Cia Tradecraft Manual

This manual takes the reader through the logical process of association analysis. Espionage Tradecraft Classification: TRAINING SECRET (JC-2) INTELLIGENCE FUNDAMENTAL-An excellent primer on intelligence concepts. This manual is part of the induction package for all new Espionage Tradecraft operators. Brief, but succinct and to the point. Real-world Bonds working for the U.S. Central Intelligence Agency, and its precursor the Office of Strategic Services, could turn to the Office of Research and Development for similar tradecraft. Magician John Mulholland Reveals His Tradecraft in ‘CIA Manual of Deception’ May 7, 2021 Russ Winter Articles by Russ Winter, Hidden History, US News, Winter Watch Articles 7 J ohn Mulholland (1898-1970) was a highly successful performing magician who entertained “New York City society circles.”. Press, 2010, 095353782X, 822,. This training manual has been compiled as the ultimate guide and reference book for the surveillance operative - both experienced and novice alike. DOWNLOAD HERE Covert Rural Surveillance The Definitive Tradecraft Manual for Rural Surveillance Operators, Ben Wall, Aug 1, 2012,. Development Tradecraft DOs and DON'Ts. (S//NF) DO NOT leave data in a binary file that demonstrates CIA, USG, or its witting partner companies involvement in the creation or use of the binary/tool. (S//NF) Attribution of binary/tool/etc by an adversary can cause irreversible impacts to past.

In hostile countries, CIA case officers use the “Brush Pass” to make physical exchanges with couriers or with the spies they recruit. They simply 'brush' past one another, typically in a public place and preferably a crowd, where random people interfere with any visual surveillance. But, if they feel foreign spies are around they will choose alleyways or narrow corridors. They do not stop walking; at most, they may appear to bump into one another.

They may execute the exchange with both carrying identical objects, such as a newspaper, briefcase, or magazine with the information being exchanged in one of them. As the two people separate, they still appear to be holding the same object in the same hand.

Cia tradecraft manualManualCia tradecraft manuals

The seasoned spymasters learn how to pass sensitive data “baton style” like in a relay race. It is commonly done with small objects such as a photographic film cartridge. In this more dangerous method, the transfer is from hand to hand, or from hand into a pocket. While this technique obviously takes better manual dexterity and is more prone to error, it has the countersurveillance advantage that the operatives are not carrying anything after the transfer and can blend into a crowd even more easily.

A variation of the brush pass is the live letter drop, in which one agent follows a predefined route, on foot, with a prepared report hidden in a pocket. En route, a second agent unknown to the first agent picks his/her pocket and then passes the report on unread, either to a cut-out or to an intelligence officer. This technique presents opportunities both for plausible deniability and for penetration by hostile agents.

Here's a piece about two agents executing a Brush Pass from the Penumbra Database spy thriller:

Phillips lay on a lounge chair by the pool, sipping a Bahama Mama and admiring the tall palms. Across the tiled patio was a makeshift bamboo beach bar with a thick palmetto-thatched roof. A stairway rose behind it to an unoccupied upper level, but it was veiled by a terra cotta clay border wall.

Cia Tradecraft Manuals

It had to be done flawlessly. Corey walked past her and began ascending the brown-tiled stairway. His coppery-colored duffel bag masqueraded well with the baked-earth surroundings. Steve Sweeney, ironically codenamed ‘Brush Pass’, appeared through an opening at the top of the stairwell and descended, carrying an identical bag. Neither man paused nor stared at one another; they merely glanced curiously at the pool below them.

If Alexia took a sip from her drink, the brief encounter would be terminated. She did not. Sweeney’s duffel bag hung from his shoulder; Corey’s carried his low at knee level, hidden by the wall.

Without breaking stride, Sweeney lowered his bag to his side just before Corey passed. Neither man stopped, paused, or bent over. Alexia accidentally knocked three tin ash trays off the table next to her onto the tile patio. It made a loud clamor. She apologized to those sunbathing around her. Corey and Sweeney walked their separate ways. No one noticed the exchange.

TradecraftCia tradecraft manuals

Cia Tradecraft Manual

Here's a neat video on CNN on how Brush Passes are conducted:

Cia Tradecraft Manual Pdf

Robert Morton is a member of the Association Of Former Intelligence Officers (AFIO) and enjoys writing about the U.S. Intelligence Community.

Cia Tradecraft Manual

  • AGENT ACQUSITION AND EMPLOYMENT-This manual details locating, approaching, securing and deploying an intelligence agent. Contrary to popular belief, an agent is not a member of an intelligence service, but rather a paid employee/informant with access to organizations, information or personnel of intelligence interest.
    Espionage Tradecraft Classification: TRAINING SECRET (JC-1)
  • BASIC ASSOCIATION ANALYSISFOR INTELLIGENCE OFFICERS-Intelligence analysts use various tools to identify and illustrate apparent links between organizations and persons of interest. All intelligence operators are required to include association analysis charts and graphs in their reports. This manual takes the reader through the logical process of association analysis.
    Espionage Tradecraft Classification: TRAINING SECRET (JC-2)
  • INTELLIGENCE FUNDAMENTAL-An excellent primer on intelligence concepts. This manual is part of the induction package for all new Espionage Tradecraft operators. Brief, but succinct and to the point.
    Espionage Tradecraft Classification: RESTRICTED (JC-9)
  • COVERT METHODS OF ENTRY REFERENCE – INTRODUCTION TO KEY CASTING-This manual takes the reader through the process of duplicating a stolen key for later exploitation of target premises. The manual instructs the reader how to use standard equipment used by intelligence agencies worldwide to make a hasty duplicate of any key.
    Espionage Tradecraft Classification: UNCLASS (JC-3)
  • COVERT METHODS OF ENTRY REFERENCE – SECURITY EQUIPMENT GUIDE-Details the various types of locks, safes and access control systems used in government and industry today.
    Espionage Tradecraft Classification: UNCLASS (JC-13)
  • COUNTER/ANTISURVEILLANCE PROTOCOLS-Written from the perspective of the “Rabbit”, this manual shows bulletproof methods of dealing with hostile surveillance. This may be the definitive text on the subject.
    Espionage Tradecraft Classification: TRAINING SECRET (JC-5)
  • COVERT METHODS OF ENTRY REFERENCE – PERIMETER SECURITY SENSOR TECHNOLOGY-This manual details types of alarm systems used in government, business and other areas. The manual covers characteristics, holistic system approaches, false alarm rates and defeat principles. This manual was developed as a training aid for government intelligence personnel conducting CME (Covert Method of Entry) 'Burglary and Buggery' operations.
    Espionage Tradecraft Classification: TRAINING PROTECTED (JC-4)