Tradecraft Archive






From the pages of Eye Spy Intelligence Magazine since May 2001

 

ANALYSIS - INTELLIGENCE AND INFORMATION


ANALYSIS - INTELLIGENCE

Analysis as a tradecraft. The CIA's Hazy Crystal Ball. An indepth feature examines the difficult role of an intelligence analyst and covers multiple elements including the intelligence process. (TC) ES98, 2015
Importance of Identification. Evidence collection and verification, including disguise techniques. Part 1. (TC) ES75, 2011
Importance of Identification. Evidence collection and verification, including disguise techniques. Part 2. (TC) ES76, 2011
Surveillance. What Analysts Look For. (TC) ES76, 2011
Training the 21st Century Operative. Total intelligence requirements. (TC) ES28, 2004
Understanding Intelligence. Future technologies. ● Active Camouflage ● Nanotechnology ● Information Technology ● Adaptive Body Armour ● Kinetic Energy Weapons ● Laser Weapons ● High Power Microwave Weapons ● Charged Particle Beams. Part 1. (TC) ES34, 2005
Understanding Intelligence. Forensics and DNA as an intelligence element. Part 2. (TC) ES35, 2005
Understanding Intelligence. Money Laundering. Part 3. (TC) ES36, 2005
Understanding Intelligence. Digital Footprints Part 4. (TC) ES37, 2005/6
Understanding Intelligence. Profiling a Terrorist. Characteristics. Part 5. (TC) ES38, 2006
Understanding Intelligence. Unrestricted Warfare. Cultural ● Economic ● Environmental ● Financial ● Narcotics ● International Law ● Media ● Telecommunications ● Politics ● Psychology ● Resources ● Smuggling ● Technologies ● Terrorism ● criminals and gangs. Part 6. (TC) ES40, 2006
Understanding Intelligence. Tracking Terror Money (proceeds of). Specialist Equipment ● Accommodation ● Weapons Purchases ● Specialist Training ● Communications Equipment ● Food and Beverages ● Car Hire and Transport ● Storage Facilities ● Training Camps ● Explosives Training ● New Identities ● Weapons Training ● Domestic and International Air Travel. Part 7. (TC) ES42, 2006
Understanding Intelligence. Technology Warfare ● Composite Materials ● Alloys ● Superconductive Conductors ● Nano Materials ● Automated and Robotic Production Technologies ● Telecommunication Transmission ● Switching and Network Management Capabilities ● Lasers ● Optics and Power Systems Technologies ● Biomedical Technologies ● Space Sensor Technology ● Advanced Electronic Devices ● Components and Optical Circuits ● Acoustic and Electro-Optic Sensors ● Aerospace Structures and Propulsion Systems ● Directed Energy and Kinetic Energy Applications. Part 8A. (TC) ES43, 2006
Understanding Intelligence. Profile of A Corporate Spy. ● Use of private sector organisations, front companies, and joint ventures ● Classic agent recruitment (getting employees to turn over materials) ● Employees looking to sell materials, information and samples ● Elicitation during international conferences and trade fairs ● Kidnapping and extortion of corporate executives ● Eavesdropping of employees in hotel, meeting rooms, and public places ● Dumpster diving (looking in a company's trash) ● Surveillance and surreptitious or covert entry ● Hacking computer systems ● Laptop computer theft. Part 8B. (TC) ES43, 2006
Understanding Intelligence. Cyber Terrorism. Computer viruses ● Logic Bombs ● Denial of Service Attacks ● Software Vulnerability Exploitation ● Intent to Acquire ● Basic, Intermediate and Advanced Data Weapons. Part 9. (TC) ES44, 2006
Understanding Intelligence. Financial Warfare Part One. The Counterfeit Kings. All aspects investigated and countermeasures. ● Buffer Overflow ● POD - Ping of Death ● Smurf Attack ● TCP SYN Attack ● Tear Drop ● Watermark ● Colour Shifting Ink ● Paper Quality ● Printing ● Metal Thread ● Hologram ● Serial Numbers ● Coins. Part 10A. (TC) ES46, 2007
Understanding Intelligence. Financial Warfare Part Two. Indirect Attacks. Fake Invoices, Leaders, Inheritance, Financing, Foreign Nationals, Charities, Trade Deals, Scholarships, Lotteries and Asset Transfers. Part 10B. (TC) ES47, 2007
Understanding Intelligence. E-Bombs. Transient Electromagnetic Pulse Devices. Construction ● Operation ● Application ● Impact ● Protection. Part 11. (TC) ES50, 2007
Understanding Intelligence. Insider Threats. Part 12. (TC) ES51, 2007

