Until now. Intelligence in the field of counter-terrorism is a different and, in many aspects, arduous and dangerous task. The lives of many agents are in continuous danger. The rules of the game are cruel--as moral and ethical considerations are negated by the bullet. There is no honor between rivals on the streets of Beirut or Baghdad--only the most quickwitted survive.
A modern spy must blend in, live among the enemy, speak the language, befriend, and exploit the enemy at very opportunity. They are required to be streetwise, rough, tough, and ruthless. Furthermore, at the very same time many of the records of the period are beginning to become accessible for the first time. At the forefront of this unique conflict, that divided the world into two opposing camps for over four decades, were the security services and the agents of these secretive organizations.
The Cold War Pocket Manual presents a meticulously compiled selection of recently unclassified documents, field-manuals, briefing directives and intelligence primers that uncover the training and techniques required to function as a spy in the darkest periods of modern history. Score: 3. How does one embed a listening device in a cat? What is an invisible photo used for? These amazingly inventive devices were created and employed against a backdrop of geopolitical tensions—including the Cold War, the Cuban Missile Crisis, and continuing terrorist threats.
Written by Robert Wallace, the former director of the Office of Technical Service, and internationally renowned intelligence historian Keith Melton, Spycraft is both a fantastic encyclopedia of gadgetry and a revealing primer on the fundamentals of high-tech espionage. An amazing historical artifact, this eye-opening handbook offered step-by-step instructions to covert intelligence operatives in all manner of sleight of hand and trickery designed to thwart the Communist enemy.
Score: 5. Born in the post-civil war era of Japan, Fujibayashi collected and combined information from the ninja clans of Iga - regarded to be the homeland of the ninja - and compiled it into an authoritative book. It is widely considered to be the 'bible' of 'ninjutsu', the arts of the ninja.
Nobody addressed data protection as a special issue that time. Oct 1, You can find out more on the resources page at www. Even 70 years after the war this obsolete cipher machine continues to fascinate and enchant fans of spy-craft, codes and ciphers and steampunk Again for strong and interested students a good read is Christopher Andrew and Vasili Mitrokhin's The.
Keith Melton's Spy Craft: The For example, Russia has rattled Europe with the appearance of preparations for a military assault. In June ,. Russia carried out a simulated attack on Denmark; and in and , it penetrated the maritime and air.
Neither the. When retrieved by the authors, the manuals' text was A regular spiral coils from the corner to the center of the grid; a crab spiral reverses the route. Except for the crab spirals, which were added later, these routes were introduced in by Colonel Parker Hitt in his Manual for the.
Solution of Military Ciphers, a best-seller among soldiers All Rights Reserved. Designed by Templatic. Home Copyright Privacy Contact.
Spycraft Manual. Sponsored High Speed Downloads. Laramee Intel. Untitled Sword of the Stars Overview Adjudicative Desk Reference Jan 18, Statecraft Manual. A beginner's guide to codebreaking 1. Russian Hybrid Warfare: How to Confront a New Challenge to the traditional spycraft; active measures are a staple of the playbooks of all major intelligence agencies. Transposition ciphers they can be simple or boustophedonic.
Popular Documents free mastercam lathe guide ask jackie food storage snowy tower parzival and the wet black branch of language ford truck shop manual gmc sierra hd repair manual the healing art of cupping recent advances in constraints selected papers author r krzysztof may honda atv rubicon owners manual super wave manual developmentally delayed children child psychology book 7 top secrets auto insurance companies dont want you to know geropsychiatric nursing 2e chimpanzee and red colobus the ecology of predator and prey student solutions manual chemistry silberberg fifth edition craftsman manual the imagineering way ideas to ignite your creativity dornier landing gear manual general international jointer manual world history student activity manual answer key 4th edition mechanics of materials craig 3rd solutions manual.
Recent Documents m roadster owners manual pdf honda shadow manual peer pressure vs true friends surviving primary school automated deduction cade 15 15th international conference on automated deduction lindau germany july 5 10 proceedings lecture notes in computer s bmw i american spec repair manual isuzu jackaroo diesel parts manual kawasaki vn vulcan service repair manual deep water sailors shallow water soldiers consider the lilies the near death experience of a reluctant prophet the aging individual physical and psychological perspectives opel vectra b user manual polaris sportsman x2 efi workshop repair manual palfinger maintenance manual on the decriminalization of sex work in china hiv and patients rights fundamentals of cost accounting lanen 3rd edition solutions manual download manuale fiat qubo quincy air compressor manual brpt scoring manual ducati monster ie spare parts list catalog manual When the area is new to the operator, he will carry a spot codebook in his vehicle.
