:
1732:
1707:
1626:
1297:
Deputy Chief of Staff for Plans and Operations, United States Army (1 October 1997),
839:
816:
794:
was recalled home when it emerged that he had been involved in a relationship with a
779:, a CIA employee described as a "shy, naive, country girl", was allegedly seduced by
515:
377:, something that would have been impossible for a lone CIA case officer to discover.
2255:
2173:
2163:
2104:
1909:
1697:
1682:
1621:
1606:
1599:
1136:
1081:
1056:
833:
756:
719:
599:
438:
374:
234:
217:
937:
Blackmail/hostage Situations (used in USSR but very infrequently in United States)
296:, existing agents, or through information that suggests they may be compromised.
2065:
1899:
1765:
1611:
1279:
672:
277:
246:
roles include support functions such as communications, forgery, disguise, etc.
1156:
Educing Information--Interrogation: Science and Art, Foundations for the Future
2138:
1894:
1874:
1867:
1847:
1754:
1324:
832:, who spied for money, recruited friends and relatives. Rosario Ames, wife of
646:
553:
667:
During the Cold War, the KGB (and allied services, including the East German
541:
the structure or procedure of US intelligence/counterintelligence personnel.
2119:
2114:
2060:
2052:
1889:
1702:
1631:
1566:
1555:
1162:, National Defense Intelligence College Press, December 2006, archived from
791:
695:
661:
616:
431:
928:
There must exist motives by means of which an individual can be recruited:
521:
asylum or assistance in escaping from the control of his or her government.
1937:
506:
The U.S. Army defines three classes of people who may present themselves:
2123:
1737:
795:
752:
592:
The agent's information contradicts other information believed to be true
510:
414:
370:
366:
349:
1823:
612:
If the agent makes predictions, be very sure to see if they become true
1462:"Model defector Won Jeong Hwa faces trial over spying for North Korea"
1163:
843:
842:
is one of the more complex cases, who came to the United States on a
810:
802:
770:
760:
688:
418:
314:
authorities also see eliciting information as a continuing process.
780:
668:
390:
1941:
1528:
1501:(Excerpted from Research, Vol. 9 (September 1956), pp. 347-352)
1439:
1198:
DoD 5200.1 -PH-2 Hostile Intelligence Threat -- U.S. Technology
552:
Suvorov describes an ideal; the one-time head of the GRU, Gen.
1035:
1031:
1024:
987:
847:
733:
723:
722:, a British embassy official in Moscow, who was guided by the
229:
209:
128:
69:
28:
1281:
Regulation 381-22. Military Intelligence. Processing Walk-Ins
931:
Financial considerations/greed (transcends all other motives)
208:
refers to the recruitment of human agents, commonly known as
1524:
146:
personal reflection, personal essay, or argumentative essay
109:
595:
The agent's information has appeared in local open sources
533:
While serious discussion with the contact will be done by
101:
293:
270:
265:, handling two kinds of agent: basic and supplementary.
105:
2409:
Counterintelligence and counter-terrorism organizations
1229:"Espionage: Does It Have a Future in the 21st Century?"
152:
93:
1195:
United States Department of Defense (November 1998),
499:
or write-ins (using intelligence tradecraft) such as
269:
agents. In US practice, recruiting agents are called
708:
Examples of people trapped by sexual means include:
2382:
2324:
2284:
2229:
2186:
2051:
2013:
1984:
1975:
1784:
1753:
1663:
1640:
1562:
1348:
1346:
755:embassy guard in Moscow, was entrapped by a female
530:responsibility of military intelligence personnel.
318:the asset, must be on a strict need-to-know basis.
801:In May 2007 a female officer serving in Sweden's
406:
1130:
1128:
1126:
1124:
1122:
1120:
1118:
1075:
1073:
1071:
994:used this route. The KGB service for this was
1190:
1188:
1186:
1184:
1182:
1097:
1095:
463:offensive counterintelligence/counterespionage
1953:
1540:
1222:
1220:
1218:
836:, was brought into her husband's activities.
