Sunday, December 25, 2011
Growing Phenomena
Tuesday, December 6, 2011
Sunday, November 13, 2011
Surveillance Practice
For your first assignment, study your friend's (the mark's) habits and where they go. When ready; get your cell phone, smart phone or camera and tail your mark on foot. Get pictures of your mark at four different times: morning, during the day, evening and on a weekend. It does not have to be all in the same day. This will give you practice in studying a mark's movements and give you practice in surveillance for different levels of difficulty.
For your second assignment, tail your mark using your car. Start by staking them out and doing some simple following for short periods of time (just down a single street, for example), and look for predictable patterns. When ready, tail them during the same times mentioned above. Be sure to get pictures and do not get in a wreck or cause a dangerous driving situation.
Keep in mind, you are doing this (most likely) for someone not trained in counter-surveillance measures. A professional will be much more difficult but this is a good place to start.
Sunday, November 6, 2011
Bug Detecting
The process for locating bugs is simple. You need to be aware of all the wireless devices you possess. This can include but is not limited to, Baby monitors 900 - 1200 MHZ (many others)Wireless Routers 802.11 -(close to 2.4 GHZ), Cordless phones 5.8-6 GHZ, Some Cell Phones (approx) 900MHz, Wireless Keyboards and Mice, Wireless speakers
Turn these off and start scanning.
http://www.spyville.com/bugdetectors.html
Thursday, October 27, 2011
Rambaldi
Tuesday, May 31, 2011
Using a SpecificTechnology
Now, though, car dealers are allowing bluetooth to start and stop your car, lock and unlock it and so on. So with a little help, you can look in that arms dealer's car without breaking in and even take it with you if you need.
Note that most people are not even aware their bluetooth is on. Good for us.
Thursday, May 26, 2011
The Current State or Don't be a spy if...
Wiretapping Americans’ phones without a warrant goes on unabated. Warrantless snooping through American’s e-mails and watching what they do online continue. Both are a clear violation of the 4th Amendment right to privacy.
Pre-crime exists to arrest not people who have committed crimes, but people who “might” someday commit crimes. Depriving people of life and liberty without due process of law is a violation of the 5th Amendment. Preventing the accused from facing their accusers in court is a violation of the 6th Amendment’s guarantee to a speedy trial and trial by jury.would target and murder Americans “believed to be involved in terrorist activity.”
Last month this principle as put into practice when "he" authorized the assassination of Anwar al-Awlaki, a Muslim cleric and U.S. citizen. That’s right. "He" has authorized the assassination of American citizens. No trial. No Jury. No due process of law.
"He" and we understand the security of our nation. If you not beleive in these things, you do not want to be a spy.
Tuesday, May 17, 2011
More useful alive than dead
If you have any kind of knowledge a foreign government might want, and your cell phone or laptop or other gadget appears slightly moved or different after you've been away from it. You may have fallen victim. It's not just for spies to be concerned and it's not just hackers trying get you. Anybody with "wanted information" may fall prey.
Saturday, May 7, 2011
Web Tracking
Wednesday, May 4, 2011
Where's the Body
Monday, May 2, 2011
Osama Bin Laden (Usama Bin Laden )
But the war on terror itself is far from over. There are terror cells over seas as well as in the US; some Muslim, some not.
The life of a spy never ends. But we do it for love of country, freedom and our ideals.
Tuesday, April 26, 2011
Current Events
What else? Busy Busy Busy. Officers of the Agency have their areas of specialty Middle East, North Korea, China, etc. Those in the middle east have been quite busy along with their agents and other assets with Egypt, Libya, Bahrain, Yemen, Syria (and others not so well known). We finally got the go ahead for drone use in Libya. And it is true, no official "boots to the ground", yet. However, the Special Operations Group has been busy. With careful wording by the government and careful clandestine operations, you will probably not have "military" boots to the ground.
Saturday, March 26, 2011
The name of the game
How long does it take to gather intel? Things that look like they are happening now, started to happen, from the intelligence standpoint, a long time ago. Sometimes we gather intel from many sources for 10-20 years, then make a move. A person of interest could be being watched for 20 years before a move it made. We gather intel, manipulate, lie, change allegiances to one asset or another based on new intel. Use people. That's the way it is.
"Well aren't you at another job after 20 years?." First of all, intel stays in the system. Second of all, you don't really ever retire. It may seem that way, but tradecraft is tradecraft for life and anyone, good or bad, can come for you at any time. That's why we constantly change our routines.
Are you being watched? Most people, unless they are in the system forone reason or another, no. But once in the system. Yes. And more are being monitored than you may think. Do you get odd phone calls, feel like your being watched. get something you did not expect?
Just google yourself. Even if what shows up seems of no consequence, that's what you see, not the intel community. They do not just have google.
Is it just one person being monitored? No. It's the whole family and any relations.
The name of the game. Keep your eyes open.
Monday, March 7, 2011
Watchers - not Men in Black
How observant are you when walking down the street? And do you thinkyou could follow people around without them knowing?
Watching and following people. Sometimes in a car or on foot, and in some cases also photographing them.
This involves long periods of waiting but which at any moment could require concentration when something finally happens.
During the Cold War, "watchers" followed suspected KGB officers around and run observation posts outside the Soviet embassy to watch diplomats come and go, and try to establish who their contacts might be. Now the surveillance focuses on terrorist cells
And then comes the question. Are you being watched? is someone watching the watcher?
