💾 Archived View for spam.works › mirrors › textfiles › anarchy › secretmeetings.txt captured on 2023-06-14 at 15:41:18.

View Raw

More Information

-=-=-=-=-=-=-


                               Secret Meetings



Tradecraft for managing clandestine contacts... Copyright ?1998 Lee Adams. All 
rights reserved. Updated September 11th, 1998. NOTE - Spy & CounterSpy does not 
endorse, condone, or encourage any illegal act. The material in this article is 
presented for information, research, entertainment, and education purposes only. 
The words "you" and "your" and "I" and "we" are used in this article for ease of 
readability only.

A security service like the FBI can only achieve its objectives by intercepting 
communication between people. This means you can beat the security service if 
you can deny them the ability to overhear your meetings with your contacts.


What you'll learn here...

This article teaches you how to check for surveillance before you meet with a 
clandestine contact. You'll learn a protocol that will beat security services 
like the FBI, BATF, DEA, and others. The method is particularly effective 
against standard police surveillance. It also works against the so-called 
inspection teams of the IRS.

Tradecraft origins. The method described in this article was originally devised 
in 1943-1944 by countersurveillance expert Anthony Blunt for Britain's MI.5. 
Unfortunately for the British, Blunt was a deep-cover agent for the KGB.

Six years later, Blunt taught the protocol to his new KGB controller, Yuri 
Modin. Together they perfected the technique as it is known today. They 
successfully thwarted MI.5 surveillance for three years, sometimes even meeting 
daily to exchange information and top secret documents. In effect, Blunt was 
using his inside knowledge of MI.5's surveillance techniques to beat them at 
their own game.

Proliferation. This countersurveillance method has since been adopted by 
Israel's Mossad, Germany's BND, Russia's KGB (now the SVR), the American CIA, 
and many others. The protocol is taught by intelligence agencies to their 
controllers - these are the intelligence officers who manage and meet with deep 
cover agents in foreign countries. The method is also being used today by 
resistance movements and urban guerrilla groups.

When this countersurveillance protocol is methodically applied, it is extremely 
difficult for a security service to breach your security.



Step-by-step instructions...

Here's a hypothetical situation. Assume that you and I wish to meet 
clandestinely. We wish to ensure that our meeting is not observed by a 
surveillance team.

You and I have previously agreed upon a place, date, and time. In addition, we 
are familiar with each other's appearance - we can recognize each other on 
sight.

Step 1

You and I independently arrive at the previously agreed-upon general location. 
Rather than fixing a specific location, we agree to be only in the general 
vicinity. This is an important principle.

This might be a large park, a residential district, etc. The location must be 
outdoors and free of video surveillance cameras. It should also be selected with 
the intention of thwarting telephoto lenses.

You and I should each know the area well. The location should provide reasonable 
cover for each of us being there - strolling in the park, walking through a 
residential area to a bus stop, convenience store, etc.

Step 2

You and I will eventually make eye contact at some distance from each other. We 
do this discretely, so others are unaware. I use a pre-arranged signal to alert 
you that I have spotted you. Perhaps I'll throw my jacket over my shoulder, or 
remove and clean my sunglasses, etc. The signal must be a natural movement that 
does not attract unwanted attention.

Safety first.Even though you and I have seen each other, we do NOT approach each 
other. This is an important safety valve. If either of us has grown a tail we do 
not want to compromise the other person.

BACKGROUND - The phrase grown a tail is spy-talk for being under surveillance. 
The phrase is somewhat inaccurate, because they don't just follow you, they 
often surround you.

Step 3

When you see my signal you simply walk off. Then I follow you in order to ensure 
that you're not being watched. I carefully check for the presence of a 
floating-box foot surveillance team. I check for agents at fixed observation 
posts. I also watch for drive-by support from a floating-box vehicle 
surveillance team.

BACKGROUND - In particular, I may follow you, I may walk parallel to you, I may 
occasionally walk ahead of you. The goal is simply to be nearby so I'm in a 
position to detect surveillance around you. I always remain at a distance from 
you, of course, never approaching too closely.

Step 4

When I have satisfied myself that you are clean, I again signal you. Perhaps I 
re-tie my shoe laces.

Step 5

Now we reverse roles and this time it is I who simply walks off. You begin to 
follow me in order to ensure that I'm not being watched. You check for 
floating-box foot surveillance, fixed observation post foot surveillance, and 
drive-by support by a vehicle surveillance team.

What to look for.You carefully watch for persons who are pacing me or moving 
parallel with me. You check for persons loitering at positions with a good 
line-of-sight to my location. You watch for an ongoing pattern of people coming 
and going that results in someone always being in a position to monitor me. You 
watch for vehicles dropping someone off ahead of me.

Step 6

When you are satisfied that I am clean, you signal me that I'm not being 
watched. (On the other hand, if you suspect that a surveillance team is in the 
vicinity, you simply abort the operation and walk away.)

BACKGROUND - You must trust your instincts, because if something seems not quite 
right it's better to be safe than sorry. Many people are surprised to learn that 
it is not difficult to detect a surveillance team watching someone else. This is 
the subtle elegance of Blunt's countersurveillance system. And the goons are 
helpless against it.

Step 7

You and I can now approach each other and meet. After our discussion we agree 
upon the date, time, and location of our next clandestine meeting - as well as 
two backup plans in case the meeting is thwarted by surveillance. If we are 
unable to meet at the first venue we will use our fallback position and we will 
meet at the same time and place one week later. If we are unable to make that 
meeting happen, we will shift to a previously agreed-upon failsafe plan and we 
will meet at a different location at an agreed-upon date and time.

Neither you nor I writes down the particulars of our next meeting. We commit the 
details to memory.

BACKGROUND 1 - If you have any documents to give me, I will not accept those 
documents until the final moments of our meeting. I will have already started 
making my getaway when I accept the documents. This reduces the chance of 
discovery and arrest by a surveillance team that has managed to elude our 
countersurveillance protocol. If the security service acts too quickly, they 
will have no evidence against me, because the documents have not yet been passed 
to me.

BACKGROUND 2 - The best agents never mix discussion and documents. If a document 
is to be passed, no discussion occurs. The entire contact takes only a moment - 
the perfect brushpass. The principle is simple. It is foolhardy to stand around 
holding incriminating documents.

Spook talk...

Spies in North America call this seven-step protocol for countersurveillance 
drycleaning. In Europe, it is called parcours de s?curit? - a French phrase 
which can be translated as security run or security circuit.


    original: spy&counterspy, ascii conversion: mrf