However, should this codebook fall into enemy hands, it will present a short-term security risk This will necessitate all the spot codes being changed and with everyone having to learn the new codes. The spot code system can also be used to refer to actions rather than a location. This helps throw the enemy off balance should they be watching or listenlng to the operation.
For example: ,,Siena papa four towards blaek 6. Despite having been around for centuries, the aft of invisible writing is still widely used by many intelligence agencies today.
One of the problems with traditional invisible ink is that the author cannot see what they are writing. As a result, the message has to be short and very precisely written.
Even when they were writing with an ultraviolet pen, the authors could not see what they were writing and the message could only be seen when the ink was highlighted with a special ultraviolet light. Then, some years ago, the British intelligence service discovered, purely by accident, that a Pentel Rollerball makes a brilliant tool for invisible.
Any clear not visible to the eye when dry , carbon-based liquid can be used to make invisible inh milk and lemon iuice being the most commonIt is best to use normal writing or computel paper, as glossy or absorbent paper distorts the writing. Using an old-fashioned metal nib pen, although a. The wetness provides some idea of he has written, but once the liquid is dry then the writing will disappear.
The best way to read the message is by using a domestic iron. The spy will run the hot iron over the paper. Because the liquid is carbon-based, it. Agens have used various forms of heat, such as gently moving the paper over a candle flame, in order to reveal the hidden message. The rollerball, commercially available in most parts of the world, writes normally on a piece of paper.
The writing is then pressed against the piece of paper that will carry the secret message. The original ink dries almost immediately, so to the eye the message paper look blank However, when it is swabbed with a developing fluid, the message miraculously appears. The transfened message will only become visible when it is developed.
The message may be hidden in a DLB or passed as a secret message. By a totally different signal, the handler will also indicate the list number, in this case number 4.
P ain. The handler will construct his message by taking the code letter below the normal alphabet letter. For example: I will meet you in the park This will be. The llst may have been memorized to increase security further. The agent then writes out the alphabet, whh the code word and the remaining alphabet written underneath.
Using the encoded letters he will be able to decode. Symbolic writing can be complicated and can take years to decipher, as is the case with Egyptian hieroglyphics. A mote downto-earth symbolic code is "Pigpen". This uses a grid system designed in such a way as to allow two letters of the alphabet into each segment of the grid. The shape of the grid containing the letter forms the code.
Then the alphabet is filled in; first in a logical order, i. AB in the top left-hand cornel following which they can be placed at random. Although the best way of transcribing a message is to use the alphabet, the alphabetic and figure form can transcribe into symbols or sound blocks. While the best example of the latter is Morse code, many intelligence agencies have experimented with microwave and other sound devices. Morse Code is just a simple substitution code based on dashes and dots.
The dash is normally three times as long as the dot. The best way to. Morse code can bc ttnt ln many brms, including radio, light flashes or acoustic soundr :uch.
The encoded message will look something like this. Basically it uses two wheels, one. He can rctate the inner disk until the A is now aligned with p. Using the outer disk as his plain toc he writes down the aligned letter on the To encode. The inner and outer circles need to be carefully aligned to read off. These wheels can be made of any material that can be written on. Around the outer edge of each wheel is the alphabet and the numbers 0 through to 9.
The clock-face method is most commonly used to ensure that the writing is evenly spaced, so that. STEP TWO It is a simple matter of passing the code to the handler or agent together with the original start place on the outer dis in this instance p. The matter can be. The idea is that the smaller disk can rotate inside the larger. To decode the messagg he first places the inner disk at P and reads off the first seven letters.
The inner disk will then be moved to V for the next four lettes and to 5 for the remaining six Decoded message should be kep in block. Few people, other than government intelligence agencies, had any need for cryptography prior. That has all changed today. Businesses and individuals all generate information which, for one reason or tnolher. The difference in normal human forms of cryptology and those developed for computers is simply one of securiry, i. Symmetric-key encryption is a secret code based on one individual computer.
One such system uses the well-known steganography technology that is also used for digitally watermarking pictures. Bitmap graphics consist of pixels that can be modified to store. To the human eye these changes cannot be seen as only insignificant information is removed and this is done across the whole spectrum of the digital image.