83 2 71 5 19 13 47 61 67 37 11 11 53 11 61 5 11 37 37 67 2 43 7 53 11 47 53 37 11 83 19 47 67 11 11 41 71 47 3 11 23 43 2 5 71 23 79 11
Tuesday, March 1, 2011
About MI5 THE SECURITY SERVICE
MI5 protects the United Kingdom against threats to national security including terrorism and espionage. To do this we need talented people from a wide range of backgrounds.
MI5 offers careers that are challenging, interesting and worthwhile. Join us as an Intelligence Officer and your career could take you in many different directions. You could find yourself assessing or investigating threats to national security, solving complex digital intelligence problems, or working in one of our policy or corporate departments. Every day intelligence officers make decisions that help protect the country. Graduates join us from a range of universities and degree disciplines. We also have career opportunities for candidates with IT or language skills.
Teamwork is at the heart of everything we do. Our culture is supportive and we are committed to training and developing our staff. We work closely with Secret Intelligence Service, GCHQ, the wider intelligence community and law enforcement agencies.
Discretion is vital at MI5। That’s why your achievements will remain unknown to the outside world. Not everyone is comfortable keeping their career successes to themselves. But then, not everyone has what it takes to work for MI5.
To find out if you do visit www.mi5.gov.uk/careers/intelligence
You must be a British citizen to apply. Please only discuss your application with your partner and/or immediate family.
Monday, February 21, 2011
Agencies 2
MI5 is not quite like our FBI. The FBI is likened to a domestic domestic interstate police force. They can arrest people for crimes that fall outside the pervue of the state but also are involved in domestic counter terrorism and counter espionage.
MI5 is more like a domestic MI6 and deals more with counter espionage and counter terrorism. They do not arrest people but work closely with Special Branch, which does have the ability to arrest. They do much more counter terrorism than our FBI (keep in mind, the UK has been dealing domestic terrorism (the IRA) and now other groups for many years.)
MI5 and MI6 both work closely with GCHQ which is similar to our NSA; math,cryptoanalysis, and cyber work. Basically communication interception in anyform and gathering intelligence from this.
Friday, February 18, 2011
For Spies of a certain age
Sunday, February 6, 2011
Point Shooting
The typical weapon is a pistol. I was trained in what is now known as point shooting. Then referred to as the quick-kill technique. This is in opposition to using the weapon's actual sight and taking aim. Basically this instinctive shooting technique involves raising the weapon out front with a straight arm or arms and pointing the weapon's barrel like you were pointing with your finger. Then quickly firing 2 to 3 repeated shots and moving on. In this way, in a close quarters combat situation (urban, jungle),with one or more targets you point your "finger", take a couple of shots and quickly move to the next target. No time spent formerly taking aim with the weapon's sight, just the barrel at eye level. If possible, the movement is with the hips or body and not the arms. We try to keep the arms out straight and pointing to the target.
But remember, the goal of espionage is clandestine and covert. Using a firearm compromises that objective.
Saturday, January 29, 2011
Agencies 1-Reference Wikipedia too
The CIA, aka the Company and the Agency is utilized the US for non-domestic intelligence. By that I mean they have no jurisdiction in the US. That is the role of the FBI. However, on occassion, they will observe domestically. There are many groups within the CIA. The Clandestine component being the most familiar. However, they have a special group, SOG, that operates as a paramilitary group. They will bring others in fromthe Navy Seals, Delta Force and Special Operations in general. This is called Sheep Dipping. Training is done at the Farm near Williamsburg, VA.
The CIA operatives rarely do the spying themselves. They engender others, called assets, who have access to desired information to actually to the covert work.
The CIA operatives have to figure out who will be a reliable asset, give them missions, put together and analyze the information.
An asset can turn out to be a double-agent and the officer will need to be extracted.
Official cover operatives are granted a set of governmental protections,and if caught in the act of espionage, they can request diplomatic protection from their government. This is very common.
There are also operatives, who have Non Official Cover, who assume positions with no ties to their government, and whose actions are officially disavowed by that government.
Current
Thursday, January 20, 2011
Simple Code Used In Op
Monday, January 17, 2011
Espionage
used to the word "Spy". The reality is being a Spy is engaging
in Espionage. When one says "Spy" everythinks of James Bond.
But when asked what Espionage is they either think secret or
nothing at all. Well Espionage is Spying. It is typically
clandestine. This means it is being done with without
notice, in secret. So if you think about it, James Bond is not a spy. The
people he goes after know what he has done and try to kill him.
What James Bond does do is more closely tied to a Covert operation.
Covert implies no-one knows who is behind it. Of course with
James, everyone knows he is with MI6 (SIS),। सो मय्बे ठाट दोएस नोट अपपल्य एइठेर.
Espionage is clandestine and can be done covertly. Very dangerous
since, if caught, everyone denies you. But if espionge is carried
out correctly, no-one ever knows if something was compromised or
at least not until it is too late, and if done covertly, they never
know who did it or who was behind it.
Counter espionage is simply the act of trying to prevent others from
carrying out espionage. Trying to root out the spys. Sounds easy but
is politically and physically tricky. If someone is obtained at the
thought of being a spy, you'd better prove it, or suffer political
fallout.
So just remember, its not the people you know are known spys you have to
worry about, it's everyone else. If they are a spy, you'll never
know. When the NSA taps your phone, cell phone, and laptop video
camera, you won't know it. When someone befriends you and you have
no idea what information you've actually given them, beware।
सो मय्बे बी तेल्लिंग यू इ'म अ स्पी, इ'म नोट; और ठाट'स वहत इ वांट यू तो थिंक.