Espionage+Terms

Back to History of Espionage

Agent : someone employed to spy on another country or business competitor [|spy], [|undercover agent] - (military) a secret agent hired by a state to obtain information about its enemies or by a business to obtain industrial secrets from competitors

Asset: A spy working in his or her own country and controlled by the enemy.

Black Operations : A ** black operation ** or ** black op ** is a [|covert operation] by a government, a government agency, or a military organization. This can include activities by private companies or groups. A black operation typically involves activities that are highly [|clandestine] and often outside of standard military/intelligence protocol, sometimes against the law. Key features of a black operation are that it is clandestine, it has negative overtones, and it is not attributable to the organization carrying it out. [|[1]] The main difference between a black operation and one that is merely clandestine is that a black operation involves a significant degree of deception, to conceal who is behind it or to make it appear that some other entity is responsible ("false flag" operations). [|[2]][|[3]]

A single such activity may be called a "black bag operation"; [|[1]] that term is primarily used for covert or [|clandestine] surreptitious entries into structures to obtain information for [|human intelligence] operations. [|[4]] Such operations are known to have been carried out by the [|FBI], [|[5]] the [|Central Intelligence Agency] , [|[6]] [|Mossad] , MI6 and the intelligence services of other nations. [|[]

Bona Fides ** Good faith **

In philosophy, the concept of ** good faith ** (Latin: **// bona fides //**, or **// bona fide //** for "//in// good faith") denotes [|sincere] , [|honest] intention or [|belief] , regardless of the outcome of an action; the opposed concepts are [|bad faith] , // mala fides // (duplicity) and [|perfidy] (pretense).

In law, // bona fides // denotes the [|mental] and [|moral] states of honesty and [|conviction] regarding either the [|truth] or the [|falsity] of a [|proposition], or of a body of [|opinion] ; likewise regarding either the rectitude or the depravity of a line of [|conduct]. As a legal concept // bona fides // is especially important in matters of [|equity] (see [|Contract] ). [|[1]][|[2]] Linguistically, in the U.S., American English usage of ** bona fides ** applies it as synonymous with [|credentials], professional background, and documents attesting a person's [|identity] , which is not synonymous with [|bona fide occupational qualifications]. [|[3]]

Good faith effort
In the United States, [|the federal government] and some state governments are required to look for disabled, minority, and veteran business enterprises when bidding public jobs. [|[4]]

In law
In contract law, the implied covenant of good faith is a general presumption that the parties to a contract will deal with each other honestly, fairly, and in good faith, so as to not destroy the right of the other party or parties to receive the benefits of the contract.

Brush Contact: A brief, public, but discreet meeting of an agent and his handler or another intelligence officer in which information, documents, or funds are exchanged. There is no conversation between the two.

To the untrained observer, such a meeting (also called a brief encounter or meeting) would appear accidental, between two persons who are unknown to each other **. **

Burned : A **burn notice** is an official statement issued by an [|intelligence agency] to other agencies. It states that an [|asset] or intelligence source is unreliable for one or more reasons, often [|fabrication]. [|[1]] This is essentially a directive for the recipient to disregard or "burn" all information derived from that individual or group.

Carnivore : 8. The efficiency of any complex network is based on topology: there are many routes by which data can travel from one point to another. The flow of traffic improves when data is sent over routes which are the shortest and most lightly traveled, and when retransmission of data due to errors is minimized. The superior efficiency of digital networks like the Internet is in large measure based upon the discovery that network traffic flows much better if each transmission is divided into many small packets, which can follow different routes and be reassembled at the destination. [|[17]] A single communication is broken into many smaller packets, each of which bears a “header,” i.e., the information required to properly route, validate, and prioritize that packet. [|[18]]

9. Thus, the Internet is literally built upon computers programmed to read and interpret packet headers. Carnivore is fundamentally based upon a “packet sniffer,” which is a computer placed near a switching point on the network and programmed to intercept and examine all of the packets that go by. In order to reduce the potential for delay or disruption of network traffic inherent in this process, Carnivore creates a copy of all of the data that flows through the system at the intercept point, and processes the copy rather than the original. [|[19]] The FBI has taken pains to emphasize the passive and non-intrusive structure of Carnivore. [|[20]] However, as the FBI itself has stated, “Carnivore //chews// all the data on the network, but it only actually //eats// the information authorized by the court order.” [|[21]] The FBI contends that Carnivore should be viewed as analogous to a passive wiretap that does not interfere with communications. [|[22]] But a mail seizure or a wiretap touches only upon communications directly involving the target of the investigation, [|[23]] while Carnivore starts by copying everything in the pipe, in much the same fashion as the Echelon program by which the NSA and MI6 monitor all wireless communications. The American Civil Liberties Union has categorized Carnivore as a general search that clearly violates the Fourth Amendment. [|[24]]

http://www.vjolt.net/vol6/issue2/v6i2-a10-Jennings.html#_Carnivore_Description

Cipher: A **book cipher** is a [|cipher] in which the key is some aspect of a book or other piece of text; books being common and widely available in modern times, users of book ciphers take the position that the details of the key are sufficiently well hidden from attackers in practice. This is in some ways an example of [|security by obscurity]. It is typically essential that both correspondents not only have the same book, but the same [|edition].

