22:
63:
248:. Case officers emphasize the elements of tradecraft that enable the agent to acquire needed information, and enable the case officer to communicate with and supervise the agent. Most importantly, case officers train agents in methods of avoiding detection by host nation counter-intelligence organizations.
320:, meaning how to establish credible pretexts for their presence and behavior while engaged in collection activities. A well-trained and competent agent can conduct his or her clandestine tasks while under close surveillance, and still evade detection. More advanced agent training can include resistance to
256:
By definition, an "agent" acts on behalf of another, whether another individual, an organization, or a foreign government. Agents can be considered either witting or unwitting, and in some cases, willing or unwilling. Agents typically work under the direction of a principal agent or a case officer.
231:
If principles of intelligence tradecraft have not been strictly observed, it is also possible that compromised agents can reveal information that exposes other members of the network. In the real world of espionage, human lapses are very much the norm, and violations of the principles of tradecraft
191:
A primary purpose of intelligence organizations is to penetrate a target with a human agent, or a network of human agents. Such agents can either infiltrate the target, or be recruited "in place". Case officers are professionally trained employees of intelligence organizations that manage human
211:
Using a principal agent as a cut-out, and ensuring that the human agent network is organized in a cellular fashion, can provide some protection for other agents in the network, as well as for the principal agent, and for the case officer if an agent in the network is compromised. Assuming that
312:, photography and the emplacement of audio devices, sensors, or other transmitters. Case officers generally train agents one at a time, in isolation, including only those elements of tradecraft needed to penetrate the target at hand. Case officers will also teach agents how to develop
199:
Sometimes, agent handling is done indirectly, through "principal agents" that serve as proxies for case officers. It is not uncommon, for example, for a case officer to manage a number of principal agents, who in turn handle agent networks, which are preferably organized in a
243:
A case officer is an intelligence officer who is a trained specialist in the management of agents and agent networks. Case officers manage human agents and human intelligence networks. Case officers spot potential agents, recruit prospective agents and train agents in
216:
have been strictly observed by the principal agent and the agents in the network, compromised agents will not be able to identify the case officer, nor the other members of the network. Ideally, agents may work side by side in the same office, and conduct their
260:
The identification of potential agents is termed "agent spotting" (also termed "talent spotting"). Identifying potential agents, and investigating the details of their personal and professional lives, involves the granular verification of their
276:
Approaches to potential agents can be multitudinous and considerable time can pass before the potential agent is maneuvered into a position where a recruitment "pitch" can be hazarded.
371:, Thomas Patrick Carroll, Syllabus, 5 September 2006 – 24 October 2006—many good definitions with historic examples and timely discussion of problems; in outline form.
1045:
1258:
809:
235:
If an agent is able to resist interrogation for a defined period of time, the odds improve that other members of the network can be alerted to the compromise.
366:
1055:
221:
collection activities with such discipline, that they will not realize that they are both engaged in espionage, much less members of the same network.
1188:
852:
228:
that can lead to the identification of a principal agent, the protection provided by cellular network organization can be time-sensitive.
835:
802:
707:
193:
1251:
892:
1080:
1050:
795:
690:
646:
1233:
127:
882:
641:
99:
396:
232:
are common. It is for this reason that agents are ideally trained to resist interrogation for a defined period of time.
826:
106:
542:
146:
1183:
1175:
577:
502:
1193:
80:
192:
agents and human agent networks. Intelligence that derives from such human sources is known by the abbreviation
113:
1124:
949:
864:
444:
84:
818:
95:
1241:
224:
Since an agent can sometimes identify his or her principal agent, however, or reveal information under
265:. Such activities can include uncovering personal details that leave potential agents vulnerable to
1156:
887:
171:(called secret agents or spies in common parlance), principal agents, and agent networks (called "
1208:
1198:
1146:
877:
527:
497:
389:
201:
73:
1284:
1223:
1161:
1141:
1090:
847:
257:
When agents work alone, and are not members of an agent network, they are termed "singletons".
1110:
776:
218:
120:
1213:
1151:
1037:
993:
978:
927:
872:
702:
685:
658:
421:
176:
172:
8:
1246:
1120:
937:
910:
764:
668:
416:
309:
205:
168:
160:
35:
Please help update this article to reflect recent events or newly available information.
