Tradecraft Archive






From the pages of Eye Spy Intelligence Magazine since May 2001

 

ANALYSIS - INTELLIGENCE AND INFORMATION


ANALYSIS - INTELLIGENCE

Analysis as a tradecraft. The CIA's Hazy Crystal Ball. An indepth feature examines the difficult role of an intelligence analyst and covers multiple elements including the intelligence process. (TC) ES98, 2015
Counter Intelligence. The Secret World of. Part 1 (TC). Wartime Double-agents; Double-Cross System; classification of information; third party listeners; protective security; over-classification; polygraph testing; ideology; defections; surveillance; human intelligence; exposure; spy locations; propaganda; geospatial mapping; interceptions; espionage; agent running; operations; spy satellites; cyber operations; spy overflights; electronic jamming; budgets; physical/object security; deceptions; imagery intelligence; signals intelligence; countermeasures; technical operations; confusion agents; military feints; organisations; front companies; proxies. All elements analysed. Major tradecraft feature by Dr Chris Northcott. ES105, 2016
Counter Intelligence. The Secret World of. Part 2 (TC). Major tradecraft feature by Dr Chris Northcott. ES106, 2016
Counter Intelligence. The Secret World of. Part 3 (TC). Major tradecraft feature by Dr Chris Northcott. ES107, 2017
Counter Intelligence. The Secret World of. Part 4 (TC). Major tradecraft feature by Dr Chris Northcott. ES108, 2017
Fake documentation. Invoices, inheritance, trade deals etc. (TC) ES47, 2007
Gathering intelligence from tickets, receipts, documents etc. Tickets Please. Feature. (TC) ES41, 2006
HUMINT. Human Intelligence. Its Uses and Limits. Part 2. Dr Chris Northcott. Types of intelligence sources; flexible roaming agents; types of sources; quality assessment of HUMINT; penetration agents; physical tradecraft; surveillance and agent detection; methods used to cultivate and protect sources; fabrication; using Open Source Intelligence OSINT; decision making using HUMINT; counter-intelligence; counter-espionage; technology; debriefing and analysis of HUMINT. (TC). ES102, 2016
HUMINT. Human Intelligence. Part 1. Dr Chris Northcott examines the crucial intelligence tradecraft known as HUMINT. Single person espionage; sources; information reliability; disinformation; cultivating sources; agents-in-place; hiding in plain sight; diplomatic and military objectives; architectural spies; cover and legend; military sources; multi-operative spy rings and much more. This two part feature covers every element associated with this vital intelligence element. (TC). ES101, 2016
Importance of Identification. Evidence collection and verification, including disguise techniques. Part 1. (TC) ES75, 2011
Importance of Identification. Evidence collection and verification, including disguise techniques. Part 2. (TC) ES76, 2011
SITREP. Situation Report. (TC) ES87, 2013
Spy Catching. Methods. (TC) ES42, 2006
Submarines and Intelligence. Informative overview covering the last one hundred years of this vital intelligence element. (TC) ES94, 2014
Surveillance. What Analysts Look For. (TC) ES76, 2011
Training the 21st Century Operative. (Intelligence requirements). (TC) ES28, 2004
Training the 21st Century Operative. Total intelligence requirements. (TC) ES28, 2004
Understanding Intelligence. Future technologies. ● Active Camouflage ● Nanotechnology ● Information Technology ● Adaptive Body Armour ● Kinetic Energy Weapons ● Laser Weapons ● High Power Microwave Weapons ● Charged Particle Beams. Part 1. (TC) ES34, 2005
Understanding Intelligence. Forensics and DNA as an intelligence element. Part 2. (TC) ES35, 2005
Understanding Intelligence. Money Laundering. Part 3. (TC) ES36, 2005
Understanding Intelligence. Digital Footprints Part 4. (TC) ES37, 2005/6
Understanding Intelligence. Profiling a Terrorist. Characteristics. Part 5. (TC) ES38, 2006
Understanding Intelligence. Unrestricted Warfare. Cultural ● Economic ● Environmental ● Financial ● Narcotics ● International Law ● Media ● Telecommunications ● Politics ● Psychology ● Resources ● Smuggling ● Technologies ● Terrorism ● criminals and gangs. Part 6. (TC) ES40, 2006
Understanding Intelligence. Tracking Terror Money (proceeds of). Specialist Equipment ● Accommodation ● Weapons Purchases ● Specialist Training ● Communications Equipment ● Food and Beverages ● Car Hire and Transport ● Storage Facilities ● Training Camps ● Explosives Training ● New Identities ● Weapons Training ● Domestic and International Air Travel. Part 7. (TC) ES42, 2006
Understanding Intelligence. Technology Warfare ● Composite Materials ● Alloys ● Superconductive Conductors ● Nano Materials ● Automated and Robotic Production Technologies ● Telecommunication Transmission ● Switching and Network Management Capabilities ● Lasers ● Optics and Power Systems Technologies ● Biomedical Technologies ● Space Sensor Technology ● Advanced Electronic Devices ● Components and Optical Circuits ● Acoustic and Electro-Optic Sensors ● Aerospace Structures and Propulsion Systems ● Directed Energy and Kinetic Energy Applications. Part 8A. (TC) ES43, 2006
Understanding Intelligence. Profile of A Corporate Spy. ● Use of private sector organisations, front companies, and joint ventures ● Classic agent recruitment (getting employees to turn over materials) ● Employees looking to sell materials, information and samples ● Elicitation during international conferences and trade fairs ● Kidnapping and extortion of corporate executives ● Eavesdropping of employees in hotel, meeting rooms, and public places ● Dumpster diving (looking in a company's trash) ● Surveillance and surreptitious or covert entry ● Hacking computer systems ● Laptop computer theft. Part 8B. (TC) ES43, 2006
Understanding Intelligence. Cyber Terrorism. Computer viruses ● Logic Bombs ● Denial of Service Attacks ● Software Vulnerability Exploitation ● Intent to Acquire ● Basic, Intermediate and Advanced Data Weapons. Part 9. (TC) ES44, 2006
Understanding Intelligence. Financial Warfare Part One. The Counterfeit Kings. All aspects investigated and countermeasures. ● Buffer Overflow ● POD - Ping of Death ● Smurf Attack ● TCP SYN Attack ● Tear Drop ● Watermark ● Colour Shifting Ink ● Paper Quality ● Printing ● Metal Thread ● Hologram ● Serial Numbers ● Coins. Part 10A. (TC) ES46, 2007
Understanding Intelligence. Financial Warfare Part Two. Indirect Attacks. Fake Invoices, Leaders, Inheritance, Financing, Foreign Nationals, Charities, Trade Deals, Scholarships, Lotteries and Asset Transfers. Part 10B. (TC) ES47, 2007
Understanding Intelligence. E-Bombs. Transient Electromagnetic Pulse Devices. Construction ● Operation ● Application ● Impact ● Protection. Part 11. (TC) ES50, 2007
Understanding Intelligence. Insider Threats. Part 12. (TC) ES51, 2007
Unrestricted Warfare. Full spectrum of modalities. (TC) ES40, 2006
 