 

AGENT COMMUNICATION - ALL ELEMENTS
 

AGENT COMMUNICATIONS

Communicating (methods) with Spies. (TC) ES69, 2010
Communication, Observation and Concealment. (TC) ES44, 2006
Recognition Signals. Silent Spies and Communication. (TC) ES87, 2013
Silent Spies and Communication. Agent liaison and the diverse methods in which spies, agents and handlers communicate using all manner of objects, ruses etc. to exchange materials in absolute silence. (TC) ES87, 2013

 

A-Z LANGUAGE OF SPIES
 

A-Z LANGUAGE

A-Z Language of Spies. Secret sayings, meanings and acronyms. (TC) ES63, 2009
A-Z Language of Spies. Part 1. (TC). ES55, 2008
A-Z Language of Spies. Part 2. (TC). ES57, 2008
A-Z Language of Spies. Part 3. (TC). ES63, 2009
A-Z Language of Spies. Part 4. (TC). ES91, 2014
Roles and name designations given to those at the cutting edge of intelligence collection. (TC) ES56, 2008
SITREP. Situation Report. (TC) ES87, 2013
Spies in the Puzzle Palace. Feature. An examination of the various descriptions assigned to agents, officers, operation and assets. (TC). ES56, 2008

 

BODY LANGUAGE - ALL ELEMENTS

BODY LANGUAGE

Body Language. Eye Spy examines the fascinating subject of body language and why more intelligence services are becoming less reliant on observation. Would I Lie to You? Feature. Part 1. (TC) ES97, 2015
Body Language. Eye Spy examines the fascinating subject of body language and why more intelligence services are becoming less reliant on observation. Would I Lie to You? Part 2. (TC) ES98, 2015
Body Language. Misreading. (TC) ES90, 2014
Understanding body language and sensing dangerous environments. (TC) ES90, 2014

 

BUGS, EAVESDROPPING AND COUNTERMEASURES


BUGS

Are You Being Bugged? Countermeasures. (TC) ES14, 2002
Battle of Bugs and Eavesdropping. Comprehensive notes on wire-taps, targets and counter-surveillance. (TC) ES41, 2006
Bugs and the Culture of Interception. Historical overview. From Mechanical to Digital. Part 1. (TC) ES87, 2013
Bugs and the Culture of Interception. Historical overview. A Very Public Insight. Part 2. (TC) ES88, 2013
Bugs and the Culture of Interception. Historical overview. The Strange Journey of Mr Borland. Part 3. (TC) ES89, 2014
Bugs and the Culture of Interception. Historical overview. The Royal Intercepts. Part 4. (TC) ES90, 2014
Bugs. An array of notes on covert recording, bugs and countermeasures. (TC) ES48, 2007
Can You Trust The Telephone? Telephone Tapping. (TC) ES13, 2002
Listening Devices. Placement. (TC) ES44, 2006
Room Bugs and Radio Microphones. (TC) ES11, 2002
Talking without Words. Secret communications and signs. (TC) ES42, 2006
Telephone Tap Countermeasures. What the ordinary person can do. (TC) ES32, 2005



CELL PHONE INTERCEPTION AND COUNTERMEASURES


CELL PHONES

Car Park Tradecraft. Silent Spies and Communication. (TC) ES87, 2013
Cell Phone Espionage. New methods to intercept any phone and the history of cell phone espionage and bugging technology. (TC). ES74, 2011
Cell Phone Interception Countermeasures. Targets and Opportunity. (TC) ES92, 2014
Cell Phone Tapping. Total cell phone security not achievable. (TC) ES88, 2013
Cell Phone Tracking and Interception. (TC) ES77, 2012



COMMUNICATIONS AND COURIERS


COMMUNICATION

Espionage and Counter-Terrorism. All traits, ruses, and skills. (TC) ES50, 2007
Intelligence Couriers and Communications. Types of courier, how they operate and communicate. (TC) ES49, 2007



