Clandestine HUMINT Operational Techniques
Clandestine HUMINT Operational Techniques
Clandestine HUMINT Operational Techniques
Jump to: navigation, search This article may be too long to read and navigate comfortably. Please consider splitting content into sub-articles and using this article for a summary of the key points of the subject. (May 2008) The Clandestine HUMINT page deals with the functions of that discipline, including espionage and active counterintelligence. This page deals with Clandestine HUMINT operational techniques, also called "tradecraft". It applies to clandestine operations for espionage, and for a clandestine phase prior to direct action (DA) or unconventional warfare (UW). Clandestine HUMINT sources may also act as local guides for special reconnaissance (SR). Many of the techniques here are important in counterintelligence. Defensive counterintelligence personnel need to know them to recognize espionage, sabotage, etc. in process. Offensive counterintelligence specialists may actually use them against foreign intelligence services (FIS). While DA and UW can be conducted by national military or paramilitary organizations, al-Qaeda and similar non-state militant groups appear to use considerably different clandestine cell system structure, for command, control, and operations, than do national forces. Cell systems are evolving to more decentralized models, sometimes because they are enabled by new forms of electronic communications. This page deals primarily with one's own assets. See double agent for additional information adversary sources that a country has turned to its own side.
Contents
[hide]
1 Staff and Skills in a Clandestine HUMINT Operations Station o 1.1 Station under Diplomatic Cover o 1.2 Stations under Official but Nondiplomatic Cover o 1.3 Stations under Nonofficial Cover 1.3.1 Moving new agents into illegal residencies 1.3.1.1 Separated acting agent 1.3.1.2 Agent group 1.3.1.3 Agent residency 1.3.2 A representative illegal residency o 1.4 Support Services
1.4.1 Transportation, Infiltration, Exfiltration, Logistics 1.4.2 Volunteer and Proprietary Support 1.4.3 Safehouses 1.4.4 Useful Idiots 2 Basic Agent Recruiting 3 Basic Agent Operations o 3.1 Training o 3.2 Continued Testing during Operations o 3.3 Operating the Agent o 3.4 Agent Communications 3.4.1 Meeting places for personal meetings 3.4.2 Clandestine Transfer operated by Humans 3.4.2.1 Brush Pass and other physical exchange with couriers 3.4.2.2 Dead Drop 3.4.2.3 Car Tosses 3.4.3 Methods of Protecting Message Content 3.4.3.1 Microphotography 3.4.3.2 Encryption 3.4.3.3 Plain language code 3.4.3.4 Steganography, Covert Channels, and Spread Spectrum 3.4.4 Methods of Protecting against Electronic Detection of the fact of messaging o 3.5 Termination 4 Special Clandestine Services o 4.1 Agents of Influence o 4.2 Strategic deception 5 Direct Action Services 6 See also
7 References
Typically, criminal prosecution will be the primary goal against drug and slavery groups, with breaking up their operations the secondary goal. These priorities, however, are apt to reverse in dealing with terrorist groups. If there are separate organizations with diplomatic and nonofficial cover, there may be two chiefs. Sufficiently large stations may have several independent, compartmented groups. Soviet terminology US terminology Diplomatic cover, emphasizing that GRU assumed that the host nation Officers with assumed all military attaches were Diplomatic cover diplomatic immunity intelligence officers, but that some diplomats might actually be diplomats Not often used. Personnel with Public association Peace Corps and certain other Civilian cover (e.g., Tass news with the service's backgrounds are barred from agency, trade or scientific country, but no intelligence. Some, decreasing, delegation) diplomatic immunity cover as journalists now rarely used No affiliation with Nonofficial cover (NOC). May Illegal (usually with an assumed host nation use real name or not, but often identity) government some invented background Description
Operations Officer, also called case officer: interacts with local assets or leaders of local agent subnetwork. Israel's Mossad refers to these as katsas. Collection Management Officer (aka Reports Officer,Intelligence Officer): does preliminary report categorization and organization. May be the administrative chief.