769:, a U.S. diplomat, was entrapped by a female
233:refers to human agents that are recruited by
8:
1516:KGB: the secret work of Soviet secret agents
1441:Swedish soldier fed secrets to Serbian lover
691:, although he eventually turned himself in.
1273:
1271:
1269:
381:Targeting based on intelligence information
331:Persons with access to knowledgeable people
63:Learn how and when to remove these messages
1990:
1981:
1960:
1946:
1938:
1547:
1533:
1525:
911:Recruitment through professional interests
1227:Hulnick, Arthur S. (Winter–Spring 2004),
978:Recruiting through business relationships
609:ask a suspect to repeat their statements.
193:Learn how and when to remove this message
175:Learn how and when to remove this message
1111:, California State University Sacramento
943:Exploitation of an emotional involvement
790:In 2006, the British Defence Attaché in
2374:Scientific & Technical intelligence
1067:
445:Among this group, the priorities were:
356:Persons in allied intelligence agencies
87:instructions, advice, or how-to content
1797:Chinese espionage in the United States
685:Embassy of the United States in Moscow
949:Exploitation of an American's naiveté
824:Spotting through emotional attachment
805:force was suspected of having leaked
575:attitudes predisposing to cooperation
503:. Most walk-ins though are rejected.
405:This step differs from the next one,
7:
2196:By alliances, nations and industries
1792:Chinese intelligence activity abroad
699:try to recruit the girlfriend as an
255:Soviet military intelligence officer
1858:Interpersonal (HUMINT) intelligence
1353:Silverstein, Ken (April 17, 2007),
1141:Inside Soviet Military Intelligence
1086:Inside Soviet Military Intelligence
742:, an Israeli nuclear whistleblower.
628:Access agents and access techniques
206:Clandestine HUMINT asset recruiting
96:so that it is more encyclopedic or
18:Clandestine HUMINT asset recruiting
401:Prioritizing potential recruitment
237:of a foreign intelligence agency.
25:
1693:Computer and network surveillance
1278:US Army in Europe (22 May 2003),
940:Appeal to emigre's national pride
886:Compromisation during development
813:lover who turned out to be a spy.
322:Persons with access to technology
44:This article has multiple issues.
1728:Short-range agent communications
863:delicate period of development.
641:Love, honeypots, and recruitment
547:bringing a sample of information
407:assessment of potential recruits
304:
257:, a Soviet officer may be under
133:
74:
33:
2344:Words of estimative probability
2206:Operational platforms by nation
52:or discuss these issues on the
1490:"The Scientific Intelligencer"
1233:Brown Journal of World Affairs
1143:, MacMillan Publishing Company
1088:, MacMillan Publishing Company
654:honeypots in espionage fiction
1:
1401:. London: Tauris. p. 9.
1137:"Chapter 4, Agent Recruiting"
216:. The work of detecting and "
1395:Lilleker, Darren G. (2004).
482:Assessing potential recruits
461:The third priority involves
2392:Intelligence cycle security
871:"Crash" vs gradual approach
573:, with further insights in
417:, with a goal of acquiring
2471:
1426:November 19, 2007, at the
1252:"Installation Penetration"
852:Ministry of State Security
644:
1993:
1496:, CIA.gov, archived from
1335:, CIA.gov, archived from
1258:, CIA.gov, archived from
1015:Legalizing illegal agents
437:They were outside "their
1376:International Spy Museum
1135:Suvorov, Victor (1984),
1102:Thomas Patrick Carroll,
1080:Suvorov, Victor (1984),
677:Intelligence Directorate
571:classic MICE motivations
2359:Intelligence assessment
2349:All-source intelligence
1969:Intelligence management
1678:Covert listening device
1648:Intelligence assessment
1518:, Reader's Digest Press
1494:Studies in Intelligence
1444:, The Local, 2007-05-14
1372:"Language of Espionage"
1333:Studies in Intelligence
1256:Studies in Intelligence
907:position to negotiate.
2455:Government recruitment
2043:Operational techniques
1998:Special reconnaissance
1045:
984:Technical intelligence
807:classified information
155:by rewriting it in an
2450:Military intelligence
2445:Intelligence analysis
1927:Targeted surveillance
1355:"love and the C.I.A."