Colossus Colossus I was the world's first programmable computer. Colossus I was created during World War II by the British to speed up the [|decryption] of German messages encoded by the Lorenz Schlüsselzusatz (SZ) 40 and 42 machines

Read more: [|http://www.faqs.org/espionage/Co-Cop/Colossus-I.html#ixzz2sKguBg70]

http://www.faqs.org/espionage/Co-Cop/Colossus-I.html

COMINT: an abbreviation for communications intelligence  ; technical and intelligence information derived from foreign communications by other than the intended recipients.

technical and intelligence information derived from foreign communications by other than the intended recipients

[|communications intelligence]

[|SIGINT], [|signals intelligence] - intelligence information gathered from communications intelligence or electronics intelligence or telemetry intelligence

Counterintelligence: refers to information gathered and activities conducted to protect against [|espionage], other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons or international terrorist activities, but not including personnel, physical, document or communications security programs.

Cover

Covert Operations |

Dangle

Dead drop

Double Agent

ElInt

Espionage

Exfiltration

Eyes Only

Handler

HUMINT

L-Pill

Little Birds

Provocateur

Sabotage

Sheep Dipping

SIGINT

Sleeper

Tradecraft

U-2

Wet job

Window Dressing

Classic Tools of the Trade

Evolution of Encryption

Drones and Remote Sensing

Surveillance in the Information Age

Moments of Panic and Paranoia

Fictional Portrayals of Spies

Fact vs. Fiction

Aldrich Ames

// Spied For: The Soviet Union //

Ames is a former CIA Counter-intelligence Officer who was convicted of spying for the Soviet Union in 1994. On his first assignment as a case officer, he was stationed in Ankara, Turkey, where his job was to target Soviet intelligence officers for recruitment. Due to financial problems in his personal life as a result of alcohol abuse and high spending, Ames began spying for the Soviet Union in 1985, when he walked into the Soviet Embassy in Washington to offer secrets for money.

Ames was assigned to the CIA’s European office where he had direct access to the identities of CIA operatives in the KGB and Soviet Military. The information he supplied to the Soviets lead to the compromise of at least 100 CIA agents and to the execution of at least 10. He ultimately gave the USSR the names of every CIA operative working in their country; for this they paid him 4.6 million dollars. Ames used the money to live well beyond his means as a CIA agent, buying jewellery, cars, and a $500,000 house.

In early 1985, the CIA began to notice that they were losing their “assets” at a very rapid rate. For unknown reasons they were not willing, in the early stages, to believe that they had been infiltrated by the KGB, instead presuming the leak to be via bugging devices. When the FBI were finally brought in to investigate, Ames became the primary suspect. Fearing he would defect on a CIA trip to Russia, The FBI arrested him at the airport with his wife. He was given a life sentence and is incarcerated in the US Penitentiary in Allenwood, Pennsylvania.

// Spied For: The Soviet Union //

Ames is a former CIA Counter-intelligence Officer who was convicted of spying for the Soviet Union in 1994. On his first assignment as a case officer, he was stationed in Ankara, Turkey, where his job was to target Soviet intelligence officers for recruitment. Due to financial problems in his personal life as a result of alcohol abuse and high spending, Ames began spying for the Soviet Union in 1985, when he walked into the Soviet Embassy in Washington to offer secrets for money.

Ames was assigned to the CIA’s European office where he had direct access to the identities of CIA operatives in the KGB and Soviet Military. The information he supplied to the Soviets lead to the compromise of at least 100 CIA agents and to the execution of at least 10. He ultimately gave the USSR the names of every CIA operative working in their country; for this they paid him 4.6 million dollars. Ames used the money to live well beyond his means as a CIA agent, buying jewellery, cars, and a $500,000 house.

