A-Z Archive






From the pages of Eye Spy Intelligence Magazine since May 2001

Analysis as a tradecraft. The CIA's Hazy Crystal Ball. An indepth feature examines the difficult role of an intelligence analyst and covers multiple elements including the intelligence process. (TC) ES98, 2015
Anti-Surveillance. Interview and tip with specialist trainer. (TC) ES59, 2008
Anti-Surveillance. Part 1. The Art and Discipline of. (TC) ES59, 2008
Anti-Surveillance. Part 2. The Art and Discipline of. (TC) ES60, 2009
Anti-Surveillance. Tactical Driving (all climates and conflict theatres). (TC) ES57, 2008
Anti-Surveillance. The art of. (All measures examined). (TC) ES50, 2007
Are You Being Bugged? (countermeasures) (TC) ES14, 2002
A-Z Language of Spies. Part 1. (TC). ES55, 2008
A-Z Language of Spies. Part 2. (TC). ES57, 2008
A-Z Language of Spies. Part 3. (TC). ES63, 2009
A-Z Language of Spies. Part 4. (TC). ES91, 2014
A-Z Language of Spies. Part 5. (TC). ES102, 2016
A-Z Language of Spies. Part 6. (TC). ES104, 2016
A-Z Language of Spies. Part 7. (TC). ES105, 2016
Battle of Bugs and Eavesdropping. (Comprehensive notes on wire-taps, targets and counter-surveillance). (TC) ES41, 2006
Black Bag Operations. Feature. (TC) ES89, 2014
Body Language. Misreading. (TC) ES90, 2014
Body Language. Part One. Eye Spy examines the fascinating subject of body language and why more intelligence services are becoming less reliant on observation. Would I Lie to You? Feature. (TC) ES97, 2015
Body Language. Part Two. Eye Spy examines the fascinating subject of body language and why more intelligence services are becoming less reliant on observation. Would I Lie to You? Feature. (TC) ES98, 2015
Bombs in Mail. (Countermeasures). (TC) ES44, 2006
Bread Crumbs. Notes on spycraft: Hotels, time, distraction, disguise techniques, room entry, secret messaging, white noise, personal security, false trails, hiding locations, countermeasures and illusion. (TC) ES96, 2015
Brush Pass. Origins of the Brush Pass. Feature. (TC) ES29, 2004
Brush Pass. Silent Spies and Communication. (TC) ES87, 2013
Bugs and the Culture of Interception. Historical overview. Part 1. From Mechanical to Digital. (TC) ES87, 2013
Bugs and the Culture of Interception. Historical overview. Part 2. A Very Public Insight. (TC) ES88, 2013
Bugs and the Culture of Interception. Historical overview. Part 3. The Strange Journey of Mr Borland. (TC) ES89, 2014
Bugs and the Culture of Interception. Historical overview. Part 4. The Royal Intercepts. (TC) ES90, 2014
Bugs. (Notes on covert recording, bugs and countermeasures). (TC) ES48, 2007
Can You Trust The Telephone (telephone tapping). (TC) ES13, 2002
Car Park Tradecraft. Silent Spies and Communication. (TC) ES87, 2013
CCTV clip of Mohammed Atta passing through airport terminal at Portland Maine now being used as a training tool for security personnel. Emphasis on body language. ES98, 2015
Cell Phone Espionage. Feature. New methods to intercept any phone and the history of cell phone espionage and bugging technology.(TC). ES74, 2011
Cell Phone Interception Countermeasures. Targets and Opportunity. Feature. (TC) ES92, 2014
Cell Phone Tapping. Total cell phone security not achievable. Feature. (TC) ES88, 2013
Cell Phone Tracking and Interception. (TC) ES77, 2012
Coded Sentences and Responses. (See Delisle, Sub-Lt. Jeffrey. Feature. Spy Meetings and Liaisons). (TC) ES82, 2012
 combat, awareness of surroundings, circumstances, field operations, body language, intelligence collection, training methods,
Common Espionage Techniques. (TC) ES56, 2008
Communicating (methods) with Spies. (TC) ES69, 2010
Communication, Observation and Concealment. (TC) ES44, 2006