1040:
946:False flag approaches
730:Sir Geoffrey Harrison
645:Further information:
621:voice stress analysis
2364:Medical intelligence
2334:Competing hypotheses
2144:Industrial espionage
2129:Denial and deception
1853:Industrial espionage
1653:competing hypotheses
1514:John Barron (1974),
1468:, London, 2008-08-28
1329:"Work with Walk-Ins"
1250:Steinmeyer, Walter,
934:Revenge/disaffection
535:counter-intelligence
428:counter-intelligence
2440:Counterintelligence
2397:Counterintelligence
2312:Technical (TECHINT)
2307:Open-source (OSINT)
2297:Geospatial (GEOINT)
2271:Casualty estimation
1082:"Chapter 3, Agents"
968:countersurveillance
830:John Anthony Walker
783:intelligence agent
746:Clayton J. Lonetree
714:Robert Gordon Switz
604:Double Cross System
222:counterintelligence
94:rewrite the content
2435:Types of espionage
2369:Military geography
2354:Basic intelligence
2292:Financial (FININT)
2233:signature (MASINT)
2159:One-way voice link
2095:Concealment device
1804:Cold War espionage
1771:Front organization
1745:Surveillance tools
1723:Phone surveillance
1718:One-way voice link
1673:Concealment device
785:Michael Soussoudis
560:General assessment
491:Assessing walk-ins
214:human intelligence
157:encyclopedic style
144:is written like a
2417:
2416:
2320:
2319:
2211:Direction finding
2201:In modern history
2182:
2181:
1935:
1934:
1589:Agent provocateur
1503:on March 12, 2008
1339:on March 12, 2008
1262:on March 12, 2008
767:Irvin C. Scarbeck
456:defector in place
369:service about an
263:nonofficial cover
203:
202:
195:
185:
184:
177:
127:
126:
67:
16:(Redirected from
2462:
2216:Traffic analysis
2188:Signals (SIGINT)
2023:Asset recruiting
1991:
1982:
1962:
1955:
1948:
1939:
1549:
1542:
1535:
1526:
1520:
1519:
1511:
1505:
1504:
1502:
1482:
1476:
1475:
1474:
1473:
1458:
1452:
1451:
1450:
1449:
1436:
1430:
1419:
1413:
1412:
1392:
1386:
1385:
1383:
1382:
1368:
1362:
1361:
1359:Harpers Magazine
1350:
1341:
1340:
1321:
1315:
1314:
1312:
1306:, archived from
1305:
1294:
1288:
1287:
1286:
1275:
1264:
1263:
1247:
1241:
1240:
1224:
1213:
1212:
1210:
1204:, archived from
1203:
1192:
1177:
1176:
1175:
1174:
1168:
1161:
1151:
1145:
1144:
1132:
1113:
1112:
1110:
1099:
1090:
1089:
1077:
740:Mordechai Vanunu
681:Clayton Lonetree
675:, and the Cuban
198:
191:
180:
173:
169:
166:
160:
137:
136:
129:
122:
119:
113:
78:
77:
70:
59:
37:
36:
29:
21:
2470:
2469:
2465:
2464:
2463:
2461:
2460:
2459:
2420:
2419:
2418:
2413:
2378:
2316:
2302:Imagery (IMINT)
2280:
2241:Electro-optical
2232:
2231:Measurement and
2225:
2178:
2154:Numbers station