CORPORATE ESPIONAGE


CORPORATE

Corporate Espionage. Insider Threats. (TC) ES51, 2007
Corporate Espionage. New intelligence gathering methods. (TC) ES56, 2008
Hotel Security. Tips and espionage countermeasures. (TC) ES45, 2006
Persons of Interest. Espionage dangers for overseas business people. (TC) ES45, 2006
Profile of A Corporate Spy. ● Use of private sector organisations, front companies, and joint ventures ● Classic agent recruitment (getting employees to turn over materials) ● Employees looking to sell materials, information and samples ● Elicitation during international conferences and trade fairs ● Kidnapping and extortion of corporate executives ● Eavesdropping of employees in hotel, meeting rooms, and public places ● Dumpster diving (looking in a company's trash) ● Surveillance and surreptitious or covert entry ● Hacking computer systems ● Laptop computer theft. (TC) ES43, 2006
Understanding Intelligence. Insider Threats. (TC) ES51, 2007

 

COUNTER-TERRORISM - ALL ELEMENTS


COUNTER-TERRORISM

Counter-Terrorism. Profiling, Countermeasures, Counter-Surveillance. (TC) ES61, 2009
Counter-Terrorism Surveillance Notes. (TC) ES76, 2011
Couriers and Counter-Terrorism. All traits, ruses, and skills. (TC) ES50, 2007
Counter-Terrorism and Intelligence. Signs and Definition. Series covers: ● Intelligence Collection ● Threat Analysis (assessing the threat posed by groups and individuals) ● Service Coordination ● National Infrastructure ● Risk Assessment ● Counter-Intelligence ● Site Security (including locations such as airports, military facilities, weapons or hazardous storage and production sites).
Part 1. (TC) ES77, 2012
Counter-Terrorism and Intelligence. Contact, Creation, Insurgency. ● Tools of the Trade ● Objectives and Options ● Forms of Terrorism from Biological to Suicide Attacks ● Estimating Longevity of Threat ● Predicting Attacks ● Analysis of Terror Groups ● Statistics ● Structure of Terror Groups ● Finance ● Operational Capability ● Weaknesses ● Associations ● Operational Landscape ● Strength.
Part 2. (TC) ES78, 2012
Counter-Terrorism and Intelligence. Invisible Opponents: Identifying terrorist types and their objectives. ● Revolutionaries ● National Appeal ● Political Motives ● Separatism ● Religion ● Lone Wolves ● Forms of Terrorism ● Political Terrorism ● Nuclear Terrorism ● Money as a Motivation ● Poisons and Toxins ● Water Contamination ● Explosives ● Unconventional Attacks ● The Media ● Countermeasures.
Part 3. (TC) ES79, 2012
Counter-Terrorism and Intelligence. Informants, HUMINT, Liaison and Agent Control. ● Human Intelligence ● Agent Control and Relationship ● Organisation and Control ● Task Forces ● Electronic Intelligence ● Analysis ● Training ● Warning Systems.
Part 4. (TC) ES80, 2012
Counter-Terrorism and Intelligence. The Sponsors of Terrorism. Designated Countries ● Political Influence ● Covert Official Support ● Operations ● Secret Sponsors ● Hatred and Ideology ● Strategy and Motivation ● Regime Change ● Assassinations ● Blue on Green Attacks ● Front Organisations.
Part 5. (TC) ES81, 2012
Counter-Terrorism and Intelligence. Letter Box Bombs: Delivery System and Product. Types of Bombs and Explosives ● Case Examples ● Fictitious Fronts ● Lone Wolves ● Airliners and Diplomats ● The Bombers ● Countermeasures ● Couriers and Hand-Delivered Mail ● Suspicious Mail and Packages ● Warning Signs ● Security in Mail Rooms ● Statistics.
Part 6. (TC) ES82, 2012
Counter-Terrorism and Intelligence. IEDs: Improvised Explosive Devices. Technology ● Access to Products ● IED Description ● Worldwide Attacks ● Adapted Items ● Transportation ● Electronic Advances ● Utilisation ● Training ● Countermeasures ● Types of Explosives ● Cell Phone IEDs ● Personal Body-worn IEDs ● Placement ● Locating IEDs ● Future IEDs.
Part 7. (TC) ES83, 2013
Counter-Terrorism and Intelligence. Super Terrorism. Radiological ● Biological ● Chemical ● WMD ● Toxic Poisons ● Diseases and Infections ● Entomological Warfare ● Plutonium ● ABC ● CBRN ● UAT ● Polonium-210 ● Dirty Bombs ● Pathogens and Germ Warfare ● Uranium ● Bubonic Plague ● West Nile Virus ● Anthrax ● Smallpox ● Super Poisons ● Water Security.
Part 8. (TC) ES83, 2013
Counter-Terrorism and Intelligence. The Gateway: Infiltration and Disruption. Intelligence Collection by Circumnavigation ● Roleplay and Tradecraft ● Using Ideology as Gateways ● Recruitment ● Electronic Advantage. Part 9. (TC) ES85, 2013
Counter-Terrorism and Intelligence. A Second in Time. Failures ● Strategy ● Errors ● Signs and Cooperation ● Cryptic Clues ● Word Exchange ● Intercepts ● Service Personnel and Agencies ● Terror Group MO ● Prevention ● Momentary Lapses ● Security ● Planning ● Planning for the Unforeseen.
Part 10. (TC) ES86, 2013
Counter-Terrorism and Intelligence. The Hidden Hand. Terrorist Planning ● Detection and Prediction ● Border Security ● Chemical Weapons ● The Internet as a Recruiting and Communication Platform ● Cyber Disruption ● Security Checks and Clearance ● Infiltration ● Disruption ● Nuclear Proliferation ● Cooperation ● Funding ● WMD ● Threat Levels - Garden Variety/Mercenary/Nation State.
Part 11. (TC) ES87, 2013
Profiling a Terrorist (TC). ES38, 2006