Operational Targeting Officer: not always used. May be more focused on access agents and recruiting, handing off recruited agents to case officers. Might make the decision to use non-HUMINT collection, such as SIGINT based in the embassy. Technical collection specialists (e.g., the US Special Collection Service, a joint NSA-CIA operation)
An example of civilian cover for an American officer involved a German refugee, with the pseudonym "Stephan Haller", who had widely ranging interests and special skills in mathematics and physics, as well as native language skill. His overt role, in 1949, was
directing a program that paid subsidies to German scientists, part of a larger program of denying German talent to the Soviets. Initially, he was based in Pforzheim, (West) Germany.[4] After two years in Pforzheim, he had a well-established cover, and had been collecting political and scientific intelligence to the scientists, and also Germans that he knew in political circles before emigrating. In 1951, he moved to Berlin, directing overall "operations against scientific targets in the East Zone of Germany", while still managing the subsidy program. His new work included encouraging defection of key craftsmen working for the Soviets. He was considered a master craftsman, He did not grow careless or conceited with success. Here remained a meticulous craftsman. Before he debriefed a source, he mastered the subject to be discussed. His agents were made comfortable not only by his cigars and beer but also by the easy flow of communication. And he did not end until he had every last scrap of useful information. He never failed, moreover, to remain alert for operational leads--potential agents, counterintelligence indicators, propaganda possibilities. When Haller was finished, there were no more questions to be asked. And though he groaned over the chore of putting it on paper, his reporting became thorough-and more than thorough, illuminating-for he rarely failed to make interpretive comments.
separated agent comes in three guises: the separated acting agent, the agent group and the agent residency.
[edit] Separated acting agent
The most resources are devoted to the agents that provide the most important material. Once the central headquarters assesses the agent's information as highly valuable, the doctrine is to stop, temporarily, obtaining new material, and improving his security and education in espionage tradecraft. The training is preferably done in a third country, from which he might or might not be moved to the Soviet Union. His absence typically would be covered by taking a vacation or holiday. Thence he will go back to his own country, but as an independently acting agent. He will be run exclusively by the Centre, in concrete terms the head of a section, even, in special cases, the head of a directorate and in extreme cases the deputy head of the GRU or the head himself. The running of such an agent is thus carried out exactly as the running of illegals is.
[edit] Agent group
The next category of agent, less valuable than a separated acting agent but still of importance, was the agent group, which migrated from diplomatic or civilian contact, to the in-country illegal rezidentura (resident and infrastructure), to direct communications with the Center. The leader of such a group is called, in Soviet terminology, a gropovod, and is conceptually the only member of the group that communicates with Moscow. In reality, clandestine communications personnel may be aware of the direct contact, but newer electronics allow the leader to manage his or her only communications. Suvorov makes the important point that "A group automatically organises itself. The GRU obviously considers family groups containing the head of the family and his wife and children to be more secure and stable. The members of such a group may work in completely different fields of espionage." The pattern of having groups that are selforganizing and have preexisting ties, making them virtually impossible to infiltrate, has survived the GRU and is common in terrorist networks. Other agents recruited by residencies are gradually organised into agent groups of three to five men each. Usually, agents working in one particular field of espionage are put together in one group. Sometimes a group consists of agents who for various reasons are known to each other. Let us suppose that one agent recruits two others. ... Thus to a certain extent the members of agent groups are completely isolated from Soviet diplomatic representation. The agent group is in contact with the undercover residency for a period of time, then gradually the system of contact with the residency comes to an end and orders begin to be received directly from Moscow. By various channels the group sends it material directly to Moscow. Finally the contact with Moscow becomes permanent and stable and the agent group is entirely separated from the residency. With gradual changes in personnel at the residency, like the resident himself, the cipher officers and the operational officers with whom there was once direct contact, nobody