In early 1985, the CIA began to notice that they were losing their “assets” at a very rapid rate. For unknown reasons they were not willing, in the early stages, to believe that they had been infiltrated by the KGB, instead presuming the leak to be via bugging devices. When the FBI were finally brought in to investigate, Ames became the primary suspect. Fearing he would defect on a CIA trip to Russia, The FBI arrested him at the airport with his wife. He was given a life sentence and is incarcerated in the US Penitentiary in Allenwood, Pennsylvania.

// Spied For: The Soviet Union //

Ames is a former CIA Counter-intelligence Officer who was convicted of spying for the Soviet Union in 1994. On his first assignment as a case officer, he was stationed in Ankara, Turkey, where his job was to target Soviet intelligence officers for recruitment. Due to financial problems in his personal life as a result of alcohol abuse and high spending, Ames began spying for the Soviet Union in 1985, when he walked into the Soviet Embassy in Washington to offer secrets for money.

Ames was assigned to the CIA’s European office where he had direct access to the identities of CIA operatives in the KGB and Soviet Military. The information he supplied to the Soviets lead to the compromise of at least 100 CIA agents and to the execution of at least 10. He ultimately gave the USSR the names of every CIA operative working in their country; for this they paid him 4.6 million dollars. Ames used the money to live well beyond his means as a CIA agent, buying jewellery, cars, and a $500,000 house.

In early 1985, the CIA began to notice that they were losing their “assets” at a very rapid rate. For unknown reasons they were not willing, in the early stages, to believe that they had been infiltrated by the KGB, instead presuming the leak to be via bugging devices. When the FBI were finally brought in to investigate, Ames became the primary suspect. Fearing he would defect on a CIA trip to Russia, The FBI arrested him at the airport with his wife. He was given a life sentence and is incarcerated in the US Penitentiary in Allenwood, Pennsylvania.

// Spied For: The Soviet Union //

Ames is a former CIA Counter-intelligence Officer who was convicted of spying for the Soviet Union in 1994. On his first assignment as a case officer, he was stationed in Ankara, Turkey, where his job was to target Soviet intelligence officers for recruitment. Due to financial problems in his personal life as a result of alcohol abuse and high spending, Ames began spying for the Soviet Union in 1985, when he walked into the Soviet Embassy in Washington to offer secrets for money.

Ames was assigned to the CIA’s European office where he had direct access to the identities of CIA operatives in the KGB and Soviet Military. The information he supplied to the Soviets lead to the compromise of at least 100 CIA agents and to the execution of at least 10. He ultimately gave the USSR the names of every CIA operative working in their country; for this they paid him 4.6 million dollars. Ames used the money to live well beyond his means as a CIA agent, buying jewellery, cars, and a $500,000 house.

In early 1985, the CIA began to notice that they were losing their “assets” at a very rapid rate. For unknown reasons they were not willing, in the early stages, to believe that they had been infiltrated by the KGB, instead presuming the leak to be via bugging devices. When the FBI were finally brought in to investigate, Ames became the primary suspect. Fearing he would defect on a CIA trip to Russia, The FBI arrested him at the airport with his wife. He was given a life sentence and is incarcerated in the US Penitentiary in Allenwood, Pennsylvania.

Alfred Dreyfus

Allan Pinkerton

Edward Snowden

Gustav Weber

Giacomo Casanova

J. Edgar Hoover

Julius and Ethel Rosenberg

Mary Bowser

Mata Hari

Nathan Hale

Richard Sorge

Sydney Reilly

Robert Baden-Powell

Cambridge Spies

// Spied For: The Soviet Union //

The Cambridge Five was a ring of Soviet spies in the UK who passed information to the Soviet Union during World War II and into the early 1950s. It has been suggested they may also have been responsible for passing Soviet disinformation to the Nazis. Whilst they are called the Cambridge Five, the fifth member is still unknown. Here is a short profile of each of the four known members :

** Kim Philby ** : Of the five, Philby is believed to have done the most damage to British and American intelligence, providing classified information to the Soviet Union that caused the deaths of scores of agents. He was born in India to St. John Philby, a British officer and eventual advisor to the King of Saudia Arabia.

** Donald Duart Maclean ** : Donald was recruited as a straight penetration agent while still an undergraduate at Cambridge. His actions are widely thought to have contributed to the 1948 Soviet blockade of Berlin and the onset of the Korean War. Maclean was brevetted a colonel in the Soviet KGB.

** Guy Burgess ** : Burgess and Anthony Blunt contributed to the Soviet cause with the transmission of secret Foreign Office and MI5 documents that described Allied military strategy. He was most useful to the Soviets in his position as secretary to the British Deputy Foreign Minister, Hector McNeil.