1279:
1218:
1203:
1095:
1070:
1008:
959:
944:
653:
620:
594:
572:
567:
537:
522:
382:
297:
208:
for the case officer, buffering him or her from direct contact with the agent network.
1060:
769:
438:
1115:
1065:
734:
466:
1003:
932:
754:
729:
663:
625:
562:
351:
1100:
1273:
1018:
998:
983:
712:
680:
582:
557:
476:
321:
285:
225:
1105:
1023:
1013:
954:
759:
547:
532:
471:
456:
449:
305:
293:
289:
284:
Agent training often includes techniques of tradecraft such as clandestine
787:
915:
749:
615:
461:
988:
744:
724:
717:
697:
604:
262:
245:
213:
969:
964:
902:
739:
552:
481:
405:
301:
270:
62:
973:
587:
266:
673:
333:
374:
1259:
Counterintelligence and counter-terrorism organizations
204:. In such a case, the principal agent can serve as a
304:. Other elements of tradecraft include elicitation,
251:
273:, or other inducements, such as sexual approaches.
87:. Unsourced material may be challenged and removed.
1271:
354:, thefreedictionary.com, retrieved 4 March 2009
803:
390:
368:Human Intelligence: From Sleepers to Walk-ins
817:
810:
796:
397:
383:
147:Learn how and when to remove this message
1224:Scientific & Technical intelligence
1272:
647:Chinese espionage in the United States
791:
378:
186:
1046:By alliances, nations and industries
642:Chinese intelligence activity abroad
212:standard principles of intelligence
85:adding citations to reliable sources
56:
15:
708:Interpersonal (HUMINT) intelligence
13:
14:
1296:
543:Computer and network surveillance
360:
252:Agents, spotting, and recruitment
578:Short-range agent communications
61:
20:
1194:Words of estimative probability
1056:Operational platforms by nation
238:
167:is the management of so-called
72:needs additional citations for
345:
1:
404:
339:
7:
1242:Intelligence cycle security
327:
279:
10:
1301:
161:intelligence organizations
1232:
1174:
1134:
1079:
1036:
901:
863:
843:
834:
825:
634:
603:
513:
490:
412:
29:This article needs to be
300:, and the employment of
1209:Intelligence assessment
1199:All-source intelligence
819:Intelligence management
528:Covert listening device
498:Intelligence assessment
893:Operational techniques
848:Special reconnaissance
296:, the construction of
777:Targeted surveillance
177:intelligence officers
1214:Medical intelligence
1184:Competing hypotheses
994:Industrial espionage
979:Denial and deception
703:Industrial espionage
503:competing hypotheses
81:improve this article
1247:Counterintelligence
1162:Technical (TECHINT)
1157:Open-source (OSINT)
1147:Geospatial (GEOINT)
1121:Casualty estimation
310:countersurveillance
298:concealment devices
179:typically known as
1219:Military geography
1204:Basic intelligence
1142:Financial (FININT)
1083:signature (MASINT)
1009:One-way voice link
945:Concealment device
654:Cold War espionage
621:Front organization
595:Surveillance tools
573:Phone surveillance
568:One-way voice link
523:Concealment device
187:Human intelligence
1267:
1266:
1170:
1169:
1061:Direction finding
1051:In modern history
1032:
1031:
785:
784:
439:Agent provocateur
157:
156:
149:
131:
50:
49:
1292:
1066:Traffic analysis
1038:Signals (SIGINT)
873:Asset recruiting
841:
840:
832:
831:
812:
805:
798:
789:
788:
399:
392:
385:
376:
375:
355:
349:
318:cover for action
314:cover for status
202:cellular fashion
152:
145:
141:
138:
132:
130:
96:"Agent handling"
89:
65:
57:
45:
42:
36:
24:
23:
16:
1300:
1299:
1295:
1294:
1293:
1291:
1290:
1289:
1270:
1269:
1268:
1263:
1228:
1166:
1152:Imagery (IMINT)
1130:
1091:Electro-optical
1082:
1081:Measurement and
1075:
1028:
1004:Numbers station
933:Black operation
897:
859:
821:
816:
786:
781:
755:Sting operation
664:Black operation
630:
626:Limited hangout
608:
599:
563:Numbers station
515:
509:
486:
426:
408:
403:
363:
358:
350:
346:
342:
330:
282:
254:
241:
189:
153:
142:
136:
133:
90:
88:
78:
66:
53:
46:
40:
37:
34:
25:
21:
12:
11:
5:
1298:
1288:
1287:
1282:
1265:
1264:
1262:
1261:
1256:
1255:
1254:
1244:
1238:
1236:
1230:
1229:
1227:
1226:
1221:
1216:
1211:
1206:
1201:
1196:
1191:
1189:Target-centric
1186:
1180:
1178:
1172:
1171:
1168:
1167:
1165:
1164:
1159:
1154:
1149:
1144:
1138:
1136:
1132:
1131:
1129:
1128:
1118:
1113:
1111:Radiofrequency
1108:
1103:
1098:
1093:
1087:
1085:
1077:
1076:
1074:
1073:
1068:
1063:
1058:
1053:
1048:
1042:
1040:
1034:
1033:
1030:
1029:
1027:
1026:
1021:
1016:
1011:
1006:
1001:
996:
991:
986:
981:
976:
967:
962:
957:
952:
947:
942:
941:
940:
930:
925:
924:
923:
918:
907:
905:
899:
898:
896:
895:
890:
885:
880:
875:
869:
867:
861:
860:
858:
857:
856:
855:
844:
838:
836:Human (HUMINT)
829:
823:
822:
815:
814:
807:
800:
792:
783:
782:
780:
779:
774:
773:
772:
767:
757:
752:
747:
742:
737:
732:
727:
722:
721:
720:
715:
705:
700:
695:
694:
693:
688:
678:
677:
676:
671:
661:
656:
651:
650:
649:
638:
636:
632:
631:
629:
628:
623:
618:
612:
610:
601:
600:
598:
597:
592:
591:
590:
580:
575:
570:
565:
560:
555:
550:
545:
540:
535:
530:
525:
519:
517:
516:communications
511:
510:
508:
507:
506:
505:
494:
492:
488:
487:
485:
484:
479:
474:
469:
464:
459:
454:
453:
452:
442:
435:
433:Agent handling
429:
427:
425:
424:
419:
413:
410:
409:
402:
401:
394:
387:
379:
373:
372:
362:
361:External links
359:
357:
356:
343:
341:
338:
337:
336:
329:
326:
281:
278:
253:
250:
240:
237:
188:
185:
165:agent handling
155:
154:
69:
67:
60:
52:Spy management
51:
48:
47:
28:
26:
19:
9:
6:
4:
3:
2:
1297:
1286:
1285:Spies by role
1283:
1281:
1278:
1277:
1275:
1260:
1257:
1253:
1252:organizations
1250:
1249:
1248:
1245:
1243:
1240:
1239:
1237:
1235:
1234:Dissemination
1231:
1225:
1222:
1220:
1217:
1215:
1212:
1210:
1207:
1205:
1202:
1200:
1197:
1195:
1192:
1190:
1187:
1185:
1182:
1181:
1179:
1177:
1173:
1163:
1160:
1158:
1155:
1153:
1150:
1148:
1145:
1143:
1140:
1139:
1137:
1133:
1126:
1122:
1119:
1117:
1114:
1112:
1109:
1107:
1104:
1102:
1099:
1097:
1094:
1092:
1089:
1088:
1086:
1084:
1078:
1072:
1069:
1067:
1064:
1062:
1059:
1057:
1054:
1052:
1049:
1047:
1044:
1043:
1041:
1039:
1035:
1025:
1022:
1020:
1019:Steganography
1017:
1015:
1012:
1010:
1007:
1005:
1002:
1000:
999:Interrogation
997:
995:
992:
990:
987:
985:
984:Eavesdropping
982:
980:
977:
975:
971:
968:
966:
963:
961:
958:
956:
953:
951:
948:
946:
943:
939:
936:
935:
934:
931:
929:
926:
922:
919:
917:
914:
913:
912:
909:
908:
906:
904:
900:
894:
891:
889:
888:Direct action
886:
884:
883:Covert action
881:
879:
876:
874:
871:
870:
868:
866:
862:
854:
853:organizations
851:
850:
849:
846:
845:
842:
839:
837:
833:
830:
828:
824:
820:
813:
808:
806:
801:
799:
794:
793:
790:
778:
775:
771:
768:
766:
763:
762:
761:
758:
756:
753:
751:
748:
746:
743:
741:
738:
736:
733:
731:
728:
726:
723:
719:
716:
714:
713:interrogation
711:
710:
709:
706:
704:
701:
699:
696:
692:
689:
687:
684:
683:
682:
681:Eavesdropping
679:
675:
672:
670:
667:
666:
665:
662:
660:
657:
655:
652:
648:
645:
644:
643:
640:
639:
637:
633:
627:
624:
622:
619:
617:
614:
613:
611:
606:
602:
596:
593:
589:
586:
585:
584:
583:Steganography
581:
579:
576:
574:
571:
569:
566:
564:
561:
559:
558:Invisible ink
556:
554:
551:
549:
546:
544:
541:
539:
536:
534:
531:
529:
526:
524:
521:
520:
518:
512:
504:
501:
500:
499:
496:
495:
493:
489:
483:
480:
478:
477:Sleeper agent
475:
473:
470:
468:
465:
463:
460:
458:
455:
451:
448:
447:
446:
443:
441:
440:
436:
434:
431:
430:
428:
423:
420:
418:
415:
414:
411:
407:
400:
395:
393:
388:
386:
381:
380:
377:
370:
369:
365:
364:
353:
348:
344:
335:
332:
331:
325:
323:
322:interrogation
319:
315:
311:
307:
303:
299:
295:
294:one-time pads
292:, the use of
291:
287:
286:communication
277:
274:
272:
268:
264:
258:
249:
247:
236:
233:
229:
227:
226:interrogation
222:
220:
215:
209:
207:
203:
197:
195:
184:
182:
181:case officers
178:
174:
170:
166:
162:
151:
148:
140:
129:
126:
122:
119:
115:
112:
108:
105:
101:
98: –
97:
93:
92:Find sources:
86:
82:
76:
75:
70:This article
68:
64:
59:
58:
55:
44:
32:
27:
18:
17:
1024:Surveillance
1014:Resident spy
955:Cryptography
920:
760:Surveillance
548:Cyber spying
533:Cryptography
472:Resident spy
457:Double agent
437:
432:
367:
352:case officer
347:
317:
313:
306:surveillance
290:cryptography
288:, including
283:
275:
259:
255:
242:
239:Case officer
234:
230:
223:
210:
198:
190:
180:
164:
158:
143:
134:
124:
117:
110:
103:
91:
79:Please help
74:verification
71:
54:
41:October 2023
38:
30:
1096:Geophysical
878:Cell system
865:Clandestine
750:Stay-behind
659:Recruitment
616:Canary trap
514:Devices and
462:Field agent
219:clandestine
1274:Categories
1125:earthquake
989:False flag
827:Collection
745:Sexpionage
725:COINTELPRO
718:safe house
698:False flag
635:Operations
609:techniques
605:Tradecraft
340:References
302:dead drops
263:bona fides
246:tradecraft
214:tradecraft
137:March 2012
107:newspapers
1280:Espionage
1116:Materials
970:Defection
965:Dead drop
938:black bag
903:Espionage
669:black bag
553:Dead drop
482:Spymaster
406:Espionage
271:blackmail
206:"cut-out"
1176:Analysis
974:Turncoat
921:handling
735:SHAMROCK
588:microdot
491:Analysis
328:See also
280:Training
267:coercion
1123: (
1101:Nuclear
1071:TEMPEST
730:MINARET
674:wetwork
175:") by
121:scholar
31:updated
960:Cutout
911:Agents
765:Global
691:MASINT
686:SIGINT
538:Cutout
422:Assets
417:Agents
334:Minder
316:, and
194:HUMINT
173:assets
169:agents
123:
116:
109:
102:
94:
1135:Other
1106:Radar
950:Cover
928:Asset
916:field
450:Agent
445:Cover
128:JSTOR
114:books
770:Mass
740:FVEY
467:Mole
308:and
100:news
607:and
159:In
83:by
1276::
972:/
324:.
269:,
196:.
183:.
163:,
1127:)
811:e
804:t
797:v
398:e
391:t
384:v
150:)
144:(
139:)
135:(
125:·
118:·
111:·
104:·
77:.
43:)
39:(
33:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.