outside the Centre will know of the existence of this particular group. Should it happen that operating conditions become difficult, or that the embassy is blockaded or closed down, the group will be able to continue its activities in the same way as before.[5]
[edit] Agent residency
When the GRU attaches one or more illegals (i.e., Soviet officer under an assumed identity), the residency changes from "an agent residency into an illegal residency. This process of increasing the numbers and the gradual self-generation of independent organisations continues endlessly." Suvorov uses a medical metaphor of quarantine to contain infection to describe separating agents for improved security. The GRU kept certain officers immediately ready to go into illegal status, should the host nation intensify security. These officers are in possession of previously prepared documents and equipment, and gold, diamonds and other valuables which will be of use to them in their illegal activities will have been hidden in secret hiding-places beforehand. In case of war actually breaking out, these officers will unobtrusively disappear from their embassies. The Soviet government will register a protest and will for a short time refuse to exchange its diplomats for the diplomats of the aggressive country. Then it will capitulate, the exchange will take place and the newly fledged illegals will remain behind in safe houses and flats. Afterwards they will gradually, by using the system of secret rendezvous, begin to establish the system of contacts with agents and agent groups which have recently been subordinated to the undercover residency. Now they all form a new illegal residency. The new illegals never mix and never enter into contact with the old ones who have been working in the country for a long time. This plainly makes life more secure for both parties. [5] Again, Suvorov emphasizes that the process of forming new illegal residencies was the Soviet doctrine for imposing compartmentation. Western countries, especially those in danger of invasion, have a related approach, the stay-behind network. The US military definition, used by most NATO countries, is Agent or agent organization established in a given country to be activated in the event of hostile overrun or other circumstances under which normal access would be denied.[6] In such an approach, both clandestine intelligence and covert operations personnel live normal lives, perhaps carrying out regular military or government functions, but have prepared documentation of assumed identities, safehouses, secure communications, etc. [edit] A representative illegal residency Vilyam Genrikhovich Fisher, usually better known by his alias, Rudolf Abel, was a Soviet intelligence officer who came to the US under the false identity of a US citizen, Emil Robert Goldfus, who had died in infancy but was used by the USSR to create an
elaborate legend for Fisher. On coming to the US, entering through Canada, Fisher/Abel took over the control of several existing Soviet HUMINT assets, and also recruited new assets. Key assets for whom he was the case officer included Lona Cohen and Morris Cohen, who were not direct intelligence collectors but couriers for a number of agents reporting on US nuclear information, including Julius Rosenberg, Ethel Rosenberg, David Greenglass, and Klaus Fuchs. His role was that of the "illegal" rezident in the US, under nonofficial cover. Soviet practice often was to have two rezidents, one illegal and one a diplomat under official cover. He was betrayed to the US by an alcoholic assistant who defected to the FBI. That Fisher/Abel only had one assistant, with operational responsibilities, is not surprising. Unless a clandestine station has a strong cover identity, the larger the station, the larger the possibility it may be detected by counterintelligence organizations. Beyond the station chief, the most likely person to be associated with the station, not as a case officer, is a communicator, especially if highly specialized secure communication methods are used.
Sayanim is a term used to describe Jews living outside Israel as foreign citizens that volunteer to provide assistance to the Mossad. This assistance includes facilitating medical care, money, logistics, and even overt intelligence gathering, yet sayanim are only paid for their expenses. No official number is known, but estimates put the number of sayanim in the thousands. The existence of this large body of volunteers is one reason why the Mossad operates with fewer case officers than fellow intelligence agencies. Another kind of resource could include foreign offices owned or operated by nationals of the country in question. A step farther is a proprietary, or business, not just individuals, under non-official cover. Both kinds of business can provide information from recruitment, unwitting agents, or support functions. Small and medium aviation-related businesses have been popular US proprietaries, including Air America and Southern Air Transport. Once the service has a presence in aviation, it may