CYBER, COMPUTER, ESPIONAGE AND COUNTERMEASURES


CYBER

Covert Computer Monitoring. Espionage and countermeasures. (TC) ES12, 2002
Digital Footprints (TC) ES37, 2005/6
Insider Threats. (TC) ES51, 2007
The Internet as a Recruiting and Communication Platform. (TC) ES87, 2013
Understanding Intelligence. Cyber Terrorism. Computer viruses ● Logic Bombs ● Denial of Service Attacks ● Software Vulnerability Exploitation ● Intent to Acquire ● Basic, Intermediate and Advanced Data Weapons. (TC) ES44, 2006
Understanding Intelligence. E-Bombs. Transient Electromagnetic Pulse Devices. Construction ● Operation ● Application ● Impact ● Protection. (TC) ES50, 2007



DISTRACTION TECHNIQUES AND OPERATIONS


DISTRACTION

Distraction operations and techniques in all environments. (TC) ES48, 2007



DISGUISE TECHNIQUES - ALL LEVELS


DISGUISE

Disguise Techniques. Magic and Illusion. Primary Elements and Components. Part 1. (TC) ES51, 2007
Disguise Techniques. Make-up, Dress and Behaviour. Part 2. (TC) ES52, 2007
Disguise Techniques. Art of Illusion. Dangers of Overuse. Part 3. (TC) ES53, 2008
Importance of Identification. Disguise Techniques. Part 1 (TC) ES75, 2011
Importance of Identification. Disguise Techniques. Part 2 (TC) ES76, 2011
Trading Places: The Professionals. Creating and using realistic disguises by film make-up artist. (TC) ES75, 2011



DIY - EQUIPMENT BUILDING - IMPROVISED


DIY

DIY Series. Build a long-range video or camera. Part 1. (TC) ES44, 2006
DIY Series. Build a room transmitter and receiver kit. Part 2. ES45, 2006
DIY Series. Document copy fluid; invisible ink, plastic for various applications including moulding. Part 3. (TC) ES47, 2007
DIY Series. Recordings only you can hear. Build a sound amplifier; through wall listening device, parabolic microphone. Part 4. (TC) ES48, 2007
DIY Series. Utilising everyday objects to conceal covert cameras. Part 5. (TC) ES49, 2007


DRIVING, VEHICLES, TRACKING - ALL ELEMENTS


DRIVING

Foundations of Tactical Driving. Instructional feature for professional drivers in all operational and security environments, including surveillance. Surveillance Driving Skills. (TC) ES46, 2007
Surveillance. Mobile Surveillance. (TC) ES26, 2004
Surveillance Vehicles. Choice of vehicle and recognition of counter-surveillance vehicles. (TC) ES46, 2007
Technical Tracking Devices. (TC) ES27, 2004
Vehicle Security Tactics. (TC) ES16, 2003
Vehicle surveillance tips for winter. (TC) ES44, 2006
Vehicle Tracking. (TC) ES15, 2003



