Knowledge

Agent handling

Source 📝

22: 63: 248:. Case officers emphasize the elements of tradecraft that enable the agent to acquire needed information, and enable the case officer to communicate with and supervise the agent. Most importantly, case officers train agents in methods of avoiding detection by host nation counter-intelligence organizations. 320:, meaning how to establish credible pretexts for their presence and behavior while engaged in collection activities. A well-trained and competent agent can conduct his or her clandestine tasks while under close surveillance, and still evade detection. More advanced agent training can include resistance to 256:
By definition, an "agent" acts on behalf of another, whether another individual, an organization, or a foreign government. Agents can be considered either witting or unwitting, and in some cases, willing or unwilling. Agents typically work under the direction of a principal agent or a case officer.
231:
If principles of intelligence tradecraft have not been strictly observed, it is also possible that compromised agents can reveal information that exposes other members of the network. In the real world of espionage, human lapses are very much the norm, and violations of the principles of tradecraft
191:
A primary purpose of intelligence organizations is to penetrate a target with a human agent, or a network of human agents. Such agents can either infiltrate the target, or be recruited "in place". Case officers are professionally trained employees of intelligence organizations that manage human
211:
Using a principal agent as a cut-out, and ensuring that the human agent network is organized in a cellular fashion, can provide some protection for other agents in the network, as well as for the principal agent, and for the case officer if an agent in the network is compromised. Assuming that
312:, photography and the emplacement of audio devices, sensors, or other transmitters. Case officers generally train agents one at a time, in isolation, including only those elements of tradecraft needed to penetrate the target at hand. Case officers will also teach agents how to develop 199:
Sometimes, agent handling is done indirectly, through "principal agents" that serve as proxies for case officers. It is not uncommon, for example, for a case officer to manage a number of principal agents, who in turn handle agent networks, which are preferably organized in a
243:
A case officer is an intelligence officer who is a trained specialist in the management of agents and agent networks. Case officers manage human agents and human intelligence networks. Case officers spot potential agents, recruit prospective agents and train agents in
216:
have been strictly observed by the principal agent and the agents in the network, compromised agents will not be able to identify the case officer, nor the other members of the network. Ideally, agents may work side by side in the same office, and conduct their
260:
The identification of potential agents is termed "agent spotting" (also termed "talent spotting"). Identifying potential agents, and investigating the details of their personal and professional lives, involves the granular verification of their
276:
Approaches to potential agents can be multitudinous and considerable time can pass before the potential agent is maneuvered into a position where a recruitment "pitch" can be hazarded.
371:, Thomas Patrick Carroll, Syllabus, 5 September 2006 – 24 October 2006—many good definitions with historic examples and timely discussion of problems; in outline form. 1045: 1258: 809: 235:
If an agent is able to resist interrogation for a defined period of time, the odds improve that other members of the network can be alerted to the compromise.
366: 1055: 221:
collection activities with such discipline, that they will not realize that they are both engaged in espionage, much less members of the same network.
1188: 852: 228:
that can lead to the identification of a principal agent, the protection provided by cellular network organization can be time-sensitive.
835: 802: 707: 193: 1251: 892: 1080: 1050: 795: 690: 646: 1233: 127: 882: 641: 99: 396: 232:
are common. It is for this reason that agents are ideally trained to resist interrogation for a defined period of time.
826: 106: 542: 146: 1183: 1175: 577: 502: 1193: 80: 192:
agents and human agent networks. Intelligence that derives from such human sources is known by the abbreviation
113: 1124: 949: 864: 444: 84: 818: 95: 1241: 224:
Since an agent can sometimes identify his or her principal agent, however, or reveal information under
265:. Such activities can include uncovering personal details that leave potential agents vulnerable to 1156: 887: 171:(called secret agents or spies in common parlance), principal agents, and agent networks (called " 1208: 1198: 1146: 877: 527: 497: 389: 201: 73: 1284: 1223: 1161: 1141: 1090: 847: 257:
When agents work alone, and are not members of an agent network, they are termed "singletons".
1110: 776: 218: 120: 1213: 1151: 1037: 993: 978: 927: 872: 702: 685: 658: 421: 176: 172: 8: 1246: 1120: 937: 910: 764: 668: 416: 309: 205: 168: 160: 35:
Please help update this article to reflect recent events or newly available information.