Context ● Understand Content ● Clues within Frames ● Military Application ● Evidence ● Forms of Collection ● Technology
Corporate Espionage. (Insider Threats). (TC) ES51, 2007
Corporate Espionage. (Profile of a Corporate Spy). (TC) ES43, 2006
Corporate Espionage. New intelligence gathering methods. (TC) ES56, 2008
Counter Intelligence. The Secret World of. Part 1 (TC). Wartime Double-agents; Double-Cross System; classification of information; third party listeners; protective security; over-classification; polygraph  testing; ideology; defections; surveillance; human intelligence; exposure; spy locations; propaganda; geospatial mapping; interceptions; espionage; agent running; operations; spy satellites; cyber operations; spy overflights; electronic jamming; budgets; physical/object security; deceptions; imagery intelligence; signals intelligence; countermeasures; technical operations; confusion agents; military feints; organisations; front companies; proxies. All elements analysed. Major tradecraft feature by Dr Chris Northcott. ES105, 2016
Counter Intelligence. The Secret World of. Part 2 (TC). Major tradecraft feature by Dr Chris Northcott. ES106, 2016
Counter Intelligence. The Secret World of. Part 3 (TC). Major tradecraft feature by Dr Chris Northcott. ES107, 2017
Counter Surveillance. (TC) ES50, 2007
Counter Terrorism. (Profiling, Countermeasures, Counter Surveillance). (TC) ES61, 2009
Counter-Terrorism Surveillance Notes. (TC) ES76, 2011
Counter-Terrorism and Intelligence. Signs and Definition. Series covers: ● Intelligence Collection ● Threat Analysis (assessing the threat posed by groups and individuals) ● Service Coordination ● National Infrastructure ● Risk Assessment ● Counter-Intelligence ● Site Security (including locations such as airports, military facilities, weapons or hazardous storage and production sites).
Counter-Terrorism. Part 1. (TC) ES77, 2012
Counter-Terrorism and Intelligence. Contact, Creation, Insurgency. ● Tools of the Trade ● Objectives and Options ● Forms of Terrorism from Biological to Suicide Attacks ● Estimating Longevity of Threat ● Predicting Attacks ● Analysis of Terror Groups ● Statistics ● Structure of Terror Groups ● Finance ● Operational Capability ● Weaknesses ● Associations ● Operational Landscape ● Strength.
Counter-Terrorism. Part 2. (TC) ES78, 2012
Counter-Terrorism and Intelligence. Invisible Opponents: Identifying terrorist types and their objectives. ● Revolutionaries ● National Appeal ● Political Motives ● Separatism ● Religion ● Lone Wolves ● Forms of Terrorism ● Political Terrorism ● Nuclear Terrorism ● Money as a Motivation ● Poisons and Toxins ● Water Contamination ● Explosives ● Unconventional Attacks ● The Media ● Countermeasures.
Counter-Terrorism. Part 3. (TC) ES79, 2012
Counter-Terrorism and Intelligence. Informants, HUMINT, Liaison and Agent Control. ● Human Intelligence ● Agent Control and Relationship ● Organisation and Control ● Task Forces ● Electronic Intelligence ● Analysis ● Training ● Warning Systems.
Counter-Terrorism. Part 4. (TC) ES80, 2012
Counter-Terrorism and Intelligence. The Sponsors of Terrorism. Designated Countries ● Political Influence ● Covert Official Support ● Operations ● Secret Sponsors ● Hatred and Ideology ● Strategy and Motivation ● Regime Change ● Assassinations ● Blue on Green Attacks ● Front Organisations.
Counter-Terrorism. Part 5. (TC) ES81, 2012
Counter-Terrorism and Intelligence. Letter Box Bombs: Delivery System and Product. Types of Bombs and Explosives ● Case Examples ● Fictitious Fronts ● Lone Wolves ● Airliners and Diplomats ● The Bombers ● Countermeasures ● Couriers and Hand-Delivered Mail ● Suspicious Mail and Packages ● Warning Signs ● Security in Mail Rooms ● Statistics.
