1097:
866:
1079:
630:
876:
1009:
673:
656:
623:
528:
1072:
713:
901:
871:
616:
511:
467:
1054:
1138:
703:
462:
119:
146:
217:
647:
363:
1004:
996:
398:
323:
1014:
945:
770:
685:
265:
639:
151:
1062:
1131:
977:
708:
173:
68:
Field agents are often present in fiction, though their duties and actions can be quite different in reality.
1029:
1019:
967:
698:
348:
318:
210:
1157:
1044:
982:
962:
911:
668:
931:
597:
1162:
1034:
972:
858:
814:
799:
748:
693:
523:
506:
479:
242:
1124:
1067:
941:
758:
585:
489:
178:
1039:
1024:
916:
891:
829:
780:
765:
474:
441:
415:
393:
388:
358:
343:
203:
124:
97:
58:
881:
590:
259:
62:
46:. A field agent can work alone or in a group but usually has a case officer who is in charge.
147:"'The Americans' Creators Blend Family Drama With Espionage For A Different Kind Of Spy Show"
1096:
936:
886:
555:
287:
824:
753:
575:
550:
484:
446:
383:
1108:
921:
741:
253:
82:
1151:
839:
819:
804:
533:
501:
403:
378:
297:
92:
926:
844:
834:
775:
580:
368:
353:
292:
277:
270:
87:
43:
42:
is an agent who works in the field as opposed to one who operates at the office or
570:
436:
17:
809:
565:
545:
538:
518:
425:
50:
790:
785:
731:
723:
560:
373:
302:
237:
226:
77:
31:
608:
794:
408:
54:
494:
1104:
612:
199:
195:
174:"How Accurate Are Bourne and Bond? Ask an Ex-CIA Officer"
1112:
1080:
Counterintelligence and counter-terrorism organizations
1053:
995:
955:
900:
857:
722:
684:
655:
646:
455:
424:
334:
311:
233:
118:Mazzetti, Mark; Elliott, Justin (9 December 2013).
120:"Spies Infiltrate a Fantasy Realm of Online Games"
1132:
624:
211:
8:
1139:
1125:
661:
652:
631:
617:
609:
218:
204:
196:
1045:Scientific & Technical intelligence
110:
468:Chinese espionage in the United States
7:
1093:
1091:
867:By alliances, nations and industries
463:Chinese intelligence activity abroad
529:Interpersonal (HUMINT) intelligence
145:Alex Garofalo (18 February 2015).
25:
364:Computer and network surveillance
1095:
399:Short-range agent communications
57:that may be under the name of a
1015:Words of estimative probability
877:Operational platforms by nation
1:
172:Vaughn Sherman (2013-01-10).
1111:. You can help Knowledge by
152:International Business Times
1063:Intelligence cycle security
1179:
1090:
664:
53:, and travel using fake
1030:Intelligence assessment
1020:All-source intelligence
640:Intelligence management
349:Covert listening device
319:Intelligence assessment
1107:-related article is a
714:Operational techniques
669:Special reconnaissance
598:Targeted surveillance
1035:Medical intelligence
1005:Competing hypotheses
815:Industrial espionage
800:Denial and deception
524:Industrial espionage
324:competing hypotheses
49:Field agents can be
1068:Counterintelligence
983:Technical (TECHINT)
978:Open-source (OSINT)
968:Geospatial (GEOINT)
942:Casualty estimation
179:The Huffington Post
1040:Military geography
1025:Basic intelligence
963:Financial (FININT)
904:signature (MASINT)
830:One-way voice link
766:Concealment device
475:Cold War espionage
442:Front organization
416:Surveillance tools
394:Phone surveillance