AGENT COMMUNICATION - ALL ELEMENTS
 

AGENT COMMUNICATIONS

Communicating (methods) with Spies. (TC) ES69, 2010
Communication, Observation and Concealment. (TC) ES44, 2006
Recognition Signals. Silent Spies and Communication. (TC) ES87, 2013
Signal Sites. Silent Spies and Communication. Feature. (TC) ES87, 2013
Silent Spies and Communication. Agent liaison and the diverse methods in which spies, agents and handlers communicate using all manner of objects, ruses etc. to exchange materials in absolute silence. (TC) ES87, 2013

 

A-Z LANGUAGE OF SPIES
 

A-Z LANGUAGE
A-Z Language of Spies. Tradecraft series. Authentic and unusual terminology used by those operating in the world of intelligence. From Bag Man to Expired. Fascinating descriptions and fully explained

A-Z Language of Spies. Secret sayings, meanings and acronyms. (TC) ES63, 2009
A-Z Language of Spies. Part 1. (TC). ES55, 2008
A-Z Language of Spies. Part 2. (TC). ES57, 2008
A-Z Language of Spies. Part 3. (TC). ES63, 2009
A-Z Language of Spies. Part 4. (TC). ES91, 2014
A-Z Language of Spies. Part 5. Intelligence terminology, acronyms, creative and covert expressions. (TC). ES102, 2016
A-Z Language of Spies. Part 6. Intelligence terminology, acronyms, creative and covert expressions. (TC). ES104, 2016
A-Z Language of Spies. Part 7. Intelligence terminology, acronyms, creative and covert expressions. (TC). ES105, 2016
A-Z Language of Spies. Part 8. Intelligence terminology, acronyms, creative and covert expressions. (TC). ES111, 2017
Roles and name designations given to those at the cutting edge of intelligence collection. (TC) ES56, 2008
SITREP. Situation Report. (TC) ES87, 2013
Spies in the Puzzle Palace. Feature. An examination of the various descriptions assigned to agents, officers, operation and assets. (TC). ES56, 2008

 

BODY LANGUAGE - ALL ELEMENTS

BODY LANGUAGE

Body Language. Eye Spy examines the fascinating subject of body language and why more intelligence services are becoming less reliant on observation. Would I Lie to You? Feature. Part 1. (TC) ES97, 2015
Body Language. Eye Spy examines the fascinating subject of body language and why more intelligence services are becoming less reliant on observation. Would I Lie to You? Part 2. (TC) ES98, 2015
Body Language. Misreading. (TC) ES90, 2014
CCTV clip of Mohammed Atta passing through airport terminal at Portland Maine now being used as a training tool for security personnel. Emphasis on body language. ES98, 2015
Understanding body language and sensing dangerous environments. (TC) ES90, 2014

 

BUGS, EAVESDROPPING AND COUNTERMEASURES


BUGS

Are You Being Bugged? Countermeasures. (TC) ES14, 2002
Battle of Bugs and Eavesdropping. Comprehensive notes on wire-taps, targets and counter-surveillance. (TC) ES41, 2006
Bugs and the Culture of Interception. Historical overview. From Mechanical to Digital. Part 1. (TC) ES87, 2013
Bugs and the Culture of Interception. Historical overview. A Very Public Insight. Part 2. (TC) ES88, 2013
Bugs and the Culture of Interception. Historical overview. The Strange Journey of Mr Borland. Part 3. (TC) ES89, 2014
Bugs and the Culture of Interception. Historical overview. The Royal Intercepts. Part 4. (TC) ES90, 2014
Bugs. An array of notes on covert recording, bugs and countermeasures. (TC) ES48, 2007
Can You Trust The Telephone? Telephone Tapping. (TC) ES13, 2002
Listening Devices. Placement. (TC) ES44, 2006
New Techniques for an Old Profession. Feature. (TC) ES24, 2004
Phone taps and countermeasures. Feature. (TC) ES32, 2005
Room Bugs and Radio Microphones. (TC) ES11, 2002
Talking without Words. Secret communications and signs. (TC) ES42, 2006
Telephone Tap Countermeasures. What the ordinary person can do. (TC) ES32, 2005