** Anthony Blunt ** : Blunt was an English art historian, formerly Professor of the History of Art, University of London and director of the Courtauld Institute of Art. After visiting Russia in 1933, Blunt was recruited in 1934 by the NKVD (forerunner of the KGB). A committed Marxist, Blunt was instrumental in recruiting Guy Burgess and Donald Maclean.

They were originally known as the Cambridge Spy Ring because all became committed communists while attending Cambridge University in the 1930s. There is some conjecture as to when they were actually recruited to Soviet intelligence, but Anthony Blunt claimed that it did not happen at Cambridge. Rather, they were recruited after they graduated

[]

Valerie Plame

Violette Szabo

Anna Chapman

Assassins http://www.youtube.com/watch?v=FZWr6JAJg2o

Cheka Between 1917 and 1954, the USSR’s state security and intelligence agencies were reorganized and renamed a number of times. The first security agency, Vecheka (or Cheka) was formed in December 1917 to investigate counterrevolution and sabotage, but it soon became responsible for imprisoning and executing anyone considered an enemy of the state. In 1922, Cheka was replaced by the GPU. A year later, as the OGPU, the agency helped implement Stalin’s plans to forcibly collectivize agriculture and deport wealthy peasants. The OGPU eventually controlled all security functions within the USSR until it was absorbed into the NKVD (People’s Commissariat of Internal Affairs) in 1934. Picking up the OGPU’s responsibilities, the NKVD oversaw all aspects of internal and state security. It controlled the police, criminal investigation departments, fire brigades, internal troops, and prison guards.

CIA

KGB http://www.afio.com/publications/Pringle_SovRus_Intel_in_AFIO_INTEL_WinterSpring2011.pdfMI6

Mossad

MSS

NSA

Okhrana

Oprichniki

The //oprichniki// played a central role in Ivan's //oprichnina//; they were the soldiers and ministers, the police and the bureaucrats. Drawn mainly from the lower levels of the military and society, each member was questioned and their past checked. Those that passed were rewarded with land, property and payments. The result was a cadre of individuals whose loyalty to the Tsar was without question, and which included very few boyars. Their numbers grew from 1000 to 6000 between 1565 - 72, and included some foreigners. The //oprichniks// precise role is unclear, partly because it changed over time, and partly because historians have very few contemporary records from which to work. Some commentators call them bodyguards, while others see them as a new, hand-picked, nobility designed to replace the boyars. The //oprichniks// have even been described as the 'original' Russian secret police, an ancestor of the KGB.

The //oprichniki// are often described in semi-mythical terms, and it's easy to see why. They dressed in black: black clothes, black horses and black carriages. They used the broom and the dog's head as their symbols, one representing the 'sweeping away' of traitors, and the other 'snapping at the heels' of their enemies; it is possible that some //oprichniks//carried actual brooms and severed dogs heads. Answerable only to Ivan and their own commanders, these individuals had free run of the country, //oprichnina// and //zemschina//, and a prerogative to remove traitors. Although they sometimes used false charges and forged documents, as in the case of Prince Staritsky who was executed after his cook 'confessed', this was normally unnecessary. Having created a climate of fear and murder, the //oprichniki// could just exploit the human propensity to 'inform' on enemies; besides, this black clad corps could kill anyone they wished.

The stories associated with the //oprichniks// range from the grotesque and outlandish, to the equally grotesque and factual. People were impaled and mutilated, while whipping, torture and rapes were common. The //Oprichniki// Palace features in many tales: Ivan built this in Moscow, and the dungeons were supposedly full of prisoners, of which at least twenty were tortured to death everyday in front of the laughing Tsar. The actual height of this terror is well documented. In 1570 Ivan and his men attacked the city of Novgorod, which the Tsar believed was planning to ally with Lithuania. Using forged documents as a pretext, thousands were hanged, drowned or deported, while the buildings and countryside were plundered and destroyed. Estimates of the death toll vary between 15,000 and 60,000 people. A similar, but less brutal, sacking of Pskov followed this, as did the execution of //zemschina// officials in Moscow.

Ivan alternated between periods of savagery and piety, often sending great memorial payments and treasure to monasteries. During one such period the Tsar endowed a new monastic order, which was to draw its brothers from the //oprichniks//. Although this foundation did not turn the //oprichniki// into a corrupted church of sadistic monks (as some accounts might claim), it did became an instrument interwoven in both church and state, further blurring the organisation's role. The //oprichniks// also acquired a reputation in the rest of Europe: Prince Kurbsky, who had fled Muscovy in 1564, described them as "children of darkness...hundreds and thousands of times worse than hangmen." (Bonney,//The European Dynastic States//, Oxford, 1991, pg. 277).