One of the best shareware programmes for hiding text inside pictures is called StegenlCE and a free download can be found at the following address:. The secret code is the key to unlocking the information. Example: ln a simple form, a text-encoded message is sent to anothel computer telling the user that the secret code is 3. The encrypted process automatically changes the alphabetical information letters to 3 places down i.
A becomes D and B becomes E etc. This is a very simple explanation of how computer encryption works, but it should be stated that today's encryption systems are highly advanced. There are many forms of surveillance but, for the most part, people believe that they can go about their everyday lives expecting a certain amount of privacy - this is not true.
Every single person in Europe is under some form of surveillance every day. They will not deliberately be observed or overheard, but records of their movements and actions will be recorded.
Credit card transactions can be traced. Your emails can be read, as can every stroke of the keyboard. And then there is Echelon Anything deemed to be of interest is then sent to the relevant intelligence agency for analysis.
Using sophisticated satellite systems, earth stations, radar and communication network, as well as an array of ships. Now that need is no longer pressing it is being used instead to monitor terrorist communications, as well as the activities of organized crime groups, alongside more traditional espionage methods.
Esablishment, an ofthoot of the National Security Agenry and is based in Ottawa. You have to remember that the locations of smaller stations are spread across the globe in strategic positions. Other organized crime gangs and terrorists, such.
Although details about the system are still shrouded in secrecy, some facts are known. Each country is responsible for monitoring a certain part of the Earth. Britain monitors Europe, Africa and Russia west of the Urals. Australia is responsible for lndochina, lndonesia and southern China and.
Although such usage of a surveillance system can only be a positive. All the members of the alliance use satellites, ground receiving stations and electronic intercepts that enable them to plck up all communications traffic sent by satellite, cellular, microwave and llbre-optlc means.
The communications captured by. Debates have even been raised in non-participating countries and within the EU. Nevertheless, the. For example, if the target is a person then he will most probably move around, either on foot. Note that following people and surveillance is undertaken by spies and it is usually illegal. Civilians and members of the public should not do it.
The various methods of surveillance consist of one or a combination of the following:. Surveillance can be carried out by one of the following methods. SU RUEI Surveillance may be canied out in order to obtain evidence of a crime or to identifu persons who have been indicated in subversive actions. Surveillance methods help to establish a person's location and may well lead to an association with other criminals.
The location of stolen or contraband goods can be exposed, leading to an admissible case in court. However, the main way that surveillance is used is to gather military intelligence. Governments have long since learned that information gathered.
This is derived from monitoring the sounds made by enemy surface vessels. These sounds can be analyzed to plovide a unique signature for each vessel cunently at sea. Knowing the location of enemy nuclear submarines or battle fleets provides advance warning of any attack One major problem with military intelligence is the amount of information.
Having information is one thing interpreting its full and true value is quite another. The information that an assault was about to take place was available fiom several sources: the interpretation and immediate action lagged too far behind.
Echelon should have detected some traffic. Whatever the reason, it proves that electronic suveillance, no matter how sophisticated, is only effective if it has.
Their personality appears nondescript. They have no outstanding physical features and their dress is innocuous. They are deliberately trained to be Mr and Mrs Nobody, so insignificant that no one ever gives them a second glance. Yet this is only an outward appearance, as the surveillance operator.
They must be adaptable, as many targets can act erratically. Surveillance operators must have confidence not only in their own abilities but also in those of their team members. They must have a good memory, good hearing and excellent eyesight. Most of all, though, surveillance operators must blend into the background and become almost invisible. The target.
Knowing these factors helps the surveillance team decide on the number of people required and what approach they should take. Likewise, where the target is a static location, such as a building it is important for the surueillance operators to evaluate. The target may even approach the surveillance operator and deliberately confront him as to why they are being followed. The surveillance operator must also learn advanced driving skills and be able to operate any number of different vehicles.
Most surveillance operators in the United Kingdom undertake a high-speed driving course whh the police. This involves handling a vehicle at speed. They must also have a good knowledge of the area in which they are working. This is pafticularly helpful when a target has become temponlly "unsighted". Above all, they must possess and develop a "sixth sense" comes with good training and experience.
Some surueillance operators specialize in technical surueillance. They must learn how to use and operate a whole myriad of technical equipment, such as cameras and listening devices. To do There may be times when a spy or agent is required to become a master. He may suspect that he is undet surveillance and wish to throw his pursuers off in order to make an important meeting for example.