become aware of persons, in private business, civil service, or the military, who fly to destinations of interest. They may mention it in innocent conversation, such as at the airport's restaurant or bar. They also may be assumed to be going there, based by analysis of flight departure times, aircraft type, duration of trip, and their passengers or cargo. Having routine access to an airport can reveal: "Whos coming and going, on and off the record? Whats in the hangers and warehouses? What are the finances? Political connections and loyalties? Access to planes on the ground? Flight plans?" It must be emphasized that a transportation-related proprietarytruck stops, boat maintenance, and other industry-specific businesses, have to operate as a real business. Occasionally, they may produce a profit, and that can be confusing for headquarters financial managers, provide a local but perhaps traceable source of funds, or both [8]. Public relations firms have long been useful proprietaries [9]. In a given country of operations, or perhaps adjacent countries that are concerted about the actions of their neighbor, news releases placed by experienced public relations professionals can help mold relevant opinion. Care must be taken that the news release does not "blow back" on the clandestinely sponsoring country. Another viable industry for proprietaries is natural resources exploration. If, hypothetically, a mining company operated in a country where there are both resources deposits and non-national group sanctuaries, a proprietary company could get information on both, and also provide access and support services. If the proprietary began mining operations, it would naturally have access to explosives, which might be made available to sabotage groups in neighboring areas. Use of nongovernmental organizations (NGO) is politically sensitive and may require approval at the highest level of an agency. Sometimes, there is a broader policy need not to have the possibility of drawing suspicion onto an NGO. For example, in WWII, it was occasionally necessary to send supplies to Allied POWs, but Red Cross parcels were
never ever used for this purpose. The decision had been made that Red Cross parcels were important to the survival of the POWs and could never be jeopardized. [edit] Safehouses "Safehouse" is a term of intelligence tradecraft whose origins may be lost in antiquity. "The Bible is also replete with instances of espionage, including Yahwehs instruction to Moses to send spies into the land of Canaan. The account of the harlot Rahab sheltering Israelite spies and betraying the city of Jericho might be the first documented instance of a "safe house." [10] The term is not strictly limited to houses, although many intelligence services use rural houses for extended functions such as debriefing defectors. In a city, a safehouse may be an apartment or house that is not known to be associated with an intelligence service. Another usage refers to mailing addresses (postal and electronic) and telephone numbers, to which messages can be sent with a reasonable chance of not coming into the awareness of counter-intelligence. [edit] Useful Idiots Useful idiot is a term attributed to Lenin, principally in Soviet use, for a person overtly supporting the interests of one country (e.g., the USSR) in another (e.g., a member of the overt Communist Party of the second country). Soviet intelligence practice was to avoid such people in the actual clandestine operations, regarding them as most useful as distractions to the counterintelligence services. Agents of influence, who were witting of Communist plans and intended to influence their own country's actions to be consistent with Soviet goals, went to great lengths to conceal any affiliation. "Witting" is a term of intelligence art that indicates that one is not only aware of a fact or piece of information, but also aware of its connection to intelligence activities. VENONA COMINT exposes that Alger Hiss and Harry Dexter White, accused of Communist sympathies, were indeed Soviet spies. They were Communist agents, and the Soviets certainly did not treat them as useful idiots. There were communications with them, and the dialogues were clandestine. Gus Hall also had overt Communist affiliation, and it is extremely unlikely Soviet clandestine operatives would have had anything to do with him. Still, in situations such as emergency exfiltration, Party members in a Western country might be called upon as a last desperate resort.
In principle and best practice, all country B officers in country A report to an executive function in their home country. In CIA terms, this might be a head of a country desk or a regional desk. Russian practice was to refer to "Center". Actual recruiting involves a direct approach by a case officer who has some existing access to the potential recruit, an indirect approach through an access agent or proprietary, or has reason to risk a "cold" approach. Before the direct recruitment, there may be a delicate period of development. For details, see Clandestine HUMINT asset recruiting.