Like most organizations that rule through terror, the //oprichniki// also began to cannibalize itself. Internal quarrels and rivalries led many //oprichniki// leaders to accuse each other of treason, and increasing numbers of //zemschina// officials were drafted in as replacements. Leading Muscovite families attempted to join, seeking protection through membership. Perhaps crucially, the //oprichniki// did not act in a pure orgy of bloodshed; they achieved

http://europeanhistory.about.com/library/weekly/aa042701b.htm

Shinobi A **// ninja //** ( 忍者 [|**__?__**] ) or **// shinobi //** ( 忍び [|**__?__**] ) was a [|covert agent] or [|mercenary] in [|feudal Japan]. The functions of the ninja included [|espionage], [|sabotage] , [|infiltration] , and [|assassination] , and open combat in certain situations. [|[1]] Their covert methods of waging war contrasted the ninja with the [|samurai], who observed strict rules about honor and combat. [|[2]] The // shinobi // proper, a specially trained group of spies and mercenaries, appeared in the [|Sengoku] or "warring states" period, in the 15th century, [|[3]] but antecedents may have existed in the 14th century, [|[4]] and possibly even in the 12th century ( [|Heian] or early [|Kamakura] era). [|[5]][|[6]]

In the unrest of the Sengoku period (15th–17th centuries), mercenaries and spies for hire became active in the [|Iga Province] and the adjacent area around the village of [|Kōga], and it is from their ninja clans that much of our knowledge of the ninja is drawn. Following the unification of Japan under the [|Tokugawa shogunate] (17th century), the ninja faded into obscurity. [|[7]] A number of // shinobi // manuals, often centered around [|Chinese] military [|philosophy], were written in the 17th and 18th centuries, most notably the // [|Bansenshukai]  // (1676). [|[8]]

By the time of the [|Meiji Restoration] (1868), the tradition of the // shinobi // had become a topic of popular imagination and mystery in Japan. Ninja figured prominently in folklore and legend, and as a result it is often difficult to separate historical fact from myth. Some legendary abilities purported to be in the province of ninja training include [|invisibility], [|walking on water] , and control over the natural [|elements]. As a consequence, their [|perception in western popular culture] in the 20th century is often based more on such legend and folklore than on the historical spies of the Sengoku period.

http://en.wikipedia.org/wiki/Ninja

Stasi

[|//http://en.wikipedia.org/wiki/Stasi//]

// This article is about the secret police of East Germany. For its other common meaning, see //[|//__Stasi Commission__//]//. For the regular police in East Germany, see [|__Volkspolizei__]. //

The **Ministry for State Security** (German: //Ministerium für Staatssicherheit//, MfS), commonly known as the **Stasi** ( IPA: [|[ˈʃtɑːziː]] ) (abbreviation [|__German__] : **// Sta //**// ats**si**cherheit //, literally State Security), was the official state security service of the [|__German Democratic Republic__] or GDR, colloquially known as East Germany. It has been described as one of the most effective and repressive [|__intelligence__] and [|__secret police__] agencies to ever have existed. [|__[2__]][|__[3__]][|__[4__]][|__[5__]][|__[6__]][|__[7__]] The Stasi was headquartered in [|__East Berlin__], with an extensive complex in [|__Berlin-Lichtenberg__] and several smaller facilities throughout the city. The Stasi motto was "//Schild und Schwert der Partei//" (Shield and Sword of the Party), that is the ruling [|__Socialist Unity Party of Germany__] (SED).

One of its main tasks was spying on the population, mainly through a vast network of citizens turned informants, and fighting any opposition by overt and covert measures including hidden psychological destruction of dissidents (//Zersetzung//, literally meaning [|__decomposition__] ). It also worked as an intelligence agency abroad, the respective division // [|__Hauptverwaltung Aufklärung__] // was responsible for both [|__espionage__] and for conducting [|__covert operations__] in foreign countries. Under its long-time head [|__Markus Wolf__] it gained a reputation as one of the most effective intelligence agencies of the [|__Cold War__]. Numerous Stasi officials were prosecuted for their crimes after 1990. After [|__German reunification__], the surveillance files that the Stasi had maintained for millions of East Germans were laid open, so that any citizen could inspect their personal file on request; these files are now maintained by the [|__Federal Commissioner for the Stasi Archives__].

Historical Origins and Evolution of espionage

[]

[] good summary

Key Vocabulary (the Covert Code)


 * Covert actions and special operations. ** Most American, government-backed espionage actions against the British were covert, strategic operations of deception or sabotage. Blockade running was of critical importance to the American war effort. Though British ships clogged United States harbors, American privateers successfully ran British blockades to provide troops with supplies, ammunition, and even supporting troops from France.