Whatever the reason, there are two basic methods: the immediate quick change and the deliberate disguise. A quick change requires some thorough and prior preparation. For instance, it is possible to change his stature, dress or appearance or a combination of all three. Stature can be addressed by stooping limping, effecting a height change or body bulk size. Changing his dress requires conversion or having an alternative item of clothing with him.
Likewise his appearance can be changed in a few minutes if he is prepared. The basic rule is to staft off as Mr Average and change into Mr Nondescript.
The spy will remember that it is easier to dress down than it is to dress. It is important for the surveillance operator to understand who or what the target is. Even if the target is a common criminal, he may, due to the nature of his activities, become suspicious of being followed. All these tricks can be done on the move, but they are best performed while temporarily out of sight, such as in a crowded pub toilet.
Changing his ethnic appearance is a good ploy to use at night or duilng. The spy will make use of the following tricks: Placing a stone in his sock to create a realistic limp. Wearing a cap. When he removes it, he looks shorter. Putting cotton wool in his mouth to swell out his cheeks. Putting on or removing glasses.
Burning a cork and blackening his face where he normally shaves. Using soot, burnt paper, talcum powder or cigarette ash to change his hair colour. Carrying a dark brown shoeshine sponge, so that he can. Carrying items in his pockets, such as a carry bag fold-up walking stick cigarettes, baseball cap or a plastic raincoatA deliberate disguise is a more planned affair, but the same basic tactics apply.
The spy will never be inclined to dress to bring aftention upon themselves. There are several reasons for doing this; firstly it helps identifu who is doing what and where a particular surueillance vehicle is in relation. Secondly, it helps to minimize the amount of voice traffic over the radio. One such code, popular with surueillance teams, is the phonetic alphabet. It can be used to identiff targets, vehicles, operators and places. This terminolory also helps the surueillance team keep the target vehicle whhin sight and thus avoid a lost contact.
While they vary fiom country to country, here arc a few examples of vehicle surueillance teminology with an explanation as to what each means. Response is either'Yes, yes", "No, no" or "Baclcup can at next iunction". The second vehicle in the convoy. This will normally be followed by an. The pick-up vehicle will also give a location.
The situation remains unaltered. The target vehicle is continuing straight ahead, as at a crossroads. Motorcycliss should respond without specifrTing. The target vehicle is once more under surueillance. The vehicle or officer that has primary. The target vehicle has turned right. The target is approaching a traffic roundabout where he has a multiple choice of exits. The target vehicle is commencing a second or subsequent circuit of the roundabout.
Assuming that there is a basic three-vehicle surveillance team, Sierta One, Two and Three, with Siena One having eyeball and with the. Shadow car. The vehicle being used to support. Cancellation of whole operation. Target vehicle has stopped in -. Tail-end ChailieThe vehicle at the rear of the convoy. The target vehicle has taken the first,. The person who is the target of the observation. A temporary visual loss of the target. That the voice procedure becomes clipped as the unit progresses into the.
Familiarity and good co-operation between surveillance operators all help to minimize the airtime, but will still provide everyone with a verbal picture of what is happening. A total loss will normally be followed by a pre-planned search procedure. Request from eyeball vehicle to confirm there is a back-up vehicle ready to take over. However, as with most things military, the planning phase must first take place where a number of procedures are set out.
One of the first oblectives is to gather detailed information on the target's known place of residence or place of employ, depending on the type of operation to be undeftaken. This information comes from a wide range of sources and is normally the start of the suspect target's personal file. Assume that a. That unknown would have been followed back to a house. Simple enquires will reveal the person's name and address.
This is the stalt point fiom which some of the following material will be gathered. Aerial photographs. A detailed planning layout of the building. Any police or criminal records. Any driving convictions. Place of employment. Target's vehicle make and registration. Today, aerial photographs can be downloaded over the lnternet. These provide enough detail to be able to plan a coveft operation against the target's dwelling.
Planning applications showing detailed internal rooms. Likewise, intelligence officers can easily obtain police records and convictions. However, one of. Surveillance units carry out a target recce in order to collect as much information about the target's house as possible. A route to and from the target must be assessed, as well as any time limitations in which to carry out the task and the intelligence officers need.
This ensures that the officers do not run into the target or enter the premises while the target is at home. Pictures will be taken of the building indicating front, back and side. The building material will also be noted, as will any entry or exit points. The position of external seruices, telephone and electricity will also be filmed and recorded, as will be position of the rubbish bin.