CELL PHONE INTERCEPTION AND COUNTERMEASURES


CELL PHONES

Car Park Tradecraft. Silent Spies and Communication. (TC) ES87, 2013
Cell Phone. See Communication and Espionage. Part 2. Major Feature. (TC) ES111, 2017
Cell Phone Espionage. New methods to intercept any phone and the history of cell phone espionage and bugging technology. (TC). ES74, 2011
Cell Phone Interception Countermeasures. Targets and Opportunity. (TC) ES92, 2014
Cell Phone Tapping. Total cell phone security not achievable. (TC) ES88, 2013
Cell Phone Tracking and Interception. (TC) ES77, 2012



COMMUNICATIONS AND COURIERS


COMMUNICATION

10 Communication Methods. Tradecraft. Indepth examination of unusual methods of agent contact and intelligence collection. Major Feature. ES113, 2018
Coded Sentences and Responses. (See Delisle, Sub-Lt. Jeffrey. Feature. Spy Meetings and Liaisons). (TC) ES82, 2012
Communication and Espionage. Adventure in Time. Part 2. Major Feature. (TC) ES111, 2017
Communication and Espionage. Adventure in Time. Part 3. Major Feature. (TC) ES113, 2018
Communication and Espionage. Whilst the objective of intelligence collection has changed little over time, the methods and means by which it is achieved has. A detailed examination of communications spycraft from buttons and knitting to today's most secretive ways of passing and receiving intelligence. Today's new espionage playground. Adventure in Time. New Cloak Less Dagger. Part 1. Major Feature. (TC) ES110, 2017
Communication with spies. Dark Web. Indepth feature on the Internet space known as the DarkWeb, Darknets, Deep Web, Invisible Web and Undernet. An Intelligence Perspective. Major Feature. ES113, 2018
Covert Rural Dipole. (Building and use of a dipole for better rural communications). (TC). ES60, 2009
Espionage and Counter-Terrorism. All traits, ruses, and skills. (TC) ES50, 2007
Exchange materials in absolute silence. (TC) ES87, 2013
Intelligence Couriers and Communications. Types of courier, how they operate and communicate. (TC) ES49, 2007
Removal Firms. Information forwarding. (TC) ES72, 2011
Talking without Words. Secret communications and signs. (TC) ES42, 2006



CORPORATE ESPIONAGE


CORPORATE

Corporate Espionage. Insider Threats. (TC) ES51, 2007
Corporate Espionage. New intelligence gathering methods. (TC) ES56, 2008
Hotel Security. Tips and espionage countermeasures. (TC) ES45, 2006
Persons of Interest. Espionage dangers for overseas business people. (TC) ES45, 2006
Profile of A Corporate Spy. ● Use of private sector organisations, front companies, and joint ventures ● Classic agent recruitment (getting employees to turn over materials) ● Employees looking to sell materials, information and samples ● Elicitation during international conferences and trade fairs ● Kidnapping and extortion of corporate executives ● Eavesdropping of employees in hotel, meeting rooms, and public places ● Dumpster diving (looking in a company's trash) ● Surveillance and surreptitious or covert entry ● Hacking computer systems ● Laptop computer theft. (TC) ES43, 2006
Understanding Intelligence. Insider Threats. (TC) ES51, 2007

 