The American government, usually through diplomats abroad, employed a number of agents to sabotage wartime industries in Britain. Munitions factories, shipyards, and weapons storage facilities were the main targets of Patriot sabotage. Twelve separate targets were attacked in London and Portsmouth in a three-year period by one American saboteur before the agent fell into British custody and was executed.

Some operations of deception were more insidious. British troops, wanting to keep some local Indian populations from joining the American cause, bribed village leaders with gifts of blankets and jewelry. Earlier, they gave the Indians blankets from their military sick wards, often infected with smallpox. The disease continued to devastate the American Indian population during the course of the war. Both British and American military personnel traded contaminated goods through Indian trade networks, hoping the goods would fall into enemy hands.


 * Codes, cryptology, and secret writing. ** American and British forces employed codes and ciphers to disguise their communications, and took precautionary measures to ensure that crucial messages were not intercepted by the enemy. Both armies employed replacement codes, where pre-set letters or words replaced other letters or words in communications. This required intense memorization of static codes, or the use of codebooks, which had a high risk of being stolen by rival spies. The codes used in the American Revolution were simple and easy to decipher, permitting both armies to read intercepts with relative ease. In 1777, the Americans unveiled a new mathematical code that remained unbroken throughout the war, but the complexity of the code precluded its daily use and limited its effectiveness to overseas diplomatic dispatches that did not have to be deciphered in a timely manner.

In lieu of complex codes, American cryptologists developed and used secret writing techniques. Disappearing inks are an ancient espionage trick, but during the Revolution, American scientists developed several inks that needed a series of reagents to reveal the hidden message. Some of these inks were waterproof and held up for months in difficult conditions, a necessity for warfare across wild and vast terrain. To further disguise messages, agents were instructed to write their communications between the lines of common publications, such as pamphlets and almanacs.

Intelligence operations abroad and at sea required further technological advances in espionage tradecraft. With the British blockade, American agents had to be ready to conceal or destroy intelligence information that they carried. To preserve and conceal information, agents developed small, silver containers in which information could be hidden. The container could then be thrown into the fire and melted or be swallowed by the agent, permitting to information to possibly remain intact and undetected.

After the end of the Revolution, and the establishment of an independent United States government, most military and espionage institutions were dissolved. Until the outbreak of World War I in 1914, American intelligence agencies and services were exclusively wartime organizations, rapidly assembled in times of conflict, and dissolved in times of peace. Though intelligence operations certainly aided the victory of American forces over the larger and better-armed British military, peacetime intelligence remained scattered, and largely focused on political and diplomatic espionage operations.

[]

Read more: [|http://www.faqs.org/espionage/Re-Se/Revolutionary-War-Espionage-and-Intelligence.html#ixzz2sdoyEESO]

Read more: [|http://www.faqs.org/espionage/Re-Se/Revolutionary-War-Espionage-and-Intelligence.html#ixzz2sdoT4pAc]

Distinguishing espionage, intelligence, and covert operations

The private sector: industrial espionage, whistleblowing, and confidential informants


 * 1) ** A Secret History **

Organizations and Operations

Spies of the Emerging Modern World

Espionage in the Cold War

Intelligence gathering today

When, if ever, is it right to pretend to be someone you're not?

To what extent have spies and covert operations shaped the course of history?

Are state-sponsored assassinations ever justified?

To what extent should our daily activities, on the Internet and in real life, be tracked and cataloged—by whom, and to what end?

Does fiction mislead us about spies in the real world?

Do we live in a surveillance society? Should we?

Have changes in technology made it easier or harder to be a spy?

Is industrial espionage a legitimate business strategy?

What might motivate a spy?

** asset **
an agent

** analysis **
drawing conclusions about raw information by assessing its significance and by collating it with other information.

** agent **
a person under the control of an intelligence agency or security service

** agent provocateur **
a deep-cover agent who feigns enthusiastic support while tempting the target to incriminate himself/herself through action or words.