Ail this initial. Finally, several preliminary sites will be noted in order to set up a static 0p that can obserue the target building around the clock.
The idea is to collect garbage discreetly and to examine it at leisure, recording all of the items. The main advantage of garbology is that it is non-obtrusive and it almost always goes unnoticed. Note: Spies and secret agents do it but it is illegal in some countrieq and non-spies should never undertake garbology. The spy watches for and makes a note of the garbage trucKs date and time of anival at the target premises.
He checks to see if the garbage container is for individual use or for many houses. The hours of darkness are best, but if a pick-up has to be made during daylight hours, he will dress accordingly, in the manner of a down-and-out, carrying a plastic bag for example. A spy will always wear a pair of thick rubber gloves when doing this. He will lay out the garbage contents on a large plastic sheet and discard.
He will always keep a written note as to the type of food being consumed, i. For example, he may: Count the number of cigarettes butts and identiff the brand. Count the number of alcohol bottles or cans and identifrT. The contents ol this lefuse sack indicate that someone in the home is a heavy smoker' likes beer and has a cat. The documents show details ot credit cards, togeihcl with a cgpy.
Photograph any items that may be of interest, such as discarded clothing magazines, computer disks or empty non-food packaging. Carry out an in-depth examination of all conespondence and paper products.
Write down his observations and conclusions for each separate garbage pick-up. He will carry out at least four separate pick-ups within the period of a month in order to make a minimum assessment. Report any important discoveries that he. The outcome from a good garbology probe over several week can be very revealing.
The information gathered will be properly documented with. Here are some of the things the spy might expect to find out about the target:. His personal financet including the name of his bank and Whr the.
His credit card usage. His signature. The telephone numbers he may dial, especially frequently-. The list of clear and precise information that can be obtained through garbology is endless, but it needs to be done in a methodical way and there are some important things to consider. One factor a spy must take lnto account is the number of people being catered for at the target,s premises. One way for a spy. They are set up to obserue a fixed location or object for a predetermined amount of time.
Their objective is to obtain information through the use of human visual and. Setting up an urban surveillance is quite dfficult and depends largely on the selection of a safe location in which to install the 0p. This will include both the entry and exit points of the building something that is crucial to establish both the movements of the target and any visitors that he may have. Field agens are experts in setting up Ops and The clothes line may indicate who is living in the house.
The secret of a good rural 0p is to make sure that it blends in with the natural surroundings. When he is in a position to observe a target's housg the spy will look at the clothes line. Almost all households, including flats, hang out some washing during the week sometimes on the same day every week Observing the clothes line over a period of a month can provide the.
A site musJ not be vulnerable to discovery and must afford a good view of the target position. A concealed entrance and exit are also needed. High ground, although good for visibility, is an obvious spot and one that any suspicious target will search. He will only put discarded food in the bin and take bonles to the bottle bank. The structure can be made out of any material - waterproof sheeting ponchos, camouflage nets and natural or locally available materials are all useful, as.
He will never throw away any. OPs tend to be built in a rectangular shape, where the observers lie in pairs. The latter property also prevented scent permeating through to the surface of the ground, thus preventing tracker dogs from detecting the presence of the occupants.
A prefabricated hatch allowed the soldier to enter and exit the shelter. The MEXE shelter was equipped with both a periscope and covert radio communications, allowing reports to be sent of troop movements and strengths.
At a given signal, the SAS would emerge from their hides and attack the Russians in the rear. Amazingly enough, many of these shelters were forgotten and they remain buried all over Germany to this day.
This can make conditions cramped and uncomfortable, a situation often made worse by adverse weather conditions. No sign of the men's presence can be left, since it might mean that the 0P is discovered by a suspicious target. Thereforg even normally private functions, such as urinating and defecating must be done in the 0P.
Smoking cooking. The ideal location is normally a room overlooking the target house; observation equipment is installed in such a way as to monitor the target, while remaining undetected from the outside.
The room, or adjoining rooms, are prepared to accommodate the surveillance operators on duty. Likewise, the entrance to the 0P from the street is fiom. Once the hide has been established, a self-disciplined routine is essential; sloppiness may lead to the target discovering the spy's presence.
Most major cites are crammed with civilians, some of whom are curious, while others wish to be friendly. As a result, a logical explanation is usually prepared to explain the occupation of the 0P when it is surrounded by other residents.
