HUMINT
Introduction To Tradecraft
- The late 80’s and 90’s exposed us to technology advances that have
never before been experienced since the invention of the wheel.
- The last decade has provided us with huge advances in Signal
Intelligence and in electronic surveillance systems designed to detect
or compromise those advances made in the 90’s.
- The new terrorist have realized that our intelligence agencies have
become dependent on technology and have reverted back to age old
tradecraft that technology has little impact on.
The New Old Technology
- Passing data in todays world can be very successfully accomplished with a mixture of the new and the old.
- The goal of a spy is to acquire information and then pass that
information back to their control officers or handlers or back to their
home nation.
How the Spies Obtain Information
- A good Spy rarely gathers information themselves. They develop assets that will provide the information needed for them.
- There are 3 things that will determine if you are at risk of being spied upon.
Good Spies
- With enough time assets can be developed, hired or worked into the information target area.
- If you can gain access through covert or overt methods you can obtain the information that you require.
- If you have enough money you can always buy someone or the access that you need to obtain the required information.
Motive to Become a Spy
- Money: Financial Problems, Debt, Family Illness or Greed have made many people easy targets to be bought.
- Ideology: A belief in the ultimate superiority of a race or religion or political institution has compromised many:
- Compromise: Identify an element in a potential agents lifestyle
that he or she would not wish others to know such as Homosexuality.
- Ego: Appeal to the egos of candidates vulnerable to intellectual flattery in order to entrap them.
Spies Task
- In the real world Spies are not James Bond. They are inconspicuous individuals that have the ability to go unnoticed.
- They need to be able to move around and act without drawing suspicion to themselves of their activities.
- A beggar lying on the ground in front of a building can go
unnoticed for days where a good looking man in a Tux would stand out
immediately.
The Vast Number of Positions in the Intelligence and Counter Intelligence Field
- INTELLIGENCE:
- Is the gathering of sensitive information and data to prepare
assist in designing a proper defense against those that are attempting
to gain access and knowledge of the sensitive information.
- COUNTER INTELLIGENCE:
- Is the defense against enemy spies and the looking at your own
defenses from the outside to determine where your vulnerabilities are
and how to correct them.
Case Officer
- The Case Officer is assigned a task from his command. It could be “Determine the Radio Frequency that the enemy is using”
- His task is to develop and utilize Agents or assets that can provide him with that information.
Recruitment Officer
- Case Officers who are responsible for recruiting agents need to have happy and friendly, likeable personalities.
- They must be affable and socially adaptable and appear open to other peoples points of view.
- Recruiting Officers need to socialize in areas where they will meet
potential agents and also always be aware of any character weakness
that can be used as leverage to develop the new agent.
- No one tells secrets to someone that they don’t like!
Agents
- Agents are assigned tasks in intelligence or various other covert activities but are not agency employees.
- These Agents are off the books employees made famous by the Mission Impossible movie about the NOC (Non Official Cover) list.
Differences Between Officers
- An important distinction exists between officers, most of whom are
career members of their agency, and Agents. Whose status varies with
the country and whether they are operating in war or peacetime.
Types of Agents
- Apart from those recruited specifically to procure intelligence,
several other types of agent exist. Contact agents and access agents
are used to identify and facilitate access to potential recruits.
- Agents of influence are used to affect public opinion or events.
- Support agents assist other agents by acting as couriers or maintaining safe houses.
- Agents come in all types and all shapes and colors.
Sleeper Agents
- Sleeper agents are those who are sent into foreign countries to
live apparently normal lives until activated, perhaps in time of
national emergency or pending war, when their mission is likely to be
one of sabotage or assassination.
- Sleeper spy Mikhail Vasenkov is looking to leave Russia with his wife Vicky Pelaez.
Couriers
- Couriers are the link between the Agents and the Officers.
- They also serve as “Cut Outs” intermediaries who enable the system to work with no contact between sender and receiver.
Couriers “Fit In”
- There can be as many types of couriers and drop spots as your imagination can allow.
- The key is that they fit in and that if the agent is under surveillance the information exchange should not be noticed
Various Hiding Places
Types of Couriers
- Some Couriers work from Embassies under cover of diplomatic immunity.
- They travel around their foreign city or country making contact with or recovering information from Agents.
Ways of Picking Up Information
- There are many covert ways of transferring information. With the
new technology massive amounts of data may be transferred inside a coin
given to a contact working as a vendor or other casual contact
situations.
International Couriers
- There are other couriers that transport items or intelligence over
international boarders either as “Tourist” or under diplomatic cover.
Diplomatic Pouch
- Items sent under Diplomatic Seal are normally exempt from screening or search.
- You will hear the phrase “Went Out in the Pouch” used often referring to something being sent under diplomatic immunity.