** backstop **
an arrangement between two persons for the express purpose of substantiating a cover story or alibi

** biographical leverage **
blackmail info

** birdwatcher **
slang used by British Intelligence for a spy

** black-flagged **
an agent or intelligence officer who is to be interrogated and summarily shot if apprehended

** blind date **
the first meeting with an unknown person

** black propaganda **
a smear campaign, usually consisting of a character assassination

** blowback **
unexpected negative consequences of spying activity

** blue-on-blue **
friendly fire, inadvertent hostile engagement between allies.

** BOX **
salng for the MI.5

** brevity codes **
a system of code-words used by members of a surveillance team.

** brick agent **
an FBI agent who works inside a field office

** bride agent **
an agent who acts as a courier from a case officer to an agent in a denied area

** brush contact **
a clandestine, momentary contact between two agents who are passing information, documents, or equipment (also known as 'brush pass')

** bucar **
an FBI car

** case officer **
operations officer, controller

** chase car **
a security detail or bodyguard vehicle that follows the subject.

** chicken feed **
low grade information fed through a double agent to one's adversary with the intention of building the credibility of the double agent.

** cobbler **
a spy who creates false passports, visas, diplomas and other documents

** comm **
a small note or other written communication from an underground organization or one of its members. They are typically written on cigarette wrappers, chewing gum wrappers, etc.

** commando **
a civilian, military, or paramilitary combat group using irregular tactics. Commando can refer to an individual, a cell, a squad, or the organization as a whole.

** commit **
a surveillance operative performing the commit function is watching a location to determine the direction that the target takes

** consumer **
a person or an organization on an intelligence agency's distribution list (also known as product)

** cooked **
a mixture of genuine and fake material provided via a double agent to one's adversary.

** cousins **
slang for the CIA

** cover **
persona, profession, purpose, activity, fictitious image maintained by an undercover operative.

** cover action agent **
a spy who works to reorient an entire nation's politics in favor of his country

** CS Gas **
a form of tear gas, full name ortho-chlorobenzalmalanonitrile, used by cops, SWAT teams, and the military.

** courier **
delivers

** cut-out **
a mechanism or person used to allow agents to pass material or messages securely; also an agent who functions as an intermediary between a spymaster and other subagents. (aka 'letterbox')

** dangle **
a spy who poses as a walk-in to penetrate the other side.

** dead drop **
a physical location where communications, documents, or equipment is covertly placed for another person to collect without direct contact between the parties

** decoy **
distracts adversary's attention (aka diversion)

** deep-cover agent **
permanent cover

** defector **
a person who has renounced his/her country of citizenship

** dirty tricks **
covert sabotage carried out by a security service or intelligence agency, ranging from pranks to assassination.

** dope book **
a notebook kept with a sniper rifle for the purposes of recording the atmospheric conditions, range, lighting, and resulting hit or miss of every shot fired.

** double-agent **
simultaneously serves two adversaries

** ears only **
material too secret to commit to writing

** element **
a five-man SWAT team. Consisting of a team leader, scout, rear guard, and two assaulters. The rear guard provides cover for the scout and is usually armed with a 12-guage shotgun. The assaulters usually carry Heckler & Koch 9mm MP-5 submachine guns

** elliptical conversation **
says one thing but means another

** executive action **
assassination

** expats **
expatriates who have taken up residence in another country and are helping to define its culture

** eyes only **
documents that may be red but not discussed

** floater **
a person used one-time, occasionally, or even unknowingly for an intelligence operation

** floating box **
a method of surveillance where a team of operators establishes a containment box around the target wherever he/she goes

** follow **
a surveillance team is executing a follow when they are shadowing a moving target

** footfall detector **
vibration sensor designed to detect walking humans

** forensics **
The use of science and technology to investigate and establish facts in criminal or civil courts of law.

** friend **
slang for an agent, informant, or mole providing information to a handler

** front **
a legitimate-appearing business created by an intelligence agency or security service to provide cover for spies and their operations

** funkspiel **
impersonation during electronic communications

** funny paper **
slang for the counterfeiting and forged documents section of an intelligence agency or security service.

** ghoul **
agent who searches obituaries and graveyards for names of the deceased for use by agents

** Gustav Weber **
Hitler's double, used by the Fuhrer's bodyguards to stymie the Allies as to his whereabouts. Shot in the forehead immediately after Hitler's death.