HOSTILE ENVIRONMENT AND HOSTAGE SURVIVAL - ALL ELEMENTS


HOSTILE ENVIRONMENT

Escape and Evasion. Teachings of the Russian System. (TC) ES14, 2002
HEAT. Hostile Environment Awareness Training. (TS) ES30 2004/5
Hostage Survival: Guidance to the Initial Responder. (TC) ES63, 2009
Hostage Takers. Intelligence insight and methodology that will help you understand and survive. (TC) ES57, 2008
Hostage Taking. Minimising the Risks. (TC) ES58, 2008
Hostile Environment Training. (TC) ES38, 2006
Rules of Hostage Survival. Surviving Captivity. Part 1. (TC) ES61, 2009
Rules of Hostage Survival. Surviving Captivity. Part 2. (TC) ES62, 2009



IDENTITY - COVER AND LEGEND


IDENTITY

Props. Beginning of Cover and Legend. (TC) ES82, 2012



INTERROGATION AND INTERVIEWS


INTERROGATION

Interrogation. Stratagem of Interrogation. The Sixteen Approaches. US Military Intelligence approach to the art of interrogation without the use of torture. (TC) ES80, 2012
Spy Catching. Methods. (TC) ES42, 2006



MISCELLANEOUS


MISCELLANEOUS


Hard Pins. Identification pins and recognition insignia. (TC) ES14, 2002
Removal Firms. Information forwarding. (TC) ES72, 2011
Tickets Please. Gathering intelligence from tickets, receipts, documents etc. (TC) ES41, 2006
Tracking Terror Money. Procedures and Methods. (TC) ES42, 2006
Unrestricted Warfare. Full spectrum of modalities. (TC) ES40, 2006



OBSERVATION AND INTERPRETATION


OBSERVATION

Observation Skills. Test. (TC) ES44, 2006
Observation Training. 60 Seconds: What do you See? (TC) ES69, 2010
SPOT. Screening Passengers by Observation Techniques. Walking with the New Shoe Bombers. Airport security. (TC) ES52, 2007

 

OFFICER AND AGENT METHODOLOGY AND CUNNING


METHODOLOGY

Art of Distraction. Multifaceted subject including performing distraction and false operations. (TC) ES48, 2007
Bread Crumbs. Notes on spycraft: ● Hotels ● Time and Planning ● Distraction ● Disguise Techniques ● Room Entry ● Secret Messaging ● White Noise ● Personal Security ● False Trails ● Hiding Locations ● Countermeasures ● Illusion. (TC) ES96, 2015
Black Bag Operations. (TC) ES89, 2014
Brush Pass. Silent Spies and Communication. (TC) ES87, 2013
Coded Sentences and Responses. Spy Meetings and Liaisons. (TC) ES82, 2012
Common Espionage Techniques. (TC) ES56, 2008
Cover and Legend. The Art of Concealment. How the spy tradecraft of Cover and Legend works. (TC) ES82, 2012
Dirty Tricks, Disinformatioin, Distraction and Deceit. (TC) ES52, 2007
Field Stations. Everything you need to know about how they operate. (TC) ES40, 2006
Going Grey. How spies perform with near impunity. (TC) ES37, 2005/6
Hair Spray Trick. (TC) ES45, 2006
Identity Theft. Shredding your Identity. (TC) ES92, 2014
Identity Theft. Countermeasures. (TC) ES92, 2014
Infiltration. All aspects examined. (TC) ES44, 2006
Listening Trick. (TC) ES44, 2006
Match Trick. (TC) ES45, 2006
Origins of the Brush Pass. (TC) ES29, 2004
Recognition Signals. Silent Spies and Communication. (TC) ES87, 2013
Secrets of the Spy Trade. The Switch or Live Drop. Part 1. (TC) ES26, 2004
Secrets of the Spy Trade. Dead Letter Drops. Part 2. (TC) ES27, 2004
Secrets of the Spy Trade. Espionage Countermeasures. Part 3. (TC) ES29, 2004
Silent Spies and Communication. Agent liaison and the diverse methods in which spies, agents and handlers communicate using all manner of objects, ruses etc. to exchange materials in absolute silence. (TC) ES87, 2013
Spies in the Puzzle Palace. An examination of the various descriptions assigned to agents, officers, operation and assets. (TC) ES56, 2008
Spy Catching. Methods. (TC) ES42, 2006
Surveillance Watch Trick. (TC) ES40, 2006
Spy tradecraft explored. (TC) ES90, 2014
White Noise. Use of and creating. (TC) ES48, 2007