1279: 1218: 1203: 1095: 1070: 1008: 959: 944: 653: 620: 594: 572: 567: 537: 522: 382: 297: 208:
for the case officer, buffering him or her from direct contact with the agent network.
1060: 769: 438: 1115: 1065: 734: 466: 1003: 932: 754: 729: 663: 625: 562: 351: 1100: 1273: 1018: 998: 983: 712: 680: 582: 557: 476: 321: 285: 225: 1105: 1023: 1013: 954: 759: 547: 532: 471: 456: 449: 305: 293: 289: 284:
Agent training often includes techniques of tradecraft such as clandestine
787: 915: 749: 615: 461: 988: 744: 724: 717: 697: 604: 262: 245: 213: 969: 964: 902: 739: 552: 481: 405: 301: 270: 62: 973: 587: 266: 673: 333: 374: 1259:
Counterintelligence and counter-terrorism organizations
204:. In such a case, the principal agent can serve as a 304:. Other elements of tradecraft include elicitation, 251: 273:, or other inducements, such as sexual approaches. 87:. Unsourced material may be challenged and removed. 1271: 354:, thefreedictionary.com, retrieved 4 March 2009 803: 390: 368:Human Intelligence: From Sleepers to Walk-ins 817: 810: 796: 397: 383: 147:Learn how and when to remove this message 1224:Scientific & Technical intelligence 1272: 647:Chinese espionage in the United States 791: 378: 186: 1046:By alliances, nations and industries 642:Chinese intelligence activity abroad 212:standard principles of intelligence 85:adding citations to reliable sources 56: 15: 708:Interpersonal (HUMINT) intelligence 13: 14: 1296: 543:Computer and network surveillance 360: 252:Agents, spotting, and recruitment 578:Short-range agent communications 61: 20: 1194:Words of estimative probability 1056:Operational platforms by nation 238: 167:is the management of so-called 72:needs additional citations for 345: 1: 404: 339: 7: 1242:Intelligence cycle security 327: 279: 10: 1301: 161:intelligence organizations 1232: 1174: 1134: 1079: 1036: 901: 863: 843: 834: 825: 634: 603: 513: 490: 412: 29:This article needs to be 300:, and the employment of 1209:Intelligence assessment 1199:All-source intelligence 819:Intelligence management 528:Covert listening device 498:Intelligence assessment 893:Operational techniques 848:Special reconnaissance 296:, the construction of 777:Targeted surveillance 177:intelligence officers 1214:Medical intelligence 1184:Competing hypotheses 994:Industrial espionage 979:Denial and deception 703:Industrial espionage 503:competing hypotheses 81:improve this article 1247:Counterintelligence 1162:Technical (TECHINT) 1157:Open-source (OSINT) 1147:Geospatial (GEOINT) 1121:Casualty estimation 310:countersurveillance 298:concealment devices 179:typically known as 1219:Military geography 1204:Basic intelligence 1142:Financial (FININT) 1083:signature (MASINT) 1009:One-way voice link 945:Concealment device 654:Cold War espionage 621:Front organization 595:Surveillance tools 573:Phone surveillance 568:One-way voice link 523:Concealment device 187:Human intelligence 1267: 1266: 1170: 1169: 1061:Direction finding 1051:In modern history 1032: 1031: 785: 784: 439:Agent provocateur 157: 156: 149: 131: 50: 49: 1292: 1066:Traffic analysis 1038:Signals (SIGINT) 873:Asset recruiting 841: 840: 832: 831: 812: 805: 798: 789: 788: 399: 392: 385: 376: 375: 355: 349: 318:cover for action 314:cover for status 202:cellular fashion 152: 145: 141: 138: 132: 130: 96:"Agent handling" 89: 65: 57: 45: 42: 36: 