Diplomatic Pouches
- There are many types of Courier pouches.
- The pouch directly to the right and below were found in a plane crash.
Dangers of Being a Courier
- There have been 6 US Diplomatic Couriers killed in plane crashes in recent years.
- The couriers fate is less important than the information that they carry.
- Capturing, interrogating or torturing the Courier to obtain contact information is common.
Self Destruct Packages
- While there are packages that will self destruct if opened by
someone other than the intended received this will do little to keep
the courier from suffering being interrogated.
- The self destruct package may protect the identity of the agent that gathered the information.
Double or Triple Agents
- Agents that turn against their original agency to provide
information to another agency other than the agency that originally
recruited them while making their original agency believe that they are
still loyal to them.
- The Female Spy Uncovered
Jane Thynne, Clare Mulley, Jennie Rooney
and Carole Seymour-Jones
- Anna Chapman, Russian Spy captured in New York.
Aldrich Hazen Ames
- Aldrich Hazen Ames was arrested by the FBI in Arlington, VA on
February 24th, 1994. At the moment of his arrest he had been
31-of-service at the CIA and for nearly ten years he had been a KGB
spy. He was arrested along with his wife and formally accused by the
U.S. Department of Justice with spying for the Soviet Union. Ames faced
the death penalty because his betrayal had caused the killing of
different CIA sources of information. After plea bargaining, his
penalty was reduced to life imprisonment, while his wife was sentenced
to five years for crimes of espionage conspiracy and tax evasion.
CIA and British Agents in KGB
- Aldrich Ames was a Russian speaking CIA officer specialized in the
KGB, the Russian intelligence service. He began working for the CIA in
1962 with low-profile jobs, but after graduating he was able to work
his way up. His first assignment abroad was in 1969 in Ankara, Turkey,
where he was able to identify several Soviet intelligence agents, one
of which was recruited.
- It was the first move of what was to be the most devastating
infiltration of Western intelligence agencies. His position gave him
access to the most important secrets of the CIA (among these were the
names of CIA and British agents infiltrated in the KGB and details
about their activities). The KGB wrote tank you notes to the new much
appreciated spy, but most of all they paid Ames a fortune. Moreover
they promised him houses and land in the USSR. In exchange for all this
money Ames continued to pass all the information he was capable to
collect, simply bringing hundreds of secret documents out of the CIA
offices below the eyes of his colleagues putting them under his arm in
an envelope or among other non-confidential documents.
Utilized Dead Letter Box
- The Soviet embassy in Washington was kept under constant
surveillance but the role of Ames allowed him to meet with the Soviets
and thus his frequent visits to the embassy never aroused any
suspicion. He had a perfect covering, however most of his business away
from the embassy was done with the system of dead drops. Ames’
motivation was only money, no ideological reason, just money. He never
had the feeling of being an agent, or to belong to the KGB. During this
period he was also sent to Bolivia and Rome where he continued his
meetings with KGB agents providing top-secret documents.
- On his return to Washington in 1989 Ames continued to pass
classified documents to the KGB, once again with the system the dead
letter box. In return, the KGB left instructions and money.
Observed Chalking a Mailbox
- After several months of wiretapping and shadowing, Ames made some
banal mistakes. The first clue was the discovery of the draft of a
letter to the KGB in his junk. Then, he was seen putting a chalk mark
on a mailbox; this was the confirmation of a meeting with Russian
agents in Bogota.
- Special agents saw him meet with the Russians a few weeks later in
the center of Bogota; also in this case there was an exchange of money
for information. Ames was planning another trip to Moscow, and he was
finishing the copy of hundreds of top secret documents in 3 floppy
disks by connecting to various data banks as the SIS or the Department
of State and of course the CIA. The FBI arrested him immediately before
his departure for Moscow.
Walker Family Spy Ring
- John Walker
- The U.S. Naval officer, who once claimed that a big-box store had
better security than the Navy, helped the Soviets decode millions of
encrypted messages during the Cold War. His ex-wife turned him in when
he refused to pay her alimony.
- John Walker stole Navy Secrets while on duty and his father sold them to the Russians.
- The Walker family work together to obtain and transfer the information to the Soviets. They were motivated by greed and money.
Robert Hanssen
- Robert Hanssen pleaded guilty to espionage charges in 2001 in
return for the government not seeking the death penalty. Hanssen began
spying for the Soviet.
- The spycraft displayed in Hanssen’s first letter to Cherkashin was,
in many ways, top-notch. In it, Hanssen disclosed the names of three
KGB agents who were secretly working in the U.S. as FBI operatives,
asking for $100,000 in cash in exchange for his services. For this and
future transactions, he proposed making exchanges using a “dead drop”
system in which he and his handlers would leave packages for each other
in public places.