Among the first things to be taught are communications tradecraft, beginning with recording the material of interest. Skills here can include the operation of cameras appropriate for espionage, methods of carrying out documents without detection, secret writing. Once the information is captured, it must be transmitted. The transmission may be impersonal, as with dead drops or car tosses. It may involve carriers. It may be electronic. If there is a need for personal meetings, the agent must know how to request them, and also to alert the network leader or case officer that the agent may be under suspicion. Teaching countersurveillance techniques to agents is a calculated risk.[12] While it may be perfectly valid for an agent to abort a drop or other relatively innocent action, even at the cost of destroying valuable collected material, it is much more dangerous to teach the agent to elude active surveillance. The ability to elude professional counterintelligence personnel following the agent, for example, may confirm the counterintelligence organization's suspicion that they are dealing with a real agent. Still, the agent may need to have an emergency escape procedure if he confirms he is under surveillance, or even if he is interrogated but released. [edit] Continued Testing during Operations Case officers should constantly test their agents for changes in motivation or possible counterintelligence compromise. While "name traces cannot be run on every person mentioned by the agent, do not be stingy with them on persons who have familial, emotional, or business ties with him" to detect any linkages to hostile counterintelligence. [12] . Until an agent is well established as reliable, meetings, which always must be done with care to avoid detection, are "the prime emphasis is put on vigilance and checkinghas he been planted by the local counterintelligence, are his motives in agreeing to collaborate sincere? The need for personal meetings with such an agent is increased, for they give the opportunity to assess him more completely."[13] An experienced US operations officer emphasized that field operations personnel should report status and progress often. Only with such reporting can a headquarters staff looking globally for penetrations, and aware of political implications. Reporting and headquarters advice is critical for joint operations (i.e., with the intelligence service of another country). Headquarters, aware of all joint operations with that service, can give advice from a broader viewpoint, without compromising the need for local initiative.[12]?"
impossible to manage without it. The number of meetings should be kept as low as possible, especially with sources of valuable information. Personal meetings may be held to give an agent his next assignment and instructions for carrying it out, to train him in tradecraft or the use of technical or communications equipment, to transmit documents, reports, technical equipment, money, or other items, or to fulfill several of these purposes. In actual practice several purposes are usually served by a meeting. In addition to its particular objectives more general needs can be filled. A meeting held for training purposes may be a means for clarifying biographic data on the agent or his views on various subjects. At every meeting with an agent one should study him and obtain new data on his potential and talents, thereby providing a better basis for judging his sincerity and deciding how much trust to place in him.[13] Agents, to varying extents, need reinforcement. Salary is important and also gives a lever of compromise, although pressing it too hard can offend a truly ideologically motivated agent. Some agents benefit from recognition that they can never show, such as a uniform of your service, or decorations from it. Agents will be more comfortable if they believe that they will have protection, preferably exfiltration, if compromised. Protecting their families may be even more important. When the agent operates in a country with a particularly brutal counterintelligence service, providing them with a "final friend", or means for suicide, can be comforting even if they never use it.[14]
destruct devices also are possibilities, but they confirm that the transfer involved sensitive material.
[edit] Brush Pass and other physical exchange with couriers
Under the general term "brush pass" is a wide range of techniques in which one clandestine operative passes a physical item to another operative [15], "Brush" implies that the two people "brush" past one another, typically in a public place and preferably a crowd, where random people interfere with any visual surveillance. In a properly executed brush pass, the agents do not even stop walking; at most, they may appear to bump into one another. During the brief contact, a common means of executing the exchange is for both to be carrying otherwise identical objects, such as a newspaper, briefcase, or magazine. The information being exchanged is in one of them. As the two people separate, they still appear to be holding the same object in the same hand. More challenging versions are reminiscent of passing a baton in a relay race, and would be most commonly done with small objects such as a photographic film cartridge. In this more dangerous method, the transfer is from hand to hand, or from hand into a pocket. While this technique obviously takes better manual dexterity and is more prone to error, it has the countersurveillance advantage that the operatives are not carrying anything after the transfer, and can blend into a crowd even more easily. A variation of the brush pass is the live letter drop, in which one agent follows a predefined route, on foot, with a prepared report hidden in a pocket. En route, a second agent unknown to the first agent picks his/her pocket and then passes the report on unread, either to a cut-out or to an intelligence officer. This techniques presents opportunities both for plausible deniability and for penetration by hostile agents.
[edit] Dead Drop
A dead drop is a container not easily found, such as a magnetized box attached to a metal rack in an out-of-sight alley. The box could be loosely buried. It should be possible to approach the container to fill or empty it, and not be easily observed from a street or window. Typically, a clandestine collector will put espionage material, perhaps in encrypted form, into the box, and use some prearranged signal to let a courier know that something needs to be taken out of the box and delivered to the next point on the route to the case officer. Such a route might have several dead drops. In some cases, the dead drop might be equipped with a device to destroy its contents unless it is opened properly.