Counter-Terrorism. Part 6. (TC) ES82, 2012
Counter-Terrorism and Intelligence. IEDs: Improvised Explosive Devices. Technology ● Access to Products ● IED Description ● Worldwide Attacks ● Adapted Items ● Transportation ● Electronic Advances ● Utilisation ● Training ● Countermeasures ● Types of Explosives ● Cell Phone IEDs ● Personal Body-worn IEDs ● Placement ● Locating IEDs ● Future IEDs.
Counter-Terrorism. Part 7. (TC) ES83, 2013
Counter-Terrorism and Intelligence. Super Terrorism. Radiological ● Biological ● Chemical ● WMD ● Toxic Poisons ● Diseases and Infections ● Entomological Warfare ● Plutonium ● ABC ● CBRN ● UAT ● Polonium-210 ● Dirty Bombs ● Pathogens and Germ Warfare ● Uranium ● Bubonic Plague ● West Nile Virus ● Anthrax ● Smallpox ● Super Poisons ● Water Security.
Counter-Terrorism. Part 8. (TC) ES83, 2013
Counter-Terrorism and Intelligence. The Gateway: Infiltration and Disruption. Intelligence Collection by Circumnavigation ● Roleplay and Tradecraft ● Using Ideology as Gateways ● Recruitment ● Electronic Advantage.
Counter-Terrorism. Part 9. (TC) ES85, 2013
Counter-Terrorism and Intelligence. A Second in Time. Failures ● Strategy ● Errors ● Signs and Cooperation ● Cryptic Clues ● Word Exchange ● Intercepts ● Service Personnel and Agencies ● Terror Group MO ● Prevention ● Momentary Lapses ● Security ● Planning ● Planning for the Unforeseen.
Counter-Terrorism. Part 10. (TC) ES86, 2013
Counter-Terrorism and Intelligence. The Hidden Hand. Terrorist Planning ● Detection and Prediction ● Border Security ● Chemical Weapons ● The Internet as a Recruiting and Communication Platform ● Cyber Disruption ● Security Checks and Clearance ● Infiltration ● Disruption ● Nuclear Proliferation ● Cooperation ● Funding ● WMD ● Threat Levels - Garden Variety/Mercenary/Nation State.
Counter-Terrorism. Part 11. (TC) ES87, 2013
Couriers and Counter-Terrorism. (All traits, ruses, and skills). (TC) ES50, 200
Cover and Legend. Feature. The Art of Concealment. How the spy tradecraft of Cover and Legend works. (TC) ES82, 2012
Covert Action. Dirty Tricks or Trump Cards. See Spy Tradecraft. The four elements: Propaganda, Political Action, Paramilitary Activities and Information Warfare. Dr Chris Northcott examines one of the most controversial intelligence tradecraft elements utilised surreptitiously throughout history by governments, armed forces, intelligence services, dictators, pressure groups and the underworld. Part 1. Dirty Tricks or Trump Card? (TC) Major Feature. ES103, 2016
Covert Action. See Spy Tradecraft. Dr Chris Northcott. Part 2. Information Warfare. (TC) Major Feature. ES104, 2016
Covert Computer Monitoring. (TC) ES12, 2002
Covert Rural Dipole. (Building and use of a dipole for better rural communications). (TC). ES60, 2009
Dark Arts. (Surveillance and Intelligence Gathering Tricks). (TC) ES44, 2006
Deceptive Factor. Part One. Eye Spy examines a number of surprising individuals whose unusual skills and talents were utilised and adopted by those working in the intelligence world. In this feature the author looks at illusionist, conjuror, escapologist, actor, stunt performer and MI5 agent trainer Harry Houdini. (TC) ES99, 2015
Deceptive Factor. Part Two. MK Ultra, CIA training manual, distraction, confusion and slight of hand. (TC) ES100, 2015
Deceptive Factor. Part Three. Seeing is Believing. Illusion, Perception, Misdirection and the Magic Gang. ES101, 2016
Deceptive Factor. Part Four. The Power of Misdirection. (TC) ES102, 2016
Deceptive Factor. Part Five. The Power of Misdirection. (TC) ES103, 2016
Deceptive Factor. Part Six. Mental and Physical Confusion. Confusing the brain; hedgehog defence; multiple choices; saccade process. (TC) ES105, 2016
 Defendo. Personal defence skills. (TC) ES19, 2003
 Dirty Tricks, Disinformatioin, Distraction and Deceit. (TC) ES52, 2007
 Disguise Techniques. (Primary Elements and Components). (TC) ES51, 2007
 Disguise Techniques. Dangers. (TC) ES53, 2008
 Disguise Techniques. Feature. Less Is Often Best. (TC) ES53, 2008