** handler **
a case officer who is responsible for handling agents in operations

** hard man **
an experienced operative who can survive in a hostile environment and who has killed

** hard target **
a surveillance target who is actively maintaining secrecy and may not reveal that he/she has detected the surveillance team

** honey trap **
slang for use of men or women in sexual situations to intimidate or snare others. This use of sex to trap or blackmail an individual is standard practice in intelligence operations

** hooligan tool **
a specialized tool much like a crowbar, developed by fire departments for prying open doors and windows

** hostile **
term used to describe the organizations and activities of the opposition services

** hostile recruitment **
recruitment by threat or force of an uncooperative informant, mole, or agent-in-place

** humint **
intelligence activities involving people rather than electronic eavesdropping or communications interception

** hunting pack **
slang for surveillance team

** illegal **
an intelligence officer operating in a foreign nation without the protection of diplomatic immunity

** infiltration **
the secret movement of an operative into a target area with the intent that his or her presence will go undetected

** informant **
a legitimate member of a target group providing intelligence to the surveillance team

** info war **
Information Warfare, modern propaganda through (mis)information

** innocent postcard **
a postcard with an innocuous message sent to an address in a neutral country to verify the continued security of an undercover operative

** intelligent officer **
a trained member of an intelligence agency, an employee on salary

** Interpol **
international police body that coordinates the intelligence gathering and investigative activities of member police forces

** Joe **
a deep-cover agent

** legend **
the faked biography of a deep-cover agent

** naked **
the faked biography of a deep-cover agent

** narcotherapy hypnosis **
CIA interrogators use hypnosis to force regression in the prisoner to make him believe he is talking to his spouse. The prisoner is first prepared by pharmaceuticals according to the following protocol. 1. An injection of 10 mg sodium pentothal to render unconscious. 2. Wait 20 minutes. 3. An injection of 10 mg benzodrine to revive the prisoner to a state partway between waking and sleep. 4. Repeat step 3 if required. At the end of the interrogation a hypnotically induced amnesia is invoked.

** neutron bombardment **
used by security services like Britain's MI.5, America's FBI, Germany's BfV, and France's DST to detect microdots and invisible writing in postal mail. Originally developed by the Atomic Weapons Research Establishment in Britain for use by MI.5.

** nightcrawler **
a talent spotter who prowls bars and nightclubs looking for government employees, military personnel, etc. who can be compromised using booze, drugs, or sex

** nugget **
British term for the bait (money, political asylum, sex, or career opportunity) used to offer a potential defector

** OP **
observation post

** paroles **
passwords to identify agents to each other

** pattern **
the behavior and daily routine of an operative that makes his or her identity unique

** pavement artist **
outdoor surveillance specialist operating on foot

** picket surveilance **
focuses on times and places when target is likely engaged in activities of interest to the surveillance team

** pickup **
when the target of a surveillance operation is first spotted inside the stakeout box

** pinhole camera **
video camera with fiber-optic lens attachment

** plaintext **
the original message before encryption

** playback **
to provide false information to the enemy while gaining accurate information from him or her

** pocket litter **
items in a spy's pocket (receipts, coins, theater tickets, etc.) that add authenticity to his or her identity

** posse comitatas **
a Latin phrase that loosely means power of the people

** product **
finished intelligence that has been evaluated by an intelligence agency and is ready for distribution to consumers

** provocateur **
an operative sent to incite a target group to action for purposes of entrapping or embarrassing them

** psychic combat **
a condition of active psychological warfare operations between two covert adversaries

** QRF **
quick reaction force

** rolled up **
when an operation goes bad and an agent is arrested

** SA **
FBI special agent

** safehouse **
a dwelling place or hideout unknown to the adversary

** sanitize **
to delete specific material or revise a report or other document to prevent the identification of intelligence sources and collection methods

** set up **
to begin to conduct surveillance on a target

** sit rep **
situation report

** splashed **
describes a bodyguard whose client has been assassinated

** spook **
a spy

** target **
the victim of surveillance, the subject

** techint **
technical intelligence; analysis of fielded equipment for training, research, and the development of new weapons and equipment for eventual intelligence use

** terminated **
murdered

** The Take **
information gathered by espionage

** thermal imager **
a heat-sensitive surveillance video camera and display

** trigger **
a surveillance operative who is watching the target's vacant vehicle, home, garage, office, restaurant etc. and who alerts the rest of the surveillance team when the target is spotted

** U-2 **
the world's most famous spy plane, developed by the U.S. specifically for intelligence collection in the thin atmosphere 55,000 feet above the Soviet Union; it is still in use today

** UNSUB **
an unknown subject in a surveillance operation

** VCP **
Vehicle Control Point

** Vickie Weaver **
American citizen probably murdered by the FBI. A landmark case for many concerned Americans.

** walk-in **
an unsolicited volunteer

** watch-list **
people targeted for routine surveillance

** wet job/affair **
results in death of target or major bloodshed.

** wheel artist **
an outdoor surveillance specialist operating in a vehicle

** wilderness of mirrors **
a spy operation so complicated that it is no longer possible to separate truth and untruth

** window dressing **
Ancillary materials that are included in a cover story or deception operation to help convince the opposition or other casual observers that what they are observing is genuine

[]

[]

[]