Representative dead drop device Signals to tell a courier, or a case officer if there is no intermediate courier, that the dead drop needs service can be as simple as a piece of colored tape on a lamp post or perhaps a set of window shades raised and lowered in a specific pattern. While "wrong number" calls with a predefined apology can be used, they are more vulnerable to surveillance if the phone in question is tapped.
[edit] Car Tosses
A car toss can take many forms, one of which can be considered a moving dead drop. An agent or courier can put a magnetized box inside a bumper on a parked car. In some cases, if a car can drive slowly down a street or driveway not easily observed, a courier can toss a message container into an open window, making the transfer method intermediate between a brush pass and a dead drop. Cars with diplomatic immunity have advantages and disadvantages for tosses. They cannot be searched if the toss is observed, but they also are followed more easily. Diplomatic cars usually have distinctive markings or license plates, and may be equipped with electronic tracking devices. Counterintelligence could wait until the car is out of sight following a toss, then apprehend and interrogate the courier, or simply keep the courier under surveillance to discover another link in the message route. [edit] Methods of Protecting Message Content A message left in a dead drop, or dropped during an improperly executed brush pass, is quite incriminating if counterintelligence personnel can immediately see suspicious information written on it. The ideal material for transfer looks quite innocuous. At one time, invisible ink, a subset of steganography, was popular in espionage communications, because it was not visible to the naked eye without development by heat or chemicals. While computer-based steganographic techniques still are viable, modern counterintelligence laboratories have chemical and photographic techniques that detect the disturbance of paper fibers by the act of writing, so the invisible ink will not resist systematic forensic analysis. Still, if its existence is not suspected, the analysis may not be done.
[edit] Microphotography
Another technique, for hiding content that will resist casual examination, is to reduce the message to a photographic transparency or negative, perhaps the size of the dot over the letter "i" in this article. Such a technique needs both a laboratory and considerable technical skill, and is prone to damage and to accidentally falling off the paper. Still, it does have a countersurveillance value.[16]
[edit] Encryption
Encryption, especially using a theoretically secure method, when properly executed, such as the one-time pad [17], is highly secure, but a counterintelligence agent seeing nonsense characters will immediately become suspicious of the message that has been captured. The very knowledge that a dead drop exists can cause it to be trapped or put under surveillance, and the member of a brush pass that carries it will be hard-pressed to explain it. One-time pad encryption has the absolute requirement that the cryptographic key is used only once. Failure to follow this rule caused a serious penetration into Soviet espionage communications, through the VENONA analysis [18]. It is extremely difficult for a nonprofessional to develop a cryptosystem, especially without computer support, that is impervious to the attack by a professional cryptanalyst, working for an agency with government resources, such as the US NSA or Russian FAPSI.[17] Still, when the message is very short, the key is random or nearly random, some methods, like the Nihilist Straddling checkerboard may offer some resistance. Improvised methods are most useful when they only have to protect the information for a very short time, such as changing the location or time of an agent meeting scheduled in the same day.
[edit] Plain language code
Less suspicious when examined, although very limited in its ability to transfer more than simple content, is plain language code. For example, the final attack order for the Battle of Pearl Harbor came in a radio broadcast of the Japanese phrase, "Climb Mount Niitaka". Subsequent espionage communications referred to ships as different types of dolls at a doll repair shop. Plain language code is most effective when used to trigger a preplanned operation, rather than transfer any significant amount of information.
[edit] Steganography, Covert Channels, and Spread Spectrum
Steganography, in the broadest sense of the word, is a technique of hiding information "in plain sight" within a larger message or messaging context. It is hard to detect because the secret message is a very small component of the larger amount, such as a few words hidden in a Web graphic. Even more sophisticated computer-dependent methods can protect information. The information may or may not be encrypted. In spread-spectrum communications, the information is sent, in parallel, at very low level through a set of frequencies. Only when the receiver knows the frequencies, the time relationship on when a given frequency or other communications channel will carry content, and how to extract the content, can information be recovered. Basic spread spectrum uses a fixed set of frequencies, but the
signal strength in any one frequency is too low to detect without correlation to other frequencies. Frequency-hopping spread spectrum is a related technique, which can use the parallel transmission of true spread spectrum, not using any one frequency long enough for plausible interception. The pattern of variation among channels may be generated and received using crytographic methods. [edit] Methods of Protecting against Electronic Detection of the fact of messaging Avoiding detection of radio signals means minimizing the clandestine transmitter's exposure to hostile direction-finding. Modern techniques generally combine several methods:
Burst transmission or otherwise minimizing High-gain antenna and/or directional antenna Receiver or relay away from detectors, as, for example, satellites.