 Disguise Techniques. Part 1. Magic and Illusion. (TC) ES51, 2007
 Disguise Techniques. Part 2. Make-up, dress and behaviour. (TC) ES52, 2007
 Disguise Techniques. Part 3. Art of Illusion. (TC) ES53, 2008
 Distraction operations and techniques in all environments. (TC) ES48, 2007
 DIY Series. Part 1. (Build a long-range video or camera). (TC) ES44, 2006
 DIY Series. Part 2. (Build a room transmitter and receiver kit for less than a pint of beer). ES45, 2006
 DIY Series. Part 3. Three Projects. (Document copy fluid; invisible ink; plastic for various applications including molding). (TC)ES47, 2007
 DIY Series. Part 4. Four Projects. (Recordings only you can hear; build a sound amplifier; through wall listening device; parabolic microphone). (TC) ES48, 2007
 DIY Series. Part 5. (Utilsing everyday objects to conceal covert cameras). (TC) ES49, 2007
 Electronic Footprint. See Surveillance. Post-war changes and new technologies. See Tradecraft - Surveillance. The Changing Face of Surveillance. Part 2. ES94, 2014
 Encounter Control in the Intelligence Cycle. Part 1. Security and defence skills, offensive and defensive driving, lock picking, eavesdropping, armed and unarmed
 Encounter Control in the Intelligence Cycle. Part 2. Feature. (TC) ES89, 2014
 Encounter Control in the Intelligence Cycle. Part 3. Feature. (TC) ES90, 2014
 Encounter Control in the Intelligence Cycle. Part 4. Feature. (TC) ES91, 2014
 Encounter Control in the Intelligence Cycle. Part 5. Feature. (TC) ES92, 2014
 Encounter Control in the Intelligence Cycle. Part 6. Feature. (TC) ES93, 2014
 Encounter Control in the Intelligence Cycle. Part 7. Feature. (TC) ES94, 2014
 Encounter Control in the Intelligence Cycle. Part 8. Feature. (TC) ES95, 2015
 Encounter Control in the Intelligence Cycle. Part 9. Feature. (TC) ES96, 2015
 Escape and Evasion. Teachings of the Russian System. (TC) ES14, 2002
 Fake documentation, including invoices, inheritance, trade deals etc. (TC) ES47, 2007
 Feature. Informative overview covering the last one hundred years of this vital intelligence element. (TC) ES94, 2014
 Field Stations. (Everything you need to know about how they operate). (TC) ES40, 2006
 Foundations of Tactical Driving. (Instructional feature for professional drivers in all operational and security environments, including surveillance
 GPS. Surveillance by Stealth. (TC) ES39, 2006
 Hair Spray Trick. (TC) ES45, 2006
 Hard Pins. Identification pins and recognition insignia. (TC) ES14, 2002
 HEAT. Hostile Environment Awareness Training. (TS) ES30 2004/5
 Hostage Survival: Guidance to the Initial Responder. (TC) ES63, 2009
 Hostage Takers. Intelligence insight and methodology that will help you understand and survive. (TC) ES57, 2008
 Hostage Taking. Minimising the Risks. (TC) ES58, 2008
 Hostile Environment Training. (TC) ES38, 2006
 Hotel Security. (Tips and espionage countermeasures). (TC) ES45, 2006
 HUMINT. Human Intelligence. Part 1. Dr Chris Northcott examines the crucial intelligence tradecraft known as HUMINT. Single person espionage; sources; information reliability; disinformation; cultivating sources; agents-in-place; hiding in plain sight; diplomatic and military objectives; architectural spies; cover and legend; military sources; multi-operative spy rings and much more. This two part feature covers every element associated with this vital intelligence element. (TC). ES101, 2016
 HUMINT. Human Intelligence. Its Uses and Limits. Part 2. Dr Chris Northcott. Types of intelligence sources; flexible roaming agents; types of sources; quality assessment of HUMINT; penetration agents; physical tradecraft; surveillance and agent detection; methods used to cultivate and protect sources; fabrication; using Open Source Intelligence OSINT; decision making using HUMINT; counter-intelligence; counter-espionage; technology; debriefing and analysis of HUMINT. (TC). ES102, 2016
  Image Interpretation. Feature. Photo, Film and Video Intelligence. Understanding information gleaned from imagery and film and the important role of a photo analyst.