COUNTER-TERRORISM - ALL ELEMENTS


COUNTER-TERRORISM


Counter-Terrorism and Intelligence. Signs and Definition. Series covers: ● Intelligence Collection ● Threat Analysis (assessing the threat posed by groups and individuals) ● Service Coordination ● National Infrastructure ● Risk Assessment ● Counter-Intelligence ● Site Security (including locations such as airports, military facilities, weapons or hazardous storage and production sites).
Part 1. (TC) ES77, 2012
Counter-Terrorism and Intelligence. Contact, Creation, Insurgency. ● Tools of the Trade ● Objectives and Options ● Forms of Terrorism from Biological to Suicide Attacks ● Estimating Longevity of Threat ● Predicting Attacks ● Analysis of Terror Groups ● Statistics ● Structure of Terror Groups ● Finance ● Operational Capability ● Weaknesses ● Associations ● Operational Landscape ● Strength.
Part 2. (TC) ES78, 2012
Counter-Terrorism and Intelligence. Invisible Opponents: Identifying terrorist types and their objectives. ● Revolutionaries ● National Appeal ● Political Motives ● Separatism ● Religion ● Lone Wolves ● Forms of Terrorism ● Political Terrorism ● Nuclear Terrorism ● Money as a Motivation ● Poisons and Toxins ● Water Contamination ● Explosives ● Unconventional Attacks ● The Media ● Countermeasures.
Part 3. (TC) ES79, 2012
Counter-Terrorism and Intelligence. Informants, HUMINT, Liaison and Agent Control. ● Human Intelligence ● Agent Control and Relationship ● Organisation and Control ● Task Forces ● Electronic Intelligence ● Analysis ● Training ● Warning Systems.
Part 4. (TC) ES80, 2012
Counter-Terrorism and Intelligence. The Sponsors of Terrorism. Designated Countries ● Political Influence ● Covert Official Support ● Operations ● Secret Sponsors ● Hatred and Ideology ● Strategy and Motivation ● Regime Change ● Assassinations ● Blue on Green Attacks ● Front Organisations.
Part 5. (TC) ES81, 2012
Counter-Terrorism and Intelligence. Letter Box Bombs: Delivery System and Product. Types of Bombs and Explosives ● Case Examples ● Fictitious Fronts ● Lone Wolves ● Airliners and Diplomats ● The Bombers ● Countermeasures ● Couriers and Hand-Delivered Mail ● Suspicious Mail and Packages ● Warning Signs ● Security in Mail Rooms ● Statistics.
Part 6. (TC) ES82, 2012
Counter-Terrorism and Intelligence. IEDs: Improvised Explosive Devices. Technology ● Access to Products ● IED Description ● Worldwide Attacks ● Adapted Items ● Transportation ● Electronic Advances ● Utilisation ● Training ● Countermeasures ● Types of Explosives ● Cell Phone IEDs ● Personal Body-worn IEDs ● Placement ● Locating IEDs ● Future IEDs.
Part 7. (TC) ES83, 2013
Counter-Terrorism and Intelligence. Super Terrorism. Radiological ● Biological ● Chemical ● WMD ● Toxic Poisons ● Diseases and Infections ● Entomological Warfare ● Plutonium ● ABC ● CBRN ● UAT ● Polonium-210 ● Dirty Bombs ● Pathogens and Germ Warfare ● Uranium ● Bubonic Plague ● West Nile Virus ● Anthrax ● Smallpox ● Super Poisons ● Water Security.
Part 8. (TC) ES83, 2013
Counter-Terrorism and Intelligence. The Gateway: Infiltration and Disruption. Intelligence Collection by Circumnavigation ● Roleplay and Tradecraft ● Using Ideology as Gateways ● Recruitment ● Electronic Advantage. Part 9. (TC) ES85, 2013
Counter-Terrorism and Intelligence. A Second in Time. Failures ● Strategy ● Errors ● Signs and Cooperation ● Cryptic Clues ● Word Exchange ● Intercepts ● Service Personnel and Agencies ● Terror Group MO ● Prevention ● Momentary Lapses ● Security ● Planning ● Planning for the Unforeseen.
Part 10. (TC) ES86, 2013
Counter-Terrorism and Intelligence. The Hidden Hand. Terrorist Planning ● Detection and Prediction ● Border Security ● Chemical Weapons ● The Internet as a Recruiting and Communication Platform ● Cyber Disruption ● Security Checks and Clearance ● Infiltration ● Disruption ● Nuclear Proliferation ● Cooperation ● Funding ● WMD ● Threat Levels - Garden Variety/Mercenary/Nation State.
Part 11. (TC) ES87, 2013
Counter-Terrorism Surveillance Notes. (TC) ES76, 2011
Counter-Terrorism. Profiling, Countermeasures, Counter-Surveillance. (TC) ES61, 2009
Couriers and Counter-Terrorism. All traits, ruses, and skills. (TC) ES50, 2007
Profiling a Terrorist (TC). ES38, 2006
TAV. Terrorist Attack by Vehicle. Compilation of recent incidents. A Growing Trend. Feature. ES111, 2017
Terrorism Finance. Feature. Choking Point. ES20, 2003
Terrorism Finance. Feature. Tracking Terror Money. ES42, 2006
Terrorism. Feature. Super Terrorism (biological, chemical, nuclear). ES5, 2001
Terrorism. Listing of terrorist attacks in Turkey 2016. ES104, 2016
Terrorism. Media reporting on terrorism. Headlines and reader psychology. Fear Factor. Feature. ES110, 2017
Terrorism. State sponsors. ES81, 2012
Terrorism. Statistics of global attacks and arrests from 11 September 2001 - 11 September 2011. ES78, 2012
Terrorism. Statistics of US attacks and arrests from 1968 - 1970. ES78, 2012
Terrorist Agenda. ES77, 2012
Terrorist Attack Profile. Primary dimensions. ES110, 2017
Terrorist Countermeasures. Feature on new anti-bomb equipment. ES31, 2004/5
Terrorist Distraction Operations. Feature. ES48, 2007
Terrorist Financiers. ES42, 2006
Terrorist Hunters. (See Andy Hyman), ES64, 2009
Terrorist Identification. Feature. ES58, 2008
Terrorist Profiling. Feature. ES38, 2006
Terrorist Profiling. Feature. ES43, 2006
Terrorist Profiling. Feature. ES61, 2009
Terrorist Reconnaissance. ES61, 2009
Terrorist Screening Center. (FBI). ES40, 2006
Terrorist Surveillance. Feature. ES61, 2009
Terrorist Warfare. Feature. ES58, 2008
Terrorist. Profiling A Terrorist. Is there a profile which fits all person intent on terrorism? Detection. Major Feature. ES110, 2019
Tracking Terror Money. Procedures and Methods. Feature. (TC) ES42, 2006