Here are a few points which are looked for when a spy sets up an urban 0P:. They were deployed in the forward observation or "hide role" in Germany during the days of the Cold War.
The shelter was designed to accommodate a patrol of four fully equipped men, for a period of several weeks. The MEXE shelter.
Once the MEXE shelter had been erected in the hole, the soil and turf were placed over the top to provide both protection. The main components comprised of a steel frame, which had a loadbearing limit able to support a vehicle crossing the ground above.
Once the frame was assembled it was covered with a skin manufactured from special. The surveillance will involve following the identified target and, finally, placing them in a known abode, the target house, for example.
Conect surueillance equipment, cameras, telescopes etc,. The 0P needs to have cooking and toilet facilities. Unobtrusive changeover routines need to be set up. The bar! After,an initialirecce. Both of these looked down through the barber's window, providing a good view into the occupanry of the. The operation was mounted by an insertion team who scaled the outside wall and gained access to the roof. Fnom here they entered the. Surveillance on the target can be done in short stages until a number of known "triggers" can be identified i.
Loose surueillance is normally carried out against a target who is living in a fixed location for a given period of time. This means having the target visual at all times during the surueillance. This form of surveillance requires the very best operators and their aim is to establish some basic information about the targel such as housing, his employment and his associates. Once these basics are known, loose surveillance techniques can then be employed.
Both foot and moblle surueillance operations have three distinct phases: the trigger, or plck-up, the bllow and the housing. Any operation will be. The nrvo surueillance openrtors remained in the 0P for l? UP lf the target has not been located there can be no follow. The type of trigger used can be static best , mobile or technical.
Other technical triggers, such as hidden microphones and cameras close to the target's premises, can also be used, but these are not as reliable as tracking systems, as these continue to be of use during the follow.
Once the trigger has been activated, in the case of a foot follow, the. The time that the operation commences will be deduced from the static OP's events log. Surveillance units will be in position in good time and wait for the "standby'' trigger from the static 0P when they detect signs of target movement. The surveillance will commence until the team leader has decided that the target is "housed", at which time the operation is called off.
However, there are opportune timeg such as when a suspect target is inadvertently recognized by an off-duty surveillance operator. As odd at it might sound, in many large cities, off-duty surveillance operators have entered a restauranL. At this juncture, the target is usually unaware of the chance sighting and is happily going about his business - for the surveillance operator it is an ideal opportunity.
While the follow may only be brief, there is a chance that it could provide some interesting information. Where the target is in a difficult location, such as a large car par the trigger may well come from vehicle surveillance operators covering either.
Such instances can easily lead to a lost contact. This can be avoided by knowing the target's route and by positioning a second trigger vehicle at a critical location. Both static and mobile triggers can be enhanced by the use of technical surueillance devices see Tracking. These can be covertly fitted to the target vehicle either on a temporary or on a permanent basis.
Most modern devices are generally at rest if a vehicle has been stationary for more than 15 minutes and are then activated by the door opening and the key being turned in the ignition. The technical tracking device sends a very accurate position signal on demand from the desk operatol this can either be constant or at predetermined time intervals. The signal is displayed on a computer screen that has a street map overlay. Tire target's vehicle position. Slngle person surveillance ln thlnly popuhted aroas ls oxtromoly dllllcult b m.
The key to successful single-person surveillance is not to remain too close. The spy will choose a good vantage position, such as a corner on a. For a surveillance operator acting alone, or when close surveillance is employed, there are a few basic rules. The basic surueillance foot team consists of a three-person unit. The unit's main objective is to keep at least two sets of eyeballs on the target at all times. An initial procedure for keeping a target under obsevation is as follows:.
He may take out a shopping bag and look into the shop. He will assess the target's walk speed, impetus and activity i. He will observe target's alertness and note any. The second operator hangs back to keep the first operator. The third operator will walk on the opposite side of the street, almost parallel with the target.
This helps identifu whether the target is actively engaged in. A known target who is about to meet his handler or agent will. He will observe any pe6on who suddenly changes direction or seems to be giving a signal to another person. These are just a. Making a sudden change of direction or reversing their course. Walking slowly and then speeding up suddenly. Turning a corner and stopping to see who comes round it. Going into a building such as a pub, and immediately exiting via another door.
Checking constantly in the reflection of a shop window. Waiting to the last minute to step on to a bus or an underground train. Getting off at the next stop, waiting and catching the next. Number one will remain parallel to the target.
0コメント