PHOTOGRAPHIC INTERPRETATION & UNDERSTANDING


PHOTOGRAPHIC INTERPRETATION

Image Interpretation. Photo, Film and Video Intelligence. Understanding information gleaned from imagery and film and the important role of a photo analyst. Context ● Understand Content ● Clues within Frames ● Military Application ● Evidence ● Forms of Collection ● Technology ● Signatures ● Creating Virtual Graphics ● Development. (TC) ES86, 2013
Photographic Interpretation. (TC) ES15, 2003



PHOTOGRAPHY - ALL ELEMENTS


PHOTOGRAPHY

Digital Photography. (TC) ES72, 2011
Digital SLR Cameras. (TC) ES73, 2011
Camera Lenses and keeping your camera steady. (TC) ES74, 2011
Correct Exposure and Metering. (TC) ES75, 2011
Focusing and Exposure. (TC) ES76, 2011
Night Photography and Image Intensifiers. (TC) ES77, 2012
Using Video. (TC) ES78, 2012
Utilising everyday objects to conceal covert cameras. (TC) ES49, 2007
Video Photography. Obtaining covert film footage. (TC) ES16, 2003
 

POSTAGE AND MAIL SECURITY


POSTAGE AND SECURITY

Bombs in Mail. Countermeasures. (TC) ES44, 2006
Letter and package handling and opening. Security Measures. (TC) ES44, 2006
Letter Box Bombs. The delivery system and product. Types of Bombs and Explosives ● Case Examples ● Fictitious Fronts ● Lone Wolves ● Airliners and Diplomats ● The Bombers ● Countermeasures ● Couriers and Hand Delivered Mail ● Suspicious Mail and Packages ● Warning Signs ● Security in Mail Rooms ● Statistics. (TC) ES82, 2012

 

SECURITY - PERSONAL, PHYSICAL, MENTAL AND COVERT
 

SECURITY

Deceptive Factor. Eye Spy examines a number of surprising individuals whose unusual skills and talents were utilised and adopted by those working in the intelligence world. In this feature the author looks at illusionist, conjuror, escapologist, actor, stunt performer and MI5 agent trainer Harry Houdini. Part 1. (TC) ES99, 2015
Deceptive Factor. MK Ultra, CIA training manual, distraction, confusion and slight of hand. Part 2. (TC) ES100, 2015
Defendo. Personal defence skills. (TC) ES19, 2003
Encounter Control in the Intelligence Cycle. ● Security and Defence Skills ● Offensive and Defensive driving ● Lock Picking ● Eavesdropping ● Armed and Unarmed Combat ● Awareness of Surroundings and Circumstances ● Field Operations ● Body Language ● Intelligence Collection ● Training Methods ● Weapons and Handling ● Improvised Weaponry ● Agent Confrontation. Part 1. (TC) ES88, 2013
Encounter Control in the Intelligence Cycle. Awareness. Avoiding dangerous situations. Part 2. (TC) ES89, 2014
Encounter Control in the Intelligence Cycle. Understanding body language and sensing dangerous environments Part 3. (TC) ES90, 2014
Encounter Control in the Intelligence Cycle. A fascinating look at the actual training programmes and those who created them. Part 4. (TC) ES91, 2014
Encounter Control in the Intelligence Cycle. The development of the knife as used in the intelligence cycle. Part 5. (TC) ES92, 2014
Encounter Control in the Intelligence Cycle. The Handgun as a Weapon of Defence. Handguns used by some intelligence agencies and tricks of the trade that can be used to disarm a gunman. Part 6. (TC) ES93, 2014
Encounter Control in the Intelligence Cycle. The Rope. How it has been used for centuries by soldiers, agents and assassins. Part 7. (TC) ES94, 2014
Encounter Control in the Intelligence Cycle. Sticks. How a freely available and natural product has been utilised around the world by various people, groups and even the security services. Part 8. (TC) ES95, 2015
Encounter Control in the Intelligence Cycle. Cuffs and Restraints. Security tools used throughout the world by police and Special Forces. Part 9. (TC) ES96, 2015
Hotel Security. Tips and espionage countermeasures. (TC) ES45, 2006
Intelligence and Security Projects. (TC) ES32, 2005
Safety (personal) Abroad. Tips and security guidance. (TC) ES25, 2004