24: 23: 16: 1300: 1299: 1295: 1294: 1293: 1291: 1290: 1289: 1270: 1269: 1268: 1263: 1228: 1166: 1152:Imagery (IMINT) 1130: 1091:Electro-optical 1082: 1081:Measurement and 1075: 1028: 1004:Numbers station 933:Black operation 897: 859: 821: 816: 786: 781: 755:Sting operation 664:Black operation 630: 626:Limited hangout 608: 599: 563:Numbers station 515: 509: 486: 426: 408: 403: 363: 358: 350: 346: 342: 330: 282: 254: 241: 189: 153: 142: 136: 133: 90: 88: 78: 66: 53: 46: 40: 37: 34: 25: 21: 12: 11: 5: 1298: 1288: 1287: 1282: 1265: 1264: 1262: 1261: 1256: 1255: 1254: 1244: 1238: 1236: 1230: 1229: 1227: 1226: 1221: 1216: 1211: 1206: 1201: 1196: 1191: 1189:Target-centric 1186: 1180: 1178: 1172: 1171: 1168: 1167: 1165: 1164: 1159: 1154: 1149: 1144: 1138: 1136: 1132: 1131: 1129: 1128: 1118: 1113: 1111:Radiofrequency 1108: 1103: 1098: 1093: 1087: 1085: 1077: 1076: 1074: 1073: 1068: 1063: 1058: 1053: 1048: 1042: 1040: 1034: 1033: 1030: 1029: 1027: 1026: 1021: 1016: 1011: 1006: 1001: 996: 991: 986: 981: 976: 967: 962: 957: 952: 947: 942: 941: 940: 930: 925: 924: 923: 918: 907: 905: 899: 898: 896: 895: 890: 885: 880: 875: 869: 867: 861: 860: 858: 857: 856: 855: 844: 838: 836:Human (HUMINT) 829: 823: 822: 815: 814: 807: 800: 792: 783: 782: 780: 779: 774: 773: 772: 767: 757: 752: 747: 742: 737: 732: 727: 722: 721: 720: 715: 705: 700: 695: 694: 693: 688: 678: 677: 676: 671: 661: 656: 651: 650: 649: 638: 636: 632: 631: 629: 628: 623: 618: 612: 610: 601: 600: 598: 597: 592: 591: 590: 580: 575: 570: 565: 560: 555: 550: 545: 540: 535: 530: 525: 519: 517: 516:communications 511: 510: 508: 507: 506: 505: 494: 492: 488: 487: 485: 484: 479: 474: 469: 464: 459: 454: 453: 452: 442: 435: 433:Agent handling 429: 427: 425: 424: 419: 413: 410: 409: 402: 401: 394: 387: 379: 373: 372: 362: 361:External links 359: 357: 356: 343: 341: 338: 337: 336: 329: 326: 281: 278: 253: 250: 240: 237: 188: 185: 165:agent handling 155: 154: 69: 67: 60: 52:Spy management 51: 48: 47: 28: 26: 19: 9: 6: 4: 3: 2: 1297: 1286: 1285:Spies by role 1283: 1281: 1278: 1277: 1275: 1260: 1257: 1253: 1252:organizations 1250: 1249: 1248: 1245: 1243: 1240: 1239: 1237: 1235: 1234:Dissemination 1231: 1225: 1222: 1220: 1217: 1215: 1212: 1210: 1207: 1205: 1202: 1200: 1197: 1195: 1192: 1190: 1187: 1185: 1182: 1181: 1179: 1177: 1173: 1163: 1160: 1158: 1155: 1153: 1150: 1148: 1145: 1143: 1140: 1139: 1137: 1133: 1126: 1122: 1119: 1117: 1114: 1112: 1109: 1107: 1104: 1102: 1099: 1097: 1094: 1092: 1089: 1088: 1086: 1084: 1078: 1072: 1069: 1067: 1064: 1062: 1059: 1057: 1054: 1052: 1049: 1047: 1044: 1043: 1041: 1039: 1035: 1025: 1022: 1020: 1019:Steganography 1017: 1015: 1012: 1010: 1007: 1005: 1002: 1000: 999:Interrogation 997: 995: 992: 990: 987: 985: 984:Eavesdropping 982: 980: 977: 975: 971: 968: 966: 963: 961: 958: 956: 953: 951: 948: 946: 943: 939: 936: 935: 934: 931: 929: 926: 922: 919: 917: 914: 913: 912: 909: 908: 906: 904: 900: 894: 891: 889: 888:Direct action 886: 884: 883:Covert action 881: 879: 876: 874: 871: 870: 868: 866: 862: 854: 853:organizations 851: 850: 849: 846: 845: 842: 839: 837: 833: 830: 828: 824: 820: 813: 808: 806: 801: 799: 794: 793: 790: 778: 775: 771: 768: 766: 763: 762: 761: 758: 756: 753: 751: 748: 746: 743: 741: 738: 736: 733: 731: 728: 726: 723: 719: 716: 714: 713:interrogation 711: 710: 709: 706: 704: 701: 