2083:Black operation
2047:
2009:
1971:
1966:
1936:
1931:
1905:Sting operation
1814:Black operation
1780:
1776:Limited hangout
1758:
1749:
1713:Numbers station
1665:
1659:
1636:
1576:
1558:
1553:
1523:
1513:
1512:
1508:
1500:
1484:
1483:
1479:
1471:
1469:
1460:
1459:
1455:
1447:
1445:
1438:
1437:
1433:
1428:Wayback Machine
1420:
1416:
1409:
1394:
1393:
1389:
1380:
1378:
1370:
1369:
1365:
1352:
1351:
1344:
1323:
1322:
1318:
1313:on May 21, 2003
1310:
1303:
1296:
1295:
1291:
1284:
1277:
1276:
1267:
1249:
1248:
1244:
1226:
1225:
1216:
1208:
1201:
1194:
1193:
1180:
1172:
1170:
1166:
1159:
1153:
1152:
1148:
1134:
1133:
1116:
1108:
1101:
1100:
1093:
1079:
1078:
1069:
1065:
1053:
1017:
980:
964:
913:
888:
873:
860:
826:
777:Sharon Scranage
649:
643:
630:
562:
493:
484:
403:
383:
358:
338:principal agent
333:
324:
286:
243:
241:Types of agents
199:
188:
187:
186:
181:
170:
164:
161:
153:help improve it
150:
138:
134:
123:
117:
114:
91:
79:
75:
38:
34:
23:
22:
15:
12:
11:
5:
2468:
2466:
2458:
2457:
2452:
2447:
2442:
2437:
2432:
2422:
2421:
2415:
2414:
2412:
2411:
2406:
2405:
2404:
2394:
2388:
2386:
2380:
2379:
2377:
2376:
2371:
2366:
2361:
2356:
2351:
2346:
2341:
2339:Target-centric
2336:
2330:
2328:
2322:
2321:
2318:
2317:
2315:
2314:
2309:
2304:
2299:
2294:
2288:
2286:
2282:
2281:
2279:
2278:
2268:
2263:
2261:Radiofrequency
2258:
2253:
2248:
2243:
2237:
2235:
2227:
2226:
2224:
2223:
2218:
2213:
2208:
2203:
2198:
2192:
2190:
2184:
2183:
2180:
2179:
2177:
2176:
2171:
2166:
2161:
2156:
2151:
2146:
2141:
2136:
2131:
2126:
2117:
2112:
2107:
2102:
2097:
2092:
2091:
2090:
2080:
2075:
2074:
2073:
2068:
2057:
2055:
2049:
2048:
2046:
2045:
2040:
2035:
2030:
2025:
2019:
2017:
2011:
2010:
2008:
2007:
2006:
2005:
1994:
1988:
1986:Human (HUMINT)
1979:
1973:
1972:
1967:
1965:
1964:
1957:
1950:
1942:
1933:
1932:
1930:
1929:
1924:
1923:
1922:
1917:
1907:
1902:
1897:
1892:
1887:
1882:
1877:
1872:
1871:
1870:
1865:
1855:
1850:
1845:
1844:
1843:
1838:
1828:
1827:
1826:
1821:
1811:
1806:
1801:
1800:
1799:
1788:
1786:
1782:
1781:
1779:
1778:
1773:
1768:
1762:
1760:
1751:
1750:
1748:
1747:
1742:
1741:
1740:
1730:
1725:
1720:
1715:
1710:
1705:
1700:
1695:
1690:
1685:
1680:
1675:
1669:
1667:
1666:communications
1661:
1660:
1658:
1657:
1656:
1655:
1644:
1642:
1638:
1637:
1635:
1634:
1629:
1624:
1619:
1614:
1609:
1604:
1603:
1602:
1592:
1585:
1583:Agent handling
1579:
1577:
1575:
1574:
1569:
1563:
1560:
1559:
1554:
1552:
1551:
1544:
1537:
1529:
1522:
1521:
1506:
1488:(1993-09-22),
1477:
1453:
1431:
1414:
1407:
1387:
1363:
1342:
1325:Serov, Ivan A.