Dead Letter Drop at the Park
- Employing dead drops meant that Hanssen never had to meet his
handlers, identify his employer or reveal his real name. To signal when
packages had been dropped off or picked up, the conspirators attached
adhesive tape or thumbtacks to designated signs and telephone poles.
(One letter directing Hanssen to use white and yellow thumbtacks
included this helpful tip: “Colored sets are sold at CVS.”) Using the
dead-drop system, Hanssen ultimately handed over more than 6,000 pages
of classified documents and more than two dozen computer disks.
Hanssen on his Arrest; What took you so long?
- Abugattas didn’t witness the second glitch that week—one that
occurred in broad daylight, but was potentially far worse than the
alarm incident. FBI agents watched their surveillance monitors,
helpless and aghast, as a curious little boy reached under the
amphitheater stage and pulled out the hidden bag of money. The
operation got back on track a moment later, when the boy’s mother
chided him for playing with trash and pulled his hand away, leaving the
bag unopened.
- Sunday, Feb. 18, marked day six of the surveillance at Long Branch.
But Robert Hanssen never made the trip to Arlington that afternoon.
Rather, he drove to Foxstone Park in Vienna (a drop site code-named
ELLIS), placed a package under a footbridge and heard the chilling
words, “Freeze! FBI!”
Defectors
- A defector is an intelligence officer who abandons his or her
original agency and betrays it by giving information to a foreign
intelligence service.
- Motivated by ideology or by fear for their safety.
Illegals
- Illegals are spies who adopt elaborate false identities to work in foreign countries.
- They are difficult for the enemy to detect, but run the risk of
heavy punishment as they operate without any diplomatic immunity.
- Apart from gathering information, their role may sometimes also be to spot potential new recruits or run other agents.
Saboteur
- The word “Sabotage” is French for a disgruntled employee that threw a wooden clog (Sabot) in to a machine.
- Normally used to damage equipment such as railways, utilities,
communications or ships but have also been used to flood counterfeit
currency into the market to destroy the economy.
The Mole
- An intelligence officer that while working for one agency is providing information to a hostile agency.
- Aldrich Ames was assigned to find the mole in the CIA while he was the mole.
Analyst
- Analyst have the task or combining intelligence that has been
gathered by espionage and technical means as well as public open source
into their written reports to be utilized by military and political
decision makers.
- While not glamorous they are critical to providing actionable
intelligence to commanders by taking the raw intelligence and producing
a working product.
Assassin
- Assassins take their name from a medieval Muslin sect that exerted its power by murdering the leaders of those who opposed it.
- The role of intelligence service assassin is essentially the same.
- Contrary to common belief, assassinations are not frequently carried out by spies.
Industrial Espionage
- Since the Cold War ended the current battle is with technology and economic spying.
- Industrial espionage is particularly prevalent in the computer technology field.
Combating Crime
- Intelligence Agencies are heavily involved in assisting Law Enforcement investigating drug trafficking and Money Laundering.
- They also assist with technology and computer related crimes.
Surveillance
- Technological advances have assisted spies in carrying out their task.
- With the invent of micro video and audio recorders and advanced
transmitting capabilities you will see this field expand greatly in the
near future.
System Espionage
- The most important influence on spies of the future will be new developments in computing.
- Facial and vocal recognition will make it possible to make positive
Identification of targets by satellite and over the telephone systems.
- The new audio tracking systems work from voice print. They do not
need to have a specific phone number the computer will scan and lock on
what ever phone that you are using by the detection of your voice
pattern
Web Based Stenography
- Technical Specialist are increasing in numbers as the tradecraft
catches up with the new technology. There will be an increasing need
for technical Specialist.
- The arrest of 10 alleged spies in the United States has thrust the ancient practice of steganography into the limelight.
- Several of the suspects are accused of using the method to conceal data being transmitted from the US to Russia.
- As you might expect for a technique that involves hiding information, steganography has always had a shady reputation.
- That question mark over it dates from the text in which the word
was coined, Steganographia, which was written in 1499 by Johannes
Trithemius but not published until 1606.
Intelligence Sources
- Intelligence
The product resulting from the collection, processing, integration,
evaluation, analysis, and interpretation of available information
concerning foreign nations, hostile or potentially hostile forces or
elements, or areas of actual or potential operations. The term is also
applied to the activity which results in the product and to the
organizations engaged in such activity.
Intelligence Sources
- Acoustic Intelligence
Intelligence derived from the collection and
processing of acoustic phenomena.
Intelligence Sources
- Advanced Geospatial Intelligence (AGI)
Refers to the technical, geospatial, and intelligence information
derived through interpretation or analysis using advanced processing of
all data collected by imagery or imagery-related collection systems.