CYBER, COMPUTER, ESPIONAGE AND COUNTERMEASURES


CYBER

Alternative Hacking. Case files which show the good, bad, fascinating and ugly side of operational interference. Major Feature. ES108, 2017
Covert Computer Monitoring. Espionage and countermeasures. (TC) ES12, 2002
Cryptocurrencies. A Primary Tool of Espionage. Major Feature. ES111, 2017
Dark Web. Communication with spies. Dark Web. Indepth feature on the Internet space known as the DarkWeb, Darknets, Deep Web, Invisible Web and Undernet. An Intelligence Perspective. Major Feature. ES113, 2018
Dark Web. International law enforcement and security countermeasures. Open source, mass surveillance, seized data, tracking money, postal system etc. Feature. ES113, 2017
Digital Footprints (TC) ES37, 2005/6
Insider Threats. (TC) ES51, 2007
The Changing Face of Surveillance. Electronic Footprint. Post-war changes and new technologies. Surveillance. Part 2. (TC) ES94, 2014
The Internet as a Recruiting and Communication Platform. (TC) ES87, 2013
Understanding Intelligence. Cyber Terrorism. Computer viruses ● Logic Bombs ● Denial of Service Attacks ● Software Vulnerability Exploitation ● Intent to Acquire ● Basic, Intermediate and Advanced Data Weapons. (TC) ES44, 2006
Understanding Intelligence. E-Bombs. Transient Electromagnetic Pulse Devices. Construction ● Operation ● Application ● Impact ● Protection. (TC) ES50, 2007



DISTRACTION TECHNIQUES AND OPERATIONS


DISTRACTION

Distraction operations and techniques in all environments. (TC) ES48, 2007



DISGUISE TECHNIQUES - ALL LEVELS


DISGUISE

Disguise Techniques. Magic and Illusion. Primary Elements and Components. Part 1. (TC) ES51, 2007
Disguise Techniques. Make-up, Dress and Behaviour. Part 2. (TC) ES52, 2007
Disguise Techniques. Art of Illusion. Dangers of Overuse. Part 3. (TC) ES53, 2008
Importance of Identification. Disguise Techniques. Part 1 (TC) ES75, 2011
Importance of Identification. Disguise Techniques. Part 2 (TC) ES76, 2011
Trading Places: The Professionals. Creating and using realistic disguises by film make-up artist. (TC) ES75, 2011



DIY - EQUIPMENT BUILDING - IMPROVISED


DIY

DIY Series. Build a long-range video or camera. Part 1. (TC) ES44, 2006
DIY Series. Build a room transmitter and receiver kit. Part 2. ES45, 2006
DIY Series. Document copy fluid; invisible ink, plastic for various applications including moulding. Part 3. (TC) ES47, 2007
DIY Series. Recordings only you can hear. Build a sound amplifier; through wall listening device, parabolic microphone. Part 4. (TC) ES48, 2007
DIY Series. Utilising everyday objects to conceal covert cameras. Part 5. (TC) ES49, 2007


DRIVING, VEHICLES, TRACKING - ALL ELEMENTS


DRIVING

Car Park Tradecraft. Silent Spies and Communication. (TC) ES87, 2013
Foundations of Tactical Driving. Instructional feature for professional drivers in all operational and security environments, including surveillance. Surveillance Driving Skills. (TC) ES46, 2007
Surveillance. Mobile Surveillance. (TC) ES26, 2004
Surveillance Vehicles. Choice of vehicle and recognition of counter-surveillance vehicles. (TC) ES46, 2007
Technical Tracking Devices. (TC) ES27, 2004
Vehicle Security Tactics. (TC) ES16, 2003
Vehicle surveillance tips for winter. (TC) ES44, 2006
Vehicle Tracking. (TC) ES15, 2003



HOSTILE ENVIRONMENT AND HOSTAGE SURVIVAL - ALL ELEMENTS


HOSTILE ENVIRONMENT

Escape and Evasion. Teachings of the Russian System. (TC) ES14, 2002
HEAT. Hostile Environment Awareness Training. (TS) ES30 2004/5
Hostage Survival: Guidance to the Initial Responder. (TC) ES63, 2009
Hostage Takers. Intelligence insight and methodology that will help you understand and survive. (TC) ES57, 2008
Hostage Taking. Minimising the Risks. (TC) ES58, 2008
Hostile Environment Training. (TC) ES38, 2006
Rules of Hostage Survival. Surviving Captivity. Part 1. (TC) ES61, 2009
Rules of Hostage Survival. Surviving Captivity. Part 2. (TC) ES62, 2009



IDENTITY - COVER AND LEGEND


IDENTITY

Art of Distraction. Multifaceted subject including performing distraction and false operations. (TC) ES48, 2007
Cover and Legend. The Art of Concealment. How the spy tradecraft of Cover and Legend works. (TC) ES82, 2012
Fake documentation. Invoices, inheritance, trade deals etc. (TC) ES47, 2007
Field Stations. Everything you need to know about how they operate. (TC) ES40, 2006
Going Grey. How spies perform with near impunity. (TC) ES37, 2005/6
Props. Beginning of Cover and Legend. (TC) ES82, 2012



INTERROGATION AND INTERVIEWS


INTERROGATION

Interrogation. Stratagem of Interrogation. The Sixteen Approaches. US Military Intelligence approach to the art of interrogation without the use of torture. (TC) ES80, 2012
Spy Catching. Methods. (TC) ES42, 2006