1316:
1289:
1265:
1242:
1214:
1178:
1146:
1114:
1091:
1066:
1064:
1061:
1060:
1059:
1052:
1049:
1016:
1013:
1012:
1011:
1007:
1006:
979:
976:
963:
960:
959:
958:
957:
956:
953:
950:
947:
944:
941:
938:
935:
932:
926:
912:
909:
887:
884:
872:
869:
859:
856:
825:
822:
821:
820:
814:
799:
788:
774:
764:
743:
737:
727:
717:
642:
639:
629:
626:
625:
624:
613:
610:
606:
596:
593:
561:
558:
523:
522:
518:
516:Asylum seekers
513:
501:Robert Hanssen
497:Oleg Penkovsky
492:
489:
483:
480:
479:
478:
474:
466:
459:
451:
443:
442:
435:
402:
399:
382:
379:
363:Oleg Penkovsky
357:
354:
332:
329:
323:
320:
285:
282:
251:Victor Suvorov
242:
239:
201:
200:
183:
182:
141:
139:
132:
125:
124:
82:
80:
73:
68:
42:
41:
39:
32:
24:
14:
13:
10:
9:
6:
4:
3:
2:
2467:
2456:
2453:
2451:
2448:
2446:
2443:
2441:
2438:
2436:
2433:
2431:
2428:
2427:
2425:
2410:
2407:
2403:
2402:organizations
2400:
2399:
2398:
2395:
2393:
2390:
2389:
2387:
2385:
2384:Dissemination
2381:
2375:
2372:
2370:
2367:
2365:
2362:
2360:
2357:
2355:
2352:
2350:
2347:
2345:
2342:
2340:
2337:
2335:
2332:
2331:
2329:
2327:
2323:
2313:
2310:
2308:
2305:
2303:
2300:
2298:
2295:
2293:
2290:
2289:
2287:
2283:
2276:
2272:
2269:
2267:
2264:
2262:
2259:
2257:
2254:
2252:
2249:
2247:
2244:
2242:
2239:
2238:
2236:
2234:
2228:
2222:
2219:
2217:
2214:
2212:
2209:
2207:
2204:
2202:
2199:
2197:
2194:
2193:
2191:
2189:
2185:
2175:
2172:
2170:
2169:Steganography
2167:
2165:
2162:
2160:
2157:
2155:
2152:
2150:
2149:Interrogation
2147:
2145:
2142:
2140:
2137:
2135:
2134:Eavesdropping
2132:
2130:
2127:
2125:
2121:
2118:
2116:
2113:
2111:
2108:
2106:
2103:
2101:
2098:
2096:
2093:
2089:
2086:
2085:
2084:
2081:
2079:
2076:
2072:
2069:
2067:
2064:
2063:
2062:
2059:
2058:
2056:
2054:
2050:
2044:
2041:
2039:
2038:Direct action
2036:
2034:
2033:Covert action
2031:
2029:
2026:
2024:
2021:
2020:
2018:
2016:
2012:
2004:
2003:organizations
2001:
2000:
1999:
1996:
1995:
1992:
1989:
1987:
1983:
1980:
1978:
1974:
1970:
1963:
1958:
1956:
1951:
1949:
1944:
1943:
1940:
1928:
1925:
1921:
1918:
1916:
1913:
1912:
1911:
1908:
1906:
1903:
1901:
1898:
1896:
1893:
1891:
1888:
1886:
1883:
1881:
1878:
1876:
1873:
1869:
1866:
1864:
1863:interrogation
1861:
1860:
1859:
1856:
1854:
1851:
1849:
1846:
1842:
1839:
1837:
1834:
1833:
1832:
1831:Eavesdropping
1829:
1825:
1822:
1820:
1817:
1816:
1815:
1812:
1810:
1807:
1805:
1802:
1798:
1795:
1794:
1793:
1790:
1789:
1787:
1783:
1777:
1774:
1772:
1769:
1767:
1764:
1763:
1761:
1756:
1752:
1746:
1743:
1739:
1736:
1735:
1734:
1733:Steganography
1731:
1729:
1726:
1724:
1721:
1719:
1716:
1714:
1711:
1709:
1708:Invisible ink
1706:
1704:
1701:
1699:
1696:
1694:
1691:
1689:
1686:
1684:
1681:
1679:
1676:
1674:
1671:
1670:
1668:
1662:
1654:
1651:
1650:
1649:
1646:
1645:
1643:
1639:
1633:
1630:
1628:
1627:Sleeper agent
1625:
1623:
1620:
1618:
1615:
1613:
1610:
1608:
1605:
1601:
1598:
1597:
1596:
1593:
1591:
1590:
1586:
1584:
1581:
1580:
1578:
1573:
1570:
1568:
1565:
1564:
1561:
1557:
1550:
1545:
1543:
1538:
1536:
1531:
1530:
1527:
1517:
1510:
1507:
1499:
1495:
1491:
1487:
1481:
1478:
1467:
1463:
1457:
1454:
1443:
1442:
1435:
1432:
1429:
1425:
1422:
1418:
1415:
1410:
1404:
1400:
1399:
1391:
1388:
1377:
1373:
1367:
1364:
1360:
1356:
1349:
1347:
1343:
1338:
1334:
1330:
1326:
1320:
1317:
1309:
1302:
1301:
1293:
1290:
1283:
1282:
1274:
1272:
1270:
1266:
1261:
1257:
1253:
1246:
1243:
1238:
1234:
1230:
1223:
1221:
1219:
1215:
1211:on 2008-02-28
1207:
1200:
1199:
1191:
1189:
1187:
1185:
1183:
1179:
1169:on 2007-08-22
1165:
1158:
1157:
1150:
1147:
1142:
1138:
1131:
1129:
1127:
1125:
1123:
1121:
1119:
1115:
1107:
1106:
1098:
1096:
1092:
1087:
1083:
1076:
1074:
1072:
1068:
1062:
1058:
1055:
1054:
1050:
1048:
1044:
1039:
1037:
1033:
1028:
1026:
1021:
1014:
1009:
1008:
1004:
1003:
1002:
999:
997:
993:
989:
985:
977:
975:
971:
969:
961:
954:
951:
948:
945:
942:
939:
936:
933:
930:
929:
927:
923:
922:
921:
917:
910:
908:
904:
900:
896:
892:
885:
883:
880:
878:
870:
868:
864:
857:
855:
853:
849:
845:
841:
840:Katrina Leung
837:
835:
831:
823:
818:
817:Won Jeong-hwa
815:
812:
808:
804:
800:
797:
793:
789:
786:
782:
778:
775:
772:
768:
765:
762:
758:
754:
751:
747:
744:
741:
738:
735:
731:
728:
725:
721:
718:
715:
711:
710:
709:
706:
704:
703:
697:
692:
690:
686:
682:
678:
674:
670:
665:
663:
658:
655:
648:
640:
638:
634:
627:
622:
618:
614:
611:
607:
605:
601:
597:
594:
591:
590:
589:
586:
582:
578:
576:
572:
566:
559:
557:
555:
550:
548:
542:
538:
536:
531:
527:
519:
517:
514:
512:
509:
508:
507:
504:
502:
498:
490:
488:
481:
475:
471:
467:
464:
460:
457:
452:
448:
447:
446:
440:
439:iron curtains
436:
433:
429:
424:
423:
422:
420:
416:
410:
408:
400:
398:
396:
392:
387:
380:
378:
376:
372:
368:
364:
355:
353:
351:
345:
343:
339:
330:
328:
321:
319:
315:
311:
308:
306:
301:
297:
295:
294:access agents
290:
283:
281:
279:
274:
272:
271:access agents
266:
264:
260:
256:
252:
249:According to
247:
240:
238:
236:
235:case officers
232:
231:
225:
223:
219:
215:
211:
207:
197:
194:
179:
176:
168:
158:
154:
148:
147:
142:This article
140:
131:
130:
121:
111:
107:
103:
99:
95:
89:
88:
83:This article
81:
72:
71:
66:
64:
57:
56:
51:
50:
45:
40:
31:
30:
27:
19:
2174:Surveillance
2164:Resident spy
2105:Cryptography
2022:
1910:Surveillance
1808:
1698:Cyber spying
1683:Cryptography
1622:Resident spy
1607:Double agent
1587:
1515:
1509:
1498:the original
1493:
1480:
1470:, retrieved
1465:
1456:
1446:, retrieved
1440:
1434:
1417:
1397:
1390:
1379:. Retrieved
1375:
1366:
1358:
1337:the original
1332:
1319:
1308:the original
1299:
1292:
1280:
1260:the original
1255:
1245:
1236:
1232:
1206:the original
1197:
1171:, retrieved
1164:the original
1155:
1149:
1140:
1104:
1085:
1057:Useful Idiot
1046:
1041:
1029:
1022:
1018:
1000:
981:
972:
965:
918:
914:
905:
901:
897:
893:
889:
881:
876:
874:
865:
861:
838:
834:Aldrich Ames
827:
720:John Vassall
707:
702:access agent
700:
693:
666:
659:
650:
635:
631:
600:World War II
587:
583:
579:
567:
563:
551:
543:
539:
532:
528:
524:
505:
494:
485:
444:
411:
404:
388:
384:
375:Kuala Lumpur
359:
346:
342:access agent
341:
337:
334:
325:
316:
312:
309:
302:
298:
291:
287:
275:
267:
248:
244:
228:
226:
205:
204:
189:
171:
165:January 2021
162:
143:
118:January 2021
115:
92:Please help
84:
60:
53:
47:
46:Please help
43:
26:
2246:Geophysical
2028:Cell system
2015:Clandestine
1900:Stay-behind
1809:Recruitment
1766:Canary trap
1664:Devices and
1612:Field agent
1486:Jones, R.V.