Exploring agent information often meant a good deal of interaction, in which the home service would clarify what the agent reported, give new orders, etc. One approach used in WWII was the Joan-Eleanor system, which put the case officer into an aircraft at high altitude. From that altitude, there could be fast interaction in voice, so that they get to the key issues faster than with many separately encrypted and transmitted messages [19]. The modern equivalent is a small, low probability of intercept radio transceiver, using a directional antenna aimed at an orbiting satellite communications relay. Avoiding detection of radio communications involves all the principles of transmission and reception security.
[edit] Termination
For any number of reasons, a human source operation may need to be suspended for an indefinite time, or definitively terminated. This need rarely eliminates the need for protecting the fact of espionage, the support services, and the tradecraft and tools provided. One of the most difficult challenges is ending an emotional relationship between the case officer and agent, which can exist in both directions. Sometimes, an agent is unstable, and this is a major complication; perhaps even requiring the evacuation of the agent. More stable agents may be happy with termination bonuses, and perhaps a future emigration opportunity, that do not draw attention to their own side's counterintelligence. In some instances, an intelligence agency may issue a "burn notice," indicating to other such agencies that an individual is an unreliable source of information. Especially in the case of non-national organizations, termination can be very literal, ranging from having a trusted operative kill the problematic agent, or, when culturally appropriate, sending the agent on a suicide mission.
When the clandestine phase is preparation for a DA mission such as the 9/11 attacks, or the assassination attacks, using suicide bombers, by the Liberation Tigers of Tamil Eelam, termination of the operational cells is rather obvious. If there are support cells in the operational area, they may be vulnerable, but it would be good tradecraft to withdraw them shortly before the attack.
"Active measures is not exclusively an intelligence activity, and in this sense it differs from the similar American concept of covert action. There are many differences between active measures and covert action. One is the Soviet ability to mesh overt and covert influence activities through centralized coordination of party, government, and ostensibly private organizations dealing with foreigners. Despite interagency coordination mechanisms, the United States is too pluralistic to achieve full coordination between all the overt and covert means of exercising influence abroad. Other major differences are in scope, intensity, and importance attributed to active measures and covert action, and in immunity from legal and political constraints." While deception and influence operations could involve the highest levels of Allied governments in WWII, it is worth noting that while the West generally speaks of military deception, strategic deception operates at a higher level. A Soviet, and presumably Russian, term of art, maskirovka, is much broader than the current Western doctrine of deception being run by lower-level staff groups.
Russian concepts involve the full scope of grand strategy In the military, responsibility for maskirovka easily can be at the level of a deputy chief of the General Staff, who can call upon all levels of government. Returning to KGB doctrine, presumably still present in the SVR, "Influence operations integrate Soviet views into foreign leadership groups. Propaganda operations take the form of disinformation articles placed in the foreign press. Disinformation operations are false documents designed to incite enmity toward the United States." "The Second Chief Directorate", whose responsibilities are now primarily in the Russian FSB, is responsible for the recruitment of agents among foreigners stationed in the Soviet Union. The KGB influences these people unwittingly, as most regard themselves too sophisticated to be manipulated. "The second deception program is counterintelligence, which aims to neutralize the efforts of foreign intelligence services. It achieves this through the use of non-Soviet
double agents and Soviet double agents. Non-Soviet double agents are foreign nationals who have been "turned". A Soviet double agent is a Soviet with access to classified information. These officials may be used as false defectors...[20]. "Influence operations integrate Soviet views into leadership groups. The agent of influence may be a well- placed, "trusted contact" who consciously serves Soviet interests on some matters while retaining his integrity on others an unwitting contact who is manipulated to take actions that advance Soviet interests on specific issues of common concern.