 Importance of Identification, evidence collection and verification. (TC) ES76, 2011
 including disguise techniques. (TC) ES75, 2011
 Infiltration. (All aspects examined0. (TC) ES44, 2006
 Intelligence and Security Projects. (TC) ES32, 2005
 Intelligence Couriers and Communications. (Types of courier, how they operate and communicate) (TC). ES49, 2007
 intelligence element. (TC) ES93, 2014
 Interrogation. Stratagem of Interrogation - The Sixteen Approaches. Feature. US Military Intelligence approach to the art of interrogation without the use of torture.
 Letter and package handling and opening. Security Measures. (TC) ES44, 2006
 Listening Devices. (Placement) (TC) ES44, 2006
 Match Trick. (TC) ES45, 2006
 Mobile Anti-Surveillance. (TC) ES59, 2008
 Notes on Surveillance. (TC) ES65, 2009
 Notes on Surveillance: Confirming Identity and Occupancy. Investigative methods to surveill difficult targets and confirm identity. (TC) ES76, 2011
 Observation Skills (Test). (TC) ES44, 2006
 Observation training. Feature - 60 Seconds: What do you see? (TC) ES69, 2010
 Origins of the Brush Pass. (TC) ES29, 2004
 OSINT. Open Source Intelligence. Secret Intelligence in the Media. Feature. (TC) ES91, 2014
 Photographic Interpretation. (TC) ES15, 2003
 Photography and Surveillance. New series begins on learning surveillance photography skills. Part 1 - Digital Photography. (TC). ES72, 2011
 Photography and Surveillance. Series on learning surveillance photography skills. Part 2 - Digital SLR Cameras. (TC). ES73, 2011
 Photography and Surveillance. Series on learning surveillance photography skills. Part 3 - Camera Lenses and Keeping Your Camera Steady. (TC). ES74, 2011
 Photography and Surveillance. Series on learning surveillance photography skills. Part 4 - Correct Exposure and Metering. (TC) ES75, 2011
 Photography and Surveillance. Series on learning surveillance photography skills. Part 5 - Focusing and Exposure. (TC) ES76, 2011
 Photography and Surveillance. Series on learning surveillance photography skills. Part 6 - Night Photography and Image Intensifiers. (TC) ES77, 2012
 Photography and Surveillance. Series on learning surveillance photography skills. Part 7 - Using Video. (TC). ES78, 2012
 Professional Surveillance Training. (TC) ES29, 2004
 Profiling a Terrorist (TC). ES38, 2006
 Props. Feature on the beginning of Cover and Legend. (TC) ES82, 2012
 Recognition Signals. Silent Spies and Communication. (TC) ES87, 2013
 Removal Firms. Information forwarding. Feature. (TC). ES72, 2011
 Reporting for Spies. Intelligence and the Media. (TC) ES52, 2007
 Robert Patrick Hoffman. 30-year prison term for would be spy. Tradecraft explored. (TC) ES90, 2014
 Roles and name designations given to those at the cutting edge of intelligence. (TC) ES56, 2008
 Room Bugs and Radio Microphones. (TC) ES11, 2002
 Rule of Hostage Survival. Part 2. (Surviving captivity). (TC) ES62, 2009
 Rules of Hostage Survival. Part 1. (Surviving captivity). (TC) ES61, 2009
 Safety (Personal) Abroad. (Tips and security guidance). (TC) ES25, 2004
 Secret surveillance images from the STASI Archive. Feature on remarkable exhibition of covert STASI surveillance operations and tradecraft
 Secrets of the Spy Trade. Part 1. (The Switch or Live Drop). (TC). ES26, 2004
 Secrets of the Spy Trade. Part 2. (Dead Letter Drops). (TC). ES27, 2004
 Secrets of the Spy Trade. Part 3. (Espionage countermeasures). (TC). ES29, 2004
 Signal Sites. Silent Spies and Communication. (TC) ES87, 2013
 Silent Spies and Communication. Agent liaison and the diverse methods in which spies, agents and handlers communicate using all manner of objects, ruses etc.
