A security service like the KGB can only achieve its objectives by intercepting communication between people. This means you can beat the security service if you can deny them the ability to overhear your meetings with your contacts.
What you'll learn here... (TRADECRAFT)
This article teaches you how to check for surveillance* before you meet with a clandestine* contact. You'll learn a protocol* that will beat security services like the FBI, BATF, DEA, and others. The method is particularly effective against standard police surveillance. It also works against the so-called inspection teams of the IRS.
clandestine - marked by, held in, or conducted with secrecy
protocol - a detailed plan or procedure
surveillance - close watch kept over someone or something (as by a detective)
*********************
SPY TALK: Spies in North America call this seven-step protocol (below) for counter surveillance "drycleaning". In Europe, it is called parcours de sécurité – a French phrase which can be translated as security run or security circuit.
***********************
7 Step-by-step instructions for holding a secret meeting...
Step 1
Step 2
SPYTALK: The phrase grown a tail is spy-talk for being under surveillance. The phrase is somewhat inaccurate, because they don't just follow you, they often surround you.
*********************
Step 3
NOTE – In particular, I may follow you, I may walk parallel to you, I may occasionally walk ahead of you. The goal is simply to be nearby so I'm in a position to detect surveillance around you. I always remain at a distance from you, of course, never approaching too closely.
Step 4
Step 5
What to look for: You carefully watch for persons who are pacing me or moving parallel with me. You check for persons loitering at positions with a good line-of-sight to my location. You watch for an ongoing pattern of people coming and going that results in someone always being in a position to monitor me. You watch for vehicles dropping someone off ahead of me.
Step 6
When you are satisfied that I am clean, you signal me that I'm not being watched. (On the other hand, if you suspect that a surveillance team is in the vicinity, you simply abort the operation and walk away.)
NOTE – You must trust your instincts, because if something seems not quite right it's better to be safe than sorry. Many people are surprised to learn that it is not difficult to detect a surveillance team watching someone else. This is the subtle elegance of Blunt's countersurveillance system. And the goons are helpless against it.
Step 7
NOTE 1 – If you have any documents to give me, I will not accept those documents until the final moments of our meeting. I will have already started making my getaway when I accept the documents. This reduces the chance of discovery and arrest by a surveillance team that has managed to elude our counter surveillance protocol. If the security service acts too quickly, they will have no evidence against me, because the documents have not yet been passed to me.
NOTE 2 – The best agents never mix discussion and documents. If a document is to be passed, no discussion occurs. The entire contact takes only a moment – the perfect brushpass. The principle is simple. It is foolhardy to stand around holding incriminating documents.
MORE INFORMATION ON TRADECRAFT: Tradecraft origins. The method described in this article was originally devised in 1943-1944 by countersurveillance expert Anthony Blunt for Britain's MI.5. Unfortunately for the British, Blunt was a deep-cover agent for the KGB. Six years later, Blunt taught the protocol to his new KGB controller, Yuri Modin. Together they perfected the technique as it is known today. They successfully thwarted MI.5 surveillance for three years, sometimes even meeting daily to exchange information and top secret documents. In effect, Blunt was using his inside knowledge of MI.5's surveillance techniques to beat them at their own game.
Proliferation. This counter surveillance method has since been adopted by Israel's Mossad, Germany's BND, Russia's KGB (now the SVR), the American CIA, and many others. The protocol is taught by intelligence agencies to their controllers – these are the intelligence officers who manage and meet with deep cover agents in foreign countries. The method is also being used today by resistance movements and urban guerrilla groups. When this countersurveillance protocol is methodically applied, it is extremely difficult for a security service to breach your security.
No comments:
Post a Comment