699: 696: 692: 689: 687: 684: 683: 682: 681:Eavesdropping 679: 675: 672: 670: 667: 666: 665: 662: 660: 657: 655: 652: 648: 645: 644: 643: 640: 639: 637: 633: 627: 624: 622: 619: 617: 614: 613: 611: 606: 602: 596: 593: 589: 586: 585: 584: 583:Steganography 581: 579: 576: 574: 571: 569: 566: 564: 561: 559: 558:Invisible ink 556: 554: 551: 549: 546: 544: 541: 539: 536: 534: 531: 529: 526: 524: 521: 520: 518: 512: 504: 501: 500: 499: 496: 495: 493: 489: 483: 480: 478: 477:Sleeper agent 475: 473: 470: 468: 465: 463: 460: 458: 455: 451: 448: 447: 446: 443: 441: 440: 436: 434: 431: 430: 428: 423: 420: 418: 415: 414: 411: 407: 400: 395: 393: 388: 386: 381: 380: 377: 370: 369: 365: 364: 353: 348: 344: 335: 332: 331: 325: 323: 322:interrogation 319: 315: 311: 307: 303: 299: 295: 294:one-time pads 292:, the use of 291: 287: 286:communication 277: 274: 272: 268: 264: 258: 249: 247: 236: 233: 229: 227: 226:interrogation 222: 220: 215: 209: 207: 203: 197: 195: 184: 182: 181:case officers 178: 174: 170: 166: 162: 151: 148: 140: 129: 126: 122: 119: 115: 112: 108: 105: 101: 98: –  97: 93: 92:Find sources: 86: 82: 76: 75: 70:This article 68: 64: 59: 58: 55: 44: 32: 27: 18: 17: 1024:Surveillance 1014:Resident spy 955:Cryptography 920: 760:Surveillance 548:Cyber spying 533:Cryptography 472:Resident spy 457:Double agent 437: 432: 367: 352:case officer 347: 317: 313: 306:surveillance 290:cryptography 288:, including 283: 275: 259: 255: 242: 239:Case officer 234: 230: 223: 210: 198: 190: 180: 164: 158: 143: 134: 124: 117: 110: 103: 91: 79:Please help 74:verification 71: 54: 41:October 2023 38: 30: 1096:Geophysical 878:Cell system 865:Clandestine 750:Stay-behind 659:Recruitment 616:Canary trap 514:Devices and 462:Field agent 219:clandestine 1274:Categories 1125:earthquake 989:False flag 827:Collection 745:Sexpionage 725:COINTELPRO 718:safe house 698:False flag 635:Operations 609:techniques 605:Tradecraft 340:References 302:dead drops 263:bona fides 246:tradecraft 214:tradecraft 137:March 2012 107:newspapers 1280:Espionage 1116:Materials 970:Defection 965:Dead drop 938:black bag 903:Espionage 669:black bag 553:Dead drop 482:Spymaster 406:Espionage 271:blackmail 206:"cut-out" 1176:Analysis 974:Turncoat 921:handling 735:SHAMROCK 588:microdot 491:Analysis 328:See also 280:Training 267:coercion 1123: ( 1101:Nuclear 1071:TEMPEST 730:MINARET 674:wetwork 175:") by 121:scholar 31:updated 960:Cutout 911:Agents 765:Global 691:MASINT 686:SIGINT 538:Cutout 422:Assets 417:Agents 334:Minder 316:, and 194:HUMINT 173:assets 169:agents 123:  116:  109:  102:  94:  1135:Other 1106:Radar 950:Cover 928:Asset 916:field 450:Agent 445:Cover 128:JSTOR 114:books 770:Mass 740:FVEY 467:Mole 308:and 100:news 607:and 159:In 83:by 1276:: 972:/ 324:. 269:, 196:. 183:. 163:, 1127:) 811:e 804:t 797:v 398:e 391:t 384:v 150:) 144:( 139:) 135:( 125:· 118:· 111:· 104:· 77:. 43:) 39:( 33:.

Index


verification
improve this article
adding citations to reliable sources
"Agent handling"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
intelligence organizations
agents
assets
intelligence officers
HUMINT
cellular fashion
"cut-out"
tradecraft
clandestine
interrogation
tradecraft
bona fides
coercion
blackmail
communication
cryptography
one-time pads
concealment devices
dead drops

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.