Also known as imagery-derived measurement and signature intelligence
Intelligence Sources
- All-source Intelligence
1. Intelligence products and/or organizations and activities that
incorporate all sources of information, most frequently including human
resources intelligence, imagery intelligence, measurement and signature
intelligence, signals intelligence, and open-source data in the
production of finished intelligence. 2. In intelligence collection, a
phrase that indicates that in the satisfaction of intelligence
requirements, all collection, processing, exploitation, and reporting
systems and resources are identified for possible use and those most
capable are tasked.
Intelligence Sources
- Communications Intelligence (COMINT)
Technical information and intelligence derived from foreign communications by other than the intended recipients.
Intelligence Sources
- Counterintelligence (CI)
Information gathered and activities conducted to protect against
espionage, other intelligence activities, sabotage, or assassinations
conducted by or on behalf of foreign governments or elements thereof,
foreign organizations, or foreign persons, or international terrorist
activities.
Intelligence Sources
- Cyber Counterintelligence
Measures to identify, penetrate, or neutralize foreign operations
that use cyber means as the primary tradecraft methodology, as well as
foreign intelligence service collection efforts that use traditional
methods to gauge cyber capabilities and intentions.
Intelligence Sources
- Domestic Intelligence
Intelligence relating to activities or conditions within the United
States that threaten internal security and that might require the
employment of troops; and intelligence relating to activities of
individuals or agencies potentially or actually dangerous to the
security of the Department of Defense.
Electronic Intelligence (ELINT)
Technical and geolocation intelligence derived from foreign
noncommunications electromagnetic radiations emanating from other than
nuclear detonations or radioactive sources.
Intelligence Sources
- Foreign Instrumentation Signals Intelligence (FISINT)
Technical information and intelligence derived from the intercept
of foreign electromagnetic emissions associated with the testing and
operational deployment of non-US aerospace, surface, and subsurface
systems. Foreign instrumentation signals intelligence is a subcategory
of signals intelligence. Foreign instrumentation signals include but
are not limited to telemetry, beaconry, electronic interrogators, and
video data links.
Intelligence Sources
- Geospatial Intelligence (GEOINT)
The exploitation and analysis of imagery and geospatial information
to describe, assess, and visually depict physical features and
geographically referenced activities on the Earth. Geospatial
intelligence consists of imagery, imagery intelligence, and geospatial
information.
Intelligence Sources
- Human Intelligence (HUMINT)
A category of intelligence derived from information collected and provided by human sources.
Intelligence Sources
- Human Resources Intelligence (HUMINT)
The intelligence derived from the intelligence collection
discipline that uses human beings as both sources and collectors, and
where the human being is the primary collection instrument.
Intelligence Sources
- Imagery Intelligence (IMINT)
The technical, geographic, and intelligence information derived
through the interpretation or analysis of imagery and collateral
materials.
Intelligence Sources
- Measurement and Signature Intelligence (MASINT)
obtained by quantitative and qualitative analysis of data (metric,
angle, spatial, wavelength, time dependence, modulation, plasma, and
hydromagnetic) derived from specific technical sensors for the purpose
of identifying any distinctive features associated with the emitter or
sender, and to facilitate subsequent identification and/or measurement
of the same. The detected feature may be either reflected or emitted.
Intelligence Sources
- Medical Intelligence (MEDINT)
That category of intelligence resulting from collection,
evaluation, analysis, and interpretation of foreign medical,
bio-scientific, and environmental information that is of interest to
strategic planning and to military medical planning and operations for
the conservation of the fighting strength of friendly forces and the
formation of assessments of foreign medical capabilities in both
military and civilian sectors.
Intelligence Sources
- Open-source Intelligence (OSINT)
Information of potential intelligence value that is available to the general public.
Intelligence Sources
- Scientific and Technical Intelligence (S&TI)
The product resulting from the collection, evaluation, analysis,
and interpretation of foreign scientific and technical information that
covers: a. foreign developments in basic and applied research and in
applied engineering techniques; and b. scientific and technical
characteristics, capabilities, and limitations of all foreign military
systems, weapons, weapon systems, and materiel; the research and
development related thereto; and the production methods employed for
their manufacture.
Intelligence Sources
- Signals Intelligence (SIGINT)
1. A category of intelligence comprising either individually or in
combination all communications intelligence, electronic intelligence,
and foreign instrumentation signals intelligence, however transmitted.
2. Intelligence derived from communications, electronic, and foreign
instrumentation signals.
Intelligence Sources
- Technical Intelligence (TECHINT)
Intelligence derived from the collection, processing, analysis, and
exploitation of data and information pertaining to foreign equipment
and materiel for the purposes of preventing technological surprise,
assessing foreign scientific and technical capabilities, and developing
countermeasures designed to neutralize an adversary's technological
advantages