| |
| |
Publisher's Note | |
| |
| |
Foreword | |
| |
| |
| |
Introduction | |
| |
| |
| |
What Is Couterintelligence? | |
| |
| |
| |
Who Does into Counterintelligence, and Why? | |
| |
| |
What Is Peculiar about CI Officers? | |
| |
| |
CI Traits: Do You Have Them? | |
| |
| |
| |
Conflicting Goals: Law Enforcement versus Mainpulation | |
| |
| |
Cops with a CI Job | |
| |
| |
Spymasters with a CI job | |
| |
| |
Cops and Spymasters, Mingle and Merge! | |
| |
| |
| |
The Support Apparatus | |
| |
| |
The Roof and the Walls | |
| |
| |
Surveillance Teams | |
| |
| |
The Bug and Tap Shop | |
| |
| |
Safe Houses | |
| |
| |
The Forgery Shop | |
| |
| |
Vehicles | |
| |
| |
Photography | |
| |
| |
Drops: Live, Dead, Phone | |
| |
| |
Flaps and Seals, Microdot, Secret Ink | |
| |
| |
Weapons | |
| |
| |
Looks, Keys and Burglary | |
| |
| |
Disguises | |
| |
| |
| |
Interrogation: How It Really Works | |
| |
| |
The Myth of Torture | |
| |
| |
The Compleat Interrogator | |
| |
| |
Pressure | |
| |
| |
The Schmidt Story | |
| |
| |
When the Tricks Don't Work | |
| |
| |
The Breaking Point | |
| |
| |
| |
How to Manage the Polygraph | |
| |
| |
What the Polygraph Is | |
| |
| |
How the Polygraph Works | |
| |
| |
Why Do You React to the Polygraph? | |
| |
| |
What Your Reactions Mean | |
| |
| |
Known Lies and Surprise Question | |
| |
| |
When the Polygraph Works as a Lie Detector | |
| |
| |
When the Polygraph Does Not work | |
| |
| |
Can you Beat the Polygraph? | |
| |
| |
What the Polygraph Is Used For | |
| |
| |
How the Polygraph Is Misused | |
| |
| |
| |
How to Manage Physical Surveillance | |
| |
| |
Local Conditions | |
| |
| |
Cover | |
| |
| |
Compartmentation | |
| |
| |
Communications | |
| |
| |
Vehicles | |
| |
| |
Cameras and Audio Gear | |
| |
| |
Weapons | |
| |
| |
The Half-Life of a Surveillance Team | |
| |
| |
| |
How to Manage Technical Surveillance | |
| |
| |
Remember the Support Function | |
| |
| |
Know Your Technicians | |
| |
| |
Telephone Taps | |
| |
| |
Hidden Microphones | |
| |
| |
Photography through the Keyhole | |
| |
| |
Mail Intercept | |
| |
| |
Collatin the Information | |
| |
| |
| |
Double Agents: What They Are Good For | |
| |
| |
Contact with the Enemy | |
| |
| |
he Playback Double: The Case of Janos Szmolka | |
| |
| |
Dangles-Controlled and Freelance | |
| |
| |
Levels of Contact with the Enemy | |
| |
| |
Allocation of resources | |
| |
| |
| |
Double Agents: How to Get and Maintain a stable | |
| |
| |
Assessing Your Opponents | |
| |
| |
Collating Leads | |
| |
| |
Playbacks | |
| |
| |
| |
Double Agents: Feeding and Care | |
| |
| |
Emotional Dependence | |
| |
| |
Physical Dependence | |
| |
| |
Testing | |
| |
| |
Termination | |
| |
| |
Double Agents: Passing, Information to the Enemy | |
| |
| |
The Doctrine of Layers | |
| |
| |
Passing the Enemy's Tests | |
| |
| |
Balancing Cost against Gain | |
| |
| |
The Bureaucratic Problem | |
| |
| |
The Build-Up Library | |
| |
| |
The Use of Collateral | |
| |
| |
| |
Moles in the Enemy's Garden: Your Best Weapon | |
| |
| |
Strategic Planning | |
| |
| |
How to Get Penetrations | |
| |
| |
Arranging the Furniture | |
| |
| |
Research and Targeting | |
| |
| |
Planting the Seed | |
| |
| |
Motive: Is Ideology Dead? | |
| |
| |
Who Is in Charge? | |
| |
| |
Weaknesses | |
| |
| |
Michal Goleniewski | |
| |
| |
Training or Indoctrination? | |
| |
| |
Evacuation | |
| |
| |
| |
Defectors: Your Second-Best Weapon | |
| |
| |
Inducement | |
| |
| |
Echelons of Handling | |
| |
| |
Be Prepared | |
| |
| |
Resettlement | |
| |
| |
| |
Using "Friendly" Services, Foreign and Domestic | |
| |
| |
The Reasons for Liaison | |
| |
| |
How Liaison Works in Practice | |
| |
| |
Cooperation versus Competition | |
| |
| |
Liaison and Penetration | |
| |
| |
| |
How to Manage Files | |
| |
| |
Chronological Files | |
| |
| |
Indexing by Name | |
| |
| |
Case Files | |
| |
| |
Dossiers and P-Files | |
| |
| |
Dossiers Numbers | |
| |
| |
Dossiers and Pivacy | |
| |
| |
| |
The Collation of Counterintelligence | |
| |
| |
What Is Collation? | |
| |
| |
Categories for Collation | |
| |
| |
Using Computers | |
| |
| |
| |
The Big Game: Deception | |
| |
| |
The Tools of Deception | |
| |
| |
The Practical Limits | |
| |
| |
The Rule of Unwitting Tools | |
| |
| |
The Secret Body Needs a Bodyguard of Lies | |
| |
| |
About the Author | |
| |
| |
Index | |