SURVEILLANCE - ALL ELEMENTS


SURVEILLANCE

Surveillance Exposure Tips. A comprehensive examination of the most common errors committed by surveillance operatives working for government and private agencies. Hiding in Plain Sight. (TC) ES95, 2015
Anti-Surveillance. Interview with specialist trainer. (TC) ES59, 2008
Anti-Surveillance. The Art and Discipline of. Part 1. (TC) ES59, 2008
Anti-Surveillance. The Art and Discipline of. Part 2. (TC) ES60, 2009
Anti-Surveillance. Tactical Driving. All climates and conflict theatres. (TC) ES57, 2008
Anti-Surveillance. The art of. All measures examined. (TC) ES50, 2007
Counter-Surveillance. (TC) ES50, 2007
Dark Arts. Surveillance and Intelligence Gathering Tricks. (TC) ES44, 2006
Global Positioning System. GPS. Surveillance by Stealth. (TC) ES39, 2006
Rural Surveillance. Covert Rural Dipole. Building and use of a dipole for better rural communications. (TC) ES60, 2009
Surveillance. FBI-Style. (TC) ES38, 2006
Surveillance. Foot Surveillance. (TC) ES25, 2004
Surveillance Driving Skills. (TC) ES46, 2007
Surveillance Legislation in UK. (TC) ES41, 2006
Surveillance on the Underground. Techniques, methods and problem solving. (TC) ES55, 2008
Surveillance Operator. (TC) ES22, 2003
Surveillance Techniques. (TC) ES21, 2003
Surveillance Vehicles. Choice of and recognition of counter-surveillance. (TC) ES46, 2007
Surveillance Watch Trick. (TC) ES40, 2006
Surveillance. Mobile Surveillance. (TC) ES26, 2004
Surveillance. Triggers and Operations. (TC) ES23, 2004
Secret surveillance images from the STASI Archive. Feature on remarkable exhibition of covert STASI surveillance operations and tradecraft. (TC) ES75, 2011
Surveillance Intelligence. What Analysts Look For. (TC) ES76, 2011
The Changing Face of Surveillance. History, techniques, early methods, transport, communications, signs, authorities, regulations, operations and subterfuge. Informative overview covering the last one hundred years of this vital intelligence element. A Necessary Dark Art? Part 1. (TC) ES93, 2014
The Changing Face of Surveillance. Electronic Footprint. Post-war changes and new technologies. Surveillance. Part 2. (TC) ES94, 2014
Mobile Anti-Surveillance. (TC) ES59, 2008
Notes on Surveillance. (TC) ES65, 2009
Notes on Surveillance. Confirming Identity and Occupancy. Investigative methods to surveil difficult targets and confirm identity. (TC) ES76, 2011
Photography and Surveillance. Learning surveillance photography skills. Digital Photography. Part 1. (TC) ES72, 2011
Photography and Surveillance. Learning surveillance photography skills. Digital SLR Cameras. Part 2. (TC) ES73, 2011
Photography and Surveillance. Learning surveillance photography skills. Camera Lenses and Keeping Your Camera Steady. Part 3. (TC) ES74, 2011
Photography and Surveillance. Series on learning surveillance photography skills. Correct Exposure and Metering. Part 4. (TC) ES75, 2011
Photography and Surveillance. Learning surveillance photography skills. Focusing and Exposure. Part 5. (TC) ES76, 2011
Photography and Surveillance. Series on learning surveillance photography skills. Night Photography and Image Intensifiers. Part 6. (TC) ES77, 2012
Photography and Surveillance. Series on learning surveillance photography skills. Using Video. Part 7. (TC) ES78, 2012
Professional Surveillance Training. (TC) ES29, 2004
Vehicle surveillance tips for winter. (TC) ES44, 2006



THE FOURTH ESTATE - MEDIA AND INTEL WORLD


FOURTH ESTATE

OSINT. Open Source Intelligence. Secret Intelligence in the Media. (TC) ES91, 2014
Reporting for Spies. Intelligence and the Media. Sources and psychological warfare. (TC) ES52, 2007
SOCINT. Social Media Intelligence. Secret Intelligence in the Media. (TC) ES91, 2014
The use of journalists and media houses by the world of intelligence. (TC) ES94, 2014