982:As part of
962:Recruitment
858:Development
750:U.S. Marine
673:Markus Wolf
430:as well as
373:meeting in
305:cell system
278:Rudolf Abel
253:, a former
102:Wikiversity
2424:Categories
2275:earthquake
2139:False flag
1977:Collection
1895:Sexpionage
1875:COINTELPRO
1868:safe house
1848:False flag
1785:Operations
1759:techniques
1755:Tradecraft
1472:2008-08-31
1448:2007-05-21
1408:1850434719
1381:2021-04-15
1173:2007-10-31
1063:References
647:Sexpionage
617:polygraphy
554:Ivan Serov
259:diplomatic
110:Wikivoyage
49:improve it
2266:Materials
2120:Defection
2115:Dead drop
2088:black bag
2053:Espionage
1819:black bag
1703:Dead drop
1632:Spymaster
1556:Espionage
1466:The Times
844:Taiwanese
796:Pakistani
792:Islamabad
696:kompromat
662:Seduction
526:quickly.
511:Defectors
470:defection
432:espionage
367:Malaysian
336:called a
227:The term
106:Wikibooks
85:contains
55:talk page
2326:Analysis
2124:Turncoat
2071:handling
1885:SHAMROCK
1738:microdot
1641:Analysis
1424:Archived
1239:(1): 165
1051:See also
877:rezident
781:Ghanaian
753:Sergeant
602:British
415:Cold War
371:al-Qaeda
350:LinkedIn
284:Spotting
218:doubling
2273: (
2251:Nuclear
2221:TEMPEST
1880:MINARET
1824:wetwork
925:agents.
811:Serbian
809:to her
151:Please
2110:Cutout
2061:Agents
1915:Global
1841:MASINT
1836:SIGINT
1688:Cutout
1572:Assets
1567:Agents
1405:
996:Line X
803:Kosovo
771:Polish
761:Vienna
757:Soviet
689:Vienna
671:under
419:HUMINT
395:SIGINT
340:or an
100:it to
2430:Spies
2285:Other
2256:Radar
2100:Cover
2078:Asset
2066:field
1600:Agent
1595:Cover
1311:(PDF)
1304:(PDF)
1285:(PDF)
1209:(PDF)
1202:(PDF)
1167:(PDF)
1160:(PDF)
1109:(PDF)
669:Stasi
391:OSINT
210:spies
108:, or
1920:Mass
1890:FVEY
1617:Mole
1403:ISBN
1034:and
990:and
748:, a
98:move
1757:and
1036:NSA
1032:CIA
1025:KGB
992:GRU
988:KGB
952:Sex
848:FBI
734:KGB
724:KGB
352:).
261:or
230:spy
2426::
2122:/
1492:,
1464:,
1374:.
1357:,
1345:^
1331:,
1327:,
1268:^
1254:,
1237:XI
1235:,
1231:,
1217:^
1181:^
1139:,
1117:^
1094:^
1084:,
1070:^
619:,
577:.
273:.
224:.
104:,
58:.
2277:)
1961:e
1954:t
1947:v
1548:e
1541:t
1534:v
1411:.
1384:.
736:.
434:.
196:)
190:(
178:)
172:(
167:)
163:(
159:.
120:)
116:(
112:.
90:.
65:)
61:(
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.