 SITREP. Situation Report. (TC) ES87, 2013
 SOCINT. Social Media Intelligence. See OSINT. Secret Intelligence in the Media. Feature. (TC) ES91, 2014
 Spies in the Puzzle Palace. Feature. An examination of the various descriptions assigned to agents, officers, operation and assets. (TC). ES56, 2008
 Spy Catching. Methods. (TC) ES42, 2006
 Spy Tradecraft, Spycraft, Abbreviation/designation - TC
 Spying Game: Persons of Interest. Espionage dangers for overseas business people. (TC) ES45, 2006
Support ● Operations ● Secret Sponsors ● Hatred and Ideology ● Strategy and Motivation ● Regime Change ● Assassinations
Surveillance - FBI-Style. (TC) ES38, 2006
Surveillance Driving Skills. (TC) ES46, 2007
Surveillance Exposure Tips. A comprehensive examination of the most common errors committed by surveillance operatives working for government and private agencies. Hiding in Plain Sight. Major Feature. (TC) ES95, 2015
Surveillance Legislation in UK. (TC). ES41, 2006
Surveillance on the Underground. (Techniques, methods and problem solving). (TC) ES55, 2008
Surveillance Operator. (TC) ES22, 2003
Surveillance Techniques. (TC) ES21, 2003
Surveillance Vehicles. (Choice of. Recognition). (TC) ES46, 2007
Surveillance Watch Trick. (TC) ES40, 2006
Surveillance. (Foot Surveillance). (TC) ES25, 2004
Surveillance. (Mobile Surveillance). (TC) ES26, 2004
Surveillance. (Triggers and Operations). (TC) ES23, 2004
Surveillance. Post-war changes and new technologies. See Tradecraft - Surveillance. The Changing Face of Surveillance. A Necessary Dark Art? Part 2.
Surveillance. The Changing Face of Surveillance. A Necessary Dark Art? Part 1. Feature. Informative overview covering the last one hundred years of this vital
Surveillance. What Analysts Look For. (TC) ES76, 2011
Talking without Words. (Secret communications and signs). (TC) ES42, 2006
Technical Tracking Device. (TC) ES27, 2004
Telephone Tap Countermeasures. (What the ordinary person can do). (TC) ES32, 2005
The Art of Distraction. (Multifaceted subject including performing distraction and false operations) (TC) ES48, 2007
The Art of Going Grey. (How spies perform with near impunity). (TC) ES37, 2005/6
The A-Z Language of Spies. Secret sayings, meanings and acronyms. (TC) ES63, 2009
The Listening Trick. (TC) ES44, 2006
Tickets Please. (Gathering intelligence from ticks, receipts, documents etc.) (TC) ES41, 2006
to exchange materials in absolute silence. (TC) ES87, 2013
Tracking Terror Money (Procedures and Methods). (TC) ES42, 2006
Trading Places: The Professionals. Feature on creating and using realistic disguises by film make-up artist Hala Al Ayoubi. (TC) ES75, 2011
Training the 21st Century Operative. (Intelligence requirements) (TC) ES28, 2004
Unrestricted Warfare. (Full spectrum of modalities). (TC) ES40, 2006
Vehicle Security Tactics. (TC) ES16, 2003
Vehicle surveillance tips for Winter. (TC) ES44, 2006
Vehicle Tracking. (TC) ES15, 2003
Video Photography. (Obtaining covert film footage) (TC) ES16, 2003
Weapons and handling, improvised weaponry, agent confrontation... Feature. (TC) ES88, 2013