MISCELLANEOUS


MISCELLANEOUS


Exploding rats, garrotes, spikes and gadgets. SOE. The Lives of Others. Feature. ES113, 2018
Hard Pins. Identification pins and recognition insignia. (TC) ES14, 2002
Observation Skills (Test). (TC) ES44, 2006
Observation training. Feature - 60 Seconds: What do you see? (TC) ES69, 2010
Poor tradecraft leads to demise of CIA-FBI spy network in China. Chinese Whispers: Operation Honey Badger. Feature. ES109, 2017
Removal Firms. Information forwarding. (TC) ES72, 2011
Tickets Please. Gathering intelligence from tickets, receipts, documents etc. (TC) ES41, 2006
Tracking Terror Money. Procedures and Methods. (TC) ES42, 2006
Unrestricted Warfare. Full spectrum of modalities. (TC) ES40, 2006



OBSERVATION AND INTERPRETATION


OBSERVATION

Observation Skills. Test. (TC) ES44, 2006
Observation Training. 60 Seconds: What do you See? (TC) ES69, 2010
SPOT. Screening Passengers by Observation Techniques. Walking with the New Shoe Bombers. Airport security. (TC) ES52, 2007

 

OFFICER AND AGENT METHODOLOGY AND CUNNING


METHODOLOGY

Art of Distraction. Multifaceted subject including performing distraction and false operations. (TC) ES48, 2007
Black Bag Operations. (TC) ES89, 2014
Bread Crumbs. Notes on spycraft: ? Hotels ? Time and Planning ? Distraction ? Disguise Techniques ? Room Entry ? Secret Messaging ? White Noise ? Personal Security ? False Trails ? Hiding Locations ? Countermeasures ? Illusion. (TC) ES96, 2015
Brush Pass. Origins of the Brush Pass. Feature. (TC) ES29, 2004
Brush Pass. Silent Spies and Communication. (TC) ES87, 2013
Bugs. (Notes on covert recording, bugs and countermeasures). (TC) ES48, 2007
Chinese Entrapment. ES108, 2017
Coded Sentences and Responses. Spy Meetings and Liaisons. (TC) ES82, 2012
Common Espionage Techniques. (TC) ES56, 2008
Cover and Legend. Electronic Infiltration. Feature. ES113, 2018
Cover and Legend. See also Communication and Espionage. Part 2. Major Feature. (TC) ES111, 2017
Cover and Legend. The Art of Concealment. How the spy tradecraft of Cover and Legend works. (TC) ES82, 2012
Covert Action. Dirty Tricks or Trump Cards. The four elements: Propaganda, Political Action, Paramilitary Activities and Information Warfare. Dr Chris Northcott examines one of the most controversial intelligence tradecraft elements utilised surreptitiously throughout history by governments, armed forces, intelligence services, dictators, pressure groups and the underworld. Part 1. Dirty Tricks or Trump Card? (TC) Major Feature. ES103, 2016
Covert Action. Dr Chris Northcott. Part 2. Information Warfare. (TC) Major Feature. ES104, 2016
Dirty Tricks, Disinformatioin, Distraction and Deceit. (TC) ES52, 2007
Distraction Operations and Techniques - in all environments (TC) ES48, 2007
Elicitation. See Entrapment and Compromise. ES108, 2017
Entrapment and Compromise. A multi-faceted intelligence tradecraft used in numerous situations, from toppling presidents to recruiting spies. An indepth examination of its use and victims. From honeytraps, to gifts and fake news. Plus counter-measures. Major Feature. (TC) ES108, 2017
Field Stations. Everything you need to know about how they operate. (TC) ES40, 2006
Gathering intelligence from tickets, receipts, documents etc. Tickets Please. Feature. (TC) ES41, 2006
Going Grey. How spies perform with near impunity. (TC) ES37, 2005/6
Hair Spray Trick. (TC) ES45, 2006
Identity Theft. Countermeasures. (TC) ES92, 2014
Identity Theft. Shredding your Identity. (TC) ES92, 2014
Infiltration. All aspects examined. (TC) ES44, 2006
Listening Trick. (TC) ES44, 2006
Match Trick. (TC) ES45, 2006
Origins of the Brush Pass. (TC) ES29, 2004
Recognition Signals. Silent Spies and Communication. (TC) ES87, 2013
Robert Patrick Hoffman. 30-year prison term for would be spy. Tradecraft explored. (TC) ES90, 2014
Secrets of the Spy Trade. Dead Letter Drops. Part 2. (TC) ES27, 2004
Secrets of the Spy Trade. Espionage Countermeasures. Part 3. (TC) ES29, 2004
Secrets of the Spy Trade. The Switch or Live Drop. Part 1. (TC) ES26, 2004
Silent Spies and Communication. Agent liaison and the diverse methods in which spies, agents and handlers communicate using all manner of objects, ruses etc. to exchange materials in absolute silence. (TC) ES87, 2013
Single Agent Sourcing. ES108, 2017
Spies in the Puzzle Palace. An examination of the various descriptions assigned to agents, officers, operation and assets. (TC) ES56, 2008
Spy Catching. Methods. (TC) ES42, 2006
Spy tradecraft explored. (TC) ES90, 2014
Surveillance Watch Trick. (TC) ES40, 2006
Unintentional Entrapment. ES108, 2017
White Noise. Use of and creating. (TC) ES48, 2007
 