Tradecraft
[edit] References
1. ^ Paterson, Tony (25 November 2004), "Berlin plaque pays tribute to `Schindler of Stourbridge'" ([dead link]), Independent, the (London), http://findarticles.com/p/articles/mi_qn4158/is_20041125/ai_n12813807 2. ^ Rogov, (GRU officer) A.S., "Pitfalls of Civilian Cover" ([dead link] Scholar search), Studies in Intelligence (Central Intelligence Agency), https://www.cia.gov/library/center-for-the-study-of-intelligence/kentcsi/docs/v08i3a03p_0001.htm
3. ^ US Department of the Army (September 2006), FM 2-22.3 (FM 34-52) Human Intelligence Collector Operations, http://www.fas.org/irp/doddir/army/fm2-223.pdf, retrieved 2007-10-31 4. ^ Beller, Patrick R., "The Life and Work of Stephan Haller", Studies in Intelligence (Central Intelligence Agency), https://www.cia.gov/library/centerfor-the-study-of-intelligence/kent-csi/vol3no3/html/v03i3a01p_0001.htm 5. ^ a b c Suvorov, Victor (1984), "Chapter 6, The Practice of Agent Work", Inside Soviet Military Intelligence, MacMillan Publishing Company, http://militera.lib.ru/research/suvorov8/18.html 6. ^ US Department of Defense (12 July 2007), Joint Publication 1-02 Department of Defense Dictionary of Military and Associated Terms, http://www.dtic.mil/doctrine/jel/new_pubs/jp1_02.pdf, retrieved 2007-10-01 7. ^ Carroll, Thomas Patrick (5 September 2006), Human Intelligence: From Sleepers to Walk-ins, http://www.csus.edu/indiv/c/carrollt/Site/Welcome_files/Gov't%20139G%20class %20notes%20Fall%202006%20-%2024%20Oct.pdf 8. ^ Prouty, L. Fisher (1973), The Secret Team: The CIA and Its Allies in Control of the United States and the World, Prentice-Hall, ISBN 0137981732, http://www.bilderberg.org/st/ 9. ^ "R.F. Bennett". http://www.spartacus.schoolnet.co.uk/JFKbennettRF.htm. 10. ^ U.S. Department of Justice,Commission for Review of FBI Security Programs (March 2002), A Review of FBI Security Programs, http://www.fas.org/irp/agency/doj/fbi/websterreport.html 11. ^ "Agent Radio Operation During World War II", Studies in Intelligence, https://www.cia.gov/library/center-for-the-study-of-intelligence/kentcsi/vol3no1/html/v03i1a10p_0001.htm 12. ^ a b c Begoum, F.M. (18 Sept 1995), "Observations on the Double Agent", Studies in Intelligence, https://www.cia.gov/library/center-for-the-study-ofintelligence/kent-csi/vol6no1/html/v06i1a05p_0001.htm, retrieved 2007-11-03 13. ^ a b c Bekrenev, (GRU officer) L. K. ([dead link] Scholar search), Operational Contacts, Center for the Study of Intelligence, Central Intelligence Agency, https://www.cia.gov/library/center-for-the-study-of-intelligence/kentcsi/docs/v09i1a06p_0001.htm 14. ^ Hall, Roger (1957), You're Stepping on my Cloak and Dagger, W. W. Norton & Co. 15. ^ Decision Support Systems, Inc.. "An Analysis of Al-Qaida Tradecraft". http://www.metatempo.com/analysis-alqaida-tradecraft.html. Retrieved 2007-1119. 16. ^ John Barron (1974), KGB: the secret work of Soviet secret agents, Readers Digest Press 17. ^ a b David Kahn (1974), The Codebreakers: The Story of Secret Writing, Macmillan 18. ^ National Security Agency. "VENONA". http://www.nsa.gov/venona/. Retrieved 2007-11-18. 19. ^ The SSTR-6 and SSTC-502 - "Joan-Eleanor", 2007, http://www.militaryradio.com/spyradio/joaneleanor.html, retrieved 2007-11-17