389:One-way voice link
344:Concealment device
125:The New York Times
98:Non-official cover
59:front organization
1120:
1119:
1088:
1087:
991:
990:
882:Direction finding
872:In modern history
853:
852:
606:
605:
260:Agent provocateur
63:shell corporation
16:(Redirected from
1170:
1141:
1134:
1127:
1099:
1092:
887:Traffic analysis
859:Signals (SIGINT)
694:Asset recruiting
662:
653:
633:
626:
619:
610:
220:
213:
206:
197:
190:
189:
187:
186:
169:
163:
162:
160:
159:
142:
136:
135:
133:
132:
115:
21:
1178:
1177:
1173:
1172:
1171:
1169:
1168:
1167:
1148:
1147:
1146:
1145:
1089:
1084:
1049:
987:
973:Imagery (IMINT)
951:
912:Electro-optical
903:
902:Measurement and
896:
849:
825:Numbers station
754:Black operation
718:
680:
642:
637:
607:
602:
576:Sting operation
485:Black operation
451:
447:Limited hangout
429:
420:
384:Numbers station
336:
330:
307:
247:
229:
224:
194:
193:
184:
182:
171:
170:
166:
157:
155:
144:
143:
139:
130:
128:
117:
116:
112:
107:
74:
40:field operative
28:
23:
22:
18:Field operative
15:
12:
11:
5:
1176:
1174:
1166:
1165:
1160:
1150:
1149:
1144:
1143:
1136:
1129:
1121:
1118:
1117:
1100:
1086:
1085:
1083:
1082:
1077:
1076:
1075:
1065:
1059:
1057:
1051:
1050:
1048:
1047:
1042:
1037:
1032:
1027:
1022:
1017:
1012:
1010:Target-centric
1007:
1001:
999:
993:
992:
989:
988:
986:
985:
980:
975:
970:
965:
959:
957:
953:
952:
950:
949:
939:
934:
932:Radiofrequency
929:
924:
919:
914:
908:
906:
898:
897:
895:
894:
889:
884:
879:
874:
869:
863:
861:
855:
854:
851:
850:
848:
847:
842:
837:
832:
827:
822:
817:
812:
807:
802:
797:
788:
783:
778:
773:
768:
763:
762:
761:
751:
746:
745:
744:
739:
728:
726:
720:
719:
717:
716:
711:
706:
701:
696:
690:
688:
682:
681:
679:
678:
677:
676:
665:
659:
657:Human (HUMINT)
650:
644:
643:
638:
636:
635:
628:
621:
613:
604:
603:
601:
600:
595:
594:
593:
588:
578:
573:
568:
563:
558:
553:
548:
543:
542:
541:
536:
526:
521:
516:
515:
514:
509:
499:
498:
497:
492:
482:
477:
472:
471:
470:
459:
457:
453:
452:
450:
449:
444:
439:
433:
431:
422:
421:
419:
418:
413:
412:
411:
401:
396:
391:
386:
381:
376:
371:
366:
361:
356:
351:
346:
340:
338:
337:communications
332:
331:
329:
328:
327:
326:
315:
313:
309:
308:
306:
305:
300:
295:
290:
285:
280:
275:
274:
273:
263:
256:
254:Agent handling
250:
248:
246:
245:
240:
234:
231:
230:
225:
223:
222:
215:
208:
200:
192:
191:
164:
137:
109:
108:
106:
103:
102:
101:
95:
90:
85:
83:Agent handling
80:
73:
70:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
1175:
1164:
1161:
1159:
1158:Spies by role
1156:
1155:
1153:
1142:
1137:
1135:
1130:
1128:
1123:
1122:
1116:
1114:
1110:
1106:
1101:
1098:
1094:
1081:
1078:
1074:
1073:organizations
1071:
1070:
1069:
1066:
1064:
1061:
1060:
1058:
1056:
1055:Dissemination
1052:
1046:
1043:
1041:
1038:
1036:
1033:
1031:
1028:
1026:
1023:
1021:
1018:
1016:
1013:
1011:
1008:
1006:
1003:
1002:
1000:
998:
994:
984:
981:
979:
976:
974:
971:
969:
966:
964:
961:
960:
958:
954:
947:
943:
940:
938:
935:
933:
930:
928:
925:
923:
920:
918:
915:
913:
910:
909:
907:
905:
899:
893:
890:
888:
885:
883:
880:
878:
875:
873:
870:
868:
865:
864:
862:
860:
856:
846:
843:
841:
840:Steganography
838:
836:
833:
831:
828:
826:
823:
821:
820:Interrogation
818:
816:
813:
811:
808:
806:
805:Eavesdropping
803:
801:
798:
796:
792:
789:
787:
784:
782:
779:
777:
774:
772:
769:
767:
764:
760:
757:
756:
755:
752:
750:
747:
743:
740:
738:
735:
734:
733:
730:
729:
727:
725:
721:
715:
712:
710:
709:Direct action
707:
705:
704:Covert action
702:
700:
697:
695:
692:
691:
689:
687:
683:
675:
674:organizations
672:
671:
670:
667:
666:
663:
660:
658:
654:
651:
649:
645:
641:
634:
629:
627:
622:
620:
615:
614:
611:
599:
596:
592:
589:
587:
584:
583:
582:
579:
577:
574:
572:
569:
567:
564:
562:
559:
557:
554:
552:
549:
547:
544:
540:
537:
535:
534:interrogation
532:
531:
530:
527:
525:
522:
520:
517:
513:
510:
508:
505:
504:
503:
502:Eavesdropping
500:
496:
493:
491:
488:
487:
486:
483:
481:
478:
476:
473:
469:
466:
465:
464:
461:
460:
458:
454:
448:
445:
443:
440:
438:
435:
434:
432:
427:
423:
417:
414:
410:
407:
406:
405:
404:Steganography
402:
400:
397:
395:
392:
390:
387:
385:
382:
380:
379:Invisible ink
377:
375:
372:
370:
367:
365:
362:
360:
357:
355:
352:
350:
347:
345:
342:
341:
339:
333:
325:
322:
321:
320:
317:
316:
314:
310:
304:
301:
299:
298:Sleeper agent
296:
294:
291:
289:
286:
284:
281:
279:
276:
272:
269:
268:
267:
264:
262:
261:
257:
255:
252:
251:
249:
244:
241:
239:
236:
235:
232:
228:
221:
216:
214:
209:
207:
202:
201:
198:
181:
180:
175:
168:
165:
154:
153:
148:
141:
138:
127:
126:
121:
114:
111:
104:
99:
96:
94:
93:Special agent
91:
89:
86:
84:
81:
79:
76:
75:
71:
69:
66:
64:
60:
56:
52:
47:
45:
41:
37:
33:
19:
1113:expanding it
1102:
845:Surveillance
835:Resident spy
776:Cryptography
736:
581:Surveillance
369:Cyber spying
354:Cryptography
293:Resident spy
282:
278:Double agent
258:
183:. Retrieved
177:
167:
156:. Retrieved
150:
140:
129:. Retrieved
123:
113:
88:Double agent
67:
48:
44:headquarters
39:
35:
29:
1163:Crime stubs
917:Geophysical
699:Cell system
686:Clandestine
571:Stay-behind
480:Recruitment
437:Canary trap
335:Devices and
283:Field agent
36:field agent
27:Type of spy
1152:Categories
946:earthquake
810:False flag
648:Collection
566:Sexpionage
546:COINTELPRO
539:safe house
519:False flag
456:Operations
430:techniques
426:Tradecraft
185:2015-03-28
158:2015-03-28
131:2015-03-28
105:References
51:undercover
937:Materials
791:Defection
786:Dead drop
759:black bag
724:Espionage
490:black bag
374:Dead drop
303:Spymaster
227:Espionage
78:Espionage
55:passports
32:espionage
997:Analysis
795:Turncoat
742:handling
556:SHAMROCK
409:microdot
312:Analysis
72:See also
944: (
922:Nuclear
892:TEMPEST
551:MINARET
495:wetwork
781:Cutout
732:Agents
586:Global
512:MASINT
507:SIGINT
359:Cutout
243:Assets
238:Agents
1105:crime
1103:This
956:Other
927:Radar
771:Cover
749:Asset
737:field
271:Agent
266:Cover
100:(NOC)
1109:stub
591:Mass
561:FVEY
288:Mole
34:, a
428:and
61:or
38:or
30:In
1154::
793:/
176:.
149:.
122:.
65:.
1140:e
1133:t
1126:v
1115:.
948:)
632:e
625:t
618:v
219:e
212:t
205:v
188:.
161:.
134:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.