PHOTOGRAPHIC INTERPRETATION & UNDERSTANDING


PHOTOGRAPHIC INTERPRETATION

Image Interpretation. Photo, Film and Video Intelligence. Understanding information gleaned from imagery and film and the important role of a photo analyst. Context ● Understand Content ● Clues within Frames ● Military Application ● Evidence ● Forms of Collection ● Technology ● Signatures ● Creating Virtual Graphics ● Development. (TC) ES86, 2013
Photographic Interpretation. (TC) ES15, 2003



PHOTOGRAPHY - ALL ELEMENTS


PHOTOGRAPHY

Digital Photography. (TC) ES72, 2011
Digital SLR Cameras. (TC) ES73, 2011
Camera Lenses and keeping your camera steady. (TC) ES74, 2011
Correct Exposure and Metering. (TC) ES75, 2011
Focusing and Exposure. (TC) ES76, 2011
Night Photography and Image Intensifiers. (TC) ES77, 2012
Using Video. (TC) ES78, 2012
Utilising everyday objects to conceal covert cameras. (TC) ES49, 2007
Video Photography. Obtaining covert film footage. (TC) ES16, 2003
 

POSTAGE AND MAIL SECURITY


POSTAGE AND SECURITY

Bombs in Mail. Countermeasures. (TC) ES44, 2006
Letter and package handling and opening. Security Measures. (TC) ES44, 2006
Letter Box Bombs. The delivery system and product. Types of Bombs and Explosives ● Case Examples ● Fictitious Fronts ● Lone Wolves ● Airliners and Diplomats ● The Bombers ● Countermeasures ● Couriers and Hand Delivered Mail ● Suspicious Mail and Packages ● Warning Signs ● Security in Mail Rooms ● Statistics. (TC) ES82, 2012

 

SECURITY - PERSONAL, PHYSICAL, MENTAL AND COVERT
 

SECURITY


Deceptive Factor. Eye Spy examines a number of surprising individuals whose unusual skills and talents were utilised and adopted by those working in the intelligence world. In this feature the author looks at illusionist, conjuror, escapologist, actor, stunt performer and MI5 agent trainer Harry Houdini. Part 1. (TC) ES99, 2015
Deceptive Factor. MK Ultra, CIA training manual, distraction, confusion and slight of hand. Part 2. (TC) ES100, 2015
Deceptive Factor. Part Eight. Psychological Intelligence. Psy-ops, Psychological Warfare, Propaganda, Human Manipulation and Fake News. (TC) ES109, 2017
Deceptive Factor. Part Five. The Power of Misdirection. (TC) ES103, 2016
Deceptive Factor. Part Four. The Power of Misdirection. (TC) ES102, 2016
Deceptive Factor. Part Nine. MCI. Manipulation Control and Influence. Human conditioning and response technology. (TC) ES110, 2017
Deceptive Factor. Part Seven. The Art of Distraction. (TC) ES108, 2017
Deceptive Factor. Part Six. Mental and Physical Confusion. Confusing the brain; hedgehog defence; multiple choices; saccade process. (TC) ES105, 2016
Deceptive Factor. Part Ten. Intelligence and the Mind. Exploitation, operations and facilities. (TC) ES110, 2017
Deceptive Factor. Part Three. Seeing is Believing. Illusion, Perception, Misdirection and the Magic Gang. ES101, 2016
Defendo. Personal defence skills. (TC) ES19, 2003
Encounter Control in the Intelligence Cycle. ● Security and Defence Skills ● Offensive and Defensive driving ● Lock Picking ● Eavesdropping ● Armed and Unarmed Combat ● Awareness of Surroundings and Circumstances ● Field Operations ● Body Language ● Intelligence Collection ● Training Methods ● Weapons and Handling ● Improvised Weaponry ● Agent Confrontation. Part 1. (TC) ES88, 2013
Encounter Control in the Intelligence Cycle. Awareness. Avoiding dangerous situations. Part 2. (TC) ES89, 2014
Encounter Control in the Intelligence Cycle. Understanding body language and sensing dangerous environments Part 3. (TC) ES90, 2014
Encounter Control in the Intelligence Cycle. A fascinating look at the actual training programmes and those who created them. Part 4. (TC) ES91, 2014
Encounter Control in the Intelligence Cycle. The development of the knife as used in the intelligence cycle. Part 5. (TC) ES92, 2014
Encounter Control in the Intelligence Cycle. The Handgun as a Weapon of Defence. Handguns used by some intelligence agencies and tricks of the trade that can be used to disarm a gunman. Part 6. (TC) ES93, 2014
Encounter Control in the Intelligence Cycle. The Rope. How it has been used for centuries by soldiers, agents and assassins. Part 7. (TC) ES94, 2014
Encounter Control in the Intelligence Cycle. Sticks. How a freely available and natural product has been utilised around the world by various people, groups and even the security services. Part 8. (TC) ES95, 2015
Encounter Control in the Intelligence Cycle. Cuffs and Restraints. Security tools used throughout the world by police and Special Forces. Part 9. (TC) ES96, 2015
Escape and Evasion. Teachings of the Russian System. (TC) ES14, 2002
HEAT. Hostile Environment Awareness Training. (TS) ES30 2004/5
Hostage Survival: Guidance to the Initial Responder. (TC) ES63, 2009
Hostage Takers. Intelligence insight and methodology that will help you understand and survive. (TC) ES57, 2008
Hostage Taking. Minimising the Risks. (TC) ES58, 2008
Hostile Environment Training. (TC) ES38, 2006
Hotel Security. Tips and espionage countermeasures. (TC) ES45, 2006
Intelligence and Security Projects. (TC) ES32, 2005
Rules of Hostage Survival. Surviving Captivity. Part 1. (TC) ES61, 2009
Rules of Hostage Survival. Surviving Captivity. Part 2. (TC) ES62, 2009
Safety (personal) Abroad. Tips and security guidance. (TC) ES25, 2004
Weapons and Handling. Improvised weaponry, agent confrontation. Feature. (TC) ES88, 2013



SURVEILLANCE - ALL ELEMENTS


SURVEILLANCE

Surveillance Exposure Tips. A comprehensive examination of the most common errors committed by surveillance operatives working for government and private agencies. Hiding in Plain Sight. (TC) ES95, 2015
Anti-Surveillance. Interview with specialist trainer. (TC) ES59, 2008
Anti-Surveillance. The Art and Discipline of. Part 1. (TC) ES59, 2008
Anti-Surveillance. The Art and Discipline of. Part 2. (TC) ES60, 2009
Anti-Surveillance. Tactical Driving. All climates and conflict theatres. (TC) ES57, 2008
Anti-Surveillance. The art of. All measures examined. (TC) ES50, 2007
Counter-Surveillance. (TC) ES50, 2007
Covert Rural Dipole. (Building and use of a dipole for better rural communications). (TC). ES60, 2009
Dark Arts. Surveillance and Intelligence Gathering Tricks. (TC) ES44, 2006
Electronic Footprint. See Surveillance. Post-war changes and new technologies. See Tradecraft - Surveillance. The Changing Face of Surveillance. Part 2. ES94, 2014
Global Positioning System. GPS. Surveillance by Stealth. (TC) ES39, 2006
Rural Surveillance. Covert Rural Dipole. Building and use of a dipole for better rural communications. (TC) ES60, 2009
Surveillance. FBI-Style. (TC) ES38, 2006
Surveillance. Foot Surveillance. (TC) ES25, 2004
Surveillance Driving Skills. (TC) ES46, 2007
Surveillance Legislation in UK. (TC) ES41, 2006
Surveillance on the Underground. Techniques, methods and problem solving. (TC) ES55, 2008
Surveillance Operator. (TC) ES22, 2003
Surveillance Techniques. (TC) ES21, 2003
Surveillance Vehicles. Choice of and recognition of counter-surveillance. (TC) ES46, 2007
Surveillance Watch Trick. (TC) ES40, 2006
Surveillance. Mobile Surveillance. (TC) ES26, 2004
Surveillance. Triggers and Operations. (TC) ES23, 2004
Secret surveillance images from the STASI Archive. Feature on remarkable exhibition of covert STASI surveillance operations and tradecraft. (TC) ES75, 2011
Surveillance Intelligence. What Analysts Look For. (TC) ES76, 2011
The Changing Face of Surveillance. History, techniques, early methods, transport, communications, signs, authorities, regulations, operations and subterfuge. Informative overview covering the last one hundred years of this vital intelligence element. A Necessary Dark Art? Part 1. (TC) ES93, 2014
The Changing Face of Surveillance. Electronic Footprint. Post-war changes and new technologies. Surveillance. Part 2. (TC) ES94, 2014
Mobile Anti-Surveillance. (TC) ES59, 2008
Notes on Surveillance. (TC) ES65, 2009
Notes on Surveillance. Confirming Identity and Occupancy. Investigative methods to surveil difficult targets and confirm identity. (TC) ES76, 2011
Photography and Surveillance. Learning surveillance photography skills. Digital Photography. Part 1. (TC) ES72, 2011
Photography and Surveillance. Learning surveillance photography skills. Digital SLR Cameras. Part 2. (TC) ES73, 2011
Photography and Surveillance. Learning surveillance photography skills. Camera Lenses and Keeping Your Camera Steady. Part 3. (TC) ES74, 2011
Photography and Surveillance. Series on learning surveillance photography skills. Correct Exposure and Metering. Part 4. (TC) ES75, 2011
Photography and Surveillance. Learning surveillance photography skills. Focusing and Exposure. Part 5. (TC) ES76, 2011
Photography and Surveillance. Series on learning surveillance photography skills. Night Photography and Image Intensifiers. Part 6. (TC) ES77, 2012
Photography and Surveillance. Series on learning surveillance photography skills. Using Video. Part 7. (TC) ES78, 2012
Professional Surveillance Training. (TC) ES29, 2004
Vehicle surveillance tips for winter. (TC) ES44, 2006
Video Photography. Obtaining covert film footage. (TC) ES16, 2003



THE FOURTH ESTATE - MEDIA AND INTEL WORLD


FOURTH ESTATE

Fake News. Anatomy of a fake news story. It's the End of the World. Feature. ES110, 2017
Fake News. Hot to spot. ES110, 2017
Fourth Estate. A Necessary intelligence partner or enemy of the state? Fake News, Sources, Mischief and Information. Major Feature. ES110, 2017
OSINT. Open Source Intelligence. Secret Intelligence in the Media. (TC) ES91, 2014
Reporting for Spies. Intelligence and the Media. Sources and psychological warfare. (TC) ES52, 2007
SOCINT. Social Media Intelligence. Secret Intelligence in the Media. (TC) ES91, 2014
The use of journalists and media houses by the world of intelligence. (TC) ES94, 2014